Proceedings of 1994 IEEE International Symposium on Information Theory最新文献

筛选
英文 中文
More efficient bounded-distance decoding of the Golay code and the Leech lattice 更有效的Golay码和Leech格的有界距离解码
Proceedings of 1994 IEEE International Symposium on Information Theory Pub Date : 1994-06-27 DOI: 10.1109/ISIT.1994.394620
F. Sun, H. van Tilborg
{"title":"More efficient bounded-distance decoding of the Golay code and the Leech lattice","authors":"F. Sun, H. van Tilborg","doi":"10.1109/ISIT.1994.394620","DOIUrl":"https://doi.org/10.1109/ISIT.1994.394620","url":null,"abstract":"New multilevel constructions of the Leech lattice and the Golay code are presented. They are derived from Turyn's constructions and the 'holy construction' with the octacode as the glue code. Further, we show that the 'holy construction' of the Leech lattice with the octacode as the glue code is essentially different from the permuted Turyn construction, although both constructions rely on the octacode. Based on these structures, more efficient bounded-distance decoding algorithms of the Golay code and the Leech lattice are presented.<<ETX>>","PeriodicalId":331390,"journal":{"name":"Proceedings of 1994 IEEE International Symposium on Information Theory","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131042715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Identification via wiretap channels 通过窃听渠道进行身份识别
Proceedings of 1994 IEEE International Symposium on Information Theory Pub Date : 1994-06-27 DOI: 10.1109/ISIT.1994.394666
R. Ahlswede, Zhen Zhang
{"title":"Identification via wiretap channels","authors":"R. Ahlswede, Zhen Zhang","doi":"10.1109/ISIT.1994.394666","DOIUrl":"https://doi.org/10.1109/ISIT.1994.394666","url":null,"abstract":"The wiretap channel can be viewed as a probabilistic model for cryptography. The channel has two outputs. One is for the legitimate receiver and the other is for the wiretapper. The goal of communication is to send messages to the legitimate receiver while the wiretapper must be kept ignorant. A wiretap channel is a quintuple (X,W(y|x),V(x|x),Y,Z), where X is the input alphabet, Y is the output alphabet for the legitimate receiver, Z is the output alphabet for the wiretapper, W(y|x) is the channel transition matrix, whose output is available to the legitimate receiver, and V(x|x) is the channel transition matrix, whose output is available to the wiretapper. The channel is assumed to be memoryless. In the classical transmission problem, an (n,M,/spl epsi/)-code for the wiretap channel is defined as a system {(c/sub i/,D/sub i/)|1/spl les/i/spl les/M}, where, for all i,c/sub i//spl isin/X/sup n/ are the codewords and D/sub i//spl sub/y/sup n/ are the disjoint decoding sets. It is required that for any i /spl lambda//sub i/=/sup def/W/sup n/(D/sub i//sup c/|c/sub i/)/spl les//spl epsi/, and if X/sup n/ has uniform distribution over {c/sub i/|/spl les/i/spl les/M}, then 1/nI(X/sup n/;Z/sup n/)/spl les//spl epsi/. The secret capacity of the wiretap channel is defined as the maximum rate of any code which satisfies these conditions. Formally, let M(n,/spl epsi/)=max{M:/spl exist/a(n,M,/spl epsi/) code}, then the secret capacity of the wiretap channel is defined as C/sub s/=max{R:/spl forall//spl epsi/>0,/spl exist/n such that M(n,C)/spl ges//sup nR/. The secret capacity of the wiretap channel can then be determined. The problem of identification via this channel is then formulated.<<ETX>>","PeriodicalId":331390,"journal":{"name":"Proceedings of 1994 IEEE International Symposium on Information Theory","volume":"348 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133275925","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
On computer search for good quasi-cyclic codes 好的准循环码的计算机搜索
Proceedings of 1994 IEEE International Symposium on Information Theory Pub Date : 1994-06-27 DOI: 10.1109/ISIT.1994.394929
Zhi Chen
{"title":"On computer search for good quasi-cyclic codes","authors":"Zhi Chen","doi":"10.1109/ISIT.1994.394929","DOIUrl":"https://doi.org/10.1109/ISIT.1994.394929","url":null,"abstract":"As a generalization of cyclic codes, quasi-cyclic (QC) codes contain many good linear codes. A lot of work has been done to find good QC codes with help of computers, and many good QC codes have been found. It should be noted that an exhaustive search is intractable with the increase in the code dimensions. In this paper, a local search method is used to find good binary QC codes.<<ETX>>","PeriodicalId":331390,"journal":{"name":"Proceedings of 1994 IEEE International Symposium on Information Theory","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132284554","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
