首页 > 最新文献

2008 46th Annual Allerton Conference on Communication, Control, and Computing最新文献

英文 中文
The capacity region of large wireless networks 大型无线网络的容量区域
Pub Date : 2008-09-01 DOI: 10.1109/ALLERTON.2008.4797594
Urs Niesen, P. Gupta, D. Shah
The capacity region of a wireless network with n nodes is the set of all simultaneously achievable rates between all possible n2 node pairs. In this paper, we consider the question of determining the scaling, with respect to the number of nodes n, of the capacity region when the nodes are placed uniformly at random in a square region of area n and they communicate over Gaussian channels. We identify this scaling of the capacity region in terms of Theta(n), out of 2n total possible, cuts. Our results are constructive and provide optimal (in the scaling sense) communication schemes. In the case of a restricted class of traffic requirement (permutation traffic), we determine the precise scaling in terms of a natural generalization of the transport capacity. We illustrate the strength of these results by computing the capacity scaling in a number of scenarios with non-uniform traffic patterns for which no such results have been available before.
一个有n个节点的无线网络的容量区域是所有可能的n2个节点对之间所有同时可达到的速率的集合。在本文中,我们考虑了当节点均匀随机放置在面积为n的正方形区域中,并且它们在高斯信道上通信时,容量区域关于节点数n的缩放问题。我们用Theta(n)来确定这个容量区域的缩放,在总共2n个可能的切割中。我们的结果是建设性的,并提供了最优(在缩放意义上)的通信方案。在交通需求受限的情况下(置换交通),我们根据运输能力的自然泛化来确定精确的比例。我们通过在许多具有非均匀流量模式的场景中计算容量扩展来说明这些结果的强度,这些场景以前没有这样的结果。
{"title":"The capacity region of large wireless networks","authors":"Urs Niesen, P. Gupta, D. Shah","doi":"10.1109/ALLERTON.2008.4797594","DOIUrl":"https://doi.org/10.1109/ALLERTON.2008.4797594","url":null,"abstract":"The capacity region of a wireless network with n nodes is the set of all simultaneously achievable rates between all possible n2 node pairs. In this paper, we consider the question of determining the scaling, with respect to the number of nodes n, of the capacity region when the nodes are placed uniformly at random in a square region of area n and they communicate over Gaussian channels. We identify this scaling of the capacity region in terms of Theta(n), out of 2n total possible, cuts. Our results are constructive and provide optimal (in the scaling sense) communication schemes. In the case of a restricted class of traffic requirement (permutation traffic), we determine the precise scaling in terms of a natural generalization of the transport capacity. We illustrate the strength of these results by computing the capacity scaling in a number of scenarios with non-uniform traffic patterns for which no such results have been available before.","PeriodicalId":120561,"journal":{"name":"2008 46th Annual Allerton Conference on Communication, Control, and Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129991856","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Multidimensional flash codes 多维闪光码
Pub Date : 2008-09-01 DOI: 10.1109/ALLERTON.2008.4797584
Eitan Yaakobi, A. Vardy, P. Siegel, J. Wolf
Flash memory is a non-volatile computer memory comprised of blocks of cells, wherein each cell can take on q different levels corresponding to the number of electrons it contains. Increasing the cell level is easy; however, reducing a cell level forces all the other cells in the same block to be erased. This erasing operation is undesirable and therefore has to be used as infrequently as possible. We consider the problem of designing codes for this purpose, where k bits are stored using a block of n cells with q levels each. The goal is to maximize the number of bit writes before an erase operation is required. We present an efficient construction of codes that can store an arbitrary number of bits. Our construction can be viewed as an extension to multiple dimensions of the earlier work of Jiang and Bruck, where single-dimensional codes that can store only 2 bits were proposed.
