首页 > 最新文献

2008 46th Annual Allerton Conference on Communication, Control, and Computing最新文献

英文 中文
Robust dimensionality reduction for high-dimension data 高维数据的鲁棒降维
Pub Date : 2008-09-01 DOI: 10.1109/ALLERTON.2008.4797709
Huan Xu, C. Caramanis, Shie Mannor
We consider the dimensionality-reduction problem for a contaminated data set in a very high dimensional space, i.e., the problem of finding a subspace approximation of observed data, where the number of observations is of the same magnitude as the number of variables of each observation, and the data set contains some outlying observations. We propose a High-dimension Robust Principal Component Analysis (HR-PCA) algorithm that is tractable, robust to outliers and easily kernelizable. The resulted subspace has a bounded deviation from the desired one, and achieves optimality in the limit case where the portion of outliers goes to zero.
我们考虑在非常高维空间中污染数据集的降维问题,即寻找观测数据的子空间近似问题,其中观测值的数量与每个观测值的变量数量相同,并且数据集包含一些离群观测值。提出了一种易于处理、对异常值具有鲁棒性和易于核化的高维鲁棒主成分分析(HR-PCA)算法。所得到的子空间与期望的子空间有有界偏差,并且在离群值部分趋于零的极限情况下达到最优性。
{"title":"Robust dimensionality reduction for high-dimension data","authors":"Huan Xu, C. Caramanis, Shie Mannor","doi":"10.1109/ALLERTON.2008.4797709","DOIUrl":"https://doi.org/10.1109/ALLERTON.2008.4797709","url":null,"abstract":"We consider the dimensionality-reduction problem for a contaminated data set in a very high dimensional space, i.e., the problem of finding a subspace approximation of observed data, where the number of observations is of the same magnitude as the number of variables of each observation, and the data set contains some outlying observations. We propose a High-dimension Robust Principal Component Analysis (HR-PCA) algorithm that is tractable, robust to outliers and easily kernelizable. The resulted subspace has a bounded deviation from the desired one, and achieves optimality in the limit case where the portion of outliers goes to zero.","PeriodicalId":120561,"journal":{"name":"2008 46th Annual Allerton Conference on Communication, Control, and Computing","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116584607","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Reduced-complexity transmit power optimization techniques for multiuser MIMO with per-antenna power constraint 具有单天线功率约束的多用户MIMO低复杂度发射功率优化技术
Pub Date : 2008-09-01 DOI: 10.1109/ALLERTON.2008.4797532
Y. Ohwatari, A. Benjebbour, J. Hagiwara, T. Ohya
For a multiuser (MU)-MIMO precoded transmission with individual constraints on the maximum power of each transmit antenna, the transmit power optimization problem is a non-linear convex optimization problem with a high level of computational complexity. In this paper, we propose three methods in order to reduce the computational complexity associated with this problem. The reductions in computational complexity achieved with the proposed methods are evaluated under the sum-rate maximization criterion assuming i.i.d Rayleigh fading MIMO channels and block diagonalization zero-forcing as a precoder.
对于每个发射天线的最大功率都有单独约束的多用户(MU)-MIMO预编码传输,发射功率优化问题是一个计算复杂度很高的非线性凸优化问题。在本文中,我们提出了三种方法来降低与此问题相关的计算复杂度。在假设瑞利衰落MIMO信道和块对角化零强迫作为预编码器的和速率最大化准则下,对所提出方法的计算复杂度降低进行了评估。
{"title":"Reduced-complexity transmit power optimization techniques for multiuser MIMO with per-antenna power constraint","authors":"Y. Ohwatari, A. Benjebbour, J. Hagiwara, T. Ohya","doi":"10.1109/ALLERTON.2008.4797532","DOIUrl":"https://doi.org/10.1109/ALLERTON.2008.4797532","url":null,"abstract":"For a multiuser (MU)-MIMO precoded transmission with individual constraints on the maximum power of each transmit antenna, the transmit power optimization problem is a non-linear convex optimization problem with a high level of computational complexity. In this paper, we propose three methods in order to reduce the computational complexity associated with this problem. The reductions in computational complexity achieved with the proposed methods are evaluated under the sum-rate maximization criterion assuming i.i.d Rayleigh fading MIMO channels and block diagonalization zero-forcing as a precoder.","PeriodicalId":120561,"journal":{"name":"2008 46th Annual Allerton Conference on Communication, Control, and Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117291941","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Anytime reliable transmission of real-valued information through digital noisy channels 通过数字噪声信道,随时可靠地传输实值信息
G. Como, F. Fagnani, S. Zampieri
Motivated by distributed sensor networks scenarios, we consider a problem of state estimation under communication constraints, in which a real-valued random vector needs to be reliably transmitted through a digital noisy channel. Estimations are sequentially updated by the receiver, as more and more channel outputs are observed. Assuming that no channel feedback is available at the transmitter, we study the rates at which the mean squared error of the estimation can be made to converge to zero with time. First, simple low-complexity schemes are considered, and trade-offs between performance and encoder/decoder complexity are found. Then, information-theoretic bounds on the best achievable error exponent are obtained.
