首页 > 最新文献

IEEE Transactions on Information Theory最新文献

英文 中文
Rényi–Sobolev Inequalities and Connections to Spectral Graph Theory 雷尼-索博列夫不等式及其与谱图论的联系
IF 2.2 3区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-29 DOI: 10.1109/TIT.2024.3435414
Lei Yu;Hao Wu
In this paper, we generalize the log-Sobolev inequalities to Rényi–Sobolev inequalities by replacing the entropy with the two-parameter entropy, which is a generalized version of entropy and closely related to Rényi divergences. We derive the sharp nonlinear dimension-free version of this kind of inequalities. Interestingly, the resultant inequalities show a transition phenomenon depending on the parameters. We then connect Rényi–Sobolev inequalities to contractive and data-processing inequalities, concentration inequalities, and spectral graph theory. Our proofs in this paper are based on the information-theoretic characterization of the Rényi–Sobolev inequalities, as well as the method of types.
在本文中,我们将 log-Sobolev 不等式推广为 Rényi-Sobolev 不等式,用双参数熵代替熵,双参数熵是熵的广义版本,与 Rényi 分歧密切相关。我们推导出了这类不等式的尖锐非线性无维版本。有趣的是,由此得出的不等式显示出一种取决于参数的过渡现象。然后,我们将 Rényi-Sobolev 不等式与收缩不等式、数据处理不等式、集中不等式和谱图理论联系起来。本文的证明基于 Rényi-Sobolev 不等式的信息论特征以及类型法。
{"title":"Rényi–Sobolev Inequalities and Connections to Spectral Graph Theory","authors":"Lei Yu;Hao Wu","doi":"10.1109/TIT.2024.3435414","DOIUrl":"10.1109/TIT.2024.3435414","url":null,"abstract":"In this paper, we generalize the log-Sobolev inequalities to Rényi–Sobolev inequalities by replacing the entropy with the two-parameter entropy, which is a generalized version of entropy and closely related to Rényi divergences. We derive the sharp nonlinear dimension-free version of this kind of inequalities. Interestingly, the resultant inequalities show a transition phenomenon depending on the parameters. We then connect Rényi–Sobolev inequalities to contractive and data-processing inequalities, concentration inequalities, and spectral graph theory. Our proofs in this paper are based on the information-theoretic characterization of the Rényi–Sobolev inequalities, as well as the method of types.","PeriodicalId":13494,"journal":{"name":"IEEE Transactions on Information Theory","volume":"70 10","pages":"6809-6822"},"PeriodicalIF":2.2,"publicationDate":"2024-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141864888","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Semidefinite Programming Bounds on the Size of Entanglement-Assisted Codeword Stabilized Quantum Codes 纠缠辅助码元稳定量子编码大小的半无限编程边界
IF 2.2 3区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-25 DOI: 10.1109/TIT.2024.3433550
Ching-Yi Lai;Pin-Chieh Tseng;Wei-Hsuan Yu
In this paper, we explore the application of semidefinite programming to the realm of quantum codes, specifically focusing on codeword stabilized (CWS) codes with entanglement assistance. Notably, we utilize the isotropic subgroup of the CWS group and the set of word operators of a CWS-type quantum code to derive an upper bound on the minimum distance. Furthermore, this characterization can be incorporated into the associated distance enumerators, enabling us to construct semidefinite constraints that lead to SDP bounds on the minimum distance or size of CWS-type quantum codes. We illustrate several instances where SDP bounds outperform LP bounds, and there are even cases where LP fails to yield meaningful results, while SDP consistently provides tighter and relevant bounds. Finally, we also provide interpretations of the Shor-Laflamme weight enumerators and shadow enumerators for codeword stabilized codes, enhancing our understanding of quantum codes.