闪存是一种由单元块组成的非易失性计算机存储器,其中每个单元可以具有q个不同的级别,对应于它所包含的电子数量。增加细胞水平很容易;但是,减少单元级别会强制擦除同一块中的所有其他单元。这种擦除操作是不可取的,因此必须尽可能少地使用。我们考虑为此目的设计代码的问题,其中k位使用n个单元的块存储,每个单元有q个级别。目标是在需要擦除操作之前最大化写比特的数量。我们提出了一种有效的编码结构,可以存储任意数量的比特。我们的构建可以看作是Jiang和Bruck早期工作的多维扩展,他们提出了只能存储2位的单维代码。
{"title":"Multidimensional flash codes","authors":"Eitan Yaakobi, A. Vardy, P. Siegel, J. Wolf","doi":"10.1109/ALLERTON.2008.4797584","DOIUrl":"https://doi.org/10.1109/ALLERTON.2008.4797584","url":null,"abstract":"Flash memory is a non-volatile computer memory comprised of blocks of cells, wherein each cell can take on q different levels corresponding to the number of electrons it contains. Increasing the cell level is easy; however, reducing a cell level forces all the other cells in the same block to be erased. This erasing operation is undesirable and therefore has to be used as infrequently as possible. We consider the problem of designing codes for this purpose, where k bits are stored using a block of n cells with q levels each. The goal is to maximize the number of bit writes before an erase operation is required. We present an efficient construction of codes that can store an arbitrary number of bits. Our construction can be viewed as an extension to multiple dimensions of the earlier work of Jiang and Bruck, where single-dimensional codes that can store only 2 bits were proposed.","PeriodicalId":120561,"journal":{"name":"2008 46th Annual Allerton Conference on Communication, Control, and Computing","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130455295","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 43
Some geometric methods for construction of space-time codes in Grassmann manifolds 格拉斯曼流形中构造空时码的几种几何方法
Pub Date : 2008-09-01 DOI: 10.1109/ALLERTON.2008.4797543
Z. Utkovski, P. Chen, J. Lindner
Geometric methods for construction of codes in the Grassmann manifolds are presented. The methods follow the geometric approach to space-time coding for the non-coherent MIMO channel where the code design is interpreted as a packing problem on Grassmann manifolds. The differential structure of the Grassmann manifold provides parametrization with the tangent space at the identity element. Grassmann codes for the non-coherent channel are constructed by mapping suitable subsets of lattices from the tangent space to the Grassmann manifold via the exponential map. As examples, constructions from the rotated Gosset, Barnes-Wall and Leech lattice are presented. Due to the specifics of the mapping, some of the structure is preserved after the mapping to the manifold. The method is further improved by modifying the mapping from the tangent space to the manifold. Ideas for other constructions of Grassmann codes are also presented and discussed.
给出了构造格拉斯曼流形中码的几何方法。该方法采用几何方法对非相干MIMO信道进行空时编码,其中编码设计被解释为格拉斯曼流形上的填充问题。格拉斯曼流形的微分结构提供了单位元处切空间的参数化。非相干信道的格拉斯曼码是通过指数映射将合适的格子集从切空间映射到格拉斯曼流形来构造的。举例说明了旋转Gosset、Barnes-Wall和Leech晶格的结构。由于映射的特殊性,在映射到流形之后保留了一些结构。通过修改从切空间到流形的映射,进一步改进了该方法。本文还提出并讨论了格拉斯曼码的其他结构。
{"title":"Some geometric methods for construction of space-time codes in Grassmann manifolds","authors":"Z. Utkovski, P. Chen, J. Lindner","doi":"10.1109/ALLERTON.2008.4797543","DOIUrl":"https://doi.org/10.1109/ALLERTON.2008.4797543","url":null,"abstract":"Geometric methods for construction of codes in the Grassmann manifolds are presented. The methods follow the geometric approach to space-time coding for the non-coherent MIMO channel where the code design is interpreted as a packing problem on Grassmann manifolds. The differential structure of the Grassmann manifold provides parametrization with the tangent space at the identity element. Grassmann codes for the non-coherent channel are constructed by mapping suitable subsets of lattices from the tangent space to the Grassmann manifold via the exponential map. As examples, constructions from the rotated Gosset, Barnes-Wall and Leech lattice are presented. Due to the specifics of the mapping, some of the structure is preserved after the mapping to the manifold. The method is further improved by modifying the mapping from the tangent space to the manifold. Ideas for other constructions of Grassmann codes are also presented and discussed.","PeriodicalId":120561,"journal":{"name":"2008 46th Annual Allerton Conference on Communication, Control, and Computing","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126332647","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Complementary codes based channel estimation for MIMO-OFDM systems 基于互补码的MIMO-OFDM系统信道估计
