2009 IEEE International Symposium on Information Theory最新文献

筛选
英文 中文
Stopping set analysis of repeat multiple-accumulate codes 重复多重累积码的停集分析
2009 IEEE International Symposium on Information Theory Pub Date : 2009-06-28 DOI: 10.1109/ISIT.2009.5205334
E. Rosnes, A. G. Amat
{"title":"Stopping set analysis of repeat multiple-accumulate codes","authors":"E. Rosnes, A. G. Amat","doi":"10.1109/ISIT.2009.5205334","DOIUrl":"https://doi.org/10.1109/ISIT.2009.5205334","url":null,"abstract":"In this work, we consider a stopping set analysis of repeat multiple-accumulate (RMA) code ensembles formed by the serial concatenation of a repetition code with multiple accumulators. The RMA codes are assumed to be iteratively decoded in a constituent code oriented fashion using maximum a posteriori erasure correction in the constituent codes. We give stopping set enumerators for RMA code ensembles and show that their stopping distance hmin, defined as the size of the smallest nonempty stopping set, asymptotically grows linearly with the block length. Thus, the RMA code ensembles are good for the binary erasure channel. Furthermore, it is shown that, contrary to the asymptotic minimum distance dmin, whose growth rate coefficient increases with the number of accumulate codes, the hmin growth rate coefficient diminishes with the number of accumulators. We also consider random puncturing and show that for sufficiently high code rates, the asymptotic hmin does not grow linearly with the block length, contrary to the asymptotic dmin, whose growth rate coefficient approaches the Gilbert-Varshamov bound as the rate increases. Finally, we give iterative decoding thresholds to show the convergence properties.","PeriodicalId":412925,"journal":{"name":"2009 IEEE International Symposium on Information Theory","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133997720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Searching for high-rate convolutional codes via binary syndrome trellises 利用二进制综合征格架搜索高速率卷积码
2009 IEEE International Symposium on Information Theory Pub Date : 2009-06-28 DOI: 10.1109/ISIT.2009.5205916
F. Hug, I. Bocharova, R. Johannesson, B. Kudryashov
{"title":"Searching for high-rate convolutional codes via binary syndrome trellises","authors":"F. Hug, I. Bocharova, R. Johannesson, B. Kudryashov","doi":"10.1109/ISIT.2009.5205916","DOIUrl":"https://doi.org/10.1109/ISIT.2009.5205916","url":null,"abstract":"Rate R = (c-1)/c convolutional codes of constraint length ν can be represented by conventional syndrome trellises with a state complexity of s = ν or by binary syndrome trellises with a state complexity of s = ν or s = ν + 1, which corresponds to at most 2s states at each trellis level. It is shown that if the parity-check polynomials fulfill certain conditions, there exist binary syndrome trellises with optimum state complexity s = ν. The BEAST is modified to handle parity-check matrices and used to generate code tables for optimum free distance rate R = (c - 1)=c, c = 3; 4; 5, convolutional codes for conventional syndrome trellises and binary syndrome trellises with optimum state complexity. These results show that the loss in distance properties due to the optimum state complexity restriction for binary trellises is typically negligible.","PeriodicalId":412925,"journal":{"name":"2009 IEEE International Symposium on Information Theory","volume":"32 50","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131806242","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Binary erasure multiple descriptions: Worst-case distortion 二进制擦除多重描述:最坏情况失真
2009 IEEE International Symposium on Information Theory Pub Date : 2009-06-28 DOI: 10.1109/ISIT.2009.5205730
E. Ahmed, A. Wagner
{"title":"Binary erasure multiple descriptions: Worst-case distortion","authors":"E. Ahmed, A. Wagner","doi":"10.1109/ISIT.2009.5205730","DOIUrl":"https://doi.org/10.1109/ISIT.2009.5205730","url":null,"abstract":"We consider a binary erasure version of the n-channel multiple descriptions problem with no excess rate and no distortion for every k out of n descriptions, i.e., any subset of k messages has a total rate of one and allows for perfect reconstruction of the source. Using a worst-case distortion criterion, we present an explicit coding scheme based on Reed-Solomon codes and, for any n and k, characterize its achievable distortion region when m ≪ k messages are received at the decoder. We prove that this scheme is Pareto optimal in the achievable distortions for all n and k for any number of received messages at the decoder, and is optimal for all n and k when a single message is received. We also provide optimality results for a certain range of values of n and k.","PeriodicalId":412925,"journal":{"name":"2009 IEEE International Symposium on Information Theory","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134278081","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Demultiplexer design for multi-edge type LDPC coded modulation 多边型LDPC编码调制的解复用器设计
2009 IEEE International Symposium on Information Theory Pub Date : 2009-06-28 DOI: 10.1109/ISIT.2009.5205587
J. Lei, Wen Gao, P. Spasojevic, R. Yates
