{"title":"Efficient Box and Match Algorithm for Reliability-Based Soft-Decision Decoding of Linear Block Codes","authors":"Wenyi Jin","doi":"10.1109/ITA.2007.4357575","DOIUrl":"https://doi.org/10.1109/ITA.2007.4357575","url":null,"abstract":"In this paper, efficient methods to improve the box and matching algorithm (BMA) are presented. Firstly, an efficient approach is introduced to terminate the decoding if a local optimal candidate satisfies a probabilistic sufficient condition. The false alarm probability associated with the use of the probabilistic sufficient condition is also derived. Secondly, by constructing a control band which is assumed error free, the matching capability of the BMA is enhanced. More precisely, the performance of BMA of order (i + 1) is nearly achieved with a small increase in complexity and no increase in memory with respect to the BMA of order i. A tight performance analysis is derived based on the theory of order statistics. An error floor associated either with false alarms or with errors in the control band is introduced, but this error floor can be controlled using the analysis in both cases. Simulation results show that the performance of the enhanced BMA for the decoding of the RS(255,239) code with BPSK signaling over an AWGN channel is about 0.1 dB away from that of maximum likelihood decoding at the word error rate (WER) 10-3.","PeriodicalId":439952,"journal":{"name":"2007 Information Theory and Applications Workshop","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128654062","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
D. Tschopp, S. Diggavi, M. Grossglauser, J. Widmer
{"title":"Robust Routing for Dynamic Wireless Networks Based on Stable Embeddings","authors":"D. Tschopp, S. Diggavi, M. Grossglauser, J. Widmer","doi":"10.1109/ITA.2007.4357571","DOIUrl":"https://doi.org/10.1109/ITA.2007.4357571","url":null,"abstract":"Routing packets is a central function of multi-hop wireless networks. Traditionally, there have been two paradigms for routing, either based on the geographical coordinates of the nodes (geographic routing), or based on the connectivity graph (topology-based routing). The former implicitly assumes that geometry determines connectivity, whereas the latter does not exploit this inherent geometry of wireless networks, and assumes a general graph instead. In this paper, we explore ideas that attempt to bridge these two paradigms. We do so by investigating routing techniques based on metric embeddings of the connectivity graph. If this graph is closely related to the underlying geometry of the nodes, then it is possible to embed the graph in a low-dimensional normed space. This keeps the overhead of the routing protocol low. We specifically explore embeddings of dynamic networks induced by channel fading and mobility. This motivates the novel problem of stable embeddings, where the additional goal is to maintain an embedding over time, such that the evolution of the embedding faithfully captures the evolution of the underlying graph itself. This is crucial to limit the control overhead of the routing protocol, and to ensure that our approach is scalable.","PeriodicalId":439952,"journal":{"name":"2007 Information Theory and Applications Workshop","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125149417","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On Achievable Rates for Relay Channels","authors":"Hon-Fah Chong, M. Motani, H. K. Garg","doi":"10.1109/ITA.2007.4357615","DOIUrl":"https://doi.org/10.1109/ITA.2007.4357615","url":null,"abstract":"In previous work, we presented two different generalized decoding strategies for the relay channel, called SeqBack and SimBack decoding, that make use of regular encoding and backward decoding. In this paper, we show that the rates achievable by SeqBack and SimBack decoding are equal. Furthermore, we show that regular encoding/sliding window decoding can achieve the same rate as regular encoding/backward decoding.","PeriodicalId":439952,"journal":{"name":"2007 Information Theory and Applications Workshop","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125553593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Application of the many sources asymptotic in downscaling Internet-like Networks","authors":"Fragkiskos Papadopoulos, K. Psounis","doi":"10.1109/ITA.2007.4357597","DOIUrl":"https://doi.org/10.1109/ITA.2007.4357597","url":null,"abstract":"In our earlier work by Fragkiskos Papadopoulos, et al. (2005), we have presented two methods to scale down the topology of the Internet, while preserving important performance metrics. We have shown that the methods can be used to greatly simplify and expedite performance prediction. The key insight that we have leveraged is that only the congested links along the path of each flow introduce sizable queueing delays and dependencies among flows. Based on this, we have shown that it is possible to infer the performance of the larger Internet by creating and observing a suitably scaled- down replica, consisting of the congested links only. However, two main assumptions of our approach were that uncongested links are known in advance, and that the queueing delays imposed by such links are negligible. In this paper we provide rules that can be used to identify uncongested links when these are not known, and we theoretically establish the conditions under which the negligible queueing delay assumption is valid. In particular, we first identify scenarios under which one can easily deduce whether a link imposes negligible queueing by inspecting the network topology. Then, we identify scenarios in which this is not possible and use known results based on the large deviations theory to approximate the queue length distribution. Finally, we use this approximation to decide which links are uncongested, and show that in the many- sources limit the queueing delays of uncongested links are indeed negligible. Our results are verified using simulations with TCP traffic.","PeriodicalId":439952,"journal":{"name":"2007 Information Theory and Applications Workshop","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129499540","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Transmission of Correlated Sources Over Multiuser Channels with Receiver Side Information","authors":"D. Gunduz, E. Erkip","doi":"10.1109/ITA.2007.4357580","DOIUrl":"https://doi.org/10.1109/ITA.2007.4357580","url":null,"abstract":"We consider transmission of correlated sources over multiuser channels where the receiver(s) have access to correlated side information. Our goal is to characterize necessary and sufficient conditions for lossless transmission and uncover scenarios where separation of source and channel coding, either in the traditional dasiainformationalpsila sense (where both source and channel encoders and decoders are designed independently) or in the 'operational' sense (where the encoders are independent, but the source and channel decoding is done jointly), is optimal. We first study a multiple access channel where the source signals are independent given the receiver side information. We prove an informational