Pub Date : 2008-09-01 DOI: 10.1109/ALLERTON.2008.4797546
M. Zoltowski, T. Qureshi, R. Calderbank
We present a pilot-assisted method for estimating the frequency selective channel in a MIMO-OFDM (multiple input multiple output -orthogonal frequency division multiplexing) system. The pilot sequence is designed using the DFT (discrete Fourier transform) of the Golay complementary sequences. Novel exploitation of the perfect autocorrelation property of the Golay codes, in conjunction with OSTBC (orthogonal space-time block code) based pilot waveform scheduling across multiple OFDM frames, facilitates simple separation of the channel mixtures at the receive antennas. The DFT length used to transform the complementary sequence into the frequency domain is shown to be a key critical parameter for correctly estimating the channel. NMSE (normalized mean squared error) between the actual and the estimated channel is used to characterize the estimation performance.
我们提出了一种导频辅助方法来估计MIMO-OFDM(多输入多输出正交频分复用)系统中的频率选择信道。利用Golay互补序列的离散傅立叶变换设计导频序列。利用Golay码的完美自相关特性,结合基于OSTBC(正交空时分组码)的导频波形调度,可以跨多个OFDM帧,简化接收天线信道混合的分离。用于将互补序列变换到频域的DFT长度是正确估计信道的关键参数。使用实际信道和估计信道之间的NMSE(归一化均方误差)来表征估计性能。
{"title":"Complementary codes based channel estimation for MIMO-OFDM systems","authors":"M. Zoltowski, T. Qureshi, R. Calderbank","doi":"10.1109/ALLERTON.2008.4797546","DOIUrl":"https://doi.org/10.1109/ALLERTON.2008.4797546","url":null,"abstract":"We present a pilot-assisted method for estimating the frequency selective channel in a MIMO-OFDM (multiple input multiple output -orthogonal frequency division multiplexing) system. The pilot sequence is designed using the DFT (discrete Fourier transform) of the Golay complementary sequences. Novel exploitation of the perfect autocorrelation property of the Golay codes, in conjunction with OSTBC (orthogonal space-time block code) based pilot waveform scheduling across multiple OFDM frames, facilitates simple separation of the channel mixtures at the receive antennas. The DFT length used to transform the complementary sequence into the frequency domain is shown to be a key critical parameter for correctly estimating the channel. NMSE (normalized mean squared error) between the actual and the estimated channel is used to characterize the estimation performance.","PeriodicalId":120561,"journal":{"name":"2008 46th Annual Allerton Conference on Communication, Control, and Computing","volume":"C-33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126487340","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
On the performance of multiple choice hash tables with moves on deletes and inserts 在删除和插入时移动的选择哈希表的性能
Pub Date : 2008-09-01 DOI: 10.1109/ALLERTON.2008.4797708
A. Kirsch, M. Mitzenmacher
In a multiple choice hash table scheme, each item is stored in one of d ges 2 hash table buckets. The ability to choose from multiple locations when storing an item improves space utilization, while the simplicity of such schemes makes them highly amenable to hardware implementation, as in a router. Some variants, such as cuckoo hashing, allow items to be moved among their d choices in order to improve load balance and avoid hash table overflows. We consider schemes that move items on insertion and deletion operations, as arguably one would be willing to incur more time on such operations as opposed to more frequent lookup operations. To keep the schemes as simple as possible for hardware implementation, we focus on schemes that allow a single move on an insertion or deletion. Our results show significant space savings when moving items is allowed, even under the limitation of one move per insertion and deletion operation.