在本文中,我们探索了半定量编程在量子密码领域的应用,特别是侧重于具有纠缠辅助功能的码字稳定(CWS)密码。值得注意的是,我们利用 CWS 群的各向同性子群和 CWS 型量子密码的字算子集推导出了最小距离的上界。此外,我们还可以将这一特征纳入相关的距离枚举器中,从而构建出半有限约束,进而得出 CWS 型量子密码最小距离或大小的 SDP 约束。我们举例说明了 SDP 约束优于 LP 约束的几个实例,甚至在一些情况下,LP 无法得出有意义的结果,而 SDP 却能持续提供更严密的相关约束。最后,我们还解释了码字稳定编码的肖-拉夫拉姆权值枚举器和影子枚举器,加深了我们对量子编码的理解。
{"title":"Semidefinite Programming Bounds on the Size of Entanglement-Assisted Codeword Stabilized Quantum Codes","authors":"Ching-Yi Lai;Pin-Chieh Tseng;Wei-Hsuan Yu","doi":"10.1109/TIT.2024.3433550","DOIUrl":"10.1109/TIT.2024.3433550","url":null,"abstract":"In this paper, we explore the application of semidefinite programming to the realm of quantum codes, specifically focusing on codeword stabilized (CWS) codes with entanglement assistance. Notably, we utilize the isotropic subgroup of the CWS group and the set of word operators of a CWS-type quantum code to derive an upper bound on the minimum distance. Furthermore, this characterization can be incorporated into the associated distance enumerators, enabling us to construct semidefinite constraints that lead to SDP bounds on the minimum distance or size of CWS-type quantum codes. We illustrate several instances where SDP bounds outperform LP bounds, and there are even cases where LP fails to yield meaningful results, while SDP consistently provides tighter and relevant bounds. Finally, we also provide interpretations of the Shor-Laflamme weight enumerators and shadow enumerators for codeword stabilized codes, enhancing our understanding of quantum codes.","PeriodicalId":13494,"journal":{"name":"IEEE Transactions on Information Theory","volume":"70 11","pages":"7867-7881"},"PeriodicalIF":2.2,"publicationDate":"2024-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141785762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Typical Conservative Homeomorphisms Have Total Metric Mean Dimension 典型的保守同构具有总度量平均维度
IF 2.2 3区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-23 DOI: 10.1109/TIT.2024.3432658
Gabriel Lacerda;Sergio Romaña
Given a compact smooth boundaryless manifold with dimension greater than one endowed with a locally positive non-atomic measure $mu $ , we prove that typical $mu $ -preserving homeomorphisms have upper metric mean dimension, with respect to the Riemannian distance, equal to the dimension of the manifold. Moreover, we prove that $mu $ is a measure of maximal metric mean dimension, with respect to the variational principle established by Velozo and Velozo.
给定一个维度大于1的紧凑光滑无边界流形,赋予它局部正非原子度量$mu $ ,我们证明典型的$mu $ 保留同构具有上度量均维,关于黎曼距离,等于流形的维度。此外,我们证明 $mu $ 是最大度量均维的度量,这与 Velozo 和 Velozo 建立的变分原理有关。
{"title":"Typical Conservative Homeomorphisms Have Total Metric Mean Dimension","authors":"Gabriel Lacerda;Sergio Romaña","doi":"10.1109/TIT.2024.3432658","DOIUrl":"10.1109/TIT.2024.3432658","url":null,"abstract":"Given a compact smooth boundaryless manifold with dimension greater than one endowed with a locally positive non-atomic measure \u0000<inline-formula> <tex-math>$mu $ </tex-math></inline-formula>\u0000, we prove that typical \u0000<inline-formula> <tex-math>$mu $ </tex-math></inline-formula>\u0000-preserving homeomorphisms have upper metric mean dimension, with respect to the Riemannian distance, equal to the dimension of the manifold. Moreover, we prove that \u0000<inline-formula> <tex-math>$mu $ </tex-math></inline-formula>\u0000 is a measure of maximal metric mean dimension, with respect to the variational principle established by Velozo and Velozo.","PeriodicalId":13494,"journal":{"name":"IEEE Transactions on Information Theory","volume":"70 11","pages":"7664-7672"},"PeriodicalIF":2.2,"publicationDate":"2024-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141780041","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Communication Over Discrete Channels Subject to State Obfuscation 受状态混淆影响的离散信道通信
IF 2.5 3区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-23 DOI: 10.1109/tit.2024.3432573
Ligong Wang, Gregory W. Wornell
{"title":"Communication Over Discrete Channels Subject to State Obfuscation","authors":"Ligong Wang, Gregory W. Wornell","doi":"10.1109/tit.2024.3432573","DOIUrl":"https://doi.org/10.1109/tit.2024.3432573","url":null,"abstract":"","PeriodicalId":13494,"journal":{"name":"IEEE Transactions on Information Theory","volume":"245 1","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141780040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MSR Codes With Linear Field Size and Smallest Sub-Packetization for Any Number of Helper Nodes 任意数量辅助节点的线性字段大小和最小子包化 MSR 编码
