{"title":"Complex-valued signal processing — essential models, tools and statistics","authors":"E. Ollila, V. Koivunen, H. Poor","doi":"10.1109/ITA.2011.5743596","DOIUrl":"https://doi.org/10.1109/ITA.2011.5743596","url":null,"abstract":"Complex-valued signals arise in many diverse fields such as communications, radar, biomedical sciences, physical sciences, and related fields. This paper briefly reviews some important tools, statistics, models and estimators that are useful for handling complex-valued random signals. Over the past four decades, circularity (i.e. invariance of the distribution under multiplication by a unit complex number) or second-order circularity (i.e. uncorrelatedness of the random vector with its complex conjugate) has been a common implicit assumption. Hence in this paper a special emphasis is put on this circularity property, as optimal signal processing methods for circular and non-circular signals are often different and choosing the right type of processing can provide significant performance gains. Topics reviewed in this paper include different types of circularity measures and detectors of circularity, complex elliptical symmetry of random variables, Crame´r-Rao lower bounds on the estimation of complex-valued parameters, optimization of a real-valued cost function with respect to complex-valued parameters using CR-calculus, and complex-valued independent component analysis.","PeriodicalId":326414,"journal":{"name":"2011 Information Theory and Applications Workshop","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126039654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cyclic and quasi-cyclic LDPC codes: New developments","authors":"Qin Huang, Qiuju Diao, Shu Lin, K. Abdel-Ghaffar","doi":"10.1109/ITA.2011.5743581","DOIUrl":"https://doi.org/10.1109/ITA.2011.5743581","url":null,"abstract":"This paper presents a technique to decompose a cyclic code given by a parity-check matrix in circulant form into descendant cyclic and quasi-cyclic codes of various length and rates. Based on this technique, cyclic finite geometry (FG) LDPC codes are decomposed into a large class of cyclic FG-LDPC codes and a large class of quasi-cyclic FG-LDPC codes.","PeriodicalId":326414,"journal":{"name":"2011 Information Theory and Applications Workshop","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123761172","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Resource allocation for constrained backhaul in picocell networks","authors":"I. Marić, B. Bostjancic, A. Goldsmith","doi":"10.1109/ITA.2011.5743593","DOIUrl":"https://doi.org/10.1109/ITA.2011.5743593","url":null,"abstract":"Cellular network capacity and coverage can be improved by deployment of low power base stations referred to as picocells. Due to the associated deployment cost, a large number of picocells challenges the traditional approach to backhaul, where each cell has a dedicated backhaul link. This paper considers a more efficient approach, in which the backhaul is provided over a wireless channel shared among picocells. The considered backhaul network consists of multiple connector nodes (CNs) each providing backhaul to a group of picocells. A key problem in this setting is how to efficiently exploit and allocate this limited bandwidth resource among picocells. We consider joint scheduling and power allocation of backhaul transmissions based on limited bandwidth availability. We propose a backhaul scheduling approach based on traffic demands on picocells (i.e., the load of their mobile users), that maximizes the picocell utility. The approach applies to any underlying physical layer transmission scheme. We then investigate the proposed solution for an OFDM system. We first determine optimal power allocation under power and interference constraints for OFDM transmissions from multiple CNs. We then present an algorithm that performs joint scheduling and power allocation for OFDM transmissions in the backhaul channel.","PeriodicalId":326414,"journal":{"name":"2011 Information Theory and Applications Workshop","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115007630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An algorithm for cooperative data exchange with cost criterion","authors":"Damla Ozgul, A. Sprintson","doi":"10.1109/ITA.2011.5743607","DOIUrl":"https://doi.org/10.1109/ITA.2011.5743607","url":null,"abstract":"We consider the problem of minimizing the cost of cooperative data exchange between a group of wireless clients. In this problem, a group of clients needs to exchange a set of packets over a shared lossless broadcast channel. Each client initially holds a subset of packets and needs to obtain the packets held by other clients. At each round, one of the clients can broadcast its packets or a combination thereof over the channel. Each client is associated with a certain transmission cost that captures its ability to transmit packets. Such cost can depend on various factors, e.g., available battery life. In this paper, we present an efficient randomized algorithm that ensures that all clients receive all packets and minimizes the total transmission cost. We prove the optimality of the algorithm and perform simulation studies to estimate the advantage achievable by using the network coding technique.","PeriodicalId":326414,"journal":{"name":"2011 Information Theory and Applications Workshop","volume":"469 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123055353","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Venkateswaran, Sumit Singh, Upamanyu Madhow, R. Mudumbai
{"title":"Distributed synchronization and medium access in wireless mesh networks","authors":"S. Venkateswaran, Sumit Singh, Upamanyu Madhow, R. Mudumbai","doi":"10.1109/ITA.2011.5743592","DOIUrl":"https://doi.org/10.1109/ITA.2011.5743592","url":null,"abstract":"Implicit local coordination of nodes in a wireless network using mechanisms such as Carrier Sense Multiple Access (CSMA) is conceptually attractive and relatively easy to implement, but often leads to performance that is far inferior to what is possible using explicit global coordination strategies such as Time Division Multiplexing (TDM). In this paper, we give two examples showing that appropriately designed implicit coordination strategies that employ learning and memory can provide performance competitive with that obtained using explicit strategies, while requiring minimal overhead. The first example is an algorithm for distributed timing synchronization maintenance using the timing information already present in ongoing communication in the network. The second example is a distributed medium access control protocol that achieves performance close to time division multiplexing (TDM) without requiring explicit resource allocation: nodes lock into communication patterns that have been found to work, with enough randomization to prevent locking into poor schedules. While the general philosophy of exploiting learning and memory in the design of