{"title":"Demultiplexer design for multi-edge type LDPC coded modulation","authors":"J. Lei, Wen Gao, P. Spasojevic, R. Yates","doi":"10.1109/ISIT.2009.5205587","DOIUrl":"https://doi.org/10.1109/ISIT.2009.5205587","url":null,"abstract":"Generally, the capacity-achieving signaling design for a specific channel should consider the joint optimization of channel coding and modulation. Nevertheless, coding theorists and practitioners have recognized that a well-designed LDPC code can achieve capacity-approaching performance universally across a range of data transmission and storage channels. A pronounced example is the forward error correction scheme adopted recently by the second generation standards for digital video broadcasting (DVB), wherein the same LDPC codes are expected to be reused over satellite, terrestrial and cable channels. However, to accommodate the spectral efficiency of different channel type, the coded bits should be mapped to the modulator judiciously. The well-known BICM strategy employs a large random bit interleaver, which typically yields good performance for an arbitrary choice of constellation mapper. However, it is problematic for high-speed coding and modulation due to the large amount of memory and circuits routing required. This motivates us to impose structural simplicity on the bit interleaver configuration so that the coded bits are de-multiplexed systematically into parallel groups to feed the constellation mapper. In this paper, we focus on the design of bit demultiplexers for multi-level modulations by applying the framework of multi-edge type (MET) LDPC. Since the channel-dependence of a given code ensemble is dominated by the mutual information between the input and output of the effective channel, we propose to simplify the analysis of the decoding behavior by using a set of surrogate binary erasure channels (BEC). Simulation results indicate that the proposed bit demultiplexer surpasses the performance of the heuristic interleaving strategy specified in second generation DVB standard for terrestrial channels (DVB-T2).","PeriodicalId":412925,"journal":{"name":"2009 IEEE International Symposium on Information Theory","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134393047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Optimized rate allocation for state estimation over noisy channels 噪声信道上状态估计的优化速率分配
2009 IEEE International Symposium on Information Theory Pub Date : 2009-06-28 DOI: 10.1109/ISIT.2009.5205891
Lei Bao, M. Skoglund, C. Fischione, K. Johansson
{"title":"Optimized rate allocation for state estimation over noisy channels","authors":"Lei Bao, M. Skoglund, C. Fischione, K. Johansson","doi":"10.1109/ISIT.2009.5205891","DOIUrl":"https://doi.org/10.1109/ISIT.2009.5205891","url":null,"abstract":"Optimal rate allocation in a networked control system with limited communication resources is instrumental to achieve satisfactory overall performance. In this paper, a practical rate allocation technique for state estimation in linear dynamic systems over a noisy channel is proposed. The method consists of two steps: (i) the overall distortion is expressed as a function of rates at all time instants by means of high-rate quantization theory, and (ii) a constrained optimization problem to minimize the overall distortion is solved by using Lagrange duality. Monte Carlo simulations illustrate the proposed scheme, which is shown to have good performance when compared to arbitrarily selected rate allocations.","PeriodicalId":412925,"journal":{"name":"2009 IEEE International Symposium on Information Theory","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134274857","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Opportunistic interference management 机会干扰管理
2009 IEEE International Symposium on Information Theory Pub Date : 2009-06-28 DOI: 10.1109/ISIT.2009.5205335
Nilesh Khude, V. Prabhakaran, P. Viswanath
{"title":"Opportunistic interference management","authors":"Nilesh Khude, V. Prabhakaran, P. Viswanath","doi":"10.1109/ISIT.2009.5205335","DOIUrl":"https://doi.org/10.1109/ISIT.2009.5205335","url":null,"abstract":"Interference is a central feature of the wireless channel. However, in many cases, the interferer's activity can be bursty and it is overly pessimistic to assume that interference is always present. In this paper, we use a degraded message set formulation of the two-user interference channel to study the statistical gains that can be harnessed from bursty interference. We consider a linear deterministic model of the Gaussian interference channel and characterize the degraded message set capacity region.","PeriodicalId":412925,"journal":{"name":"2009 IEEE International Symposium on Information Theory","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115711198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
On networks with side information 在有附带信息的网络上
2009 IEEE International Symposium on Information Theory Pub Date : 2009-06-28 DOI: 10.1109/ISIT.2009.5205925
A. Cohen, A. Avestimehr, M. Effros
