首页 > 最新文献

2008 46th Annual Allerton Conference on Communication, Control, and Computing最新文献

英文 中文
Encoding against an interferer's codebook 对干扰者的码本进行编码
Pub Date : 2008-09-01 DOI: 10.1109/ALLERTON.2008.4797603
I. Marić, Nan Liu, A. Goldsmith
Motivated by cognitive radio applications, we consider mitigating the effect of interference by exploiting known properties about its signal structure. Specifically, we analyze communication between a source and destination with an interferer that induces random variations in the source-destination channel. The interferer transmits a sequence chosen uniformly from a randomly generated codebook, which has an i.i.d. structure, or a superposition structure. It is assumed that both the encoder and decoder know the interferer's codebook. We first provide a definition of capacity for these settings. When the encoder knows the interferer's message noncausally, it can use Gel'fand-Pinsker (GP) encoding to precode against interference. Alternatively, it can encode by taking into account that the interference is a codeword, to enable the decoder to decode both messages. It is demonstrated by an example that the latter can outperform GP encoding. Two upper bounds to the performance of this channel are then presented. Next, a more realistic scenario is considered in which the interference is learned at the cognitive encoder causally through a noisy channel. It is shown that for the case of i.i.d. generated interference, this information has no value. In contrast, when the interference is a codeword from an i.i.d. generated codebook, this fact can be exploited to obtain higher rates between the cognitive pair.
受认知无线电应用的启发,我们考虑通过利用其信号结构的已知特性来减轻干扰的影响。具体来说,我们分析了源和目标之间的通信,其中干扰会在源和目标信道中引起随机变化。干扰器传输从随机生成的码本中均匀选择的序列,该序列具有id结构或叠加结构。假设编码器和解码器都知道干扰者的码本。我们首先为这些设置提供容量的定义。当编码器非因果地知道干扰信号时,可以采用GP (Gel’fand- pinsker)编码对干扰进行预编码。或者,它可以通过考虑干扰是码字来编码,以使解码器能够解码两个消息。通过实例证明,后者优于GP编码。然后给出了该信道性能的两个上界。接下来,考虑了一个更现实的场景,其中通过噪声通道在认知编码器中学习干扰。结果表明,在产生干扰的情况下,该信息没有价值。相反,当干扰是来自id生成的码本的码字时,可以利用这一事实在认知对之间获得更高的速率。
{"title":"Encoding against an interferer's codebook","authors":"I. Marić, Nan Liu, A. Goldsmith","doi":"10.1109/ALLERTON.2008.4797603","DOIUrl":"https://doi.org/10.1109/ALLERTON.2008.4797603","url":null,"abstract":"Motivated by cognitive radio applications, we consider mitigating the effect of interference by exploiting known properties about its signal structure. Specifically, we analyze communication between a source and destination with an interferer that induces random variations in the source-destination channel. The interferer transmits a sequence chosen uniformly from a randomly generated codebook, which has an i.i.d. structure, or a superposition structure. It is assumed that both the encoder and decoder know the interferer's codebook. We first provide a definition of capacity for these settings. When the encoder knows the interferer's message noncausally, it can use Gel'fand-Pinsker (GP) encoding to precode against interference. Alternatively, it can encode by taking into account that the interference is a codeword, to enable the decoder to decode both messages. It is demonstrated by an example that the latter can outperform GP encoding. Two upper bounds to the performance of this channel are then presented. Next, a more realistic scenario is considered in which the interference is learned at the cognitive encoder causally through a noisy channel. It is shown that for the case of i.i.d. generated interference, this information has no value. In contrast, when the interference is a codeword from an i.i.d. generated codebook, this fact can be exploited to obtain higher rates between the cognitive pair.","PeriodicalId":120561,"journal":{"name":"2008 46th Annual Allerton Conference on Communication, Control, and Computing","volume":"206 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116196704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Uplink sum-rate analysis of a multicell system with feedback 带反馈的多小区系统的上行和速率分析
Pub Date : 2008-09-01 DOI: 10.1109/ALLERTON.2008.4797672
O. Simeone, O. Somekh, G. Kramer, H. Poor, S. Shamai
The capacity region of a Multiple Access Channel can be increased by feedback to the sources, since feedback enables cooperative transmission. Focusing on a linear cellular system (as for a highway or a corridor), a novel transmission strategy is proposed that exploits feedback from the neighboring mobile stations (MSs). The strategy enables cooperative communications via ldquoanalog network codingrdquo (i.e., broadcasting and interference cancellation via side information) to exchange signalling information among MSs. Numerical results show that the proposed technique provides gains over non-cooperative strategies in the low-signal-to-noise-ratio regime.
