首页 > 最新文献

2008 46th Annual Allerton Conference on Communication, Control, and Computing最新文献

英文 中文
Entropy coding using equiprobable partitioning 使用等概率划分的熵编码
Pub Date : 2008-09-01 DOI: 10.1109/ALLERTON.2008.4797665
Yuxing Han, Jiangtao Wen, J. Villasenor
We present a simple source coding algorithm for independent and identically distributed (i.i.d.) sources that gives coding efficiency performance close to that of arithmetic coding, but with much lower computational complexity and much higher robustness to mismatches between the assumed and actual symbol probabilities. The method is based on the principle that the probability of occurrence of a symbol sequence is determined by the total number of occurrences of each member of the symbol alphabet, but not by the order of occurrences. Thus, the coding of a string of symbols can be accomplished in three steps. First, the sequence length M is encoded using an exp-Golomb code. Second, the symbol occurrences frequencies are coded using exp-Golomb codes. Third, a set of fixed length codes are used to select among the equiprobable candidate sequences. In contrast with arithmetic coding, which involves significant computation during the process of encoding and decoding, in the method described here the actual encoding and decoding are extremely simple. Furthermore, the proposed algorithm is robust to mismatches between the assumed and actual symbol probabilities.
我们提出了一种简单的独立和同分布(i.i.d)源编码算法,该算法的编码效率性能接近算术编码,但具有更低的计算复杂度和更高的鲁棒性,以应对假设和实际符号概率之间的不匹配。该方法基于这样一个原则,即符号序列出现的概率是由符号字母表中每个成员出现的总数决定的,而不是由出现的顺序决定的。因此,一串符号的编码可以分三步完成。首先,使用exp-Golomb编码对序列长度M进行编码。其次,使用exp-Golomb代码对符号出现频率进行编码。第三,使用一组固定长度的编码从等概率候选序列中进行选择。与算术编码在编码和解码过程中需要大量计算相比,本文所述方法的实际编码和解码非常简单。此外,该算法对假设和实际符号概率之间的不匹配具有鲁棒性。
{"title":"Entropy coding using equiprobable partitioning","authors":"Yuxing Han, Jiangtao Wen, J. Villasenor","doi":"10.1109/ALLERTON.2008.4797665","DOIUrl":"https://doi.org/10.1109/ALLERTON.2008.4797665","url":null,"abstract":"We present a simple source coding algorithm for independent and identically distributed (i.i.d.) sources that gives coding efficiency performance close to that of arithmetic coding, but with much lower computational complexity and much higher robustness to mismatches between the assumed and actual symbol probabilities. The method is based on the principle that the probability of occurrence of a symbol sequence is determined by the total number of occurrences of each member of the symbol alphabet, but not by the order of occurrences. Thus, the coding of a string of symbols can be accomplished in three steps. First, the sequence length M is encoded using an exp-Golomb code. Second, the symbol occurrences frequencies are coded using exp-Golomb codes. Third, a set of fixed length codes are used to select among the equiprobable candidate sequences. In contrast with arithmetic coding, which involves significant computation during the process of encoding and decoding, in the method described here the actual encoding and decoding are extremely simple. Furthermore, the proposed algorithm is robust to mismatches between the assumed and actual symbol probabilities.","PeriodicalId":120561,"journal":{"name":"2008 46th Annual Allerton Conference on Communication, Control, and Computing","volume":"196 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134463862","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A backlog-based CSMA mechanism to achieve fairness and throughput-optimality in multihop wireless networks 在多跳无线网络中实现公平性和吞吐量最优的一种基于积压的CSMA机制
Pub Date : 2008-09-01 DOI: 10.1109/ALLERTON.2008.4797635
P. Marbach, A. Eryilmaz
We propose and analyze a distributed backlog-based CSMA policy to achieve fairness and throughput-optimality in wireless multihop networks. The analysis is based on a CSMA fixed point approximation that is accurate for large networks with many small flows and a small sensing period.
