首页 > 最新文献

IEEE Trans. Inf. Theory最新文献

英文 中文
Corrections to "On the Separability of Parallel MISO Broadcast Channels Under Partial CSIT: A Degrees of Freedom Region Perspective" 对“局部CSIT下平行MISO广播信道的可分性:一个自由度区域视角”的修正
Pub Date : 2020-09-21 DOI: 10.1109/TIT.2020.3015638
Hamdi Joudeh, B. Clerckx
In [1] , reference [26] was incorrect. Reference [26] should be as follows: E. Piovano and B. Clerckx, “Optimal DoF region of the K-user MISO BC with partial CSIT,” IEEE Commun. Lett ., vol. 21, no. 11, pp. 2368–2371, Nov. 2017.
{"title":"Corrections to \"On the Separability of Parallel MISO Broadcast Channels Under Partial CSIT: A Degrees of Freedom Region Perspective\"","authors":"Hamdi Joudeh, B. Clerckx","doi":"10.1109/TIT.2020.3015638","DOIUrl":"https://doi.org/10.1109/TIT.2020.3015638","url":null,"abstract":"In [1] , reference [26] was incorrect. Reference [26] should be as follows: E. Piovano and B. Clerckx, “Optimal DoF region of the K-user MISO BC with partial CSIT,” IEEE Commun. Lett ., vol. 21, no. 11, pp. 2368–2371, Nov. 2017.","PeriodicalId":13250,"journal":{"name":"IEEE Trans. Inf. Theory","volume":"29 1","pages":"6605"},"PeriodicalIF":0.0,"publicationDate":"2020-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88561488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficiently Decoding Reed-Muller Codes From Random Errors 从随机错误中有效解码Reed-Muller码
Pub Date : 2017-04-01 DOI: 10.1109/TIT.2017.2671410
Ramprasad Saptharishi, Amir Shpilka, Ben lee Volk
Reed–Muller (RM) codes encode an $m$ -variate polynomial of degree at most $r$ by evaluating it on all points in ${0,1}^{m}$ . We denote this code by $RM(r,m)$ . The minimum distance of $RM(r,m)$ is $2^{m-r}$ and so it cannot correct more than half that number of errors in the worst case. For random errors one may hope for a better result. In this paper we give an efficient algorithm (in the block length $n=2^{m}$ ) for decoding random errors in RM codes far beyond the minimum distance. Specifically, for low-rate codes (of degree $r=o(sqrt {m})$ ), we can correct a random set of $(1/2-o(1))n$ errors with high probability. For high rate codes (of degree $m-r$ for $r=o(sqrt {m/log m})$ ), we can correct roughly $m^{r/2}$ errors. More generally, for any integer $r$ , our algorithm can correct any error pattern in $RM(m-(2r+2),m)$ , for which the same erasure pattern can be corrected in $RM(m-(r+1),m)$ . The results above are obtained by applying recent results of Abbe, Shpilka, and Wigderson (STOC, 2015) and Kudekar et al. (STOC, 2016) regarding the ability of RM codes to correct random erasures. The algorithm is based on solving a carefully defined set of linear equations and thus it is significantly different than other algorithms for decoding RM codes that are based on the recursive structure of the code. It can be seen as a more explicit proof of a result of Abbe et al. that shows a reduction from correcting erasures to correcting errors, and it also bares some similarities with the error-locating pair method of Pellikaan, Duursma, and Kotter that generalizes the Berlekamp–Welch algorithm for decoding Reed–Solomon codes.
