Hans-Andrea Loeliger, Lukas Bolliger, G. Wilckens, J. Biveroni
{"title":"Analog-to-digital conversion using unstable filters","authors":"Hans-Andrea Loeliger, Lukas Bolliger, G. Wilckens, J. Biveroni","doi":"10.1109/ITA.2011.5743620","DOIUrl":"https://doi.org/10.1109/ITA.2011.5743620","url":null,"abstract":"A new approach to analog-to-digital conversion is proposed which combines unstable analog filters with digital Kalman filtering. The proposed approach subsumes sigma-delta converters, on which it offers a new perspective.","PeriodicalId":326414,"journal":{"name":"2011 Information Theory and Applications Workshop","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115392661","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A tractable framework for coverage and outage in heterogeneous cellular networks","authors":"Harpreet S. Dhillon, R. Ganti, J. Andrews","doi":"10.1109/ITA.2011.5743604","DOIUrl":"https://doi.org/10.1109/ITA.2011.5743604","url":null,"abstract":"We develop a tractable, flexible, and accurate model for downlink heterogeneous cellular networks. It consists of K tiers of randomly-located base stations (BSs), where each tier may differ in terms of the average transmit power, the supported data rate and the BS density. This allows elements spanning traditional, micro, pico, and femtocell BSs to be simultaneously considered. Assuming a mobile user connects to its strongest BS, we derive its Signal-to-Interference-Ratio (SIR) distribution and use that to find the coverage (equivalently outage) probability over the entire network. We verify the accuracy of these analytical results through empirical comparisons with an actual 4G macro-cell network.","PeriodicalId":326414,"journal":{"name":"2011 Information Theory and Applications Workshop","volume":"123 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122618362","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Deterministic annealing design and analysis of the Noisy MIMO Interference Channel","authors":"Francesco Negro, I. Ghauri, D. Slock","doi":"10.1109/ITA.2011.5743630","DOIUrl":"https://doi.org/10.1109/ITA.2011.5743630","url":null,"abstract":"We consider the Noisy MIMO Interference Channel (IFC) with linear transmitters and receivers and full CSI. The maximization of the Weighted Sum Rate (WSR) or transceiver design for Interference Alignment (IA) lead to cost functions with many local optima. Deterministic annealing is an approach that allows to track the variation of the known solution of one version of the problem into the unknown solution of the desired version by a controlled variation of a parameter called temperature. When the temperature parameter is chosen as inverse SNR (or noise power), the transceiver design for maximum WSR is known at low SNR and can be tracked to any desired SNR, yielding an elegant technique to find the global optimum. The solution includes filter design for the progressive switching on of streams as the SNR increases. For IA on the other hand, IA feasibility is unchanged when the MIMO crosslink channel matrices have a reduced rank equal to the maximum of the number of streams passing through them in forward and dual IFC (this would correspond to LOS channels in the case of single streams). The rank reduction simplifies IA design and feasibility analysis, and allows in particular a counting of the number of IA solutions. By choosing now the temperature parameter to be a scale factor for the remaining channel singular values, the solution for reduced rank channels can be evolved into that for arbitrary channels.","PeriodicalId":326414,"journal":{"name":"2011 Information Theory and Applications Workshop","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122193796","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Bayesian quickest change detection under energy constraints","authors":"T. Banerjee, V. Veeravalli","doi":"10.1109/ITA.2011.5743616","DOIUrl":"https://doi.org/10.1109/ITA.2011.5743616","url":null,"abstract":"In the classical version of the Bayesian quickest change detection problem proposed by Shiryaev in the nineteen sixties, there is a sequence of observations whose distribution changes at a random time, and the goal is to minimize the average detection delay, subject to a constraint on the probability of false alarm. We consider this quickest change detection problem with an additional constraint on the average energy consumed in sensing the observations. The optimal algorithm for this problem has a three threshold structure, in contrast to the single threshold Shiryaev test that is optimal for the classical Bayesian quickest change detection problem. We provide an asymptotic analysis of the three threshold policy for the case where the probability of false alarm is small, the average energy consumption is large, and the change event is rare. The analysis yields approximations for the average detection delay, probability of false alarm and average energy consumption, which can be used to optimize the thresholds to achieve desired operating points. The asymptotic analysis also reveals that the three threshold policy can be approximated by a simpler two threshold policy. The advantage of the two threshold policy is that the thresholds can be set directly using constraints on the probability of false alarm and average energy consumption. We provide extensive simulation results that corroborate our analytical findings.","PeriodicalId":326414,"journal":{"name":"2011 Information Theory and Applications Workshop","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130647421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Interference mitigation via joint detection in a fading environment","authors":"Jungwon Lee, D. Toumpakaris, Wei Yu","doi":"10.1109/ITA.2011.5743587","DOIUrl":"https://doi.org/10.1109/ITA.2011.5743587","url":null,"abstract":"This paper considers the detection problem for fading channels in the presence of interference when both the transmitter of interest and the interferers employ practical