2019 IEEE International Symposium on Information Theory (ISIT)最新文献

筛选
英文 中文
Error Exponents of Parallel Two-way Discrete Memoryless Channels using Variable Length Coding 采用变长编码的并行双向离散无记忆信道的误差指数
2019 IEEE International Symposium on Information Theory (ISIT) Pub Date : 2019-07-07 DOI: 10.1109/ISIT.2019.8849727
K. Palacio-Baus, Meysam Asadi, N. Devroye
{"title":"Error Exponents of Parallel Two-way Discrete Memoryless Channels using Variable Length Coding","authors":"K. Palacio-Baus, Meysam Asadi, N. Devroye","doi":"10.1109/ISIT.2019.8849727","DOIUrl":"https://doi.org/10.1109/ISIT.2019.8849727","url":null,"abstract":"Achievable error exponents for two-way parallel discrete memoryless channels (DMC) using variable block length coding (VLC) are presented. First, Forney’s erasure decoding error exponent is shown to be achievable for both directions simultaneously. Next, for some rate-pairs, it is shown that the error exponent of the direction with a smaller capacity may be further increased by allocating feedback resources to it in the other direction, at the price of a decreased error exponent for the other terminal. The presented two-way communication scheme builds upon Draper-Sahai’s one-way DMC achievability scheme with noisy feedback under VLC. Both achievable error exponent regions demonstrate that the use of VLC and interaction between the terminals may benefit both directions’ error exponents over fixed block length and feedback free transmission.1","PeriodicalId":6708,"journal":{"name":"2019 IEEE International Symposium on Information Theory (ISIT)","volume":"7 1","pages":"2249-2253"},"PeriodicalIF":0.0,"publicationDate":"2019-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82892885","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Low-degree Pseudo-Boolean Function Recovery Using Codes 使用代码的低次伪布尔函数恢复
2019 IEEE International Symposium on Information Theory (ISIT) Pub Date : 2019-07-07 DOI: 10.1109/ISIT.2019.8849424
Orhan Ocal, S. Kadhe, K. Ramchandran
{"title":"Low-degree Pseudo-Boolean Function Recovery Using Codes","authors":"Orhan Ocal, S. Kadhe, K. Ramchandran","doi":"10.1109/ISIT.2019.8849424","DOIUrl":"https://doi.org/10.1109/ISIT.2019.8849424","url":null,"abstract":"Pseudo-Boolean functions are functions whose input variables are binary and output is in the real numbers. These functions show up in many different applications in computer science, finance and economics to name a few. Pseudo-Boolean functions lend themselves to a spectral representation, which is closely related to the Walsh-Hadamard Transform from signal processing. In some problems, the coefficients of the spectral representation are active only on the low-degree terms. In this work, we present a method for computationally-efficient recovery of these low-degree coefficients. Our method is based on evaluating the input pseudo-Boolean function at points given by the codewords of a codebook, and then performing a Walsh-Hadamard Transform on the resulting signal. Codes having high rates and good minimum distance properties yield sets of evaluations points whose size is close to the number of low-degree coefficients. In particular perfect codes, such as Hamming Codes or the Golay Code, enable efficient recovery with optimal number of evaluations of the function.","PeriodicalId":6708,"journal":{"name":"2019 IEEE International Symposium on Information Theory (ISIT)","volume":"11 1","pages":"1207-1211"},"PeriodicalIF":0.0,"publicationDate":"2019-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89812885","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
SPARCs and AMP for Unsourced Random Access 无源随机访问的SPARCs和AMP
2019 IEEE International Symposium on Information Theory (ISIT) Pub Date : 2019-07-07 DOI: 10.1109/ISIT.2019.8849802
Alexander Fengler, P. Jung, G. Caire
