2015 IEEE Information Theory Workshop - Fall (ITW)最新文献

筛选
英文 中文
Analysis of spatially-coupled counter braids 空间耦合反编织分析
2015 IEEE Information Theory Workshop - Fall (ITW) Pub Date : 2015-08-11 DOI: 10.1109/ITWF.2015.7360749
E. Rosnes, A. G. Amat
{"title":"Analysis of spatially-coupled counter braids","authors":"E. Rosnes, A. G. Amat","doi":"10.1109/ITWF.2015.7360749","DOIUrl":"https://doi.org/10.1109/ITWF.2015.7360749","url":null,"abstract":"A counter braid (CB) is a novel counter architecture introduced by Lu et al. in 2007 for per-flow measurements on high-speed links. CBs achieve an asymptotic compression rate (under optimal decoding) that matches the entropy lower bound of the flow size distribution. Spatially-coupled CBs (SC-CBs) have recently been proposed. In this work, we further analyze single-layer CBs and SC-CBs using an equivalent bipartite graph representation of CBs. On this equivalent representation, we show that the potential and area thresholds are equal. We also show that the area under the extended belief propagation (BP) extrinsic information transfer curve (defined for the equivalent graph), computed for the expected residual CB graph when a peeling decoder equivalent to the BP decoder stops, is equal to zero precisely at the area threshold. This, combined with simulations and an asymptotic analysis of the Maxwell decoder, leads to the conjecture that the area threshold is in fact equal to the Maxwell decoding threshold and hence a lower bound on the maximum a posteriori (MAP) decoding threshold. Finally, we present some numerical results and give some insight into the apparent gap of the BP decoding threshold of SC-CBs to the conjectured lower bound on the MAP decoding threshold.","PeriodicalId":281890,"journal":{"name":"2015 IEEE Information Theory Workshop - Fall (ITW)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133878475","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Threshold saturation for spatially coupled turbo-like codes over the binary erasure channel 二进制擦除信道上空间耦合涡轮式码的阈值饱和
2015 IEEE Information Theory Workshop - Fall (ITW) Pub Date : 2015-08-10 DOI: 10.1109/itwf.2015.7360750
Saeedeh Moloudi, M. Lentmaier, A. G. Amat
{"title":"Threshold saturation for spatially coupled turbo-like codes over the binary erasure channel","authors":"Saeedeh Moloudi, M. Lentmaier, A. G. Amat","doi":"10.1109/itwf.2015.7360750","DOIUrl":"https://doi.org/10.1109/itwf.2015.7360750","url":null,"abstract":"In this paper we prove threshold saturation for spatially coupled turbo codes (SC-TCs) and braided convolutional codes (BCCs) over the binary erasure channel. We introduce a compact graph representation for the ensembles of SC-TC and BCC codes which simplifies their description and the analysis of the message passing decoding. We demonstrate that by few assumptions in the ensembles of these codes, it is possible to rewrite their vector recursions in a form which places these ensembles under the category of scalar admissible systems. This allows us to define potential functions and prove threshold saturation using the proof technique introduced by Yedla et al..","PeriodicalId":281890,"journal":{"name":"2015 IEEE Information Theory Workshop - Fall (ITW)","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125445628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
On massive MIMO physical layer cryptosystem 大规模MIMO物理层密码系统研究
2015 IEEE Information Theory Workshop - Fall (ITW) Pub Date : 2015-07-29 DOI: 10.1109/ITWF.2015.7360782
Ron Steinfeld, A. Sakzad
{"title":"On massive MIMO physical layer cryptosystem","authors":"Ron Steinfeld, A. Sakzad","doi":"10.1109/ITWF.2015.7360782","DOIUrl":"https://doi.org/10.1109/ITWF.2015.7360782","url":null,"abstract":"In this paper, we present a zero-forcing (ZF) attack on the physical layer cryptography scheme based on massive multiple-input multiple-output (MIMO). The scheme uses singular value decomposition (SVD) precoder. We show that the eavesdropper can decrypt/decode the information data under the same condition as the legitimate receiver. We then study the advantage for decoding by the legitimate user over the eavesdropper in a generalized scheme using an arbitrary precoder at the transmitter. On the negative side, we show that if the eavesdropper uses a number of receive antennas much larger than the number of legitimate user antennas, then there is no advantage, independent of the precoding scheme employed at the transmitter. On the positive side, for the case where the adversary is limited to have the same number of antennas as legitimate users, we give an O(n2) upper bound on the advantage and show that this bound can be approached using an inverse precoder.","PeriodicalId":281890,"journal":{"name":"2015 IEEE Information Theory Workshop - Fall (ITW)","volume":"156 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122614109","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A mixed-ADC receiver architecture for massive MIMO systems 一种用于大规模MIMO系统的混合adc接收机架构
2015 IEEE Information Theory Workshop - Fall (ITW) Pub Date : 2015-07-27 DOI: 10.1109/ITWF.2015.7360769
Ning Liang, Wenyi Zhang
