{"title":"Coding for the Z channel with a digital relay link","authors":"Hieu T. Do, T. Oechtering, M. Skoglund","doi":"10.1109/CIG.2010.5592716","DOIUrl":"https://doi.org/10.1109/CIG.2010.5592716","url":null,"abstract":"This paper considers a discrete memoryless four-node network where two nodes want to send three independent messages to the other two nodes. The two receiving nodes are allowed to cooperate by means of a unidirectional noiseless link with finite capacity. A coding scheme is proposed which combines rate splitting, block Markov multi-level superposition coding with binning and joint decoding. The general achievable rates are then specialized to degraded channel and Gaussian channel, where it is shown that the sum capacity for the Gaussian channel is achieved under certain conditions. Results in this paper recover and unify previously known results for the discrete memoryless Z channel without cooperation, and results for the Gaussian Z-interference channel with a digital relay link.","PeriodicalId":354925,"journal":{"name":"2010 IEEE Information Theory Workshop","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121199267","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Additive codes over Z2 × Z4","authors":"J. Borges, C. Fernández-Córdoba, S. Dougherty","doi":"10.1109/CIG.2010.5592827","DOIUrl":"https://doi.org/10.1109/CIG.2010.5592827","url":null,"abstract":"We describe recent results for codes over Z<inf>2</inf> ×Z<inf>4</inf> giving their connection to binary codes via a natural Gray map. We study Z<inf>2</inf>Z<inf>4</inf> self-dual codes and we state the major results concerning these codes. We state several open questions and discuss possible avenues of research.","PeriodicalId":354925,"journal":{"name":"2010 IEEE Information Theory Workshop","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131516421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Universal source polarization and sparse recovery","authors":"E. Abbe","doi":"10.1109/CIG.2010.5592875","DOIUrl":"https://doi.org/10.1109/CIG.2010.5592875","url":null,"abstract":"Polar codes allow to perform lossless compression of i.i.d. sources at the lowest rate with low encoding and decoding complexity. In this paper, it is shown that for binary sources, there exist “universal polar codes” which can compress any source of low enough entropy, without requiring knowledge of the source distribution. While this result does not extend to q-ary sources, it is shown how it extends to q-ary sources which belong to a restricted family. An analogy between this family and BECs in channel polarization is discussed. Finally, an application of the universal source polarization results to sparse data recovery is proposed.","PeriodicalId":354925,"journal":{"name":"2010 IEEE Information Theory Workshop","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126578537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Voloshynovskiy, O. Koval, F. Beekhof, F. Farhadzadeh, T. Holotyak
{"title":"Information-theoretical analysis of private content identification","authors":"S. Voloshynovskiy, O. Koval, F. Beekhof, F. Farhadzadeh, T. Holotyak","doi":"10.1109/CIG.2010.5592809","DOIUrl":"https://doi.org/10.1109/CIG.2010.5592809","url":null,"abstract":"In recent years, content identification based on digital fingerprinting attracts a lot of attention in different emerging applications. At the same time, the theoretical analysis of digital fingerprinting systems for finite length case remains an open issue. Additionally, privacy leaks caused by fingerprint storage, distribution and sharing in a public domain via third party outsourced services cause certain concerns in the cryptographic community. In this paper, we perform an information-theoretic analysis of finite length digital fingerprinting systems in a private content identification setup and reveal certain connections between fingerprint based content identification and Forney's erasure/list decoding [1]. Along this analysis, we also consider complexity issues of fast content identification in large databases on remote untrusted servers.","PeriodicalId":354925,"journal":{"name":"2010 IEEE Information Theory Workshop","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114837559","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Robust parent-identifying codes","authors":"A. Barg, G. Blakley, G. Kabatiansky, C. Tavernier","doi":"10.1109/CIG.2010.5592920","DOIUrl":"https://doi.org/10.1109/CIG.2010.5592920","url":null,"abstract":"Codes with the identifiable parent property (IPP codes) are used in traitor tracing schemes that protect data broadcast by the publisher from unauthorized access or distribution. An n-word y over a finite alphabet is called a descendant of a set of t words x<sup>1</sup>, …, x<sup>t</sup> if y<inf>i</inf> ∊ {x<sup>1</sup><inf>i</inf>, …, x<sup>t</sup><inf>i</inf>} for all i = 1, … n. A code C = {x<sup>1</sup>, …, x<sup>M</sup>} is said to have the i-IPP property if for any n-word y that is a descendant of at most t parents belonging to the code it is possible to identify at least one of them. The existence of good i-IPP codes is known from earlier works. We introduce a robust version of IPP codes which allows unconditional identification of parents even if some of the coordinates in y can break away from the descent rule, i.e., can take arbitrary values from the alphabet, or become completely unreadable. By