首页 > 最新文献

2008 46th Annual Allerton Conference on Communication, Control, and Computing最新文献

英文 中文
Entropy coding using equiprobable partitioning 使用等概率划分的熵编码
Pub Date : 2008-09-01 DOI: 10.1109/ALLERTON.2008.4797665
Yuxing Han, Jiangtao Wen, J. Villasenor
We present a simple source coding algorithm for independent and identically distributed (i.i.d.) sources that gives coding efficiency performance close to that of arithmetic coding, but with much lower computational complexity and much higher robustness to mismatches between the assumed and actual symbol probabilities. The method is based on the principle that the probability of occurrence of a symbol sequence is determined by the total number of occurrences of each member of the symbol alphabet, but not by the order of occurrences. Thus, the coding of a string of symbols can be accomplished in three steps. First, the sequence length M is encoded using an exp-Golomb code. Second, the symbol occurrences frequencies are coded using exp-Golomb codes. Third, a set of fixed length codes are used to select among the equiprobable candidate sequences. In contrast with arithmetic coding, which involves significant computation during the process of encoding and decoding, in the method described here the actual encoding and decoding are extremely simple. Furthermore, the proposed algorithm is robust to mismatches between the assumed and actual symbol probabilities.
我们提出了一种简单的独立和同分布(i.i.d)源编码算法,该算法的编码效率性能接近算术编码,但具有更低的计算复杂度和更高的鲁棒性,以应对假设和实际符号概率之间的不匹配。该方法基于这样一个原则,即符号序列出现的概率是由符号字母表中每个成员出现的总数决定的,而不是由出现的顺序决定的。因此,一串符号的编码可以分三步完成。首先,使用exp-Golomb编码对序列长度M进行编码。其次,使用exp-Golomb代码对符号出现频率进行编码。第三,使用一组固定长度的编码从等概率候选序列中进行选择。与算术编码在编码和解码过程中需要大量计算相比,本文所述方法的实际编码和解码非常简单。此外,该算法对假设和实际符号概率之间的不匹配具有鲁棒性。
{"title":"Entropy coding using equiprobable partitioning","authors":"Yuxing Han, Jiangtao Wen, J. Villasenor","doi":"10.1109/ALLERTON.2008.4797665","DOIUrl":"https://doi.org/10.1109/ALLERTON.2008.4797665","url":null,"abstract":"We present a simple source coding algorithm for independent and identically distributed (i.i.d.) sources that gives coding efficiency performance close to that of arithmetic coding, but with much lower computational complexity and much higher robustness to mismatches between the assumed and actual symbol probabilities. The method is based on the principle that the probability of occurrence of a symbol sequence is determined by the total number of occurrences of each member of the symbol alphabet, but not by the order of occurrences. Thus, the coding of a string of symbols can be accomplished in three steps. First, the sequence length M is encoded using an exp-Golomb code. Second, the symbol occurrences frequencies are coded using exp-Golomb codes. Third, a set of fixed length codes are used to select among the equiprobable candidate sequences. In contrast with arithmetic coding, which involves significant computation during the process of encoding and decoding, in the method described here the actual encoding and decoding are extremely simple. Furthermore, the proposed algorithm is robust to mismatches between the assumed and actual symbol probabilities.","PeriodicalId":120561,"journal":{"name":"2008 46th Annual Allerton Conference on Communication, Control, and Computing","volume":"196 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134463862","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A backlog-based CSMA mechanism to achieve fairness and throughput-optimality in multihop wireless networks 在多跳无线网络中实现公平性和吞吐量最优的一种基于积压的CSMA机制
Pub Date : 2008-09-01 DOI: 10.1109/ALLERTON.2008.4797635
P. Marbach, A. Eryilmaz
We propose and analyze a distributed backlog-based CSMA policy to achieve fairness and throughput-optimality in wireless multihop networks. The analysis is based on a CSMA fixed point approximation that is accurate for large networks with many small flows and a small sensing period.
