2008 Information Theory and Applications Workshop最新文献

筛选
英文 中文
Achievable rate region and optimality of multi-hop wireless 802.11-scheduled networks 多跳无线802.11计划网络的可达速率区域和最优性
2008 Information Theory and Applications Workshop Pub Date : 2008-08-15 DOI: 10.1109/ITA.2008.4601059
A. Jindal, K. Psounis
{"title":"Achievable rate region and optimality of multi-hop wireless 802.11-scheduled networks","authors":"A. Jindal, K. Psounis","doi":"10.1109/ITA.2008.4601059","DOIUrl":"https://doi.org/10.1109/ITA.2008.4601059","url":null,"abstract":"This paper describes a methodology to find the achievable rate region for any static wireless multi-hop network with 802.11 scheduling. To do so, we first characterize the achievable edge-rate region, that is, the set of edge rates that are achievable on the given topology. This requires a careful consideration of the inter-dependence among nearby edges, since neighboring edges collide with and affect the idle time perceived by the edge under study. We use our results to study the optimality of IEEE 802.11 scheduling by comparing the achievable rate region of IEEE 802.11 and optimal scheduling for different scenarios and find that 802.11 is able to achieve more than 80% of the throughput as compared to optimal scheduling for all the scenarios considered. To explain this result, we then characterize the local topologies for which 802.11 scheduling results in a significant drop in throughput as compared to optimal scheduling.","PeriodicalId":345196,"journal":{"name":"2008 Information Theory and Applications Workshop","volume":"178 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127971530","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Localization and identification in networks using robust identifying codes 基于鲁棒识别码的网络定位与识别
2008 Information Theory and Applications Workshop Pub Date : 2008-08-15 DOI: 10.1109/ITA.2008.4601043
Moshe Laifenfeld
{"title":"Localization and identification in networks using robust identifying codes","authors":"Moshe Laifenfeld","doi":"10.1109/ITA.2008.4601043","DOIUrl":"https://doi.org/10.1109/ITA.2008.4601043","url":null,"abstract":"Many practical problems in networks such as fault detection and diagnosis, location detection, environmental monitoring, etc, require to identify specific nodes or links based on a set of observations, which size is a subject of optimization. In this paper we focus on a combinatorial approach to these problems, which is closely related to coding techniques, and specifically to identifying codes. The identifying code problem for a given graph involves finding a minimum set of vertices whose neighborhoods uniquely overlap at any given graph vertex. In this paper we show efficient reductions between the identifying code problem and well-known covering problems, resulting in a tight hardness of approximation result and provable good centralized and distributed approximations. We further provide empirical and theoretical results on identifying codes in random networks and efficient constructions of these codes in infinite grids.","PeriodicalId":345196,"journal":{"name":"2008 Information Theory and Applications Workshop","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134218774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Optimal causal quantization of Markov Sources with distortion constraints 带失真约束的马尔可夫源的最优因果量化
2008 Information Theory and Applications Workshop Pub Date : 2008-08-15 DOI: 10.1109/ITA.2008.4601015
S. Yuksel, T. Başar, S. Meyn
{"title":"Optimal causal quantization of Markov Sources with distortion constraints","authors":"S. Yuksel, T. Başar, S. Meyn","doi":"10.1109/ITA.2008.4601015","DOIUrl":"https://doi.org/10.1109/ITA.2008.4601015","url":null,"abstract":"For Markov sources, the structure of optimal causal encoders minimizing the total communication rate subject to a mean-square distortion constraint is studied. The class of sources considered lives in a continuous alphabet, and the encoder is allowed to be variable-rate. Both the finite-horizon and the infinite-horizon problems are considered. In the finite-horizon case, the problem is non-convex, whereas in the infinite-horizon case the problem can be convexified under certain assumptions. For a finite horizon problem, the optimal deterministic causal encoder for a kth-order Markov source uses only the most recent k source symbols and the information available at the receiver, whereas the optimal causal coder for a memoryless source is memoryless. For the infinite-horizon problem, a convex-analytic approach is adopted. Randomized stationary quantizers are suboptimal in the absence of common randomness between the encoder and the decoder. If there is common randomness, the optimal quantizer requires the randomization of at most two deterministic quantizers. In the absence of common randomness, the optimal quantizer is non-stationary and a recurrence-based time-sharing of two deterministic quantizers is optimal. A linear source driven by Gaussian noise is considered. If the process is stable, innovation coding is almost optimal at high-rates, whereas if the source is unstable, then even a high-rate time-invariant innovation coding scheme leads to an unstable estimation process.","PeriodicalId":345196,"journal":{"name":"2008 Information Theory and Applications Workshop","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134400782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Cellular systems with multicell processing and conferencing links between mobile stations 在移动站之间具有多小区处理和会议连接的蜂窝系统
2008 Information Theory and Applications Workshop Pub Date : 2008-08-15 DOI: 10.1109/ITA.2008.4601074
O. Simeone, O. Somekh, G. Kramer, H. Poor, S. Shamai