Reed-Muller (RM)码通过对${0,1}^{m}$中的所有点求值来编码一个最多$r$次的$m$变量多项式。我们用$RM(r,m)$表示这个代码。$RM(r,m)$的最小距离是$2^{m-r}$,所以在最坏的情况下,它不能纠正超过一半的错误。对于随机误差,人们可能希望得到更好的结果。在本文中,我们给出了一个有效的算法(在块长度$n=2^{m}$中),用于解码远超过最小距离的RM码中的随机错误。具体来说,对于低率代码(程度为$r=o(sqrt {m})$),我们可以高概率地纠正一组随机的$(1/2-o(1))n$错误。对于高速率代码($r=o(sqrt {m/log m})$的程度为$m-r$),我们可以大致纠正$m^{r/2}$错误。更一般地说,对于任何整数$r$,我们的算法可以纠正$RM(m-(2r+2),m)$中的任何错误模式,而对于相同的擦除模式,可以纠正$RM(m-(r+1),m)$中的错误模式。上述结果是通过应用Abbe, Shpilka和Wigderson (STOC, 2015)和Kudekar等人(STOC, 2016)关于RM代码纠正随机擦除的能力的最新结果获得的。该算法基于求解一组精心定义的线性方程,因此它与其他基于代码递归结构的RM代码解码算法有很大不同。它可以看作是对Abbe等人的结果的更明确的证明,该结果显示了从纠正擦除到纠正错误的减少,并且它也与Pellikaan, Duursma和Kotter的错误定位对方法有一些相似之处,该方法推广了解码Reed-Solomon码的berlekam - welch算法。
{"title":"Efficiently Decoding Reed-Muller Codes From Random Errors","authors":"Ramprasad Saptharishi, Amir Shpilka, Ben lee Volk","doi":"10.1109/TIT.2017.2671410","DOIUrl":"https://doi.org/10.1109/TIT.2017.2671410","url":null,"abstract":"Reed–Muller (RM) codes encode an $m$ -variate polynomial of degree at most $r$ by evaluating it on all points in ${0,1}^{m}$ . We denote this code by $RM(r,m)$ . The minimum distance of $RM(r,m)$ is $2^{m-r}$ and so it cannot correct more than half that number of errors in the worst case. For random errors one may hope for a better result. In this paper we give an efficient algorithm (in the block length $n=2^{m}$ ) for decoding random errors in RM codes far beyond the minimum distance. Specifically, for low-rate codes (of degree $r=o(sqrt {m})$ ), we can correct a random set of $(1/2-o(1))n$ errors with high probability. For high rate codes (of degree $m-r$ for $r=o(sqrt {m/log m})$ ), we can correct roughly $m^{r/2}$ errors. More generally, for any integer $r$ , our algorithm can correct any error pattern in $RM(m-(2r+2),m)$ , for which the same erasure pattern can be corrected in $RM(m-(r+1),m)$ . The results above are obtained by applying recent results of Abbe, Shpilka, and Wigderson (STOC, 2015) and Kudekar et al. (STOC, 2016) regarding the ability of RM codes to correct random erasures. The algorithm is based on solving a carefully defined set of linear equations and thus it is significantly different than other algorithms for decoding RM codes that are based on the recursive structure of the code. It can be seen as a more explicit proof of a result of Abbe et al. that shows a reduction from correcting erasures to correcting errors, and it also bares some similarities with the error-locating pair method of Pellikaan, Duursma, and Kotter that generalizes the Berlekamp–Welch algorithm for decoding Reed–Solomon codes.","PeriodicalId":13250,"journal":{"name":"IEEE Trans. Inf. Theory","volume":"30 1","pages":"1954-1960"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78823493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Restricted q-Isometry Properties Adapted to Frames for Nonconvex lq-Analysis 适用于非凸lq分析框架的受限q等距性质
Pub Date : 2016-02-20 DOI: 10.1109/TIT.2016.2573312
Junhong Lin, Song Li
This paper discusses reconstruction of signals from few measurements in the situation that signals are sparse or approximately sparse in terms of a general frame via the $l_q$-analysis optimization with $0
本文通过$0
{"title":"Restricted q-Isometry Properties Adapted to Frames for Nonconvex lq-Analysis","authors":"Junhong Lin, Song Li","doi":"10.1109/TIT.2016.2573312","DOIUrl":"https://doi.org/10.1109/TIT.2016.2573312","url":null,"abstract":"This paper discusses reconstruction of signals from few measurements in the situation that signals are sparse or approximately sparse in terms of a general frame via the $l_q$-analysis optimization with $0<qleq 1$. We first introduce a notion of restricted $q$-isometry property ($q$-RIP) adapted to a dictionary, which is a natural extension of the standard $q$-RIP, and establish a generalized $q$-RIP condition for approximate reconstruction of signals via the $l_q$-analysis optimization. We then determine how many random, Gaussian measurements are needed for the condition to hold with high probability. The resulting sufficient condition is met by fewer measurements for smaller $q$ than when $q=1$. The introduced generalized $q$-RIP is also useful in compressed data separation. In compressed data separation, one considers the problem of reconstruction of signals' distinct subcomponents, which are (approximately) sparse in morphologically different dictionaries, from few measurements. With the notion of generalized $q$-RIP, we show that under an usual assumption that the dictionaries satisfy a mutual coherence condition, the $l_q$ split analysis with $0<qleq1 $ can approximately reconstruct the distinct components from fewer random Gaussian measurements with small $q$ than when $q=1$","PeriodicalId":13250,"journal":{"name":"IEEE Trans. Inf. Theory","volume":"56 1","pages":"4733-4747"},"PeriodicalIF":0.0,"publicationDate":"2016-02-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73899628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Distortion Rate Function of Sub-Nyquist Sampled Gaussian Sources 子奈奎斯特采样高斯源的失真率函数
Pub Date : 2016-01-01 DOI: 10.1109/TIT.2015.2485271
A. Kipnis, A. Goldsmith, Yonina C. Eldar, T. Weissman
The amount of information lost in sub-Nyquist sampling of a continuous-time Gaussian stationary process is quantified. We consider a combined source coding and sub-Nyquist reconstruction problem in which the input to the encoder is a noisy sub-Nyquist sampled version of the analog source. We first derive an expression for the mean squared error in the reconstruction of the process from a noisy and information rate-limited version of its samples. This expression is a function of the sampling frequency and the average number of bits describing each sample. It is given as the sum of two terms: minimum mean square error in estimating the source from its noisy but otherwise fully observed sub-Nyquist samples, and a second term obtained by reverse waterfilling over an average of spectral densities associated with the polyphase components of the source. We extend this result to multi-branch uniform sampling, where the samples are available through a set of parallel channels with a uniform sampler and a pre-sampling filter in each branch. Further optimization to reduce distortion is then performed over the pre-sampling filters, and an optimal set of pre-sampling filters associated with the statistics of the input signal and the sampling frequency is found. This results in an expression for the minimal possible distortion achievable under any analog-to-digital conversion scheme involving uniform sampling and linear filtering. These results thus unify the Shannon–Whittaker–Kotelnikov sampling theorem and Shannon rate-distortion theory for Gaussian sources.