为了在无线多跳网络中实现公平性和吞吐量最优性,我们提出并分析了一种基于分布式积压的CSMA策略。分析基于CSMA不动点近似,该近似对于具有许多小流量和小感知周期的大网络是准确的。
{"title":"A backlog-based CSMA mechanism to achieve fairness and throughput-optimality in multihop wireless networks","authors":"P. Marbach, A. Eryilmaz","doi":"10.1109/ALLERTON.2008.4797635","DOIUrl":"https://doi.org/10.1109/ALLERTON.2008.4797635","url":null,"abstract":"We propose and analyze a distributed backlog-based CSMA policy to achieve fairness and throughput-optimality in wireless multihop networks. The analysis is based on a CSMA fixed point approximation that is accurate for large networks with many small flows and a small sensing period.","PeriodicalId":120561,"journal":{"name":"2008 46th Annual Allerton Conference on Communication, Control, and Computing","volume":"341 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134077115","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 45
On the information capacity of Gaussian channels under small peak power constraints 小峰值功率约束下高斯信道的信息容量
Pub Date : 2008-09-01 DOI: 10.1109/ALLERTON.2008.4797569
M. Raginsky
This paper deals with information capacities of Gaussian channels under small (but nonvanishing) peak power constraints. We prove that, when the peak amplitude is below 1.05, the capacity of the scalar Gaussian channel is achieved by symmetric equiprobable signaling and is equal to at least 80% of the corresponding average-power capacity. The proof uses the identity of Guo, Shamai and Verdu that relates mutual information and minimum mean square error in Gaussian channels, together with several results on the minimax estimation of a bounded parameter in white Gaussian noise. We also give upper and lower bounds on peak-power capacities of vector Gaussian channels whose inputs are constrained to lie in suitably small ellipsoids and show that we can achieve at least 80% of the average-power capacity by having the transmitters use symmetric equiprobable signaling at amplitudes determined from the usual water-filling policy. The 80% figure comes from an upper bound on the ratio of the nonlinear and the linear minimax risks of estimating a bounded parameter in white Gaussian noise.
本文研究高斯信道在小(但不消失)峰值功率约束下的信息量。我们证明,当峰值幅度低于1.05时,标量高斯信道的容量是通过对称等概率信号来实现的,并且至少等于相应平均功率容量的80%。该证明使用了Guo, Shamai和Verdu的相互信息和高斯信道中最小均方误差的恒等式,以及高斯白噪声中有界参数的极大极小估计的几个结果。我们还给出了输入被限制在适当的小椭球中的矢量高斯信道的峰值功率容量的上界和下界,并表明我们可以通过让发射机在通常的充水策略确定的振幅下使用对称等概率信号来实现至少80%的平均功率容量。80%的数字来自高斯白噪声中估计有界参数的非线性和线性最小最大风险之比的上界。
{"title":"On the information capacity of Gaussian channels under small peak power constraints","authors":"M. Raginsky","doi":"10.1109/ALLERTON.2008.4797569","DOIUrl":"https://doi.org/10.1109/ALLERTON.2008.4797569","url":null,"abstract":"This paper deals with information capacities of Gaussian channels under small (but nonvanishing) peak power constraints. We prove that, when the peak amplitude is below 1.05, the capacity of the scalar Gaussian channel is achieved by symmetric equiprobable signaling and is equal to at least 80% of the corresponding average-power capacity. The proof uses the identity of Guo, Shamai and Verdu that relates mutual information and minimum mean square error in Gaussian channels, together with several results on the minimax estimation of a bounded parameter in white Gaussian noise. We also give upper and lower bounds on peak-power capacities of vector Gaussian channels whose inputs are constrained to lie in suitably small ellipsoids and show that we can achieve at least 80% of the average-power capacity by having the transmitters use symmetric equiprobable signaling at amplitudes determined from the usual water-filling policy. The 80% figure comes from an upper bound on the ratio of the nonlinear and the linear minimax risks of estimating a bounded parameter in white Gaussian noise.","PeriodicalId":120561,"journal":{"name":"2008 46th Annual Allerton Conference on Communication, Control, and Computing","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117257313","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
Privacy-security tradeoffs in biometric security systems 生物识别安全系统中隐私与安全的权衡
Pub Date : 2008-09-01 DOI: 10.1109/ALLERTON.2008.4797566
L. Lai, Siu-Wai Ho, H. Poor
Biometric security systems are studied from an information theoretic perspective. A fundamental tradeoff between privacy, measured by the normalized equivocation rate of the biometric measurements, and security, measured by the rate of the key generated from the biometric measurements, is identified. The scenario in which a potential attacker does not have side information is considered first. The privacy-security region, which characterizes the above-noted tradeoff, is derived for this case. The close relationship between common information among random variables and the biometric security system is also revealed. The scenario in which the attacker has side information is then considered. Inner and outer bounds on the privacy-security region are derived in this case.
