首页 > 最新文献

2008 46th Annual Allerton Conference on Communication, Control, and Computing最新文献

英文 中文
Secure wireless communications via cooperation 通过合作确保无线通信安全
Pub Date : 2008-09-01 DOI: 10.1109/ALLERTON.2008.4797687
Lun Dong, Zhu Han, A. Petropulu, H. Poor
The feasibility of physical-layer-based security approaches for wireless communications in the presence of one or more eavesdroppers is hampered by channel conditions. In this paper, cooperation is investigated as an approach to overcome this problem and improve the performance of secure communications. In particular, a decode-and-forward (DF) based cooperative protocol is considered, and the objective is to design the system for secrecy capacity maximization or transmit power minimization. System design for the DF-based cooperative protocol is first studied by assuming the availability of global channel state information (CSI). For the case of one eavesdropper, an iterative scheme is proposed to obtain the optimal solution for the problem of transmit power minimization. For the case of multiple eavesdroppers, the problem of secrecy capacity maximization or transmit power minimization is in general intractable. Suboptimal system design is proposed by adding an additional constraint, i.e., the complete nulling of signals at all eavesdroppers, which yields simple closed-form solutions for the aforementioned two problems. Then, the impact of imperfect CSI of eavesdroppers on system design is studied, in which the ergodic secrecy capacity is of interest.
在存在一个或多个窃听者的情况下,基于物理层的无线通信安全方法的可行性受到信道条件的阻碍。本文研究了协作作为克服这一问题和提高安全通信性能的一种方法。特别考虑了一种基于译码转发(DF)的协作协议,其目标是实现保密容量最大化或传输功率最小化。首先在假定全局信道状态信息(CSI)可用的前提下,研究了基于df的协作协议的系统设计。针对单窃听者的情况,提出了一种求解发射功率最小问题的迭代方案。对于多窃听者的情况,保密容量最大化或传输功率最小化的问题通常是难以解决的。通过增加一个额外的约束,即在所有窃听者处的信号完全为零,提出了次优系统设计,这为上述两个问题提供了简单的封闭形式解。然后,研究了窃听者不完善的CSI对系统设计的影响,其中对遍历保密能力感兴趣。
{"title":"Secure wireless communications via cooperation","authors":"Lun Dong, Zhu Han, A. Petropulu, H. Poor","doi":"10.1109/ALLERTON.2008.4797687","DOIUrl":"https://doi.org/10.1109/ALLERTON.2008.4797687","url":null,"abstract":"The feasibility of physical-layer-based security approaches for wireless communications in the presence of one or more eavesdroppers is hampered by channel conditions. In this paper, cooperation is investigated as an approach to overcome this problem and improve the performance of secure communications. In particular, a decode-and-forward (DF) based cooperative protocol is considered, and the objective is to design the system for secrecy capacity maximization or transmit power minimization. System design for the DF-based cooperative protocol is first studied by assuming the availability of global channel state information (CSI). For the case of one eavesdropper, an iterative scheme is proposed to obtain the optimal solution for the problem of transmit power minimization. For the case of multiple eavesdroppers, the problem of secrecy capacity maximization or transmit power minimization is in general intractable. Suboptimal system design is proposed by adding an additional constraint, i.e., the complete nulling of signals at all eavesdroppers, which yields simple closed-form solutions for the aforementioned two problems. Then, the impact of imperfect CSI of eavesdroppers on system design is studied, in which the ergodic secrecy capacity is of interest.","PeriodicalId":120561,"journal":{"name":"2008 46th Annual Allerton Conference on Communication, Control, and Computing","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131550162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 157
A Bayesian network approach to control of networked Markov decision processes 网络马尔可夫决策过程控制的贝叶斯网络方法
Pub Date : 2008-09-01 DOI: 10.1109/ALLERTON.2008.4797592
S. Adlakha, S. Lall, A. Goldsmith
We consider the problem of finding an optimal feedback controller for a networked Markov decision process. Specifically, we consider a network of interconnected subsystems, where each subsystem evolves as a Markov decision process (MDP). A subsystem is connected to its neighbors via links over which signals are delayed. We consider centralized control of such networked MDPs. The controller receives delayed state information from each of the subsystem, and it chooses control actions for all subsystems. Such networked MDPs can be represented as partially observed Markov decision processes (POMDPs). We model such a POMDP as a Bayesian network and show that an optimal controller requires only a finite history of past states and control actions. The result is based on the idea that given certain past states and actions, the current state of the networked MDP is independent of the earlier states and actions. This dependence on only the finite past states and actions makes the computation of controllers for networked MDPs tractable.
