首页 > 最新文献

IEEE Transactions on Information Theory最新文献

英文 中文
Improved Approximation Algorithms for Index Coding 索引编码的改进逼近算法
IF 2.2 3区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-19 DOI: 10.1109/TIT.2024.3446000
Dror Chawin;Ishay Haviv
The index coding problem is concerned with broadcasting encoded information to a collection of receivers in a way that enables each receiver to discover its required data based on its side information, which comprises the data required by some of the others. Given the side information map, represented by a graph in the symmetric case and by a digraph otherwise, the goal is to devise a coding scheme of minimum broadcast length. We present a general method for developing efficient algorithms for approximating the index coding rate for prescribed families of instances. As applications, we obtain polynomial-time algorithms that approximate the index coding rate of graphs and digraphs on n vertices to within factors of $O(n/log ^{2} n)$ and $O(n/log n)$ respectively. This improves on the approximation factors of $O(n/log n)$ for graphs and $O(n cdot log log n/log n)$ for digraphs achieved by Blasiak, Kleinberg, and Lubetzky. For the family of quasi-line graphs, we exhibit a polynomial-time algorithm that approximates the index coding rate to within a factor of 2. This improves on the approximation factor of $O(n^{2/3})$ achieved by Arbabjolfaei and Kim for graphs on n vertices taken from certain sub-families of quasi-line graphs. Our approach is applicable for approximating a variety of additional graph and digraph quantities to within the same approximation factors. Specifically, it captures every graph quantity sandwiched between the independence number and the clique cover number and every digraph quantity sandwiched between the maximum size of an acyclic induced sub-digraph and the directed clique cover number.
索引编码问题涉及向一组接收器广播编码信息,使每个接收器都能根据侧信息(包括其他接收器所需的数据)发现自己所需的数据。侧信息图在对称情况下用图表示,在其他情况下用数图表示,目标是设计一种广播长度最小的编码方案。我们提出了一种通用方法,用于开发高效算法,以近似计算规定实例系列的索引编码率。作为应用,我们获得了多项式时间算法,可以将 n 个顶点上的图和数图的索引编码率分别逼近到 $O(n/log ^{2} n)$ 和 $O(n/log n)$ 的因子之内。这改进了 Blasiak、Kleinberg 和 Lubetzky 所实现的图形近似系数 $O(n//log n)$ 和数图近似系数 $O(n cdot log log n/log n)$。对于准线形图族,我们展示了一种多项式时间算法,它能将索引编码率逼近到 2 倍以内。这改进了 Arbabjolfaei 和 Kim 针对取自准线形图某些子族的 n 个顶点的图所实现的 $O(n^{2/3})$ 的逼近系数。我们的方法适用于近似各种额外的图和数图数量,近似系数相同。具体来说,它可以捕捉到介于独立性数和簇覆盖数之间的每一个图量,以及介于无环诱导子图的最大尺寸和有向簇覆盖数之间的每一个数图量。
{"title":"Improved Approximation Algorithms for Index Coding","authors":"Dror Chawin;Ishay Haviv","doi":"10.1109/TIT.2024.3446000","DOIUrl":"10.1109/TIT.2024.3446000","url":null,"abstract":"The index coding problem is concerned with broadcasting encoded information to a collection of receivers in a way that enables each receiver to discover its required data based on its side information, which comprises the data required by some of the others. Given the side information map, represented by a graph in the symmetric case and by a digraph otherwise, the goal is to devise a coding scheme of minimum broadcast length. We present a general method for developing efficient algorithms for approximating the index coding rate for prescribed families of instances. As applications, we obtain polynomial-time algorithms that approximate the index coding rate of graphs and digraphs on n vertices to within factors of \u0000<inline-formula> <tex-math>$O(n/log ^{2} n)$ </tex-math></inline-formula>\u0000 and \u0000<inline-formula> <tex-math>$O(n/log n)$ </tex-math></inline-formula>\u0000 respectively. This improves on the approximation factors of \u0000<inline-formula> <tex-math>$O(n/log n)$ </tex-math></inline-formula>\u0000 for graphs and \u0000<inline-formula> <tex-math>$O(n cdot log log n/log n)$ </tex-math></inline-formula>\u0000 for digraphs achieved by Blasiak, Kleinberg, and Lubetzky. For the family of quasi-line graphs, we exhibit a polynomial-time algorithm that approximates the index coding rate to within a factor of 2. This improves on the approximation factor of \u0000<inline-formula> <tex-math>$O(n^{2/3})$ </tex-math></inline-formula>\u0000 achieved by Arbabjolfaei and Kim for graphs on n vertices taken from certain sub-families of quasi-line graphs. Our approach is applicable for approximating a variety of additional graph and digraph quantities to within the same approximation factors. Specifically, it captures every graph quantity sandwiched between the independence number and the clique cover number and every digraph quantity sandwiched between the maximum size of an acyclic induced sub-digraph and the directed clique cover number.","PeriodicalId":13494,"journal":{"name":"IEEE Transactions on Information Theory","volume":"70 11","pages":"8266-8275"},"PeriodicalIF":2.2,"publicationDate":"2024-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142194894","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Binary Codes for Correcting Two Edits 纠正两次编辑的二进制代码
