首页 > 最新文献

2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton)最新文献

英文 中文
Masking trapped charge in flash memories 掩盖被困在闪存中的电荷
Pub Date : 2015-09-01 DOI: 10.1109/ALLERTON.2015.7447072
A. Wachter-Zeh, Eitan Yaakobi
This paper studies defect memory cells and in particular partially stuck-at memory cells, which occur when charge is trapped in multi-level cells of non-volatile memories such as flash memories. If a cell can store the q levels 0, 1, ..., q - 1, we say that it is partially stuck-at level s, where 1 ≤ s ≤ q - 1, if it can only store values which are at least s. We follow the common setup where the encoder knows the positions and levels of the partially stuck-at cells whereas the decoder does not. In this paper, we study codes for masking u partially stuck-at cells. We derive lower and upper bounds on the redundancy of such codes and present code constructions. Furthermore, we analyze the dual defect model in which cells cannot reach higher levels, and show that codes for partially stuck-at cells can be used to mask this type of defects as well. Lastly, we analyze the capacity of the partially stuck-at memory channel and study how far our constructions are from the capacity.
本文研究了非易失性存储器(如快闪存储器)中电荷被困在多层存储单元中的缺陷存储单元,特别是部分卡在存储单元。如果一个单元可以存储q级0,1,…, q - 1,我们说它是部分卡在水平s,其中1≤s≤q - 1,如果它只能存储至少为s的值。我们遵循常见的设置,其中编码器知道部分卡在细胞的位置和水平,而解码器不知道。在本文中,我们研究了掩码部分卡住的单元。我们推导了这类码的冗余度的下界和上界,并给出了码的结构。此外,我们分析了双重缺陷模型,其中细胞不能达到更高的水平,并表明部分卡住的细胞的代码也可以用来掩盖这种类型的缺陷。最后,我们分析了部分卡住的存储通道的容量,并研究了我们的结构离容量有多远。
{"title":"Masking trapped charge in flash memories","authors":"A. Wachter-Zeh, Eitan Yaakobi","doi":"10.1109/ALLERTON.2015.7447072","DOIUrl":"https://doi.org/10.1109/ALLERTON.2015.7447072","url":null,"abstract":"This paper studies defect memory cells and in particular partially stuck-at memory cells, which occur when charge is trapped in multi-level cells of non-volatile memories such as flash memories. If a cell can store the q levels 0, 1, ..., q - 1, we say that it is partially stuck-at level s, where 1 ≤ s ≤ q - 1, if it can only store values which are at least s. We follow the common setup where the encoder knows the positions and levels of the partially stuck-at cells whereas the decoder does not. In this paper, we study codes for masking u partially stuck-at cells. We derive lower and upper bounds on the redundancy of such codes and present code constructions. Furthermore, we analyze the dual defect model in which cells cannot reach higher levels, and show that codes for partially stuck-at cells can be used to mask this type of defects as well. Lastly, we analyze the capacity of the partially stuck-at memory channel and study how far our constructions are from the capacity.","PeriodicalId":112948,"journal":{"name":"2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126250315","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Interference-aware routing and spectrum allocation for millimeter wave backhaul in urban picocells 城市微蜂窝毫米波回程干扰感知路由与频谱分配
Pub Date : 2015-09-01 DOI: 10.1109/ALLERTON.2015.7557347
M. Rasekh, Dongning Guo, Upamanyu Madhow
The exponential growth in demand for mobile data requires significant increases in spatial reuse, motivating an evolution towards picocellular architectures with densely deployed base stations. Providing backhaul for such a network is a key challenge, because of the high access link rates, and the cost and difficulty of running optical fiber to base stations that might be opportunistically placed on lampposts and rooftops. Wireless backhaul using millimeter (mm) wave spectrum is therefore an attractive and flexible approach, given the plentiful availability of spectrum and the possibility of synthesizing highly directive, steerable links. In this paper, we formulate and investigate the problem of joint resource allocation and routing on such a mm wave backhaul network, providing a linear programming formulation that accounts for mutual interference across simultaneously active links. While the number of variables grows exponentially in network size, it is possible to prune the problem size so that it is manageable for moderately sized networks. Numerical results and design implications are briefly discussed.