IF 2.2 3区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-23 DOI: 10.1109/TIT.2024.3432822
Guodong Li;Ningning Wang;Sihuang Hu;Min Ye
An <inline-formula> <tex-math>$(n, k, ell)$ </tex-math></inline-formula> array code has k information coordinates and <inline-formula> <tex-math>$r = n - k$ </tex-math></inline-formula> parity coordinates, where each coordinate is a vector in <inline-formula> <tex-math>$mathbb {F}_{q}^{ell }$ </tex-math></inline-formula> for some finite field <inline-formula> <tex-math>$mathbb {F}_{q}$ </tex-math></inline-formula>. An <inline-formula> <tex-math>$(n, k, ell)$ </tex-math></inline-formula> MDS array code has the additional property that any k out of n coordinates suffice to recover the whole codeword. Dimakis et al. considered the problem of repairing the erasure of a single coordinate and proved a lower bound on the amount of data transmission that is needed for the repair. A minimum storage regenerating (MSR) code with repair degree d is an MDS array code that achieves this lower bound for the repair of any single erased coordinate from any d out of <inline-formula> <tex-math>$n-1$ </tex-math></inline-formula> remaining coordinates. An MSR code has the optimal access property if the amount of accessed data is the same as the amount of transmitted data in the repair procedure. The sub-packetization <inline-formula> <tex-math>$ell $ </tex-math></inline-formula> and the field size q are of paramount importance in MSR code constructions. For optimal-access MSR codes, Balaji et al. proved that <inline-formula> <tex-math>$ell geq s^{left lceil {{ n/s }}right rceil }$ </tex-math></inline-formula>, where <inline-formula> <tex-math>$s = d-k+1$ </tex-math></inline-formula>. Rawat et al. showed that this lower bound is attainable for all admissible values of d when the field size is exponential in n. After that, tremendous efforts have been devoted to reducing the field size. However, so far, reduction to a linear field size is only available for <inline-formula> <tex-math>$din {k+1,k+2,k+3}$ </tex-math></inline-formula> and <inline-formula> <tex-math>$d=n-1$ </tex-math></inline-formula>. In this paper, we construct the first class of explicit optimal-access MSR codes with the smallest sub-packetization <inline-formula> <tex-math>$ell = s^{left lceil {{ n/s }}right rceil }$ </tex-math></inline-formula> for all d between <inline-formula> <tex-math>$k+1$ </tex-math></inline-formula> and <inline-formula> <tex-math>$n-1$ </tex-math></inline-formula>, resolving an open problem in the survey (Ramkumar et al., Foundations and Trends in Communications and Information Theory: Vol. 19: No. 4). We further propose another class of explicit MSR code constructions (not optimal-access) with an even smaller sub-packetization <inline-formula> <tex-math>$s^{left lceil {{ n/(s+1)}}right rceil }$ </tex-math></inline-formula> for all admissible values of d, making significant progress on another open problem in the survey. Previously, MSR codes with <inline-formula> <tex-math>$ell =s^{left lceil {{ n/(s+1)}}right rceil }$ </tex-math></inline-formul
一个 $(n, k, ell)$ 数组码有 k 个信息坐标和 $r = n - k$ 奇偶校验坐标,其中每个坐标都是某个有限域 $mathbb {F}_{q}^{ell }$ 中的一个向量。一个 $(n, k, ell)$ MDS 阵列码还有一个特性,即 n 个坐标中的任何 k 个坐标都足以恢复整个码字。Dimakis 等人考虑了修复单个坐标擦除的问题,并证明了修复所需的数据传输量的下限。修复度为 d 的最小存储再生(MSR)码是一种 MDS 阵列码,它能从 $n-1$ 剩余坐标中的任意 d 个坐标中修复任何一个被擦除的坐标,从而达到这一下限。如果在修复过程中访问的数据量与传输的数据量相同,则 MSR 代码具有最优访问属性。子包化 $ell $ 和字段大小 q 在 MSR 代码构造中至关重要。对于最优访问 MSR 码,Balaji 等人证明了 $ell geq s^{left lceil {{ n/s }}right rceil }$ ,其中 $s = d-k+1$ 。拉瓦特等人的研究表明,当场的大小是 n 的指数值时,这个下界对于所有可接受的 d 值都是可以达到的。然而,到目前为止,只有在 $din {k+1,k+2,k+3}$ 和 $d=n-1$ 的情况下,才能减小到线性字段大小。 在本文中,我们构建了第一类显式优化访问 MSR 编码,其最小子包化为 $ell = s^{left lceil {{ n/s }}right rceil }$ ,适用于 $k+1$ 和 $n-1$ 之间的所有 d,解决了研究中的一个未决问题(Ramkumar et al、通信与信息论的基础与趋势》,第 19 卷:第 4 期):第 19 卷:第 4 期)。我们进一步提出了另一类显式 MSR 编码构造(非最优接入),其子包化 $s^{left lceil {{ n/(s+1)}}right rceil }$ 适用于所有可允许的 d 值,在研究中的另一个开放问题上取得了重大进展。在此之前,只知道 $d=k+1$ 和 $d=n-1$ 的 MSR 代码具有 $ell =s^{left lceil {{ n/(s+1)}}right rceil }$ 和 $q=O(n)$ 的特性。在我们的构造中,实现线性场大小的关键在于将$binom {n}{r}$ 非消失行列式的全局约束减少到$O_{s}(n)$局部约束,这是通过精心设计奇偶校验矩阵实现的。