为了在无线多跳网络中实现公平性和吞吐量最优性,我们提出并分析了一种基于分布式积压的CSMA策略。分析基于CSMA不动点近似,该近似对于具有许多小流量和小感知周期的大网络是准确的。
{"title":"A backlog-based CSMA mechanism to achieve fairness and throughput-optimality in multihop wireless networks","authors":"P. Marbach, A. Eryilmaz","doi":"10.1109/ALLERTON.2008.4797635","DOIUrl":"https://doi.org/10.1109/ALLERTON.2008.4797635","url":null,"abstract":"We propose and analyze a distributed backlog-based CSMA policy to achieve fairness and throughput-optimality in wireless multihop networks. The analysis is based on a CSMA fixed point approximation that is accurate for large networks with many small flows and a small sensing period.","PeriodicalId":120561,"journal":{"name":"2008 46th Annual Allerton Conference on Communication, Control, and Computing","volume":"341 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134077115","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 45
Interference Alignment for Cellular Networks 蜂窝网络的干扰对准
Pub Date : 2008-09-01 DOI: 10.1109/ALLERTON.2008.4797673
Changho Suh, David Tse
In this paper, we propose a new way of interference management for cellular networks. We develop the scheme that approaches to interference-free degree-of-freedom (dof) as the number K of users in each cell increases. Also we find the corresponding bandwidth scaling conditions for typical wireless channels: multi-path channels and single-path channels with propagation delay. The scheme is based on interference alignment. Especially for more-than-two-cell cases where there are multiple non-intended BSs, we propose a new version of interference alignment, namely subspace interference alignment. The idea is to align interferences into multi-dimensional subspace (instead of one dimension) for simultaneous alignments at multiple non-intended BSs. The proposed scheme requires finite dimensions growing linearly with K, i.e., ~O(K).
本文提出了一种新的蜂窝网络干扰管理方法。我们开发的方案,接近无干扰自由度(dof)随着每个小区的用户数量K的增加。我们还找到了典型无线信道的相应带宽缩放条件:多径信道和具有传播延迟的单径信道。该方案基于干涉对准。特别是对于存在多个非预期BSs的超过两个单元的情况,我们提出了一种新版本的干扰对准,即子空间干扰对准。这个想法是将干扰对齐到多维子空间(而不是一维),以便在多个非预期的BSs同时对齐。该方案要求有限维数随K线性增长,即~O(K)。
{"title":"Interference Alignment for Cellular Networks","authors":"Changho Suh, David Tse","doi":"10.1109/ALLERTON.2008.4797673","DOIUrl":"https://doi.org/10.1109/ALLERTON.2008.4797673","url":null,"abstract":"In this paper, we propose a new way of interference management for cellular networks. We develop the scheme that approaches to interference-free degree-of-freedom (dof) as the number K of users in each cell increases. Also we find the corresponding bandwidth scaling conditions for typical wireless channels: multi-path channels and single-path channels with propagation delay. The scheme is based on interference alignment. Especially for more-than-two-cell cases where there are multiple non-intended BSs, we propose a new version of interference alignment, namely subspace interference alignment. The idea is to align interferences into multi-dimensional subspace (instead of one dimension) for simultaneous alignments at multiple non-intended BSs. The proposed scheme requires finite dimensions growing linearly with K, i.e., ~O(K).","PeriodicalId":120561,"journal":{"name":"2008 46th Annual Allerton Conference on Communication, Control, and Computing","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124738666","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 388
Anonymity under light traffic conditions using a network of mixes 使用混合网络的轻交通条件下的匿名性
Pub Date : 2008-09-01 DOI: 10.1109/ALLERTON.2008.4797721
P. Venkitasubramaniam, V. Anantharam
The analysis of a multi-source single-destination network of mixes is considered under strict latency constraints at each mix. Mixes are relay nodes that accept packets arriving from multiple sources and release them after variable delays to prevent an eavesdropper from perfectly identifying the sources of outgoing packets (also, the contents of the packets are encrypted to prevent these from being used to correlate the arrivals to the mix with its departures). Using an entropy-based measure to quantify anonymity, the anonymity provided by such a single-destination network of mixes is analyzed, with the focus on light traffic conditions. A general upper bound is presented that bounds the anonymity of a single-destination mix network in terms of a linear combination of the anonymity of two-stage networks. By using a specific mixing strategy, a lower bound is provided on the light traffic derivative of the anonymity of single-destination mix networks. The light traffic derivative of the upper bound coincides with the lower bound for the case of mix-cascades (linear single-destination mix networks). Thus, the optimal light traffic derivative of the anonymity is characterized for mix cascades.