移动数据需求的指数级增长要求空间重用的显著增加,从而推动向具有密集部署基站的单蜂窝架构发展。为这样的网络提供回程是一个关键的挑战,因为接入链路速率很高,并且将光纤运行到可能偶然放置在灯柱和屋顶上的基站的成本和难度。因此,利用毫米波频谱的无线回程是一种有吸引力且灵活的方法,因为频谱的可用性丰富,并且可以合成高度定向、可操纵的链路。在本文中,我们制定并研究了这种毫米波回程网络上的联合资源分配和路由问题,提供了一个考虑同时活动链路相互干扰的线性规划公式。当变量的数量随着网络规模呈指数级增长时,可以减少问题的规模,使其在中等规模的网络中易于管理。简要讨论了数值结果和设计意义。
{"title":"Interference-aware routing and spectrum allocation for millimeter wave backhaul in urban picocells","authors":"M. Rasekh, Dongning Guo, Upamanyu Madhow","doi":"10.1109/ALLERTON.2015.7557347","DOIUrl":"https://doi.org/10.1109/ALLERTON.2015.7557347","url":null,"abstract":"The exponential growth in demand for mobile data requires significant increases in spatial reuse, motivating an evolution towards picocellular architectures with densely deployed base stations. Providing backhaul for such a network is a key challenge, because of the high access link rates, and the cost and difficulty of running optical fiber to base stations that might be opportunistically placed on lampposts and rooftops. Wireless backhaul using millimeter (mm) wave spectrum is therefore an attractive and flexible approach, given the plentiful availability of spectrum and the possibility of synthesizing highly directive, steerable links. In this paper, we formulate and investigate the problem of joint resource allocation and routing on such a mm wave backhaul network, providing a linear programming formulation that accounts for mutual interference across simultaneously active links. While the number of variables grows exponentially in network size, it is possible to prune the problem size so that it is manageable for moderately sized networks. Numerical results and design implications are briefly discussed.","PeriodicalId":112948,"journal":{"name":"2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127936415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Finite-SNR regime analysis of the Gaussian wiretap multiple-access channel 高斯窃听多址信道的有限信噪比谱分析
Pub Date : 2015-09-01 DOI: 10.1109/ALLERTON.2015.7447020
P. Babaheidarian, Somayeh Salimi, Panos Papadimitratos
In this work, we consider a K-user Gaussian wiretap multiple-access channel (GW-MAC) in which each transmitter has an independent confidential message for the receiver. There is also an external eavesdropper who intercepts the communications. The goal is to transmit the messages reliably while keeping them confidential from the eavesdropper. To accomplish this goal, two different approaches have been proposed in prior works, namely, i.i.d. Gaussian random coding and real alignment. However, the former approach fails at moderate and high SNR regimes as its achievable result does not grow with SNR. On the other hand, while the latter approach gives a promising result at the infinite SNR regime, its extension to the finite-SNR regime is a challenging task. To fill the gap between the performance of the existing approaches, in this work, we establish a new scheme in which, at the receiver's side, it utilizes an extension of the compute-and-forward decoding strategy and at the transmitters' side it exploits lattice alignment, cooperative jamming, and i.i.d. random codes. For the proposed scheme, we derive a new achievable bound on sum secure rate which scales with log(SNR) and hence it outperforms the i.i.d. Gaussian codes in moderate and high SNR regimes. We evaluate the performance of our scheme, both theoretically and numerically. Furthermore, we show that our sum secure rate achieves the optimal sum secure degrees of freedom in the infinite-SNR regime.