多址信道的容量区域可以通过对源的反馈来增加,因为反馈可以实现协同传输。针对线性蜂窝系统(如高速公路或走廊),提出了一种利用邻近移动站(MSs)反馈的新型传输策略。该策略使通过ldo模拟网络编码(即通过侧信息广播和干扰消除)的协作通信能够在MSs之间交换信令信息。数值结果表明,在低信噪比情况下,该方法比非合作策略有明显的增益。
{"title":"Uplink sum-rate analysis of a multicell system with feedback","authors":"O. Simeone, O. Somekh, G. Kramer, H. Poor, S. Shamai","doi":"10.1109/ALLERTON.2008.4797672","DOIUrl":"https://doi.org/10.1109/ALLERTON.2008.4797672","url":null,"abstract":"The capacity region of a Multiple Access Channel can be increased by feedback to the sources, since feedback enables cooperative transmission. Focusing on a linear cellular system (as for a highway or a corridor), a novel transmission strategy is proposed that exploits feedback from the neighboring mobile stations (MSs). The strategy enables cooperative communications via ldquoanalog network codingrdquo (i.e., broadcasting and interference cancellation via side information) to exchange signalling information among MSs. Numerical results show that the proposed technique provides gains over non-cooperative strategies in the low-signal-to-noise-ratio regime.","PeriodicalId":120561,"journal":{"name":"2008 46th Annual Allerton Conference on Communication, Control, and Computing","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116455202","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A coded-feedback construction of locally minimum-cost multicast network codes 局部最小代价组播网络码的编码反馈构造
Pub Date : 2008-09-01 DOI: 10.1109/ALLERTON.2008.4797548
Chih-Chun Wang
There are two common network models for network coded traffic: one is the fractional rate model (the primary model for non-coded communication) and the other is the integer rate model used for detailed coding analysis on packet-by-packet behaviors. The existing approach of finding minimum-cost multicast network codes is based on the fractional rate model and solves the corresponding linear-programming (LP) problem. The LP-based network optimization generally converges slowly due to the small step size and does not take care of the packet-by-packet coding behavior of network coding. This paper develops a minimum-cost multicast scheme based on the integer rate model. The new scheme exploits a new concept of coded feedback, takes full advantages of the forward network-coded traffic, and possesses many practical advantages for efficient implementation. The complexity and performance of the coded-feedback scheme are studied both analytically and through simulations.