在多选项哈希表方案中,每个项存储在两个哈希表桶中的一个中。在存储物品时,从多个位置进行选择的能力提高了空间利用率,同时这种方案的简单性使它们非常适合硬件实现,例如路由器。一些变体,如布谷鸟哈希,允许在它们的d个选择之间移动项,以改善负载平衡并避免哈希表溢出。我们考虑在插入和删除操作上移动项的方案,因为与更频繁的查找操作相比,人们愿意在这些操作上花费更多的时间。为了使方案在硬件实现上尽可能简单,我们将重点放在允许插入或删除操作的方案上。我们的结果表明,即使在每次插入和删除操作只能移动一次的限制下,允许移动项时也可以节省大量空间。
{"title":"On the performance of multiple choice hash tables with moves on deletes and inserts","authors":"A. Kirsch, M. Mitzenmacher","doi":"10.1109/ALLERTON.2008.4797708","DOIUrl":"https://doi.org/10.1109/ALLERTON.2008.4797708","url":null,"abstract":"In a multiple choice hash table scheme, each item is stored in one of d ges 2 hash table buckets. The ability to choose from multiple locations when storing an item improves space utilization, while the simplicity of such schemes makes them highly amenable to hardware implementation, as in a router. Some variants, such as cuckoo hashing, allow items to be moved among their d choices in order to improve load balance and avoid hash table overflows. We consider schemes that move items on insertion and deletion operations, as arguably one would be willing to incur more time on such operations as opposed to more frequent lookup operations. To keep the schemes as simple as possible for hardware implementation, we focus on schemes that allow a single move on an insertion or deletion. Our results show significant space savings when moving items is allowed, even under the limitation of one move per insertion and deletion operation.","PeriodicalId":120561,"journal":{"name":"2008 46th Annual Allerton Conference on Communication, Control, and Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129070289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A coalitional game framework for cooperative secondary spectrum access 合作二次频谱接入的联盟博弈框架
Pub Date : 2008-09-01 DOI: 10.1109/ALLERTON.2008.4797690
A. Aram, S. Sarkar, C. Singh, Anurag Kumar
We consider a framework in which several service providers offer downlink wireless data access service in a certain area. Each provider serves its end-users through opportunistic secondary spectrum access of licensed spectrum, and needs to pay primary license holders of the spectrum usage based and membership based charges for such secondary spectrum access. In these circumstances, if providers pool their resources and allow end-users to be served by any of the cooperating providers, the total user satisfaction as well as the aggregate revenue earned by providers may increase. We use coalitional game theory to investigate such cooperation among providers, and show that the optimal cooperation schemes can be obtained as solutions of convex optimizations. We next show that under usage based charging scheme, if all providers cooperate, there always exists an operating point that maximizes the aggregate revenue of providers, while presenting each provider a share of the revenue such that no subset of providers has an incentive to leave the coalition. Furthermore, such an operating point can be computed in polynomial time. Finally, we show that when the charging scheme involves membership based charges, the above result holds in important special cases.