在这项工作中,我们考虑了一个k用户高斯窃听多址信道(GW-MAC),其中每个发送者都有一个独立的机密消息给接收者。还有一个外部窃听者拦截通信。目标是可靠地传输消息,同时对窃听者保密。为了实现这一目标,在之前的工作中提出了两种不同的方法,即高斯随机编码和实对齐。然而,前一种方法在中等和高信噪比条件下失败,因为其可实现的结果不随信噪比增长。另一方面,虽然后一种方法在无限信噪比下给出了很好的结果,但将其推广到有限信噪比下是一项具有挑战性的任务。为了填补现有方法之间的性能差距,在这项工作中,我们建立了一个新的方案,其中,在接收端,它利用了计算机和前向解码策略的扩展,在发送端,它利用了晶格对齐,协同干扰和i.i.d.随机码。对于所提出的方案,我们推导了一个新的可实现的和安全率的边界,该边界随对数(SNR)的扩展而扩展,因此它在中高信噪比下优于i.i.d高斯码。我们从理论上和数值上评估了我们的方案的性能。进一步,我们证明了我们的和安全率达到了无限信噪比下的最优和安全自由度。
{"title":"Finite-SNR regime analysis of the Gaussian wiretap multiple-access channel","authors":"P. Babaheidarian, Somayeh Salimi, Panos Papadimitratos","doi":"10.1109/ALLERTON.2015.7447020","DOIUrl":"https://doi.org/10.1109/ALLERTON.2015.7447020","url":null,"abstract":"In this work, we consider a K-user Gaussian wiretap multiple-access channel (GW-MAC) in which each transmitter has an independent confidential message for the receiver. There is also an external eavesdropper who intercepts the communications. The goal is to transmit the messages reliably while keeping them confidential from the eavesdropper. To accomplish this goal, two different approaches have been proposed in prior works, namely, i.i.d. Gaussian random coding and real alignment. However, the former approach fails at moderate and high SNR regimes as its achievable result does not grow with SNR. On the other hand, while the latter approach gives a promising result at the infinite SNR regime, its extension to the finite-SNR regime is a challenging task. To fill the gap between the performance of the existing approaches, in this work, we establish a new scheme in which, at the receiver's side, it utilizes an extension of the compute-and-forward decoding strategy and at the transmitters' side it exploits lattice alignment, cooperative jamming, and i.i.d. random codes. For the proposed scheme, we derive a new achievable bound on sum secure rate which scales with log(SNR) and hence it outperforms the i.i.d. Gaussian codes in moderate and high SNR regimes. We evaluate the performance of our scheme, both theoretically and numerically. Furthermore, we show that our sum secure rate achieves the optimal sum secure degrees of freedom in the infinite-SNR regime.","PeriodicalId":112948,"journal":{"name":"2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton)","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127319777","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Coded caching for reducing CSIT-feedback in wireless communications 用于减少无线通信中csit反馈的编码缓存
Pub Date : 2015-09-01 DOI: 10.1109/ALLERTON.2015.7447131
Jingjing Zhang, Felix Engelmann, P. Elia
The work explores the role of caching content at receiving users for the purpose of reducing the need for feedback in wireless communications. In the K-user broadcast channel (BC), we show how caching, when combined with a rate-splitting broadcast approach, can not only improve performance, but can also reduce the need for channel state information at the transmitter (CSIT), in the sense that the identified cache-aided optimal degrees-of-freedom performance, can in fact be achieved with reduced-quality CSIT. These CSIT savings can be traced back to an inherent relationship between caching, performance, and CSIT; caching improves performance by leveraging multicasting of common information, which automatically reduces the need for CSIT, by virtue of the fact that common information is not a cause of interference. At the same time though, too much multicasting of common information can be detrimental, as it does not utilize existing CSIT. Our caching method builds on the Maddah-Ali and Niesen coded caching scheme, by properly balancing multicast and broadcast opportunities, and by combing caching with rate-splitting communication schemes that are specifically designed to operate under imperfect-quality CSIT. The observed achievable CSIT savings here, are more pronounced for smaller values of K users and N files.
