{"title":"Error Exponents of Parallel Two-way Discrete Memoryless Channels using Variable Length Coding","authors":"K. Palacio-Baus, Meysam Asadi, N. Devroye","doi":"10.1109/ISIT.2019.8849727","DOIUrl":"https://doi.org/10.1109/ISIT.2019.8849727","url":null,"abstract":"Achievable error exponents for two-way parallel discrete memoryless channels (DMC) using variable block length coding (VLC) are presented. First, Forney’s erasure decoding error exponent is shown to be achievable for both directions simultaneously. Next, for some rate-pairs, it is shown that the error exponent of the direction with a smaller capacity may be further increased by allocating feedback resources to it in the other direction, at the price of a decreased error exponent for the other terminal. The presented two-way communication scheme builds upon Draper-Sahai’s one-way DMC achievability scheme with noisy feedback under VLC. Both achievable error exponent regions demonstrate that the use of VLC and interaction between the terminals may benefit both directions’ error exponents over fixed block length and feedback free transmission.1","PeriodicalId":6708,"journal":{"name":"2019 IEEE International Symposium on Information Theory (ISIT)","volume":"7 1","pages":"2249-2253"},"PeriodicalIF":0.0,"publicationDate":"2019-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82892885","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Low-degree Pseudo-Boolean Function Recovery Using Codes","authors":"Orhan Ocal, S. Kadhe, K. Ramchandran","doi":"10.1109/ISIT.2019.8849424","DOIUrl":"https://doi.org/10.1109/ISIT.2019.8849424","url":null,"abstract":"Pseudo-Boolean functions are functions whose input variables are binary and output is in the real numbers. These functions show up in many different applications in computer science, finance and economics to name a few. Pseudo-Boolean functions lend themselves to a spectral representation, which is closely related to the Walsh-Hadamard Transform from signal processing. In some problems, the coefficients of the spectral representation are active only on the low-degree terms. In this work, we present a method for computationally-efficient recovery of these low-degree coefficients. Our method is based on evaluating the input pseudo-Boolean function at points given by the codewords of a codebook, and then performing a Walsh-Hadamard Transform on the resulting signal. Codes having high rates and good minimum distance properties yield sets of evaluations points whose size is close to the number of low-degree coefficients. In particular perfect codes, such as Hamming Codes or the Golay Code, enable efficient recovery with optimal number of evaluations of the function.","PeriodicalId":6708,"journal":{"name":"2019 IEEE International Symposium on Information Theory (ISIT)","volume":"11 1","pages":"1207-1211"},"PeriodicalIF":0.0,"publicationDate":"2019-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89812885","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"SPARCs and AMP for Unsourced Random Access","authors":"Alexander Fengler, P. Jung, G. Caire","doi":"10.1109/ISIT.2019.8849802","DOIUrl":"https://doi.org/10.1109/ISIT.2019.8849802","url":null,"abstract":"This paper studies the optimal achievable performance of compressed sensing based unsourced random-access communication over the real AWGN channel. \"Unsourced\" means that every user employs the same codebook. This paradigm, recently introduced by Polyanskiy, is a natural consequence of a very large number of potential users of which only a finite number is active in each time slot. The resemblance of compressed sensing based communication and sparse regression codes (SPARCs), a novel type of point-to-point channel codes, allows us to design and analyse an efficient unsourced random-access code. Finite blocklength simulations show that the combination of AMP decoding, with suitable approximations, together with an outer code recently proposed by Amalladinne et. al. outperforms state of the art methods in terms of required energyper-bit at lower decoding complexity.","PeriodicalId":6708,"journal":{"name":"2019 IEEE International Symposium on Information Theory (ISIT)","volume":"36 1","pages":"2843-2847"},"PeriodicalIF":0.0,"publicationDate":"2019-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80145665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Pareto Optimal Schemes in Coded Caching","authors":"P. VijithKumarK., B. K. Rai, T. Jacob","doi":"10.1109/ISIT.2019.8849680","DOIUrl":"https://doi.org/10.1109/ISIT.2019.8849680","url":null,"abstract":"Maddah-Ali and Niesen, in a seminal work, initiated the study of rate memory tradeoff for a canonical cache network which operates via a placement phase and a delivery phase. While considering the case of placement phase being uncoded, Yu et al. proved the surprising result of the existence of a universal code, a code which is simultaneously optimal for all