我们考虑了一个框架,其中几个服务提供商在某一区域提供下行无线数据接入服务。每家供应商都通过机会性地使用已获发牌照的频谱,为其最终用户提供二次频谱接入服务,并需要就此类二次频谱接入向主牌照持有人支付基于频谱使用量和基于会员资格的费用。在这种情况下,如果提供商将其资源集中起来,并允许任何合作提供商为最终用户提供服务,则总体用户满意度以及提供商获得的总收入可能会增加。利用联合博弈论研究了供应商之间的这种合作,并证明了最优合作方案可以作为凸优化的解。接下来,我们证明了在基于使用的收费方案下,如果所有供应商合作,总存在一个运营点,使供应商的总收入最大化,同时向每个供应商提供收入的份额,使得供应商的子集没有动机离开联盟。而且,这样的工作点可以在多项式时间内计算出来。最后,我们证明了当收费方案涉及会员制收费时,上述结果在重要的特殊情况下成立。
{"title":"A coalitional game framework for cooperative secondary spectrum access","authors":"A. Aram, S. Sarkar, C. Singh, Anurag Kumar","doi":"10.1109/ALLERTON.2008.4797690","DOIUrl":"https://doi.org/10.1109/ALLERTON.2008.4797690","url":null,"abstract":"We consider a framework in which several service providers offer downlink wireless data access service in a certain area. Each provider serves its end-users through opportunistic secondary spectrum access of licensed spectrum, and needs to pay primary license holders of the spectrum usage based and membership based charges for such secondary spectrum access. In these circumstances, if providers pool their resources and allow end-users to be served by any of the cooperating providers, the total user satisfaction as well as the aggregate revenue earned by providers may increase. We use coalitional game theory to investigate such cooperation among providers, and show that the optimal cooperation schemes can be obtained as solutions of convex optimizations. We next show that under usage based charging scheme, if all providers cooperate, there always exists an operating point that maximizes the aggregate revenue of providers, while presenting each provider a share of the revenue such that no subset of providers has an incentive to leave the coalition. Furthermore, such an operating point can be computed in polynomial time. Finally, we show that when the charging scheme involves membership based charges, the above result holds in important special cases.","PeriodicalId":120561,"journal":{"name":"2008 46th Annual Allerton Conference on Communication, Control, and Computing","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121039084","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Mixed norm low order multirate filterbank design: Relaxed commutant lifting approach 混合范数低阶多率滤波器组设计:放松换向提升方法
Pub Date : 2008-09-01 DOI: 10.1109/ALLERTON.2008.4797593
D. Du, W. Bhosri, A. Frazho
In this paper, we reformulate the design of IIR synthesis filters in classical multirate systems as an optimization problem involving a new norm called Pm-norm where m is any positive integer. That optimization problem can be solved using a recent generalization of the commutant lifting techniques in operator theory. The introduced norm is actually a trade-off in handling energy distortion and error peak distortion. Our development allows the designer to select from a family of filters the one which is best suited for specific applications. The well-known H2 and Hinfin designs then can be viewed as special cases when m=1 and mrarrinfin respectively. The computation relies mainly on FFT technique and a finite section of certain Toeplitz matrices. The obtained filters are of low order and attractive for practical implementation. Moreover, the proposed approach works for non-rational transfer functions. A new method for inner outer factorization of a rational matrix-valued function is also developed.
本文将经典多速率系统中IIR综合滤波器的设计重新表述为一个涉及新范数pm -范数的优化问题,其中m为任意正整数。该优化问题可以用算子理论中换向提升技术的最新推广来解决。引入的范数实际上是处理能量失真和误差峰值失真的一种权衡。我们的开发允许设计人员从一系列滤波器中选择最适合特定应用的滤波器。众所周知的H2和Hinfin设计可以看作是m=1和mrrinfin时的特殊情况。计算主要依靠FFT技术和一定的Toeplitz矩阵的有限部分。所得滤波器的阶数较低,对实际应用具有吸引力。此外,该方法适用于非有理传递函数。提出了有理矩阵值函数内外分解的一种新方法。