{"title":"On networks with side information","authors":"A. Cohen, A. Avestimehr, M. Effros","doi":"10.1109/ISIT.2009.5205925","DOIUrl":"https://doi.org/10.1109/ISIT.2009.5205925","url":null,"abstract":"In this paper, we generalize the lossless coded side information problem from the three-node network of Ahlswede and Körner to more general network scenarios. We derive inner and outer bounds on the achievable rate region in the general network scenario and show that they are tight for some families of networks. Our approach demonstrates how solutions to canonical source coding problems can be used to derive bounds for more complex networks and reveals an interesting connection between networks with side information, successive refinement, and network coding.","PeriodicalId":412925,"journal":{"name":"2009 IEEE International Symposium on Information Theory","volume":"289 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114200192","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
On the convergence of iterative belief propagation 关于迭代信念传播的收敛性
2009 IEEE International Symposium on Information Theory Pub Date : 2009-06-28 DOI: 10.1109/ISIT.2009.5205780
A. Heim, U. Sorger
{"title":"On the convergence of iterative belief propagation","authors":"A. Heim, U. Sorger","doi":"10.1109/ISIT.2009.5205780","DOIUrl":"https://doi.org/10.1109/ISIT.2009.5205780","url":null,"abstract":"The convergence of iterative decoding schemes utilizing belief propagation is considered. A quantitative bound for the output L-values of a Turbo decoder is given that only depends on the received word and thus is independent from the decoder iterations. Further, it is shown that the exponential increase of the L-values in each iteration within an LDPC decoder is limited by the degree of the variable nodes.","PeriodicalId":412925,"journal":{"name":"2009 IEEE International Symposium on Information Theory","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114602857","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Signal combining for relay transmission with rateless codes 用无速率码中继传输的信号合并
2009 IEEE International Symposium on Information Theory Pub Date : 2009-06-28 DOI: 10.1109/ISIT.2009.5205721
Azad Ravanshid, L. Lampe, J. Huber
{"title":"Signal combining for relay transmission with rateless codes","authors":"Azad Ravanshid, L. Lampe, J. Huber","doi":"10.1109/ISIT.2009.5205721","DOIUrl":"https://doi.org/10.1109/ISIT.2009.5205721","url":null,"abstract":"The invention of practical rateless codes in the form of Luby transform and Raptor codes has facilitated the implementation of decode-and-forward relaying schemes which permit the relay to autonomously switch between listening and collaboration phase. Considering the classical three-node relay network employing such a flexible decode-and-forward mechanism, in this paper we investigate signal combining strategies for the destination node. In particular, we compare information and energy combining considered previously in the literature and introduce a new, so-called mixed combining scheme, which is a hybrid of the two former strategies. Assuming general finite-size signal constellations we show that mixed combining is advantageous over the pure combining schemes in terms of achievable rate given the same total transmit energy. A comparison of the associated constellation-constrained capacities with simulated rates achieved for relay transmission with moderate-length Raptor codes underscores (i) the relevance of the capacity-based analysis and (ii) the suitability of rateless codes for relay transmission.","PeriodicalId":412925,"journal":{"name":"2009 IEEE International Symposium on Information Theory","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114690312","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Distance-increasing mappings from binary vectors to constant composition vectors 从二进制向量到常量组合向量的距离递增映射
2009 IEEE International Symposium on Information Theory Pub Date : 2009-06-28 DOI: 10.1109/ISIT.2009.5206023
Jen-Chun Chang, H. Wu
{"title":"Distance-increasing mappings from binary vectors to constant composition vectors","authors":"Jen-Chun Chang, H. Wu","doi":"10.1109/ISIT.2009.5206023","DOIUrl":"https://doi.org/10.1109/ISIT.2009.5206023","url":null,"abstract":"A distance-preserving mapping is a one-to-one function f from p-ary vectors of length m to q-ary vectors of length n such that any two distinct p-ary vectors are mapped to two different q-ary vectors with an equal or greater Hamming distance. A special distance-preserving mapping called a distance-increasing mapping is a mapping which increases the distance at least one if the distance of two distinct input strings are not equal to the output length. A constant composition vector is a vector under the restriction that each alphabet symbol occurs a given number of times. In this paper, we propose a distance-increasing mapping from binary vectors to constant composition quaternary vectors. We also give an optimal impossibility result for constructing distance-preserving mapping from binary vectors to constant composition ternary vectors in the so-called swapping model.","PeriodicalId":412925,"journal":{"name":"2009 IEEE International Symposium on Information Theory","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116744449","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信