网络编码流量有两种常用的网络模型:一种是分数速率模型(非编码通信的主要模型),另一种是整数速率模型,用于对逐包行为进行详细的编码分析。现有的寻找最小代价组播网络代码的方法是基于分数率模型,解决相应的线性规划问题。基于lp的网络优化由于步长较小,收敛速度较慢,并且不考虑网络编码的逐包编码行为。提出了一种基于整数速率模型的最小代价组播方案。该方案利用了编码反馈的新概念,充分利用了前向网络编码流量的优势,具有许多实用的优点,便于高效实现。通过分析和仿真研究了编码反馈方案的复杂度和性能。
{"title":"A coded-feedback construction of locally minimum-cost multicast network codes","authors":"Chih-Chun Wang","doi":"10.1109/ALLERTON.2008.4797548","DOIUrl":"https://doi.org/10.1109/ALLERTON.2008.4797548","url":null,"abstract":"There are two common network models for network coded traffic: one is the fractional rate model (the primary model for non-coded communication) and the other is the integer rate model used for detailed coding analysis on packet-by-packet behaviors. The existing approach of finding minimum-cost multicast network codes is based on the fractional rate model and solves the corresponding linear-programming (LP) problem. The LP-based network optimization generally converges slowly due to the small step size and does not take care of the packet-by-packet coding behavior of network coding. This paper develops a minimum-cost multicast scheme based on the integer rate model. The new scheme exploits a new concept of coded feedback, takes full advantages of the forward network-coded traffic, and possesses many practical advantages for efficient implementation. The complexity and performance of the coded-feedback scheme are studied both analytically and through simulations.","PeriodicalId":120561,"journal":{"name":"2008 46th Annual Allerton Conference on Communication, Control, and Computing","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123480957","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A game-theoretic approach to coding for information networks 信息网络编码的博弈论方法
Pub Date : 2008-09-01 DOI: 10.1109/ALLERTON.2008.4797724
J. Price, T. Javidi
Since its inception, network coding literature has, for the most part, assumed cooperation among users. In unicast applications where users have no inherent interest in providing (or concealing) their information to (or from) any destinations except for their unique one, this assumption must be reconsidered. In this paper, we examine the impact of selfish users on coding strategies by formulating network coding games, in which users strategies are their encoding/decoding schemes (including encoding functions, block length, rate, etc). Through the use of examples, we show that the rational outcomes of such network coding games are dependent on the particular network coding scheme implemented at intermediate nodes in the network. More specifically, we construct examples that show how careful construction of network coding schemes at intermediate nodes in the network can guarantee that efficient coding solutions will emerge as a rational outcome of the game, even when users are allowed complete freedom in choosing their coding schemes.
从一开始,网络编码文献就在很大程度上假设了用户之间的合作。在单播应用程序中,用户对向(或从)除其唯一目的地以外的任何目的地提供(或隐藏)其信息没有固有的兴趣,因此必须重新考虑这一假设。本文通过构建网络编码博弈来考察自私用户对编码策略的影响,其中用户策略是他们的编码/解码方案(包括编码函数、块长度、速率等)。通过实例表明,这种网络编码博弈的合理结果依赖于在网络中间节点上实现的特定网络编码方案。更具体地说,我们构建的例子表明,即使允许用户完全自由地选择编码方案,在网络中间节点上仔细构建网络编码方案如何保证有效的编码方案作为博弈的合理结果出现。
{"title":"A game-theoretic approach to coding for information networks","authors":"J. Price, T. Javidi","doi":"10.1109/ALLERTON.2008.4797724","DOIUrl":"https://doi.org/10.1109/ALLERTON.2008.4797724","url":null,"abstract":"Since its inception, network coding literature has, for the most part, assumed cooperation among users. In unicast applications where users have no inherent interest in providing (or concealing) their information to (or from) any destinations except for their unique one, this assumption must be reconsidered. In this paper, we examine the impact of selfish users on coding strategies by formulating network coding games, in which users strategies are their encoding/decoding schemes (including encoding functions, block length, rate, etc). Through the use of examples, we show that the rational outcomes of such network coding games are dependent on the particular network coding scheme implemented at intermediate nodes in the network. More specifically, we construct examples that show how careful construction of network coding schemes at intermediate nodes in the network can guarantee that efficient coding solutions will emerge as a rational outcome of the game, even when users are allowed complete freedom in choosing their coding schemes.","PeriodicalId":120561,"journal":{"name":"2008 46th Annual Allerton Conference on Communication, Control, and Computing","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123718163","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Incentivizing anonymous “peer-to-peer” reviews 鼓励匿名的“点对点”评论
Pub Date : 2008-09-01 DOI: 10.1109/ALLERTON.2008.4797625
Parv Venkitasubramaniam, A. Sahai
The review cycle for papers takes way too long in many disciplines. The problem is that while authors want to have their own papers reviewed fast, that are often unwilling to review the papers of others in a timely manner. This paper explores what would be required to incentivize fast reviews using a public reputation/scoring system that exploits the fact that the referees are drawn from the same pool as paper authors. The challenge in maintaining a public reputation system is to ensure that the identity of referees remain as anonymous as possible. A model is proposed in this work, wherein authors have an incentive to commit to reviewing papers and are rewarded for meeting this commitment in a manner that prioritizes their own papers for reviews. This ensures stability (bounded reviewing delays) for all fair contributors while freeloaders face a potentially unstable system. A naive implementation of the scoring system, however, leaks information that would allow authors to infer the likely identities of their referees. A distortion to the observed public score process is then studied, which is shown to enhance anonymity while preserving the incentives for timely refereeing.
