{"title":"On the capacity of HetNets","authors":"S. Hanly, P. Whiting","doi":"10.1109/ITA.2014.6804260","DOIUrl":"https://doi.org/10.1109/ITA.2014.6804260","url":null,"abstract":"Heterogeneous wireless networks provide a means to increase network capacity by introducing small cells and adopting a layered architecture. These networks allocate resources flexibly through a combination of time sharing and cell range expansion/contraction allowing a wide range of possible schedulers. In this paper we define capacity of such networks in terms of the maximum number of downloads per second which can be achieved for a given offered traffic density. In a simplified model we show that this capacity is determined via the solution to a continuous linear program (LP). If the solution is smaller than 1 then we show that there is a scheduler such that the number of mobiles in the network has ergodic properties with finite limiting moments. On the other hand if the solution is greater than 1 then we show that no such scheduler exists.","PeriodicalId":338302,"journal":{"name":"2014 Information Theory and Applications Workshop (ITA)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128767461","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Christiane L. Kameni Ngassa, V. Savin, D. Declercq
{"title":"Unconventional behavior of the noisy min-sum decoder over the binary symmetric channel","authors":"Christiane L. Kameni Ngassa, V. Savin, D. Declercq","doi":"10.1109/ITA.2014.6804283","DOIUrl":"https://doi.org/10.1109/ITA.2014.6804283","url":null,"abstract":"This paper investigates the behavior of the noisy Min-Sum decoder over binary symmetric channels. A noisy decoder is a decoder running on a noisy device, which may introduce errors during the decoding process. We show that in some particular cases, the noise introduce by the device can help the Min-Sum decoder to escape from fixed points attractors, and may actually result in an increased correction capacity with respect to the noiseless decoder. We also reveal the existence of a specific threshold phenomenon, referred to as functional threshold. The behavior of the noisy decoder is demonstrated in the asymptotic limit of the code-length, by using “noisy” density evolution equations, and it is also verified in the finite-length case by Monte-Carlo simulation.","PeriodicalId":338302,"journal":{"name":"2014 Information Theory and Applications Workshop (ITA)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114879918","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Chan-Sic Park, Yong-Suk Byun, A. Bokiye, Yong-Hwan Lee
{"title":"Complexity reduced zero-forcing beamforming in massive MIMO systems","authors":"Chan-Sic Park, Yong-Suk Byun, A. Bokiye, Yong-Hwan Lee","doi":"10.1109/ITA.2014.6804219","DOIUrl":"https://doi.org/10.1109/ITA.2014.6804219","url":null,"abstract":"Data gathering is one of the most popular applications in multi-hop wireless sensor networks. Since resources are limited, it is important to efficiently allocate the resource Massive multi-input multi-output (m-MIMO) systems can provide a high degree of freedom in signal transmission, enabling to simultaneously serve a number of users with high transmission capacity. Conventional zero-forcing beamforming (ZFBF) techniques can transmit multi-user signal while completely canceling out interbeam interference. However, they may have implementation difficulty when applied to m-MIMO systems mainly due to hugh processing complexity. In this paper, we design a complexity reduced ZFBF scheme by means of sequential interference cancellation. We first determine the beam weight according to the use of conventional maximum ratio transmission (MRT) scheme and calculate the corresponding interbeam interference. We calculate so-called an interference cancellation vector by sequentially cancelling out a predetermined number of interference sources in an order of the strongest interference. Finally, we determine the beam weight by adding the interference cancellation vector to the MRT beam weight. The number of interbeam interferences to be cancelled out can be pre-determined taking into consideration of the processing complexity and required performance. As the number of interbeam interferences to be cancelled out increases, the performance of the proposed scheme approaches to that of ZFBF. The numerical and simulation results show that the proposed scheme can achieve about 90 % capacity of ZFBF while requiring 2~7% processing complexity of ZFBF in various operating environments with the use of 32 128 transmit antennas.","PeriodicalId":338302,"journal":{"name":"2014 Information Theory and Applications Workshop (ITA)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114726153","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Total variation distance and the distribution of relative information","authors":"S. Verdú","doi":"10.1109/ITA.2014.6804281","DOIUrl":"https://doi.org/10.1109/ITA.2014.6804281","url":null,"abstract":"We give explicit expressions, upper and lower bounds on the total variation distance between P and Q in terms of the distribution of the random variables log dP/dQ (X) and log dP/dQ(Y), where X and Y are distributed accorκding to P and Q respectively.","PeriodicalId":338302,"journal":{"name":"2014 Information Theory and Applications Workshop (ITA)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115808449","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Low complexity power and scheduling policies for wireless networks to provide quality of service","authors":"V. Kumar, V. Sharma","doi":"10.1109/ITA.2014.6804250","DOIUrl":"https://doi.org/10.1109/ITA.2014.6804250","url":null,"abstract":"We consider optimal power allocation policies for a single server, multiuser system. The power is consumed in transmission of data only. The transmission channel may experience multipath fading. We obtain very efficient, low computational complexity algorithms which minimize power and ensure stability of the data queues. We also obtain policies when the users may have mean delay constraints. If the power required is a linear function of rate then we exploit linearity and obtain linear programs with low complexity.","PeriodicalId":338302,"journal":{"name":"2014 Information Theory and Applications Workshop (ITA)","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132283487","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Zeta functions of finite-type-Dyck shifts are N-algebraic","authors":"Marie-Pierre Béal, Michel Blockelet, C. Dima","doi":"10.1109/ITA.2014.6804286","DOIUrl":"https://doi.org/10.1109/ITA.2014.6804286","url":null,"abstract":"Constrained coding is a technique for converting unrestricted sequences of symbols into constrained sequences, i.e. sequences with a predefined set