{"title":"Fast computation of Gröbner bases of ideals of F[x, y]","authors":"Yindong Chen, Yao Lu, Peizhong Lu","doi":"10.1109/ISIT.2009.5205791","DOIUrl":"https://doi.org/10.1109/ISIT.2009.5205791","url":null,"abstract":"This paper provides a fast algorithm for Gröbner bases of ideals of F[x, y] over a field F. We show that only the S-polynomials of neighbor pairs of a strictly ordered finite generating set are needed in the computing of a Gröbner bases of the ideal. It reduces dramatically the number of unnecessary S-polynomials that are processed. Although the complexity of the algorithm is hard to evaluated, it obviously has a great improvement from Buchberger's Algorithm.","PeriodicalId":412925,"journal":{"name":"2009 IEEE International Symposium on Information Theory","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115856146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Gray-Wyner network with a limited-rate helper to the encoder and decoders","authors":"Lei Zhao, H. Permuter","doi":"10.1109/ISIT.2009.5205985","DOIUrl":"https://doi.org/10.1109/ISIT.2009.5205985","url":null,"abstract":"In this paper, the Gray-Wyner network with a limited-rate helper is investigated. The helper sends a common message to the encoder and the decoders. We characterize the complete rate region. Successive refinement with a limited-rate helper is treated as a special case. The rate region for a Gaussian source with squared error distortions is explicitly calculated.","PeriodicalId":412925,"journal":{"name":"2009 IEEE International Symposium on Information Theory","volume":"141 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116051503","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A polynomial-time construction of self-orthogonal codes and applications to quantum error correction","authors":"M. Hamada","doi":"10.1109/ISIT.2009.5205647","DOIUrl":"https://doi.org/10.1109/ISIT.2009.5205647","url":null,"abstract":"A polynomial-time construction of a sequence of self-orthogonal geometric Goppa codes attaining the Tsfasman-Vlăduţ-Zink (TVZ) bound is presented. The issue of constructing such a code sequence was addressed in a context of constructing quantum error-correcting codes (Ashikhmin et al., 2001). Naturally, the obtained construction has implications on quantum error-correcting codes. In particular, the best known asymptotic lower bounds on the largest minimum distance of polynomially constructible quantum error-correcting codes are improved.","PeriodicalId":412925,"journal":{"name":"2009 IEEE International Symposium on Information Theory","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123571922","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Separate network coding for private and common messages from one source to two sinks","authors":"Kunihiko Harada, Hirosuke Yamamoto","doi":"10.1109/ISIT.2009.5205748","DOIUrl":"https://doi.org/10.1109/ISIT.2009.5205748","url":null,"abstract":"Ngai-Yeung and Erez-Feder independently derived the capacity region of network coding with a single source and two sinks, in which a common message is sent from the source to both sinks but each private message is sent to only the corresponding sink. In this paper, it is shown that the above capacity region can be achieved by separate linear coding such that three routes of private and common messages are perfectly separated. This means that each private message can be sent to the corresponding sink only by routing while the common message can be sent to both sinks by a relatively simple multicast linear network code.","PeriodicalId":412925,"journal":{"name":"2009 IEEE International Symposium on Information Theory","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124676874","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A differential equation method to derive the formulas of the T-complexity and the LZ-complexity","authors":"K. Hamano, Hirosuke Yamamoto","doi":"10.1109/ISIT.2009.5205702","DOIUrl":"https://doi.org/10.1109/ISIT.2009.5205702","url":null,"abstract":"It is shown that the T-complexity can be derived from a differential equation which represents how average codeword length increases by the T-augmentation. Furthermore, the proposed differential equation method can be applied to the LZ-complexity in the same way. This new approach is simple, and the obtained expressions coincide with the ones in previous studies.","PeriodicalId":412925,"journal":{"name":"2009 IEEE International Symposium on Information Theory","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124718468","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Application of joint source-relay scheduling to cooperative multiple access channels","authors":"Z. Ding, D. Goeckel, K. Leung, D. Towsley","doi":"10.1109/ISIT.2009.5206073","DOIUrl":"https://doi.org/10.1109/ISIT.2009.5206073","url":null,"abstract":"In this paper, we propose a novel spectrally efficient cooperative transmission protocol for multiple access scenarios. Different to some existing cooperative multiple access schemes, the proposed scheme can exploit the availability of relays as an extra dimension to increase reception robustness. By carefully scheduling the multiple sources and relays' transmission, a source with a poor connection to the destination can