从信息论的角度研究生物识别安全系统。确定了隐私(由生物特征测量的标准化模糊率衡量)和安全性(由生物特征测量生成的密钥率衡量)之间的基本权衡。首先考虑的是潜在攻击者没有附带信息的场景。隐私-安全区域是为这种情况衍生出来的,它是上述折衷的特征。揭示了随机变量之间的公共信息与生物识别安全系统之间的密切关系。然后考虑攻击者拥有侧信息的场景。在这种情况下,导出了隐私安全区域的内部和外部边界。
{"title":"Privacy-security tradeoffs in biometric security systems","authors":"L. Lai, Siu-Wai Ho, H. Poor","doi":"10.1109/ALLERTON.2008.4797566","DOIUrl":"https://doi.org/10.1109/ALLERTON.2008.4797566","url":null,"abstract":"Biometric security systems are studied from an information theoretic perspective. A fundamental tradeoff between privacy, measured by the normalized equivocation rate of the biometric measurements, and security, measured by the rate of the key generated from the biometric measurements, is identified. The scenario in which a potential attacker does not have side information is considered first. The privacy-security region, which characterizes the above-noted tradeoff, is derived for this case. The close relationship between common information among random variables and the biometric security system is also revealed. The scenario in which the attacker has side information is then considered. Inner and outer bounds on the privacy-security region are derived in this case.","PeriodicalId":120561,"journal":{"name":"2008 46th Annual Allerton Conference on Communication, Control, and Computing","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116244640","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 53
Dynamic network security deployment under partial information 部分信息下的动态网络安全部署
Pub Date : 2008-09-01 DOI: 10.1109/ALLERTON.2008.4797565
G. Theodorakopoulos, J. Baras, J. Le Boudec
A network user's decision to start and continue using security products is based on economic considerations. The cost of a security compromise (e.g., worm infection) is compared against the cost of deploying and maintaining a sufficient level of security. These costs are not necessarily the real ones, but rather the perceived costs, which depend on the amount of information available to a user at each time. Moreover, the costs (whether real or perceived) depend on the decisions of other users, too: The probability of a user getting infected depends on the security deployed by all the other users. In this paper, we combine an epidemic model for malware propagation in a network with a game theoretic model of the users' decisions to deploy security or not. Users can dynamically change their decision in order to maximize their currently perceived utility. We study the equilibrium points, and their dependence on the speed of the learning process through which the users learn the state of the network. We find that the faster the learning process, the higher the total network cost.
网络用户决定开始和继续使用安全产品是基于经济考虑。将安全危害(例如蠕虫感染)的成本与部署和维护足够安全级别的成本进行比较。这些成本不一定是实际成本,而是感知成本,这取决于用户每次可获得的信息量。此外,成本(无论是实际成本还是感知成本)也取决于其他用户的决策:用户被感染的概率取决于所有其他用户部署的安全性。在本文中,我们将恶意软件在网络中传播的流行模型与用户是否部署安全决策的博弈论模型相结合。用户可以动态地改变他们的决定,以最大化他们当前的感知效用。我们研究了平衡点,以及它们对学习过程速度的依赖,用户通过学习过程学习网络的状态。我们发现学习过程越快,网络总成本越高。
{"title":"Dynamic network security deployment under partial information","authors":"G. Theodorakopoulos, J. Baras, J. Le Boudec","doi":"10.1109/ALLERTON.2008.4797565","DOIUrl":"https://doi.org/10.1109/ALLERTON.2008.4797565","url":null,"abstract":"A network user's decision to start and continue using security products is based on economic considerations. The cost of a security compromise (e.g., worm infection) is compared against the cost of deploying and maintaining a sufficient level of security. These costs are not necessarily the real ones, but rather the perceived costs, which depend on the amount of information available to a user at each time. Moreover, the costs (whether real or perceived) depend on the decisions of other users, too: The probability of a user getting infected depends on the security deployed by all the other users. In this paper, we combine an epidemic model for malware propagation in a network with a game theoretic model of the users' decisions to deploy security or not. Users can dynamically change their decision in order to maximize their currently perceived utility. We study the equilibrium points, and their dependence on the speed of the learning process through which the users learn the state of the network. We find that the faster the learning process, the higher the total network cost.","PeriodicalId":120561,"journal":{"name":"2008 46th Annual Allerton Conference on Communication, Control, and Computing","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115131483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Identifying tractable decentralized control problems on the basis of information structure 基于信息结构识别可处理的分散控制问题
