首页 > 最新文献

2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton)最新文献

英文 中文
Scaling laws for reliable data dissemination in shared loss multicast trees 共享损失组播树中可靠数据传播的尺度规律
Pub Date : 2015-09-01 DOI: 10.1109/ALLERTON.2015.7447101
Ron Yadgar, A. Cohen, Omer Gurewitz
The completion time for the dissemination of information to all nodes in a network plays a critical role in the design and analysis of communication systems. In this work, we analyse the completion time of data dissemination in a shared loss (i.e., unreliable links) multicast tree, at the limit of large number of nodes. Specifically, analytic expressions for upper and lower bounds on the expected completion time are provided, and, in particular, it is shown that both these bounds scale as α log n, where n is the number of nodes. Clearly, the completion time is determined by the last end user who receives the message, that is, a maximum over all arrival times. We derive asymptotic bounds on the expectation of this maximum and use them to obtain tight bounds on the completion time. The results are validated by simulations and numerical analysis.
在通信系统的设计和分析中,信息向网络中所有节点传播的完成时间起着至关重要的作用。在这项工作中,我们分析了共享丢失(即不可靠链路)组播树在大量节点限制下的数据传播完成时间。具体地说,给出了期望完成时间的上界和下界的解析表达式,特别地,证明了这两个边界的尺度都是α log n,其中n为节点数。显然,完成时间是由接收消息的最后一个终端用户决定的,也就是说,是所有到达时间的最大值。我们导出了该最大值期望的渐近界,并利用它们得到了完成时间的紧界。仿真和数值分析验证了结果的正确性。
{"title":"Scaling laws for reliable data dissemination in shared loss multicast trees","authors":"Ron Yadgar, A. Cohen, Omer Gurewitz","doi":"10.1109/ALLERTON.2015.7447101","DOIUrl":"https://doi.org/10.1109/ALLERTON.2015.7447101","url":null,"abstract":"The completion time for the dissemination of information to all nodes in a network plays a critical role in the design and analysis of communication systems. In this work, we analyse the completion time of data dissemination in a shared loss (i.e., unreliable links) multicast tree, at the limit of large number of nodes. Specifically, analytic expressions for upper and lower bounds on the expected completion time are provided, and, in particular, it is shown that both these bounds scale as α log n, where n is the number of nodes. Clearly, the completion time is determined by the last end user who receives the message, that is, a maximum over all arrival times. We derive asymptotic bounds on the expectation of this maximum and use them to obtain tight bounds on the completion time. The results are validated by simulations and numerical analysis.","PeriodicalId":112948,"journal":{"name":"2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton)","volume":"215 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131964762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimizing large-scale MIMO cellular downlink: Multiplexing, diversity, or interference nulling? 优化大规模MIMO蜂窝下行链路:多路复用,多样性,或干扰消除?
Pub Date : 2015-09-01 DOI: 10.1109/ALLERTON.2015.7447014
Kianoush Hosseini, Wei Yu, R. Adve
A base-station (BS) equipped with multiple antennas can use its spatial dimensions in three ways: (1) serve multiple users to achieve a multiplexing gain, (2) provide diversity to its users, and/or (3) null interference at a chosen subset of out-of-cell users. The main contribution of this paper is to answer the following question: what is the optimal balance between the three competing benefits of multiplexing, diversity and interference nulling? We answer this question in the context of the downlink of a cellular network in which each user chooses its best serving BS, and requests nearby interfering BSs for interference nulling. BSs are equipped with a large number of antennas, serve multiple single-antenna users using zero-forcing beamforming and equal power assignment, and null interference at a subset of out-of-cell users. The remaining spatial dimensions provide transmit diversity. We assume perfect channel state information at the BSs and users. Utilizing tools from stochastic geometry, we show that, surprisingly, to maximize the per-BS ergodic sum rate, at the optimal allocation of spatial resources, interference nulling does not bring tangible benefit. A close-to-optimal strategy is to use none of the spatial resources for interference nulling, while reserving 60% of spatial resources for achieving multiplexing and the rest for providing diversity.