在分布式传感器网络场景下,我们考虑了一个通信约束下的状态估计问题,其中一个实值随机向量需要通过数字噪声信道可靠地传输。当观察到越来越多的信道输出时,接收器会依次更新估计值。假设发射机没有可用的信道反馈,我们研究了估计的均方误差随时间收敛到零的速率。首先,考虑简单的低复杂度方案,并找到性能和编码器/解码器复杂性之间的权衡。然后,给出了最佳可达误差指数的信息论界。
{"title":"Anytime reliable transmission of real-valued information through digital noisy channels","authors":"G. Como, F. Fagnani, S. Zampieri","doi":"10.1137/09074601X","DOIUrl":"https://doi.org/10.1137/09074601X","url":null,"abstract":"Motivated by distributed sensor networks scenarios, we consider a problem of state estimation under communication constraints, in which a real-valued random vector needs to be reliably transmitted through a digital noisy channel. Estimations are sequentially updated by the receiver, as more and more channel outputs are observed. Assuming that no channel feedback is available at the transmitter, we study the rates at which the mean squared error of the estimation can be made to converge to zero with time. First, simple low-complexity schemes are considered, and trade-offs between performance and encoder/decoder complexity are found. Then, information-theoretic bounds on the best achievable error exponent are obtained.","PeriodicalId":120561,"journal":{"name":"2008 46th Annual Allerton Conference on Communication, Control, and Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129417256","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 51
Toward an optimal 1+N protection strategy 向着最优的1+N保护策略
Pub Date : 2008-09-01 DOI: 10.1109/ALLERTON.2008.4797550
A. Kamal, O. Al-Kofahi
This paper introduces an implementation of the network coding-based generalized 1+N protection technique presented earlier by the author in [1] to protect against single link failures. Instead of using two protection circuits for a group of connections which are to be protected together as in [1], only one protection circuit is used, which takes the form of a tree. The protection circuit carries linear combinations of the data units originally transmitted on the working circuits, and these linear combinations can be used to recover lost data due to link failures. This recovery is carried out with the assistance of one node on the protection tree, which is chosen to reduce the recovery time. Moreover, unlike the scheme in [1] which protects unidirectional connections, this scheme is used to protect bidirectional connections. This protection technique requires exactly the same amount of protection resources used by 1:N protection, and can therefore be considered as a step towards achieving optimal 1+N protection. The paper also makes a number of other contributions. It introduces an integer linear program (ILP) formulation to evaluate the cost of protection using this technique, and compares it to the cost of 1+1 protection. The comparison shows that a significant saving in cost can be achieved, while still recovering from failures within a short time.