IF 2.2 3区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-19 DOI: 10.1109/TIT.2024.3445929
Yubo Sun;Gennian Ge
An edit refers to a single insertion, deletion, or substitution. This paper aims to construct binary codes that can correct two edits. To do this, a necessary and sufficient condition for a code to be two-edit correctable is provided, showing that a code is a two-edit correcting code if and only if it can correct two deletions, up to two substitutions, and one deletion and up to one substitution, separately. This criterion allows for the construction of two-edit correcting codes leveraging these three types of error correcting codes. In the field of constructing codes for correcting two deletions, we present a construction with $4log n+O(log log n)$ redundant bits that can be viewed as a subcode proposed by Guruswami and Håstad, and provide an alternative proof. Moreover, our two-deletion correcting codes can also correct up to two substitutions after making a slight modification. In the field of constructing codes for correcting one deletion and up to one substitution, we present a construction with $4 log n+O(log log n)$ redundant bits, which outperforms the best previously known results $6 log n+O(1)$ . Leveraging these codes, we obtain a construction of two-edit correcting codes with $6 log n+O(log log n)$ redundant bits. This outperforms the best previously known result, which requires at least $8log n$ redundant bits. Moreover, we also consider the list-decoding problem under the two-edit channel and construct a two-edit list-decodable code with a list size of two employing $4 log n+O(log log n)$ redundant bits.
编辑指的是一次插入、删除或替换。本文旨在构建可纠正两次编辑的二进制代码。要做到这一点,本文提供了一个代码可进行两次编辑校正的必要条件和充分条件,表明当且仅当一个代码可以分别校正两次删除和最多两次替换,以及一次删除和最多一次替换时,它就是一个可进行两次编辑校正的代码。根据这一标准,我们可以利用这三种纠错码构建双编辑纠错码。在构造用于纠正两次删除的编码领域,我们提出了一种具有 $4log n+O(log log n)$ 冗余比特的构造,它可以被看作是 Guruswami 和 Håstad 提出的子编码,并提供了另一种证明。此外,我们的双删除校正码在稍作修改后也可以校正最多两个替换。在构造用于纠正一个删除和最多一个替换的代码领域,我们提出了一种冗余比特为 $4 log n+O(log log n)$ 的构造,它优于之前已知的最佳结果 $6 log n+O(1)$ 。利用这些编码,我们得到了一种冗余比特为 $6 log n+O(log log n)$ 的双校正编码结构。这优于之前已知的最佳结果,后者至少需要 $8log n$ 的冗余比特。此外,我们还考虑了双编辑信道下的列表解码问题,并构造了一种列表大小为 2 的双编辑列表可解码代码,其冗余比特为 $4 log n+O(log log n)$ 。
{"title":"Binary Codes for Correcting Two Edits","authors":"Yubo Sun;Gennian Ge","doi":"10.1109/TIT.2024.3445929","DOIUrl":"10.1109/TIT.2024.3445929","url":null,"abstract":"An edit refers to a single insertion, deletion, or substitution. This paper aims to construct binary codes that can correct two edits. To do this, a necessary and sufficient condition for a code to be two-edit correctable is provided, showing that a code is a two-edit correcting code if and only if it can correct two deletions, up to two substitutions, and one deletion and up to one substitution, separately. This criterion allows for the construction of two-edit correcting codes leveraging these three types of error correcting codes. In the field of constructing codes for correcting two deletions, we present a construction with \u0000<inline-formula> <tex-math>$4log n+O(log log n)$ </tex-math></inline-formula>\u0000 redundant bits that can be viewed as a subcode proposed by Guruswami and Håstad, and provide an alternative proof. Moreover, our two-deletion correcting codes can also correct up to two substitutions after making a slight modification. In the field of constructing codes for correcting one deletion and up to one substitution, we present a construction with \u0000<inline-formula> <tex-math>$4 log n+O(log log n)$ </tex-math></inline-formula>\u0000 redundant bits, which outperforms the best previously known results \u0000<inline-formula> <tex-math>$6 log n+O(1)$ </tex-math></inline-formula>\u0000. Leveraging these codes, we obtain a construction of two-edit correcting codes with \u0000<inline-formula> <tex-math>$6 log n+O(log log n)$ </tex-math></inline-formula>\u0000 redundant bits. This outperforms the best previously known result, which requires at least \u0000<inline-formula> <tex-math>$8log n$ </tex-math></inline-formula>\u0000 redundant bits. Moreover, we also consider the list-decoding problem under the two-edit channel and construct a two-edit list-decodable code with a list size of two employing \u0000<inline-formula> <tex-math>$4 log n+O(log log n)$ </tex-math></inline-formula>\u0000 redundant bits.","PeriodicalId":13494,"journal":{"name":"IEEE Transactions on Information Theory","volume":"70 10","pages":"6877-6898"},"PeriodicalIF":2.2,"publicationDate":"2024-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142194899","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