配备多天线的基站(BS)可以以三种方式利用其空间维度:(1)为多个用户提供服务以获得多路复用增益,(2)为其用户提供分集,和/或(3)在选定的小区外用户子集上消除干扰。本文的主要贡献是回答以下问题:多路复用、分集和干扰消除这三个相互竞争的好处之间的最佳平衡是什么?我们在蜂窝网络下行链路的背景下回答了这个问题,其中每个用户选择其最好的服务基站,并请求附近的干扰基站进行干扰消除。BSs配备了大量天线,使用零强迫波束形成和等功率分配为多个单天线用户服务,并且在小区外用户的子集中实现零干扰。剩余的空间维度提供发射分集。我们假设在BSs和用户处有完美的信道状态信息。利用随机几何的工具,我们惊奇地发现,为了最大化每bs遍历和率,在空间资源的最优配置下,干扰零化并没有带来切实的好处。一种接近最优的策略是不使用任何空间资源进行干扰消除,而保留60%的空间资源用于实现多路复用,其余用于提供分集。
{"title":"Optimizing large-scale MIMO cellular downlink: Multiplexing, diversity, or interference nulling?","authors":"Kianoush Hosseini, Wei Yu, R. Adve","doi":"10.1109/ALLERTON.2015.7447014","DOIUrl":"https://doi.org/10.1109/ALLERTON.2015.7447014","url":null,"abstract":"A base-station (BS) equipped with multiple antennas can use its spatial dimensions in three ways: (1) serve multiple users to achieve a multiplexing gain, (2) provide diversity to its users, and/or (3) null interference at a chosen subset of out-of-cell users. The main contribution of this paper is to answer the following question: what is the optimal balance between the three competing benefits of multiplexing, diversity and interference nulling? We answer this question in the context of the downlink of a cellular network in which each user chooses its best serving BS, and requests nearby interfering BSs for interference nulling. BSs are equipped with a large number of antennas, serve multiple single-antenna users using zero-forcing beamforming and equal power assignment, and null interference at a subset of out-of-cell users. The remaining spatial dimensions provide transmit diversity. We assume perfect channel state information at the BSs and users. Utilizing tools from stochastic geometry, we show that, surprisingly, to maximize the per-BS ergodic sum rate, at the optimal allocation of spatial resources, interference nulling does not bring tangible benefit. A close-to-optimal strategy is to use none of the spatial resources for interference nulling, while reserving 60% of spatial resources for achieving multiplexing and the rest for providing diversity.","PeriodicalId":112948,"journal":{"name":"2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120997736","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
On the Eschenauer-Gligor key predistribution scheme under on-off communication channels: The absence of isolated nodes 开关通信信道下的Eschenauer-Gligor密钥预分发方案:无孤立节点
Pub Date : 2015-09-01 DOI: 10.1109/ALLERTON.2015.7447186
A. Makowski, Osman Yağan
We consider the Eschenauer-Gligor key predistribution scheme under the condition of partial visibility with i.i.d. on-off links between pairs of nodes. This situation is modeled as the intersection of two random graphs, namely a random key graph and an Erdös-Rényi (ER) graph. For this class of composite random graphs we give various improvements on a recent result by Yağan [17] concerning zero-one laws for the absence of isolated nodes.
考虑了部分可见性条件下的Eschenauer-Gligor密钥预分配方案,该方案在节点对之间具有i个开关链路。这种情况被建模为两个随机图的交集,即一个随机键图和一个Erdös-Rényi (ER)图。对于这类复合随机图,我们对Yağan[17]最近关于无孤立节点的零- 1定律的结果进行了各种改进。
{"title":"On the Eschenauer-Gligor key predistribution scheme under on-off communication channels: The absence of isolated nodes","authors":"A. Makowski, Osman Yağan","doi":"10.1109/ALLERTON.2015.7447186","DOIUrl":"https://doi.org/10.1109/ALLERTON.2015.7447186","url":null,"abstract":"We consider the Eschenauer-Gligor key predistribution scheme under the condition of partial visibility with i.i.d. on-off links between pairs of nodes. This situation is modeled as the intersection of two random graphs, namely a random key graph and an Erdös-Rényi (ER) graph. For this class of composite random graphs we give various improvements on a recent result by Yağan [17] concerning zero-one laws for the absence of isolated nodes.","PeriodicalId":112948,"journal":{"name":"2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130916127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Optimal scheduling of real-time traffic in wireless networks with delayed feedback 具有延迟反馈的无线网络实时流量的最优调度
Pub Date : 2015-09-01 DOI: 10.1109/ALLERTON.2015.7447137
Kyu Seob Kim, Chih-Ping Li, I. Kadota, E. Modiano
In this paper we consider a wireless network composed of a base station and a number of clients, with the goal of scheduling real-time traffic. Even though this problem has been extensively studied in the literature, the impact of delayed acknowledgment has not been assessed. Delayed feedback is of increasing importance in systems where the round trip delay is much greater than the packet transmission time, and it has a significant effect on the scheduling decisions and network performance. Previous work considered the problem of scheduling real-time traffic with instantaneous feedback and without feedback. In this work, we address the general case of delayed feedback and use Dynamic Programming to characterize the optimal scheduling policy. An optimal algorithm that fulfills any feasible minimum delivery ratio requirements is proposed. Moreover, we develop a low-complexity suboptimal heuristic algorithm which is suitable for platforms with low computational power. Both algorithms are evaluated through simulations.