在严格的延迟约束下,考虑了多源单目的地混合网络的分析。混合是中继节点,它接受来自多个来源的数据包,并在可变延迟后释放它们,以防止窃听者完美地识别出传出数据包的来源(此外,数据包的内容被加密,以防止这些内容被用来将到达的数据包与离开的数据包相关联)。采用基于熵的匿名量化方法,分析了单目的地混合网络提供的匿名性,并以轻交通条件为重点。给出了单目标混合网络的匿名性用两阶段网络匿名性的线性组合来限定的一般上界。通过采用特定的混合策略,给出了单目的地混合网络的匿名性的轻流量导数的下界。对于混合级联(线性单目的地混合网络),轻流量导数的上界与下界重合。因此,对于混合级联,最优交通量导数具有匿名性。
{"title":"Anonymity under light traffic conditions using a network of mixes","authors":"P. Venkitasubramaniam, V. Anantharam","doi":"10.1109/ALLERTON.2008.4797721","DOIUrl":"https://doi.org/10.1109/ALLERTON.2008.4797721","url":null,"abstract":"The analysis of a multi-source single-destination network of mixes is considered under strict latency constraints at each mix. Mixes are relay nodes that accept packets arriving from multiple sources and release them after variable delays to prevent an eavesdropper from perfectly identifying the sources of outgoing packets (also, the contents of the packets are encrypted to prevent these from being used to correlate the arrivals to the mix with its departures). Using an entropy-based measure to quantify anonymity, the anonymity provided by such a single-destination network of mixes is analyzed, with the focus on light traffic conditions. A general upper bound is presented that bounds the anonymity of a single-destination mix network in terms of a linear combination of the anonymity of two-stage networks. By using a specific mixing strategy, a lower bound is provided on the light traffic derivative of the anonymity of single-destination mix networks. The light traffic derivative of the upper bound coincides with the lower bound for the case of mix-cascades (linear single-destination mix networks). Thus, the optimal light traffic derivative of the anonymity is characterized for mix cascades.","PeriodicalId":120561,"journal":{"name":"2008 46th Annual Allerton Conference on Communication, Control, and Computing","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132114014","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Capacity results for certain wireless relay networks with erasure links 容量结果为某些无线中继网络与擦除链路
Pub Date : 2008-09-01 DOI: 10.1109/ALLERTON.2008.4797714
S. Puducheri, T. Fuja
This paper considers two simple wireless network configurations in which the links making up the network do not interfere with one another and the assumed link loss mechanisms are erasures. The first configuration is the M-source multiple access relay channel (MARC), in which M different sources convey information to a single destination with the help of a single relay. The second configuration is the two-fold multi-relay channel (MRC), in which a pair of relays help a single source convey information to a single destination. Cut set bounds are established for these configurations, and linear programming is then employed to formulate closed-form solutions for the capacity regions as a function of the link parameters; moreover, it is shown that easily-implemented capacity-approaching codes such as LDPC or Tornado codes can be used at the link level to achieve any point in the capacity region. For the erasure MARC, the results indicate that the relay should help only those sources that have a weaker direct channel to the destination than the relay itself does - regardless of the quality of the source-to-relay channels. For the erasure MRC, the solution is not as intuitive, but it displays a structure in which the relative quality of the various links determine which relays are used - and, when both are used, which relay is ldquoprimaryrdquo and which is ldquosecondaryrdquo.
