首页 > 最新文献

2020 IEEE International Symposium on Information Theory (ISIT)最新文献

英文 中文
A Novel B-MAP Proxy for Greedy Sparse Signal Recovery Algorithms 一种新的B-MAP代理贪婪稀疏信号恢复算法
Pub Date : 2020-06-01 DOI: 10.1109/ISIT44484.2020.9174022
Jeongmin Chae, Songnam Hong
We propose a novel greedy algorithm to recover a sparse signal from a small number of noisy measurements. In the proposed method, a new support index is identified for each iteration, based on bit-wise maximum a posteriori (B-MAP) detection. This approach is an optimal in the sense of detecting one of the remaining support indices, provided that all the indices during the previous iterations are perfectly recovered. Unfortunately, the exact computation of B-MAP detection is not practical since it requires a heavy marginalization of a highdimensional sparse vector to compute a posteriori probability of each remaining support. Our major contribution is to present a good proxy, named B-MAP proxy, on the a posteriori probability. The proposed proxy is easily evaluated only using vector correlations as in popular orthogonal matching pursuit (OMP) and accurate enough to represent a relative ordering on the probabilities. Via simulations, we demonstrate that the proposed greedy algorithm yields a higher recovery accuracy than the existing benchmark methods as OMP and MAP-OMP, having the same computational complexity.A full version of this paper is accessible at: https://arxiv.org/abs/1910.12512/
提出了一种从少量噪声测量中恢复稀疏信号的贪婪算法。在该方法中,基于逐位最大后验(B-MAP)检测,为每次迭代识别一个新的支持索引。这种方法在检测剩余的支持索引之一的意义上是最优的,前提是之前迭代中的所有索引都完全恢复。不幸的是,B-MAP检测的精确计算是不实际的,因为它需要对高维稀疏向量进行大量的边缘化来计算每个剩余支持的后验概率。我们的主要贡献是提出了一个很好的代理,命名为B-MAP代理,基于后验概率。所提出的代理仅使用流行的正交匹配追踪(OMP)中的向量相关性即可轻松评估,并且足够准确地表示概率的相对顺序。仿真结果表明,在计算复杂度相同的情况下,本文提出的贪心算法比现有的OMP和MAP-OMP等基准方法具有更高的恢复精度。本文的完整版本可在https://arxiv.org/abs/1910.12512/上获得
{"title":"A Novel B-MAP Proxy for Greedy Sparse Signal Recovery Algorithms","authors":"Jeongmin Chae, Songnam Hong","doi":"10.1109/ISIT44484.2020.9174022","DOIUrl":"https://doi.org/10.1109/ISIT44484.2020.9174022","url":null,"abstract":"We propose a novel greedy algorithm to recover a sparse signal from a small number of noisy measurements. In the proposed method, a new support index is identified for each iteration, based on bit-wise maximum a posteriori (B-MAP) detection. This approach is an optimal in the sense of detecting one of the remaining support indices, provided that all the indices during the previous iterations are perfectly recovered. Unfortunately, the exact computation of B-MAP detection is not practical since it requires a heavy marginalization of a highdimensional sparse vector to compute a posteriori probability of each remaining support. Our major contribution is to present a good proxy, named B-MAP proxy, on the a posteriori probability. The proposed proxy is easily evaluated only using vector correlations as in popular orthogonal matching pursuit (OMP) and accurate enough to represent a relative ordering on the probabilities. Via simulations, we demonstrate that the proposed greedy algorithm yields a higher recovery accuracy than the existing benchmark methods as OMP and MAP-OMP, having the same computational complexity.A full version of this paper is accessible at: https://arxiv.org/abs/1910.12512/","PeriodicalId":159311,"journal":{"name":"2020 IEEE International Symposium on Information Theory (ISIT)","volume":"297 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115135506","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Coding for Efficient DNA Synthesis 高效DNA合成编码
Pub Date : 2020-06-01 DOI: 10.1109/ISIT44484.2020.9174272
A. Lenz, Yi Liu, Cyrus Rashtchian, P. Siegel, A. Wachter-Zeh, Eitan Yaakobi
For DNA data storage to become a feasible technology, all aspects of the encoding and decoding pipeline must be optimized. Writing the data into DNA, which is known as DNA synthesis, is currently the most costly part of existing storage systems. As a step toward more efficient synthesis, we study the design of codes that minimize the time and number of required materials needed to produce the DNA strands. We consider a popular synthesis process that builds many strands in parallel in a step-by-step fashion using a fixed supersequence S. The machine iterates through S one nucleotide at a time, and in each cycle, it adds the next nucleotide to a subset of the strands. The synthesis time is determined by the length of S. We show that by introducing redundancy to the synthesized strands, we can significantly decrease the number of synthesis cycles. We derive the maximum amount of information per synthesis cycle assuming S is an arbitrary periodic sequence. To prove our results, we exhibit new connections to cost-constrained codes.