本文考虑了一个由基站和多个客户端组成的无线网络,其目标是对实时流量进行调度。尽管这一问题在文献中得到了广泛的研究,但延迟承认的影响尚未得到评估。在往返延迟远大于数据包传输时间的系统中,延迟反馈的重要性与日俱增,它对调度决策和网络性能有着重要的影响。以前的工作考虑了有瞬时反馈和无反馈的实时交通调度问题。在这项工作中,我们讨论了延迟反馈的一般情况,并使用动态规划来表征最优调度策略。提出了一种满足任何可行的最小投递率要求的最优算法。此外,我们还开发了一种适用于低计算能力平台的低复杂度次优启发式算法。通过仿真对两种算法进行了评估。
{"title":"Optimal scheduling of real-time traffic in wireless networks with delayed feedback","authors":"Kyu Seob Kim, Chih-Ping Li, I. Kadota, E. Modiano","doi":"10.1109/ALLERTON.2015.7447137","DOIUrl":"https://doi.org/10.1109/ALLERTON.2015.7447137","url":null,"abstract":"In this paper we consider a wireless network composed of a base station and a number of clients, with the goal of scheduling real-time traffic. Even though this problem has been extensively studied in the literature, the impact of delayed acknowledgment has not been assessed. Delayed feedback is of increasing importance in systems where the round trip delay is much greater than the packet transmission time, and it has a significant effect on the scheduling decisions and network performance. Previous work considered the problem of scheduling real-time traffic with instantaneous feedback and without feedback. In this work, we address the general case of delayed feedback and use Dynamic Programming to characterize the optimal scheduling policy. An optimal algorithm that fulfills any feasible minimum delivery ratio requirements is proposed. Moreover, we develop a low-complexity suboptimal heuristic algorithm which is suitable for platforms with low computational power. Both algorithms are evaluated through simulations.","PeriodicalId":112948,"journal":{"name":"2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134416916","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Performance analysis for multi-user systems under distributed opportunistic scheduling 分布式机会调度下的多用户系统性能分析
Pub Date : 2015-09-01 DOI: 10.1109/ALLERTON.2015.7447184
O. Shmuel, A. Cohen, Omer Gurewitz
Consider a multiple access channel with a large number of users. In most practical scenarios, due to decoding complexity, users are not scheduled together, and only one user may transmit at any given time. In this work, we analyze the delay and QoS of such systems under a specific, opportunistic and distributed scheduling algorithm, in which each user, at the beginning of each slot, estimates its channel gain and transmits only if it is greater than a given threshold. Specifically, we analyze the performance while assuming the users are not necessarily fully backlogged, focusing on the queueing problem and, especially, on the strong dependence between the queues. We first adopt the celebrated model of Ephremides and Zhu to give new results on the convergence of the probability of collision to its average value (as the number of users grows), and hence for the ensuing system performance metrics, such as throughput and delay. We then utilize this finding to suggest a much simpler approximate model, which accurately describes the system behaviour when the number of users is large. The system performance as predicted by the approximate models shows excellent agreement with simulation results.
