{"title":"Fourier analysis of sequences over a composition algebra of the real number field","authors":"T. Maeda, Takafumi Hayashi","doi":"10.1587/TRANSFUN.E96.A.2452","DOIUrl":"https://doi.org/10.1587/TRANSFUN.E96.A.2452","url":null,"abstract":"To analyze the structure of a set of perfect sequences over a composition algebra of the real number field, transforms of a set of sequences similar to DFT (discrete Fourier transform) are introduced. Discrete cosine transform, discrete sine transform and generalized discrete Fourier transform (GDFT) of the sequences are defined and the fundamental properties of these transforms are proved. We show that GDFT is bijective and that there exists a relationship between these transforms and a convolution of sequences. Applying these properties to the set of perfect sequences, a parameterization theorem of such sequences is obtained.","PeriodicalId":369382,"journal":{"name":"2012 International Symposium on Information Theory and its Applications","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117123876","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Computing polynomial functions of correlated sources: Inner bounds","authors":"Sheng Huang, M. Skoglund","doi":"10.1109/ISIT.2012.6284664","DOIUrl":"https://doi.org/10.1109/ISIT.2012.6284664","url":null,"abstract":"This paper considers the problem of source coding for computing functions of correlated i.i.d. random sources. The approach of combining standard and linear random coding for this problem was first introduced by Ahlswede and Han, in the special case of computing the modulo-two sum. In this paper, making use of an adapted version of that method, we generalize their result to more sophisticated scenarios, where the functions to be computed are polynomial functions. Since all discrete functions are fundamentally restrictions of polynomial functions, our results are universally applied.","PeriodicalId":369382,"journal":{"name":"2012 International Symposium on Information Theory and its Applications","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125139967","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Probabilistic analysis of the network reliability problem on a random graph ensemble","authors":"Akiyuki Yano, T. Wadayama","doi":"10.1587/TRANSFUN.E99.A.2218","DOIUrl":"https://doi.org/10.1587/TRANSFUN.E99.A.2218","url":null,"abstract":"In the field of computer science, the network reliability problem for evaluating the network failure probability has been extensively investigated. For a given undirected graph G, the network failure probability is the probability that edge failures (i.e., edge erasures) make G unconnected. Edge failures are assumed to occur independently with the same probability. The main contributions of the present paper are the upper and lower bounds on the expected network failure probability. We herein assume a simple random graph ensemble that is closely related to the Erdos-Rényi random graph ensemble. These upper and lower bounds exhibit the typical behavior of the network failure probability. The proof is based on the fact that the cutset space of G is a linear space over F2 spanned by the incident matrix of G. The present study shows a close relationship between the ensemble analysis of the expected network failure probability and the ensemble analysis of the average weight distribution of LDGM codes with column weight 2.","PeriodicalId":369382,"journal":{"name":"2012 International Symposium on Information Theory and its Applications","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117344736","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On two strong converse theorems for discrete memoryless channels","authors":"Y. Oohama","doi":"10.1587/TRANSFUN.E98.A.2471","DOIUrl":"https://doi.org/10.1587/TRANSFUN.E98.A.2471","url":null,"abstract":"In 1973, Arimoto proved the strong converse theorem for the discrete memoryless channels stating that when transmission rate R is above channel capacity C, the error probability of decoding goes to one as the block length n of code word tends to infinity. He proved the theorem by deriving the exponent function of error probability of correct decoding that is positive if and only if R >; C. Subsequently, in 1979, Dueck and Körner determined the optimal exponent of correct decoding. Arimoto's bound has been said to be equal to the bound of Dueck and Körner. However its rigorous proof has not been presented so far. In this paper we give a rigorous proof of the equivalence of Arimoto's bound to that of Dueck and Körner.","PeriodicalId":369382,"journal":{"name":"2012 International Symposium on Information Theory and its Applications","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123509272","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}