L1 Estimation: On the Optimality of Linear Estimators L 1 估算:论线性估计器的最优性
IF 2.2 3区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-19 DOI: 10.1109/TIT.2024.3440929
Leighton P. Barnes;Alex Dytso;Jingbo Liu;H. Vincent Poor
Consider the problem of estimating a random variable X from noisy observations $Y = X+ Z$ , where Z is standard normal, under the $L^{1}$ fidelity criterion. It is well known that the optimal Bayesian estimator in this setting is the conditional median. This work shows that the only prior distribution on X that induces linearity in the conditional median is Gaussian. Along the way, several other results are presented. In particular, it is demonstrated that if the conditional distribution $P_{X|Y=y}$ is symmetric for all y, then X must follow a Gaussian distribution. Additionally, we consider other $L^{p}$ losses and observe the following phenomenon: for $p in [{1,2}]$ , Gaussian is the only prior distribution that induces a linear optimal Bayesian estimator, and for $p in (2,infty)$ , infinitely many prior distributions on X can induce linearity. Finally, extensions are provided to encompass noise models leading to conditional distributions from certain exponential families.
考虑在 $L^{1}$ 保真度准则下,从有噪声的观测值 $Y = X+ Z$ 中估计随机变量 X 的问题,其中 Z 为标准正态分布。众所周知,这种情况下的最优贝叶斯估计器是条件中值。本研究表明,唯一能诱导条件中值线性的 X 先验分布是高斯分布。同时,还提出了其他一些结果。特别是,它证明了如果条件分布 $P_{X|Y=y}$ 对所有 y 都是对称的,那么 X 必须遵循高斯分布。此外,我们还考虑了其他 $L^{p}$ 损失,并观察到以下现象:对于 $p in [{1,2}]$ 来说,高斯分布是唯一能诱导线性最优贝叶斯估计器的先验分布;而对于 $p in (2,infty)$ 来说,X 上有无限多的先验分布能诱导线性。最后,本文还提供了一些扩展,以涵盖导致某些指数族条件分布的噪声模型。
{"title":"L1 Estimation: On the Optimality of Linear Estimators","authors":"Leighton P. Barnes;Alex Dytso;Jingbo Liu;H. Vincent Poor","doi":"10.1109/TIT.2024.3440929","DOIUrl":"10.1109/TIT.2024.3440929","url":null,"abstract":"Consider the problem of estimating a random variable X from noisy observations \u0000<inline-formula> <tex-math>$Y = X+ Z$ </tex-math></inline-formula>\u0000, where Z is standard normal, under the \u0000<inline-formula> <tex-math>$L^{1}$ </tex-math></inline-formula>\u0000 fidelity criterion. It is well known that the optimal Bayesian estimator in this setting is the conditional median. This work shows that the only prior distribution on X that induces linearity in the conditional median is Gaussian. Along the way, several other results are presented. In particular, it is demonstrated that if the conditional distribution \u0000<inline-formula> <tex-math>$P_{X|Y=y}$ </tex-math></inline-formula>\u0000 is symmetric for all y, then X must follow a Gaussian distribution. Additionally, we consider other \u0000<inline-formula> <tex-math>$L^{p}$ </tex-math></inline-formula>\u0000 losses and observe the following phenomenon: for \u0000<inline-formula> <tex-math>$p in [{1,2}]$ </tex-math></inline-formula>\u0000, Gaussian is the only prior distribution that induces a linear optimal Bayesian estimator, and for \u0000<inline-formula> <tex-math>$p in (2,infty)$ </tex-math></inline-formula>\u0000, infinitely many prior distributions on X can induce linearity. Finally, extensions are provided to encompass noise models leading to conditional distributions from certain exponential families.","PeriodicalId":13494,"journal":{"name":"IEEE Transactions on Information Theory","volume":"70 11","pages":"8026-8039"},"PeriodicalIF":2.2,"publicationDate":"2024-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142194893","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
New Constructive Counterexamples to Additivity of Minimum Output Rényi p-Entropy of Quantum Channels 量子通道最小输出雷尼p熵可加性的新建设性反例
IF 2.2 3区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-19 DOI: 10.1109/TIT.2024.3446191
Krzysztof Szczygielski;Michał Studziński
In this paper, we present new families of quantum channels for which corresponding minimum output Rényi p-entropy is not additive. Our manuscript is motivated by the results of Grudka et al. and we focus on channels characterized by both extensions and subspaces of the antisymmetric subspace in $mathbb {C}^{d} otimes mathbb {C} ^{d}$ , which exhibit additivity breaking for $pgt 2$ .
