{"title":"On quadratic m-sequences","authors":"A. Chan, R. Games, J. Rushanan","doi":"10.1109/ISIT.1994.394654","DOIUrl":"https://doi.org/10.1109/ISIT.1994.394654","url":null,"abstract":"Maximal sequences generated by linear feedback shift registers (FSRs), known as m-sequences, have been well-studied in the literature. These sequences have long periods, good statistical properties and two-valued autocorrelation functions. However, m-sequences are extremely vulnerable to a known plaintext attack. In order to overcome these weaknesses, nonlinearities have been introduced. We study nonlinear feedback functions by investigating quadratic functions. The quadratic span of a periodic binary sequence is the length of the shortest quadratic FSR that generates the sequence. This paper considers the question as to whether the sequence obtained from a DeBruijn sequence by dropping the all-zero state can now have quadratic span n. Such sequences are the quadratic analog of the linear m-sequences and present an attractive extremal case to explore further the structure of nonlinear FSRs.<<ETX>>","PeriodicalId":331390,"journal":{"name":"Proceedings of 1994 IEEE International Symposium on Information Theory","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116308857","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An asymptotic result for large capacity circuit-switched networks","authors":"Ezhan Karasan, J. Hui","doi":"10.1109/ISIT.1994.395023","DOIUrl":"https://doi.org/10.1109/ISIT.1994.395023","url":null,"abstract":"We investigate the blocking probabilities in circuit-switched networks. It is known that when the capacity of links and the offered traffic are increased together, asymptotically the blocking probabilities are given as if the links are blocked independently. We show that in the limit, the probability that the capacity constraint is violated on any link is given by the blocking probability of the most congested link.<<ETX>>","PeriodicalId":331390,"journal":{"name":"Proceedings of 1994 IEEE International Symposium on Information Theory","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114746065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Decoding of a Cartesian product set with a constraint on an additive cost; fixed-rate entropy-coded vector quantization","authors":"A. Khandani","doi":"10.1109/ISIT.1994.394701","DOIUrl":"https://doi.org/10.1109/ISIT.1994.394701","url":null,"abstract":"The authors consider a discrete set of points A composed of K=|A| elements. A non-negative cost c(a) is associated with each element a/spl isin/A. The n-fold Cartesian product of A is dented as {A}/sup n/. The cost of an n-fold element a=(a/sub 0/, ..., a/sub n-1/)/spl isin/{A}/sup n/ is equal to: c(a)=/spl Sigma//sub i/ c(a/sub i/). The authors select a subset of the n-fold elements, S/sub n//spl isin/{A}/sup n/, with a cost less than or equal to a given value c/sub max/. They refer to A as the constituent subset. They consider another set of n-tuples X/sub n/ denoted as the input set. A non-negative distance is defined between each x=(x/sub 0/, ..., x/sub n-1/)/spl isin/X/sub n/, and each s=(s/sub 0/, ..., s/sub n-1/)/spl isin/S/sub n/. The distance between x/sub i/ and s/sub i/ is denoted as d(x/sub i/,s/sub i/). The distance between x and s is equal to: d(x,s)=/spl Sigma//sub i/d(x/sub i/, s/sub i/). Decoding of an element x/spl isin/X/sub n/ is to find the element s/spl isin/S/sub n/ which has the minimum distance to x. A major application of this decoding problem is in fixed-rate entropy-coded vector quantization where A is the set of reconstruction vectors of a vector quantizer and cost is equivalent to self-information.<<ETX>>","PeriodicalId":331390,"journal":{"name":"Proceedings of 1994 IEEE International Symposium on Information Theory","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114775885","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On the formal duals of Kerdock codes","authors":"C. Carlet","doi":"10.1109/ISIT.1994.395043","DOIUrl":"https://doi.org/10.1109/ISIT.1994.395043","url":null,"abstract":"Recently a new notion was introduced on binary codes, called Z/sub 4/-linearity, which explains why Kerdock codes and Delsarte-Goethals codes admit formal duals in spite of their nonlinearity. The \"Z/sub 4/-duals\" of these codes are new nonlinear codes which admit simpler decoding algorithms than the previously known formal duals. But their characterizations by means of algebraic equations are more complex. We give simpler algebraic characterizations of those codes. We next prove that the relationship between any Z/sub 4/-linear code and its Z/sub 4/-dual is stronger than the standard formal duality and deduce the weight enumerators of related generalized codes.<<ETX>>","PeriodicalId":331390,"journal":{"name":"Proceedings of 1994 IEEE International Symposium on Information Theory","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114874054","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Tiling with polyominoes under modular arithmetic and distance criteria","authors":"R. Palazzo, C. de Almeida","doi":"10.1109/ISIT.1994.394880","DOIUrl":"https://doi.org/10.1109/ISIT.1994.394880","url":null,"abstract":"We present a two steps procedure for tiling with polyominoes a given finite region consisting of cells in a regular lattice in /spl Rscr//sup 2/ under modular arithmetic and distance criteria. As a consequence, a very effective procedure to combat cluster of errors by use of single or multiple error-correcting codes is proposed.