{"title":"MSR Codes With Linear Field Size and Smallest Sub-Packetization for Any Number of Helper Nodes","authors":"Guodong Li;Ningning Wang;Sihuang Hu;Min Ye","doi":"10.1109/TIT.2024.3432822","DOIUrl":"10.1109/TIT.2024.3432822","url":null,"abstract":"An \u0000&lt;inline-formula&gt; &lt;tex-math&gt;$(n, k, ell)$ &lt;/tex-math&gt;&lt;/inline-formula&gt;\u0000 array code has k information coordinates and \u0000&lt;inline-formula&gt; &lt;tex-math&gt;$r = n - k$ &lt;/tex-math&gt;&lt;/inline-formula&gt;\u0000 parity coordinates, where each coordinate is a vector in \u0000&lt;inline-formula&gt; &lt;tex-math&gt;$mathbb {F}_{q}^{ell }$ &lt;/tex-math&gt;&lt;/inline-formula&gt;\u0000 for some finite field \u0000&lt;inline-formula&gt; &lt;tex-math&gt;$mathbb {F}_{q}$ &lt;/tex-math&gt;&lt;/inline-formula&gt;\u0000. An \u0000&lt;inline-formula&gt; &lt;tex-math&gt;$(n, k, ell)$ &lt;/tex-math&gt;&lt;/inline-formula&gt;\u0000 MDS array code has the additional property that any k out of n coordinates suffice to recover the whole codeword. Dimakis et al. considered the problem of repairing the erasure of a single coordinate and proved a lower bound on the amount of data transmission that is needed for the repair. A minimum storage regenerating (MSR) code with repair degree d is an MDS array code that achieves this lower bound for the repair of any single erased coordinate from any d out of \u0000&lt;inline-formula&gt; &lt;tex-math&gt;$n-1$ &lt;/tex-math&gt;&lt;/inline-formula&gt;\u0000 remaining coordinates. An MSR code has the optimal access property if the amount of accessed data is the same as the amount of transmitted data in the repair procedure. The sub-packetization \u0000&lt;inline-formula&gt; &lt;tex-math&gt;$ell $ &lt;/tex-math&gt;&lt;/inline-formula&gt;\u0000 and the field size q are of paramount importance in MSR code constructions. For optimal-access MSR codes, Balaji et al. proved that \u0000&lt;inline-formula&gt; &lt;tex-math&gt;$ell geq s^{left lceil {{ n/s }}right rceil }$ &lt;/tex-math&gt;&lt;/inline-formula&gt;\u0000, where \u0000&lt;inline-formula&gt; &lt;tex-math&gt;$s = d-k+1$ &lt;/tex-math&gt;&lt;/inline-formula&gt;\u0000. Rawat et al. showed that this lower bound is attainable for all admissible values of d when the field size is exponential in n. After that, tremendous efforts have been devoted to reducing the field size. However, so far, reduction to a linear field size is only available for \u0000&lt;inline-formula&gt; &lt;tex-math&gt;$din {k+1,k+2,k+3}$ &lt;/tex-math&gt;&lt;/inline-formula&gt;\u0000 and \u0000&lt;inline-formula&gt; &lt;tex-math&gt;$d=n-1$ &lt;/tex-math&gt;&lt;/inline-formula&gt;\u0000. In this paper, we construct the first class of explicit optimal-access MSR codes with the smallest sub-packetization \u0000&lt;inline-formula&gt; &lt;tex-math&gt;$ell = s^{left lceil {{ n/s }}right rceil }$ &lt;/tex-math&gt;&lt;/inline-formula&gt;\u0000 for all d between \u0000&lt;inline-formula&gt; &lt;tex-math&gt;$k+1$ &lt;/tex-math&gt;&lt;/inline-formula&gt;\u0000 and \u0000&lt;inline-formula&gt; &lt;tex-math&gt;$n-1$ &lt;/tex-math&gt;&lt;/inline-formula&gt;\u0000, resolving an open problem in the survey (Ramkumar et al., Foundations and Trends in Communications and Information Theory: Vol. 19: No. 4). We further propose another class of explicit MSR code constructions (not optimal-access) with an even smaller sub-packetization \u0000&lt;inline-formula&gt; &lt;tex-math&gt;$s^{left lceil {{ n/(s+1)}}right rceil }$ &lt;/tex-math&gt;&lt;/inline-formula&gt;\u0000 for all admissible values of d, making significant progress on another open problem in the survey. Previously, MSR codes with \u0000&lt;inline-formula&gt; &lt;tex-math&gt;$ell =s^{left lceil {{ n/(s+1)}}right rceil }$ &lt;/tex-math&gt;&lt;/inline-formul","PeriodicalId":13494,"journal":{"name":"IEEE Transactions on Information Theory","volume":"70 11","pages":"7790-7806"},"PeriodicalIF":2.2,"publicationDate":"2024-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141780043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Characterization of the Complexity of Computing the Minimum Mean Square Error of Causal Prediction 计算因果预测最小均方误差的复杂性表征
IF 2.2 3区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-22 DOI: 10.1109/TIT.2024.3431695
Holger Boche;Volker Pohl;H. Vincent Poor