在本文中,我们提出了新的量子信道系列,对于这些信道,相应的最小输出雷尼p熵是不相加的。我们的手稿受到了格鲁德卡等人的研究成果的启发,我们将重点放在以 $mathbb {C}^{d} 中的反对称子空间的扩展和子空间为特征的通道上。times mathbb {C}^{d}$ ,它们在 $pgt 2$ 时表现出相加性断裂。
{"title":"New Constructive Counterexamples to Additivity of Minimum Output Rényi p-Entropy of Quantum Channels","authors":"Krzysztof Szczygielski;Michał Studziński","doi":"10.1109/TIT.2024.3446191","DOIUrl":"10.1109/TIT.2024.3446191","url":null,"abstract":"In this paper, we present new families of quantum channels for which corresponding minimum output Rényi p-entropy is not additive. Our manuscript is motivated by the results of Grudka et al. and we focus on channels characterized by both extensions and subspaces of the antisymmetric subspace in \u0000<inline-formula> <tex-math>$mathbb {C}^{d} otimes mathbb {C} ^{d}$ </tex-math></inline-formula>\u0000, which exhibit additivity breaking for \u0000<inline-formula> <tex-math>$pgt 2$ </tex-math></inline-formula>\u0000.","PeriodicalId":13494,"journal":{"name":"IEEE Transactions on Information Theory","volume":"70 10","pages":"7023-7035"},"PeriodicalIF":2.2,"publicationDate":"2024-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142194955","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On Correlation Distribution of Niho-Type Decimation d = 3(pm - 1) + 1 关于 Niho-type decimation d = 3(pm -1)+1 的相关分布
IF 2.2 3区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-16 DOI: 10.1109/TIT.2024.3444892
Maosheng Xiong;Haode Yan
The cross-correlation problem is a classic problem in sequence design. In this paper we compute the cross-correlation distribution of the Niho-type decimation $d=3(p^{m}-1)+1$ over ${mathrm {GF}}(p^{2m})$ for any prime $p ge 5$ . Previously this problem was solved by Xia et al. only for $p=2$ and $p=3$ in a series of papers. The main difficulty of this problem for $p ge 5$ , as pointed out by Xia et al., is to count the number of codewords of “pure weight” 5 in p-ary Zetterberg codes. It turns out this counting problem can be transformed by the MacWilliams identity into counting codewords of weight at most 5 in p-ary Melas codes, the most difficult of which is related to a K3 surface well studied in the literature and can be computed. When $p ge 7$ , the theory of elliptic curves over finite fields also plays an important role in the resolution of this problem.