许多学科的论文评审周期都太长了。问题是,虽然作者希望自己的论文得到快速审稿,但他们往往不愿意及时审稿他人的论文。本文探讨了如何使用公共声誉/评分系统来激励快速评论,该系统利用了审稿人与论文作者来自同一池的事实。维护公众声誉系统的挑战在于确保裁判的身份尽可能保持匿名。在这项工作中提出了一个模型,其中作者有动机承诺审查论文,并以优先审查自己的论文的方式获得奖励。这确保了所有公平贡献者的稳定性(有限的审查延迟),而不劳而获者则面临潜在的不稳定系统。然而,评分系统的一个幼稚的实现会泄露信息,使作者能够推断出他们的裁判可能的身份。然后研究了观察到的公共评分过程的扭曲,这表明在保持及时裁判的激励的同时增强了匿名性。
{"title":"Incentivizing anonymous “peer-to-peer” reviews","authors":"Parv Venkitasubramaniam, A. Sahai","doi":"10.1109/ALLERTON.2008.4797625","DOIUrl":"https://doi.org/10.1109/ALLERTON.2008.4797625","url":null,"abstract":"The review cycle for papers takes way too long in many disciplines. The problem is that while authors want to have their own papers reviewed fast, that are often unwilling to review the papers of others in a timely manner. This paper explores what would be required to incentivize fast reviews using a public reputation/scoring system that exploits the fact that the referees are drawn from the same pool as paper authors. The challenge in maintaining a public reputation system is to ensure that the identity of referees remain as anonymous as possible. A model is proposed in this work, wherein authors have an incentive to commit to reviewing papers and are rewarded for meeting this commitment in a manner that prioritizes their own papers for reviews. This ensures stability (bounded reviewing delays) for all fair contributors while freeloaders face a potentially unstable system. A naive implementation of the scoring system, however, leaks information that would allow authors to infer the likely identities of their referees. A distortion to the observed public score process is then studied, which is shown to enhance anonymity while preserving the incentives for timely refereeing.","PeriodicalId":120561,"journal":{"name":"2008 46th Annual Allerton Conference on Communication, Control, and Computing","volume":"942 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128597203","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Stochastic analysis of power-aware scheduling 电力感知调度的随机分析
Pub Date : 2008-09-01 DOI: 10.1109/ALLERTON.2008.4797707
A. Wierman, L. Andrew, A. Tang
Energy consumption in a computer system can be reduced by dynamic speed scaling, which adapts the processing speed to the current load. This paper studies the optimal way to adjust speed to balance mean response time and mean energy consumption, when jobs arrive as a Poisson process and processor sharing scheduling is used. Both bounds and asymptotics for the optimal speeds are provided. Interestingly, a simple scheme that halts when the system is idle and uses a static rate while the system is busy provides nearly the same performance as the optimal dynamic speed scaling. However, dynamic speed scaling which allocates a higher speed when more jobs are present significantly improves robustness to bursty traffic and mis-estimation of workload parameters.
