2010 IEEE Information Theory Workshop最新文献

筛选
英文 中文
Achievable rate regions for Dirty Tape Channels and “joint writing on Dirty paper and Dirty Tape” 脏带通道和“在脏纸和脏带上联合书写”的可实现速率区域
2010 IEEE Information Theory Workshop Pub Date : 2010-04-15 DOI: 10.1109/CIG.2010.5592659
Reza Khosravi-Farsani, Bahareh Akhbari, M. Aref
{"title":"Achievable rate regions for Dirty Tape Channels and “joint writing on Dirty paper and Dirty Tape”","authors":"Reza Khosravi-Farsani, Bahareh Akhbari, M. Aref","doi":"10.1109/CIG.2010.5592659","DOIUrl":"https://doi.org/10.1109/CIG.2010.5592659","url":null,"abstract":"We consider the Gaussian Dirty Tape Channel (DTC) Y = X + S + Z, where S is an additive Gaussian interference known causally to the transmitter. The general expression max<inf>PU, f(·), X = f(U, S)</inf> I(U; Y) is proposed for the capacity of this channel. For linear assignment to f(·), i.e., X = U — βS, this expression leads to the compensation strategy proposed previously by Willems to obtain an achievable rate for the DTC. We show that linear assignment to f(·) is optimal under the condition that there exists a real number β<sup>∗</sup> such that the pair (X + β S, U) is independent of the interference S. Furthermore, by applying a time-sharing technique to the achievable rate derived by linear assignment to f (·), an improved lower bound on the capacity of DTC is obtained. We also consider the Gaussian multiple access channel with additive interference, and study two different scenarios for this system. In the first case, both transmitters know interference causally while in the second, one transmitter has access to the interference noncausally and the other causally. Achievable rate regions for these two scenarios are then established.","PeriodicalId":354925,"journal":{"name":"2010 IEEE Information Theory Workshop","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125427717","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Sum capacity of K user Gaussian degraded interference channels K个用户高斯退化干扰信道的和容量
2010 IEEE Information Theory Workshop Pub Date : 2010-04-13 DOI: 10.1109/CIG.2010.5592668
J. Jose, S. Vishwanath
{"title":"Sum capacity of K user Gaussian degraded interference channels","authors":"J. Jose, S. Vishwanath","doi":"10.1109/CIG.2010.5592668","DOIUrl":"https://doi.org/10.1109/CIG.2010.5592668","url":null,"abstract":"This paper studies a family of genie-MAC (multiple access channel) outer bounds for K-user Gaussian interference channels. This family is inspired by existing genie-aided bounding mechanisms, but differs from current approaches in its optimization problem formulation and application. The fundamental idea behind these bounds is to create a group of genie receivers that form multiple access channels that can decode a subset of the original interference channel's messages. The MAC sum capacity of each of the genie receivers provides an outer bound on the sum of rates for this subset. The genie-MAC outer bounds are used to derive new sum-capacity results. In particular, this paper derives sum-capacity in closed-form for the class of K-user Gaussian degraded interference channels. The sum-capacity achieving scheme is shown to be a successive interference cancellation scheme. This result generalizes a known result for two-user channels to K-user channels.","PeriodicalId":354925,"journal":{"name":"2010 IEEE Information Theory Workshop","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115064005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
A new full-diversity criterion and low-complexity STBCs with Partial Interference Cancellation decoding 一种新的全分集准则和部分干扰抵消译码的低复杂度stbc
2010 IEEE Information Theory Workshop Pub Date : 2010-04-13 DOI: 10.1109/CIG.2010.5592752
Natarajan Lakshmi Prasad, B. Rajan
{"title":"A new full-diversity criterion and low-complexity STBCs with Partial Interference Cancellation decoding","authors":"Natarajan Lakshmi Prasad, B. Rajan","doi":"10.1109/CIG.2010.5592752","DOIUrl":"https://doi.org/10.1109/CIG.2010.5592752","url":null,"abstract":"Recently, Guo and Xia gave sufficient conditions for an STBC to achieve full diversity when a PIC (Partial Interference Cancellation) or a PIC-SIC (PIC with Successive Interference Cancellation) decoder is used at the receiver. In this paper, we give alternative conditions for an STBC to achieve full diversity with PIC and PIC-SIC decoders, which are equivalent to Guo and Xia's conditions, but are much easier to check. Using these conditions, we construct a new class of full diversity PIC-SIC decodable codes, which contain the Toeplitz codes and a family of codes recently proposed by Zhang, Xu et. al. as proper subclasses. With the help of the new criteria, we also show that a class of PIC-SIC decodable codes recently proposed by Zhang, Shi et. al. can be decoded with much lower complexity than what is reported, without compromising on full diversity.","PeriodicalId":354925,"journal":{"name":"2010 IEEE Information Theory Workshop","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133516696","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