The state complexity of trellis diagrams for a class of generalized concatenated codes 一类广义连接码格图的状态复杂度
Proceedings of 1994 IEEE International Symposium on Information Theory Pub Date : 1994-06-27 DOI: 10.1109/ISIT.1994.395086
T. Fujiwara, T. Kasami, R. Morelos-Zaragoza, Shu Lin
{"title":"The state complexity of trellis diagrams for a class of generalized concatenated codes","authors":"T. Fujiwara, T. Kasami, R. Morelos-Zaragoza, Shu Lin","doi":"10.1109/ISIT.1994.395086","DOIUrl":"https://doi.org/10.1109/ISIT.1994.395086","url":null,"abstract":"We discuss the state complexity of trellis diagrams for a class of generalized concatenated codes. The maximum number of states in the 64-section minimal trellis diagram for all the extended BCH codes of length 64 which are permuted by using the bases shown previously by Kasami et al. (1993), are the same as those obtained by Vardy and Be'ery (1993), where bit orderings were found by using DS structure and computer search. We construct several decomposable codes for which a multistage decoding up to the minimum distance can be employed. The dimensions of constructed codes are 47, 43 and 24 for length 63, and 52 and 32 for length 72. We also construct codes of length 64 as shortened codes of the codes with length 72.<<ETX>>","PeriodicalId":331390,"journal":{"name":"Proceedings of 1994 IEEE International Symposium on Information Theory","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128894724","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Design and analysis of a DPCM system with a switched quantizer 带开关量化器的DPCM系统的设计与分析
Proceedings of 1994 IEEE International Symposium on Information Theory Pub Date : 1994-06-27 DOI: 10.1109/ISIT.1994.395075
Shay-Jan Huang, L. Davisson
{"title":"Design and analysis of a DPCM system with a switched quantizer","authors":"Shay-Jan Huang, L. Davisson","doi":"10.1109/ISIT.1994.395075","DOIUrl":"https://doi.org/10.1109/ISIT.1994.395075","url":null,"abstract":"Theoretical analysis of matched differential pulse code modulation (DPCM) of a first-order Gauss-Markov process has been done for a DPCM system with a uniform quantizer, an entropy constrained optimal uniform-threshold quantizer, and an adaptive step-size uniform quantizer. We design and analyze a DPCM system with a Lloyd-Max quantizer and a DPCM system with a switched quantizer (composed of a bank of Lloyd-Max quantizers and a switching rule; a a quantizer is chosen from this quantizer bank according to the switching rule) for a first-order Gauss-Markov process.<<ETX>>","PeriodicalId":331390,"journal":{"name":"Proceedings of 1994 IEEE International Symposium on Information Theory","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133721690","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Overlay coding technique for supporting high data rates for DS-CDMA systems 支持DS-CDMA系统高数据速率的覆盖编码技术
Proceedings of 1994 IEEE International Symposium on Information Theory Pub Date : 1994-06-27 DOI: 10.1109/ISIT.1994.394743
E. Zehavi
{"title":"Overlay coding technique for supporting high data rates for DS-CDMA systems","authors":"E. Zehavi","doi":"10.1109/ISIT.1994.394743","DOIUrl":"https://doi.org/10.1109/ISIT.1994.394743","url":null,"abstract":"Here we show an IS-95 based CDMA system architecture for personal communication services (PCS) that supports various data rates. This is achieved by using a technique called overlay coding where the code overlays symbols and generates a composite modulation symbol.<<ETX>>","PeriodicalId":331390,"journal":{"name":"Proceedings of 1994 IEEE International Symposium on Information Theory","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115001539","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Exponentiation-based key generation using noncommutative groups 使用非交换群生成基于幂次的密钥
Proceedings of 1994 IEEE International Symposium on Information Theory Pub Date : 1994-06-27 DOI: 10.1109/ISIT.1994.395112
V. Sidelnikov
{"title":"Exponentiation-based key generation using noncommutative groups","authors":"V. Sidelnikov","doi":"10.1109/ISIT.1994.395112","DOIUrl":"https://doi.org/10.1109/ISIT.1994.395112","url":null,"abstract":"Diffie and Hellman (1976) proposed to use exponentiation module a prime for constructing the key generation system. A security of this system is based on the supposed hardness of the following problem (A): given /spl eta//sup x/ and /spl eta//sup y/ compute /spl eta//sup xy/. Sidelnikov, Cherepniov, and Yaschenko (1993) considered a system based on the noncommutative group G. We assume that G is a certain subgroup of the group GL/sub n/(F/sub p/) of n/spl times/n matrices over the finite field F/sub p/. We consider the representation of the group GL/sub