交叉相关问题是序列设计中的一个经典问题。本文计算了任意素数 $p ge 5$ 的 Niho-type decimation $d=3(p^{m}-1)+1$ 在 ${mathrm {GF}}(p^{2m})$ 上的交叉相关分布。此前,Xia 等人在一系列论文中只解决了 $p=2$ 和 $p=3$ 的问题。Xia 等人指出,对于 $p ge 5$,这个问题的主要困难在于计算 p-ary Zetterberg 码中 "纯重 "为 5 的码字数。事实证明,这个计算问题可以通过麦克威廉斯特性转化为计算 pary Melas 码中最多权重为 5 的码字,其中最难的码字与文献中研究得很好的 K3 面有关,可以计算。当 $pge 7$ 时,有限域上的椭圆曲线理论在解决这个问题中也起着重要作用。
{"title":"On Correlation Distribution of Niho-Type Decimation d = 3(pm - 1) + 1","authors":"Maosheng Xiong;Haode Yan","doi":"10.1109/TIT.2024.3444892","DOIUrl":"10.1109/TIT.2024.3444892","url":null,"abstract":"The cross-correlation problem is a classic problem in sequence design. In this paper we compute the cross-correlation distribution of the Niho-type decimation \u0000<inline-formula> <tex-math>$d=3(p^{m}-1)+1$ </tex-math></inline-formula>\u0000 over \u0000<inline-formula> <tex-math>${mathrm {GF}}(p^{2m})$ </tex-math></inline-formula>\u0000 for any prime \u0000<inline-formula> <tex-math>$p ge 5$ </tex-math></inline-formula>\u0000. Previously this problem was solved by Xia et al. only for \u0000<inline-formula> <tex-math>$p=2$ </tex-math></inline-formula>\u0000 and \u0000<inline-formula> <tex-math>$p=3$ </tex-math></inline-formula>\u0000 in a series of papers. The main difficulty of this problem for \u0000<inline-formula> <tex-math>$p ge 5$ </tex-math></inline-formula>\u0000, as pointed out by Xia et al., is to count the number of codewords of “pure weight” 5 in p-ary Zetterberg codes. It turns out this counting problem can be transformed by the MacWilliams identity into counting codewords of weight at most 5 in p-ary Melas codes, the most difficult of which is related to a K3 surface well studied in the literature and can be computed. When \u0000<inline-formula> <tex-math>$p ge 7$ </tex-math></inline-formula>\u0000, the theory of elliptic curves over finite fields also plays an important role in the resolution of this problem.","PeriodicalId":13494,"journal":{"name":"IEEE Transactions on Information Theory","volume":"70 11","pages":"8289-8302"},"PeriodicalIF":2.2,"publicationDate":"2024-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142194898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Nested Perfect Arrays 嵌套完美数组
IF 2.2 3区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-16 DOI: 10.1109/TIT.2024.3445122
Verónica Becher;Olivier Carton
We introduce two-dimensional periodic arrays that are a variant of the de Bruijn tori. We call them nested perfect arrays. Instead of asking that every array of a given size has exactly one occurrence, we partition the positions in congruence classes and we ask exactly one occurrence in each congruence class. We also ask that this property applies recursively to each of the subarrays. We give a method to construct nested perfect arrays based on Pascal triangle matrix modulo 2. For the two-symbol alphabet, and for n being a power of 2, we partition the positions of the arrays in $n^{2}$ many congruence classes by taking the row number modulo n and the column number modulo n. We construct arrays where each possible $ntimes n$ array occurs $n^{2}$ times, once in each congruence class. Our method yields exponentially many (in $n^{2}$ ) different nested perfect arrays.
我们介绍的二维周期阵列是 de Bruijn tori 的一种变体。我们称之为嵌套完美数组。我们并不要求给定大小的每个数组都恰好有一次出现,而是将位置划分为全等类,并要求在每个全等类中都恰好有一次出现。我们还要求这一属性递归地适用于每个子数组。我们给出了一种基于帕斯卡三角形矩阵模 2 的嵌套完美数组构造方法。对于双符号字母表,并且 n 是 2 的幂次,我们通过取行数 modulo n 和列数 modulo n 将数组的位置划分为 $n^{2}$ 多个同类。我们构建的数组中,每个可能的 $ntimes n$ 数组出现了 $n^{2}$次,在每个同类中出现一次。我们的方法会产生指数级数量(以 $n^{2}$ 为单位)的不同嵌套完美数组。
{"title":"Nested Perfect Arrays","authors":"Verónica Becher;Olivier Carton","doi":"10.1109/TIT.2024.3445122","DOIUrl":"10.1109/TIT.2024.3445122","url":null,"abstract":"We introduce two-dimensional periodic arrays that are a variant of the de Bruijn tori. We call them nested perfect arrays. Instead of asking that every array of a given size has exactly one occurrence, we partition the positions in congruence classes and we ask exactly one occurrence in each congruence class. We also ask that this property applies recursively to each of the subarrays. We give a method to construct nested perfect arrays based on Pascal triangle matrix modulo 2. For the two-symbol alphabet, and for n being a power of 2, we partition the positions of the arrays in \u0000<inline-formula> <tex-math>$n^{2}$ </tex-math></inline-formula>\u0000 many congruence classes by taking the row number modulo n and the column number modulo n. We construct arrays where each possible \u0000<inline-formula> <tex-math>$ntimes n$ </tex-math></inline-formula>\u0000 array occurs \u0000<inline-formula> <tex-math>$n^{2}$ </tex-math></inline-formula>\u0000 times, once in each congruence class. Our method yields exponentially many (in \u0000<inline-formula> <tex-math>$n^{2}$ </tex-math></inline-formula>\u0000) different nested perfect arrays.","PeriodicalId":13494,"journal":{"name":"IEEE Transactions on Information Theory","volume":"70 10","pages":"7463-7471"},"PeriodicalIF":2.2,"publicationDate":"2024-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142194896","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The First Achievement of a Given Level by a Random Process 通过随机过程首次达到给定水平
