2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton)最新文献

筛选
英文 中文
An entropy-based framework for dynamic clustering and coverage problems 动态聚类和覆盖问题的基于熵的框架
2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton) Pub Date : 2009-09-30 DOI: 10.1109/ALLERTON.2009.5394887
Puneet Sharma
{"title":"An entropy-based framework for dynamic clustering and coverage problems","authors":"Puneet Sharma","doi":"10.1109/ALLERTON.2009.5394887","DOIUrl":"https://doi.org/10.1109/ALLERTON.2009.5394887","url":null,"abstract":"In this paper, we consider the general class of coverage and clustering problems in a dynamic environment, and propose a computationally efficient framework to address them. We define the problem of achieving instantaneous coverage as a combinatorial optimization problem in a Maximum Entropy Principle framework. We then extend the framework to a dynamic environment, thereby allowing us to address the inherent trade-off between the resolution of the clusters and the computation cost, and provides flexibility to a variety of dynamic specifications. The proposed framework addresses both the coverage as well as tracking aspects of the problem. The determination of cluster centers and their associated velocity field is cast as a control design problem ensuring that the algorithm achieves progressively better coverage with time. Simulation results presented in the paper demonstrate that the proposed algorithm achieves target coverage costs five to seven times faster than related frame-by-frame methods, with the additional ability to identify natural clusters in the dataset.","PeriodicalId":440015,"journal":{"name":"2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121698222","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Asymptotic analysis of quadratic error of consensus in large-scale random directed networks 大规模随机有向网络一致性二次误差的渐近分析
2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton) Pub Date : 2009-09-30 DOI: 10.1109/ALLERTON.2009.5394941
V. Preciado, A. Tahbaz-Salehi, A. Jadbabaie
{"title":"Asymptotic analysis of quadratic error of consensus in large-scale random directed networks","authors":"V. Preciado, A. Tahbaz-Salehi, A. Jadbabaie","doi":"10.1109/ALLERTON.2009.5394941","DOIUrl":"https://doi.org/10.1109/ALLERTON.2009.5394941","url":null,"abstract":"We analyze the asymptotic variance of distributed consensus algorithms over large-scale switching random networks. Our analysis is focused on consensus algorithms over large, i.i.d., and directed Erdős-Rényi random graphs. We assume that every agent can communicate with any other agent with some fixed probability c/n, where c is the expected number of neighbors of each agent and n is the size of the network. We compute the variance of the random consensus value and show that it converges to zero at rate 1/n as the number of agents grows. We provide numerical simulations that illustrate our results.","PeriodicalId":440015,"journal":{"name":"2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125004883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Distributed MIMO network optimization based on duality and local message passing 基于对偶性和本地消息传递的分布式MIMO网络优化
2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton) Pub Date : 2009-09-30 DOI: 10.1109/ALLERTON.2009.5394940
An Liu, A. Sabharwal, Y. Liu, Haige Xiang, Wu Luo
{"title":"Distributed MIMO network optimization based on duality and local message passing","authors":"An Liu, A. Sabharwal, Y. Liu, Haige Xiang, Wu Luo","doi":"10.1109/ALLERTON.2009.5394940","DOIUrl":"https://doi.org/10.1109/ALLERTON.2009.5394940","url":null,"abstract":"In a communication network, it is often impractical for each node to learn the global channel knowledge (network connectivity and channel state information of each link). In this paper, we address distributed rate optimization for Time-Division Duplex (TDD) Multiple-Input Multiple-Output (MIMO) networks when part of the local channel knowledge is learned via message passing between each transmitter and its intended receivers. The distributed optimization algorithm is based on a rate duality and the corresponding input covariance matrix transformation between the forward and reverse links of TDD MIMO networks under the assumption of global channel knowledge. Noting that the key information required by the proposed transformation is the interference-plus-noise covariance matrix, we propose a local covariance matrix transformation such that each node can distributedly optimize its input covariance matrix by only exchanging interference-plus-noise covariance matrix locally. It is observed from the simulation that the proposed algorithm achieves a performance close to the one with global channel knowledge and outperforms the existing distributed algorithms.","PeriodicalId":440015,"journal":{"name":"2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton)","volume":"193 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123261686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Is it enough to drain the heaviest bottlenecks? 这是否足以消除最严重的瓶颈?