这项工作探讨了在接收用户时缓存内容的作用,目的是减少无线通信中对反馈的需求。在k用户广播信道(BC)中,我们展示了缓存如何与速率分割广播方法相结合,不仅可以提高性能,还可以减少对发射机(CSIT)信道状态信息的需求,从某种意义上说,确定的缓存辅助的最佳自由度性能实际上可以通过降低质量的CSIT来实现。这些CSIT节省可以追溯到缓存、性能和CSIT之间的内在关系;缓存通过利用公共信息的多播来提高性能,这可以自动减少对CSIT的需求,因为公共信息不会造成干扰。但与此同时,过多的公共信息的多播可能是有害的,因为它没有利用现有的CSIT。我们的缓存方法建立在madah - ali和Niesen编码缓存方案的基础上,通过适当地平衡多播和广播机会,并将缓存与专门设计用于在不完美质量CSIT下运行的速率分割通信方案相结合。这里观察到的可实现的CSIT节省对于K个用户和N个文件的较小值更为明显。
{"title":"Coded caching for reducing CSIT-feedback in wireless communications","authors":"Jingjing Zhang, Felix Engelmann, P. Elia","doi":"10.1109/ALLERTON.2015.7447131","DOIUrl":"https://doi.org/10.1109/ALLERTON.2015.7447131","url":null,"abstract":"The work explores the role of caching content at receiving users for the purpose of reducing the need for feedback in wireless communications. In the K-user broadcast channel (BC), we show how caching, when combined with a rate-splitting broadcast approach, can not only improve performance, but can also reduce the need for channel state information at the transmitter (CSIT), in the sense that the identified cache-aided optimal degrees-of-freedom performance, can in fact be achieved with reduced-quality CSIT. These CSIT savings can be traced back to an inherent relationship between caching, performance, and CSIT; caching improves performance by leveraging multicasting of common information, which automatically reduces the need for CSIT, by virtue of the fact that common information is not a cause of interference. At the same time though, too much multicasting of common information can be detrimental, as it does not utilize existing CSIT. Our caching method builds on the Maddah-Ali and Niesen coded caching scheme, by properly balancing multicast and broadcast opportunities, and by combing caching with rate-splitting communication schemes that are specifically designed to operate under imperfect-quality CSIT. The observed achievable CSIT savings here, are more pronounced for smaller values of K users and N files.","PeriodicalId":112948,"journal":{"name":"2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130600626","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 39
Active learning from noisy and abstention feedback 从嘈杂和弃权反馈中主动学习
Pub Date : 2015-09-01 DOI: 10.1109/ALLERTON.2015.7447165
Songbai Yan, Kamalika Chaudhuri, T. Javidi
An active learner is given an instance space, a label space and a hypothesis class, where one of the hypotheses in the class assigns ground truth labels to instances. Additionally, the learner has access to a labeling oracle, which it can interactively query for the label of any example in the instance space. The goal of the learner is to find a good estimate of the hypothesis in the hypothesis class that generates the ground truth labels while making as few interactive queries to the oracle as possible. This work considers a more general setting where the labeling oracle can abstain from providing a label in addition to returning noisy labels. We provide a model for this setting where the abstention rate and the noise rate increase as we get closer to the decision boundary of the ground truth hypothesis. We provide an algorithm and an analysis of the number of queries it makes to the labeling oracle; finally we provide matching lower bounds to demonstrate that our algorithm has near-optimal estimation accuracy.