{"title":"A mixed-ADC receiver architecture for massive MIMO systems","authors":"Ning Liang, Wenyi Zhang","doi":"10.1109/ITWF.2015.7360769","DOIUrl":"https://doi.org/10.1109/ITWF.2015.7360769","url":null,"abstract":"Motivated by the demand for energy-efficient communication solutions in the next generation cellular network, a mixed-ADC receiver architecture for massive multiple input multiple output (MIMO) systems is proposed, which differs from previous works in that herein one-bit analog-to-digital converters (ADCs) partially replace the conventionally assumed high-resolution ADCs. The information-theoretic tool of generalized mutual information (GMI) is exploited to analyze the achievable data rates of the proposed system architecture and an array of analytical results of engineering interest are obtained. For deterministic single input multiple output (SIMO) channels, a closed-form expression of the GMI is derived, based on which the linear combiner is optimized. Then, the asymptotic behaviors of the GMI in both low and high SNR regimes are explored, and the analytical results suggest a plausible ADC assignment scheme. Finally, the analytical framework is applied to the multi-user access scenario, and the corresponding numerical results demonstrate that the mixed system architecture with a relatively small number of high-resolution ADCs is able to achieve a large fraction of the channel capacity without output quantization.","PeriodicalId":281890,"journal":{"name":"2015 IEEE Information Theory Workshop - Fall (ITW)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115455497","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
The wiretap channel with generalized feedback: Secure communication and key generation 具有广义反馈的窃听信道:安全通信和密钥生成
2015 IEEE Information Theory Workshop - Fall (ITW) Pub Date : 2015-07-01 DOI: 10.1109/ITWF.2015.7360780
Germán Bassi, P. Piantanida, S. Shamai
{"title":"The wiretap channel with generalized feedback: Secure communication and key generation","authors":"Germán Bassi, P. Piantanida, S. Shamai","doi":"10.1109/ITWF.2015.7360780","DOIUrl":"https://doi.org/10.1109/ITWF.2015.7360780","url":null,"abstract":"It is well-known that feedback does not increase the capacity of point-to-point memoryless channels, however, the advantage it poses to secure communications is not fully understood yet. In this work, an achievable scheme for the wiretap channel with generalized feedback is presented. This scheme employs the feedback signal to generate a secret key shared between the legitimate users, which is then used to encrypt the message to be sent. It is shown that the resulting achievable rate recovers previous results, thus it can be seen as a generalization and unification of several results in the field.","PeriodicalId":281890,"journal":{"name":"2015 IEEE Information Theory Workshop - Fall (ITW)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115467201","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Local codes with addition based repair 带有附加修复的本地代码
2015 IEEE Information Theory Workshop - Fall (ITW) Pub Date : 2015-06-08 DOI: 10.1109/ITWF.2015.7360734
H. M. Kiah, Son Hoang Dau, Wentu Song, C. Yuen
{"title":"Local codes with addition based repair","authors":"H. M. Kiah, Son Hoang Dau, Wentu Song, C. Yuen","doi":"10.1109/ITWF.2015.7360734","DOIUrl":"https://doi.org/10.1109/ITWF.2015.7360734","url":null,"abstract":"We consider the complexities of repair algorithms for locally repairable codes and propose a class of codes that repair single node failures using addition operations only, or codes with addition based repair. We construct two families of codes with addition based repair. The first family attains distance one less than the Singleton-like upper bound, while the second family attains the Singleton-like upper bound.","PeriodicalId":281890,"journal":{"name":"2015 IEEE Information Theory Workshop - Fall (ITW)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127927822","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The indirect rate-distortion function of a binary i.i.d source 二进制i.d源的间接率失真函数
2015 IEEE Information Theory Workshop - Fall (ITW) Pub Date : 2015-05-19 DOI: 10.1109/ITWF.2015.7360794
A. Kipnis, S. Rini, A. Goldsmith
{"title":"The indirect rate-distortion function of a binary i.i.d source","authors":"A. Kipnis, S. Rini, A. Goldsmith","doi":"10.1109/ITWF.2015.7360794","DOIUrl":"https://doi.org/10.1109/ITWF.2015.7360794","url":null,"abstract":"The indirect source-coding problem in which a Bernoulli process is compressed in a lossy manner from its noisy observations is considered. These noisy observations are obtained by passing the source sequence through a binary symmetric channel so that the channel crossover probability controls the amount of information available about the source realization at the encoder. We use classic results in rate-distortion theory to compute the rate-distortion function for this model as a solution of an exponential equation. In addition, we derive an upper bound on the rate distortion which has a simple closed-form expression and investigate the coding scheme that attains it. These expressions capture precisely the expected behavior of the rate-distortion function: the noisier the source observations, the smaller the reduction in distortion obtained from increasing the compression rate.","PeriodicalId":281890,"journal":{"name":"2015 IEEE Information Theory Workshop - Fall (ITW)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126461391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Zero error coordination 零误差协调