modulation schemes. It is shown that, for Rayleigh fading, it is possible to obtain symbol error rates that have the same dependence on the received signal-to-noise ratio as when transmission is interference-free. This is achieved using detectors that employ knowledge on the channel and on the modulation schemes of the interference. Therefore, the use of interference-aware detectors can increase the overall capacity and improve the reliability of wireless systems, justifying the use of additional knowledge on the interferers that is required for implementation as compared to detectors that do not differentiate interference from noise.","PeriodicalId":326414,"journal":{"name":"2011 Information Theory and Applications Workshop","volume":"178 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123344166","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Interference neutralization for separated multiuser uplink-downlink with distributed relays","authors":"Jinyuan Chen, A. Singh, P. Elia, R. Knopp","doi":"10.1109/ITA.2011.5743629","DOIUrl":"https://doi.org/10.1109/ITA.2011.5743629","url":null,"abstract":"We consider the role of independent single antenna relays in allowing for interference cancellation and for multiplexing of uplink and downlink communications, in the presence of multiple interfering users. For a specific practical scenario of interest, we construct interference neutralization schemes that are simple, distributed and which encode over both space and time, to achieve performance improvements over basic TDMA schemes. These improvements are quantified in terms of the achievable degrees of freedom (DOF), where asymptotic analysis reveals that in specific cases, these simple techniques achieve optimal DOF performance.","PeriodicalId":326414,"journal":{"name":"2011 Information Theory and Applications Workshop","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114705281","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Constrained Wyner-Ziv source coding","authors":"A. Lapidoth, Andreas Malär, M. Wigger","doi":"10.1109/ITA.2011.5743621","DOIUrl":"https://doi.org/10.1109/ITA.2011.5743621","url":null,"abstract":"We generalize the Wyner-Ziv source coding problem with side-information at the decoder to the case where the encoder is required to be able to compute the decoder's reconstruction sequence with some fidelity. This requirement limits the extent to which the reconstruction sequence can depend on the side-information, which is not available to the encoder. For finite-alphabet memoryless sources and single-letter distortion measures we compute the minimal description rate as a function of the joint law of the source and side-information and of the allowed distortions at the encoder and decoder. We also treat memoryless Gaussian sources with mean squared-error distortion measures.","PeriodicalId":326414,"journal":{"name":"2011 Information Theory and Applications Workshop","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117315225","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
N. Kalantarova, Kyeongyeon Kim, S. Kozat, A. Singer
{"title":"Nonlinear turbo equalization using context trees","authors":"N. Kalantarova, Kyeongyeon Kim, S. Kozat, A. Singer","doi":"10.1109/ITA.2011.5743608","DOIUrl":"https://doi.org/10.1109/ITA.2011.5743608","url":null,"abstract":"In this paper, we study adaptive nonlinear turbo equalization to model the nonlinear dependency of a linear minimum mean square error (MMSE) equalizer on soft information from the decoder. To accomplish this, we introduce piecewise linear models based on context trees that can adaptively choose both the partition regions as well as the equalizer coefficients in each region independently, with the computational complexity of a single adaptive linear equalizer. This approach is guaranteed to asymptotically achieve the performance of the best piecewise linear equalizer that can choose both its regions as well as its filter parameters based on observing the whole data sequence in advance.","PeriodicalId":326414,"journal":{"name":"2011 Information Theory and Applications Workshop","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130966863","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Saddlepoint approximation of random-coding bounds","authors":"Alfonso Martinez, A. G. Fàbregas","doi":"10.1109/ITA.2011.5743590","DOIUrl":"https://doi.org/10.1109/ITA.2011.5743590","url":null,"abstract":"This paper considers random-coding bounds to the decoding error probability with maximum-metric mismatched decoders. Their error exponents are determined and the saddle-point approximation to the corresponding probability is derived. This approximation is accurate and allows for simple numerical evaluation, as verified for several channels of interest.","PeriodicalId":326414,"journal":{"name":"2011 Information Theory and Applications Workshop","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125884928","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A transform approach for analyzing and constructing quasi-cyclic low-density parity-check codes","authors":"Qiuju Diao, Qin Huang, Shu Lin, K. Abdel-Ghaffar","doi":"10.1109/ITA.2011.5743557","DOIUrl":"https://doi.org/10.1109/ITA.2011.5743557","url":null,"abstract":"An approach for studying quasi-cyclic codes based on matrix transformations via Fourier transforms and row and column permutations is presented. These transformations put a parity-check matrix in the form of an array of circulant matrices into a diagonal array of matrices of the same size over an extension field. The approach is used to characterize certain structural properties of low-density parity-check (LDPC) codes such as the girths of their Tanner graphs. Many constructions of quasi-cyclic LDPC codes can be unified under the proposed approach.","PeriodicalId":326414,"journal":{"name":"2011 Information Theory and Applications Workshop","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128322080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}