IF 2.2 3区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-15 DOI: 10.1109/TIT.2024.3444043
Sergei L. Semakov
We propose a scheme for finding the probabilities of events related to crossings of a level by a random process. Using this scheme, we estimate the probability that the first achievement of a given level by the component $y_{1}(x)$ of an n-dimensional continuous process ${mathbf { y}}(x)!=!{y_{1}(x),ldots,y_{n}(x)}$ occurs at some moment $x^{*}$ from a given interval $(x',x'')$ and, at this moment $x^{*}$ , the other components $y_{2}(x^{*}),ldots,y_{n}(x^{*})$ satisfy given constraints. The need for estimating the above-mentioned probability arises, in particular, in the problems of ensuring the safety of an aircraft landing.
我们提出了一种方法,用于计算与随机过程越级相关的事件概率。利用这个方案,我们可以估算出一个 n 维连续过程 ${mathbf { y}}(x)!= 的分量 $y_{1}(x)$ 首次达到给定水平的概率!{y_{1}(x),ldots,y_{n}(x)}$发生在给定区间$(x',x''')$的某个时刻$x^{*}$,并且在这个时刻$x^{*}$,其他分量$y_{2}(x^{*}),ldots,y_{n}(x^{*})$满足给定的约束条件。在确保飞机着陆安全的问题中,尤其需要估算上述概率。
{"title":"The First Achievement of a Given Level by a Random Process","authors":"Sergei L. Semakov","doi":"10.1109/TIT.2024.3444043","DOIUrl":"10.1109/TIT.2024.3444043","url":null,"abstract":"We propose a scheme for finding the probabilities of events related to crossings of a level by a random process. Using this scheme, we estimate the probability that the first achievement of a given level by the component \u0000<inline-formula> <tex-math>$y_{1}(x)$ </tex-math></inline-formula>\u0000 of an n-dimensional continuous process \u0000<inline-formula> <tex-math>${mathbf { y}}(x)!=!{y_{1}(x),ldots,y_{n}(x)}$ </tex-math></inline-formula>\u0000 occurs at some moment \u0000<inline-formula> <tex-math>$x^{*}$ </tex-math></inline-formula>\u0000 from a given interval \u0000<inline-formula> <tex-math>$(x',x'')$ </tex-math></inline-formula>\u0000 and, at this moment \u0000<inline-formula> <tex-math>$x^{*}$ </tex-math></inline-formula>\u0000, the other components \u0000<inline-formula> <tex-math>$y_{2}(x^{*}),ldots,y_{n}(x^{*})$ </tex-math></inline-formula>\u0000 satisfy given constraints. The need for estimating the above-mentioned probability arises, in particular, in the problems of ensuring the safety of an aircraft landing.","PeriodicalId":13494,"journal":{"name":"IEEE Transactions on Information Theory","volume":"70 10","pages":"7162-7178"},"PeriodicalIF":2.2,"publicationDate":"2024-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142194900","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reverse Information Projections and Optimal E-Statistics 反向信息预测和最佳电子统计
IF 2.2 3区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-15 DOI: 10.1109/TIT.2024.3444458
Tyron Lardy;Peter Grünwald;Peter Harremoës
Information projections have found important applications in probability theory, statistics, and related areas. In the field of hypothesis testing in particular, the reverse information projection (RIPr) has recently been shown to lead to growth-rate optimal (GRO) e-statistics for testing simple alternatives against composite null hypotheses. However, the RIPr as well as the GRO criterion are undefined whenever the infimum information divergence between the null and alternative is infinite. We show that in such scenarios, under some assumptions, there still exists a measure in the null that is closest to the alternative in a specific sense. Whenever the information divergence is finite, this measure coincides with the usual RIPr. It therefore gives a natural extension of the RIPr to certain cases where the latter was previously not defined. This extended notion of the RIPr is shown to lead to optimal e-statistics in a sense that is a novel, but natural, extension of the GRO criterion. We also give conditions under which the (extension of the) RIPr is a strict sub-probability measure, as well as conditions under which an approximation of the RIPr leads to approximate e-statistics. For this case we provide tight relations between the corresponding approximation rates.