This paper investigates the complexity of computing the minimum mean square prediction error for wide-sense stationary stochastic processes. It is shown that if the spectral density of the stationary process is a strictly positive, computable continuous function then the minimum mean square error (MMSE) is always a computable number. Nevertheless, we also show that the computation of the MMSE is a $# P_{1}$ complete problem on the set of strictly positive, polynomial-time computable, continuous spectral densities. This means that if, as widely assumed, $FP_{1} neq # P_{1}$ , then there exist strictly positive, polynomial-time computable continuous spectral densities for which the computation of the MMSE is not polynomial-time computable. These results show in particular that under the widely accepted assumptions of complexity theory, the computation of the MMSE is generally much harder than an $NP_{1}$ complete problem.
本文研究了计算广义静态随机过程最小均方预测误差的复杂性。结果表明,如果静态过程的谱密度是一个严格为正、可计算的连续函数,那么最小均方误差(MMSE)总是一个可计算的数。然而,我们还证明,在严格正、多项式时间可计算、连续的谱密度集合上,最小均方误差的计算是一个 $# P_{1}$ 完全问题。这意味着,如果像广泛假设的那样,$FP_{1}neq # P_{1}$ ,那么就存在严格正的、多项式时间可计算的连续谱密度,对于这些密度,MMSE 的计算不是多项式时间可计算的。这些结果特别表明,在广泛接受的复杂性理论假设下,MMSE 的计算通常比 $NP_{1}$ 完全问题难得多。
{"title":"Characterization of the Complexity of Computing the Minimum Mean Square Error of Causal Prediction","authors":"Holger Boche;Volker Pohl;H. Vincent Poor","doi":"10.1109/TIT.2024.3431695","DOIUrl":"10.1109/TIT.2024.3431695","url":null,"abstract":"This paper investigates the complexity of computing the minimum mean square prediction error for wide-sense stationary stochastic processes. It is shown that if the spectral density of the stationary process is a strictly positive, computable continuous function then the minimum mean square error (MMSE) is always a computable number. Nevertheless, we also show that the computation of the MMSE is a \u0000<inline-formula> <tex-math>$# P_{1}$ </tex-math></inline-formula>\u0000 complete problem on the set of strictly positive, polynomial-time computable, continuous spectral densities. This means that if, as widely assumed, \u0000<inline-formula> <tex-math>$FP_{1} neq # P_{1}$ </tex-math></inline-formula>\u0000, then there exist strictly positive, polynomial-time computable continuous spectral densities for which the computation of the MMSE is not polynomial-time computable. These results show in particular that under the widely accepted assumptions of complexity theory, the computation of the MMSE is generally much harder than an \u0000<inline-formula> <tex-math>$NP_{1}$ </tex-math></inline-formula>\u0000 complete problem.","PeriodicalId":13494,"journal":{"name":"IEEE Transactions on Information Theory","volume":"70 9","pages":"6627-6638"},"PeriodicalIF":2.2,"publicationDate":"2024-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10605985","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141780044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Zero-Rate Thresholds and New Capacity Bounds for List-Decoding and List-Recovery 列表解码和列表恢复的零速率阈值和新容量边界
IF 2.2 3区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-19 DOI: 10.1109/TIT.2024.3430842
Nicolas Resch;Chen Yuan;Yihan Zhang
In this work we consider the list-decodability and list-recoverability of arbitrary q-ary codes, for all integer values of $qgeq 2$ . A code is called $(p,L)_{q}$ -list-decodable if every radius pn Hamming ball contains less than L codewords; $(p,ell ,L)_{q}$ -list-recoverability is a generalization where we place radius pn Hamming balls on every point of a combinatorial rectangle with side length $ell $ and again stipulate that there be less than L codewords. Our main contribution is to precisely calculate the maximum value of p for which there exist infinite families of positive rate $(p,ell ,L)_{q}$ -list-recoverable codes, the quantity we call the zero-rate threshold. Denoting this value by $p_{*}$ , we in fact show that codes correcting a $p_{*}+varepsilon $ fraction of errors must have size $O_{varepsilon }(1)$ , i.e., independent of n. Such a result is typically referred to as a “Plotkin bound.” To complement this, a standard random code with expurgation construction shows that there exist positive rate codes correcting a $p_{*}-varepsilon $ fraction of errors. We also follow a classical proof template (typically attributed to Elias and Bassalygo) to derive from the zero-rate threshold other tradeoffs between rate and decoding radius for list-decoding and list-recovery. Technically, proving the Plotkin bound boils down to demonstrating the Schur convexity of a certain function defined on the q-simplex as well as the convexity of a univariate function derived from it. We remark that an earlier argument claimed similar results for q-ary list-decoding; however, we point out that this earlier proof is flawed.