对连续时间高斯平稳过程的亚奈奎斯特采样中丢失的信息量进行了量化。我们考虑了一个组合的源编码和亚奈奎斯特重构问题,其中编码器的输入是模拟源的一个带噪声的亚奈奎斯特采样版本。我们首先推导了从噪声和信息速率有限的样本中重建过程中均方误差的表达式。这个表达式是采样频率和描述每个采样的平均比特数的函数。它是两项的和:从有噪声但完全观察到的亚奈奎斯特样本估计源时的最小均方误差,以及通过与源的多相分量相关的光谱密度平均值的反向注水获得的第二项。我们将此结果扩展到多分支均匀采样,其中样本可以通过一组并行通道获得,每个分支中都有均匀采样器和预采样滤波器。然后对预采样滤波器进行进一步优化以减少失真,并找到一组与输入信号和采样频率统计相关的最佳预采样滤波器。这就得到了在任何涉及均匀采样和线性滤波的模数转换方案下可实现的最小可能失真的表达式。这些结果统一了高斯源的Shannon - whittaker - kotelnikov抽样定理和Shannon率失真理论。
{"title":"Distortion Rate Function of Sub-Nyquist Sampled Gaussian Sources","authors":"A. Kipnis, A. Goldsmith, Yonina C. Eldar, T. Weissman","doi":"10.1109/TIT.2015.2485271","DOIUrl":"https://doi.org/10.1109/TIT.2015.2485271","url":null,"abstract":"The amount of information lost in sub-Nyquist sampling of a continuous-time Gaussian stationary process is quantified. We consider a combined source coding and sub-Nyquist reconstruction problem in which the input to the encoder is a noisy sub-Nyquist sampled version of the analog source. We first derive an expression for the mean squared error in the reconstruction of the process from a noisy and information rate-limited version of its samples. This expression is a function of the sampling frequency and the average number of bits describing each sample. It is given as the sum of two terms: minimum mean square error in estimating the source from its noisy but otherwise fully observed sub-Nyquist samples, and a second term obtained by reverse waterfilling over an average of spectral densities associated with the polyphase components of the source. We extend this result to multi-branch uniform sampling, where the samples are available through a set of parallel channels with a uniform sampler and a pre-sampling filter in each branch. Further optimization to reduce distortion is then performed over the pre-sampling filters, and an optimal set of pre-sampling filters associated with the statistics of the input signal and the sampling frequency is found. This results in an expression for the minimal possible distortion achievable under any analog-to-digital conversion scheme involving uniform sampling and linear filtering. These results thus unify the Shannon–Whittaker–Kotelnikov sampling theorem and Shannon rate-distortion theory for Gaussian sources.","PeriodicalId":13250,"journal":{"name":"IEEE Trans. Inf. Theory","volume":"15 1","pages":"401-429"},"PeriodicalIF":0.0,"publicationDate":"2016-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75209497","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 55
ℓp-Regularized Least Squares (0 p正则化最小二乘(0
Pub Date : 2016-01-01 DOI: 10.1109/TIT.2015.2501362
Masahiro Yukawa, S. Amari
This paper elucidates the underlying structures of ℓp-regularized least squares problems in the nonconvex case of 0 <; p <; 1. The difference between two formulations is highlighted (which does not occur in the convex case of p = 1): 1) an ℓp-constrained optimization (Pcp) and 2) an ℓp-penalized (unconstrained) optimization (Lλp). It is shown that the solution path of (Lλp) is discontinuous and also a part of the solution path of (Pcp). As an alternative to the solution path, a critical path is considered, which is a maximal continuous curve consisting of critical points. Critical paths are piecewise smooth, as can be seen from the viewpoint of the variational method, and generally contain non-optimal points, such as saddle points and local maxima as well as global/local minima. Our study reveals multiplicity (non-monotonicity) in the correspondence between the regularization parameters of (Pcp) and (Lλp ). Two particular paths of critical points connecting the origin and an ordinary least squares (OLS) solution are studied further. One is a main path starting at an OLS solution, and the other is a greedy path starting at the origin. Part of the greedy path can be constructed with a generalized Minkowskian gradient. This paper of greedy path leads to a nontrivial close-link between the optimization problem of ℓp-regularized least squares and the greedy method of orthogonal matching pursuit.