本文介绍了作者先前在[1]中提出的基于网络编码的广义1+N保护技术的实现,以防止单链路故障。与文献[1]中对一组连接使用两个保护电路进行共同保护不同,本文只使用一个保护电路,采用树形形式。保护电路携带原始在工作电路上传输的数据单元的线性组合,并且这些线性组合可用于恢复由于链路故障而丢失的数据。为了减少恢复时间,选择保护树上的一个节点进行恢复。此外,与文献[1]中保护单向连接的方案不同,该方案用于保护双向连接。这种保护技术需要与1:N保护完全相同的保护资源,因此可以认为是实现最优1+N保护的一步。这篇论文还做出了一些其他贡献。引入整数线性规划(ILP)公式来评估使用该技术的保护成本,并将其与1+1保护成本进行比较。对比表明,在短时间内从故障中恢复的同时,可以显著节省成本。
{"title":"Toward an optimal 1+N protection strategy","authors":"A. Kamal, O. Al-Kofahi","doi":"10.1109/ALLERTON.2008.4797550","DOIUrl":"https://doi.org/10.1109/ALLERTON.2008.4797550","url":null,"abstract":"This paper introduces an implementation of the network coding-based generalized 1+N protection technique presented earlier by the author in [1] to protect against single link failures. Instead of using two protection circuits for a group of connections which are to be protected together as in [1], only one protection circuit is used, which takes the form of a tree. The protection circuit carries linear combinations of the data units originally transmitted on the working circuits, and these linear combinations can be used to recover lost data due to link failures. This recovery is carried out with the assistance of one node on the protection tree, which is chosen to reduce the recovery time. Moreover, unlike the scheme in [1] which protects unidirectional connections, this scheme is used to protect bidirectional connections. This protection technique requires exactly the same amount of protection resources used by 1:N protection, and can therefore be considered as a step towards achieving optimal 1+N protection. The paper also makes a number of other contributions. It introduces an integer linear program (ILP) formulation to evaluate the cost of protection using this technique, and compares it to the cost of 1+1 protection. The comparison shows that a significant saving in cost can be achieved, while still recovering from failures within a short time.","PeriodicalId":120561,"journal":{"name":"2008 46th Annual Allerton Conference on Communication, Control, and Computing","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124744227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Optimized puncturing and shortening distributions for nonbinary LDPC codes over the binary erasure channel 非二进制LDPC码在二进制擦除信道上的优化穿刺和缩短分布
Pub Date : 2008-09-01 DOI: 10.1109/ALLERTON.2008.4797675
D. Klinc, J. Ha, S. McLaughlin
This paper investigates optimal puncturing and shortening distributions for nonbinary LDPC codes over the binary erasure channel (BEC). The analysis is done by means of density evolution and optimal distributions are found with differential evolution. We show that puncturing or shortening entire variable nodes results in bad performance; instead, for best performance, puncturing and shortening distributions have to be designed carefully, where generally, most variable nodes are punctured/shortened only partially. Our results indicate that properly designed punctured and shortened nonbinary LDPC codes can maintain a very small gap to capacity through a wide range of rates.
研究了二进制擦除信道(BEC)上非二进制LDPC码的最优刺破和缩短分布。采用密度演化法进行分析,用差分演化法求出最优分布。我们表明,刺穿或缩短整个可变节点会导致性能下降;相反,为了获得最佳性能,必须仔细设计穿刺和缩短分布,通常情况下,大多数可变节点只被部分穿刺/缩短。我们的研究结果表明,适当设计的穿孔和缩短的非二进制LDPC码可以在很宽的速率范围内保持非常小的容量差距。
{"title":"Optimized puncturing and shortening distributions for nonbinary LDPC codes over the binary erasure channel","authors":"D. Klinc, J. Ha, S. McLaughlin","doi":"10.1109/ALLERTON.2008.4797675","DOIUrl":"https://doi.org/10.1109/ALLERTON.2008.4797675","url":null,"abstract":"This paper investigates optimal puncturing and shortening distributions for nonbinary LDPC codes over the binary erasure channel (BEC). The analysis is done by means of density evolution and optimal distributions are found with differential evolution. We show that puncturing or shortening entire variable nodes results in bad performance; instead, for best performance, puncturing and shortening distributions have to be designed carefully, where generally, most variable nodes are punctured/shortened only partially. Our results indicate that properly designed punctured and shortened nonbinary LDPC codes can maintain a very small gap to capacity through a wide range of rates.","PeriodicalId":120561,"journal":{"name":"2008 46th Annual Allerton Conference on Communication, Control, and Computing","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129666527","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Broadcasting with receiver message side information: A deterministic approach 使用接收方消息端的信息进行广播:一种确定性方法
Pub Date : 2008-09-01 DOI: 10.1109/ALLERTON.2008.4797632
Jae Won Yoo, Tie Liu, F. Xue
This paper considered, via a deterministic approach, the problem of broadcasting with receiver message side information, which arises naturally in the context of decoding-forward strategies in multiway relay network communication. An outer bound on the capacity region of the linear deterministic broadcast channel with general receiver message side information is provided and is shown to be tight when the side information configuration satisfies a certain property. As a corollary, the proposed outer bound is shown to be the capacity region of the linear deterministic broadcast channel with receiver message side information and with K les 3 users.
