{"title":"On optimal weight assignmnents for multivariate interpolation list-decoding","authors":"R. Koetter","doi":"10.1109/ITW.2006.1633777","DOIUrl":"https://doi.org/10.1109/ITW.2006.1633777","url":null,"abstract":"We consider the weight assignment problem for multivariate interpolation-based decoding. The resulting optimization problem is solved under the assumption that the codes are not too short (the integrality gap for our relaxations approaches zero as the code length grows) and the optimal weight assignment scheme is given for the criterion of maximizing an allowable additive cost (e.g. Hamming distance or log-probability, etc.) of an error event.","PeriodicalId":293144,"journal":{"name":"2006 IEEE Information Theory Workshop - ITW '06 Punta del Este","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130908829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Using Many Machines to Handle an Enormous Error-Correcting Code","authors":"J. Feldman","doi":"10.1109/ITW.2006.1633806","DOIUrl":"https://doi.org/10.1109/ITW.2006.1633806","url":null,"abstract":"We investigate the problem of using many machines to represent, encode and decode an error-correcting code with an extremely large block length. Standard algorithms for encoding and decoding run into problems when scaled to a block length that does not allow random access to the data. We apply the massive computing infrastructure at Google together with the MapReduce programming abstraction to encode and decode a Tornado code over the erasure channel.","PeriodicalId":293144,"journal":{"name":"2006 IEEE Information Theory Workshop - ITW '06 Punta del Este","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134205357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Network Coding in Minimal Multicast Networks","authors":"S. Rouayheb, C. Georghiades, A. Sprintson","doi":"10.1109/ITW.2006.1633835","DOIUrl":"https://doi.org/10.1109/ITW.2006.1633835","url":null,"abstract":"We investigate the network coding problem in a certain class of minimal multicast networks. In a multicast coding network, a source S needs to deliver h symbols, or packets, to a set of destinations T over an underlying communication network modeled by a graph G. A coding network is said to be h-minimal if it can deliver h symbols from S to the destination nodes, while any proper subnetwork of G can deliver at most h — 1 symbols to the set of destination nodes. This problem is motivated by the requirement to minimize the amount of network resources allocated for a multicast connections. We show that surprisingly, minimal multicast networks have unique properties that distinguish them from the general case of multicast networks. In particular, we show that it is possible to determine whether a 2-minimal network has a routing solution (i.e., a solution without encoding nodes) in polynomial time, while this problem is NP-hard in general. In addition, we show that if a 2-minimal network is planar, then the minimum size of the required field for linear network codes is at most 3. Also, we investigate several structural properties of 2-minimal networks and generalize our results for h > 2.","PeriodicalId":293144,"journal":{"name":"2006 IEEE Information Theory Workshop - ITW '06 Punta del Este","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133403640","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Another diametric theorem in Hamming spaces: optimal group anticodes","authors":"R. Ahlswede","doi":"10.1109/ITW.2006.1633814","DOIUrl":"https://doi.org/10.1109/ITW.2006.1633814","url":null,"abstract":"In the last century together with Levon Khachatrian we established a diametric theorem in Hamming space H<sup>n</sup>=(X<sup>n</sup>,d<inf>H</inf>). Now we contribute a diametric theorem for such spaces, if they are endowed with the group structure G<sup>n</sup>=<sup>n</sup>Σ<inf>1</inf>G, the direct sum of a group G on X={0,1,...,q-1}, and as candidates are considered subgroups of G<sup>n</sup>. For all finite groups G, every permitted distance d, and all n≥d subgroups of G<sup>n</sup>with diameter d have maximal cardinality q<sup>d</sup>. Other extremal problems can also be studied in this setting.","PeriodicalId":293144,"journal":{"name":"2006 IEEE Information Theory Workshop - ITW '06 Punta del Este","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133116405","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Novel Unitary Space-Time Signal Design","authors":"David B. Smith, L. Hanlen","doi":"10.1109/ITW.2006.1633839","DOIUrl":"https://doi.org/10.1109/ITW.2006.1633839","url":null,"abstract":"This paper presents a novel unitary space-time signal design for two to six transmit antennas which is applicable to both coherent and differential space-time coding. In the context of differential modulation, this new space-time signal design demonstrates good bit-error performance when compared with previously designed codes both theoretically and by simulation. The design for two antennas is shown to subsume previous differential unitary space-time signal constellation with the property that the number of optimum codes scales with the size of the constellation. As part of analysis of this novel design an exact expression for the union bound on error probability is given for differential unitary space-time modulation. The calculation of the union bound on bit-error probability can also shown to be considerably simplified for these codes allowing for the simplified design of larger constellations.","PeriodicalId":293144,"journal":{"name":"2006 IEEE Information Theory Workshop - ITW '06 Punta del Este","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122369897","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On opportunistic codes and broadcast codes with degraded message sets","authors":"S. Diggavi, David Tse","doi":"10.1109/ITW.2006.1633817","DOIUrl":"https://doi.org/10.1109/ITW.2006.1633817","url":null,"abstract":"Diversity