一个主动学习者被赋予一个实例空间,一个标签空间和一个假设类,其中一个类中的假设为实例分配了基础真值标签。此外,学习者还可以访问一个标记oracle,它可以交互式地查询实例空间中任何示例的标签。学习器的目标是在生成基础真值标签的假设类中找到对假设的良好估计,同时尽可能少地对oracle进行交互式查询。这项工作考虑了一个更一般的设置,在这个设置中,除了返回有噪声的标签之外,标签oracle可以避免提供标签。我们为这种设置提供了一个模型,其中弃权率和噪声率随着我们接近基础真值假设的决策边界而增加。我们提供了一种算法,并分析了它对标签oracle的查询次数;最后给出了匹配下界,证明了该算法具有接近最优的估计精度。
{"title":"Active learning from noisy and abstention feedback","authors":"Songbai Yan, Kamalika Chaudhuri, T. Javidi","doi":"10.1109/ALLERTON.2015.7447165","DOIUrl":"https://doi.org/10.1109/ALLERTON.2015.7447165","url":null,"abstract":"An active learner is given an instance space, a label space and a hypothesis class, where one of the hypotheses in the class assigns ground truth labels to instances. Additionally, the learner has access to a labeling oracle, which it can interactively query for the label of any example in the instance space. The goal of the learner is to find a good estimate of the hypothesis in the hypothesis class that generates the ground truth labels while making as few interactive queries to the oracle as possible. This work considers a more general setting where the labeling oracle can abstain from providing a label in addition to returning noisy labels. We provide a model for this setting where the abstention rate and the noise rate increase as we get closer to the decision boundary of the ground truth hypothesis. We provide an algorithm and an analysis of the number of queries it makes to the labeling oracle; finally we provide matching lower bounds to demonstrate that our algorithm has near-optimal estimation accuracy.","PeriodicalId":112948,"journal":{"name":"2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130720708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Car-following models with delayed feedback: Local stability and Hopf bifurcation 时滞反馈汽车跟随模型:局部稳定性和Hopf分岔
Pub Date : 2015-09-01 DOI: 10.1109/ALLERTON.2015.7447051
G. Kamath, K. Jagannathan, G. Raina
Reaction delays play an important role in determining the qualitative dynamical properties of a platoon of vehicles driving on a straight road. In this paper, we investigate the impact of delayed feedback on the dynamics of two widely-studied car-following models; namely, the classical car-following model and the optimal velocity model. We first conduct a control-theoretic analysis for both models and derive conditions that ensure local stability. We then demonstrate that the transition of traffic flow from the locally stable to the unstable regime occurs via a Hopf bifurcation. Qualitatively, this results in the emergence of limit cycles, which manifest as a back-propagating congestion wave. The analysis is complemented with stability charts and bifurcation diagrams. We also outline some of the implications that our results may have on the design of stable systems in the context of self-driven vehicles.
反应时滞在确定直线道路上行驶车辆的定性动力学特性方面起着重要作用。在本文中,我们研究了延迟反馈对两种被广泛研究的汽车跟随模型动力学的影响;即经典的跟车模型和最优速度模型。我们首先对两个模型进行控制理论分析,并推导出保证局部稳定的条件。然后我们证明了交通流从局部稳定状态到不稳定状态的过渡是通过Hopf分岔发生的。定性地说,这导致极限环的出现,它表现为反向传播的拥塞波。分析还附有稳定性图和分岔图。我们还概述了我们的结果可能对自动驾驶车辆稳定系统设计的一些影响。
{"title":"Car-following models with delayed feedback: Local stability and Hopf bifurcation","authors":"G. Kamath, K. Jagannathan, G. Raina","doi":"10.1109/ALLERTON.2015.7447051","DOIUrl":"https://doi.org/10.1109/ALLERTON.2015.7447051","url":null,"abstract":"Reaction delays play an important role in determining the qualitative dynamical properties of a platoon of vehicles driving on a straight road. In this paper, we investigate the impact of delayed feedback on the dynamics of two widely-studied car-following models; namely, the classical car-following model and the optimal velocity model. We first conduct a control-theoretic analysis for both models and derive conditions that ensure local stability. We then demonstrate that the transition of traffic flow from the locally stable to the unstable regime occurs via a Hopf bifurcation. Qualitatively, this results in the emergence of limit cycles, which manifest as a back-propagating congestion wave. The analysis is complemented with stability charts and bifurcation diagrams. We also outline some of the implications that our results may have on the design of stable systems in the context of self-driven vehicles.","PeriodicalId":112948,"journal":{"name":"2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128365663","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Erasure adversarial wiretap channels 消除对抗性窃听渠道
Pub Date : 2015-09-01 DOI: 10.1109/ALLERTON.2015.7447126
P. Wang, R. Safavi-Naini, Fuchun Lin
In an erasure adversarial wiretap channel (eAWTP-channel), the adversary can select a fraction ρr of the codeword to read, and a fraction ρe of the codeword to erase. The model can be seen as an extension of the wiretap II model where the adversary not only selects its view of the transmitted word, but also can erase a fraction of the codeword. eAWTP codes provide security and reliability for communication over eAWTP channels. We derive an upper bound on the rate of eAWTP codes, and give an efficient construction of a code family that achieves the bound, hence deriving secrecy capacity of the channel. We then show that the construction can also be used for AWTP channels in which instead of erasing code components, the adversary can add noise to the codeword. The construction is the only AWTP code with constant alphabet size.