本文讨论了$ well _{p}$ -正则化最小二乘问题在$0非凸情况下的基本结构。突出显示了两个公式之间的区别(这在$p=1$的凸情况下不会出现):1)$ well _{p}$约束优化($mathcal {p} _{c}^{p}$)和2)$ well _{p}$惩罚(无约束)优化$ (mathcal {L}_{lambda}^{p})$。证明了$ (mathcal {L}_{lambda}^{p})$的解路径是不连续的,也是$mathcal {p} _{c}^{p}$的解路径的一部分。作为解路径的备选,我们考虑了一条关键路径,它是由临界点组成的最大连续曲线。从变分方法的角度来看,关键路径是分段光滑的,通常包含非最优点,如鞍点和局部最大值以及全局/局部最小值。我们的研究揭示了$ (mathcal {P}_{c}^{P})$和$ (mathcal {L}_{lambda}^{P})$正则化参数之间对应关系的多重性(非单调性)。进一步研究了连接原点的两个临界点的特殊路径和一个普通最小二乘解。一条是从OLS解开始的主路径,另一条是从原点开始的贪心路径。部分贪心路径可以用广义闵可夫斯基梯度来构造。本文的贪心路径将正则化最小二乘优化问题与正交匹配寻优的贪心方法联系在了一起。
{"title":"ℓp-Regularized Least Squares (0","authors":"Masahiro Yukawa, S. Amari","doi":"10.1109/TIT.2015.2501362","DOIUrl":"https://doi.org/10.1109/TIT.2015.2501362","url":null,"abstract":"This paper elucidates the underlying structures of ℓ<sub>p</sub>-regularized least squares problems in the nonconvex case of 0 <; p <; 1. The difference between two formulations is highlighted (which does not occur in the convex case of p = 1): 1) an ℓ<sub>p</sub>-constrained optimization (P<sub>c</sub><sup>p</sup>) and 2) an ℓ<sub>p</sub>-penalized (unconstrained) optimization (L<sub>λ</sub><sup>p</sup>). It is shown that the solution path of (L<sub>λ</sub><sup>p</sup>) is discontinuous and also a part of the solution path of (P<sub>c</sub><sup>p</sup>). As an alternative to the solution path, a critical path is considered, which is a maximal continuous curve consisting of critical points. Critical paths are piecewise smooth, as can be seen from the viewpoint of the variational method, and generally contain non-optimal points, such as saddle points and local maxima as well as global/local minima. Our study reveals multiplicity (non-monotonicity) in the correspondence between the regularization parameters of (P<sub>c</sub><sup>p</sup>) and (L<sub>λ</sub><sup>p</sup> ). Two particular paths of critical points connecting the origin and an ordinary least squares (OLS) solution are studied further. One is a main path starting at an OLS solution, and the other is a greedy path starting at the origin. Part of the greedy path can be constructed with a generalized Minkowskian gradient. This paper of greedy path leads to a nontrivial close-link between the optimization problem of ℓ<sub>p</sub>-regularized least squares and the greedy method of orthogonal matching pursuit.","PeriodicalId":13250,"journal":{"name":"IEEE Trans. Inf. Theory","volume":"186 1","pages":"488-502"},"PeriodicalIF":0.0,"publicationDate":"2016-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88441933","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Secure Degrees of Freedom for the MIMO Wire-Tap Channel With a Multi-Antenna Cooperative Jammer 带多天线协同干扰器的MIMO线接信道的安全自由度
Pub Date : 2015-12-22 DOI: 10.1109/TIT.2017.2738011
Mohamed S. Nafea, A. Yener
In this paper, a multiple antenna wire-tap channel in the presence of a multi-antenna cooperative jammer is studied. In particular, the secure degrees of freedom (s.d.o.f.) of this channel is established, with $N_t$ antennas at the transmitter, $N_r$ antennas at the legitimate receiver, and $N_e$ antennas at the eavesdropper, for all possible values of the number of antennas, $N_c$, at the cooperative jammer. In establishing the result, several different ranges of $N_c$ need to be considered separately. The lower and upper bounds for these ranges of $N_c$ are derived, and are shown to be tight. The achievability techniques developed rely on a variety of signaling, beamforming, and alignment techniques which vary according to the (relative) number of antennas at each terminal and whether the s.d.o.f. is integer valued. Specifically, it is shown that, whenever the s.d.o.f. is integer valued, Gaussian signaling for both transmission and cooperative jamming, linear precoding at the transmitter and the cooperative jammer, and linear processing at the legitimate receiver, are sufficient for achieving the s.d.o.f. of the channel. By contrast, when the s.d.o.f. is not an integer, the achievable schemes need to rely on structured signaling at the transmitter and the cooperative jammer, and joint signal space and signal scale alignment. The converse is established by combining an upper bound which allows for full cooperation between the transmitter and the cooperative jammer, with another upper bound which exploits the secrecy and reliability constraints.
