Proceedings. 2001 IEEE International Symposium on Information Theory (IEEE Cat. No.01CH37252)最新文献

筛选
英文 中文
Spatial communication capacity based on electromagnetic wave equations 基于电磁波方程的空间通信容量
J. Hui, C. Bi, Hongxia Sun
{"title":"Spatial communication capacity based on electromagnetic wave equations","authors":"J. Hui, C. Bi, Hongxia Sun","doi":"10.1109/ISIT.2001.936200","DOIUrl":"https://doi.org/10.1109/ISIT.2001.936200","url":null,"abstract":"We study directly the geometric properties of electromagnetic waves to derive the channel capacity of multiple antenna systems. Spatial system transfer functions and spatial sampling theory are used, instead of the usual independent and complex Gaussian assumption.","PeriodicalId":433761,"journal":{"name":"Proceedings. 2001 IEEE International Symposium on Information Theory (IEEE Cat. No.01CH37252)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121210395","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
On interleaver design for serially concatenated convolutional codes 串级卷积码的交织器设计
Ralph Höst, Stefan Johannesson, Ralph Jordan
{"title":"On interleaver design for serially concatenated convolutional codes","authors":"Ralph Höst, Stefan Johannesson, Ralph Jordan","doi":"10.1109/ISIT.2001.936075","DOIUrl":"https://doi.org/10.1109/ISIT.2001.936075","url":null,"abstract":"Serially concatenated convolutional codes are considered. The free distance of this construction is shown to be lower-bounded by the product of the free distances of the outer and inner codes, if the precipices of the interleaver are sufficiently large. It is shown how to construct a convolutional scrambler with a given precipice.","PeriodicalId":433761,"journal":{"name":"Proceedings. 2001 IEEE International Symposium on Information Theory (IEEE Cat. No.01CH37252)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121322253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Output distributions of lossless encoders with side information 带有侧信息的无损编码器的输出分布
J. Muramatsu, H. Koga, T. Mukouchi
{"title":"Output distributions of lossless encoders with side information","authors":"J. Muramatsu, H. Koga, T. Mukouchi","doi":"10.1109/ISIT.2001.936079","DOIUrl":"https://doi.org/10.1109/ISIT.2001.936079","url":null,"abstract":"We present that the output distribution of lossless source encoders with correlated side information is asymptotically independent of the side information. Based on this, we can construct a random number generator that produces mutually asymptotically independent random sequences from random sequences emitted from correlated sources.","PeriodicalId":433761,"journal":{"name":"Proceedings. 2001 IEEE International Symposium on Information Theory (IEEE Cat. No.01CH37252)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125162281","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
On the undetected error probability for binary codes 关于二进制代码未检测到的错误概率
Fang-Wei Fu, T. Kløve, V. Wei
{"title":"On the undetected error probability for binary codes","authors":"Fang-Wei Fu, T. Kløve, V. Wei","doi":"10.1109/ISIT.2001.936017","DOIUrl":"https://doi.org/10.1109/ISIT.2001.936017","url":null,"abstract":"In this paper, the undetected error probability for binary codes is studied. A new proof of Abdel-Ghaffar's (see IEEE Trans. Inform. Theory, vol.43, no.5, p.1489-1502, Sept. 1997) lower bound on the undetected error probability is presented. Further, a lower bound for the binomial moments of the distance distribution of binary constant weight codes is derived, and this yields a lower bound on the undetected error probability for binary constant weight codes. Finally, a lower bound on the undetected error probability of binary linear codes for single-error correction and detection of further errors is presented.","PeriodicalId":433761,"journal":{"name":"Proceedings. 2001 IEEE International Symposium on Information Theory (IEEE Cat. No.01CH37252)","volume":"56 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126022289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Spectral analysis of high order correlation immune functions 高阶相关免疫功能的频谱分析
Y. Tarannikov, D. Kirienko
{"title":"Spectral analysis of high order correlation immune functions","authors":"Y. Tarannikov, D. Kirienko","doi":"10.1109/ISIT.2001.935932","DOIUrl":"https://doi.org/10.1109/ISIT.2001.935932","url":null,"abstract":"We consider F/sub 2//sup n/, the vector space of n-tuples of elements from F/sub 2/. An n-variable Boolean function is a map from F/sub 2//sup n/ into F/sub 2/. The weight of a vector x is the number of ones in x and is denoted by |x|. The weight wt(f) of a function f on F/sub 2//sup n/ is the number of vectors x on F/sub 2//sup n/ such that f(x)=1. A function f is said to be balance if wt(f)=wt(f/spl oplus/1)=2/sup n-1/. A subfunction of the Boolean function f is a function f/spl acute/ obtained by substituting some constants for some variables in f.","PeriodicalId":433761,"journal":{"name":"Proceedings. 2001 IEEE International Symposium on Information Theory (IEEE Cat. No.01CH37252)","volume":"171 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126131230","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Sphere-covering and measure concentration as source coding theorems 作为源编码定理的球覆盖和测度浓度
Ioannis Kontoyiannis