of properties. Regular constraints are described by finite-state automata and the set of bi-infinite constrained sequences are finite-type or sofic shifts. A larger class of constraints, described by sofic-Dyck automata, are the visibly pushdown constraints whose corresponding set of biinfinite sequences are the sofic-Dyck shifts. An algebraic formula for the zeta function, which counts the periodic sequences of these shifts, can be obtained for sofic-Dyck shifts having a right-resolving presentation. We extend the formula to all sofic-Dyck shifts. This proves that the zeta function of all sofic-Dyck shifts is a computable Z-algebraic series. We prove that the zeta function of a finite-type-Dyck shift is a computable N-algebraic series, i.e. is the generating series of some unambiguous context-free language. We conjecture that the result holds for all sofic-Dyck shifts.","PeriodicalId":338302,"journal":{"name":"2014 Information Theory and Applications Workshop (ITA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129516072","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Christiane Frougny, P. Heller, E. Pelantová, Milena Svobodová
{"title":"Parallel algorithms for addition in non-standard number systems","authors":"Christiane Frougny, P. Heller, E. Pelantová, Milena Svobodová","doi":"10.1109/ITA.2014.6804265","DOIUrl":"https://doi.org/10.1109/ITA.2014.6804265","url":null,"abstract":"In 1961 Avizienis proposed a parallel algorithm for addition in base 10 with digit set A = {-6, -5, ..., 5, 6}. Such an algorithm performs addition in constant time, independently of the length of the representation of the summands. In computer arithmetic parallel addition is used for speeding up multiplication and division algorithms. In this work we consider number systems where the base is a complex number β such that |β| > 1. We show that we can find a set of signed-digits on which addition is realizable by a parallel algorithm if and only if β is an algebraic number with no conjugate of modulus 1. We then address the question of the size of the digit set that permits parallel addition. We also investigate block parallel addition.","PeriodicalId":338302,"journal":{"name":"2014 Information Theory and Applications Workshop (ITA)","volume":"387 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115990464","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Efficient homomorphic encryption on integer vectors and its applications","authors":"Hongchao Zhou, G. Wornell","doi":"10.1109/ITA.2014.6804228","DOIUrl":"https://doi.org/10.1109/ITA.2014.6804228","url":null,"abstract":"Homomorphic encryption, aimed at enabling computation in the encrypted domain, is becoming important to a wide and growing range of applications, from cloud computing to distributed sensing. In recent years, a number of approaches to fully (or nearly fully) homomorphic encryption have been proposed, but to date the space and time complexity of the associated schemes has precluded their use in practice. In this work, we demonstrate that more practical homomorphic encryption schemes are possible when we require that not all encrypted computations be supported, but rather only those of interest to the target application. More specifically, we develop a homomorphic encryption scheme operating directly on integer vectors that supports three operations of fundamental interest in signal processing applications: addition, linear transformation, and weighted inner products. Moreover, when used in combination, these primitives allow us to efficiently and securely compute arbitrary polynomials. Some practically relevant examples of the computations supported by this framework are described, including feature extraction, recognition, classification, and data aggregation.","PeriodicalId":338302,"journal":{"name":"2014 Information Theory and Applications Workshop (ITA)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115482515","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Experiences building network-coding-based distributed storage systems","authors":"P. Lee","doi":"10.1109/ITA.2014.6804234","DOIUrl":"https://doi.org/10.1109/ITA.2014.6804234","url":null,"abstract":"Large-scale distributed storage systems are prone to node failures. To provide fault tolerance, data is often encoded to maintain data redundancy over multiple storage nodes. If a node fails, it can be repaired by downloading data from surviving nodes and regenerating the lost data in a new node. Network coding has recently been proposed (e.g., see [2]) to generate data redundancy. It is shown that network coding can minimize the amount of data being transferred for repair, while maintaining the same fault tolerance as in conventional erasure coding schemes. Its idea is to have storage nodes first encode their stored data and then send the encoded data for regeneration. On the other hand, the topic of network coding in storage systems is mostly investigated in theoretical studies. Its performance in real deployment remains an open issue. This motivates us to study the practicality of deploying network coding in real-world distributed storage systems. We highlight two of our implementation projects of network-coding-based storage systems at the Chinese University of Hong Kong, namely NCCloud and CORE. Both of them target different storage applications, while building on network coding to enable high availability and efficient recovery of storage systems.","PeriodicalId":338302,"journal":{"name":"2014 Information Theory and Applications Workshop (ITA)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114968422","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A continuum limit for non-dominated sorting","authors":"J. Calder, S. Esedoglu, A. Hero","doi":"10.1109/ITA.2014.6804207","DOIUrl":"https://doi.org/10.1109/ITA.2014.6804207","url":null,"abstract":"Non-dominated sorting is an important combinatorial problem in multi-objective optimization, which is ubiquitous in many fields of science and engineering. In this paper, we overview the results of some recent work by the authors on a continuum limit for non-dominated sorting. In particular, we have discovered that in the (random) large sample size limit, the non-dominated fronts converge almost surely to the level sets of a function that satisfies a Hamilton-Jacobi partial differential equation (PDE). We show how this PDE can be used to design a fast, potentially sublinear, approximate non-dominated sorting algorithm, and we show the results of applying the algorithm to real data from an anomaly detection problem.","PeriodicalId":338302,"journal":{"name":"2014 Information Theory and Applications Workshop (ITA)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132642511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}