本文采用确定性方法研究了在多路中继网络通信中采用前向译码策略时自然出现的接收端消息广播问题。给出了具有一般接收方消息侧信息的线性确定性广播信道的容量区域的外边界,并表明当侧信息配置满足某一属性时该外边界是紧的。作为推论,所提出的外边界被证明是具有接收方消息侧信息且具有K - 3个用户的线性确定性广播信道的容量区域。
{"title":"Broadcasting with receiver message side information: A deterministic approach","authors":"Jae Won Yoo, Tie Liu, F. Xue","doi":"10.1109/ALLERTON.2008.4797632","DOIUrl":"https://doi.org/10.1109/ALLERTON.2008.4797632","url":null,"abstract":"This paper considered, via a deterministic approach, the problem of broadcasting with receiver message side information, which arises naturally in the context of decoding-forward strategies in multiway relay network communication. An outer bound on the capacity region of the linear deterministic broadcast channel with general receiver message side information is provided and is shown to be tight when the side information configuration satisfies a certain property. As a corollary, the proposed outer bound is shown to be the capacity region of the linear deterministic broadcast channel with receiver message side information and with K les 3 users.","PeriodicalId":120561,"journal":{"name":"2008 46th Annual Allerton Conference on Communication, Control, and Computing","volume":"238 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121483249","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Convergence analysis of distributed subgradient methods over random networks 随机网络上分布亚梯度方法的收敛性分析
Pub Date : 2008-09-01 DOI: 10.1109/ALLERTON.2008.4797579
I. Lobel, A. Ozdaglar
We consider the problem of cooperatively minimizing the sum of convex functions, where the functions represent local objective functions of the agents. We assume that each agent has information about his local function, and communicate with the other agents over a time-varying network topology. For this problem, we propose a distributed subgradient method that uses averaging algorithms for locally sharing information among the agents. In contrast to previous works that make worst-case assumptions about the connectivity of the agents (such as bounded communication intervals between nodes), we assume that links fail according to a given stochastic process. Under the assumption that the link failures are independent and identically distributed over time (possibly correlated across links), we provide convergence results and convergence rate estimates for our subgradient algorithm.
考虑凸函数和的协同极小化问题,其中凸函数表示智能体的局部目标函数。我们假设每个代理都有关于其本地功能的信息,并通过时变的网络拓扑与其他代理通信。针对这一问题,我们提出了一种分布式亚梯度方法,该方法使用平均算法在智能体之间局部共享信息。与之前对代理的连通性做出最坏情况假设(例如节点之间有界的通信间隔)的工作相反,我们假设链接根据给定的随机过程失效。在假设链路故障是独立的且随时间分布相同(可能在链路之间相关)的情况下,我们为我们的子梯度算法提供了收敛结果和收敛速率估计。
{"title":"Convergence analysis of distributed subgradient methods over random networks","authors":"I. Lobel, A. Ozdaglar","doi":"10.1109/ALLERTON.2008.4797579","DOIUrl":"https://doi.org/10.1109/ALLERTON.2008.4797579","url":null,"abstract":"We consider the problem of cooperatively minimizing the sum of convex functions, where the functions represent local objective functions of the agents. We assume that each agent has information about his local function, and communicate with the other agents over a time-varying network topology. For this problem, we propose a distributed subgradient method that uses averaging algorithms for locally sharing information among the agents. In contrast to previous works that make worst-case assumptions about the connectivity of the agents (such as bounded communication intervals between nodes), we assume that links fail according to a given stochastic process. Under the assumption that the link failures are independent and identically distributed over time (possibly correlated across links), we provide convergence results and convergence rate estimates for our subgradient algorithm.","PeriodicalId":120561,"journal":{"name":"2008 46th Annual Allerton Conference on Communication, Control, and Computing","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131979462","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 57
Transmission of correlated sources over a fading multiple access channel 在衰落多址信道上相关源的传输
Pub Date : 2008-09-01 DOI: 10.1109/ALLERTON.2008.4797647
R. Rajesh, V. Sharma
In this paper we address the problem of transmission of correlated sources over a fading multiple access channel (MAC). We provide sufficient conditions for transmission with given distortions. Next these conditions are specialized to a Gaussian MAC (GMAC). Transmission schemes for discrete and Gaussian sources over a fading GMAC are considered. Various power allocation strategies are also compared.
