2009 43rd Annual Conference on Information Sciences and Systems最新文献

筛选
英文 中文
Sharp upper bound on error probability of exact sparsity recovery 精确稀疏恢复误差概率的尖锐上界
2009 43rd Annual Conference on Information Sciences and Systems Pub Date : 2009-03-18 DOI: 10.1109/CISS.2009.5054681
Kamiar Rahnama Rad
{"title":"Sharp upper bound on error probability of exact sparsity recovery","authors":"Kamiar Rahnama Rad","doi":"10.1109/CISS.2009.5054681","DOIUrl":"https://doi.org/10.1109/CISS.2009.5054681","url":null,"abstract":"Imagine the vector y = Xβ + ε where β ∈ ℝ<sup>m</sup> has only k non zero entries and ε ∈ R<sup>n</sup> is a Gaussian noise. This can be viewed as a linear system with sparsity constraints corrupted with noise. We find a non-asymptotic upper bound on the error probability of exact recovery of the sparsity pattern given any generic measurement matrix X. By drawing X from a Gaussian ensemble, as an example, to ensure exact recovery, we obtain asymptotically sharp sufficient conditions on n which meet the necessary conditions introduced in (Wang et al., 2008).","PeriodicalId":433796,"journal":{"name":"2009 43rd Annual Conference on Information Sciences and Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128301356","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Preliminary results in comparing the expected and observed Fisher information for maximum likelihood estimates 对最大似然估计的预期和观察费雪信息进行比较的初步结果
2009 43rd Annual Conference on Information Sciences and Systems Pub Date : 2009-03-18 DOI: 10.1109/CISS.2009.5054760
X. Cao, J. Spall
{"title":"Preliminary results in comparing the expected and observed Fisher information for maximum likelihood estimates","authors":"X. Cao, J. Spall","doi":"10.1109/CISS.2009.5054760","DOIUrl":"https://doi.org/10.1109/CISS.2009.5054760","url":null,"abstract":"Confidence intervals for the maximum likelihood estimates (MLEs) are commonly used in statistical inference. To accurately construct such confidence intervals, one typically needs to know the distribution of the MLE. Standard statistical theory says normalized MLE is asymptotically normal with mean zero and variance being a function of the Fisher Information Matrix (FIM) at the unknown parameter. Two common estimates for the variance of MLE are the observed FIM (same as Hessian of negative log-likelihood) and the expected FIM, both of which are evaluated at the MLE given sample data. We show that, under reasonable conditions, the expected FIM tends to outperform the observed FIM under a mean-squared error criterion. This result suggests that, under certain conditions, the expected FIM is a better estimate for the variance of MLE when used in confidence interval calculations.","PeriodicalId":433796,"journal":{"name":"2009 43rd Annual Conference on Information Sciences and Systems","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126433623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Using adaptive lossless compression to characterize network traffic 使用自适应无损压缩来表征网络流量
2009 43rd Annual Conference on Information Sciences and Systems Pub Date : 2009-03-18 DOI: 10.1109/CISS.2009.5054730
K. Benson, L. Marvel
{"title":"Using adaptive lossless compression to characterize network traffic","authors":"K. Benson, L. Marvel","doi":"10.1109/CISS.2009.5054730","DOIUrl":"https://doi.org/10.1109/CISS.2009.5054730","url":null,"abstract":"Detecting anomalies in network traffic is a challenging task, not only because of the inherent difficulty of identifying anomalies such as intrusions [1] but also because of the sheer volume of data. In this paper, we attempt to extend existing work in the field of steganalysis to the problem of detecting anomalies in network traffic. By losslessly compressing network traffic using an adaptive compression algorithm, we postulate that it is possible to characterize normal network traffic. Once typical traffic has been defined, it is possible to identify anomalous traffic as the traffic that does not compress well.","PeriodicalId":433796,"journal":{"name":"2009 43rd Annual Conference on Information Sciences and Systems","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126456635","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secondary user friendly TDMA scheduling for primary users in cognitive radio networks 认知无线网络中主用户的辅助用户友好TDMA调度
2009 43rd Annual Conference on Information Sciences and Systems Pub Date : 2009-03-18 DOI: 10.1109/CISS.2009.5054788
Hang Su, Xi Zhang
{"title":"Secondary user friendly TDMA scheduling for primary users in cognitive radio networks","authors":"Hang Su, Xi Zhang","doi":"10.1109/CISS.2009.5054788","DOIUrl":"https://doi.org/10.1109/CISS.2009.5054788","url":null,"abstract":"Cognitive radio technology is widely accepted as an efficient approach to solve the problem that the wireless spectrum has been getting scarcer and scarcer due to the rapid growth in the ubiquitous wireless applications. Several cognitive medium access control (MAC) protocols have been proposed for the secondary users (non-licensed users) to take advantage of the vacant channels whenever they are not occupied by the primary users (licensed users) in the wireless time division multiple access (TDMA)-based networks. In this paper, by exploiting the unique property of the wireless fading channel and cross-layer design technique, we develop a packets scheduling scheme for the primary users in the context of wireless TDMA networks, which is set up to operate friendly towards the secondary users in terms of vacant-channel probability. Our proposed scheme can be implemented with just slight modification on the traditional TDMA scheduling algorithm. We develop a rigorous queuing model and then quantitatively analyze the tradeoff among multiple