研究了网络马尔可夫决策过程的最优反馈控制器问题。具体地说,我们考虑一个相互连接的子系统网络,其中每个子系统演变为马尔可夫决策过程(MDP)。一个子系统通过信号延迟的链路连接到它的邻居。我们考虑对这种网络化的mdp进行集中控制。控制器从每个子系统接收延迟状态信息,并为所有子系统选择控制动作。这种网络化的mdp可以表示为部分观察到的马尔可夫决策过程(pomdp)。我们将这种POMDP建模为贝叶斯网络,并表明最优控制器只需要过去状态和控制动作的有限历史。该结果基于这样的思想:给定某些过去的状态和行为,网络MDP的当前状态独立于早期的状态和行为。这种仅依赖于有限的过去状态和动作的特性使得网络mdp的控制器计算变得容易处理。
{"title":"A Bayesian network approach to control of networked Markov decision processes","authors":"S. Adlakha, S. Lall, A. Goldsmith","doi":"10.1109/ALLERTON.2008.4797592","DOIUrl":"https://doi.org/10.1109/ALLERTON.2008.4797592","url":null,"abstract":"We consider the problem of finding an optimal feedback controller for a networked Markov decision process. Specifically, we consider a network of interconnected subsystems, where each subsystem evolves as a Markov decision process (MDP). A subsystem is connected to its neighbors via links over which signals are delayed. We consider centralized control of such networked MDPs. The controller receives delayed state information from each of the subsystem, and it chooses control actions for all subsystems. Such networked MDPs can be represented as partially observed Markov decision processes (POMDPs). We model such a POMDP as a Bayesian network and show that an optimal controller requires only a finite history of past states and control actions. The result is based on the idea that given certain past states and actions, the current state of the networked MDP is independent of the earlier states and actions. This dependence on only the finite past states and actions makes the computation of controllers for networked MDPs tractable.","PeriodicalId":120561,"journal":{"name":"2008 46th Annual Allerton Conference on Communication, Control, and Computing","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115076849","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Network coding for computing 计算机网络编码
Pub Date : 2008-09-01 DOI: 10.1109/ALLERTON.2008.4797527
R. Appuswamy, M. Franceschetti, N. Karamchandani, K. Zeger
The following network computation problem is considered. A set of source nodes in an acyclic network generates independent messages and a single receiver node computes a function f of the messages. The objective is to characterize the maximum number of times f can be computed per network usage. The network coding problem for a single receiver network is a special case of the network computation problem (taking f to be the identity map) in which all of the source messages must be reproduced at the receiver. For network coding with a single receiver, routing is known to be rate-optimal and achieves the network min-cut upper bound. We give a generalized min-cut upper bound for the network computation problem. We show that the bound reduces to the usual network min-cut when f is the identity and the bound is tight for the computation of ldquodivisible functionsrdquo over ldquotree networksrdquo. We also show that the bound is not tight in general.