{"title":"SPARCs and AMP for Unsourced Random Access","authors":"Alexander Fengler, P. Jung, G. Caire","doi":"10.1109/ISIT.2019.8849802","DOIUrl":"https://doi.org/10.1109/ISIT.2019.8849802","url":null,"abstract":"This paper studies the optimal achievable performance of compressed sensing based unsourced random-access communication over the real AWGN channel. \"Unsourced\" means that every user employs the same codebook. This paradigm, recently introduced by Polyanskiy, is a natural consequence of a very large number of potential users of which only a finite number is active in each time slot. The resemblance of compressed sensing based communication and sparse regression codes (SPARCs), a novel type of point-to-point channel codes, allows us to design and analyse an efficient unsourced random-access code. Finite blocklength simulations show that the combination of AMP decoding, with suitable approximations, together with an outer code recently proposed by Amalladinne et. al. outperforms state of the art methods in terms of required energyper-bit at lower decoding complexity.","PeriodicalId":6708,"journal":{"name":"2019 IEEE International Symposium on Information Theory (ISIT)","volume":"36 1","pages":"2843-2847"},"PeriodicalIF":0.0,"publicationDate":"2019-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80145665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 56
Pareto Optimal Schemes in Coded Caching 编码缓存中的Pareto最优方案
2019 IEEE International Symposium on Information Theory (ISIT) Pub Date : 2019-07-07 DOI: 10.1109/ISIT.2019.8849680
P. VijithKumarK., B. K. Rai, T. Jacob
{"title":"Pareto Optimal Schemes in Coded Caching","authors":"P. VijithKumarK., B. K. Rai, T. Jacob","doi":"10.1109/ISIT.2019.8849680","DOIUrl":"https://doi.org/10.1109/ISIT.2019.8849680","url":null,"abstract":"Maddah-Ali and Niesen, in a seminal work, initiated the study of rate memory tradeoff for a canonical cache network which operates via a placement phase and a delivery phase. While considering the case of placement phase being uncoded, Yu et al. proved the surprising result of the existence of a universal code, a code which is simultaneously optimal for all demand types. In this paper, we prove that universal codes do not exist when coding is permitted in the placement phase. As part of our proof, we introduce new kinds of lower bounds. In these lower bounds, instead of considering one demand type at a time, we consider several demand types simultaneously. These bounds give us better insight into how the performance for one demand type affects the performance for the other demand types. The non-existence of a universal scheme motivates us to introduce the notion of Pareto optimal schemes, and we prove that Chen’s scheme is Pareto optimal.","PeriodicalId":6708,"journal":{"name":"2019 IEEE International Symposium on Information Theory (ISIT)","volume":"12 1","pages":"2629-2633"},"PeriodicalIF":0.0,"publicationDate":"2019-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72889216","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Interactions Between Learning and Broadcasting in Wireless Recommendation Systems 无线推荐系统中学习与广播的交互作用
2019 IEEE International Symposium on Information Theory (ISIT) Pub Date : 2019-07-07 DOI: 10.1109/ISIT.2019.8849556
Linqi Song, C. Fragouli, D. Shah
{"title":"Interactions Between Learning and Broadcasting in Wireless Recommendation Systems","authors":"Linqi Song, C. Fragouli, D. Shah","doi":"10.1109/ISIT.2019.8849556","DOIUrl":"https://doi.org/10.1109/ISIT.2019.8849556","url":null,"abstract":"We consider recommendation systems that need to operate under wireless bandwidth constraints, which is measured as the number of broadcast transmissions. We demonstrate a (tight for some instances) tradeoff between regret and bandwidth for wireless recommendations formulated in a contextual multiarmed bandit framework.","PeriodicalId":6708,"journal":{"name":"2019 IEEE International Symposium on Information Theory (ISIT)","volume":"10 1","pages":"2549-2553"},"PeriodicalIF":0.0,"publicationDate":"2019-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76242390","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Towards an Algebraic Network Information Theory: Distributed Lossy Computation of Linear Functions 迈向代数网络信息论:线性函数的分布有损计算
2019 IEEE International Symposium on Information Theory (ISIT) Pub Date : 2019-07-07 DOI: 10.1109/ISIT.2019.8849363
S. Lim, Chen Feng, A. Pastore, B. Nazer, M. Gastpar