在这项工作中,我们考虑了任意 qary 编码的列表可解码性和列表可恢复性,适用于 $qgeq 2$ 的所有整数值。如果每个半径为 pn 的汉明球包含的码字少于 L,那么这种编码就被称为 $(p,L)_{q}$ -列表可解码编码;$(p,ell ,L)_{q}$ -列表可恢复性是一种概括,即我们在边长为 $ell $ 的组合矩形的每个点上放置半径为 pn 的汉明球,并再次规定码字少于 L。我们的主要贡献是精确计算了存在无穷个正速率 $(p,ell ,L)_{q}$ -列表可恢复编码的 p 的最大值,我们称其为零速率阈值。用 $p_{*}$ 表示这个值,我们实际上证明了纠正 $p_{*}+varepsilon $ 部分错误的编码必须具有 $O_{varepsilon }(1)$ 大小,即与 n 无关。作为补充,一个标准的随机码阐释结构表明,存在纠正了 $p_{*}-varepsilon $ 部分错误的正速率码。我们还遵循经典证明模板(通常归功于 Elias 和 Bassalygo),从零速率阈值推导出列表解码和列表恢复的速率与解码半径之间的其他权衡。从技术上讲,证明普洛特金边界可以归结为证明 q-复数上定义的某个函数的舒尔凸性,以及由它导出的单变量函数的凸性。我们注意到,早先的论证声称 qary 列表解码也有类似的结果;然而,我们指出早先的证明是有缺陷的。
{"title":"Zero-Rate Thresholds and New Capacity Bounds for List-Decoding and List-Recovery","authors":"Nicolas Resch;Chen Yuan;Yihan Zhang","doi":"10.1109/TIT.2024.3430842","DOIUrl":"10.1109/TIT.2024.3430842","url":null,"abstract":"In this work we consider the list-decodability and list-recoverability of arbitrary q-ary codes, for all integer values of \u0000<inline-formula> <tex-math>$qgeq 2$ </tex-math></inline-formula>\u0000. A code is called \u0000<inline-formula> <tex-math>$(p,L)_{q}$ </tex-math></inline-formula>\u0000-list-decodable if every radius pn Hamming ball contains less than L codewords; \u0000<inline-formula> <tex-math>$(p,ell ,L)_{q}$ </tex-math></inline-formula>\u0000-list-recoverability is a generalization where we place radius pn Hamming balls on every point of a combinatorial rectangle with side length \u0000<inline-formula> <tex-math>$ell $ </tex-math></inline-formula>\u0000 and again stipulate that there be less than L codewords. Our main contribution is to precisely calculate the maximum value of p for which there exist infinite families of positive rate \u0000<inline-formula> <tex-math>$(p,ell ,L)_{q}$ </tex-math></inline-formula>\u0000-list-recoverable codes, the quantity we call the zero-rate threshold. Denoting this value by \u0000<inline-formula> <tex-math>$p_{*}$ </tex-math></inline-formula>\u0000, we in fact show that codes correcting a \u0000<inline-formula> <tex-math>$p_{*}+varepsilon $ </tex-math></inline-formula>\u0000 fraction of errors must have size \u0000<inline-formula> <tex-math>$O_{varepsilon }(1)$ </tex-math></inline-formula>\u0000, i.e., independent of n. Such a result is typically referred to as a “Plotkin bound.” To complement this, a standard random code with expurgation construction shows that there exist positive rate codes correcting a \u0000<inline-formula> <tex-math>$p_{*}-varepsilon $ </tex-math></inline-formula>\u0000 fraction of errors. We also follow a classical proof template (typically attributed to Elias and Bassalygo) to derive from the zero-rate threshold other tradeoffs between rate and decoding radius for list-decoding and list-recovery. Technically, proving the Plotkin bound boils down to demonstrating the Schur convexity of a certain function defined on the q-simplex as well as the convexity of a univariate function derived from it. We remark that an earlier argument claimed similar results for q-ary list-decoding; however, we point out that this earlier proof is flawed.","PeriodicalId":13494,"journal":{"name":"IEEE Transactions on Information Theory","volume":"70 9","pages":"6211-6238"},"PeriodicalIF":2.2,"publicationDate":"2024-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141746152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Distributed Gradient Descent for Functional Learning 功能学习的分布式梯度下降
IF 2.2 3区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-16 DOI: 10.1109/TIT.2024.3428325
Zhan Yu;Jun Fan;Zhongjie Shi;Ding-Xuan Zhou