demand types. In this paper, we prove that universal codes do not exist when coding is permitted in the placement phase. As part of our proof, we introduce new kinds of lower bounds. In these lower bounds, instead of considering one demand type at a time, we consider several demand types simultaneously. These bounds give us better insight into how the performance for one demand type affects the performance for the other demand types. The non-existence of a universal scheme motivates us to introduce the notion of Pareto optimal schemes, and we prove that Chen’s scheme is Pareto optimal.","PeriodicalId":6708,"journal":{"name":"2019 IEEE International Symposium on Information Theory (ISIT)","volume":"12 1","pages":"2629-2633"},"PeriodicalIF":0.0,"publicationDate":"2019-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72889216","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Interactions Between Learning and Broadcasting in Wireless Recommendation Systems","authors":"Linqi Song, C. Fragouli, D. Shah","doi":"10.1109/ISIT.2019.8849556","DOIUrl":"https://doi.org/10.1109/ISIT.2019.8849556","url":null,"abstract":"We consider recommendation systems that need to operate under wireless bandwidth constraints, which is measured as the number of broadcast transmissions. We demonstrate a (tight for some instances) tradeoff between regret and bandwidth for wireless recommendations formulated in a contextual multiarmed bandit framework.","PeriodicalId":6708,"journal":{"name":"2019 IEEE International Symposium on Information Theory (ISIT)","volume":"10 1","pages":"2549-2553"},"PeriodicalIF":0.0,"publicationDate":"2019-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76242390","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Lim, Chen Feng, A. Pastore, B. Nazer, M. Gastpar
{"title":"Towards an Algebraic Network Information Theory: Distributed Lossy Computation of Linear Functions","authors":"S. Lim, Chen Feng, A. Pastore, B. Nazer, M. Gastpar","doi":"10.1109/ISIT.2019.8849363","DOIUrl":"https://doi.org/10.1109/ISIT.2019.8849363","url":null,"abstract":"Consider the important special case of the K-user distributed source coding problem where the decoder only wishes to recover one or more linear combinations of the sources. The work of Körner and Marton demonstrated that, in some cases, the optimal rate region is attained by random linear codes, and strictly improves upon the best-known achievable rate region established via random i.i.d. codes. Recent efforts have sought to develop a framework for characterizing the achievable rate region for nested linear codes via joint typicality encoding and decoding. Here, we make further progress along this direction by proposing an achievable rate region for simultaneous joint typicality decoding of nested linear codes. Our approach generalizes the results of Körner and Marton to computing an arbitrary number of linear combinations and to the lossy computation setting.","PeriodicalId":6708,"journal":{"name":"2019 IEEE International Symposium on Information Theory (ISIT)","volume":"239 1","pages":"1827-1831"},"PeriodicalIF":0.0,"publicationDate":"2019-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76272229","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Y. M. Chee, T. Etzion, H. M. Kiah, Van Khu Vu, Eitan Yaakobi
{"title":"Constrained de Bruijn Codes and their Applications","authors":"Y. M. Chee, T. Etzion, H. M. Kiah, Van Khu Vu, Eitan Yaakobi","doi":"10.1109/ISIT.2019.8849237","DOIUrl":"https://doi.org/10.1109/ISIT.2019.8849237","url":null,"abstract":"A sequence s = (s1,⋯,sn) is called a (b, h)-constrained de Bruijn sequence if all substrings of length h starting within b consecutive positions are distinct. A set of (b, h)-constrained de Bruijn sequences is called a (b, h)-constrained de Bruijn code. A (b, h)-constrained de Bruijn sequence was constructed and used as a component of a code correcting multiple limited-shift-errors in racetrack memories. In this work, we show that a (b, h)-constrained de Bruijn code can correct deletions and sticky-insertions and also can determine the locations of these errors in an ℓ-symbol read channel. We also show that it is possible to use sequences from a (b, h)-constrained de Bruijn code to construct a code correcting shift-errors in racetrack memories. As a consequence, we improve the rates on previous known codes.It is shown in this work that a (b, h)-constrained de Bruijn code is a constrained code avoiding a set of specific patterns. Finally, we present some techniques to compute the maximum asymptotic rate and find some efficient encoding/decoding algorithms for (b, h)-constrained de Bruijn codes.","PeriodicalId":6708,"journal":{"name":"2019 IEEE International Symposium on Information Theory (ISIT)","volume":"8 1","pages":"2369-2373"},"PeriodicalIF":0.0,"publicationDate":"2019-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73449009","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Explicit