为了使DNA数据存储成为一种可行的技术,必须对编码和解码管道的各个方面进行优化。将数据写入DNA,即DNA合成,是目前现有存储系统中最昂贵的部分。作为迈向更高效合成的一步,我们研究了编码的设计,以最大限度地减少产生DNA链所需的时间和所需材料的数量。我们考虑一种流行的合成过程,使用固定的超序列S,以一步一步的方式并行构建许多链。机器一次迭代一个核苷酸,在每个循环中,它将下一个核苷酸添加到链的子集中。合成时间由s的长度决定。我们表明,通过在合成链中引入冗余,我们可以显著减少合成周期的数量。假设S是任意周期序列,我们推导出每个合成周期的最大信息量。为了证明我们的结果,我们展示了与成本约束代码的新连接。
{"title":"Coding for Efficient DNA Synthesis","authors":"A. Lenz, Yi Liu, Cyrus Rashtchian, P. Siegel, A. Wachter-Zeh, Eitan Yaakobi","doi":"10.1109/ISIT44484.2020.9174272","DOIUrl":"https://doi.org/10.1109/ISIT44484.2020.9174272","url":null,"abstract":"For DNA data storage to become a feasible technology, all aspects of the encoding and decoding pipeline must be optimized. Writing the data into DNA, which is known as DNA synthesis, is currently the most costly part of existing storage systems. As a step toward more efficient synthesis, we study the design of codes that minimize the time and number of required materials needed to produce the DNA strands. We consider a popular synthesis process that builds many strands in parallel in a step-by-step fashion using a fixed supersequence S. The machine iterates through S one nucleotide at a time, and in each cycle, it adds the next nucleotide to a subset of the strands. The synthesis time is determined by the length of S. We show that by introducing redundancy to the synthesized strands, we can significantly decrease the number of synthesis cycles. We derive the maximum amount of information per synthesis cycle assuming S is an arbitrary periodic sequence. To prove our results, we exhibit new connections to cost-constrained codes.","PeriodicalId":159311,"journal":{"name":"2020 IEEE International Symposium on Information Theory (ISIT)","volume":"41 12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116989197","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Classical Mechanism is Optimal in Classical-Quantum Differentially Private Mechanisms 经典机制在经典量子微分私有机制中是最优的
Pub Date : 2020-06-01 DOI: 10.1109/ISIT44484.2020.9174484
Yuuya Yoshida, Masahito Hayashi
Differential privacy (DP) is an influential privacy measure and has been studied to protect private data. DP has been often studied in classical probability theory, but few researchers studied quantum versions of DP. In this paper, we consider classical-quantum DP mechanisms which (i) convert binary private data to quantum states and (ii) satisfy a quantum version of the DP constraint. The class of classical-quantum DP mechanisms contains classical DP mechanisms. As a main result, we show that some classical DP mechanism optimizes any information quantity satisfying the information processing inequality. Therefore, the performance of classical DP mechanisms attains that of classical-quantum DP mechanisms.