本文考虑了两种简单的无线网络配置,其中组成网络的链路互不干扰,假设的链路丢失机制是擦除。第一种配置是M源多址中继通道(MARC),其中M个不同的源通过单个中继将信息传递到单个目的地。第二种配置是双重多中继通道(MRC),其中一对中继帮助单个源将信息传递到单个目的地。建立了这些构型的切集边界,然后利用线性规划的方法给出了容量区域随链路参数的函数的封闭解;此外,本文还证明了易于实现的容量逼近码(如LDPC码或Tornado码)可以在链路级达到容量区域的任何点。对于擦除MARC,结果表明中继应该只帮助那些具有比中继本身更弱的到目标的直接通道的源-无论源到中继通道的质量如何。对于擦除MRC,解决方案不那么直观,但它显示了一种结构,在这种结构中,各种链路的相对质量决定了使用哪些继电器,并且,当两者都使用时,哪个继电器是ldquoprimary rrdquo,哪个继电器是ldquosecondary rrdquo。
{"title":"Capacity results for certain wireless relay networks with erasure links","authors":"S. Puducheri, T. Fuja","doi":"10.1109/ALLERTON.2008.4797714","DOIUrl":"https://doi.org/10.1109/ALLERTON.2008.4797714","url":null,"abstract":"This paper considers two simple wireless network configurations in which the links making up the network do not interfere with one another and the assumed link loss mechanisms are erasures. The first configuration is the M-source multiple access relay channel (MARC), in which M different sources convey information to a single destination with the help of a single relay. The second configuration is the two-fold multi-relay channel (MRC), in which a pair of relays help a single source convey information to a single destination. Cut set bounds are established for these configurations, and linear programming is then employed to formulate closed-form solutions for the capacity regions as a function of the link parameters; moreover, it is shown that easily-implemented capacity-approaching codes such as LDPC or Tornado codes can be used at the link level to achieve any point in the capacity region. For the erasure MARC, the results indicate that the relay should help only those sources that have a weaker direct channel to the destination than the relay itself does - regardless of the quality of the source-to-relay channels. For the erasure MRC, the solution is not as intuitive, but it displays a structure in which the relative quality of the various links determine which relays are used - and, when both are used, which relay is ldquoprimaryrdquo and which is ldquosecondaryrdquo.","PeriodicalId":120561,"journal":{"name":"2008 46th Annual Allerton Conference on Communication, Control, and Computing","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133443788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multiuser MIMO downlink with limited inter-cell cooperation: Approximate interference alignment in time, frequency and space 有限小区间合作的多用户MIMO下行链路:在时间、频率和空间上的近似干扰对准
Pub Date : 2008-09-01 DOI: 10.1109/ALLERTON.2008.4797630
G. Caire, S. Ramprashad, H. Papadopoulos, C. Pépin, C. Sundberg
We consider a realistic albeit simplified scenario for wireless cellular systems of the next generation (4G and beyond), where MIMO-OFDM, opportunistic scheduling, channel state information at the transmitter and limited base-station cooperation are envisaged. We propose two strategies with limited base-station cooperation that can be easily implemented with today's technology and achieve an approximate form of inter-cell interference alignment. The first strategy consists of imposing a ldquopower maskrdquo in frequency such that adjacent cooperative clusters of base stations generate different interference levels in different frequency subchannels. The second strategy consists of switching between different cooperative clusters such that no user is in a permanently disadvantaged location.We compare single-user and multiuser MIMO systems in terms of average throughput as a function of the user location.