本文研究了多天线协同干扰存在下的多天线线接信道。特别地,建立了该信道的安全自由度(s.d.o.f),其中发射机处有$N_t$天线,合法接收机处有$N_r$天线,窃听者处有$N_e$天线,对于所有可能的天线数$N_c$,合作干扰机处有$N_c$。在建立结果时,需要分别考虑几个不同的$N_c$范围。我们推导了这些$N_c$范围的下界和上界,并证明了它们是紧密的。所开发的可实现性技术依赖于各种信号、波束形成和校准技术,这些技术根据每个终端天线的(相对)数量以及s.d.o.f.是否为整数值而变化。具体地说,当s.d.o.f.为整数值时,用于发射和协同干扰的高斯信令、在发射机和协同干扰机处的线性预编码以及在合法接收机处的线性处理都足以实现信道的s.d.o.f.。相反,当s.d.o.f.不是整数时,可实现的方案需要依赖于发射机和协同干扰机的结构化信令,以及联合信号空间和信号尺度对准。通过结合允许发射机和协作干扰机之间充分合作的上界和利用保密性和可靠性约束的另一个上界来建立反向。
{"title":"Secure Degrees of Freedom for the MIMO Wire-Tap Channel With a Multi-Antenna Cooperative Jammer","authors":"Mohamed S. Nafea, A. Yener","doi":"10.1109/TIT.2017.2738011","DOIUrl":"https://doi.org/10.1109/TIT.2017.2738011","url":null,"abstract":"In this paper, a multiple antenna wire-tap channel in the presence of a multi-antenna cooperative jammer is studied. In particular, the secure degrees of freedom (s.d.o.f.) of this channel is established, with $N_t$ antennas at the transmitter, $N_r$ antennas at the legitimate receiver, and $N_e$ antennas at the eavesdropper, for all possible values of the number of antennas, $N_c$, at the cooperative jammer. In establishing the result, several different ranges of $N_c$ need to be considered separately. The lower and upper bounds for these ranges of $N_c$ are derived, and are shown to be tight. The achievability techniques developed rely on a variety of signaling, beamforming, and alignment techniques which vary according to the (relative) number of antennas at each terminal and whether the s.d.o.f. is integer valued. Specifically, it is shown that, whenever the s.d.o.f. is integer valued, Gaussian signaling for both transmission and cooperative jamming, linear precoding at the transmitter and the cooperative jammer, and linear processing at the legitimate receiver, are sufficient for achieving the s.d.o.f. of the channel. By contrast, when the s.d.o.f. is not an integer, the achievable schemes need to rely on structured signaling at the transmitter and the cooperative jammer, and joint signal space and signal scale alignment. The converse is established by combining an upper bound which allows for full cooperation between the transmitter and the cooperative jammer, with another upper bound which exploits the secrecy and reliability constraints.","PeriodicalId":13250,"journal":{"name":"IEEE Trans. Inf. Theory","volume":"10 1","pages":"7420-7441"},"PeriodicalIF":0.0,"publicationDate":"2015-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90191032","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Wireless Multihop Device-to-Device Caching Networks 无线多跳设备到设备缓存网络
Pub Date : 2015-11-09 DOI: 10.1109/ICC.2015.7249398
Sang-Woon Jeon, Songnam Hong, Mingyue Ji, G. Caire, A. Molisch
We consider a wireless device-to-device network, where $n$ nodes are uniformly distributed at random over the network area. We let each node caches $M$ files from a library of size $mgeq M$ . Each node in the network requests a file from the library independently at random, according to a popularity distribution, and is served by other nodes having the requested file in their local cache via (possibly) multihop transmissions. Under the classical “protocol model” of wireless networks, we characterize the optimal per-node capacity scaling law for a broad class of heavy-tailed popularity distributions, including Zipf distributions with exponent less than one. In the parameter regime of interest, i.e., $m=o(nM)$ , we show that a decentralized random caching strategy with uniform probability over the library yields the optimal per-node capacity scaling of $Theta (sqrt {M/m})$ for heavy-tailed popularity distributions. This scaling is constant with $n$ , thus yielding throughput scalability with the network size. Furthermore, the multihop capacity scaling can be significantly better than for the case of single-hop caching networks, for which the per-node capacity is $Theta (M/m)$ . The multihop capacity scaling law can be further improved for a Zipf distribution with exponent larger than some threshold > 1, by using a decentralized random caching uniformly across a subset of most popular files in the library. Namely, ignoring a subset of less popular files (i.e., effectively reducing the size of the library) can significantly improve the throughput scaling while guaranteeing that all nodes will be served with high probability as $n$ increases.
