{"title":"Optimal Multicast with Erasure Correction Coding","authors":"N. Sarshar, Xiaolin Wu, Zhe Wang","doi":"10.1109/ITW2.2006.323833","DOIUrl":"https://doi.org/10.1109/ITW2.2006.323833","url":null,"abstract":"We propose a network information flow strategy of optimal multicast with erasure correction coding (OMEC), in which erasure correction is a means of utilizing diversities rather than combating packet losses. An information source is first encoded by an erasure correction code and then optimally multicast by a server to sinks. The OMEC scheme has the following characteristics: (1) It is at least as good as optimal routing and, for some cases, can realize a network throughput arbitrarily larger than that achievable by pure routing. (2) For most scenarios, the approach yields a throughput comparable with the optimal throughput achievable with network coding. In fact, for most examples in the literature for which network coding makes high throughput gains compared to pure routing, OMEC performs close to the optimal. (3) Unlike general network coding, intermediate nodes are only required to route information. This makes OMEC compatible with currently deployed network structures. (4) Surprisingly, unlike pure optimal routing, OMEC can be efficiently computed in polynomial time. While OMEC is, in general, suboptimal compared to full fledged network coding, it enjoys most of the computational and throughput benefits associated with network coding over pure routing, without requiring any changes to existing hardware infrastructures or protocol stacks","PeriodicalId":299513,"journal":{"name":"2006 IEEE Information Theory Workshop - ITW '06 Chengdu","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125473140","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Combining Sphere Decoding with M-Algorithm","authors":"Jianping Zheng, B. Bai, Xinmei Wang","doi":"10.1109/ITW2.2006.323782","DOIUrl":"https://doi.org/10.1109/ITW2.2006.323782","url":null,"abstract":"The sequence detection problem for fading channels in multiple-input multiple-output (MIMO) wireless systems is investigated. The sphere decoding (SD) algorithm provides an exact maximum-likelihood (ML) solution, while has expected worst-case complexity which is exponential in the number of symbols jointly detected. On the other hand, the M-algorithm (MA) is a suboptimal solution. Its complexity is linear in the product of the list number and the number of symbols jointly detected. We combined the sphere-constrained search strategy of SD with the M-constrained search principle of the MA. The resulting algorithms can achieve good performance in term of bit error rate (BER) while lower complexity","PeriodicalId":299513,"journal":{"name":"2006 IEEE Information Theory Workshop - ITW '06 Chengdu","volume":"4 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133594215","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Fountain Code Approach towards Priority Encoding Transmission","authors":"M. Nekoui, N. Ranjkesh, F. Lahouti","doi":"10.1109/ITW2.2006.323745","DOIUrl":"https://doi.org/10.1109/ITW2.2006.323745","url":null,"abstract":"We introduce a new method of engaging Limited Randomness LT codes [5], a practical realization of the original LT codes by Luby [3] to transmit prioritized data-which is of great importance for multimedia applications-over lossy packet-based networks. We obtained increased number of decoded packets for higher priorities and also the total number of decoded packets-over all priorities-was augmented.","PeriodicalId":299513,"journal":{"name":"2006 IEEE Information Theory Workshop - ITW '06 Chengdu","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133704464","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Gaussian Interference Channel Capacity to Within One Bit: the Symmetric Case","authors":"R. Etkin, David Tse, Hua Wang","doi":"10.1109/ITW2.2006.323705","DOIUrl":"https://doi.org/10.1109/ITW2.2006.323705","url":null,"abstract":"The capacity of the two-user Gaussian interference channel has been open for thirty years. The understanding on this problem has been limited. The best known achievable region is due to Han-Kobayashi but its characterization is very complicated. It is also not known how tight the existing outer bounds are. In this work, we show that the existing outer bounds can in fact be arbitrarily loose in some parameter ranges, and by deriving new outer bounds, we show that a simplified Han-Kobayashi type scheme can achieve to within a single bit the capacity for all values of the channel parameters. We also show that the scheme is asymptotically optimal at certain high SNR regimes. Using our results, we provide a natural generalization of the point-to-point classical notion of degrees of freedom to interference-limited scenarios","PeriodicalId":299513,"journal":{"name":"2006 IEEE Information Theory Workshop - ITW '06 Chengdu","volume":"7 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131455776","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Joint Source/Channel Coding for JPEG2000 Codestream Transmission over Fading Channels","authors":"Xiaona Lu, Rongke Liu, Xiaolin Zhang","doi":"10.1109/ITW2.2006.323822","DOIUrl":"https://doi.org/10.1109/ITW2.2006.323822","url":null,"abstract":"The embedded codestream structures and a variety of progressive image compression methods provided by JPEG2000 make it attractive for image transmission purposes. A three-level, hybrid optimization scheme is proposed for JPEG2000 compressed images over a correlated block fading channel with a cyclic redundancy check code (CRC) and a rate-compatible punctured convolution (RCPC) code. It combines forward error correction (FEC) and JPEG2000 error resilience (ER) mechanisms to minimize the end-to-end image distortion according to channel conditions. The proposed scheme employed a finite-state Markov channel model to simulate the channel. It has the complexity less than O (R2) for a special JPEG2000 codestream, where R is the number of available channel code rates. Simulation results show a significant improvement about 0.7-1.3 dB over the based two-level scheme in quality of received images","PeriodicalId":299513,"journal":{"name":"2006 IEEE Information