In recent years, different types of distributed and parallel learning schemes have received increasing attention for their strong advantages in handling large-scale data information. In the information era, to face the big data challenges that stem from functional data analysis very recently, we propose a novel distributed gradient descent functional learning (DGDFL) algorithm to tackle functional data across numerous local machines (processors) in the framework of reproducing kernel Hilbert space. Based on integral operator approaches, we provide the first theoretical understanding of the DGDFL algorithm in many different aspects of the literature. On the way of understanding DGDFL, firstly, a data-based gradient descent functional learning (GDFL) algorithm associated with a single-machine model is proposed and comprehensively studied. Under mild conditions, confidence-based optimal learning rates of DGDFL are obtained without the saturation boundary on the regularity index suffered in previous works in functional regression. We further provide a semi-supervised DGDFL approach to weaken the restriction on the maximal number of local machines to ensure optimal rates. To our best knowledge, the DGDFL provides the first divide-and-conquer iterative training approach to functional learning based on data samples of intrinsically infinite-dimensional random functions (functional covariates) and enriches the methodologies for functional data analysis.
近年来,不同类型的分布式并行学习方案因其在处理大规模数据信息方面的强大优势而受到越来越多的关注。在信息时代,面对函数数据分析所带来的大数据挑战,我们提出了一种新颖的分布式梯度下降函数学习(DGDFL)算法,在重现核希尔伯特空间的框架内,跨众多本地机器(处理器)处理函数数据。基于积分算子方法,我们首次从文献的多个不同方面对 DGDFL 算法进行了理论理解。在理解 DGDFL 的过程中,首先提出并全面研究了与单机模型相关的基于数据的梯度下降函数学习(GDFL)算法。在温和条件下,我们得到了基于置信度的 DGDFL 最佳学习率,而不会出现以往函数回归中正则性指数饱和边界的问题。我们进一步提供了一种半监督 DGDFL 方法,以弱化对本地机器最大数量的限制,从而确保最佳学习率。据我们所知,DGDFL 提供了第一种基于内在无限维随机函数(函数协变量)数据样本的函数学习分而治之迭代训练方法,并丰富了函数数据分析方法。
{"title":"Distributed Gradient Descent for Functional Learning","authors":"Zhan Yu;Jun Fan;Zhongjie Shi;Ding-Xuan Zhou","doi":"10.1109/TIT.2024.3428325","DOIUrl":"10.1109/TIT.2024.3428325","url":null,"abstract":"In recent years, different types of distributed and parallel learning schemes have received increasing attention for their strong advantages in handling large-scale data information. In the information era, to face the big data challenges that stem from functional data analysis very recently, we propose a novel distributed gradient descent functional learning (DGDFL) algorithm to tackle functional data across numerous local machines (processors) in the framework of reproducing kernel Hilbert space. Based on integral operator approaches, we provide the first theoretical understanding of the DGDFL algorithm in many different aspects of the literature. On the way of understanding DGDFL, firstly, a data-based gradient descent functional learning (GDFL) algorithm associated with a single-machine model is proposed and comprehensively studied. Under mild conditions, confidence-based optimal learning rates of DGDFL are obtained without the saturation boundary on the regularity index suffered in previous works in functional regression. We further provide a semi-supervised DGDFL approach to weaken the restriction on the maximal number of local machines to ensure optimal rates. To our best knowledge, the DGDFL provides the first divide-and-conquer iterative training approach to functional learning based on data samples of intrinsically infinite-dimensional random functions (functional covariates) and enriches the methodologies for functional data analysis.","PeriodicalId":13494,"journal":{"name":"IEEE Transactions on Information Theory","volume":"70 9","pages":"6547-6571"},"PeriodicalIF":2.2,"publicationDate":"2024-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141719804","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Affine Automorphism Group of Polar Codes 极性密码的亲和自变群
IF 2.2 3区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-16 DOI: 10.1109/TIT.2024.3429277
Zicheng Ye;Yuan Li;Huazi Zhang;Jun Wang;Guiying Yan;Zhiming Ma