在擦除对抗性窃听信道(eawtp信道)中,对手可以选择码字的一部分ρr来读取,并选择码字的一部分ρe来擦除。该模型可以看作是窃听II模型的扩展,在窃听II模型中,对手不仅可以选择其对传输字的视图,而且可以擦除代码字的一小部分。eAWTP代码为eAWTP信道上的通信提供了安全性和可靠性。我们给出了eAWTP码率的上界,并给出了达到该上界的码族的有效构造,从而得到了信道的保密容量。然后,我们展示了这种构造也可以用于AWTP信道,在这种信道中,攻击者可以向码字添加噪声,而不是擦除代码组件。该结构是唯一具有恒定字母大小的AWTP代码。
{"title":"Erasure adversarial wiretap channels","authors":"P. Wang, R. Safavi-Naini, Fuchun Lin","doi":"10.1109/ALLERTON.2015.7447126","DOIUrl":"https://doi.org/10.1109/ALLERTON.2015.7447126","url":null,"abstract":"In an erasure adversarial wiretap channel (eAWTP-channel), the adversary can select a fraction ρr of the codeword to read, and a fraction ρe of the codeword to erase. The model can be seen as an extension of the wiretap II model where the adversary not only selects its view of the transmitted word, but also can erase a fraction of the codeword. eAWTP codes provide security and reliability for communication over eAWTP channels. We derive an upper bound on the rate of eAWTP codes, and give an efficient construction of a code family that achieves the bound, hence deriving secrecy capacity of the channel. We then show that the construction can also be used for AWTP channels in which instead of erasing code components, the adversary can add noise to the codeword. The construction is the only AWTP code with constant alphabet size.","PeriodicalId":112948,"journal":{"name":"2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton)","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131964487","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Adaptive CSMA under the SINR model: Fast convergence through local gibbs optimization SINR模型下的自适应CSMA:通过局部吉布斯优化快速收敛
Pub Date : 2015-09-01 DOI: 10.1109/ALLERTON.2015.7447015
Subrahmanya Swamy Peruru, R. Ganti, K. Jagannathan
In this paper, we consider an adaptive CSMA based scheduling algorithm for a single-hop wireless network under a realistic SINR (signal-to-interference-plus-noise ratio) model for the interference, and propose an efficient local optimization based algorithm to estimate certain parameters of the algorithm called fugacities. It is known that adaptive CSMA based algorithms can achieve throughput optimality, by sampling feasible schedules from a Gibbs distribution with appropriate fugacities. Unfortunately, estimating the optimal fugacities for a desired service rate vector is an NP-hard problem. Further, the existing adaptive CSMA algorithms use a stochastic gradient descent based method, which usually entails an impractically slow (exponential in the size of the network) convergence to the optimal fugacities. In contrast, the convergence rate and the complexity of our algorithm is independent of the network size, and depends only on the neighborhood size of a link. In particular, in spatial networks where the neighborhood size does not scale with the network size, our algorithm is order optimal. We show that the proposed algorithm corresponds exactly to performing the well-known Bethe approximation to the underlying Gibbs distribution. We also consider two special cases of the SINR interference model and obtain the corresponding fugacities in closed form. Numerical results indicate that the proposed method achieves extremely fast convergence to near-optimal fugacities, and often outperforms the convergence rate of the stochastic gradient descent by a few orders of magnitude.