2015 IEEE Information Theory Workshop - Fall (ITW) Pub Date : 2015-05-05 DOI: 10.1109/ITWF.2015.7360763
Mahed Abroshan, A. Gohari, S. Jaggi
{"title":"Zero error coordination","authors":"Mahed Abroshan, A. Gohari, S. Jaggi","doi":"10.1109/ITWF.2015.7360763","DOIUrl":"https://doi.org/10.1109/ITWF.2015.7360763","url":null,"abstract":"In this paper, we consider a zero error coordination problem wherein the nodes of a network exchange messages to be able to perfectly coordinate their actions with the individual observations of each other. While previous works on coordination commonly assume an asymptotically vanishing error, we assume exact, zero error coordination. Furthermore, unlike previous works that employ the empirical or strong notions of coordination, we define and use a notion of set coordination. This notion of coordination bears similarities with the empirical notion of coordination. We observe that set coordination, in its special case of two nodes with a one-way communication link is equivalent with the “Hide and Seek” source coding problem of McEliece and Posner. The Hide and Seek problem has known intimate connections with graph entropy, rate distortion theory, Rényi mutual information and even error exponents. Other special cases of the set coordination problem relate to Witsenhausen's zero error rate and the distributed computation problem. These connections motivate a better understanding of set coordination, its connections with empirical coordination, and its study in more general setups. This paper takes a first step in this direction by proving new results for two node networks, including capacity characterizations for the linear case.","PeriodicalId":281890,"journal":{"name":"2015 IEEE Information Theory Workshop - Fall (ITW)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132941056","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Index coding and network coding via rank minimization 索引编码和网络编码通过秩最小化
2015 IEEE Information Theory Workshop - Fall (ITW) Pub Date : 2015-04-26 DOI: 10.1109/ITWF.2015.7360725
Xiao Huang, S. Rouayheb
{"title":"Index coding and network coding via rank minimization","authors":"Xiao Huang, S. Rouayheb","doi":"10.1109/ITWF.2015.7360725","DOIUrl":"https://doi.org/10.1109/ITWF.2015.7360725","url":null,"abstract":"Index codes reduce the number of bits broadcast by a wireless transmitter to a number of receivers with different demands and with side information. It is known that the problem of finding optimal linear index codes is NP-hard. We investigate the performance of different heuristics based on rank minimization and matrix completion methods for constructing linear index codes over the reals. As a summary of our results, the alternating projections method gives the best results in terms of minimizing the number of broadcast bits and convergence rate and leads to up to 13% savings in communication cost compared to graph coloring algorithms studied in the literature. Moreover, we describe how the proposed methods can be used to construct linear network codes for non-multicast networks.","PeriodicalId":281890,"journal":{"name":"2015 IEEE Information Theory Workshop - Fall (ITW)","volume":"281 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127553635","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
On critical index coding problems 关键索引编码问题
2015 IEEE Information Theory Workshop - Fall (ITW) Pub Date : 2015-04-25 DOI: 10.1109/ITWF.2015.7360724
Fatemeh Arbabjolfaei, Young-Han Kim
{"title":"On critical index coding problems","authors":"Fatemeh Arbabjolfaei, Young-Han Kim","doi":"10.1109/ITWF.2015.7360724","DOIUrl":"https://doi.org/10.1109/ITWF.2015.7360724","url":null,"abstract":"The question of under what condition some side information for index coding can be removed without affecting the capacity region is studied, which was originally posed by Tahmasbi, Shahrasbi, and Gohari. To answer this question, the notion of unicycle for the side information graph is introduced and it is shown that any edge that belongs to a unicycle is critical, namely, it cannot be removed without reducing the capacity region. Although this sufficient condition for criticality is not necessary in general, a partial converse is established, which elucidates the connection between the notion of unicycle and the maximal acylic induced subgraph outer bound on the capacity region by Bar-Yossef, Birk, Jayram, and Kol.","PeriodicalId":281890,"journal":{"name":"2015 IEEE Information Theory Workshop - Fall (ITW)","volume":"159 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131339506","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信