{"title":"A direct geometrical method for bounding the error exponent for families of trellis channel codes","authors":"V. Šenk, D. Lazic, D. Drajic","doi":"10.1109/ISIT.1994.394986","DOIUrl":"https://doi.org/10.1109/ISIT.1994.394986","url":null,"abstract":"Noting that a trellis code is a union of sub-block codes of different length, the error exponent of the families of trellis codes with known distance distribution of its sub-block codes is determined. The approach allows the analysis of the effect of memory length and of parallel transitions.<<ETX>>","PeriodicalId":331390,"journal":{"name":"Proceedings of 1994 IEEE International Symposium on Information Theory","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124998762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Conditional entropy-constrained vector quantization: high-rate theory and design algorithms","authors":"D. Garrido, W. Pearlman","doi":"10.1109/ISIT.1994.394979","DOIUrl":"https://doi.org/10.1109/ISIT.1994.394979","url":null,"abstract":"The performance of optimum vector quantizers subject to a conditional entropy constraint is studied in this work.<<ETX>>","PeriodicalId":331390,"journal":{"name":"Proceedings of 1994 IEEE International Symposium on Information Theory","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129691062","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A lower bound on the probability of erasure for an anti-jamming code when used on the binary OR-channel","authors":"G. Hedby","doi":"10.1109/ISIT.1994.395094","DOIUrl":"https://doi.org/10.1109/ISIT.1994.395094","url":null,"abstract":"An anti-jamming code consists of a set of codes obtained from the coset partitioning of a larger code. The code is used over a binary OR-channel subject to intentional interference. We derive a lower bound on the probability of erasing a codeword.<<ETX>>","PeriodicalId":331390,"journal":{"name":"Proceedings of 1994 IEEE International Symposium on Information Theory","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128642370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance evaluation method for trellis modulation code without uniformity","authors":"H. Ogiwara, Kazuo Oohira","doi":"10.1109/ISIT.1994.394682","DOIUrl":"https://doi.org/10.1109/ISIT.1994.394682","url":null,"abstract":"Zehavi and Wolf (Z-W) proposed an evaluation method for a trellis modulation code (see IEEE Trans. Inform. Theory, vol.IT-33, p.196, 1987). By the method, code performance is evaluated based on the error state transition diagram, of which structure is equal to that of the code. It is applied to a rate k/(k+1) code generated by a Massey type encoder. It is only applied to a code having certain symmetry called uniformity. Another definition of uniformity is proposed by Biglieri and McLane (1991) for the same problem. Here, we propose an extension of the methods. The restriction of uniformity is removed by modifying the labels of state transitions in the Z-W's error state diagram.<<ETX>>","PeriodicalId":331390,"journal":{"name":"Proceedings of 1994 IEEE International Symposium on Information Theory","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127340197","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Entropy splitting hypergraphs","authors":"G. Simonyi","doi":"10.1109/ISIT.1994.394705","DOIUrl":"https://doi.org/10.1109/ISIT.1994.394705","url":null,"abstract":"Hypergraph entropy is a sub-additive functional on hypergraphs. We characterize those uniform hypergraphs F for which the entropy of F and the entropy of its complement adds up exactly to the entropy of the complete uniform hypergraph. Hypergraph entropy is an information theoretic functional on a hypergraph with a probability distribution on its vertex set. It is a generalisation of graph entropy.<<ETX>>","PeriodicalId":331390,"journal":{"name":"Proceedings of 1994 IEEE International Symposium on Information Theory","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130074217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Reduced-state sequence estimation of digital sequence in the presence of intersymbol interference using state partitioning","authors":"R. Kamel, Y. Bar-Ness","doi":"10.1109/ISIT.1994.394820","DOIUrl":"https://doi.org/10.1109/ISIT.1994.394820","url":null,"abstract":"A reduced-state sequence estimator for linear dispersive channels is described. The technique is based on partitioning the set of all possible channel states in a way that defines a trellis with fewer states resulting in reduced complexity. The new technique results in a generalization of trellises that were previously obtained in Duel-Hallen and Heegard (IEEE Trans. on Communications, vol. COM 37, p.428-36). The Viterbi algorithm (VA) is used to search for the best path through the reduced state trellis.<<ETX>>","PeriodicalId":331390,"journal":{"name":"Proceedings of 1994 IEEE International Symposium on Information Theory","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130103170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Synchronous DS-SSMA with improved decorrelating decision-feedback multiuser detection","authors":"Lei Wei, C. Schlegel","doi":"10.1109/ISIT.1994.394839","DOIUrl":"https://doi.org/10.1109/ISIT.1994.394839","url":null,"abstract":"Several multiuser detectors for direct sequence spread-spectrum multiple-access (DS-SSMA) systems have been. Of particular interest is the decorrelating decision-feedback detector (DDFD). It employs forward decorrelating and feedback filters to cancel multiuser interference. The DDFD has several disadvantages. The paper addresses these problems and an improved DDFD, whose complexity is linear in the number of users is proposed.<<ETX>>","PeriodicalId":331390,"journal":{"name":"Proceedings of 1994 IEEE International Symposium on Information Theory","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128906065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On a standard convexity argument in multi-user information theory","authors":"Raymond W. Yeung","doi":"10.1109/ISIT.1994.394911","DOIUrl":"https://doi.org/10.1109/ISIT.1994.394911","url":null,"abstract":"We clarify a standard convexity argument often invoked in the proof of the converse of a coding theorem in multi-user information theory, and bring out an interesting problem regarding mixing similar polytopes.<<ETX>>","PeriodicalId":331390,"journal":{"name":"Proceedings of 1994 IEEE International Symposium on Information Theory","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132409071","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Universal source coding with a fidelity criterion","authors":"E. Kurtas, M. Salehi","doi":"10.1109/ISIT.1994.395005","DOIUrl":"https://doi.org/10.1109/ISIT.1994.395005","url":null,"abstract":"Proposes a variable rate vector quantization algorithm which can adapt itself to variations in the source statistics by progressively updating the individual codewords. The proposed algorithm optimally parses the incoming source vectors and then quantizes them accordingly. After each quantization step, codeword updating is performed to track changes in the source statistics. No knowledge of the source statistics is assumed and no side information is transmitted.<<ETX>>","PeriodicalId":331390,"journal":{"name":"Proceedings of 1994 IEEE International Symposium on Information Theory","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132423084","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Anti-jamming on the OR-channel","authors":"C.C. Jonsson","doi":"10.1109/ISIT.1994.395095","DOIUrl":"https://doi.org/10.1109/ISIT.1994.395095","url":null,"abstract":"We propose a frequency hopping scheme with M-ary frequency shift keying applied to the OR-channel and give its error and erasure probabilities. Asymptotically, the bit error probability is bounded away from zero whereas it polynomially tends to zero for our previously proposed generalized scheme.<<ETX>>","PeriodicalId":331390,"journal":{"name":"Proceedings of 1994 IEEE International Symposium on Information Theory","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132893355","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}