在本文中,我们考虑了一种基于自适应CSMA的单跳无线网络调度算法,该算法在真实的干扰SINR(信噪比)模型下,提出了一种有效的基于局部优化的算法来估计算法的某些参数,称为模糊度。已知基于自适应CSMA的算法可以通过从具有适当模糊度的吉布斯分布中采样可行调度来实现吞吐量最优。不幸的是,估计期望的服务率向量的最优功能是一个np困难问题。此外,现有的自适应CSMA算法使用基于随机梯度下降的方法,这通常需要一个不切实际的缓慢(网络大小呈指数级)收敛到最优离散度。相比之下,我们的算法的收敛速度和复杂度与网络大小无关,而只取决于链路的邻域大小。特别是在邻域大小不随网络大小缩放的空间网络中,我们的算法是有序最优的。我们表明,所提出的算法完全对应于对潜在的吉布斯分布执行著名的贝特近似。我们还考虑了SINR干涉模型的两种特殊情况,并以封闭形式得到了相应的离散度。数值结果表明,该方法能极快地收敛到近最优离散度,且收敛速度往往比随机梯度下降法的收敛速度快几个数量级。
{"title":"Adaptive CSMA under the SINR model: Fast convergence through local gibbs optimization","authors":"Subrahmanya Swamy Peruru, R. Ganti, K. Jagannathan","doi":"10.1109/ALLERTON.2015.7447015","DOIUrl":"https://doi.org/10.1109/ALLERTON.2015.7447015","url":null,"abstract":"In this paper, we consider an adaptive CSMA based scheduling algorithm for a single-hop wireless network under a realistic SINR (signal-to-interference-plus-noise ratio) model for the interference, and propose an efficient local optimization based algorithm to estimate certain parameters of the algorithm called fugacities. It is known that adaptive CSMA based algorithms can achieve throughput optimality, by sampling feasible schedules from a Gibbs distribution with appropriate fugacities. Unfortunately, estimating the optimal fugacities for a desired service rate vector is an NP-hard problem. Further, the existing adaptive CSMA algorithms use a stochastic gradient descent based method, which usually entails an impractically slow (exponential in the size of the network) convergence to the optimal fugacities. In contrast, the convergence rate and the complexity of our algorithm is independent of the network size, and depends only on the neighborhood size of a link. In particular, in spatial networks where the neighborhood size does not scale with the network size, our algorithm is order optimal. We show that the proposed algorithm corresponds exactly to performing the well-known Bethe approximation to the underlying Gibbs distribution. We also consider two special cases of the SINR interference model and obtain the corresponding fugacities in closed form. Numerical results indicate that the proposed method achieves extremely fast convergence to near-optimal fugacities, and often outperforms the convergence rate of the stochastic gradient descent by a few orders of magnitude.","PeriodicalId":112948,"journal":{"name":"2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton)","volume":"351 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134408900","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A consensus algorithm for networks with process noise and quantization error 带有过程噪声和量化误差的网络一致性算法
Pub Date : 2015-09-01 DOI: 10.1109/ALLERTON.2015.7447044
F. Rego, Ye Pu, A. Alessandretti, Antonio Pedro Aguiar, C. Jones
In this paper we address the problem of quantized consensus where process noise or external inputs corrupt the state of each agent at each iteration. We propose a quantized consensus algorithm with progressive quantization, where the quantization interval changes in length at each iteration by a pre-specified value. We derive conditions on the design parameters of the algorithm to guarantee ultimate boundedness of the deviation from the average of each agent. Moreover, we determine explicitly the bounds of the consensus error under the assumption that the process disturbances are ultimately bounded within known bounds. A numerical example of cooperative path-following of a network of single integrators illustrates the performance of the proposed algorithm.