source channel separation theorem for this communication system. We next investigate source and channel coding for the compound multiple access and interference channels. We give general sufficient conditions for lossless transmission of each source for both channels, and then provide necessary conditions that hold under certain assumptions on the nature of the source and the receiver side information. For the interference channel, the necessary conditions hinge on a strong source- channel interference condition which depends not only on the channel but on the source and side information correlations as well. Our results suggest the optimality of informational or operational separation depending on the correlation structure of the side information and the amount of interference.","PeriodicalId":439952,"journal":{"name":"2007 Information Theory and Applications Workshop","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131640891","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Minimal Markov chain embeddings of pattern problems","authors":"M. Lladser","doi":"10.1109/ITA.2007.4357588","DOIUrl":"https://doi.org/10.1109/ITA.2007.4357588","url":null,"abstract":"The Markov chain embedding technique is commonly used to study the distribution of statistics associated with regular patterns (i.e. set of strings described by a regular expression) in random strings. In this extended abstract, we formalize the concept Markov chain embedding for random strings produced by a possibly non-stationary Markov source. A notion of memory conveyed by the states of a deterministic finite automaton is introduced. This notion is used to characterize the smallest state-space size Markov chain required to specify the distribution of the count statistic of a given regular pattern. The research finds applications in problems associated with regular patterns in random strings that demand exponentially large state spaces.","PeriodicalId":439952,"journal":{"name":"2007 Information Theory and Applications Workshop","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129571069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Joint Source-Channel Coding: a Practical Approach and an implementation Example","authors":"G. Caire","doi":"10.1109/ITA.2007.4357563","DOIUrl":"https://doi.org/10.1109/ITA.2007.4357563","url":null,"abstract":"The basic building blocks of most state-of the art source coders are: a linear transformation; scalar quantization of the transform coefficients; probability modeling of the sequence of quantization indices; an entropy coding stage. The weakness of conventional separated source-channel coding approaches lies in the catastrophic behavior of the entropy coding stage. Hence, we replace this stage with linear coding, that maps directly the sequence of redundant quantizer output symbols into a channel codeword. We show that this approach does not entail any loss of optimality in the asymptotic regime of large block length. Furthermore, for practical block lengths and moderate complexity, our approach yields very significant improvements. We develop a full implementation example based on the JPEG2000 image coder and punctured turbo codes. The gain over a conventional separated scheme is demonstrated by extensive numerical experiments on test images.","PeriodicalId":439952,"journal":{"name":"2007 Information Theory and Applications Workshop","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114846293","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On the Codebook-Level Duality Between Slepian-Woif Coding and Channel Coding","authors":"Jun Chen, Dake He, E. Yang","doi":"10.1109/ITA.2007.4357566","DOIUrl":"https://doi.org/10.1109/ITA.2007.4357566","url":null,"abstract":"A codebook-level duality between Slepian-Wolf coding and channel coding is established. Specifically, it is shown that using linear codes over Z M (the ring of integers mod M), each Slepian-Wolf coding problem is equivalent to a channel coding problem for a semi-symmetric additive channel under optimal decoding, belief propagation decoding, and minimum entropy decoding. Various notions of symmetric channels are discussed and their connections with semi-symmetric additive channels are clarified.","PeriodicalId":439952,"journal":{"name":"2007 Information Theory and Applications Workshop","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127690162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Information Theoretic Framework for Ontology-based Bioinformatics","authors":"G. Alterovitz, M. Xiang, M. Ramoni","doi":"10.1109/ITA.2007.4357555","DOIUrl":"https://doi.org/10.1109/ITA.2007.4357555","url":null,"abstract":"With myriad information being generated from high-throughput experiments such as microarrays and sequencing technologies, an ever-increasing amount of data is being recorded and analyzed with the help of hierarchical ontologies, such as the gene ontology (GO). We have developed a novel framework- based on the well established foundations of information theory- that allows for the evaluation of new types of hypotheses. The framework, encapsulated in open biomedical ontology-based exploration and search (OBOES), has already been applied in the investigation of different kinds of questions. The resulting framework enables the new field of information theoretic ontology-based analysis. We have applied this framework to create methods to re-engineer ontologies, explore fundamental questions on the evolution of biological complexity, determine optimal ontology terms for bioinformatics analysis, and quantify the usefulness of biofluids as proxies for tissues/diseases. In each case, we found that our methods provide novel, significant findings. An open source Java implementation of OBOES is available at: http://oboes.sourceforge.net.","PeriodicalId":439952,"journal":{"name":"2007 Information Theory and Applications Workshop","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133206425","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Resource Consumption in Dynamic Spectrum Access Networks: Applications and Shannon Limits","authors":"M. Pursley, T. Royster","doi":"10.1109/ITA.2007.4357598","DOIUrl":"https://doi.org/10.1109/ITA.2007.4357598","url":null,"abstract":"When a frequency band has been selected for a session in a dynamic spectrum access network, the initial choices for the modulation and coding must be consistent with the bandwidth that is available and the session's quality-of-service priorities. A measure of resource consumption is developed for use in the selection of the code-modulation combination. The resource- consumption metric accounts for the bandwidth, data- transmission time, and transmitted power for the session. Shannon capacity limits are employed to bound the resource consumption and permit tradeoffs between the time-bandwidth product of the signals and the amount of power that must be transmitted to achieve reliable communication.","PeriodicalId":439952,"journal":{"name":"2007 Information Theory and Applications Workshop","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130420946","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}