{"title":"Cellular systems with multicell processing and conferencing links between mobile stations","authors":"O. Simeone, O. Somekh, G. Kramer, H. Poor, S. Shamai","doi":"10.1109/ITA.2008.4601074","DOIUrl":"https://doi.org/10.1109/ITA.2008.4601074","url":null,"abstract":"In this paper, multi-cell processing for the uplink of a cellular system is studied in the presence of orthogonal channels of fixed capacity between mobile stations in adjacent cells (conferencing). It is shown that a rate-splitting transmission strategy, where part of the message is exchanged on the conferencing channels and then transmitted cooperatively to the base stations, is capacity-achieving for an asymptotically large conferencing capacity. This strategy can be regarded as able to perform convolutional pre-equalization of the signal encoding the common messages in the spatial domain, where the number of taps of the finite-impulse response equalizer depends on the number of conferencing rounds. Analysis in the low signal-to-noise ratio regime and numerical results validate the advantages of conferencing as a complementary technology to multi-cell processing.","PeriodicalId":345196,"journal":{"name":"2008 Information Theory and Applications Workshop","volume":" 11","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114051384","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Bayesian network structure learning using factorized NML universal models 使用因式NML通用模型的贝叶斯网络结构学习
2008 Information Theory and Applications Workshop Pub Date : 2008-08-15 DOI: 10.1109/ITA.2008.4601061
Teemu Roos, T. Silander, P. Kontkanen, P. Myllymäki
{"title":"Bayesian network structure learning using factorized NML universal models","authors":"Teemu Roos, T. Silander, P. Kontkanen, P. Myllymäki","doi":"10.1109/ITA.2008.4601061","DOIUrl":"https://doi.org/10.1109/ITA.2008.4601061","url":null,"abstract":"Universal codes/models can be used for data compression and model selection by the minimum description length (MDL) principle. For many interesting model classes, such as Bayesian networks, the minimax regret optimal normalized maximum likelihood (NML) universal model is computationally very demanding. We suggest a computationally feasible alternative to NML for Bayesian networks, the factorized NML universal model, where the normalization is done locally for each variable. This can be seen as an approximate sum-product algorithm. We show that this new universal model performs extremely well in model selection, compared to the existing state-of-the-art, even for small sample sizes.","PeriodicalId":345196,"journal":{"name":"2008 Information Theory and Applications Workshop","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129164489","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 39
A note on convergence rate of constrained capacity estimation algorithms over ISI channels ISI信道上受限容量估计算法的收敛速度
2008 Information Theory and Applications Workshop Pub Date : 2008-08-15 DOI: 10.1109/ITA.2008.4601026
T. Duman, Junshan Zhang
{"title":"A note on convergence rate of constrained capacity estimation algorithms over ISI channels","authors":"T. Duman, Junshan Zhang","doi":"10.1109/ITA.2008.4601026","DOIUrl":"https://doi.org/10.1109/ITA.2008.4601026","url":null,"abstract":"It has recently become popular to use simulation-based algorithms to empirically estimate achievable information rates over intersymbol interference (ISI) channels with inputs from specific input constellations. Such algorithms are guaranteed to converge by invoking the Shannon-McMillan-Brieman theorem provided that the output sequence is stationary and ergodic. In this note, we establish a central limit theorem result on the rate of convergence, and show that the variance of the estimates decreases like 1/N (where N is the sequence length employed) as N goes to infinity. This result indicates that it is possible to achieve estimation accuracy with any desired level by simply increasing the number of samples appropriately.","PeriodicalId":345196,"journal":{"name":"2008 Information Theory and Applications Workshop","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128768639","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Algorithms and bounds for sensing capacity and compressed sensing with applications to learning graphical models 感知能力和压缩感知的算法和边界及其在学习图形模型中的应用
2008 Information Theory and Applications Workshop Pub Date : 2008-08-15 DOI: 10.1109/ITA.2008.4601065
S. Aeron, Manqi Zhao, Venkatesh Saligrama
{"title":"Algorithms and bounds for sensing capacity and compressed sensing with applications to learning graphical models","authors":"S. Aeron, Manqi Zhao, Venkatesh Saligrama","doi":"10.1109/ITA.2008.4601065","DOIUrl":"https://doi.org/10.1109/ITA.2008.4601065","url":null,"abstract":"We consider the problem of recovering sparse phenomena from projections of noisy data, a topic of interest in compressed sensing. We describe the problem in terms of sensing capacity, which we define as the supremum of the ratio of the number of signal dimensions that can be identified per projection. This notion quantifies minimum number of observations required to estimate a signal as a function of sensing channel, SNR, sensed environment(sparsity) as well as desired distortion up to which the sensed phenomena must be reconstructed. We first present bounds for two different sensing channels: (A) i.i.d. Gaussian observations (B) Correlated observations. We then extend the results derived for the correlated case to the problem of learning sparse graphical models. We then present convex programming methods for the different distortions for the correlated case. We then comment on the differences between the achievable bounds and the performance of convex programming methods.","PeriodicalId":345196,"journal":{"name":"2008 Information Theory and Applications Workshop","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117161008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Source coding and transmission under common knowledge constraints 常识约束下的源编码与传输