Pub Date : 2008-09-01 DOI: 10.1109/ALLERTON.2008.4797732
Aditya Mahajan, A. Nayyar, D. Teneketzis
Sequential decomposition of two general models of decentralized systems with non-classical information structures is presented. In model A, all agents have two observations at each step: a common observation that all agents observe and a private observation of their own. The control actions of each agent is based on all past common observations, the current private observation and the contents of its memory. At each step, each agent also updates the contents of its memory. A cost function, which depends on the state of the plant and the control actions of all agents, is given. The objective is to choose control and memory update functions for all agents to either minimize a total expected cost over a finite horizon or to minimize a discounted cost over an infinite horizon. In model B, the agents do not have any common observation, the rest is same as in model A. The key idea of our solution methodology is the following. From the point of view of a fictitious agent that observes all common observations, the system can be viewed as a centralized system with partial observations. This allows us to identify information states and obtain a sequential decomposition. When the system variables take values in finite sets, the optimality equations of the sequential decomposition are similar to those of partially observable Markov decision processes (POMDP) with finite state and action spaces. For such systems, we can use algorithms for POMDPs to compute optimal designs for models A and B.
给出了具有非经典信息结构的分散系统的两种一般模型的顺序分解。在模型A中,所有智能体在每一步都有两个观察结果:一个是所有智能体观察到的共同观察结果,另一个是它们自己的私人观察结果。每个智能体的控制动作基于所有过去的共同观察、当前的私有观察和其内存的内容。在每一步中,每个代理还更新其内存的内容。给出了一个成本函数,它依赖于工厂的状态和所有代理的控制动作。目标是为所有智能体选择控制和记忆更新函数,以最小化有限范围内的总期望成本或最小化无限范围内的折扣成本。在模型B中,代理没有任何共同观察,其余部分与模型a相同。我们的解决方法的关键思想如下。从观察所有共同观察的虚拟代理的角度来看,系统可以被视为具有部分观察的集中系统。这允许我们识别信息状态并获得顺序分解。当系统变量取值为有限集合时,序列分解的最优性方程类似于有限状态和有限动作空间的部分可观察马尔可夫决策过程的最优性方程。对于这样的系统,我们可以使用pomdp算法来计算模型A和B的最优设计。
{"title":"Identifying tractable decentralized control problems on the basis of information structure","authors":"Aditya Mahajan, A. Nayyar, D. Teneketzis","doi":"10.1109/ALLERTON.2008.4797732","DOIUrl":"https://doi.org/10.1109/ALLERTON.2008.4797732","url":null,"abstract":"Sequential decomposition of two general models of decentralized systems with non-classical information structures is presented. In model A, all agents have two observations at each step: a common observation that all agents observe and a private observation of their own. The control actions of each agent is based on all past common observations, the current private observation and the contents of its memory. At each step, each agent also updates the contents of its memory. A cost function, which depends on the state of the plant and the control actions of all agents, is given. The objective is to choose control and memory update functions for all agents to either minimize a total expected cost over a finite horizon or to minimize a discounted cost over an infinite horizon. In model B, the agents do not have any common observation, the rest is same as in model A. The key idea of our solution methodology is the following. From the point of view of a fictitious agent that observes all common observations, the system can be viewed as a centralized system with partial observations. This allows us to identify information states and obtain a sequential decomposition. When the system variables take values in finite sets, the optimality equations of the sequential decomposition are similar to those of partially observable Markov decision processes (POMDP) with finite state and action spaces. For such systems, we can use algorithms for POMDPs to compute optimal designs for models A and B.","PeriodicalId":120561,"journal":{"name":"2008 46th Annual Allerton Conference on Communication, Control, and Computing","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115295093","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 46
Diversity-multiplexing tradeoff of the half-duplex relay channel 半双工中继信道的分集-复用权衡
Pub Date : 2008-09-01 DOI: 10.1109/ALLERTON.2008.4797531
S. Pawar, A. Avestimehr, David Tse
We show that the diversity-multiplexing tradeoff of a half-duplex single-relay channel with identically distributed Rayleigh fading channel gains meets the 2 by 1 MISO bound. We generalize the result to the case when there are N non-interfering relays and show that the diversity-multiplexing tradeoff is equal to the N + 1 by 1 MISO bound.