{"title":"Sphere-covering and measure concentration as source coding theorems","authors":"Ioannis Kontoyiannis","doi":"10.1109/ISIT.2001.936031","DOIUrl":"https://doi.org/10.1109/ISIT.2001.936031","url":null,"abstract":"We state and solve a general version of the rate-distortion problem. We show that its answer contains, as corollaries: (i) Stein's lemma in hypothesis testing; (ii) Shannon's (1959) lossy source coding theorem; and (iii) new converses to measure-concentration inequalities.","PeriodicalId":433761,"journal":{"name":"Proceedings. 2001 IEEE International Symposium on Information Theory (IEEE Cat. No.01CH37252)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115085167","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On Gallager-type bounds for the mismatched decoding regime with applications to turbo codes 不匹配译码的gallager型边界及其在turbo码中的应用
I. Sason, S. Shamai
{"title":"On Gallager-type bounds for the mismatched decoding regime with applications to turbo codes","authors":"I. Sason, S. Shamai","doi":"10.1109/ISIT.2001.935997","DOIUrl":"https://doi.org/10.1109/ISIT.2001.935997","url":null,"abstract":"The generalized Duman & Salehi (see IEEE Trans. on Communications, vol.46, no.6, p.717-23, 1998) bound is used in the realm of mismatch decoding metric for random and deterministic codes. In the random coding case with a proper restriction of the random ensemble, the technique reconstructs the Csizar-Korner-Hui lower bound. For deterministic codes, the bound is given in terms of the distance spectrum of the code and the results are demonstrated for fading channels with an estimate of the fading channel state information.","PeriodicalId":433761,"journal":{"name":"Proceedings. 2001 IEEE International Symposium on Information Theory (IEEE Cat. No.01CH37252)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122776923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Combined turbo coding and unitary space-time modulation turbo编码与酉空时调制的组合
I. Bahceci, T. Duman
{"title":"Combined turbo coding and unitary space-time modulation","authors":"I. Bahceci, T. Duman","doi":"10.1109/ISIT.2001.935969","DOIUrl":"https://doi.org/10.1109/ISIT.2001.935969","url":null,"abstract":"We present a scheme employing turbo codes together with unitary space-time constellations for Rayleigh block fading channels when no channel state information (CSI) is available. We present via simulations that coding gains up to 16 dB is possible over the original uncoded system at a bit error rate of 10/sup -5/.","PeriodicalId":433761,"journal":{"name":"Proceedings. 2001 IEEE International Symposium on Information Theory (IEEE Cat. No.01CH37252)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122662241","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 91
On the classical capacity of a quantum multiple-access channel 量子多址信道的经典容量
G.V. Klimovitch
{"title":"On the classical capacity of a quantum multiple-access channel","authors":"G.V. Klimovitch","doi":"10.1109/ISIT.2001.936141","DOIUrl":"https://doi.org/10.1109/ISIT.2001.936141","url":null,"abstract":"We analyze the quantum adder channel, i.e. the extension of a classical multiple-access additive binary channel to the quantum regime, in which quantum bits (qubits) rather than classical bits are transmitted. Quantum entanglement between different transmitters and/or the receiver results in a significant expansion of the capacity region of the channel, in comparison with its classical counterpart, a property which can be used, e.g., to considerably improve bandwidth efficiency of fiber communication networks in the future.","PeriodicalId":433761,"journal":{"name":"Proceedings. 2001 IEEE International Symposium on Information Theory (IEEE Cat. No.01CH37252)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129477956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Sensor placement in distributed sensor networks using a coding theory framework 使用编码理论框架的分布式传感器网络中的传感器放置
K. Chakrabarty, S. Iyengar
{"title":"Sensor placement in distributed sensor networks using a coding theory framework","authors":"K. Chakrabarty, S. Iyengar","doi":"10.1109/ISIT.2001.936020","DOIUrl":"https://doi.org/10.1109/ISIT.2001.936020","url":null,"abstract":"An important issue in the design of distributed sensor networks is the optimal placement of sensors for target location. If the surveillance region, also referred to as the sensor field, is represented as a grid (two- or three-dimensional) of points (coordinates), target location refers to the problem of pin-pointing a target at a grid point at any point in time. For enhanced coverage, a large number of sensors are typically deployed in the sensor field, and if the coverage areas of multiple sensors overlap, they may all report a target in their respective zones. The precise location of the target must then be determined by examining the location of these sensors. Target location can be simplified considerably if the sensors are placed in such a way that every grid point in the sensor field is covered by a unique subset of sensors. The sensor placement problem for target location is closely related to the alarm placement problem, which refers to the problem of placing \"alarms\" on the nodes of a graph G such that a single fault in the system can be diagnosed. The alarms are therefore analogous to sensors in a sensor field. It was shown by Rao (1993) that the alarm placement problem is NP-complete for arbitrary graphs. However, for restricted topologies, e.g. a set of grid points in a sensor field, a coding theory framework can be used to efficiently determine sensor placement. The sensor locations correspond to codewords of an identifying code constructed over the grid points in the sensor field.","PeriodicalId":433761,"journal":{"name":"Proceedings. 2001 IEEE International Symposium on Information Theory (IEEE Cat. No.01CH37252)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128293534","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信