2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton) Pub Date : 2009-09-30 DOI: 10.1109/ALLERTON.2009.5394773
G. Gupta, S. Sanghavi, N. Shroff
{"title":"Is it enough to drain the heaviest bottlenecks?","authors":"G. Gupta, S. Sanghavi, N. Shroff","doi":"10.1109/ALLERTON.2009.5394773","DOIUrl":"https://doi.org/10.1109/ALLERTON.2009.5394773","url":null,"abstract":"This paper takes a philosophically new approach to throughput-optimal scheduling queueing systems with interference. All existing popular approaches (e.g. max-weight, greedy, ”pick-and-compare” etc.) focus on the weights of individual queues. We take an alternative approach, by focusing instead on the aggregate queues of bottlenecks. A bottleneck is a set of mutually-interfering queues; a schedule drains a bottleneck if it removes a packet from any one of its queues. We consider (the standard) switch scheduling problem, where the bottlenecks are the nodes. We establish the following phasetransition (1) ensuring only that the very heaviest nodes are drained is not enough for throughput optimality, but (2) ensuring scheduling for all nodes with weight within (1 − α) of the heaviest is enough for throughput optimality, for any α>0. The proof uses a new Lyapunov function: the weight of the critical bottleneck. Our alternate node-focused view also enables the development of new algorithms for scheduling. We show (a) how any policy can be made throughput-optimal by doing a small number of extra operations, (b) a new algorithm — Maximum Vertex-weighted Matching (MVM) — has (empirical) delay performance better than the current state of the art, and lower complexity than Max-(edge)weighted Matching, and (c) a class o f throughput-optimal policies that trade off between complexity and delay.","PeriodicalId":440015,"journal":{"name":"2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131556448","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Can iterative decoding for erasure correlated sources be universal? 擦除相关源的迭代解码是否具有普适性?
2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton) Pub Date : 2009-09-30 DOI: 10.1109/ALLERTON.2009.5394794
A. Yedla, H. Pfister, K. Narayanan
{"title":"Can iterative decoding for erasure correlated sources be universal?","authors":"A. Yedla, H. Pfister, K. Narayanan","doi":"10.1109/ALLERTON.2009.5394794","DOIUrl":"https://doi.org/10.1109/ALLERTON.2009.5394794","url":null,"abstract":"In this paper, we consider a few iterative decoding schemes for the joint source-channel coding of correlated sources. Specifically, we consider the joint source-channel coding of two erasure correlated sources with transmission over different erasure channels. Our main interest is in determining whether or not various code ensembles can achieve the capacity region universally over varying channel conditions. We consider two ensembles in the class of low-density generator-matrix (LDGM) codes known as Luby-Transform (LT) codes and one ensemble of low-density parity-check (LDPC) codes. We analyze them using density evolution and show that optimized LT codes can achieve the extremal symmetric point of the capacity region. We also show that LT codes are not universal under iterative decoding for this problem because they cannot simultaneously achieve the extremal symmetric point and a corner point of the capacity region. The sub-universality of iterative decoding is characterized by studying the density evolution for LT codes.","PeriodicalId":440015,"journal":{"name":"2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115059769","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Arbitrary jamming can preclude secure communication 任意干扰会妨碍安全通信
2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton) Pub Date : 2009-09-30 DOI: 10.1109/ALLERTON.2009.5394876
Ebrahim MolavianJazi, M. Bloch, J. N. Laneman
{"title":"Arbitrary jamming can preclude secure communication","authors":"Ebrahim MolavianJazi, M. Bloch, J. N. Laneman","doi":"10.1109/ALLERTON.2009.5394876","DOIUrl":"https://doi.org/10.1109/ALLERTON.2009.5394876","url":null,"abstract":"We investigate the effect of certain active attacks on the secrecy capacity of wiretap channels by considering arbitrarily varying wiretap channels. We establish a lower bound for the secrecy capacity with randomized coding of a class of such channels and an upper bound for that of all such channels. We show that if the arbitrarily varying wiretap channel possesses a bad “averaged” state, namely one in which the legitimate receiver is degraded with respect to the eavesdropper, then secure communication is not possible.","PeriodicalId":440015,"journal":{"name":"2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131105941","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 75
3 User interference channel: Degrees of freedom as a function of channel diversity 用户干扰信道:作为信道分集函数的自由度
2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton) Pub Date : 2009-09-30 DOI: 10.1109/ALLERTON.2009.5394806
Guy Bresler, David Tse