n/(F/sub p/) with the aid of exponentiation in a subsidiary cyclic group U of order p and investigate of the security of the resulting key generation systems. The group of F/sub q/-rational point on elliptic curve and the subgroup U= of the multiplicative group of the subsidiary finite field F/sub q/, where p|q-1, /spl eta//spl isin/F/sub q/, /spl eta//sup p/=1, /spl eta//spl ne/1, are the examples of the group U. We consider the group /spl Uscr/ of affine transformations of the field F/sub p/ which is isomorphic to a certain subgroup of GL/sub 2/(F/sub p/). In this case the security of the key generation system under certain conjecture (which simplifies the task of adversary) is based on the hardness of the following problem (B): given /spl eta//sup x/,/spl eta//sup y/,/spl beta//sup z/ compute /spl eta//sup xy/z/. It seems impossible reduce this problem to several Diffie-Hellman problems (A). The system being considered uses a universal key, which does not exist in the Diffie-Hellman system and is presumably a new element for key generation systems. The knowledge of k is supposed to be a necessary condition to compute the private key.<<ETX>>","PeriodicalId":331390,"journal":{"name":"Proceedings of 1994 IEEE International Symposium on Information Theory","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116023878","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
On the trellis structure of block codes 论分组码的格子结构
Proceedings of 1994 IEEE International Symposium on Information Theory Pub Date : 1994-06-27 DOI: 10.1109/ISIT.1994.394681
F. Kschischang, V. Sorokine
{"title":"On the trellis structure of block codes","authors":"F. Kschischang, V. Sorokine","doi":"10.1109/ISIT.1994.394681","DOIUrl":"https://doi.org/10.1109/ISIT.1994.394681","url":null,"abstract":"Two main results will be presented: 1. The problem of minimizing the number of states in the trellis for a general (nonlinear) code at a given time index is NP-complete, and thus apparently computationally infeasible for large codes. 2. Minimal linear block code trellises correspond to configurations of non-attacking rooks on a triangular chess board. This correspondence can be used to enumerate the minimal trellises, and also to obtain insight into various bounds on the size of the trellises.<<ETX>>","PeriodicalId":331390,"journal":{"name":"Proceedings of 1994 IEEE International Symposium on Information Theory","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116375756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 191
Stationary random functions and periodic clock changes 平稳随机函数和周期性时钟变化
Proceedings of 1994 IEEE International Symposium on Information Theory Pub Date : 1994-06-27 DOI: 10.1109/ISIT.1994.394717
B. Lacaze, N. Aakvaag
{"title":"Stationary random functions and periodic clock changes","authors":"B. Lacaze, N. Aakvaag","doi":"10.1109/ISIT.1994.394717","DOIUrl":"https://doi.org/10.1109/ISIT.1994.394717","url":null,"abstract":"Various physical phenomena are characterised by spectral line shifts or their multiplication. This is the case, for instance, with the Doppler effect and the Zeeman and Stark effects. Periodic clock changes acting on stationary random functions can serve as a probabilistic model for bilateral and symmetric frequency shifts.<<ETX>>","PeriodicalId":331390,"journal":{"name":"Proceedings of 1994 IEEE International Symposium on Information Theory","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123609244","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A reliable signal detection method for the combination of PRML method and ternary recording code 一种可靠的PRML方法与三进制记录码相结合的信号检测方法
Proceedings of 1994 IEEE International Symposium on Information Theory Pub Date : 1994-06-27 DOI: 10.1109/ISIT.1994.394754
S. Tazaki, T. Takashima, S. Tsuzuki, Y. Yamada
{"title":"A reliable signal detection method for the combination of PRML method and ternary recording code","authors":"S. Tazaki, T. Takashima, S. Tsuzuki, Y. Yamada","doi":"10.1109/ISIT.1994.394754","DOIUrl":"https://doi.org/10.1109/ISIT.1994.394754","url":null,"abstract":"We focus our attention on a method for finding the merging state after the ACS (add compare select) operation in a Viterbi algorithm combined with the PR method and the ternary recording system. Firstly, the path shape matrix method is introduced with algebraic lucidity. Secondly, we propose a \"rosary\" style method that is far much simpler than the path shape matrix method.<<ETX>>","PeriodicalId":331390,"journal":{"name":"Proceedings of 1994 IEEE International Symposium on Information Theory","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123648260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信