{"title":"Towards an Algebraic Network Information Theory: Distributed Lossy Computation of Linear Functions","authors":"S. Lim, Chen Feng, A. Pastore, B. Nazer, M. Gastpar","doi":"10.1109/ISIT.2019.8849363","DOIUrl":"https://doi.org/10.1109/ISIT.2019.8849363","url":null,"abstract":"Consider the important special case of the K-user distributed source coding problem where the decoder only wishes to recover one or more linear combinations of the sources. The work of Körner and Marton demonstrated that, in some cases, the optimal rate region is attained by random linear codes, and strictly improves upon the best-known achievable rate region established via random i.i.d. codes. Recent efforts have sought to develop a framework for characterizing the achievable rate region for nested linear codes via joint typicality encoding and decoding. Here, we make further progress along this direction by proposing an achievable rate region for simultaneous joint typicality decoding of nested linear codes. Our approach generalizes the results of Körner and Marton to computing an arbitrary number of linear combinations and to the lossy computation setting.","PeriodicalId":6708,"journal":{"name":"2019 IEEE International Symposium on Information Theory (ISIT)","volume":"239 1","pages":"1827-1831"},"PeriodicalIF":0.0,"publicationDate":"2019-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76272229","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Constrained de Bruijn Codes and their Applications 约束de Bruijn码及其应用
2019 IEEE International Symposium on Information Theory (ISIT) Pub Date : 2019-07-07 DOI: 10.1109/ISIT.2019.8849237
Y. M. Chee, T. Etzion, H. M. Kiah, Van Khu Vu, Eitan Yaakobi
{"title":"Constrained de Bruijn Codes and their Applications","authors":"Y. M. Chee, T. Etzion, H. M. Kiah, Van Khu Vu, Eitan Yaakobi","doi":"10.1109/ISIT.2019.8849237","DOIUrl":"https://doi.org/10.1109/ISIT.2019.8849237","url":null,"abstract":"A sequence s = (s1,⋯,sn) is called a (b, h)-constrained de Bruijn sequence if all substrings of length h starting within b consecutive positions are distinct. A set of (b, h)-constrained de Bruijn sequences is called a (b, h)-constrained de Bruijn code. A (b, h)-constrained de Bruijn sequence was constructed and used as a component of a code correcting multiple limited-shift-errors in racetrack memories. In this work, we show that a (b, h)-constrained de Bruijn code can correct deletions and sticky-insertions and also can determine the locations of these errors in an ℓ-symbol read channel. We also show that it is possible to use sequences from a (b, h)-constrained de Bruijn code to construct a code correcting shift-errors in racetrack memories. As a consequence, we improve the rates on previous known codes.It is shown in this work that a (b, h)-constrained de Bruijn code is a constrained code avoiding a set of specific patterns. Finally, we present some techniques to compute the maximum asymptotic rate and find some efficient encoding/decoding algorithms for (b, h)-constrained de Bruijn codes.","PeriodicalId":6708,"journal":{"name":"2019 IEEE International Symposium on Information Theory (ISIT)","volume":"8 1","pages":"2369-2373"},"PeriodicalIF":0.0,"publicationDate":"2019-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73449009","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Explicit constructions of MSR codes for the rack-aware storage model 机架感知存储模型的MSR代码的显式构造
2019 IEEE International Symposium on Information Theory (ISIT) Pub Date : 2019-07-07 DOI: 10.1109/ISIT.2019.8849278
Zitan Chen, A. Barg
{"title":"Explicit constructions of MSR codes for the rack-aware storage model","authors":"Zitan Chen, A. Barg","doi":"10.1109/ISIT.2019.8849278","DOIUrl":"https://doi.org/10.1109/ISIT.2019.8849278","url":null,"abstract":"We consider erasure coding for a model of storage that assumes that nodes are organized into equally sized groups, called racks, such that repairing failed nodes is limited only by inter-rack communication, while transmission of data within a rack does not contribute to the repair bandwidth. We present explicit families of MDS array codes that support recovery of a single failed node from any number of helper racks using the minimum possible amount of inter-rack communication. One of our constructions also has the additional property of low access.Finally, we present a construction of scalar Reed-Solomon codes that support optimal repair for the rack-oriented storage model.","PeriodicalId":6708,"journal":{"name":"2019 IEEE International Symposium on Information Theory (ISIT)","volume":"218 1","pages":"226-230"},"PeriodicalIF":0.0,"publicationDate":"2019-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75618544","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sparse Covariance Estimation from Quadratic Measurements: A Precise Analysis 二次测量的稀疏协方差估计:一个精确的分析