我们考虑一个无线设备到设备网络,其中$n$节点在网络区域上均匀随机分布。我们让每个节点从大小为$mgeq M$的库中缓存$M$文件。网络中的每个节点根据流行度分布独立随机地从库中请求文件,并由其他节点通过(可能的)多跳传输在其本地缓存中提供请求文件。在无线网络的经典“协议模型”下,我们描述了一大类重尾流行分布(包括指数小于1的Zipf分布)的最优每节点容量缩放律。在感兴趣的参数范围内,即$m=o(nM)$,我们展示了在库上具有均匀概率的分散随机缓存策略,对于重尾流行分布,可以产生$Theta (sqrt {M/m})$的最佳每节点容量扩展。这种扩展对于$n$是恒定的,因此可以根据网络大小产生吞吐量可伸缩性。此外,多跳容量扩展明显优于单跳缓存网络,单跳缓存网络的每个节点容量为$Theta (M/m)$。对于指数大于某个阈值> 1的Zipf分布,可以通过在库中最受欢迎的文件子集上统一使用分散的随机缓存来进一步改进多跳容量缩放律。也就是说,忽略一个不太流行的文件子集(即,有效地减少库的大小)可以显著提高吞吐量扩展,同时保证随着$n$的增加,所有节点都将以高概率得到服务。
{"title":"Wireless Multihop Device-to-Device Caching Networks","authors":"Sang-Woon Jeon, Songnam Hong, Mingyue Ji, G. Caire, A. Molisch","doi":"10.1109/ICC.2015.7249398","DOIUrl":"https://doi.org/10.1109/ICC.2015.7249398","url":null,"abstract":"We consider a wireless device-to-device network, where $n$ nodes are uniformly distributed at random over the network area. We let each node caches $M$ files from a library of size $mgeq M$ . Each node in the network requests a file from the library independently at random, according to a popularity distribution, and is served by other nodes having the requested file in their local cache via (possibly) multihop transmissions. Under the classical “protocol model” of wireless networks, we characterize the optimal per-node capacity scaling law for a broad class of heavy-tailed popularity distributions, including Zipf distributions with exponent less than one. In the parameter regime of interest, i.e., $m=o(nM)$ , we show that a decentralized random caching strategy with uniform probability over the library yields the optimal per-node capacity scaling of $Theta (sqrt {M/m})$ for heavy-tailed popularity distributions. This scaling is constant with $n$ , thus yielding throughput scalability with the network size. Furthermore, the multihop capacity scaling can be significantly better than for the case of single-hop caching networks, for which the per-node capacity is $Theta (M/m)$ . The multihop capacity scaling law can be further improved for a Zipf distribution with exponent larger than some threshold > 1, by using a decentralized random caching uniformly across a subset of most popular files in the library. Namely, ignoring a subset of less popular files (i.e., effectively reducing the size of the library) can significantly improve the throughput scaling while guaranteeing that all nodes will be served with high probability as $n$ increases.","PeriodicalId":13250,"journal":{"name":"IEEE Trans. Inf. Theory","volume":"14 1","pages":"1662-1676"},"PeriodicalIF":0.0,"publicationDate":"2015-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78323176","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 41
Delay Optimal Buffered Decode-and-Forward for Two-Hop Networks With Random Link Connectivity 具有随机链路连接的两跳网络的延迟最优缓冲译码转发
Pub Date : 2015-01-01 DOI: 10.1109/TIT.2014.2372014
Ying Cui, V. Lau, E. Yeh
Delay optimal control of multi-hop networks remains a challenging problem even in the simplest scenarios. In this paper, we consider delay optimal control of a two-hop half-duplex network with independent identically distributed ON-OFF fading. Both the source node and the relay node are equipped with infinite buffers and have exogenous bit arrivals. We focus on delay optimal link selection to minimize the average sum queue length over a finite horizon subject to a half-duplex constraint. To solve the problem, we introduce a new approach, whereby an actual discrete time system (ADTS) is approximated using a virtual continuous time system (VCTS). We obtain an asymptotically delay optimal policy in the VCTS. Using the relationship between the VCTS and the ADTS, we obtain an asymptotically delay optimal policy in the ADTS. The obtained policy has both a priority feature and a safety stock feature. It offers good design insights for wireless relay networks. In addition, the obtained policy has a closed-form expression, does not require knowledge of arrival statistics, and can be implemented online. Finally, using renewal theory and the theory of random walks, we analyze the average delay resulting from the asymptotically delay optimal policy.