An achievable rate for the MIMO individual channel MIMO单个信道的可实现速率
2010 IEEE Information Theory Workshop Pub Date : 2010-04-12 DOI: 10.1109/CIG.2010.5592656
Y. Lomnitz, M. Feder
{"title":"An achievable rate for the MIMO individual channel","authors":"Y. Lomnitz, M. Feder","doi":"10.1109/CIG.2010.5592656","DOIUrl":"https://doi.org/10.1109/CIG.2010.5592656","url":null,"abstract":"We consider the problem of communicating over a multiple-input multiple-output (MIMO) real valued channel for which no mathematical model is specified, and achievable rates are given as a function of the channel input and output sequences known a-posteriori. This paper extends previous results regarding individual channels by presenting a rate function for the MIMO individual channel, and showing its achievability in a fixed transmission rate communication scenario.","PeriodicalId":354925,"journal":{"name":"2010 IEEE Information Theory Workshop","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115843664","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Structured LDPC codes from permutation matrices free of small trapping sets 不含小捕获集的排列矩阵的结构化LDPC码
2010 IEEE Information Theory Workshop Pub Date : 2010-04-07 DOI: 10.1109/CIG.2010.5592767
D. V. Nguyen, B. Vasic, M. Marcellin, S. K. Chilappagari
{"title":"Structured LDPC codes from permutation matrices free of small trapping sets","authors":"D. V. Nguyen, B. Vasic, M. Marcellin, S. K. Chilappagari","doi":"10.1109/CIG.2010.5592767","DOIUrl":"https://doi.org/10.1109/CIG.2010.5592767","url":null,"abstract":"This paper introduces a class of structured low-density parity-check (LDPC) codes whose parity check matrices are arrays of permutation matrices. The permutation matrices are obtained from Latin squares and form a finite field under some matrix operations. They are chosen so that the Tanner graphs do not contain subgraphs harmful to iterative decoding algorithms. The construction of column-weight-three codes is presented. Although the codes are optimized for the Gallager A/B algorithm over the binary symmetric channel (BSC), their error performance is very good on the additive white Gaussian noise channel (AWGNC) as well.","PeriodicalId":354925,"journal":{"name":"2010 IEEE Information Theory Workshop","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127094239","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
Dense error-correcting codes in the Lee metric 李度规中的密集纠错码
2010 IEEE Information Theory Workshop Pub Date : 2010-04-02 DOI: 10.1109/CIG.2010.5592743
T. Etzion, A. Vardy, Eitan Yaakobi
{"title":"Dense error-correcting codes in the Lee metric","authors":"T. Etzion, A. Vardy, Eitan Yaakobi","doi":"10.1109/CIG.2010.5592743","DOIUrl":"https://doi.org/10.1109/CIG.2010.5592743","url":null,"abstract":"Several new applications and a number of new mathematical techniques have increased the research on error-correcting codes in the Lee metric in the last decade. In this work we consider several coding problems and constructions of error-correcting codes in the Lee metric. First, we consider constructions of dense error-correcting codes in relatively small dimensions over small alphabets. The second problem we solve is construction of diametric perfect codes with minimum distance four. We will construct such codes over various lengths and alphabet sizes. The third problem is to transfer an n-dimensional Lee sphere with large radius into a shape, with the same volume, located in a relatively small box. Hadamard matrices play an essential role in the solutions for all three problems. A construction of codes based on Hadamard matrices will start our discussion. These codes approach the sphere packing bound for very high rate range and appear to be the best known codes over some sets of parameters.","PeriodicalId":354925,"journal":{"name":"2010 IEEE Information Theory Workshop","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126339352","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Network-level cooperative protocols for wireless multicasting: Stable throughput analysis and use of network coding 无线多播的网络级合作协议:稳定吞吐量分析和网络编码的使用