本文研究了在衰落多址信道(MAC)上相关信源的传输问题。我们提供了在给定失真条件下传输的充分条件。接下来,这些条件被专门用于高斯MAC (GMAC)。研究了离散源和高斯源在衰落GMAC上的传输方案。并对各种功率分配策略进行了比较。
{"title":"Transmission of correlated sources over a fading multiple access channel","authors":"R. Rajesh, V. Sharma","doi":"10.1109/ALLERTON.2008.4797647","DOIUrl":"https://doi.org/10.1109/ALLERTON.2008.4797647","url":null,"abstract":"In this paper we address the problem of transmission of correlated sources over a fading multiple access channel (MAC). We provide sufficient conditions for transmission with given distortions. Next these conditions are specialized to a Gaussian MAC (GMAC). Transmission schemes for discrete and Gaussian sources over a fading GMAC are considered. Various power allocation strategies are also compared.","PeriodicalId":120561,"journal":{"name":"2008 46th Annual Allerton Conference on Communication, Control, and Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127634620","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Secure broadcasting : The secrecy rate region 安全广播:保密速率区域
Pub Date : 2008-09-01 DOI: 10.1109/ALLERTON.2008.4797644
Ghadamali Bagherikaram, A. Motahari, A. Khandani
In this paper, we consider a scenario where a source node wishes to broadcast two confidential messages for two respective receivers, while a wire-tapper also receives the transmitted signal. This model is motivated by wireless communications, where individual secure messages are broadcast over open media and can be received by any illegitimate receiver. The secrecy level is measured by equivocation rate at the eavesdropper. We first study the general (non-degraded) broadcast channel with confidential messages. We present an inner bound on the secrecy capacity region for this model. The inner bound coding scheme is based on a combination of random binning and the Gelfand-Pinsker bining. This scheme matches the Marton's inner bound on the broadcast channel without confidentiality constraint. We further study the situation where the channels are degraded. For the degraded broadcast channel with confidential messages, we present the secrecy capacity region. Our achievable coding scheme is based on Cover's superposition scheme and random binning. We refer to this scheme as secret superposition scheme. In this scheme, we show that randomization in the first layer increases the secrecy rate of the second layer. This capacity region matches the capacity region of the degraded broadcast channel without security constraint. It also matches the secrecy capacity for the conventional wire-tap channel. Our converse proof is based on a combination of the converse proof of the conventional degraded broadcast channel and Csiszar lemma.