考虑一个具有大量用户的多址通道。在大多数实际场景中,由于解码的复杂性,用户不会被安排在一起,并且在任何给定时间只有一个用户可以传输。在这项工作中,我们分析了这种系统在特定的、机会的和分布式调度算法下的延迟和QoS,其中每个用户,在每个时隙的开始,估计其信道增益并仅在大于给定阈值时传输。具体来说,我们在假设用户不一定完全积压的情况下分析性能,重点关注排队问题,特别是队列之间的强依赖性。我们首先采用了著名的Ephremides和Zhu模型,给出了碰撞概率收敛到其平均值(随着用户数量的增长)的新结果,以及随后的系统性能指标,如吞吐量和延迟。然后,我们利用这一发现提出了一个更简单的近似模型,该模型准确地描述了当用户数量很大时的系统行为。近似模型预测的系统性能与仿真结果吻合良好。
{"title":"Performance analysis for multi-user systems under distributed opportunistic scheduling","authors":"O. Shmuel, A. Cohen, Omer Gurewitz","doi":"10.1109/ALLERTON.2015.7447184","DOIUrl":"https://doi.org/10.1109/ALLERTON.2015.7447184","url":null,"abstract":"Consider a multiple access channel with a large number of users. In most practical scenarios, due to decoding complexity, users are not scheduled together, and only one user may transmit at any given time. In this work, we analyze the delay and QoS of such systems under a specific, opportunistic and distributed scheduling algorithm, in which each user, at the beginning of each slot, estimates its channel gain and transmits only if it is greater than a given threshold. Specifically, we analyze the performance while assuming the users are not necessarily fully backlogged, focusing on the queueing problem and, especially, on the strong dependence between the queues. We first adopt the celebrated model of Ephremides and Zhu to give new results on the convergence of the probability of collision to its average value (as the number of users grows), and hence for the ensuing system performance metrics, such as throughput and delay. We then utilize this finding to suggest a much simpler approximate model, which accurately describes the system behaviour when the number of users is large. The system performance as predicted by the approximate models shows excellent agreement with simulation results.","PeriodicalId":112948,"journal":{"name":"2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129813200","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Variable-length channel codes with probabilistic delay guarantees 具有概率延迟保证的变长信道码
Pub Date : 2015-09-01 DOI: 10.1109/ALLERTON.2015.7447065
Y. Altug, H. Poor, S. Verdú
Variable-length channel codes over discrete memoryless channels subject to probabilistic delay guarantees are examined in the non-vanishing error probability regime. Fundamental limits of these codes in several different settings, which depend on the availability of noiseless feedback and a termination option, are investigated. In stark contrast with average delay guarantees, the first-order terms of the fundamental limits turn out to be the same as those for fixed-length codes in all cases. Further, feedback is shown to improve the second-order term, even in the absence of a termination option.
研究了离散无记忆信道上具有概率延迟保证的变长信道码。研究了这些码在几种不同设置下的基本限制,这些设置取决于无噪声反馈和终止选项的可用性。与平均延迟保证形成鲜明对比的是,在所有情况下,基本极限的一阶项都与固定长度码的一阶项相同。此外,即使在没有终止选项的情况下,反馈也可以改善二阶项。
{"title":"Variable-length channel codes with probabilistic delay guarantees","authors":"Y. Altug, H. Poor, S. Verdú","doi":"10.1109/ALLERTON.2015.7447065","DOIUrl":"https://doi.org/10.1109/ALLERTON.2015.7447065","url":null,"abstract":"Variable-length channel codes over discrete memoryless channels subject to probabilistic delay guarantees are examined in the non-vanishing error probability regime. Fundamental limits of these codes in several different settings, which depend on the availability of noiseless feedback and a termination option, are investigated. In stark contrast with average delay guarantees, the first-order terms of the fundamental limits turn out to be the same as those for fixed-length codes in all cases. Further, feedback is shown to improve the second-order term, even in the absence of a termination option.","PeriodicalId":112948,"journal":{"name":"2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114905568","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
On the communication complexity of greater-than 论通信的复杂性大于
Pub Date : 2015-09-01 DOI: 10.1109/ALLERTON.2015.7447037
Sivaramakrishnan Natarajan Ramamoorthy, Makrand Sinha
We give a simple information theoretic proof that the public-coin randomized communication complexity of the greater-than function is Ω(logn) for bit-strings of length n.