linking this problem to perfect hash functions and, more generally, to hash distances of a code, we prove initial results on the proportion of such coordinates that can be tolerated under the unconditional recovery requirement.","PeriodicalId":354925,"journal":{"name":"2010 IEEE Information Theory Workshop","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128888495","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Hecke operators with odd determinant and binary frameproof codes beyond the probabilistic bound?","authors":"Hugues Randriam","doi":"10.1109/CIG.2010.5592905","DOIUrl":"https://doi.org/10.1109/CIG.2010.5592905","url":null,"abstract":"We give a slight improvement on Xing's lower bound for frameproof codes constructed from algebraic curves. Combined with some additional number-theoretic assumptions (still conjectural) and a concatenation process, this should lead to the existence of a family of binary 2-frameproof codes of asymptotic rate going beyond the up to now best known (non-constructive) lower bound.","PeriodicalId":354925,"journal":{"name":"2010 IEEE Information Theory Workshop","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130284332","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Irregular repeat-accumulate-like codes with improved error floor performance","authors":"David F. Hayes, Sarah J. Johnson, S. Weller","doi":"10.1109/CIG.2010.5592734","DOIUrl":"https://doi.org/10.1109/CIG.2010.5592734","url":null,"abstract":"In this paper, we present a new class of iteratively decoded error correction codes. These codes, which are a modification of irregular repeat-accumulate (IRA) codes, are termed generalized IRA (GIRA) codes, and are designed for improved error floor performance. GIRA codes are systematic, easily encodable, and are decoded with the sum-product algorithm. In this paper we present a density evolution algorithm to compute the threshold of GIRA codes, and find GIRA degree distributions which produce codes with good thresholds. We then propose inner code designs and show using simulation results that they improve upon the error floor performance of IRA codes.","PeriodicalId":354925,"journal":{"name":"2010 IEEE Information Theory Workshop","volume":"328 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120941986","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fireworks: A random linear coding scheme for distributed storage in wireless sensor networks","authors":"D. Vukobratović, Č. Stefanović, V. Stanković","doi":"10.1109/CIG.2010.5592800","DOIUrl":"https://doi.org/10.1109/CIG.2010.5592800","url":null,"abstract":"In this paper, we investigate the design of decentralized encoding procedure for distributed random linear coding (RLC) in resource-constrained wireless networks. We propose a novel distributed RLC scheme called “Fireworks”, analyze its performance and support it by simulation results. The presented results demonstrate design flexibility of the proposed scheme, where the design choices influence the trade-off between the coding efficiency and encoding communication costs.","PeriodicalId":354925,"journal":{"name":"2010 IEEE Information Theory Workshop","volume":"38 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126602587","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Codes from graphs related to the categorical product of triangular graphs and Kn","authors":"K. Kumwenda, E. Mwambene","doi":"10.1109/CIG.2010.5592662","DOIUrl":"https://doi.org/10.1109/CIG.2010.5592662","url":null,"abstract":"For any prime p and n ⋛ 3, we examine p-ary linear codes generated by incidence matrices of two classes of graphs, H<inf>n</inf> and Γ<inf>n</inf> where H<inf>n−1</inf> is an induced subgraph of Γ<inf>n</inf>. Γ<inf>n</inf> is a subgraph of the union of the categorical product of triangular graphs T<inf>n</inf> and complete graphs K<inf>n</inf>, and complements of triangular graphs T<inf>n</inf> and K<inf>n</inf>, where the union of graphs is as defined in [4]. For the codes of H<inf>n</inf>, we exhibit permutation decoding sets of order n for full error correction. Their size is only twice the lower bound due to Gordon [7]. We also consider partial permutation decoding for the binary codes from Γ<inf>n</inf>.","PeriodicalId":354925,"journal":{"name":"2010 IEEE Information Theory Workshop","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126615927","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Local computation in codes","authors":"T. Kaufman","doi":"10.1109/CIG.2010.5592932","DOIUrl":"https://doi.org/10.1109/CIG.2010.5592932","url":null,"abstract":"A locally testable code allows one to store vast amounts of data, where estimating the fraction of errors in the data takes roughly as much time as takes to read one bit of the data! If the fraction of errors is below a certain threshold, a locally decodeable code would allow one to recover every bit of the original message, again, in time which is roughly the time to read one bit of the data. Are such locally testable/decodeable codes of constant rate possible? So far we don't know, but surprisingly-good codes are known. Following, we survey some of the literature and discuss a connection between these notions to symmetric LDPC codes.","PeriodicalId":354925,"journal":{"name":"2010 IEEE Information Theory Workshop","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122299356","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}