have higher priority to obtain better help from relays. As a result, the full diversity gain can be achievable for each user although only a fraction of the all relays is scheduled to help him. An achievable diversity-multiplexing tradeoff (DMT) is developed for the proposed transmission protocol to assist performance evaluation. With a large number of relays, the DMT achieved by the proposed scheme can approximate the optimal multiple-input single-input upper bound. Both analytical and numerical results show that the proposed protocol can outperform comparative schemes in most conditions.","PeriodicalId":412925,"journal":{"name":"2009 IEEE International Symposium on Information Theory","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122961157","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimal quantization of random measurements in compressed sensing","authors":"John Z. Sun, Vivek K Goyal","doi":"10.1109/ISIT.2009.5205695","DOIUrl":"https://doi.org/10.1109/ISIT.2009.5205695","url":null,"abstract":"Quantization is an important but often ignored consideration in discussions about compressed sensing. This paper studies the design of quantizers for random measurements of sparse signals that are optimal with respect to mean-squared error of the lasso reconstruction. We utilize recent results in high-resolution functional scalar quantization and homotopy continuation to approximate the optimal quantizer. Experimental results compare this quantizer to other practical designs and show a noticeable improvement in the operational distortion-rate performance.","PeriodicalId":412925,"journal":{"name":"2009 IEEE International Symposium on Information Theory","volume":"315 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122987127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Negacyclic MDS codes over GR(2a,m)","authors":"Shixin Zhu, X. Kai, Ping Li","doi":"10.1109/ISIT.2009.5205253","DOIUrl":"https://doi.org/10.1109/ISIT.2009.5205253","url":null,"abstract":"Using Reed-Solomon codes and cyclic MDS codes of length 2<sup>m</sup> + 1 over F<inf>2m</inf>, we obtain several classes of negacyclic MDS codes over GR(2<sup>a</sup>,m) of lengths 2<sup>m</sup> − 1 and 2<sup>m</sup> + 1 as analogues of Hensel lifts of these codes.","PeriodicalId":412925,"journal":{"name":"2009 IEEE International Symposium on Information Theory","volume":"691 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123296115","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Capacity and error exponent analysis of multilevel coding with multistage decoding","authors":"A. Ingber, M. Feder","doi":"10.1109/ISIT.2009.5205311","DOIUrl":"https://doi.org/10.1109/ISIT.2009.5205311","url":null,"abstract":"The capacity and random coding error exponent of multilevel coding (MLC) with multistage decoding (MSD) are analyzed. General discrete memoryless channels with arbitrary input distributions are considered. The capacities of MLC with maximum likelihood decoding and with MSD are calculated, and it is shown that using MLC may result in loss in the achievable rate for reliable communication. Necessary and sufficient conditions for the rate loss to be zero are derived. A new random coding error exponent is derived for MLC with MSD. For the special case of uniform inputs, the new error exponent can be easily calculated by its inverse function, which is given by the sum of the inverse error exponents of the conditional sub-channels.","PeriodicalId":412925,"journal":{"name":"2009 IEEE International Symposium on Information Theory","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122155382","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of multiple-unicast throughput in finite-buffer Delay-Tolerant Networks","authors":"R. Subramanian, F. Fekri","doi":"10.1109/ISIT.2009.5205792","DOIUrl":"https://doi.org/10.1109/ISIT.2009.5205792","url":null,"abstract":"The problem of computing the throughput capacity of general unicast in a Delay-Tolerant Network under the finite-buffer regime is addressed in this paper. A sparse mobile wireless network deployed on an M × M square-grid is considered, wherein m unique mobile source/destination pairs communicate with the aid of n mobile relay nodes using the store, carry, and forward paradigm. Each mobile relay node is equipped with a finite storage. Thus, several source/destination pairs contend for limited network resources. Under this setup, the throughput achieved per source-destination pair at steady-state node-mobility is analyzed, incorporating practical considerations such as node-to-node contention and finite communication range, for a class of two-hop relay protocols. In addition, two different approaches for buffer management are considered. The paper shows that, using a novel approach based on embedded Markov-chains, accurate analysis of the throughput can be achieved for the above model, as it is validated by simulations. A significant conclusion of this work is that considerable throughput improvements can be achieved by judicially managing the relay-node buffer-space.","PeriodicalId":412925,"journal":{"name":"2009 IEEE International Symposium on Information Theory","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121543359","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}