考虑以下网络计算问题。非循环网络中的一组源节点生成独立的消息,单个接收节点计算消息的函数f。目标是描述每次网络使用可以计算f的最大次数。单个接收网络的网络编码问题是网络计算问题(取f为身份映射)的一种特殊情况,在这种情况下,所有源消息都必须在接收端重新生成。对于单接收机的网络编码,路由是已知的速率最优的,并达到网络最小切割上界。给出了网络计算问题的广义最小切上界。我们证明了在ldquotree网络上计算ldquo可分函数的界是紧的,当f是恒等时,界约为通常的网络最小割。我们还证明了一般情况下边界并不紧。
{"title":"Network coding for computing","authors":"R. Appuswamy, M. Franceschetti, N. Karamchandani, K. Zeger","doi":"10.1109/ALLERTON.2008.4797527","DOIUrl":"https://doi.org/10.1109/ALLERTON.2008.4797527","url":null,"abstract":"The following network computation problem is considered. A set of source nodes in an acyclic network generates independent messages and a single receiver node computes a function f of the messages. The objective is to characterize the maximum number of times f can be computed per network usage. The network coding problem for a single receiver network is a special case of the network computation problem (taking f to be the identity map) in which all of the source messages must be reproduced at the receiver. For network coding with a single receiver, routing is known to be rate-optimal and achieves the network min-cut upper bound. We give a generalized min-cut upper bound for the network computation problem. We show that the bound reduces to the usual network min-cut when f is the identity and the bound is tight for the computation of ldquodivisible functionsrdquo over ldquotree networksrdquo. We also show that the bound is not tight in general.","PeriodicalId":120561,"journal":{"name":"2008 46th Annual Allerton Conference on Communication, Control, and Computing","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128224457","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Analyzing brain signals by combinatorial optimization 组合优化分析脑信号
Pub Date : 2008-09-01 DOI: 10.1109/ALLERTON.2008.4797722
J. Dauwels, F. Vialatte, T. Weber, A. Cichocki
We present a new method to determine the similarity (or synchrony) of a collection of multi-dimensional signals. The signals are first converted into point processes, where each event of a point process corresponds to a burst of activity of the corresponding signal in an appropriate feature space. The similarity of signals is then computed by adaptively aligning the events from the different point processes. If the point processes are similar, clusters containing one point from each time series will naturally appear. Synchrony is then measured as a function of the size of the clusters and the distance between points within one cluster. The alignment of events is defined in a natural statistical model; the optimal clustering is obtained through maximum a posteriori inference and can be cast as a combinatorial optimization problem. As the dimension and the number of signals increase, so does the complexity of the inference task. In particular, the inference task corresponds to: a) a dynamic program when comparing two 1-dimensional signals; b) A maximum weighted matching on a bipartite graph when comparing two d-dimensional signals; c) A NP-hard integer program that can be reduced to N-dimensional matching when comparing N ges 2 signals We show the applicability of the method by predicting the onset of mild cognitive impairment (MCI) from EEG signals.
我们提出了一种新的方法来确定一个多维信号集合的相似性(或同步性)。首先将信号转换为点过程,其中点过程的每个事件对应于相应信号在适当特征空间中的活动爆发。然后通过自适应地对齐来自不同点过程的事件来计算信号的相似性。如果点过程相似,则每个时间序列中包含一个点的聚类自然会出现。然后,将同步性作为集群大小和一个集群内点之间距离的函数来测量。事件的排列在自然统计模型中定义;最优聚类是通过最大后验推理得到的,可以看作是一个组合优化问题。随着信号维数和数量的增加,推理任务的复杂度也随之增加。具体来说,推理任务对应于:a)比较两个一维信号时的动态程序;b)比较两个d维信号时在二部图上的最大加权匹配;c)一种NP-hard整数程序,当比较N个神经元2个信号时,该程序可以简化为N维匹配。我们通过脑电信号预测轻度认知障碍(MCI)的发生,证明了该方法的适用性。
{"title":"Analyzing brain signals by combinatorial optimization","authors":"J. Dauwels, F. Vialatte, T. Weber, A. Cichocki","doi":"10.1109/ALLERTON.2008.4797722","DOIUrl":"https://doi.org/10.1109/ALLERTON.2008.4797722","url":null,"abstract":"We present a new method to determine the similarity (or synchrony) of a collection of multi-dimensional signals. The signals are first converted into point processes, where each event of a point process corresponds to a burst of activity of the corresponding signal in an appropriate feature space. The similarity of signals is then computed by adaptively aligning the events from the different point processes. If the point processes are similar, clusters containing one point from each time series will naturally appear. Synchrony is then