信息投影在概率论、统计学及相关领域有着重要的应用。特别是在假设检验领域,反向信息投影(RIPr)最近被证明能带来最优增长率(GRO)电子统计量,用于针对复合零假设检验简单替代方案。然而,只要零假设和备择假设之间的最小信息差为无限大,RIPr 和 GRO 准则就无法定义。我们证明,在这种情况下,根据某些假设,空值中仍然存在一个在特定意义上最接近替代方案的度量。只要信息发散是有限的,这个度量就与通常的 RIPr 重合。因此,它将 RIPr 自然地扩展到了后者以前没有定义的某些情况。RIPr 的这一扩展概念被证明能带来最优电子统计,这是 GRO 准则的一种新颖而自然的扩展。我们还给出了 RIPr(扩展)是严格子概率度量的条件,以及 RIPr 的近似导致近似电子统计的条件。对于这种情况,我们提供了相应近似率之间的紧密关系。
{"title":"Reverse Information Projections and Optimal E-Statistics","authors":"Tyron Lardy;Peter Grünwald;Peter Harremoës","doi":"10.1109/TIT.2024.3444458","DOIUrl":"10.1109/TIT.2024.3444458","url":null,"abstract":"Information projections have found important applications in probability theory, statistics, and related areas. In the field of hypothesis testing in particular, the reverse information projection (RIPr) has recently been shown to lead to growth-rate optimal (GRO) e-statistics for testing simple alternatives against composite null hypotheses. However, the RIPr as well as the GRO criterion are undefined whenever the infimum information divergence between the null and alternative is infinite. We show that in such scenarios, under some assumptions, there still exists a measure in the null that is closest to the alternative in a specific sense. Whenever the information divergence is finite, this measure coincides with the usual RIPr. It therefore gives a natural extension of the RIPr to certain cases where the latter was previously not defined. This extended notion of the RIPr is shown to lead to optimal e-statistics in a sense that is a novel, but natural, extension of the GRO criterion. We also give conditions under which the (extension of the) RIPr is a strict sub-probability measure, as well as conditions under which an approximation of the RIPr leads to approximate e-statistics. For this case we provide tight relations between the corresponding approximation rates.","PeriodicalId":13494,"journal":{"name":"IEEE Transactions on Information Theory","volume":"70 11","pages":"7616-7631"},"PeriodicalIF":2.2,"publicationDate":"2024-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142194933","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the Generalization for Transfer Learning: An Information-Theoretic Analysis 论迁移学习的泛化:信息理论分析
IF 2.2 3区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-14 DOI: 10.1109/TIT.2024.3441574
Xuetong Wu;Jonathan H. Manton;Uwe Aickelin;Jingge Zhu
Transfer learning, or domain adaptation, is concerned with machine learning problems in which training and testing data come from possibly different probability distributions. In this work, we give an information-theoretic analysis of the generalization error and excess risk of transfer learning algorithms. Our results suggest, perhaps as expected, that the Kullback-Leibler (KL) divergence $D(mu |mu ')$ plays an important role in the characterizations where $mu $ and $mu '$ denote the distribution of the training data and the testing data, respectively. Specifically, we provide generalization error and excess risk upper bounds for learning algorithms where data from both distributions are available in the training phase. Recognizing that the bounds could be sub-optimal in general, we provide improved excess risk upper bounds for a certain class of algorithms, including the empirical risk minimization (ERM) algorithm, by making stronger assumptions through the central condition. To demonstrate the usefulness of the bounds, we further extend the analysis to the Gibbs algorithm and the noisy stochastic gradient descent method. We then generalize the mutual information bound with other divergences such as $phi $ -divergence and Wasserstein distance, which may lead to tighter bounds and can handle the case when $mu $ is not absolutely continuous with respect to $mu '$ . Several numerical results are provided to demonstrate our theoretical findings. Lastly, to address the problem that the bounds are often not directly applicable in practice due to the absence of the distributional knowledge of the data, we develop an algorithm (called InfoBoost) that dynamically adjusts the importance weights for both source and target data based on certain information measures. The empirical results show the effectiveness of the proposed algorithm.