performance metrics to identify when and where the cost for favoring the secondary users is worthy. The analytical results show that our proposed scheme can generate more vacant-channel opportunities for secondary users, at the expense of little increasing packet delay, as compared with the traditional wireless TDMA scheduling algorithm. In addition, since the implementation of our proposed scheme only needs little modification on the existing TDMA scheduling algorithm, our proposed scheme is a practical and cost-effective approach to increase the wireless spectrum utilization.","PeriodicalId":433796,"journal":{"name":"2009 43rd Annual Conference on Information Sciences and Systems","volume":"1 21","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120842426","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Sleeping policy cost analysis for sensor nodes collecting heterogeneous data 采集异构数据的传感器节点睡眠策略成本分析
2009 43rd Annual Conference on Information Sciences and Systems Pub Date : 2009-03-18 DOI: 10.1109/CISS.2009.5054796
Zhen Zhao, A. Elancheziyan, J. D. Oliveira
{"title":"Sleeping policy cost analysis for sensor nodes collecting heterogeneous data","authors":"Zhen Zhao, A. Elancheziyan, J. D. Oliveira","doi":"10.1109/CISS.2009.5054796","DOIUrl":"https://doi.org/10.1109/CISS.2009.5054796","url":null,"abstract":"Sleeping policies are widely used in many contexts to reduce energy consumption in sensor nodes, ad-hoc terminals or mobile cell phones. Although there is extensive literature on energy saving in sensor networks, little has been done with respect to comparing additional costs, such as packet drop probability and buffer occupancies of sleeping versus non-sleeping policies, especially for multiple classes of data. In this paper, we employ discrete time vacation modeling results from queueing theory to obtain the quantities of interest, i.e., blocking probabilities, and queue lengths incurred by sleeping policies for a sensor node with a finite buffer.We propose a 2-class Geo/G/1/K vacation model, where two classes of data, each with its own buffer, are collected by a sensor node following a sleeping policy. At any time instant, only one packet can be transferred and the transmission order is selected by a scheduling function. The sleeping, transfer and selection processes have general distributions. To the best of our knowledge, this is the first work on modeling and analyzing the performance characteristics of a sensor node with a sleeping policy, collecting heterogeneous data. First, we present a Markov renewal process embedded at the time instant of transfer completion and then obtain the marginal occupancy distributions at an arbitrary time instant. Simulation results validate our theoretical derivation and demonstrate how the results can be applied to understand the behavior of sensor nodes with heterogeneous data.","PeriodicalId":433796,"journal":{"name":"2009 43rd Annual Conference on Information Sciences and Systems","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129351463","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Optimal power allocation for achieving perfect secrecy capacity in MIMO wire-tap channels 实现MIMO线接信道完美保密能力的最优功率分配
2009 43rd Annual Conference on Information Sciences and Systems Pub Date : 2009-03-18 DOI: 10.1109/CISS.2009.5054790
Jia Liu, Yiwei Thomas Hou, H. Sherali
{"title":"Optimal power allocation for achieving perfect secrecy capacity in MIMO wire-tap channels","authors":"Jia Liu, Yiwei Thomas Hou, H. Sherali","doi":"10.1109/CISS.2009.5054790","DOIUrl":"https://doi.org/10.1109/CISS.2009.5054790","url":null,"abstract":"In this paper, we investigate optimal power allocation to achieve perfect secrecy capacity in Gaussian MIMO wire-tap channels. The number of antennas in the MIMO wire-tap channel is arbitrary at the transmitter, the intended receiver, and the eavesdropper. For this challenging non-convex optimization problem, we design a novel global optimization algorithm called branch-and-bound with reformulation and linearization technique (BB/RLT). As opposed to convex programming methods that only yield local optimal solutions, our proposed BB/RLT method guarantees finding a global optimal solution. The main contribution in this paper is that our proposed BB/RLT algorithm is the first method that solves the optimal power allocation problem for achieving perfect secrecy capacity problem in MIMO wire-tap channels. Numerical examples are also given to demonstrate the efficacy of the proposed algorithm.","PeriodicalId":433796,"journal":{"name":"2009 43rd Annual Conference on Information Sciences and Systems","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131148900","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Performance evaluation: Priority transmission using network coding with multi-generation mixing 性能评价:采用多代混音网络编码优先传输
2009 43rd Annual Conference on Information Sciences and Systems Pub Date : 2009-03-18 DOI: 10.1109/CISS.2009.5054758
Mohammed D. Halloush, H. Radha