measured as a function of the size of the clusters and the distance between points within one cluster. The alignment of events is defined in a natural statistical model; the optimal clustering is obtained through maximum a posteriori inference and can be cast as a combinatorial optimization problem. As the dimension and the number of signals increase, so does the complexity of the inference task. In particular, the inference task corresponds to: a) a dynamic program when comparing two 1-dimensional signals; b) A maximum weighted matching on a bipartite graph when comparing two d-dimensional signals; c) A NP-hard integer program that can be reduced to N-dimensional matching when comparing N ges 2 signals We show the applicability of the method by predicting the onset of mild cognitive impairment (MCI) from EEG signals.","PeriodicalId":120561,"journal":{"name":"2008 46th Annual Allerton Conference on Communication, Control, and Computing","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132711881","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Distributed interference pricing with MISO channels MISO信道的分布式干扰定价
Pub Date : 2008-09-01 DOI: 10.1109/ALLERTON.2008.4797605
Changxin Shi, R. Berry, M. Honig
We study a distributed algorithm for adapting transmit beamforming vectors in a multi-antenna peer-to-peer wireless network. The algorithm attempts to maximize a sum of per-user utility functions, where each user's utility is a function of his transmission rate, or equivalently the received signal-to-interference plus noise ratio (SINR). This is accomplished by exchanging interference prices, each of which represents the marginal cost of interference to a particular user. Given the interference prices, users update their beamforming vectors to maximize their utility minus the cost of interference. For a two-user system, we show that this algorithm converges for a suitable class of utility functions. Convergence of the algorithm with more than two users is illustrated numerically.
研究了一种在多天线点对点无线网络中自适应发射波束形成矢量的分布式算法。该算法试图最大化每个用户效用函数的总和,其中每个用户的效用是其传输速率的函数,或者相当于接收到的信噪比(SINR)。这是通过交换干扰价格来实现的,每个干扰价格代表对特定用户的干扰的边际成本。给定干扰价格,用户更新他们的波束形成矢量以最大限度地减少干扰成本。对于一个双用户系统,我们证明了该算法收敛于一类合适的效用函数。数值说明了该算法在两个以上用户情况下的收敛性。
{"title":"Distributed interference pricing with MISO channels","authors":"Changxin Shi, R. Berry, M. Honig","doi":"10.1109/ALLERTON.2008.4797605","DOIUrl":"https://doi.org/10.1109/ALLERTON.2008.4797605","url":null,"abstract":"We study a distributed algorithm for adapting transmit beamforming vectors in a multi-antenna peer-to-peer wireless network. The algorithm attempts to maximize a sum of per-user utility functions, where each user's utility is a function of his transmission rate, or equivalently the received signal-to-interference plus noise ratio (SINR). This is accomplished by exchanging interference prices, each of which represents the marginal cost of interference to a particular user. Given the interference prices, users update their beamforming vectors to maximize their utility minus the cost of interference. For a two-user system, we show that this algorithm converges for a suitable class of utility functions. Convergence of the algorithm with more than two users is illustrated numerically.","PeriodicalId":120561,"journal":{"name":"2008 46th Annual Allerton Conference on Communication, Control, and Computing","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134278921","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 44
The case for structured random codes: Beyond linear models 结构化随机代码的案例:超越线性模型
Pub Date : 2008-09-01 DOI: 10.1109/ALLERTON.2008.4797729
B. Nazer, M. Gastpar
Recent work has shown that for some multi-user networks, carefully controlling the algebraic structure of the coding scheme may be just as useful as selecting the correct input distribution. In particular, for linear channel models, including finite field and Gaussian networks, linearly structured codes have been successfully used to prove new capacity results. In this note, we show that the benefits of structured random codes is not limited to linear channel models and networks. We show that for general discrete memoryless networks, there are benefits to allowing intermediate nodes to decode only a function of their inputs. These benefits are illustrated through the aid of an example based on the binary multiplying channel.