在本文中,我们解决了量化共识问题,其中过程噪声或外部输入在每次迭代中破坏每个代理的状态。我们提出了一种渐进量化的量化一致性算法,其中量化区间在每次迭代时的长度变化预设值。我们推导了算法设计参数的条件,以保证每个agent的平均偏差的最终有界性。此外,在过程扰动最终有界于已知界的假设下,我们明确地确定了一致误差的界。单个积分器网络协同路径跟踪的数值算例说明了该算法的有效性。
{"title":"A consensus algorithm for networks with process noise and quantization error","authors":"F. Rego, Ye Pu, A. Alessandretti, Antonio Pedro Aguiar, C. Jones","doi":"10.1109/ALLERTON.2015.7447044","DOIUrl":"https://doi.org/10.1109/ALLERTON.2015.7447044","url":null,"abstract":"In this paper we address the problem of quantized consensus where process noise or external inputs corrupt the state of each agent at each iteration. We propose a quantized consensus algorithm with progressive quantization, where the quantization interval changes in length at each iteration by a pre-specified value. We derive conditions on the design parameters of the algorithm to guarantee ultimate boundedness of the deviation from the average of each agent. Moreover, we determine explicitly the bounds of the consensus error under the assumption that the process disturbances are ultimately bounded within known bounds. A numerical example of cooperative path-following of a network of single integrators illustrates the performance of the proposed algorithm.","PeriodicalId":112948,"journal":{"name":"2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125631918","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
On pathwise convergence of particle & grid based nonlinear filters: Feller vs conditional regularity 基于粒子和网格的非线性滤波器的路径收敛:Feller与条件正则性
Pub Date : 2015-09-01 DOI: 10.1109/ALLERTON.2015.7447147
Dionysios S. Kalogerias, A. Petropulu
We present a theoretical comparison of the state-of-the-art sufficient conditions required for pathwise (almost sure type of) convergence between grid based and particle approximate filters, as well as discuss the implications of these conditions on the specific mode of convergence achieved. Focusing on general Markov processes observed in conditionally Gaussian noise, we have recently shown that a sufficient condition for pathwise convergence of grid based filters is conditional regularity of stochastic kernels. The respective condition for almost sure convergence of particle filters is the well known Feller property. While our analysis shows that the comparison between the afore-mentioned conditions may be indeed inconclusive, we identify a large class of systems for which conditional regularity may hold true, whereas the Feller property cannot. This is achieved through a structural analysis of both sufficient conditions. This work can be summarized in that there provably exist system classes supported by either grid based or particle filtering approximations, but not necessarily by both; for systems supported by both, grid based filters exhibit a theoretical advantage in terms of convergence robustness.
我们对基于网格和粒子近似滤波器之间的路径(几乎确定类型)收敛所需的最先进的充分条件进行了理论比较,并讨论了这些条件对实现的特定收敛模式的影响。关注在条件高斯噪声中观察到的一般马尔可夫过程,我们最近证明了基于网格的滤波器路径收敛的一个充分条件是随机核的条件正则性。粒子滤波器几乎肯定收敛的条件是众所周知的Feller性质。虽然我们的分析表明,上述条件之间的比较可能确实是不确定的,但我们确定了一大类系统,其中条件正则性可能成立,而Feller属性则不能。这是通过对两个充分条件的结构分析来实现的。这项工作可以总结为,可以证明存在由基于网格或粒子滤波近似支持的系统类,但不一定由两者支持;对于两者都支持的系统,基于网格的滤波器在收敛鲁棒性方面表现出理论上的优势。
{"title":"On pathwise convergence of particle & grid based nonlinear filters: Feller vs conditional regularity","authors":"Dionysios S. Kalogerias, A. Petropulu","doi":"10.1109/ALLERTON.2015.7447147","DOIUrl":"https://doi.org/10.1109/ALLERTON.2015.7447147","url":null,"abstract":"We present a theoretical comparison of the state-of-the-art sufficient conditions required for pathwise (almost sure type of) convergence between grid based and particle approximate filters, as well as discuss the implications of these conditions on the specific mode of convergence achieved. Focusing on general Markov processes observed in conditionally Gaussian noise, we have recently shown that a sufficient condition for pathwise convergence of grid based filters is conditional regularity of stochastic kernels. The respective condition for almost sure convergence of particle filters is the well known Feller property. While our analysis shows that the comparison between the afore-mentioned conditions may be indeed inconclusive, we identify a large class of systems for which conditional regularity may hold true, whereas the Feller property cannot. This is achieved through a structural analysis of both sufficient conditions. This work can be summarized in that there provably exist system classes supported by either grid based or particle filtering approximations, but not necessarily by both; for systems supported by both, grid based filters exhibit a theoretical advantage in terms of convergence robustness.","PeriodicalId":112948,"journal":{"name":"2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128628738","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1