我们给出了一个简单的信息论证明,对于长度为n的比特串,公共币的大于函数的随机通信复杂度为Ω(logn)。
{"title":"On the communication complexity of greater-than","authors":"Sivaramakrishnan Natarajan Ramamoorthy, Makrand Sinha","doi":"10.1109/ALLERTON.2015.7447037","DOIUrl":"https://doi.org/10.1109/ALLERTON.2015.7447037","url":null,"abstract":"We give a simple information theoretic proof that the public-coin randomized communication complexity of the greater-than function is Ω(logn) for bit-strings of length n.","PeriodicalId":112948,"journal":{"name":"2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton)","volume":"221 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116339874","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Linear approximations to AC power flow in rectangular coordinates 在直角坐标下交流功率流的线性近似
Pub Date : 2015-09-01 DOI: 10.1109/ALLERTON.2015.7447006
S. Dhople, Swaroop S. Guggilam, Y. Chen
This paper explores solutions to linearized power-flow equations with bus-voltage phasors represented in rectangular coordinates. The key idea is to solve for complex-valued perturbations around a nominal voltage profile from a set of linear equations that are obtained by neglecting quadratic terms in the original nonlinear power-flow equations. We prove that for lossless networks, the voltage profile where the real part of the perturbation is suppressed satisfies active-power balance in the original nonlinear system of equations. This result motivates the development of approximate solutions that improve over conventional DC power-flow approximations, since the model includes ZIP loads. For distribution networks that only contain ZIP loads in addition to a slack bus, we recover a linear relationship between the approximate voltage profile and the constant-current component of the loads and the nodal active-and reactive-power injections.
本文探讨了用直角坐标表示的母线电压相量线性化潮流方程的解。关键思想是从一组线性方程中求解围绕标称电压剖面的复值扰动,这些方程是通过忽略原始非线性潮流方程中的二次项而得到的。证明了在无损网络中,扰动实部被抑制的电压分布满足原非线性方程组的有功平衡。这一结果激发了近似解决方案的发展,改进了传统的直流功率流近似,因为该模型包括ZIP负载。对于只包含ZIP负载和空闲总线的配电网络,我们恢复了近似电压分布和负载的恒流分量以及节点有功和无功功率注入之间的线性关系。
{"title":"Linear approximations to AC power flow in rectangular coordinates","authors":"S. Dhople, Swaroop S. Guggilam, Y. Chen","doi":"10.1109/ALLERTON.2015.7447006","DOIUrl":"https://doi.org/10.1109/ALLERTON.2015.7447006","url":null,"abstract":"This paper explores solutions to linearized power-flow equations with bus-voltage phasors represented in rectangular coordinates. The key idea is to solve for complex-valued perturbations around a nominal voltage profile from a set of linear equations that are obtained by neglecting quadratic terms in the original nonlinear power-flow equations. We prove that for lossless networks, the voltage profile where the real part of the perturbation is suppressed satisfies active-power balance in the original nonlinear system of equations. This result motivates the development of approximate solutions that improve over conventional DC power-flow approximations, since the model includes ZIP loads. For distribution networks that only contain ZIP loads in addition to a slack bus, we recover a linear relationship between the approximate voltage profile and the constant-current component of the loads and the nodal active-and reactive-power injections.","PeriodicalId":112948,"journal":{"name":"2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114448111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 88
Single letter characterization of average-case strong redundancy of compressing memoryless sequences 压缩无记忆序列的平均大小写强冗余的单字母表征
Pub Date : 2015-09-01 DOI: 10.1109/ALLERTON.2015.7447108
Maryam Hosseini, N. Santhanam
We obtain a condition that is both necessary and sufficient to characterize strong universal compressibility (in the average sense) of sequences generated by iid sampling from a collection cP of distributions over a countably infinite alphabet. Contrary to the worst case regret formulation of universal compression, finite single letter (average case) redundancy of cP does not automatically imply that the expected redundancy of describing length-n strings sampled iid from cP grows sublinearly with n. Instead, we prove that asymptotic per-symbol redundancy of universally compressing length-n iid sequences from cP is characterized by how well the tails of their single letter marginals can be universally described, and we formalize the later as the tail-redundancy of cP.