我们证明了具有相同分布瑞利衰落信道增益的半双工单中继信道的分集复用权衡符合2 × 1 MISO界限。我们将结果推广到有N个无干扰继电器的情况,并证明分集复用权衡等于N + 1 × 1 MISO界。
{"title":"Diversity-multiplexing tradeoff of the half-duplex relay channel","authors":"S. Pawar, A. Avestimehr, David Tse","doi":"10.1109/ALLERTON.2008.4797531","DOIUrl":"https://doi.org/10.1109/ALLERTON.2008.4797531","url":null,"abstract":"We show that the diversity-multiplexing tradeoff of a half-duplex single-relay channel with identically distributed Rayleigh fading channel gains meets the 2 by 1 MISO bound. We generalize the result to the case when there are N non-interfering relays and show that the diversity-multiplexing tradeoff is equal to the N + 1 by 1 MISO bound.","PeriodicalId":120561,"journal":{"name":"2008 46th Annual Allerton Conference on Communication, Control, and Computing","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115456488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 52
Interference Alignment for Cellular Networks 蜂窝网络的干扰对准
Pub Date : 2008-09-01 DOI: 10.1109/ALLERTON.2008.4797673
Changho Suh, David Tse
In this paper, we propose a new way of interference management for cellular networks. We develop the scheme that approaches to interference-free degree-of-freedom (dof) as the number K of users in each cell increases. Also we find the corresponding bandwidth scaling conditions for typical wireless channels: multi-path channels and single-path channels with propagation delay. The scheme is based on interference alignment. Especially for more-than-two-cell cases where there are multiple non-intended BSs, we propose a new version of interference alignment, namely subspace interference alignment. The idea is to align interferences into multi-dimensional subspace (instead of one dimension) for simultaneous alignments at multiple non-intended BSs. The proposed scheme requires finite dimensions growing linearly with K, i.e., ~O(K).
本文提出了一种新的蜂窝网络干扰管理方法。我们开发的方案,接近无干扰自由度(dof)随着每个小区的用户数量K的增加。我们还找到了典型无线信道的相应带宽缩放条件:多径信道和具有传播延迟的单径信道。该方案基于干涉对准。特别是对于存在多个非预期BSs的超过两个单元的情况,我们提出了一种新版本的干扰对准,即子空间干扰对准。这个想法是将干扰对齐到多维子空间(而不是一维),以便在多个非预期的BSs同时对齐。该方案要求有限维数随K线性增长,即~O(K)。
{"title":"Interference Alignment for Cellular Networks","authors":"Changho Suh, David Tse","doi":"10.1109/ALLERTON.2008.4797673","DOIUrl":"https://doi.org/10.1109/ALLERTON.2008.4797673","url":null,"abstract":"In this paper, we propose a new way of interference management for cellular networks. We develop the scheme that approaches to interference-free degree-of-freedom (dof) as the number K of users in each cell increases. Also we find the corresponding bandwidth scaling conditions for typical wireless channels: multi-path channels and single-path channels with propagation delay. The scheme is based on interference alignment. Especially for more-than-two-cell cases where there are multiple non-intended BSs, we propose a new version of interference alignment, namely subspace interference alignment. The idea is to align interferences into multi-dimensional subspace (instead of one dimension) for simultaneous alignments at multiple non-intended BSs. The proposed scheme requires finite dimensions growing linearly with K, i.e., ~O(K).","PeriodicalId":120561,"journal":{"name":"2008 46th Annual Allerton Conference on Communication, Control, and Computing","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124738666","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 388
Networking sensors using belief propagation 利用信念传播的网络传感器
Pub Date : 2008-09-01 DOI: 10.1109/ALLERTON.2008.4797583
S. Sanghavi, D. Malioutov, A. Willsky
This paper investigates the performance of belief propagation (BP) as a distributed solution to two combinatorial resource allocation problems arising in sensor networks: network formation and fusion center location. We model these problems by max-weight b-matching and uncapacitated facility location, respectively. Each of these is a classical optimization problem. For both problems, we (a) show how BP can be simplified for implementation in distributed environments where transmissions are broadcast and can interfere, (b) derive a principled interpretation of estimates before convergence, and (c) compare the performance of BP to that of linear programming.