最近的研究表明,对于一些多用户网络,仔细控制编码方案的代数结构可能与选择正确的输入分布一样有用。特别是对于线性信道模型,包括有限域和高斯网络,线性结构码已成功地用于证明新的容量结果。在本文中,我们展示了结构化随机码的好处并不局限于线性信道模型和网络。我们表明,对于一般的离散无记忆网络,允许中间节点只解码其输入的一个函数是有好处的。通过一个基于二进制相乘通道的例子来说明这些好处。
{"title":"The case for structured random codes: Beyond linear models","authors":"B. Nazer, M. Gastpar","doi":"10.1109/ALLERTON.2008.4797729","DOIUrl":"https://doi.org/10.1109/ALLERTON.2008.4797729","url":null,"abstract":"Recent work has shown that for some multi-user networks, carefully controlling the algebraic structure of the coding scheme may be just as useful as selecting the correct input distribution. In particular, for linear channel models, including finite field and Gaussian networks, linearly structured codes have been successfully used to prove new capacity results. In this note, we show that the benefits of structured random codes is not limited to linear channel models and networks. We show that for general discrete memoryless networks, there are benefits to allowing intermediate nodes to decode only a function of their inputs. These benefits are illustrated through the aid of an example based on the binary multiplying channel.","PeriodicalId":120561,"journal":{"name":"2008 46th Annual Allerton Conference on Communication, Control, and Computing","volume":"123 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114418126","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Counter Braids: Asymptotic optimality of the message passing decoding algorithm 反辫子:消息传递解码算法的渐近最优性
Pub Date : 2008-09-01 DOI: 10.1109/ALLERTON.2008.4797558
Yi Lu, A. Montanari, B. Prabhakar
A novel counter architecture, called Counter braids, has recently been proposed for per-flow counting on high-speed links. Counter braids has a layered structure and compresses the flow sizes as it counts. It has been shown that with a maximum likelihood (ML) decoding algorithm, the number of bits needed to store the size of a flow matches the entropy lower bound. As ML decoding is too complex to implement, an efficient message passing decoding algorithm has been proposed for practical purposes. The layers of Counter Braids are decoded sequentially, from the most significant to the least significant bits. In each layer, the message passing decoder solves a sparse signal recovery problem. In this paper we analyze the threshold dimensionality reduction rate (d-rate) of the message passing algorithm, and prove that it is correctly predicted by density evolution. Given a signal in R+ n with ne non-vanishing entries, we prove that one layer of Counter Braids can reduce its dimensionality by a factor 2.08 epsi log(1/epsi) + O(epsi). This essentially matches the rate for sparse signal recovery via L1 minimization, while keeping the overall complexity linear in n.
最近提出了一种新的计数器结构,称为计数器辫子,用于高速链路上的每流计数。反向编织具有分层结构,并在计数时压缩流量大小。研究表明,使用最大似然(ML)解码算法,存储流大小所需的比特数与熵下界匹配。由于ML解码过于复杂而难以实现,因此提出了一种高效的消息传递解码算法。反辫子层按顺序解码,从最重要的位到最不重要的位。在每一层,消息传递解码器解决了稀疏信号恢复问题。本文对消息传递算法的阈值降维率(d-rate)进行了分析,并证明了密度进化算法对阈值降维率的预测是正确的。给定一个在R+ n中有ne个非消失项的信号,我们证明了一层Counter braid可以将其维数降低2.08 epsi log(1/epsi) + O(epsi)。这基本上与通过L1最小化实现的稀疏信号恢复速率相匹配,同时保持总体复杂度在n中呈线性。
{"title":"Counter Braids: Asymptotic optimality of the message passing decoding algorithm","authors":"Yi Lu, A. Montanari, B. Prabhakar","doi":"10.1109/ALLERTON.2008.4797558","DOIUrl":"https://doi.org/10.1109/ALLERTON.2008.4797558","url":null,"abstract":"A novel counter architecture, called Counter braids, has recently been proposed for per-flow counting on high-speed links. Counter braids has a layered structure and compresses the flow sizes as it counts. It has been shown that with a maximum likelihood (ML) decoding algorithm, the number of bits needed to store the size of a flow matches the entropy lower bound. As ML decoding is too complex to implement, an efficient message passing decoding algorithm has been proposed for