我们得到了一个充分必要的条件,证明了在可数无限字母上由分布的集合cP进行iid抽样生成的序列具有强的一般可压缩性。与通用压缩的最坏情况遗憾公式相反,cP的有限单字母(平均情况)冗余并不自动意味着描述从cP中采样的长度为n的iid字符串的期望冗余随着n次线性增长。相反,我们证明了从cP中通用压缩长度为n的iid序列的渐近每符号冗余的特征是它们的单字母边缘的尾部可以被普遍描述的程度。我们将后者形式化为cP的尾部冗余。
{"title":"Single letter characterization of average-case strong redundancy of compressing memoryless sequences","authors":"Maryam Hosseini, N. Santhanam","doi":"10.1109/ALLERTON.2015.7447108","DOIUrl":"https://doi.org/10.1109/ALLERTON.2015.7447108","url":null,"abstract":"We obtain a condition that is both necessary and sufficient to characterize strong universal compressibility (in the average sense) of sequences generated by iid sampling from a collection cP of distributions over a countably infinite alphabet. Contrary to the worst case regret formulation of universal compression, finite single letter (average case) redundancy of cP does not automatically imply that the expected redundancy of describing length-n strings sampled iid from cP grows sublinearly with n. Instead, we prove that asymptotic per-symbol redundancy of universally compressing length-n iid sequences from cP is characterized by how well the tails of their single letter marginals can be universally described, and we formalize the later as the tail-redundancy of cP.","PeriodicalId":112948,"journal":{"name":"2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114698660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Exploring connections between Sparse Fourier Transform computation and decoding of product codes 探索稀疏傅里叶变换计算与产品编码解码之间的联系
Pub Date : 2015-09-01 DOI: 10.1109/ALLERTON.2015.7447167
N. Janakiraman, Santosh K. Emmadi, K. Narayanan, K. Ramchandran
We show that the recently proposed Fast Fourier Aliasing-based Sparse Transform (FFAST) algorithm for computing the Discrete Fourier Transform (DFT) [1] of signals with a sparse DFT is equivalent to iterative hard decision decoding of product codes. This connection is used to derive the thresholds for sparse recovery based on a recent analysis by Justensen [2] for computing thresholds for product codes. We first extend Justesen's analysis to d-dimensional product codes and compute thresholds for the FFAST algorithm based on this. Additionally, this connection also allows us to analyze the performance of the FFAST algorithm under a burst sparsity model in addition to the uniformly random sparsity model which was assumed in prior work [1].
我们表明,最近提出的基于快速傅立叶混叠的稀疏变换(FFAST)算法用于计算具有稀疏DFT的信号的离散傅立叶变换(DFT)[1]等同于乘积码的迭代硬决策解码。根据Justensen[2]最近对计算产品代码阈值的分析,这种联系被用来推导稀疏恢复的阈值。我们首先将Justesen的分析扩展到d维产品代码,并在此基础上计算FFAST算法的阈值。此外,这种联系还允许我们分析FFAST算法在突发稀疏性模型下的性能,而不是在先前的工作[1]中假设的均匀随机稀疏性模型下。
{"title":"Exploring connections between Sparse Fourier Transform computation and decoding of product codes","authors":"N. Janakiraman, Santosh K. Emmadi, K. Narayanan, K. Ramchandran","doi":"10.1109/ALLERTON.2015.7447167","DOIUrl":"https://doi.org/10.1109/ALLERTON.2015.7447167","url":null,"abstract":"We show that the recently proposed Fast Fourier Aliasing-based Sparse Transform (FFAST) algorithm for computing the Discrete Fourier Transform (DFT) [1] of signals with a sparse DFT is equivalent to iterative hard decision decoding of product codes. This connection is used to derive the thresholds for sparse recovery based on a recent analysis by Justensen [2] for computing thresholds for product codes. We first extend Justesen's analysis to d-dimensional product codes and compute thresholds for the FFAST algorithm based on this. Additionally, this connection also allows us to analyze the performance of the FFAST algorithm under a burst sparsity model in addition to the uniformly random sparsity model which was assumed in prior work [1].","PeriodicalId":112948,"journal":{"name":"2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114804488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1