2010 IEEE Information Theory Workshop Pub Date : 2010-01-13 DOI: 10.1109/CIG.2010.5592701
Anthony Fanous, A. Ephremides
{"title":"Network-level cooperative protocols for wireless multicasting: Stable throughput analysis and use of network coding","authors":"Anthony Fanous, A. Ephremides","doi":"10.1109/CIG.2010.5592701","DOIUrl":"https://doi.org/10.1109/CIG.2010.5592701","url":null,"abstract":"In this paper, we investigate the impact of network coding at the relay node on the stable throughput rate in multicasting cooperative wireless networks. The proposed protocol adopts Network-level cooperation, as in contrast to the traditional physical layer cooperative protocols; and in addition, it uses random linear network coding at the relay node. The traffic is assumed to be bursty and the relay node forwards its packets during the idle periods of the source which allows better utilization of channel resources. Our results show that cooperation leads to higher stable throughput rates than conventional retransmission policies. Moreover, the use of random linear network coding at the relay can further enhance the stable throughput with increasing network coding field size or increasing the number of packets over which encoding is performed.","PeriodicalId":354925,"journal":{"name":"2010 IEEE Information Theory Workshop","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-01-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133634038","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
The enumeration of Costas arrays of order 28 顺序为28的Costas数组的枚举
2010 IEEE Information Theory Workshop Pub Date : 2008-06-18 DOI: 10.3934/amc.2011.5.69
Konstantinos Drakakis, Francesco Iorio, S. Rickard
{"title":"The enumeration of Costas arrays of order 28","authors":"Konstantinos Drakakis, Francesco Iorio, S. Rickard","doi":"10.3934/amc.2011.5.69","DOIUrl":"https://doi.org/10.3934/amc.2011.5.69","url":null,"abstract":"We present the results of the enumeration of Costas arrays of order 28: all arrays found are accounted for by the Golomb and Welch construction methods, making 28 the first order (larger than 5) for which no sporadic Costas arrays exist. The enumeration was performed on several computer clusters and required the equivalent of 70 years of single CPU time.","PeriodicalId":354925,"journal":{"name":"2010 IEEE Information Theory Workshop","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124464480","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 40
Coding solutions for the secure biometric storage problem 安全生物识别存储问题的编码解决方案
2010 IEEE Information Theory Workshop Pub Date : 2007-01-16 DOI: 10.1109/CIG.2010.5592899
D. Schipani, J. Rosenthal
{"title":"Coding solutions for the secure biometric storage problem","authors":"D. Schipani, J. Rosenthal","doi":"10.1109/CIG.2010.5592899","DOIUrl":"https://doi.org/10.1109/CIG.2010.5592899","url":null,"abstract":"The paper studies the problem of securely storing biometric passwords, such as fingerprints and irises. With the help of coding theory Juels and Wattenberg derived in 1999 a scheme where similar input strings will be accepted as the same biometric. In the same time nothing could be learned from the stored data. They called their scheme a fuzzy commitment scheme. In this paper we will revisit the solution of Juels and Wattenberg and we will provide answers to two important questions: what type of error-correcting codes should be used and what happens if biometric templates are not uniformly distributed, i.e. the biometric data come with redundancy. Answering the first question will lead us to the search for low-rate large-minimum distance error-correcting codes which come with efficient decoding algorithms up to the designed distance. In order to answer the second question we relate the rate required with a quantity connected to the “entropy” of the string, trying to estimate a sort of “capacity”, if we want to see a flavor of the converse of Shannon's noisy coding theorem. Finally we deal with side-problems arising in a practical implementation and we propose a possible solution to the main one that seems to have so far prevented in many situations real life applications of the fuzzy scheme.","PeriodicalId":354925,"journal":{"name":"2010 IEEE Information Theory Workshop","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-01-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130961872","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信