network protocols is of broad applicability, our numerical results emphasize 60 GHz networks with highly directional links: effective coordination is particularly important for such networks, in view of the “deafness” caused by directionality.","PeriodicalId":326414,"journal":{"name":"2011 Information Theory and Applications Workshop","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123345025","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Randomness and dependencies extraction via polarization","authors":"E. Abbe","doi":"10.1109/ITA.2011.5743556","DOIUrl":"https://doi.org/10.1109/ITA.2011.5743556","url":null,"abstract":"The basic polarization phenomenon for i.i.d. sources is extended to a framework allowing dependencies within and between multiple sources. In particular, it is shown that taking the polar transform of a random matrix with i.i.d. columns of arbitrary (correlated) distribution allows to extract the randomness and dependencies. This result is the used to develop polar coding schemes (having low complexity) for: (1) distributed data compression, i.e., Slepian-Wolf coding (without decomposing the problem into single-user problems), (2) compression of sources with memory, (3) compression of sources on finite fields, extending the polarization phenomenon for alphabets of prime cardinality to powers of primes.","PeriodicalId":326414,"journal":{"name":"2011 Information Theory and Applications Workshop","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122823712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Learning and sharing in a changing world: Non-Bayesian restless bandit with multiple players","authors":"Haoyang Liu, Keqin Liu, Qing Zhao","doi":"10.1109/ITA.2011.5743588","DOIUrl":"https://doi.org/10.1109/ITA.2011.5743588","url":null,"abstract":"We consider decentralized restless multi-armed bandit problems with unknown dynamics and multiple players. The reward state of each arm transits according to an unknown Markovian rule when it is played and evolves according to an arbitrary unknown random process when it is passive. Players activating the same arm at the same time collide and suffer from reward loss. The objective is to maximize the long-term reward by designing a decentralized arm selection policy to address unknown reward models and collisions among players. A decentralized policy is constructed that achieves a regret with logarithmic order. The result finds applications in communication networks, financial investment, and industrial engineering.","PeriodicalId":326414,"journal":{"name":"2011 Information Theory and Applications Workshop","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124129186","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
I. Bocharova, F. Hug, R. Johannesson, B. Kudryashov
{"title":"On the exact bit error probability for Viterbi decoding of convolutional codes","authors":"I. Bocharova, F. Hug, R. Johannesson, B. Kudryashov","doi":"10.1109/ITA.2011.5743585","DOIUrl":"https://doi.org/10.1109/ITA.2011.5743585","url":null,"abstract":"Forty years ago, Viterbi published upper bounds on both the first error event (burst error) and bit error probabilities for Viterbi decoding of convolutional codes. These bounds were derived using a signal flow chart technique for convolutional encoders. In 1995, Best et al. published a formula for the exact bit error probability for Viterbi decoding of the rate R = 1/2, memory m = 1 convolutional encoder with generator matrix G(D) = (1 1 + D) when used to communicate over the binary symmetric channel. Their method was later extended to the rate R = 1/2, memory m = 2 generator matrix G(D) = (1+D2 1 + D + D2) by Lentmaier et al. In this paper, we shall use a different approach to derive the exact bit error probability. We derive and solve a general matrix recurrent equation connecting the average information weights at the current and previous steps of the Viterbi decoding. A closed form expression for the exact bit error probability is given. Our general solution yields the expressions for the exact bit error probability obtained by Best et al. (m = 1) and Lentmaier et al. (m = 2) as special cases.","PeriodicalId":326414,"journal":{"name":"2011 Information Theory and Applications Workshop","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126501081","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Extending the power of backpressure to correlated traffic","authors":"Jeongho Jeon, A. Ephremides","doi":"10.1109/ITA.2011.5743569","DOIUrl":"https://doi.org/10.1109/ITA.2011.5743569","url":null,"abstract":"We study the impact of time-correlated arrivals on the performance of backpressure policy for stochastic network control. The arrival process considered in this work is fairly general in the sense that it may exhibit short/long-range dependence depending on the asymptotic shape of the autocorrelation function. In this paper, we show that that the backpressure policy stabilizes the network whenever the arrival rate vector is inside the stability region even though the arrivals have finite-length memory or infinite-length memory with monotonically decreasing autocorrelation functions. Apart from the stability, the effect of correlations appears in the upper bound on average network delay.","PeriodicalId":326414,"journal":{"name":"2011 Information Theory and Applications Workshop","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131106996","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
L. A. Lastras-Montaño, P. Meaney, E. Stephens, B. Trager, J. O'Connor, Luiz C. Alves
{"title":"A new class of array codes for memory storage","authors":"L. A. Lastras-Montaño, P. Meaney, E. Stephens, B. Trager, J. O'Connor, Luiz C. Alves","doi":"10.1109/ITA.2011.5743586","DOIUrl":"https://doi.org/10.1109/ITA.2011.5743586","url":null,"abstract":"In this article we describe a class of error control codes called “diff-MDS” codes that are custom designed for highly resilient computer memory storage. The error scenarios of concern range from simple single bit errors, to memory chip failures and catastrophic memory module failures. Our approach to building codes for this setting relies on the concept of expurgating a parity code that is easy to decode for memory module failures so that a few additional small errors can be handled as well, thus preserving most of the decoding complexity advantages of the original code while extending its original intent. The manner in which we expurgate is carefully crafted so that the strength of the resulting code is comparable to that of a Reed-Solomon code when used for this particular setting. An instance of this class of algorithms has been incorporated in IBM's zEnterprise mainframe offering, setting a new industry standard for memory resiliency.","PeriodicalId":326414,"journal":{"name":"2011 Information Theory and Applications Workshop","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129925140","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}