动态速度缩放可以使计算机系统的处理速度适应当前负载,从而降低计算机系统的能耗。本文研究了当作业作为泊松进程到达且采用处理器共享调度时,调整速度以平衡平均响应时间和平均能耗的最佳方法。给出了最优速度的界和渐近性。有趣的是,在系统空闲时停止并在系统繁忙时使用静态速率的简单方案提供了与最佳动态速度扩展几乎相同的性能。然而,动态速度扩展(当存在更多作业时分配更高的速度)显着提高了对突发流量和工作负载参数错误估计的鲁棒性。
{"title":"Stochastic analysis of power-aware scheduling","authors":"A. Wierman, L. Andrew, A. Tang","doi":"10.1109/ALLERTON.2008.4797707","DOIUrl":"https://doi.org/10.1109/ALLERTON.2008.4797707","url":null,"abstract":"Energy consumption in a computer system can be reduced by dynamic speed scaling, which adapts the processing speed to the current load. This paper studies the optimal way to adjust speed to balance mean response time and mean energy consumption, when jobs arrive as a Poisson process and processor sharing scheduling is used. Both bounds and asymptotics for the optimal speeds are provided. Interestingly, a simple scheme that halts when the system is idle and uses a static rate while the system is busy provides nearly the same performance as the optimal dynamic speed scaling. However, dynamic speed scaling which allocates a higher speed when more jobs are present significantly improves robustness to bursty traffic and mis-estimation of workload parameters.","PeriodicalId":120561,"journal":{"name":"2008 46th Annual Allerton Conference on Communication, Control, and Computing","volume":"200 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128950142","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Perturbation codes 微扰码
Pub Date : 2008-09-01 DOI: 10.1109/allerton.2008.4797725
A. Akavia, R. Venkatesan
We present a new family of codes with good asymptotic properties. These codes are constructed from simple old codes using a new perturbation operator that we introduce. We provide an error reduction algorithm for these codes that uses only elementary operations with small precision. We also present a soft error reduction algorithm for the expander based codes of Alon-Bruck-Naor-Naor-Roth when concatenated with any binary code.
我们提出了一类新的具有良好渐近性质的码。这些码是用我们引入的一个新的扰动算子从简单的旧码构造而来的。我们为这些代码提供了一种误差减少算法,该算法只使用精度很小的基本运算。我们还提出了一种基于扩展器的Alon-Bruck-Naor-Naor-Roth码与任意二进制码连接时的软误差减少算法。
{"title":"Perturbation codes","authors":"A. Akavia, R. Venkatesan","doi":"10.1109/allerton.2008.4797725","DOIUrl":"https://doi.org/10.1109/allerton.2008.4797725","url":null,"abstract":"We present a new family of codes with good asymptotic properties. These codes are constructed from simple old codes using a new perturbation operator that we introduce. We provide an error reduction algorithm for these codes that uses only elementary operations with small precision. We also present a soft error reduction algorithm for the expander based codes of Alon-Bruck-Naor-Naor-Roth when concatenated with any binary code.","PeriodicalId":120561,"journal":{"name":"2008 46th Annual Allerton Conference on Communication, Control, and Computing","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130527949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Range-based geolocation in fading environments 衰落环境中基于距离的地理定位
Pub Date : 2008-09-01 DOI: 10.1109/ALLERTON.2008.4797529
B. Sadler, Ning Liu, Zhengyuan Xu, R. Kozick
We consider source geolocation based on range estimates from sensors with known coordinates. In a fading propagation environment, where a line-of-sight (LOS) path may be weak or essentially nonexistent, range estimates may have positive biases. We study this problem by considering a weighted least squares (WLS) location estimator, based on noisy range estimates, each of which is contaminated by additive Gaussian noise and possibly a positive bias. We derive the mean and mean-square error (MSE) of the WLS estimator, showing that in general the estimator produces biased estimates. The error expressions are developed via first-order perturbation analysis. They provide a means to study achievable localization performance, as a function of the measurement bias and variance, as well as the sensor network geometry.