practical purposes. The layers of Counter Braids are decoded sequentially, from the most significant to the least significant bits. In each layer, the message passing decoder solves a sparse signal recovery problem. In this paper we analyze the threshold dimensionality reduction rate (d-rate) of the message passing algorithm, and prove that it is correctly predicted by density evolution. Given a signal in R+ n with ne non-vanishing entries, we prove that one layer of Counter Braids can reduce its dimensionality by a factor 2.08 epsi log(1/epsi) + O(epsi). This essentially matches the rate for sparse signal recovery via L1 minimization, while keeping the overall complexity linear in n.","PeriodicalId":120561,"journal":{"name":"2008 46th Annual Allerton Conference on Communication, Control, and Computing","volume":"289 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116296141","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
The secrecy of compressed sensing measurements 压缩感知测量的保密性
Pub Date : 2008-09-01 DOI: 10.1109/ALLERTON.2008.4797641
Y. Rachlin, D. Baron
Results in compressed sensing describe the feasibility of reconstructing sparse signals using a small number of linear measurements. In addition to compressing the signal, do these measurements provide secrecy? This paper considers secrecy in the context of an adversary that does not know the measurement matrix used to encrypt the signal. We demonstrate that compressed sensing-based encryption does not achieve Shannon's definition of perfect secrecy, but can provide a computational guarantee of secrecy.
压缩感知的结果描述了利用少量线性测量重建稀疏信号的可行性。除了压缩信号,这些测量是否提供了保密性?本文考虑了对手不知道用于加密信号的测量矩阵的情况下的保密性。我们证明了基于压缩感知的加密并没有达到香农的完全保密定义,但可以提供一个计算的保密保证。
{"title":"The secrecy of compressed sensing measurements","authors":"Y. Rachlin, D. Baron","doi":"10.1109/ALLERTON.2008.4797641","DOIUrl":"https://doi.org/10.1109/ALLERTON.2008.4797641","url":null,"abstract":"Results in compressed sensing describe the feasibility of reconstructing sparse signals using a small number of linear measurements. In addition to compressing the signal, do these measurements provide secrecy? This paper considers secrecy in the context of an adversary that does not know the measurement matrix used to encrypt the signal. We demonstrate that compressed sensing-based encryption does not achieve Shannon's definition of perfect secrecy, but can provide a computational guarantee of secrecy.","PeriodicalId":120561,"journal":{"name":"2008 46th Annual Allerton Conference on Communication, Control, and Computing","volume":"214 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114762642","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 335
Continuous-model communication complexity with application in distributed resource allocation in wireless Ad hoc networks 连续模型通信复杂性及其在无线自组网分布式资源分配中的应用
Pub Date : 2008-09-01 DOI: 10.1109/ALLERTON.2008.4797737
Husheng Li, H. Dai
Distributed resource allocation is an important problem in wireless ad hoc networks, in which there is no centralized scheduler and the resource allocation is carried out in a distributed way. Information exchange in the distributed resource allocation incurs overhead since it does not convey data information. The communication complexity, defined as the minimum number of exchanged messages needed for computing a common function with distributed inputs, is studied and the resource allocation is considered to be the procedure of computing a common function whose inputs are the parameters of multiple communication links. A lower bound for the communication complexity is provided based on the first order differentiation of the output function of resource allocation by extending the two-input-single-output case in [9] to multi-input-multi-output case. The conclusion is then applied to a concrete example of distributed resource allocation.