{"title":"Performance evaluation: Priority transmission using network coding with multi-generation mixing","authors":"Mohammed D. Halloush, H. Radha","doi":"10.1109/CISS.2009.5054758","DOIUrl":"https://doi.org/10.1109/CISS.2009.5054758","url":null,"abstract":"In this paper, we evaluate the priority transmission characteristic of Network Coding (NC) with Multi-Generation Mixing (MGM). MGM supports priority transmission by providing enhanced reliability for delivering different groups of sender packets. MGM is a generalized approach for practical network coding that enhances its performance. With MGM, sender packets are grouped in generations that constitute mixing sets. By employing the novel inter-generation network coding approach, each generation within a mixing set can be considered as a priority layer. This is due to the varying levels of data protection provided to the different generations within a mixing set. Traditionally, priority transmission is done by increasing the level of FEC protection assigned to sender data of higher priority. This incurs transmission overhead that consumes bandwidth. MGM supports priority transmission by network encoding data of higher priority in more sender packets so that more packets support its recovery. At the same time there is no increase in the total number of packets transmitted and hence no additional transmission overhead.","PeriodicalId":433796,"journal":{"name":"2009 43rd Annual Conference on Information Sciences and Systems","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115409649","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Iteratively re-weighted least squares for sparse signal reconstruction from noisy measurements 基于迭代加权最小二乘的噪声测量稀疏信号重构
2009 43rd Annual Conference on Information Sciences and Systems Pub Date : 2009-03-18 DOI: 10.1109/CISS.2009.5054762
R. Carrillo, K. Barner
{"title":"Iteratively re-weighted least squares for sparse signal reconstruction from noisy measurements","authors":"R. Carrillo, K. Barner","doi":"10.1109/CISS.2009.5054762","DOIUrl":"https://doi.org/10.1109/CISS.2009.5054762","url":null,"abstract":"Finding sparse solutions of under-determined systems of linear equations is a problem of significance importance in signal processing and statistics. In this paper we study an iterative reweighted least squares (IRLS) approach to find sparse solutions of underdetermined system of equations based on smooth approximation of the L0 norm and the method is extended to find sparse solutions from noisy measurements. Analysis of the proposed methods show that weaker conditions on the sensing matrices are required. Simulation results demonstrate that the proposed method requires fewer samples than existing methods, while maintaining a reconstruction error of the same order and demanding less computational complexity.","PeriodicalId":433796,"journal":{"name":"2009 43rd Annual Conference on Information Sciences and Systems","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113967512","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
Recursive least-squares doubly-selective MIMO channel estimation using exponential basis models 基于指数基模型的递归最小二乘双选择MIMO信道估计
2009 43rd Annual Conference on Information Sciences and Systems Pub Date : 2009-03-18 DOI: 10.1109/CISS.2009.5054772
Hyosung Kim, Jitendra Tugnait
{"title":"Recursive least-squares doubly-selective MIMO channel estimation using exponential basis models","authors":"Hyosung Kim, Jitendra Tugnait","doi":"10.1109/CISS.2009.5054772","DOIUrl":"https://doi.org/10.1109/CISS.2009.5054772","url":null,"abstract":"An adaptive MIMO channel estimation scheme, exploiting the oversampled complex exponential basis expansion model (CE-BEM), is presented for doubly-selective fading channels where we track the BEM coefficients. The time-varying nature of the channel is well captured by the CE-BEM while the time-variations of the (unknown) BEM coefficients are likely much slower than that of the channel. We apply the exponentially-weighted and sliding-window recursive least-squares (RLS) algorithms to track the BEM coefficients subblock-by-subblock, using time-multiplexed periodically transmitted training symbols. Simulation examples demonstrate its superior performance over the conventional block-wise channel estimator.","PeriodicalId":433796,"journal":{"name":"2009 43rd Annual Conference on Information Sciences and Systems","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115300671","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
2—Sector interference channel communication for sum rates and minimum rate maximization 用于和速率和最小速率最大化的2扇区干扰信道通信
2009 43rd Annual Conference on Information Sciences and Systems Pub Date : 2009-03-18 DOI: 10.1109/CISS.2009.5054854
M. Charafeddine, A. Paulraj
{"title":"2—Sector interference channel communication for sum rates and minimum rate maximization","authors":"M. Charafeddine, A. Paulraj","doi":"10.1109/CISS.2009.5054854","DOIUrl":"https://doi.org/10.1109/CISS.2009.5054854","url":null,"abstract":"This paper applies recent advances in communicating over the interference channel while treating the interference as noise. Two maximization utilities are considered: maximizing the sum rates and maximizing the minimum rate. The channel model is based on a 2—sector interference channel within a single cell. The utilities maximization is presented from the perspective of the interference channel's achievable rates region. Maximizing the minimum rate parts from the traditional problem formulation of casting it as a pure power control problem. Instead, the problem is presented as maximization over the convex hull of the rates region, therefore employing both power control and time-sharing strategies. For maximizing the minimum rate, it is shown that optimal communication over a 2—sector channel is not homogenous, and an interplay of different time-sharing types and/or power control is required to achieve optimality. Systems results are presented together with the gains achieved by using the proposed techniques over the traditional paradigms used in communicating over the 2—sector channel. Finally, insights and the contextualization of the aforementioned techniques within an information theoretic perspective are discussed.","PeriodicalId":433796,"journal":{"name":"2009 43rd Annual Conference on Information Sciences and Systems","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116629899","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信