{"title":"Distributive iterative method for minimizing generalized total square correlation of CDMA systems","authors":"P. Cotae","doi":"10.1109/ITW.2003.1216701","DOIUrl":"https://doi.org/10.1109/ITW.2003.1216701","url":null,"abstract":"We define the total generalized square correlation (TGSC) for a given signature sequence set used in code division multiple access (CDMA) systems in the presence of colored noise. Total square correlation (TSC) and total weighted correlation (TWSC) are particular cases of TGSC and are considered as well. We provide an iterative and distributed method for obtaining sequences that minimize TGSC. The method is based on majorization theory decreasing the weighted Frobenius norm associated with users' Gram signature matrix.","PeriodicalId":363490,"journal":{"name":"Proceedings 2003 IEEE Information Theory Workshop (Cat. No.03EX674)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-08-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126765738","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Convergence of the sum-product algorithm","authors":"S. Tatikonda","doi":"10.1109/ITW.2003.1216735","DOIUrl":"https://doi.org/10.1109/ITW.2003.1216735","url":null,"abstract":"We address the question of convergence in the sum-product algorithm. Specifically, we relate convergence of the sum-product algorithm to the existence of a weak limit for a sequence of Gibbs measures defined on the associated computation tree. Using tools from the theory of Gibbs measures we develop easily testable sufficient conditions for convergence. The failure of convergence of the sum-product algorithm implies the existence of multiple phases for the associated Gibbs specification. These results give new insight into the mechanics of the algorithm.","PeriodicalId":363490,"journal":{"name":"Proceedings 2003 IEEE Information Theory Workshop (Cat. No.03EX674)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-08-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121560709","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Lower bounds on the existence of binary error-correcting variable-length codes","authors":"C. Lamy, F. Bergot","doi":"10.1109/ITW.2003.1216753","DOIUrl":"https://doi.org/10.1109/ITW.2003.1216753","url":null,"abstract":"The paper deals with codes that combine source and channel encoding operations. After discussing the potential usefulness of these variable-length error correcting (VLEC) codes, necessary conditions on their length distribution are established. It is shown that, depending on the targetted application, several families of VLEC codes can be defined, whose conditions of existence differ.","PeriodicalId":363490,"journal":{"name":"Proceedings 2003 IEEE Information Theory Workshop (Cat. No.03EX674)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-08-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122480371","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On the structure of the binary (18,9,6) linear code","authors":"M. Esmaeili","doi":"10.1109/ITW.2003.1216695","DOIUrl":"https://doi.org/10.1109/ITW.2003.1216695","url":null,"abstract":"Let E/sub m/ denote the binary (m, m-1, 2) even weight code and /spl ominus/ the Kronecker product operation. A linear code of length m/spl times/t containing E/sub m//spl ominus/(t,1,t) can be decoded efficiently using a Tanner graph and a trellis diagram together with the Wagner decoding algorithm. Thus, it is important to determine whether a given code contains such a subcode. We show that the (18,9,6) binary quadratic residue code does not contain E/sub 6//spl ominus/(3,1,3). The maximum minimum distance of such a code is 5.","PeriodicalId":363490,"journal":{"name":"Proceedings 2003 IEEE Information Theory Workshop (Cat. No.03EX674)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-08-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126978193","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Robust slope region for wideband CDMA with multiple antennas","authors":"T. Muharemovic, B. Aazhang","doi":"10.1109/ITW.2003.1216686","DOIUrl":"https://doi.org/10.1109/ITW.2003.1216686","url":null,"abstract":"We analyze a low power, wideband CDMA system with multiple antennas. The joint \"slope region\" - of transmission rates at minimum energy per bit s derived as a function of proportion between vanishing rates for multiple users. Vertices of the slope region may be achieved by a matched filter linear interface, followed by successive interference cancellation. We introduce and evaluate the \"robust slope region\", the largest region which is inside every other slope region and is therefore independent of the relative proportion between transmission rates. Furthermore, we find the \"robust slope\", the maximum slope which can always be guaranteed to all users.","PeriodicalId":363490,"journal":{"name":"Proceedings 2003 IEEE Information Theory Workshop (Cat. No.03EX674)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-08-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134191900","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of mapping strategies for turbo-coded space-time block codes","authors":"A. Sezgin, D. Wübben, V. Kühn","doi":"10.1109/ITW.2003.1216705","DOIUrl":"https://doi.org/10.1109/ITW.2003.1216705","url":null,"abstract":"We propose a \"turbo\" coding scheme for the multiple-input