The automorphism ensemble (AE) decoding framework for polar codes attracts much attention recently. It decodes multiple permuted codewords with successive cancellation (SC) decoders in parallel and hence has lower latency compared to successive cancellation list (SCL) decoding. However, the AE decoding framework is ineffective for permutations falling into the lower-triangular affine (LTA) automorphism group, as they are invariant under SC decoding. Therefore, the block lower-triangular affine (BLTA) group was discovered to achieve better AE decoding performance. However, the equivalence of the BLTA group and the complete affine automorphism group was unresolved. Additionally, some automorphisms in BLTA group are also SC-invariant, thus are redundant in AE decoding. In this paper, we prove that BLTA group coincides with the complete automorphisms of decreasing polar codes that can be formulated as affine transformations. Also, we find a necessary and sufficient condition related to the block lower-triangular structure of transformation matrices to identify SC-invariant automorphisms. Furthermore, We present an algorithm that efficiently identifies all SC-invariant affine automorphisms under specific constructions.
极性编码的自动形态集合(AE)解码框架最近备受关注。它通过并行的连续消隐(SC)解码器对多个排列编码进行解码,因此与连续消隐列表(SCL)解码相比具有更低的延迟。然而,AE 解码框架对属于低三角仿射(LTA)自形群的排列无效,因为它们在 SC 解码中是不变的。因此,人们发现了块低三角仿射(BLTA)组,以实现更好的 AE 解码性能。然而,BLTA 组与完全仿射自变群的等价性问题尚未解决。此外,BLTA 群中的一些自形也是 SC 不变的,因此在 AE 解码中是多余的。在本文中,我们证明了 BLTA 群与可表述为仿射变换的递减极性码的完整自形群重合。此外,我们还找到了一个与变换矩阵的块下三角结构相关的必要条件和充分条件,以识别 SC 不变自形体。此外,我们还提出了一种算法,可在特定结构下高效识别所有 SC 不变仿射自动形。
{"title":"Affine Automorphism Group of Polar Codes","authors":"Zicheng Ye;Yuan Li;Huazi Zhang;Jun Wang;Guiying Yan;Zhiming Ma","doi":"10.1109/TIT.2024.3429277","DOIUrl":"10.1109/TIT.2024.3429277","url":null,"abstract":"The automorphism ensemble (AE) decoding framework for polar codes attracts much attention recently. It decodes multiple permuted codewords with successive cancellation (SC) decoders in parallel and hence has lower latency compared to successive cancellation list (SCL) decoding. However, the AE decoding framework is ineffective for permutations falling into the lower-triangular affine (LTA) automorphism group, as they are invariant under SC decoding. Therefore, the block lower-triangular affine (BLTA) group was discovered to achieve better AE decoding performance. However, the equivalence of the BLTA group and the complete affine automorphism group was unresolved. Additionally, some automorphisms in BLTA group are also SC-invariant, thus are redundant in AE decoding. In this paper, we prove that BLTA group coincides with the complete automorphisms of decreasing polar codes that can be formulated as affine transformations. Also, we find a necessary and sufficient condition related to the block lower-triangular structure of transformation matrices to identify SC-invariant automorphisms. Furthermore, We present an algorithm that efficiently identifies all SC-invariant affine automorphisms under specific constructions.","PeriodicalId":13494,"journal":{"name":"IEEE Transactions on Information Theory","volume":"70 9","pages":"6280-6296"},"PeriodicalIF":2.2,"publicationDate":"2024-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141719805","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IEEE Transactions on Information Theory Information for Authors 电气和电子工程师学会《信息论导刊》(IEEE Transactions on Information Theory)作者须知
IF 2.2 3区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-15 DOI: 10.1109/TIT.2024.3421753
{"title":"IEEE Transactions on Information Theory Information for Authors","authors":"","doi":"10.1109/TIT.2024.3421753","DOIUrl":"https://doi.org/10.1109/TIT.2024.3421753","url":null,"abstract":"","PeriodicalId":13494,"journal":{"name":"IEEE Transactions on Information Theory","volume":"70 8","pages":"C3-C3"},"PeriodicalIF":2.2,"publicationDate":"2024-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10599341","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141624158","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IEEE Transactions on Information Theory
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1