{"title":"Adaptive Slepian-Wolf decoding using particle filtering based belief propagation","authors":"Samuel Cheng, Shuang Wang, Lijuan Cui","doi":"10.1109/ALLERTON.2009.5394914","DOIUrl":"https://doi.org/10.1109/ALLERTON.2009.5394914","url":null,"abstract":"A major difficulty that plagues the practical use of Slepian-Wolf coding (and distributed source coding in general) is that the precise correlation among sources need to be known a priori. To resolve this problem, we propose an adaptive Slepian-Wolf decoder using particle filtering based belief propagation. We show through experiments that the proposed algorithm can simultaneously reconstruct a compressed source and estimate the joint correlation between the sources. Further, comparing to the conventional Slepian-Wolf coder based on standard belief propagation, the proposed approach can achieve higher compression under varying correlation statistics.","PeriodicalId":440015,"journal":{"name":"2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121742178","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimal state estimation in the presence of communication costs and packet drops","authors":"G. Lipsa, N. C. Martins","doi":"10.1109/ALLERTON.2009.5394899","DOIUrl":"https://doi.org/10.1109/ALLERTON.2009.5394899","url":null,"abstract":"Consider a first order, linear and time-invariant discrete time system driven by Gaussian, zero mean white process noise, a pre-processor that accepts noisy measurements of the state of the system, and an estimator. The pre-processor and the estimator are not co-located, and, at every time-step, the pre-processor sends either a real number or an erasure symbol to the estimator. We seek the pre-processor and the estimator that jointly minimize a cost that combines three terms; the expected estimation error and a communication cost. The communication cost is zero for erasure symbols and a pre-selected constant otherwise. We show that the optimal pre-processor follows a symmetric threshold policy, and that the optimal estimator is a Kalman-like filter that updates its estimate linearly in the presence of erasures. Other existing work has adopted such a Kalman-like structure, but this paper is the first to prove its optimality.","PeriodicalId":440015,"journal":{"name":"2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121922807","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Target detection in MIMO radar using Golay complementary sequences in the presence of Doppler","authors":"T. Qureshi, M. Zoltowski, R. Calderbank","doi":"10.1109/ACSSC.2009.5470143","DOIUrl":"https://doi.org/10.1109/ACSSC.2009.5470143","url":null,"abstract":"In this paper, we present a method for detecting a point target using multiple antennas when the relative motion between the receivers and the target induces a non-negligible Doppler shift. As a key illustrative example, we consider a 4×4 system employing a unitary matrix waveform set, e.g., formed from Golay complementary sequences. When a non-negligible Doppler shift is induced by the target motion, the waveform matrix formed from the complementary sequences is no longer unitary, resulting in significantly degraded target range estimates. To solve this problem, we adopt a subspace based approach exploiting the observation that the receive matrix formed from matched filtering of the reflected waveforms has a (non-trivial) null-space. Through processing of the waveforms with the appropriate vector from the null-space, we can significantly improve the detection performance. We provide simulation results to confirm the theoretical analysis.","PeriodicalId":440015,"journal":{"name":"2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124951137","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"MIMO wireless communications under statistical queueing constraints","authors":"M. C. Gursoy","doi":"10.1109/ALLERTON.2009.5394864","DOIUrl":"https://doi.org/10.1109/ALLERTON.2009.5394864","url":null,"abstract":"The performance of multiple-input multiple-output wireless systems is investigated in the presence of statistical queueing constraints. Queuing constraints are imposed as limitations on buffer violation probabilities. The performance under such constraints is captured through the effective capacity formulation. A detailed analysis of the effective capacity is carried out in the low-power and wideband regimes. In the low-power analysis, expressions for the first and second derivatives of the effective capacity with respect to SNR at SNR = 0 are obtained under various assumptions on the degree of channel state information at the transmitter. Transmission strategies that are optimal in the sense of achieving the first and second derivatives are identified. It is shown that while the first derivative does not get affected by the presence of queueing constraints, the second derivative gets smaller as the constraints become more stringent. Through the energy efficiency analysis, this is shown to imply that the minimum bit energy requirements do not change with more strict limitations but the wideband slope diminishes. Similar results are obtained in the wideband regime if rich multipath fading is being experienced. On the other hand, sparse multipath fading with bounded number of degrees of freedom is shown to increase the minimum bit energy requirements in the presence of queueing constraints.","PeriodicalId":440015,"journal":{"name":"2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130033459","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Capacity bounds for two-hop interference networks","authors":"Yi Cao, Biao Chen","doi":"10.1109/ALLERTON.2009.5394811","DOIUrl":"https://doi.org/10.1109/ALLERTON.2009.5394811","url":null,"abstract":"This paper considers a two-hop interference network, where two users transmit independent messages to their respective receivers with the help of two relay nodes. The transmitters do not have direct links to the receivers; instead, two relay nodes serve as intermediaries between the transmitters and receivers. Each hop, one from the transmitters to the relays and the other from the relays to the receivers, is modeled as a Gaussian interference channel, thus the network is essentially a cascade of two interference channels. For this network, achievable symmetric rates for different parameter regimes under decode-and-forward relaying and amplify-and-forward relaying are proposed and the corresponding coding schemes are carefully studied. Numerical results are also provided.","PeriodicalId":440015,"journal":{"name":"2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130207358","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Spectral analysis of dynamically evolving networks