我们基于已知坐标的传感器的距离估计来考虑源地理定位。在衰落传播环境中,视距(LOS)路径可能很弱或根本不存在,距离估计可能具有正偏差。我们通过考虑基于噪声范围估计的加权最小二乘(WLS)位置估计器来研究这个问题,每个位置估计都受到加性高斯噪声和可能的正偏差的污染。我们推导了WLS估计量的均值和均方误差(MSE),表明一般情况下估计量会产生偏估计。通过一阶摄动分析得到误差表达式。它们提供了一种方法来研究可实现的定位性能,作为测量偏差和方差的函数,以及传感器网络的几何形状。
{"title":"Range-based geolocation in fading environments","authors":"B. Sadler, Ning Liu, Zhengyuan Xu, R. Kozick","doi":"10.1109/ALLERTON.2008.4797529","DOIUrl":"https://doi.org/10.1109/ALLERTON.2008.4797529","url":null,"abstract":"We consider source geolocation based on range estimates from sensors with known coordinates. In a fading propagation environment, where a line-of-sight (LOS) path may be weak or essentially nonexistent, range estimates may have positive biases. We study this problem by considering a weighted least squares (WLS) location estimator, based on noisy range estimates, each of which is contaminated by additive Gaussian noise and possibly a positive bias. We derive the mean and mean-square error (MSE) of the WLS estimator, showing that in general the estimator produces biased estimates. The error expressions are developed via first-order perturbation analysis. They provide a means to study achievable localization performance, as a function of the measurement bias and variance, as well as the sensor network geometry.","PeriodicalId":120561,"journal":{"name":"2008 46th Annual Allerton Conference on Communication, Control, and Computing","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130666101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A new upper bound on the capacity of a class of primitive relay channels 一类原始中继信道容量的新上界
Pub Date : 2008-09-01 DOI: 10.1109/ALLERTON.2008.4797748
R. Tandon, S. Ulukus
We obtain a new upper bound on the capacity of a class of discrete memoryless relay channels. For this class of relay channels, the relay observes an i.i.d. sequence T, which is independent of the channel input X. The channel is described by a set of probability transition functions p(y|x, t) for all (x, t, y) isin X times T times Y. Furthermore, a noiseless link of finite capacity R0 exists from the relay to the receiver. Although the capacity for these channels is not known in general, the capacity of a subclass of these channels, namely when T = g(X, Y ), for some deterministic function g, was obtained in Kim (2008) and it was shown to be equal to the cut-set bound. Another instance where the capacity was obtained was in Aleksic et al. (2007), where the channel output Y can be written as Y = X oplus Z, where oplus denotes modulo-m addition, Z is independent of X, |X| = |Y| = m, and T is some stochastic function of Z. The compress-and-forward (CAF) achievability scheme (Cover and Gamal, 1979) was shown to be capacity achieving in both cases. Using our upper bound we recover the capacity results of Kim, and Aleksic et al. We also obtain the capacity of a class of channels which does not fall into either of the classes studied in Kim, and Aleksic et al. For this class of channels, CAF scheme is shown to be optimal but capacity is strictly less than the cut-set bound for certain values of R0. We further illustrate the usefulness of our bound by evaluating it for a particular relay channel with binary multiplicative states and binary additive noise for which the channel is given as Y = TX +N. We show that our upper bound is strictly better than the cut-set upper bound for certain values of R0 but it lies strictly above the rates yielded by the CAF achievability scheme.