即使在最简单的情况下,多跳网络的延迟最优控制仍然是一个具有挑战性的问题。研究了具有独立同分布ON-OFF衰落的两跳半双工网络的时延最优控制问题。源节点和中继节点都配备了无限缓冲区,并且有外生位到达。在半双工约束下,我们关注延迟最优链路选择以最小化有限水平上的平均和队列长度。为了解决这个问题,我们引入了一种新的方法,即使用虚拟连续时间系统(VCTS)逼近实际离散时间系统(ADTS)。我们在VCTS中得到了一个渐近延迟最优策略。利用VCTS和ADTS之间的关系,我们得到了ADTS中的渐近延迟最优策略。获得的策略既具有优先级特征,又具有安全库存特征。它为无线中继网络提供了很好的设计见解。此外,获得的策略具有封闭式表达式,不需要了解到达统计信息,可以在线实现。最后,利用更新理论和随机漫步理论,分析了渐近延迟最优策略所产生的平均延迟。
{"title":"Delay Optimal Buffered Decode-and-Forward for Two-Hop Networks With Random Link Connectivity","authors":"Ying Cui, V. Lau, E. Yeh","doi":"10.1109/TIT.2014.2372014","DOIUrl":"https://doi.org/10.1109/TIT.2014.2372014","url":null,"abstract":"Delay optimal control of multi-hop networks remains a challenging problem even in the simplest scenarios. In this paper, we consider delay optimal control of a two-hop half-duplex network with independent identically distributed ON-OFF fading. Both the source node and the relay node are equipped with infinite buffers and have exogenous bit arrivals. We focus on delay optimal link selection to minimize the average sum queue length over a finite horizon subject to a half-duplex constraint. To solve the problem, we introduce a new approach, whereby an actual discrete time system (ADTS) is approximated using a virtual continuous time system (VCTS). We obtain an asymptotically delay optimal policy in the VCTS. Using the relationship between the VCTS and the ADTS, we obtain an asymptotically delay optimal policy in the ADTS. The obtained policy has both a priority feature and a safety stock feature. It offers good design insights for wireless relay networks. In addition, the obtained policy has a closed-form expression, does not require knowledge of arrival statistics, and can be implemented online. Finally, using renewal theory and the theory of random walks, we analyze the average delay resulting from the asymptotically delay optimal policy.","PeriodicalId":13250,"journal":{"name":"IEEE Trans. Inf. Theory","volume":"1 1","pages":"404-425"},"PeriodicalIF":0.0,"publicationDate":"2015-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75744844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Performance Guarantees for Adaptive Estimation of Sparse Signals 稀疏信号自适应估计的性能保证
Pub Date : 2013-11-25 DOI: 10.1109/TIT.2015.2403302
Dennis L. Wei, A. Hero
This paper studies adaptive sensing for estimating the nonzero amplitudes of a sparse signal with the aim of providing analytical guarantees on the performance gain due to adaptive resource allocation. We consider a previously proposed optimal two-stage policy for allocating sensing resources. For positive powers $q$ , we derive tight upper bounds on the mean $q$ th-power error resulting from the optimal two-stage policy and corresponding lower bounds on the improvement over nonadaptive uniform sensing. It is shown that the adaptation gain is related to the detectability of nonzero signal components as characterized by Chernoff coefficients, thus quantifying analytically the dependence on the sparsity level of the signal, the signal-to-noise ratio (SNR), and the sensing resource budget. For fixed sparsity levels and increasing SNR or sensing budget, we obtain the rate of convergence to oracle performance and the rate at which the fraction of resources spent on the first exploratory stage decreases to zero. For a vanishing fraction of nonzero components, the gain increases without bound as a function of SNR and sensing budget. Numerical simulations demonstrate that the bounds on adaptation gain are quite tight in nonasymptotic regimes as well.