差分隐私(DP)是一种很有影响力的隐私措施,被研究用于保护隐私数据。在经典概率论中对概率预测进行了较多的研究,但对量子概率预测的研究却很少。在本文中,我们考虑经典量子DP机制,它(i)将二进制私有数据转换为量子态,(ii)满足DP约束的量子版本。经典量子DP机制包含经典DP机制。主要结果表明,某些经典的DP机制对满足信息处理不等式的任意信息量都是最优的。因此,经典DP机制的性能达到了经典量子DP机制的性能。
{"title":"Classical Mechanism is Optimal in Classical-Quantum Differentially Private Mechanisms","authors":"Yuuya Yoshida, Masahito Hayashi","doi":"10.1109/ISIT44484.2020.9174484","DOIUrl":"https://doi.org/10.1109/ISIT44484.2020.9174484","url":null,"abstract":"Differential privacy (DP) is an influential privacy measure and has been studied to protect private data. DP has been often studied in classical probability theory, but few researchers studied quantum versions of DP. In this paper, we consider classical-quantum DP mechanisms which (i) convert binary private data to quantum states and (ii) satisfy a quantum version of the DP constraint. The class of classical-quantum DP mechanisms contains classical DP mechanisms. As a main result, we show that some classical DP mechanism optimizes any information quantity satisfying the information processing inequality. Therefore, the performance of classical DP mechanisms attains that of classical-quantum DP mechanisms.","PeriodicalId":159311,"journal":{"name":"2020 IEEE International Symposium on Information Theory (ISIT)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123564683","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Discrete Optimal Reconstruction Distributions for Itakura-Saito Distortion Measure Itakura-Saito失真测度的离散最优重构分布
Pub Date : 2020-06-01 DOI: 10.1109/ISIT44484.2020.9174352
Kazuho Watanabe
The optimal reconstruction distribution achieving the rate-distortion function is elusive except for limited examples of sources and distortion measures if the rate-distortion function is strictly greater than the Shannon lower bound. In this paper, focusing on the Itakura-Saito distortion measure, we prove that if the Shannon lower bound is not tight, the optimal reconstruction distribution is purely discrete. Combined with the fact that the Shannon lower bound is tight for the gamma source, this result shows that it is the only source that has continuous optimal reconstruction distributions for the range of entire positive rate.
如果率失真函数严格大于香农下界,除了有限的源和失真措施的例子外,实现率失真函数的最优重构分布是难以捉摸的。本文以Itakura-Saito畸变测度为研究对象,证明了在Shannon下界不紧的情况下,最优重构分布是纯离散的。结合伽玛源的Shannon下界是紧的这一事实,表明它是唯一在整个阳性率范围内具有连续最优重构分布的源。
{"title":"Discrete Optimal Reconstruction Distributions for Itakura-Saito Distortion Measure","authors":"Kazuho Watanabe","doi":"10.1109/ISIT44484.2020.9174352","DOIUrl":"https://doi.org/10.1109/ISIT44484.2020.9174352","url":null,"abstract":"The optimal reconstruction distribution achieving the rate-distortion function is elusive except for limited examples of sources and distortion measures if the rate-distortion function is strictly greater than the Shannon lower bound. In this paper, focusing on the Itakura-Saito distortion measure, we prove that if the Shannon lower bound is not tight, the optimal reconstruction distribution is purely discrete. Combined with the fact that the Shannon lower bound is tight for the gamma source, this result shows that it is the only source that has continuous optimal reconstruction distributions for the range of entire positive rate.","PeriodicalId":159311,"journal":{"name":"2020 IEEE International Symposium on Information Theory (ISIT)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125548178","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Interference Management without CSIT: A Broadcast Approach 无CSIT干扰管理:一种广播方法
Pub Date : 2020-06-01 DOI: 10.1109/ISIT44484.2020.9174000
Maha Zohdy, A. Tajer, S. Shamai
Effective interference management in the multiuser interference channel strongly hinges on the availability of the channel state information at the transmitters (CSIT). In a broad range of emerging large-scale and distributed networks (e.g., the Internet of Things), however, acquiring the CSIT is prohibitive, due to the extensive information exchange that it imposes. In such circumstances, as a result, the interference management approaches that rely on the CSIT lose their effectiveness. This paper focuses on the two-user interference channel, and proposes a broadcast approach to interference management. Its hallmark is that the transmitters, unlike the receivers, are completely oblivious to instantaneous channel states. Each transmitter splits its message into multiple superimposed encoded information layers, where each layer is adapted to a given possible state for the combined states of all channels. Depending on the relative strengths of the direct and interfering channels, each receiver opportunistically decodes a subset of the received layers from both transmitters. An average achievable rate region is delineated serving as an inner bound on the average capacity region of the Gaussian interference channel in the absence of CSIT. Finally, it characterizes the gap between the achievable average sum-rate and the sum-rate capacity with the full CSIT in the asymptote of high signal-to-noise ratio. Numerical evaluations show that the cost of lacking CSIT is often insignificant.