分布式资源分配是无线自组织网络中的一个重要问题,无线自组织网络中没有集中的调度程序,资源分配以分布式方式进行。分布式资源分配中的信息交换会产生开销,因为它不传递数据信息。将通信复杂度定义为计算具有分布式输入的公共函数所需的最小交换消息数,并将资源分配视为计算以多个通信链路的参数为输入的公共函数的过程。将[9]中的双输入单输出情况推广到多输入多输出情况,基于资源分配输出函数的一阶微分,给出了通信复杂度的下界。并将所得结论应用于分布式资源分配的具体实例。
{"title":"Continuous-model communication complexity with application in distributed resource allocation in wireless Ad hoc networks","authors":"Husheng Li, H. Dai","doi":"10.1109/ALLERTON.2008.4797737","DOIUrl":"https://doi.org/10.1109/ALLERTON.2008.4797737","url":null,"abstract":"Distributed resource allocation is an important problem in wireless ad hoc networks, in which there is no centralized scheduler and the resource allocation is carried out in a distributed way. Information exchange in the distributed resource allocation incurs overhead since it does not convey data information. The communication complexity, defined as the minimum number of exchanged messages needed for computing a common function with distributed inputs, is studied and the resource allocation is considered to be the procedure of computing a common function whose inputs are the parameters of multiple communication links. A lower bound for the communication complexity is provided based on the first order differentiation of the output function of resource allocation by extending the two-input-single-output case in [9] to multi-input-multi-output case. The conclusion is then applied to a concrete example of distributed resource allocation.","PeriodicalId":120561,"journal":{"name":"2008 46th Annual Allerton Conference on Communication, Control, and Computing","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133663750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Practical near-optimal sparse recovery in the L1 norm L1范数下实用的近最优稀疏恢复
Pub Date : 2008-09-01 DOI: 10.1109/ALLERTON.2008.4797556
Radu Berinde, P. Indyk, M. Ruzic
We consider the approximate sparse recovery problem, where the goal is to (approximately) recover a high-dimensional vector x isin Rn from its lower-dimensional sketch Ax isin Rm. Specifically, we focus on the sparse recovery problem in the l1 norm: for a parameter k, given the sketch Ax, compute an approximation xcirc of x such that the l1 approximation error parx - xcircpar1 is close to minx' parx - x'par1, where x' ranges over all vectors with at most k terms. The sparse recovery problem has been subject to extensive research over the last few years. Many solutions to this problem have been discovered, achieving different trade-offs between various attributes, such as the sketch length, encoding and recovery times.
我们考虑近似稀疏恢复问题,其目标是从其低维草图Ax isin Rm(近似)恢复高维向量x isin Rn。具体来说,我们关注l1范数中的稀疏恢复问题:对于参数k,给定草图Ax,计算x的近似值xcirc,使得l1近似值parx - xcircpar1接近minx' parx - x'par1,其中x'的范围在所有向量上最多有k项。在过去的几年里,稀疏恢复问题得到了广泛的研究。针对这个问题已经发现了许多解决方案,实现了不同属性(如草图长度、编码和恢复时间)之间的不同权衡。
{"title":"Practical near-optimal sparse recovery in the L1 norm","authors":"Radu Berinde, P. Indyk, M. Ruzic","doi":"10.1109/ALLERTON.2008.4797556","DOIUrl":"https://doi.org/10.1109/ALLERTON.2008.4797556","url":null,"abstract":"We consider the approximate sparse recovery problem, where the goal is to (approximately) recover a high-dimensional vector x isin Rn from its lower-dimensional sketch Ax isin Rm. Specifically, we focus on the sparse recovery problem in the l1 norm: for a parameter k, given the sketch Ax, compute an approximation xcirc of x such that the l1 approximation error parx - xcircpar1 is close to minx' parx - x'par1, where x' ranges over all vectors with at most k terms. The sparse recovery problem has been subject to extensive research over the last few years. Many solutions to this problem have been discovered, achieving different trade-offs between various attributes, such as the sketch length, encoding and recovery times.","PeriodicalId":120561,"journal":{"name":"2008 46th Annual Allerton Conference on Communication, Control, and Computing","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133779900","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 189
期刊
2008 46th Annual Allerton Conference on Communication, Control, and Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1