2008 Information Theory and Applications Workshop Pub Date : 2008-08-15 DOI: 10.1109/ITA.2008.4601078
Yossef Steinberg
{"title":"Source coding and transmission under common knowledge constraints","authors":"Yossef Steinberg","doi":"10.1109/ITA.2008.4601078","DOIUrl":"https://doi.org/10.1109/ITA.2008.4601078","url":null,"abstract":"This work studies problems of source coding under the requirement that the encoder can produce an exact copy of the compressed source constructed by the decoder. This requirement, termed here as a common knowledge constraint, is satisfied automatically in rate-distortion theory for single sources. However, in the common formulation of problems of lossy source coding with side information at the decoder (the Wyner-Ziv problem), distributed source coding, and joint source-channel coding for networks, the destination can exploit the information it receives in a manner that cannot be exactly reproduced at the sender side. Some applications, like the transmission of sensitive medical information, may require that both sides - the sender and the receiver - will share a common version of the compressed data, for the purpose of future discussions or consulting. The purpose of this work is to study the implications of common knowledge constraints on the achievable rates in scenarios of lossy source coding. A single letter characterization of the rate distortion function is developed, for the problem of source coding with side information at the decoder, under a common knowledge constraint. Implications of this constraint on problems of joint source channel coding for the degraded broadcast channel are studied. Specifically, it is shown that in this setup, a scheme based on separation achieves optimal distortions.","PeriodicalId":345196,"journal":{"name":"2008 Information Theory and Applications Workshop","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116233162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
The price of certainty: iterative decoding from a total power perspective 确定性的代价:从总功率角度进行迭代解码
2008 Information Theory and Applications Workshop Pub Date : 2008-08-15 DOI: 10.1109/ITA.2008.4601064
A. Sahai, P. Grover
{"title":"The price of certainty: iterative decoding from a total power perspective","authors":"A. Sahai, P. Grover","doi":"10.1109/ITA.2008.4601064","DOIUrl":"https://doi.org/10.1109/ITA.2008.4601064","url":null,"abstract":"The classical problem of reliable point-to-point digital communication is to achieve a low probability of error while keeping the rate high and the power consumption small. Traditionally, explicit power-dependent (idealized) models for the communication channel are used to study the transmit power required. The resulting dasiawaterfallpsila curves convey the revolutionary idea that unboundedly low probabilities of bit-error are attainable using only finite transmit power. However, it has long been observed that the decoder complexity, and hence the total power consumption, goes up when attempting to use codes that operate close to the waterfall curve. This paper explores this theme by using explicit models for computation and power consumption at the decoder. To get a lower bound, an ASIC-oriented model is given that allows for extreme parallelism in implementation. The decoder architecture is in the spirit of iterative decoding for sparse-graph codes, but is further idealized in that it allows for more computational power than is currently known to be implementable. Generalized sphere-packing arguments are used to derive bounds on the number of decoding iterations needed for any possible code given only the rate and the desired probability of error. The lower bound is plotted to show an unavoidable tradeoff between the average bit-error probability and the total power used in transmission and decoding. In the spirit of conventional waterfall curves, we call these ldquowatersliderdquo curves.","PeriodicalId":345196,"journal":{"name":"2008 Information Theory and Applications Workshop","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128122064","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
On sequential analog-to-digital conversion with low-precision components 低精度元件的顺序模数转换
2008 Information Theory and Applications Workshop Pub Date : 2008-08-15 DOI: 10.1109/ITA.2008.4601045
J. Biveroni, Hans-Andrea Loeliger
{"title":"On sequential analog-to-digital conversion with low-precision components","authors":"J. Biveroni, Hans-Andrea Loeliger","doi":"10.1109/ITA.2008.4601045","DOIUrl":"https://doi.org/10.1109/ITA.2008.4601045","url":null,"abstract":"It was shown in prior work that, with proper digital calibration, ADCs with high static resolution can in principle be built without precise analog components. The paper offers some afterthoughts on this topic and connects it with beta expansions. It is suggested that, with proper calibration (but not without), ADC architectures based on the beta expansion can indeed achieve an effective resolution of m bits with analog circuit complexity linear in m and without precise analog components.","PeriodicalId":345196,"journal":{"name":"2008 Information Theory and Applications Workshop","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127194049","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信