{"title":"3 User interference channel: Degrees of freedom as a function of channel diversity","authors":"Guy Bresler, David Tse","doi":"10.1109/ALLERTON.2009.5394806","DOIUrl":"https://doi.org/10.1109/ALLERTON.2009.5394806","url":null,"abstract":"In this paper we characterize, in the context of vector space precoding strategies, the degrees of freedom of the parallel three-user interference channel as a function of the channel diversity L. A channel diversity of L is modeled by L independently fading real-valued parallel channels. Our results also apply to the case of parallel complex-valued channels, where the channel matrices Hij ∊ Cl×l are still diagonal but have complex entries. Here L = 2l is twice the number of parallel channels, and the resulting formulas (as a function of L) for the degrees of freedom are the same as in the real-valued case.","PeriodicalId":440015,"journal":{"name":"2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton)","volume":"435 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133357519","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 43
A training based scheme for communicating over unknown channels with feedback 一种基于训练的带反馈的未知信道通信方案
2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton) Pub Date : 2009-09-30 DOI: 10.1109/ALLERTON.2009.5394490
Aditya Mahajan, S. Tatikonda
{"title":"A training based scheme for communicating over unknown channels with feedback","authors":"Aditya Mahajan, S. Tatikonda","doi":"10.1109/ALLERTON.2009.5394490","DOIUrl":"https://doi.org/10.1109/ALLERTON.2009.5394490","url":null,"abstract":"We consider a communication system with noiseless feedback where the channel is not known to the encoder or the decoder. The channel belongs to a known family of channels and remains constant over time. Using the noiseless feedback, the encoder can learn the channel over time and communicate at a rate equal to the capacity of the actual realization of the channel. Thus, not knowing the channel does not affect capacity. However, analyzing the error exponent (for variable length coding) is more challenging. Tchamkerten and Telatar (2006) showed that for certain families of channels, not knowing the channel does not change the error exponent; for other families, not knowing the channel results in a strict decrease in the error exponent. In general, the error exponent is not known. It is also known that simple training based schemes have poor error exponent behavior. In this paper, we show that a smart training based scheme can achieve an error exponent which is a multiplicative factor less than the error exponent for known channel. This shows that contrary to popular belief, smart training based schemes preserve the main advantage of feedback — an error exponent with non-zero slope at rates close to capacity.","PeriodicalId":440015,"journal":{"name":"2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton)","volume":"131 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132560778","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Sparse and low-rank matrix decompositions 稀疏和低秩矩阵分解
2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton) Pub Date : 2009-09-30 DOI: 10.3182/20090706-3-FR-2004.00249
V. Chandrasekaran, S. Sanghavi, P. Parrilo, A. Willsky
{"title":"Sparse and low-rank matrix decompositions","authors":"V. Chandrasekaran, S. Sanghavi, P. Parrilo, A. Willsky","doi":"10.3182/20090706-3-FR-2004.00249","DOIUrl":"https://doi.org/10.3182/20090706-3-FR-2004.00249","url":null,"abstract":"We consider the following fundamental problem: given a matrix that is the sum of an unknown sparse matrix and an unknown low-rank matrix, is it possible to exactly recover the two components? Such a capability enables a considerable number of applications, but the goal is both ill-posed and NP-hard in general. In this paper we develop (a) a new uncertainty principle for matrices, and (b) a simple method for exact decomposition based on convex optimization. Our uncertainty principle is a quantification of the notion that a matrix cannot be sparse while having diffuse row/column spaces. It characterizes when the decomposition problem is ill-posed, and forms the basis for our decomposition method and its analysis. We provide deterministic conditions — on the sparse and low-rank components — under which our method guarantees exact recovery.","PeriodicalId":440015,"journal":{"name":"2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115992141","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 157
Message quantization in belief propagation: Structural results in the low-rate regime 信念传播中的信息量化:低率状态下的结构结果
2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton) Pub Date : 2009-09-30 DOI: 10.1109/ALLERTON.2009.5394797
O. P. Kreidl, A. Willsky
{"title":"Message quantization in belief propagation: Structural results in the low-rate regime","authors":"O. P. Kreidl, A. Willsky","doi":"10.1109/ALLERTON.2009.5394797","DOIUrl":"https://doi.org/10.1109/ALLERTON.2009.5394797","url":null,"abstract":"Motivated by distributed inference applications in unreliable communication networks, we adapt the popular (sum-product) belief propagation (BP) algorithm under the constraint of discrete-valued messages. We show that, in contrast to conventional BP, the optimal message-generation rules are node-dependent and iteration-dependent, each rule making explicit use of local memory from all past iterations. These results expose both the intractability of optimal design and an inherent structure that can be exploited for tractable approximate design. We propose one such approximation and demonstrate its efficacy on canonical examples. We also discuss extensions to communication networks with lossy links (e.g., erasures) or topologies that differ from the graph underlying the probabilistic model.","PeriodicalId":440015,"journal":{"name":"2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133327592","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信