我们考虑了下一代(4G及以后)无线蜂窝系统的一个现实但简化的场景,其中设想了MIMO-OFDM,机会调度,发射机的信道状态信息和有限的基站合作。我们提出了两种具有有限基站合作的策略,这两种策略可以很容易地用当今的技术实现,并实现近似形式的小区间干扰对齐。第一种策略包括在频率上施加低功率掩码,使相邻的基站合作集群在不同的频率子信道中产生不同的干扰水平。第二种策略包括在不同的合作集群之间切换,这样就不会有用户永远处于不利地位。我们比较了单用户和多用户MIMO系统的平均吞吐量作为用户位置的函数。
{"title":"Multiuser MIMO downlink with limited inter-cell cooperation: Approximate interference alignment in time, frequency and space","authors":"G. Caire, S. Ramprashad, H. Papadopoulos, C. Pépin, C. Sundberg","doi":"10.1109/ALLERTON.2008.4797630","DOIUrl":"https://doi.org/10.1109/ALLERTON.2008.4797630","url":null,"abstract":"We consider a realistic albeit simplified scenario for wireless cellular systems of the next generation (4G and beyond), where MIMO-OFDM, opportunistic scheduling, channel state information at the transmitter and limited base-station cooperation are envisaged. We propose two strategies with limited base-station cooperation that can be easily implemented with today's technology and achieve an approximate form of inter-cell interference alignment. The first strategy consists of imposing a ldquopower maskrdquo in frequency such that adjacent cooperative clusters of base stations generate different interference levels in different frequency subchannels. The second strategy consists of switching between different cooperative clusters such that no user is in a permanently disadvantaged location.We compare single-user and multiuser MIMO systems in terms of average throughput as a function of the user location.","PeriodicalId":120561,"journal":{"name":"2008 46th Annual Allerton Conference on Communication, Control, and Computing","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133879883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 50
Analysis of load balancing algorithms in P2P streaming P2P流媒体中负载均衡算法分析
Pub Date : 2008-09-01 DOI: 10.1109/ALLERTON.2008.4797662
Yongzhi Wang, T. Fu, D. Chiu
In unstructured P2P content distribution systems, the most important algorithms to ensure optimal flow of content along multiple dynamically created distribution trees are piece selection algorithms and load balancing algorithms. This paper models practical load balancing algorithms and derives a number of insights.
在非结构化P2P内容分发系统中,确保内容在多个动态创建的分发树中最优流动的最重要算法是片段选择算法和负载平衡算法。本文对实际的负载均衡算法进行了建模,并得出了一些见解。
{"title":"Analysis of load balancing algorithms in P2P streaming","authors":"Yongzhi Wang, T. Fu, D. Chiu","doi":"10.1109/ALLERTON.2008.4797662","DOIUrl":"https://doi.org/10.1109/ALLERTON.2008.4797662","url":null,"abstract":"In unstructured P2P content distribution systems, the most important algorithms to ensure optimal flow of content along multiple dynamically created distribution trees are piece selection algorithms and load balancing algorithms. This paper models practical load balancing algorithms and derives a number of insights.","PeriodicalId":120561,"journal":{"name":"2008 46th Annual Allerton Conference on Communication, Control, and Computing","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132664132","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Query-level learning to rank using isotonic regression 查询级学习排序使用等渗回归
Pub Date : 2008-09-01 DOI: 10.1109/ALLERTON.2008.4797684
Zhaohui Zheng, H. Zha, Gordon Sun
Ranking functions determine the relevance of search results of search engines, and learning ranking functions has become an active research area at the interface between Web search, information retrieval and machine learning. Generally, the training data for learning to rank come in two different forms: (1) absolute relevance judgments assessing the degree of relevance of a document with respect to a query. This type of judgments is also called labeled data and are usually obtained through human editorial efforts; and (2) relative relevance judgments indicating that a document is more relevant than another with respect to a query. This type of judgments is also called preference data and can usually be extracted from the abundantly available user click-through data recording users' interactions with the search results. Most existing learning to rank methods ignore the query boundaries, treating the labeled data or preference data equally across queries. In this paper, we propose a minimum effort optimization method that takes into account the entire training data within a query at each iteration. We tackle this optimization problem using functional iterative methods where the update at each iteration is computed by solving an isotonic regression problem. This more global approach results in faster convergency and signficantly improved performance of the learned ranking functions over existing state-of-the-art methods. We demonstrate the effectiveness of the proposed method using data sets obtained from a commercial search engine as well as publicly available data.
