{"title":"Exact erasure channel density evolution for protograph-based generalized LDPC codes","authors":"M. Lentmaier, M. Tavares, G. Fettweis","doi":"10.1109/ISIT.2009.5205688","DOIUrl":"https://doi.org/10.1109/ISIT.2009.5205688","url":null,"abstract":"We derive explicit density evolution equations for protograph-based generalized LDPC codes on the binary erasure channel. They are obtained from an analysis of multi-dimensional input/output transfer functions of the component decoders. Belief propagation decoding with optimal component APP decoders is considered. Based on the resulting transfer functions, a threshold analysis is performed for some protograph examples.","PeriodicalId":412925,"journal":{"name":"2009 IEEE International Symposium on Information Theory","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123868950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"New decoding algorithms for a class of subsystem codes and generalized shor codes","authors":"P. Sarvepalli, A. Klappenecker, M. Rötteler","doi":"10.1109/ISIT.2009.5205650","DOIUrl":"https://doi.org/10.1109/ISIT.2009.5205650","url":null,"abstract":"In this paper we give new decoding algorithms for the generalized Shor codes and a class of subsystem codes due to Bacon and Casaccino. Our interest in these codes stems from the fact these codes can allow us to construct quantum codes from non-dual containing codes. In this paper we show how to decode these codes efficiently.","PeriodicalId":412925,"journal":{"name":"2009 IEEE International Symposium on Information Theory","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123903212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Information embedding with reversible stegotext","authors":"O. Sumszyk, Y. Steinberg","doi":"10.1109/ISIT.2009.5205855","DOIUrl":"https://doi.org/10.1109/ISIT.2009.5205855","url":null,"abstract":"Information embedding is the transmission of an independent data embedded into a host signal via a noisy channel. Reversible information embedding (RIE) extends this model by adding the requirement of decoding the host signal. In some applications however, this requirement is too strong. For example, if the user is interested in decoding the data and further transmitting the stegotext, i.e. the result of the embedding of independent data into the host, then full decoding of the host is not needed, only re-production of the stegotext. This work expands the study of information embedding channels by adding the requirement of retrieving the stegotext at the destination. A single-letter characterization of the achievable rate-distortion region is developed. In particular, it is shown that a rate higher than the RIE rate can be achieved, under the (more relaxed) requirement of stegotext decoding. Two examples are solved, and an iterative algorithm that computes numerically the capacity is provided.","PeriodicalId":412925,"journal":{"name":"2009 IEEE International Symposium on Information Theory","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125192925","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The delay region for P2P file transfer","authors":"Yunnan Wu, Y. C. Hu, Jin Li, P. Chou","doi":"10.1109/ISIT.2009.5205610","DOIUrl":"https://doi.org/10.1109/ISIT.2009.5205610","url":null,"abstract":"Motivated by P2P file transfer applications (e.g., BitTorrent) on the Internet, this paper considers the problem of delivering a file from a server to multiple receivers in a P2P network. Each receiver has an associated delay in receiving the file. We aim at understanding the optimal delay region, i.e., the set of all possible delay vectors that can be achieved. Previous work has addressed the problem of delivering the file to all receivers in minimum amount of time (equivalently, minimizing the maximum delay to the receivers), assuming peer uplinks are the only bottleneck in the network. This paper shows that it is in fact possible to significantly reduce the average delay at a slight increase in the maximum delay. Moreover, given an order at which the receivers finish downloading, the optimal delay region is characterized by a system of linear inequalities. Any point in the optimal delay region can be achieved by linear network coding. We also propose a simple routing scheme that has near-optimal empirical performance.","PeriodicalId":412925,"journal":{"name":"2009 IEEE International Symposium on Information Theory","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125365405","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Influence in a large society: Interplay between information dynamics and network structure","authors":"L. Dolecek, D. Shah","doi":"10.1109/ISIT.2009.5205820","DOIUrl":"https://doi.org/10.1109/ISIT.2009.5205820","url":null,"abstract":"Motivated by the recent emergence of large online social networks, we seek to understand the effects the underlying social network (graph) structure and the information dynamics have on the creation of influence of an individual. We examine a natural model for information dynamics under two important temporal scales: a first impression setting and a long— term or equilibrated setting. We obtain a characterization of relevant network structures under these temporal aspects, thereby allowing us to formalize the existence of influential agents. Specifically, we find that the existence of an influential agent corresponds to: (a) strictly positive information theoretic capacity over an infinite-sized noisy broadcast tree network in the first impression case, and (b) positive recurrent property of an appropriate (countable state space) Markov chain in the long-term case. As an application of our results, we evaluate the parameter space of the popular “small world” network model to identify when the network structure supports the existence of influential agents.","PeriodicalId":412925,"journal":{"name":"2009 IEEE International Symposium on Information