multiple-output (MIMO) Rayleigh fading channel consisting of the serial concatenation of a block code as the outer code and different orthogonal space-time block codes (STBC) for more than two transmit antennas as the inner code. Here, we consider the orthogonal STBC as a mapping scheme in space and time. At the receiver, we apply iterative space-time detection and decoding. We analyze the impact of different mapping strategies on the information transfer of the soft-input-soft-output (SISO) space-time detector. Moreover, we analytically show that additional performance gains over Gray mapping can be obtained by different mapping strategies. Furthermore, we use extrinsic information transfer characteristics (EXIT-charts) in order to predict the performance and the behavior of the system.","PeriodicalId":363490,"journal":{"name":"Proceedings 2003 IEEE Information Theory Workshop (Cat. No.03EX674)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-08-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133810487","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Spherical designs in four dimensions","authors":"N. Sloane, R. H. Hardin, P. Cara","doi":"10.1109/ITW.2003.1216742","DOIUrl":"https://doi.org/10.1109/ITW.2003.1216742","url":null,"abstract":"A preliminary report on our investigations into the existence of spherical t-designs on the unit sphere /spl Omega//sub 4/ in 4-dimensional Euclidean space. Tables are given of the putatively best t-designs with up to 100 points. Some general constructions are proposed and explicit constructions are given for N-point strength t designs with N=4p and t=min{p-1,5}, N=6p and t=min{p-1,7}, and N=12p and t=min{p-1,11}, for all p /spl ges/ 1.","PeriodicalId":363490,"journal":{"name":"Proceedings 2003 IEEE Information Theory Workshop (Cat. No.03EX674)","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-08-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120921534","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A generalization of traceability codes using ideal-based codes","authors":"Marcel Fernández, M. Soriano","doi":"10.1109/ITW.2003.1216696","DOIUrl":"https://doi.org/10.1109/ITW.2003.1216696","url":null,"abstract":"Traceability codes are used in copyright protection schemes to prevent illegal redistribution of digital content. A traceability code, C, is a set of codewords with the following identification property: let z be a word that is \"generated\" by a coalition of codewords U/spl sub/C; then there is at least one codeword in U that is \"closer\" to z than any other codeword not in U is. If the identification process is to be performed efficiently, then error-correcting codes can be used. We make use of a powerful conceptual tool, called ideal-based code (that includes Reed-Solomon, algebraic-geometric and Chinese reminder theorem codes), introduced by V. Guruswami et al., (see Proc. 41st IEEE Symp. on Foundations of Comp. Science, p.159-68, 2000), to present a general framework for the construction and decoding of traceability codes.","PeriodicalId":363490,"journal":{"name":"Proceedings 2003 IEEE Information Theory Workshop (Cat. No.03EX674)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-08-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116413036","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A new data compression algorithm for sources with memory based on error correcting codes","authors":"G. Caire, S. Shamai, S. Verdú","doi":"10.1109/ITW.2003.1216751","DOIUrl":"https://doi.org/10.1109/ITW.2003.1216751","url":null,"abstract":"A new fixed-length asymptotically optimal scheme for lossless compression of stationary ergodic tree sources with memory is proposed. Our scheme is based on the concatenation of the Burrows-Wheeler block sorting transform with the syndrome former of a linear error correcting code. Low-density parity-check (LDPC) codes together with belief propagation decoding lead to linear compression and decompression times, and to natural universal implementation of the algorithm.","PeriodicalId":363490,"journal":{"name":"Proceedings 2003 IEEE Information Theory Workshop (Cat. No.03EX674)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-08-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114946643","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cooperative space-time coding for wireless networks","authors":"A. Stefanov, E. Erkip","doi":"10.1109/ITW.2003.1216692","DOIUrl":"https://doi.org/10.1109/ITW.2003.1216692","url":null,"abstract":"We consider a cooperative system in which the partnering mobiles are equipped with multiple antennas. We present space-time codes that have the capability of providing full cooperation diversity, while achieving maximum possible diversity and best performance in the inter-user channel. Our codes also perform well when cooperation does not take place. We illustrate that cooperative space-time coding offers significant performance improvement over direct transmission even when the inter-user channel is noisy. We also consider code design for users with different numbers of antennas.","PeriodicalId":363490,"journal":{"name":"Proceedings 2003 IEEE Information Theory Workshop (Cat. No.03EX674)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-08-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116674076","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}