{"title":"Mixed norm low order multirate filterbank design: Relaxed commutant lifting approach","authors":"D. Du, W. Bhosri, A. Frazho","doi":"10.1109/ALLERTON.2008.4797593","DOIUrl":"https://doi.org/10.1109/ALLERTON.2008.4797593","url":null,"abstract":"In this paper, we reformulate the design of IIR synthesis filters in classical multirate systems as an optimization problem involving a new norm called Pm-norm where m is any positive integer. That optimization problem can be solved using a recent generalization of the commutant lifting techniques in operator theory. The introduced norm is actually a trade-off in handling energy distortion and error peak distortion. Our development allows the designer to select from a family of filters the one which is best suited for specific applications. The well-known H2 and Hinfin designs then can be viewed as special cases when m=1 and mrarrinfin respectively. The computation relies mainly on FFT technique and a finite section of certain Toeplitz matrices. The obtained filters are of low order and attractive for practical implementation. Moreover, the proposed approach works for non-rational transfer functions. A new method for inner outer factorization of a rational matrix-valued function is also developed.","PeriodicalId":120561,"journal":{"name":"2008 46th Annual Allerton Conference on Communication, Control, and Computing","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121386942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
On the secrecy of multiple access wiretap channel 多址窃听信道的保密性研究
Pub Date : 2008-09-01 DOI: 10.1109/ALLERTON.2008.4797670
E. Ekrem, S. Ulukus
We develop an outer bound for the secrecy capacity region of a class of multiple access wiretap channels (MAC-WT). In this class, which we call the weak eavesdropper class, each user's link to the legitimate receiver is stronger than its link to the eavesdropper. Our outer bound partially matches the achievable region in an n-letter form. In addition, a looser version of our outer bound provides close approximations to the capacity region of the Gaussian MAC-WT channel. In particular, we prove that our outer bound is within 0.5 bits/channel use of the achievable rates along the individual rates for all weak eavesdropper Gaussian MAC-WT, and within 0.5 bits/channel use in all directions for certain weak eavesdropper Gaussian MAC-WT channels.
本文给出了一类多址窃听信道(MAC-WT)保密容量区域的外边界。在这个类中,我们称之为弱窃听者类,每个用户到合法接收者的链接要比它到窃听者的链接强。我们的外界以n字母的形式部分匹配可实现区域。此外,我们的外界的一个更宽松的版本提供了高斯MAC-WT信道的容量区域的近似。特别地,我们证明了我们的外界是在0.5比特/信道内使用所有弱窃听高斯MAC-WT的单个速率的可实现速率,以及在所有方向上使用某些弱窃听高斯MAC-WT的0.5比特/信道。
{"title":"On the secrecy of multiple access wiretap channel","authors":"E. Ekrem, S. Ulukus","doi":"10.1109/ALLERTON.2008.4797670","DOIUrl":"https://doi.org/10.1109/ALLERTON.2008.4797670","url":null,"abstract":"We develop an outer bound for the secrecy capacity region of a class of multiple access wiretap channels (MAC-WT). In this class, which we call the weak eavesdropper class, each user's link to the legitimate receiver is stronger than its link to the eavesdropper. Our outer bound partially matches the achievable region in an n-letter form. In addition, a looser version of our outer bound provides close approximations to the capacity region of the Gaussian MAC-WT channel. In particular, we prove that our outer bound is within 0.5 bits/channel use of the achievable rates along the individual rates for all weak eavesdropper Gaussian MAC-WT, and within 0.5 bits/channel use in all directions for certain weak eavesdropper Gaussian MAC-WT channels.","PeriodicalId":120561,"journal":{"name":"2008 46th Annual Allerton Conference on Communication, Control, and Computing","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122735215","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 99
Modeling and analysis of energy harvesting nodes in wireless sensor networks 无线传感器网络能量收集节点的建模与分析
Pub Date : 2008-09-01 DOI: 10.1109/ALLERTON.2008.4797537
Alireza Seyedi
A Markov based unified model for energy harvesting nodes in wireless sensor networks is proposed. Using the presented model, the probability of event loss due to energy run out as well as an analytical vulnerability metric, namely average time to energy run-out, are derived. The results provide insight into the performance of energy harvesting nodes in wireless sensor networks as well as design requirements for such nodes. The proposed vulnerability metric can be used in the various harvesting aware techniques at different protocol layers.