迁移学习或领域适应涉及机器学习问题,其中训练数据和测试数据可能来自不同的概率分布。在这项工作中,我们对迁移学习算法的泛化误差和超额风险进行了信息理论分析。我们的结果表明,也许正如所料,库尔巴克-莱布勒(KL)分歧 $D(mu |mu ')$ 在表征中起着重要作用,其中 $mu $ 和 $mu '$ 分别表示训练数据和测试数据的分布。具体来说,我们为学习算法提供了泛化误差和超额风险上限,在训练阶段两种分布的数据都可用。由于认识到这些界限在一般情况下可能是次优的,我们通过中心条件做出更强的假设,为包括经验风险最小化(ERM)算法在内的某类算法提供了改进的超额风险上限。为了证明边界的实用性,我们进一步将分析扩展到吉布斯算法和噪声随机梯度下降法。然后,我们用其他发散(如$phi $ -发散和瓦瑟斯坦距离)来概括互信息约束,这可能会导致更严格的约束,并能处理 $mu $ 相对于 $mu '$ 不是绝对连续的情况。我们提供了一些数值结果来证明我们的理论发现。最后,为了解决由于缺乏数据分布知识而导致边界在实际中无法直接应用的问题,我们开发了一种算法(称为 InfoBoost),它可以根据某些信息度量动态调整源数据和目标数据的重要性权重。实证结果表明了所提算法的有效性。
{"title":"On the Generalization for Transfer Learning: An Information-Theoretic Analysis","authors":"Xuetong Wu;Jonathan H. Manton;Uwe Aickelin;Jingge Zhu","doi":"10.1109/TIT.2024.3441574","DOIUrl":"10.1109/TIT.2024.3441574","url":null,"abstract":"Transfer learning, or domain adaptation, is concerned with machine learning problems in which training and testing data come from possibly different probability distributions. In this work, we give an information-theoretic analysis of the generalization error and excess risk of transfer learning algorithms. Our results suggest, perhaps as expected, that the Kullback-Leibler (KL) divergence \u0000<inline-formula> <tex-math>$D(mu |mu ')$ </tex-math></inline-formula>\u0000 plays an important role in the characterizations where \u0000<inline-formula> <tex-math>$mu $ </tex-math></inline-formula>\u0000 and \u0000<inline-formula> <tex-math>$mu '$ </tex-math></inline-formula>\u0000 denote the distribution of the training data and the testing data, respectively. Specifically, we provide generalization error and excess risk upper bounds for learning algorithms where data from both distributions are available in the training phase. Recognizing that the bounds could be sub-optimal in general, we provide improved excess risk upper bounds for a certain class of algorithms, including the empirical risk minimization (ERM) algorithm, by making stronger assumptions through the central condition. To demonstrate the usefulness of the bounds, we further extend the analysis to the Gibbs algorithm and the noisy stochastic gradient descent method. We then generalize the mutual information bound with other divergences such as \u0000<inline-formula> <tex-math>$phi $ </tex-math></inline-formula>\u0000-divergence and Wasserstein distance, which may lead to tighter bounds and can handle the case when \u0000<inline-formula> <tex-math>$mu $ </tex-math></inline-formula>\u0000 is not absolutely continuous with respect to \u0000<inline-formula> <tex-math>$mu '$ </tex-math></inline-formula>\u0000. Several numerical results are provided to demonstrate our theoretical findings. Lastly, to address the problem that the bounds are often not directly applicable in practice due to the absence of the distributional knowledge of the data, we develop an algorithm (called InfoBoost) that dynamically adjusts the importance weights for both source and target data based on certain information measures. The empirical results show the effectiveness of the proposed algorithm.","PeriodicalId":13494,"journal":{"name":"IEEE Transactions on Information Theory","volume":"70 10","pages":"7089-7124"},"PeriodicalIF":2.2,"publicationDate":"2024-08-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142194959","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An open problem and a conjecture on binary linear complementary pairs of codes 关于二进制线性互补对码的一个未决问题和一个猜想
IF 2.5 3区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-13 DOI: 10.1109/tit.2024.3443090
Shitao Li, Minjia Shi, San Ling
{"title":"An open problem and a conjecture on binary linear complementary pairs of codes","authors":"Shitao Li, Minjia Shi, San Ling","doi":"10.1109/tit.2024.3443090","DOIUrl":"https://doi.org/10.1109/tit.2024.3443090","url":null,"abstract":"","PeriodicalId":13494,"journal":{"name":"IEEE Transactions on Information Theory","volume":"168 1","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-08-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142194901","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IEEE Transactions on Information Theory
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1