Theory","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129845268","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Power-constrained communications using LDLC lattices","authors":"J. Dauwels, Hans-Andrea Loeliger, B. Kurkoski","doi":"10.1109/ISIT.2009.5205635","DOIUrl":"https://doi.org/10.1109/ISIT.2009.5205635","url":null,"abstract":"An explicit code construction for using low-density lattice codes (LDLC) on the constrained power AWGN channel is given. LDLC lattices can be decoded in high dimension, so that the code relies on the Euclidean distance between codepoints. A sublattice of the coding lattice is used for code shaping. Lattice codes are designed using the continuous approximation, which allows separating the contribution of the shaping region and coding lattice to the total transmit power. Shaping and lattice decoding are both performed using a belief-propagation decoding algorithm. At a rate of 3 bits per dimension, a dimension 100 code which is 3.6 dB from the sphere bound is found.","PeriodicalId":412925,"journal":{"name":"2009 IEEE International Symposium on Information Theory","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130256692","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multiplicity assignments for algebraic soft-decoding of Reed-Solomon codes using the method of types","authors":"Hirakendu Das, A. Vardy","doi":"10.1109/ISIT.2009.5205964","DOIUrl":"https://doi.org/10.1109/ISIT.2009.5205964","url":null,"abstract":"The probability of error in the Koetter-Vardy algebraic soft-decoding algorithm for Reed-Solomon codes is determined by the multiplicity assignment scheme used. A multiplicity assignment scheme converts the reliability matrix Π, consisting of the probabilities observed at the channel output, into a multiplicity matrix M that specifies the algebraic interpolation conditions. Using the method of types, Sanov's theorem in particular, we obtain tight exponential bounds on the probability of decoding error for a given multiplicity matrix. These bounds turn out to be essentially the same as the Chernoff bound. We establish several interesting properties of the multiplicity matrix M† which minimizes the exponent of the probability of error. Based on these observations, we develop a low-complexity multiplicity assignment scheme which uses nested bisection to solve for M†. This scheme provides the same probability of error as a known scheme based upon the Chernoff bound, but with much lower complexity. We also derive a simple condition on the reliability matrix Π which guarantees an exponentially small probability of error. This condition is akin to an error-correction radius, and can be used to study the performance of algebraic soft-decoding.","PeriodicalId":412925,"journal":{"name":"2009 IEEE International Symposium on Information Theory","volume":"148 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128864795","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On the DMT of bidirectional relaying with limited feedback","authors":"Thanh Tùng Kim, H. Poor","doi":"10.1109/ISIT.2009.5205609","DOIUrl":"https://doi.org/10.1109/ISIT.2009.5205609","url":null,"abstract":"Several half-duplex decode-and-forward two-way relaying protocols that efficiently exploit quantized channel state information (CSI) at the transmitters (CSIT) are investigated. Adapting the number of channel uses for each relaying phase and the transmit power based on limited CSIT is shown to result in a significant improvement in the diversity-multiplexing tradeoff (DMT). With CSI feedback from relay to sources, allocating the number of channel uses is sufficient to match the performance of power allocation. However, power control is instrumental to efficiently exploit CSI feedback from sources to relay.","PeriodicalId":412925,"journal":{"name":"2009 IEEE International Symposium on Information Theory","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121894612","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"New sum-rate upper bound for the two-user Gaussian interference channel","authors":"R. Etkin","doi":"10.1109/ISIT.2009.5205991","DOIUrl":"https://doi.org/10.1109/ISIT.2009.5205991","url":null,"abstract":"A new upper bound for the sum-capacity of the two-user complex Gaussian interference channel is derived. The bound is based on genies that provide side information signals to the receivers. Various parameters are introduced to control the side information, which can be optimized to get the tightest possible bound. The new bound improves the performance of the best known bounds for sufficiently small cross-gains.","PeriodicalId":412925,"journal":{"name":"2009 IEEE International Symposium on Information Theory","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121984533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Minimum description length and clustering with exemplars","authors":"Po-Hsiang Lai, J. O’Sullivan, Robert Pless","doi":"10.1109/ISIT.2009.5205937","DOIUrl":"https://doi.org/10.1109/ISIT.2009.5205937","url":null,"abstract":"We propose an information-theoretic clustering framework for density-based clustering and similarity or distance-based clustering with objective functions of clustering performance derived from stochastic complexity and minimum description length (MDL) arguments. Under this framework, the number of clusters and parameters can be determined in a principled way without prior knowledge from users. We show that similarity-based clustering can be viewed as combinatorial optimization on graphs. We propose two clustering algorithms, one of which relies on a minimum arborescence tree algorithm which returns optimal clustering under the proposed MDL objective function for similarity-based clustering. We demonstrate clustering performance on synthetic data.","PeriodicalId":412925,"journal":{"name":"2009 IEEE International Symposium on Information Theory","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121092336","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}