本文研究了稀疏信号非零幅值估计的自适应感知,旨在为自适应资源分配带来的性能增益提供分析保证。我们考虑先前提出的最优两阶段策略来分配传感资源。对于正幂$q$,我们导出了由最优两阶段策略引起的平均$q$ th次方误差的紧上界和相应的改进非自适应均匀感知的下界。研究表明,自适应增益与Chernoff系数表征的非零信号分量的可检测性有关,从而定量分析了对信号稀疏度、信噪比和感知资源预算的依赖。对于固定的稀疏度水平和增加的信噪比或感知预算,我们获得了oracle性能的收敛率和在第一个探索阶段花费的资源比例减少到零的速率。对于非零分量的消失部分,增益作为信噪比和传感预算的函数无边界地增加。数值模拟表明,在非渐近状态下,自适应增益的边界也很紧。
{"title":"Performance Guarantees for Adaptive Estimation of Sparse Signals","authors":"Dennis L. Wei, A. Hero","doi":"10.1109/TIT.2015.2403302","DOIUrl":"https://doi.org/10.1109/TIT.2015.2403302","url":null,"abstract":"This paper studies adaptive sensing for estimating the nonzero amplitudes of a sparse signal with the aim of providing analytical guarantees on the performance gain due to adaptive resource allocation. We consider a previously proposed optimal two-stage policy for allocating sensing resources. For positive powers $q$ , we derive tight upper bounds on the mean $q$ th-power error resulting from the optimal two-stage policy and corresponding lower bounds on the improvement over nonadaptive uniform sensing. It is shown that the adaptation gain is related to the detectability of nonzero signal components as characterized by Chernoff coefficients, thus quantifying analytically the dependence on the sparsity level of the signal, the signal-to-noise ratio (SNR), and the sensing resource budget. For fixed sparsity levels and increasing SNR or sensing budget, we obtain the rate of convergence to oracle performance and the rate at which the fraction of resources spent on the first exploratory stage decreases to zero. For a vanishing fraction of nonzero components, the gain increases without bound as a function of SNR and sensing budget. Numerical simulations demonstrate that the bounds on adaptation gain are quite tight in nonasymptotic regimes as well.","PeriodicalId":13250,"journal":{"name":"IEEE Trans. Inf. Theory","volume":"270 1","pages":"2043-2059"},"PeriodicalIF":0.0,"publicationDate":"2013-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72924956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Polar Codes for $q$-Ary Channels, $q=2^{r}$ $q$-任意信道的极性码,$q=2^{r}$
Pub Date : 2013-02-01 DOI: 10.1109/TIT.2012.2219035
Woomyoung Park, A. Barg
We study polarization for nonbinary channels with input alphabet of size q=2r, r=2,3,.... Using Arikan's polarizing kernel H2, we prove that the virtual channels that arise in the process of channel evolution converge to q-ary channels with capacity 0,1,2,..., r bits. As a result of this analysis, we show that polar codes support reliable transmission over discrete memoryless channels with q-ary input for all rates below the symmetric capacity of the channel. This leads to an explicit transmission scheme for q-ary channels. The block error probability of decoding using successive cancellation behaves as exp(-Nα), where N is the code length and α is any constant less than 0.5.
我们研究了输入字母大小为q=2r, r=2,3,....的非二元信道的极化问题利用Arikan的极化核H2,证明了在信道演化过程中产生的虚拟信道收敛于容量为0、1、2、…的q元信道。, r位。作为这个分析的结果,我们表明极性码支持可靠的传输在离散无存储器信道与q-ary输入所有速率低于信道的对称容量。这导致了q元信道的显式传输方案。使用连续取消解码的块错误概率表现为exp(-Nα),其中N是码长,α是小于0.5的任何常数。
{"title":"Polar Codes for $q$-Ary Channels, $q=2^{r}$","authors":"Woomyoung Park, A. Barg","doi":"10.1109/TIT.2012.2219035","DOIUrl":"https://doi.org/10.1109/TIT.2012.2219035","url":null,"abstract":"We study polarization for nonbinary channels with input alphabet of size q=2r, r=2,3,.... Using Arikan's polarizing kernel H2, we prove that the virtual channels that arise in the process of channel evolution converge to q-ary channels with capacity 0,1,2,..., r bits. As a result of this analysis, we show that polar codes support reliable transmission over discrete memoryless channels with q-ary input for all rates below the symmetric capacity of the channel. This leads to an explicit transmission scheme for q-ary channels. The block error probability of decoding using successive cancellation behaves as exp(-Nα), where N is the code length and α is any constant less than 0.5.","PeriodicalId":13250,"journal":{"name":"IEEE Trans. Inf. Theory","volume":"16 1","pages":"955-969"},"PeriodicalIF":0.0,"publicationDate":"2013-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73698643","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
期刊
IEEE Trans. Inf. Theory
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1