Theory Workshop - ITW '06 Chengdu","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132660714","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Heuristic Algorithms for Small Field Multicast Encoding","authors":"A. Barbero, O. Ytrehus","doi":"10.1109/ITW2.2006.323835","DOIUrl":"https://doi.org/10.1109/ITW2.2006.323835","url":null,"abstract":"We explore and present heuristic algorithms that, for a given network, attempt to minimize the field size required for encoding","PeriodicalId":299513,"journal":{"name":"2006 IEEE Information Theory Workshop - ITW '06 Chengdu","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115886221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Space-Time Coding with Feedback","authors":"Haiquan Wang, E. Yang","doi":"10.1109/ITW2.2006.323837","DOIUrl":"https://doi.org/10.1109/ITW2.2006.323837","url":null,"abstract":"Space-time coding for a multiple-input, multiple-output (MIMO) system with feedback and maximum-likelihood (ML)-decoding is considered. In the case that complete feedback from the receiver to the transmitter is available, the optimal structure of the codes is shown to have the form cudagger, where c is a T-dimensional complex vector (T is a time delay), and u is a unit-norm eigenvector corresponding to the largest eigenvalue of matrix HHdagger (H is the channel matrix and dagger means the transpose and conjugate). Moreover, criterion for designing vector c is obtained. In the case that only finite-bit feedback is available, the optimal structure of the codes is proved to have the form cpdagger, where c is also a T-dimensional complex vector and p is a M-dimensional vector with unit-norm (M is the transmit number of the system). Furthermore, criteria for designing vectors c and p are given. A Lloyd-like algorithm to approach p is introduced","PeriodicalId":299513,"journal":{"name":"2006 IEEE Information Theory Workshop - ITW '06 Chengdu","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125804260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fountain Codes and Applications to Reliable Wireless Broadcast System","authors":"Yuanyuan Ma, D. Yuan, Haixia Zhang","doi":"10.1109/ITW2.2006.323758","DOIUrl":"https://doi.org/10.1109/ITW2.2006.323758","url":null,"abstract":"This paper investigates fountain codes and applications to wireless broadcast. In this paper, we extend fountain codes on erasure channels to arbitrary channel types by first taking into account the symbol information and belief propagation (BP) algorithm. We propose a rateless-coding framework based on fountain codes, which allow reliable wireless broadcast communications and asynchronous data access simultaneously. Considering the flexible code rate characteristic, we find a new measurement to evaluate the performance of fountain codes in the wireless environment. Via comparing the performance of two types of fountain codes: Luby transform (LT) codes and Raptor codes within this framework, we get the conclusion that fountain codes will be sufficient to fulfill both requirements in a wireless system. We also demonstrate such a framework has advantages in efficiency, reliability, and robustness","PeriodicalId":299513,"journal":{"name":"2006 IEEE Information Theory Workshop - ITW '06 Chengdu","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121545904","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Non-orthogonal Distributed Space-Time Coded Protocol Part I: Signal Model and Design Criteria","authors":"G. S. Rajan, B. S. Rajan","doi":"10.1109/ITW2.2006.323826","DOIUrl":"https://doi.org/10.1109/ITW2.2006.323826","url":null,"abstract":"In this- two-part series of papers, a generalized non-orthogonal amplify and forward (GNAF) protocol which generalizes several known cooperative diversity protocols is proposed. Transmission in the GNAF protocol comprises of two phases - the broadcast phase and the cooperation phase. In the broadcast phase, the source broadcasts its information to the relays as well as the destination. In the cooperation phase, the source and the relays together transmit a space-time code in a distributed fashion. The GNAF protocol relaxes the constraints imposed by the protocol of Jing and Hassibi on the code structure. In part-I of this paper, a code design criteria is obtained and it is shown that the GNAF protocol is delay efficient and coding gain efficient as well. Moreover the GNAF protocol enables the use of sphere decoders at the destination with a non-exponential maximum likelihood (ML) decoding complexity. In part-II, several low decoding complexity code constructions are studied and a lower bound on the diversity-multiplexing gain tradeoff of the GNAF protocol is obtained","PeriodicalId":299513,"journal":{"name":"2006 IEEE Information Theory Workshop - ITW '06 Chengdu","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127022653","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Novel SNR Estimation for Turbo Decoding over Rayleigh Fading Channels","authors":"H. Zhao, P. Fan, P. K. Mathiopoulos","doi":"10.1109/ITW2.2006.323783","DOIUrl":"https://doi.org/10.1109/ITW2.2006.323783","url":null,"abstract":"It is known that the signal to noise ratio (SNR) mismatch may cause degradation in error correction performance of turbo decoding. In order to obtain desired coding gain, a turbo decoder can perform online SNR estimation from the received data in each code block. This paper presents a novel SNR estimation method for turbo decoding over Rayleigh fading channels by utilizing the estimate ratio of the fourth moment to the fourth power of mean absolute value over the received data. Analysis demonstrates that the proposed method is superior to the previous method in the estimation accuracy, especially when code block length is small. Furthermore, simulation shows that nearly optimal bit error rate (BER) can be achieved even when the code block length is reduced to 400 bits (200 information bits, half code rate), while the previous method results in noticeable BER degradation","PeriodicalId":299513,"journal":{"name":"2006 IEEE Information Theory Workshop - ITW '06 Chengdu","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128107646","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}