本文研究了基于信念传播(BP)的分布式解决方案在传感器网络中出现的两个组合资源分配问题:网络的形成和融合中心的定位。我们分别通过最大权重b匹配和无容量设施位置来建模这些问题。这些都是经典的优化问题。对于这两个问题,我们(a)展示了如何简化BP以在传输广播且可能干扰的分布式环境中实现,(b)推导出收敛前估计的原则解释,以及(c)将BP的性能与线性规划的性能进行比较。
{"title":"Networking sensors using belief propagation","authors":"S. Sanghavi, D. Malioutov, A. Willsky","doi":"10.1109/ALLERTON.2008.4797583","DOIUrl":"https://doi.org/10.1109/ALLERTON.2008.4797583","url":null,"abstract":"This paper investigates the performance of belief propagation (BP) as a distributed solution to two combinatorial resource allocation problems arising in sensor networks: network formation and fusion center location. We model these problems by max-weight b-matching and uncapacitated facility location, respectively. Each of these is a classical optimization problem. For both problems, we (a) show how BP can be simplified for implementation in distributed environments where transmissions are broadcast and can interfere, (b) derive a principled interpretation of estimates before convergence, and (c) compare the performance of BP to that of linear programming.","PeriodicalId":120561,"journal":{"name":"2008 46th Annual Allerton Conference on Communication, Control, and Computing","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123518513","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Single-user MIMO vs. Multiuser MIMO in the broadcast channel with CSIT constraints 具有CSIT约束的广播信道中的单用户MIMO与多用户MIMO
Pub Date : 2008-09-01 DOI: 10.1109/ALLERTON.2008.4797572
Jun Zhang, J. Andrews, R. Heath
This paper considers fundamental limits on adaptive multiple-input multiple-output (MIMO) transmission with imperfect channel state information at the transmitter (CSIT). First, the achievable ergodic rates are derived for both single-user and multi-user MIMO systems with different CSIT assumptions, which shows that single-user MIMO is robust to imperfect CSIT while multiuser MIMO loses spatial multiplexing gain in proportion to delay and inverse with channel quantization codebook size. A single-user/multiuser mode switching rule is then proposed based on the average SNR, the amount of delay, and the quantization codebook size. The operating regions for single-user and multiuser modes are determined, which can be used to select the preferred mode. It is shown that the multiuser mode should not be activated when the delay is large or the codebook size is small.
本文研究了在发送端信道状态信息不完全的情况下自适应多输入多输出(MIMO)传输的基本限制。首先,推导了具有不同CSIT假设的单用户MIMO和多用户MIMO系统的可实现遍历率,表明单用户MIMO对不完美CSIT具有鲁棒性,而多用户MIMO的空间复用增益损失与时延成正比,与信道量化码本大小成反比。然后,基于平均信噪比、延迟量和量化码本大小,提出了单用户/多用户模式切换规则。确定了单用户和多用户模式的操作区域,可用于选择首选模式。结果表明,当延迟较大或码本大小较小时,不应激活多用户模式。
{"title":"Single-user MIMO vs. Multiuser MIMO in the broadcast channel with CSIT constraints","authors":"Jun Zhang, J. Andrews, R. Heath","doi":"10.1109/ALLERTON.2008.4797572","DOIUrl":"https://doi.org/10.1109/ALLERTON.2008.4797572","url":null,"abstract":"This paper considers fundamental limits on adaptive multiple-input multiple-output (MIMO) transmission with imperfect channel state information at the transmitter (CSIT). First, the achievable ergodic rates are derived for both single-user and multi-user MIMO systems with different CSIT assumptions, which shows that single-user MIMO is robust to imperfect CSIT while multiuser MIMO loses spatial multiplexing gain in proportion to delay and inverse with channel quantization codebook size. A single-user/multiuser mode switching rule is then proposed based on the average SNR, the amount of delay, and the quantization codebook size. The operating regions for single-user and multiuser modes are determined, which can be used to select the preferred mode. It is shown that the multiuser mode should not be activated when the delay is large or the codebook size is small.","PeriodicalId":120561,"journal":{"name":"2008 46th Annual Allerton Conference on Communication, Control, and Computing","volume":"7 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123686047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
期刊
2008 46th Annual Allerton Conference on Communication, Control, and Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1