在本文中,我们考虑这样一种场景:源节点希望向两个各自的接收者广播两个机密消息,而窃听者也接收发送的信号。该模型是由无线通信驱动的,在无线通信中,个人安全消息通过开放媒体广播,可以被任何非法接收者接收。保密级别由窃听者的含糊其辞率来衡量。我们首先研究了包含机密信息的一般(非降级)广播信道。给出了该模型的保密容量区域的一个内界。内界编码方案基于随机分组和Gelfand-Pinsker分组的结合。该方案匹配广播信道上的马尔顿内界,没有保密约束。我们进一步研究了信道退化的情况。对于含有机密消息的降级广播信道,我们提出了保密容量区域。我们实现的编码方案是基于Cover的叠加方案和随机分组。我们把这种方案称为秘密叠加方案。在这个方案中,我们证明了第一层的随机化提高了第二层的保密率。该容量区域与无安全约束的降级广播信道容量区域匹配。它也与传统的有线窃听频道的保密能力相匹配。我们的反向证明是基于传统退化广播信道的反向证明和cisszar引理的结合。
{"title":"Secure broadcasting : The secrecy rate region","authors":"Ghadamali Bagherikaram, A. Motahari, A. Khandani","doi":"10.1109/ALLERTON.2008.4797644","DOIUrl":"https://doi.org/10.1109/ALLERTON.2008.4797644","url":null,"abstract":"In this paper, we consider a scenario where a source node wishes to broadcast two confidential messages for two respective receivers, while a wire-tapper also receives the transmitted signal. This model is motivated by wireless communications, where individual secure messages are broadcast over open media and can be received by any illegitimate receiver. The secrecy level is measured by equivocation rate at the eavesdropper. We first study the general (non-degraded) broadcast channel with confidential messages. We present an inner bound on the secrecy capacity region for this model. The inner bound coding scheme is based on a combination of random binning and the Gelfand-Pinsker bining. This scheme matches the Marton's inner bound on the broadcast channel without confidentiality constraint. We further study the situation where the channels are degraded. For the degraded broadcast channel with confidential messages, we present the secrecy capacity region. Our achievable coding scheme is based on Cover's superposition scheme and random binning. We refer to this scheme as secret superposition scheme. In this scheme, we show that randomization in the first layer increases the secrecy rate of the second layer. This capacity region matches the capacity region of the degraded broadcast channel without security constraint. It also matches the secrecy capacity for the conventional wire-tap channel. Our converse proof is based on a combination of the converse proof of the conventional degraded broadcast channel and Csiszar lemma.","PeriodicalId":120561,"journal":{"name":"2008 46th Annual Allerton Conference on Communication, Control, and Computing","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127386833","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 39
Modeling distributed beamforming in wireless networks 无线网络中的分布式波束形成建模
Pub Date : 2008-09-01 DOI: 10.1109/ALLERTON.2008.4797596
K. Hardwick, D. Goeckel, D. Towsley
Distributed beamforming in wireless ad hoc networks has the promise of greatly improving network throughput. However, unlike traditional beamforming from a fixed array, the random locations of the nodes collaborating to form the array lead to a random beam pattern. In particular, the position and size of side lobes can vary greatly and have a significant impact on the concurrent transmissions that are the source of much of the throughput gain realized from distributed beamforming. Here, we present a simple model that captures this randomness and then use the model to consider the average throughput of a large ad hoc wireless networks. Numerical results are compared to those obtained if one employs the oft-used pie-wedge approximation for a directed antenna beam, and the difference is shown to be significant in regions where the side lobe interference is non-negligible.
无线自组织网络中的分布式波束形成技术有望大大提高网络吞吐量。然而,与传统的固定阵列的波束形成不同,协作形成阵列的节点的随机位置导致随机波束方向图。特别是,侧瓣的位置和大小可以变化很大,并对并发传输产生重大影响,并发传输是分布式波束形成实现的大部分吞吐量增益的来源。在这里,我们提出了一个简单的模型来捕捉这种随机性,然后使用该模型来考虑大型自组织无线网络的平均吞吐量。将数值结果与对定向天线波束采用常用的楔形饼近似所得到的结果进行了比较,结果表明,在旁瓣干扰不可忽略的区域,差异是显著的。
{"title":"Modeling distributed beamforming in wireless networks","authors":"K. Hardwick, D. Goeckel, D. Towsley","doi":"10.1109/ALLERTON.2008.4797596","DOIUrl":"https://doi.org/10.1109/ALLERTON.2008.4797596","url":null,"abstract":"Distributed beamforming in wireless ad hoc networks has the promise of greatly improving network throughput. However, unlike traditional beamforming from a fixed array, the random locations of the nodes collaborating to form the array lead to a random beam pattern. In particular, the position and size of side lobes can vary greatly and have a significant impact on the concurrent transmissions that are the source of much of the throughput gain realized from distributed beamforming. Here, we present a simple model that captures this randomness and then use the model to consider the average throughput of a large ad hoc wireless networks. Numerical results are compared to those obtained if one employs the oft-used pie-wedge approximation for a directed antenna beam, and the difference is shown to be significant in regions where the side lobe interference is non-negligible.","PeriodicalId":120561,"journal":{"name":"2008 46th Annual Allerton Conference on Communication, Control, and Computing","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116986526","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
期刊
2008 46th Annual Allerton Conference on Communication, Control, and Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1