constructions of MSR codes for the rack-aware storage model","authors":"Zitan Chen, A. Barg","doi":"10.1109/ISIT.2019.8849278","DOIUrl":"https://doi.org/10.1109/ISIT.2019.8849278","url":null,"abstract":"We consider erasure coding for a model of storage that assumes that nodes are organized into equally sized groups, called racks, such that repairing failed nodes is limited only by inter-rack communication, while transmission of data within a rack does not contribute to the repair bandwidth. We present explicit families of MDS array codes that support recovery of a single failed node from any number of helper racks using the minimum possible amount of inter-rack communication. One of our constructions also has the additional property of low access.Finally, we present a construction of scalar Reed-Solomon codes that support optimal repair for the rack-oriented storage model.","PeriodicalId":6708,"journal":{"name":"2019 IEEE International Symposium on Information Theory (ISIT)","volume":"218 1","pages":"226-230"},"PeriodicalIF":0.0,"publicationDate":"2019-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75618544","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Sparse Covariance Estimation from Quadratic Measurements: A Precise Analysis","authors":"Ehsan Abbasi, Fariborz Salehi, B. Hassibi","doi":"10.1109/ISIT.2019.8849405","DOIUrl":"https://doi.org/10.1109/ISIT.2019.8849405","url":null,"abstract":"We study the problem of estimating a high-dimensional sparse covariance matrix, Σ0, from a finite number of quadratic measurements, i.e., measurements ${text{a}}_i^T{Sigma _0}{{text{a}}_i}$ which are quadratic forms in the measurement vectors ai resulting from the covariance matrix, Σ0. Such a problem arises in applications where we can only make energy measurements of the underlying random variables. We study a simple LASSO-like convex recovery algorithm which involves a squared 2-norm (to match the covariance estimate to the measurements), plus a regularization term (that penalizes the ℓ1−norm of the non-diagonal entries of Σ0 to enforce sparsity). When the measurement vectors are i.i.d. Gaussian, we obtain the precise error performance of the algorithm (accurately determining the estimation error in any metric, e.g., 2-norm, operator norm, etc.) as a function of the number of measurements and the underlying distribution of Σ0. In particular, in the noiseless case we determine the necessary and sufficient number of measurements required to perfectly recover Σ0 as a function of its sparsity. Our results rely on a novel comparison lemma which relates a convex optimization problem with \"quadratic Gaussian\" measurements to one which has i.i.d. Gaussian measurements.","PeriodicalId":6708,"journal":{"name":"2019 IEEE International Symposium on Information Theory (ISIT)","volume":"15 1","pages":"2074-2078"},"PeriodicalIF":0.0,"publicationDate":"2019-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76260610","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Kowshik, K. Andreev, A. Frolov, Yury Polyanskiy
{"title":"Energy efficient random access for the quasi-static fading MAC","authors":"S. Kowshik, K. Andreev, A. Frolov, Yury Polyanskiy","doi":"10.1109/ISIT.2019.8849288","DOIUrl":"https://doi.org/10.1109/ISIT.2019.8849288","url":null,"abstract":"We discuss the problem of designing channel access architectures for enabling fast, low-latency, grant-free and uncoordinated uplink for densely packed wireless nodes. Specifically, we extend the concept of random-access code introduced at ISIT’2017 by one of the authors to the practically more relevant case of the AWGN multiple-access channel (MAC) subject to Rayleigh fading, unknown to the decoder. We derive bounds on the fundamental limits of random-access coding and propose an alternating belief-propagation scheme as a candidate practical solution. The latter’s performance was found to be surprisingly close to the information-theoretic bounds. It is curious, thus, that while fading significantly increases the minimal required energy-per-bit Eb/N0 (from about 0-2 dB to about 8-11 dB), it appears that it is much easier to attain the optimal performance over the fading channel with a practical scheme by leveraging the inherent randomization introduced by the channel. Finally, we mention that while a number of candidate solutions (MUSA, SCMA, RSMA, etc.) are being discussed for the 5G, the information-theoretic analysis and benchmarking has not been attempted before (in part due to lack of common random-access model). Our work may be seen as a step towards unifying performance comparisons of these methods.","PeriodicalId":6708,"journal":{"name":"2019 IEEE International Symposium on Information Theory (ISIT)","volume":"67 1","pages":"2768-2772"},"PeriodicalIF":0.0,"publicationDate":"2019-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83585744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}