embedded codes are opportunistic codes which take advantage of good channel realizations while ensuring at least part of the information is received reliably for bad channels. We establish a connection between these codes and degraded message set broadcast codes. We characterize the achievable rate region for the parallel Gaussian degraded message set broadcast problem, when only the strongest user needs the private information. Using this, we partially characterize the set of achievable rate-diversity tuples for the diversity embedded problem for parallel fading channels.","PeriodicalId":293144,"journal":{"name":"2006 IEEE Information Theory Workshop - ITW '06 Punta del Este","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130166078","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Entropy Estimation: Simulation, Theory and a Case Study","authors":"Ioannis Kontoyiannis","doi":"10.1109/ITW.2006.1633823","DOIUrl":"https://doi.org/10.1109/ITW.2006.1633823","url":null,"abstract":"We consider the statistical problem of estimating the entropy of finite-alphabet data generated from an unknown stationary process. We examine a series of estimators, including: (1) The standard maximum-likelihood or \"plug-in\" estimator; (2) Four different estimators based on the family of Lempel-Ziv compression algorithms; (3) A different plug-in estimator especially tailored to renewal processes; and (4) The natural estimator derived from the Context-Tree Weighting method (CTW). Some of these estimators are well-known, and some are new. We first summarize numerous theoretical properties of these estimators: Conditions for consistency, estimates of their bias and variance, methods for approximating the estimation error and for obtaining confidence intervals. Several new theoretical results are developed. We show how the theory offers preliminary indications results offer guidelines for tuning the parameters involved in the estimation process. Then we present an extensive simulation study on various types of synthetic data and under various conditions. We compare their performance and comment on the strengths and weaknesses of the various methods. For each estimator, we develop a precise method for calculating the estimation error based on any specific data set. Finally we report the performance of these entropy estimators on the (binary) spike trains of 28 neurons recorded simultaneously for a one-hour period from the primary motor and dorsal premotor cortices of a quietly seated monkey not engaged in a task behavior. Based on joint work with Yun Gao and Elie Bienenstock.","PeriodicalId":293144,"journal":{"name":"2006 IEEE Information Theory Workshop - ITW '06 Punta del Este","volume":"26 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129214267","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Reliable Communication over an Optical Fading Channel","authors":"Kaushik Chakraborty, P. Narayan","doi":"10.1109/ITW.2006.1633770","DOIUrl":"https://doi.org/10.1109/ITW.2006.1633770","url":null,"abstract":"We consider a single-user multiple input multiple output (MIMO) shot-noise limited Poisson fading channel over which information signals are transmitted by modulating the intensities of multiple optical beams, one from each transmit aperture; and individual photon arrivals are counted at multiple receive photodetector apertures. The transmitted signals undergo multiplicative fading, and the fading occurs in coherence intervals of fixed duration in each of which the fade (channel state) matrix remains constant, and changes across successive such intervals in an i.i.d. fashion. We obtain a single-letter characterization of the capacity of this channel when the receiver is provided with perfect channel state information (CSI) while the transmitter CSI can be imperfect. Properties of the optimal transmission strategies are also described.","PeriodicalId":293144,"journal":{"name":"2006 IEEE Information Theory Workshop - ITW '06 Punta del Este","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117217716","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Orlitsky, N. Santhanam, K. Viswanathan, Junan Zhang
{"title":"Theoretical and Experimental Results on Modeling Low Probabilities","authors":"A. Orlitsky, N. Santhanam, K. Viswanathan, Junan Zhang","doi":"10.1109/ITW.2006.1633820","DOIUrl":"https://doi.org/10.1109/ITW.2006.1633820","url":null,"abstract":"Building on [1], [5], we model probability distributions from data using the high profile distribution. We show that the high profile distribution is majorized by the empirical frequency distribution, that the support of high profile distributions can be mixed, namely the distribution can have both discrete and continuous components, and obtain the high profile distribution for certain profiles. We then experimentally compare the high profile distribution with certain estimators that have been studied in statistics literature for the species estimation problem.","PeriodicalId":293144,"journal":{"name":"2006 IEEE Information Theory Workshop - ITW '06 Punta del Este","volume":"1 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120916604","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Promenade through the New Cryptography of Bilinear Pairings","authors":"Xavier Boyen","doi":"10.1109/ITW.2006.1633773","DOIUrl":"https://doi.org/10.1109/ITW.2006.1633773","url":null,"abstract":"This paper gives an introductory account of the origin, nature, and uses of bilinear pairings, arguably the newest and hottest toy in a cryptographer's toolbox. A handful of cryptosystems built on pairings are briefly surveyed, including a couple of realizations of the famously elusive identity-based encryption primitive.","PeriodicalId":293144,"journal":{"name":"2006 IEEE Information Theory Workshop - ITW '06 Punta del Este","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128160451","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}