with linear preferential attachment","authors":"V. Preciado, A. Jadbabaie","doi":"10.1109/ALLERTON.2009.5394524","DOIUrl":"https://doi.org/10.1109/ALLERTON.2009.5394524","url":null,"abstract":"This paper is devoted to study the eigenvalues of the adjacency matrix for the random graph process proposed by Baraba´si and Albert in [2]. While many structural characteristics of the Baraba´si-Albert (BA) process are well known, analytical results concerning its spectral properties are still an open question. In this paper, we present new results regarding the distribution of eigenvalues of the adjacency matrix associated to this random graph model. In particular, we derive closed-form expressions for the spectral moments of the adjacency matrix and study the evolution of the spectral moments as the network grows. Based on our results, we extract information regarding the evolution of the spectral radius of the adjacency matrix as the network grows.","PeriodicalId":440015,"journal":{"name":"2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130381205","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On detection with partial information in the Gaussian setup","authors":"Onur Özyesil, M. K. Mihçak, Y. Altug","doi":"10.1109/ALLERTON.2009.5394499","DOIUrl":"https://doi.org/10.1109/ALLERTON.2009.5394499","url":null,"abstract":"We introduce the problem of communication with partial information, where there is an asymmetry between the transmitter and the receiver codebooks. Practical applications of the proposed setup include the robust signal hashing problem within the context of multimedia security and asymmetric communications with resource-lacking receivers. We study this setup in a binary detection theoretic context for the additive colored Gaussian noise channel. In our proposed setup, the partial information available at the detector consists of dimensionality-reduced versions of the transmitter codewords, where the dimensionality reduction is achieved via a linear transform. We first derive the corresponding MAP-optimal detection rule and the corresponding conditional probability of error (conditioned on the partial information the detector possesses). Then, we constructively quantify an optimal class of linear transforms, where the cost function is the expected Chernoff bound on the conditional probability of error of the MAP-optimal detector.","PeriodicalId":440015,"journal":{"name":"2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130091606","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Maximum throughput of clandestine relay","authors":"T. He, L. Tong, A. Swami","doi":"10.1109/ALLERTON.2009.5394874","DOIUrl":"https://doi.org/10.1109/ALLERTON.2009.5394874","url":null,"abstract":"The maximum throughput of relaying information flows while concealing their presence is studied. The concealment is achieved by embedding transmissions of information flows into truly independent transmission schedules that resemble the normal transmission behaviors without any flow. Such embedding may reduce the throughput for delay-sensitive flows, and the paper provides a quantitative characterization of the level of reduction. Under a strict or average delay constraint, the maximum normalized throughput is measured by the efficiency of the optimal relay algorithms that embed the most flow into given transmission schedules. Exact analytical solutions and closed-form approximations are derived for renewal schedules, verified by simulations on both synthetic traffic and traces. The results reveal general relationships between the clandestine throughput and system parameters including delay constraints, traffic load, and traffic distributions. In particular, the throughput is found to be negatively related to the burstiness of the cover traffic. Moreover, simulations show that the throughputs of renewal traffic with certain power-law interarrival distributions can closely approximate those of actual traces.","PeriodicalId":440015,"journal":{"name":"2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126337571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Interference alignment with asymmetric complex signaling","authors":"S. Jafar, V. Cadambe, Chenwei Wang","doi":"10.1109/ALLERTON.2009.5394885","DOIUrl":"https://doi.org/10.1109/ALLERTON.2009.5394885","url":null,"abstract":"It has been conjectured that complex Gaussian interference channels with constant channel coefficients have only one degree-of-freedom (DoF) regardless of the number of users. While several examples are known of constant channels that achieve more than 1 DoF, these special cases only span a subset of measure zero. In other words, for almost all channel coefficient values, it is not known if more than 1 DoF is achievable. In this paper, we settle this conjecture in the negative. We show that at least 1.2 DoF are achievable for all values of complex channel coefficients except for a subset of measure zero. To establish the achievability of 1.2 DoF we introduce the novel idea of asymmetric complex signaling — i.e., the inputs are chosen to be complex but not circularly symmetric. It is shown that unlike Gaussian point-to-point, multiple-access and broadcast channels where circularly symmetric complex Gaussian inputs are optimal, for interference channels optimal inputs are in general asymmetric. In addition, with this idea, we also show that 4/3 DoF can be achieved for 2 user X channel with constant, complex channel coefficients.","PeriodicalId":440015,"journal":{"name":"2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton)","volume":"539 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127647944","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimal interleaving algorithms for generalized concatenated codes","authors":"Hessam Mahdavifar, A. Vardy","doi":"10.1109/ALLERTON.2009.5394830","DOIUrl":"https://doi.org/10.1109/ALLERTON.2009.5394830","url":null,"abstract":"Multilevel Reed-Solomon (RS) codes are powerful types of generalized concatenated codes which can improve the error-correcting capability of RS codes without resorting to large finite fields. The redundancy has to be non-uniformly distributed over the rows in order to maximize the minimum distance of multilevel RS codes. So the straightforward columnwise interleaving is not the efficient way of interleaving in these schemes. In this paper, we provide optimal interleaving algorithms in order to maximize the burst-correcting capability of multilevel RS codes.","PeriodicalId":440015,"journal":{"name":"2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton)","volume":"20 80","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120842244","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}