排名函数决定了搜索引擎搜索结果的相关性,学习排名函数已经成为Web搜索、信息检索和机器学习之间的一个活跃的研究领域。一般来说,学习排序的训练数据有两种不同的形式:(1)绝对相关性判断,评估文档相对于查询的相关性程度。这种类型的判断也被称为标记数据,通常是通过人类编辑努力获得的;(2)相对相关性判断,表明一份文件比另一份文件在查询方面更相关。这种类型的判断也被称为偏好数据,通常可以从大量可用的用户点击数据中提取,这些数据记录了用户与搜索结果的交互。大多数现有的排序学习方法忽略查询边界,在查询中平等地对待标记数据或首选项数据。在本文中,我们提出了一种最小努力优化方法,该方法在每次迭代时考虑到查询中的整个训练数据。我们使用函数迭代方法解决这个优化问题,其中每次迭代的更新是通过求解等渗回归问题来计算的。与现有的最先进的方法相比,这种更全局的方法可以更快地收敛并显着提高学习到的排名函数的性能。我们使用从商业搜索引擎获得的数据集以及公开可用的数据来证明所提出方法的有效性。
{"title":"Query-level learning to rank using isotonic regression","authors":"Zhaohui Zheng, H. Zha, Gordon Sun","doi":"10.1109/ALLERTON.2008.4797684","DOIUrl":"https://doi.org/10.1109/ALLERTON.2008.4797684","url":null,"abstract":"Ranking functions determine the relevance of search results of search engines, and learning ranking functions has become an active research area at the interface between Web search, information retrieval and machine learning. Generally, the training data for learning to rank come in two different forms: (1) absolute relevance judgments assessing the degree of relevance of a document with respect to a query. This type of judgments is also called labeled data and are usually obtained through human editorial efforts; and (2) relative relevance judgments indicating that a document is more relevant than another with respect to a query. This type of judgments is also called preference data and can usually be extracted from the abundantly available user click-through data recording users' interactions with the search results. Most existing learning to rank methods ignore the query boundaries, treating the labeled data or preference data equally across queries. In this paper, we propose a minimum effort optimization method that takes into account the entire training data within a query at each iteration. We tackle this optimization problem using functional iterative methods where the update at each iteration is computed by solving an isotonic regression problem. This more global approach results in faster convergency and signficantly improved performance of the learned ranking functions over existing state-of-the-art methods. We demonstrate the effectiveness of the proposed method using data sets obtained from a commercial search engine as well as publicly available data.","PeriodicalId":120561,"journal":{"name":"2008 46th Annual Allerton Conference on Communication, Control, and Computing","volume":"6 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133768573","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
On the information capacity of Gaussian channels under small peak power constraints 小峰值功率约束下高斯信道的信息容量
Pub Date : 2008-09-01 DOI: 10.1109/ALLERTON.2008.4797569
M. Raginsky
This paper deals with information capacities of Gaussian channels under small (but nonvanishing) peak power constraints. We prove that, when the peak amplitude is below 1.05, the capacity of the scalar Gaussian channel is achieved by symmetric equiprobable signaling and is equal to at least 80% of the corresponding average-power capacity. The proof uses the identity of Guo, Shamai and Verdu that relates mutual information and minimum mean square error in Gaussian channels, together with several results on the minimax estimation of a bounded parameter in white Gaussian noise. We also give upper and lower bounds on peak-power capacities of vector Gaussian channels whose inputs are constrained to lie in suitably small ellipsoids and show that we can achieve at least 80% of the average-power capacity by having the transmitters use symmetric equiprobable signaling at amplitudes determined from the usual water-filling policy. The 80% figure comes from an upper bound on the ratio of the nonlinear and the linear minimax risks of estimating a bounded parameter in white Gaussian noise.