提出了一种基于马尔可夫的无线传感器网络能量采集节点统一模型。利用所提出的模型,导出了因能量耗尽而造成事件损失的概率以及分析性脆弱性度量,即平均时间到能量耗尽。研究结果为无线传感器网络中能量收集节点的性能以及此类节点的设计要求提供了见解。提出的漏洞度量可用于不同协议层的各种获取感知技术。
{"title":"Modeling and analysis of energy harvesting nodes in wireless sensor networks","authors":"Alireza Seyedi","doi":"10.1109/ALLERTON.2008.4797537","DOIUrl":"https://doi.org/10.1109/ALLERTON.2008.4797537","url":null,"abstract":"A Markov based unified model for energy harvesting nodes in wireless sensor networks is proposed. Using the presented model, the probability of event loss due to energy run out as well as an analytical vulnerability metric, namely average time to energy run-out, are derived. The results provide insight into the performance of energy harvesting nodes in wireless sensor networks as well as design requirements for such nodes. The proposed vulnerability metric can be used in the various harvesting aware techniques at different protocol layers.","PeriodicalId":120561,"journal":{"name":"2008 46th Annual Allerton Conference on Communication, Control, and Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122814879","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 54
Generalized quantity competition for multiple products and loss of efficiency 多产品的广义数量竞争与效率损失
Pub Date : 2008-09-01 DOI: 10.1287/opre.1110.1017
Jonathan Kluberg, G. Perakis
In this paper we study a generalized model for quantity (Cournot) oligopolistic competition. The main goal in this paper is to understand Cournot competition when firms are producing multiple differentiated products and are faced with a variety of constraints. We first study existence and uniqueness of Cournot equilibria under general constraints. The main focus of the paper is to compare the total society surplus and the total firms' profit under Cournot competition to the corresponding total surplus and total profit of the firms under a centralized setting, (i.e., when a single firm controls all the products in the market maximizing total surplus or total profit respectively). Our goal is to understand how the presence of competition affects the overall society (that includes firms and consumers) as well as the overall firms' profit in the system, but also determine what the key drivers of the inefficiencies that arise due to competition are.
本文研究了数量(古诺)寡头垄断竞争的一个广义模型。本文的主要目标是了解当企业生产多种差异化产品并面临各种约束时的古诺竞争。首先研究了一般约束下古诺均衡的存在唯一性。本文的主要重点是比较古诺竞争下的社会总剩余和企业总利润与集中竞争下(即单个企业控制市场上所有产品,使总剩余或总利润分别最大化)企业相应的总剩余和总利润。我们的目标是了解竞争的存在如何影响整个社会(包括企业和消费者)以及系统中企业的整体利润,但也要确定由于竞争而产生的效率低下的关键驱动因素是什么。
{"title":"Generalized quantity competition for multiple products and loss of efficiency","authors":"Jonathan Kluberg, G. Perakis","doi":"10.1287/opre.1110.1017","DOIUrl":"https://doi.org/10.1287/opre.1110.1017","url":null,"abstract":"In this paper we study a generalized model for quantity (Cournot) oligopolistic competition. The main goal in this paper is to understand Cournot competition when firms are producing multiple differentiated products and are faced with a variety of constraints. We first study existence and uniqueness of Cournot equilibria under general constraints. The main focus of the paper is to compare the total society surplus and the total firms' profit under Cournot competition to the corresponding total surplus and total profit of the firms under a centralized setting, (i.e., when a single firm controls all the products in the market maximizing total surplus or total profit respectively). Our goal is to understand how the presence of competition affects the overall society (that includes firms and consumers) as well as the overall firms' profit in the system, but also determine what the key drivers of the inefficiencies that arise due to competition are.","PeriodicalId":120561,"journal":{"name":"2008 46th Annual Allerton Conference on Communication, Control, and Computing","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117287764","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 37
期刊
2008 46th Annual Allerton Conference on Communication, Control, and Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1