得到了一类离散无记忆中继信道容量的一个新的上界。对于这类中继信道,中继观察到一个独立于信道输入x的iid序列T,对于x乘以T乘以y中的所有(x, T, y),信道用一组概率转移函数p(y|x, T)来描述,并且从中继到接收端存在一个有限容量R0的无噪声链路。虽然这些通道的容量通常是未知的,但在Kim(2008)中获得了这些通道的一个子类的容量,即当T = g(X, Y)时,对于某些确定性函数g,它被证明等于切集界。另一个获得容量的例子是Aleksic et al.(2007),其中通道输出Y可以写成Y = X oplus Z,其中oplus表示模m加法,Z与X无关,|X| = |Y| = m, T是Z的某个随机函数。压缩转发(CAF)可达性方案(Cover and Gamal, 1979)被证明在两种情况下都能实现容量。利用我们的上界,我们恢复了Kim和Aleksic等人的容量结果。我们还获得了一类通道的容量,它不属于Kim和Aleksic等人研究的任何一类。对于这类信道,证明了CAF方案是最优的,但对于某些R0值,容量严格小于切集界。我们通过对具有二进制乘性状态和二进制加性噪声的特定中继信道(其中信道给定为Y = TX +N)进行评估来进一步说明我们的界的有用性。我们证明,对于某些R0值,我们的上界严格优于切集上界,但它严格高于CAF可实现方案产生的率。
{"title":"A new upper bound on the capacity of a class of primitive relay channels","authors":"R. Tandon, S. Ulukus","doi":"10.1109/ALLERTON.2008.4797748","DOIUrl":"https://doi.org/10.1109/ALLERTON.2008.4797748","url":null,"abstract":"We obtain a new upper bound on the capacity of a class of discrete memoryless relay channels. For this class of relay channels, the relay observes an i.i.d. sequence T, which is independent of the channel input X. The channel is described by a set of probability transition functions p(y|x, t) for all (x, t, y) isin X times T times Y. Furthermore, a noiseless link of finite capacity R0 exists from the relay to the receiver. Although the capacity for these channels is not known in general, the capacity of a subclass of these channels, namely when T = g(X, Y ), for some deterministic function g, was obtained in Kim (2008) and it was shown to be equal to the cut-set bound. Another instance where the capacity was obtained was in Aleksic et al. (2007), where the channel output Y can be written as Y = X oplus Z, where oplus denotes modulo-m addition, Z is independent of X, |X| = |Y| = m, and T is some stochastic function of Z. The compress-and-forward (CAF) achievability scheme (Cover and Gamal, 1979) was shown to be capacity achieving in both cases. Using our upper bound we recover the capacity results of Kim, and Aleksic et al. We also obtain the capacity of a class of channels which does not fall into either of the classes studied in Kim, and Aleksic et al. For this class of channels, CAF scheme is shown to be optimal but capacity is strictly less than the cut-set bound for certain values of R0. We further illustrate the usefulness of our bound by evaluating it for a particular relay channel with binary multiplicative states and binary additive noise for which the channel is given as Y = TX +N. We show that our upper bound is strictly better than the cut-set upper bound for certain values of R0 but it lies strictly above the rates yielded by the CAF achievability scheme.","PeriodicalId":120561,"journal":{"name":"2008 46th Annual Allerton Conference on Communication, Control, and Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130785692","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
The degrees of freedom of wireless networks: information-theoretic and physical limits 无线网络的自由度:信息论和物理限制
Pub Date : 2008-09-01 DOI: 10.1109/ALLERTON.2008.4797750
M. Franceschetti, M. Migliore, P. Minero
It is shown from first principles and without relying on stochastic fading channel models that the number of spatial degrees of freedom of wireless networks can in principle grow linearly with the number of nodes, provided that the network is surrounded by a rich scattering environment. Hence, linear capacity scaling is physically possible in certain three dimensional geometries. However, it is also noted that these geometric configurations provide a physical possibility, but might be far from practical reality.
从第一性原理出发,在不依赖随机衰落信道模型的情况下,只要网络周围有丰富的散射环境,无线网络的空间自由度原则上可以随节点数线性增长。因此,在某些三维几何中,线性容量缩放在物理上是可能的。然而,也要指出,这些几何构型提供了一种物理上的可能性,但可能离实际现实还很远。
{"title":"The degrees of freedom of wireless networks: information-theoretic and physical limits","authors":"M. Franceschetti, M. Migliore, P. Minero","doi":"10.1109/ALLERTON.2008.4797750","DOIUrl":"https://doi.org/10.1109/ALLERTON.2008.4797750","url":null,"abstract":"It is shown from first principles and without relying on stochastic fading channel models that the number of spatial degrees of freedom of wireless networks can in principle grow linearly with the number of nodes, provided that the network is surrounded by a rich scattering environment. Hence, linear capacity scaling is physically possible in certain three dimensional geometries. However, it is also noted that these geometric configurations provide a physical possibility, but might be far from practical reality.","PeriodicalId":120561,"journal":{"name":"2008 46th Annual Allerton Conference on Communication, Control, and Computing","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132157213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
期刊
2008 46th Annual Allerton Conference on Communication, Control, and Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1