2019 IEEE International Symposium on Information Theory (ISIT) Pub Date : 2019-07-07 DOI: 10.1109/ISIT.2019.8849405
Ehsan Abbasi, Fariborz Salehi, B. Hassibi
{"title":"Sparse Covariance Estimation from Quadratic Measurements: A Precise Analysis","authors":"Ehsan Abbasi, Fariborz Salehi, B. Hassibi","doi":"10.1109/ISIT.2019.8849405","DOIUrl":"https://doi.org/10.1109/ISIT.2019.8849405","url":null,"abstract":"We study the problem of estimating a high-dimensional sparse covariance matrix, Σ0, from a finite number of quadratic measurements, i.e., measurements ${text{a}}_i^T{Sigma _0}{{text{a}}_i}$ which are quadratic forms in the measurement vectors ai resulting from the covariance matrix, Σ0. Such a problem arises in applications where we can only make energy measurements of the underlying random variables. We study a simple LASSO-like convex recovery algorithm which involves a squared 2-norm (to match the covariance estimate to the measurements), plus a regularization term (that penalizes the ℓ1−norm of the non-diagonal entries of Σ0 to enforce sparsity). When the measurement vectors are i.i.d. Gaussian, we obtain the precise error performance of the algorithm (accurately determining the estimation error in any metric, e.g., 2-norm, operator norm, etc.) as a function of the number of measurements and the underlying distribution of Σ0. In particular, in the noiseless case we determine the necessary and sufficient number of measurements required to perfectly recover Σ0 as a function of its sparsity. Our results rely on a novel comparison lemma which relates a convex optimization problem with \"quadratic Gaussian\" measurements to one which has i.i.d. Gaussian measurements.","PeriodicalId":6708,"journal":{"name":"2019 IEEE International Symposium on Information Theory (ISIT)","volume":"15 1","pages":"2074-2078"},"PeriodicalIF":0.0,"publicationDate":"2019-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76260610","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Energy efficient random access for the quasi-static fading MAC 准静态衰落MAC的节能随机存取
2019 IEEE International Symposium on Information Theory (ISIT) Pub Date : 2019-07-07 DOI: 10.1109/ISIT.2019.8849288
S. Kowshik, K. Andreev, A. Frolov, Yury Polyanskiy
{"title":"Energy efficient random access for the quasi-static fading MAC","authors":"S. Kowshik, K. Andreev, A. Frolov, Yury Polyanskiy","doi":"10.1109/ISIT.2019.8849288","DOIUrl":"https://doi.org/10.1109/ISIT.2019.8849288","url":null,"abstract":"We discuss the problem of designing channel access architectures for enabling fast, low-latency, grant-free and uncoordinated uplink for densely packed wireless nodes. Specifically, we extend the concept of random-access code introduced at ISIT’2017 by one of the authors to the practically more relevant case of the AWGN multiple-access channel (MAC) subject to Rayleigh fading, unknown to the decoder. We derive bounds on the fundamental limits of random-access coding and propose an alternating belief-propagation scheme as a candidate practical solution. The latter’s performance was found to be surprisingly close to the information-theoretic bounds. It is curious, thus, that while fading significantly increases the minimal required energy-per-bit Eb/N0 (from about 0-2 dB to about 8-11 dB), it appears that it is much easier to attain the optimal performance over the fading channel with a practical scheme by leveraging the inherent randomization introduced by the channel. Finally, we mention that while a number of candidate solutions (MUSA, SCMA, RSMA, etc.) are being discussed for the 5G, the information-theoretic analysis and benchmarking has not been attempted before (in part due to lack of common random-access model). Our work may be seen as a step towards unifying performance comparisons of these methods.","PeriodicalId":6708,"journal":{"name":"2019 IEEE International Symposium on Information Theory (ISIT)","volume":"67 1","pages":"2768-2772"},"PeriodicalIF":0.0,"publicationDate":"2019-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83585744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 46
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信