本文研究高斯信道在小(但不消失)峰值功率约束下的信息量。我们证明,当峰值幅度低于1.05时,标量高斯信道的容量是通过对称等概率信号来实现的,并且至少等于相应平均功率容量的80%。该证明使用了Guo, Shamai和Verdu的相互信息和高斯信道中最小均方误差的恒等式,以及高斯白噪声中有界参数的极大极小估计的几个结果。我们还给出了输入被限制在适当的小椭球中的矢量高斯信道的峰值功率容量的上界和下界,并表明我们可以通过让发射机在通常的充水策略确定的振幅下使用对称等概率信号来实现至少80%的平均功率容量。80%的数字来自高斯白噪声中估计有界参数的非线性和线性最小最大风险之比的上界。
{"title":"On the information capacity of Gaussian channels under small peak power constraints","authors":"M. Raginsky","doi":"10.1109/ALLERTON.2008.4797569","DOIUrl":"https://doi.org/10.1109/ALLERTON.2008.4797569","url":null,"abstract":"This paper deals with information capacities of Gaussian channels under small (but nonvanishing) peak power constraints. We prove that, when the peak amplitude is below 1.05, the capacity of the scalar Gaussian channel is achieved by symmetric equiprobable signaling and is equal to at least 80% of the corresponding average-power capacity. The proof uses the identity of Guo, Shamai and Verdu that relates mutual information and minimum mean square error in Gaussian channels, together with several results on the minimax estimation of a bounded parameter in white Gaussian noise. We also give upper and lower bounds on peak-power capacities of vector Gaussian channels whose inputs are constrained to lie in suitably small ellipsoids and show that we can achieve at least 80% of the average-power capacity by having the transmitters use symmetric equiprobable signaling at amplitudes determined from the usual water-filling policy. The 80% figure comes from an upper bound on the ratio of the nonlinear and the linear minimax risks of estimating a bounded parameter in white Gaussian noise.","PeriodicalId":120561,"journal":{"name":"2008 46th Annual Allerton Conference on Communication, Control, and Computing","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117257313","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
Dynamic network security deployment under partial information 部分信息下的动态网络安全部署
Pub Date : 2008-09-01 DOI: 10.1109/ALLERTON.2008.4797565
G. Theodorakopoulos, J. Baras, J. Le Boudec
A network user's decision to start and continue using security products is based on economic considerations. The cost of a security compromise (e.g., worm infection) is compared against the cost of deploying and maintaining a sufficient level of security. These costs are not necessarily the real ones, but rather the perceived costs, which depend on the amount of information available to a user at each time. Moreover, the costs (whether real or perceived) depend on the decisions of other users, too: The probability of a user getting infected depends on the security deployed by all the other users. In this paper, we combine an epidemic model for malware propagation in a network with a game theoretic model of the users' decisions to deploy security or not. Users can dynamically change their decision in order to maximize their currently perceived utility. We study the equilibrium points, and their dependence on the speed of the learning process through which the users learn the state of the network. We find that the faster the learning process, the higher the total network cost.
网络用户决定开始和继续使用安全产品是基于经济考虑。将安全危害(例如蠕虫感染)的成本与部署和维护足够安全级别的成本进行比较。这些成本不一定是实际成本,而是感知成本,这取决于用户每次可获得的信息量。此外,成本(无论是实际成本还是感知成本)也取决于其他用户的决策:用户被感染的概率取决于所有其他用户部署的安全性。在本文中,我们将恶意软件在网络中传播的流行模型与用户是否部署安全决策的博弈论模型相结合。用户可以动态地改变他们的决定,以最大化他们当前的感知效用。我们研究了平衡点,以及它们对学习过程速度的依赖,用户通过学习过程学习网络的状态。我们发现学习过程越快,网络总成本越高。
{"title":"Dynamic network security deployment under partial information","authors":"G. Theodorakopoulos, J. Baras, J. Le Boudec","doi":"10.1109/ALLERTON.2008.4797565","DOIUrl":"https://doi.org/10.1109/ALLERTON.2008.4797565","url":null,"abstract":"A network user's decision to start and continue using security products is based on economic considerations. The cost of a security compromise (e.g., worm infection) is compared against the cost of deploying and maintaining a sufficient level of security. These costs are not necessarily the real ones, but rather the perceived costs, which depend on the amount of information available to a user at each time. Moreover, the costs (whether real or perceived) depend on the decisions of other users, too: The probability of a user getting infected depends on the security deployed by all the other users. In this paper, we combine an epidemic model for malware propagation in a network with a game theoretic model of the users' decisions to deploy security or not. Users can dynamically change their decision in order to maximize their currently perceived utility. We study the equilibrium points, and their dependence on the speed of the learning process through which the users learn the state of the network. We find that the faster the learning process, the higher the total network cost.","PeriodicalId":120561,"journal":{"name":"2008 46th Annual Allerton Conference on Communication, Control, and Computing","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115131483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
期刊
2008 46th Annual Allerton Conference on Communication, Control, and Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1