<<ETX>>","PeriodicalId":331390,"journal":{"name":"Proceedings of 1994 IEEE International Symposium on Information Theory","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124491265","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On the classification of the tight spherical designs","authors":"P. Boyvalenkov","doi":"10.1109/ISIT.1994.394882","DOIUrl":"https://doi.org/10.1109/ISIT.1994.394882","url":null,"abstract":"We find the distance distributions (of a spherical code) with respect to every point for the tight spherical 4-, 5-, and 7-designs. As an immediate corollary we prove the nonexistence of an infinite class of tight spherical 4-designs. This implies the nonexistence of a corresponding infinite class of tight spherical 5-designs.<<ETX>>","PeriodicalId":331390,"journal":{"name":"Proceedings of 1994 IEEE International Symposium on Information Theory","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124127775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A posteriori probabilities and performance evaluation of trellis codes","authors":"Hans-Andrea Loeliger","doi":"10.1109/ISIT.1994.394683","DOIUrl":"https://doi.org/10.1109/ISIT.1994.394683","url":null,"abstract":"A new method for the performance evaluation of (Viterbi decoded) trellis codes is investigated. The method is based on the fact that the a posteriori probability of individual decoded bits can be computed very efficiently. Unfortunately, the improvement of the new method over ordinary simulation is found to be only marginal, which reveals unexpectedly strong fluctuations of the reliability of individual decoded bits.<<ETX>>","PeriodicalId":331390,"journal":{"name":"Proceedings of 1994 IEEE International Symposium on Information Theory","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127714312","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Reduction of the numerical range of the state metrics in a Viterbi decoder","authors":"A.P. Hekstra","doi":"10.1109/ISIT.1994.394804","DOIUrl":"https://doi.org/10.1109/ISIT.1994.394804","url":null,"abstract":"Large state metric differences indicate a strong discrimination between the likelihood of survivor paths. A state metric is called \"large\" if the state metric of a node in the trellis exceeds the minimum state metric at the given depth in the trellis by more than some constant B that depends on the binary convolutional code. Theorem I formulates a stopping rule that deletes all nodes with a \"large\" metric, as for any path that runs through such a node and for any received sequence, a detour exists via the node that has minimal state metric such that the resulting path has a smaller metric than the original path. The proof use simultaneous application of tight bounds for maximum state metric differences for the forward and the time reversed convolutional code.<<ETX>>","PeriodicalId":331390,"journal":{"name":"Proceedings of 1994 IEEE International Symposium on Information Theory","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127794478","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"New bounds on convolutional code performance over fading channels","authors":"R.D. Cideciyan, E. Eleftherion","doi":"10.1109/ISIT.1994.395010","DOIUrl":"https://doi.org/10.1109/ISIT.1994.395010","url":null,"abstract":"New tight upper bounds on the performance or convolutional codes over Rayleigh and Rician fading channels are presented. These bounds can be expressed in terms of the generating function or the convolutional codes and are particularly tight for bit error rates lower than 10/sup -3/.<<ETX>>","PeriodicalId":331390,"journal":{"name":"Proceedings of 1994 IEEE International Symposium on Information Theory","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126424988","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An adaptive hybrid ARQ scheme based on exponentially weighted moving averages for slowly time-varying communication channels","authors":"A. T. Memişoğlu, S. Bilgen","doi":"10.1109/ISIT.1994.394642","DOIUrl":"https://doi.org/10.1109/ISIT.1994.394642","url":null,"abstract":"An adaptive hybrid ARQ scheme for slowly time-varying channels that aims to maximize the average throughput under a given reliability constraint is presented. Punctured convolutional codes and the Viterbi algorithm with the Yamamoto-Itoh retransmission protocol are employed for encoding and decoding, respectively. A procedure based on exponentially weighted moving averages is developed to detect channel state changes.<<ETX>>","PeriodicalId":331390,"journal":{"name":"Proceedings of 1994 IEEE International Symposium on Information Theory","volume":"PP 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126429496","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}