在多用户干扰信道中,有效的干扰管理很大程度上取决于发送端信道状态信息的可用性。然而,在新兴的大范围大规模和分布式网络(例如物联网)中,由于它所施加的广泛信息交换,获得CSIT是令人望而却步的。在这种情况下,依赖于CSIT的干扰管理方法失去了有效性。本文以双用户干扰信道为研究对象,提出了一种广播干扰管理方法。它的特点是,与接收器不同,发射器完全忽略了瞬时信道状态。每个发射器将其消息分成多个叠加的编码信息层,其中每个层都适应所有信道组合状态的给定可能状态。根据直接信道和干扰信道的相对强度,每个接收机可以随机地解码来自两个发射机的接收层的子集。在没有CSIT的情况下,描述了一个平均可实现速率区域作为高斯干涉信道平均容量区域的内界。最后,描述了在高信噪比渐近线上,满CSIT可实现的平均求和速率与求和速率容量之间的差距。数值评价表明,缺乏CSIT的代价往往微不足道。
{"title":"Interference Management without CSIT: A Broadcast Approach","authors":"Maha Zohdy, A. Tajer, S. Shamai","doi":"10.1109/ISIT44484.2020.9174000","DOIUrl":"https://doi.org/10.1109/ISIT44484.2020.9174000","url":null,"abstract":"Effective interference management in the multiuser interference channel strongly hinges on the availability of the channel state information at the transmitters (CSIT). In a broad range of emerging large-scale and distributed networks (e.g., the Internet of Things), however, acquiring the CSIT is prohibitive, due to the extensive information exchange that it imposes. In such circumstances, as a result, the interference management approaches that rely on the CSIT lose their effectiveness. This paper focuses on the two-user interference channel, and proposes a broadcast approach to interference management. Its hallmark is that the transmitters, unlike the receivers, are completely oblivious to instantaneous channel states. Each transmitter splits its message into multiple superimposed encoded information layers, where each layer is adapted to a given possible state for the combined states of all channels. Depending on the relative strengths of the direct and interfering channels, each receiver opportunistically decodes a subset of the received layers from both transmitters. An average achievable rate region is delineated serving as an inner bound on the average capacity region of the Gaussian interference channel in the absence of CSIT. Finally, it characterizes the gap between the achievable average sum-rate and the sum-rate capacity with the full CSIT in the asymptote of high signal-to-noise ratio. Numerical evaluations show that the cost of lacking CSIT is often insignificant.","PeriodicalId":159311,"journal":{"name":"2020 IEEE International Symposium on Information Theory (ISIT)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115339513","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Bursty Wireless Networks of Bounded Capacity 有限容量的突发无线网络
Pub Date : 2020-06-01 DOI: 10.1109/ISIT44484.2020.9174034
Grace Villacrés, T. Koch, G. Vazquez-Vilar
The channel capacity of wireless networks Is often studied under the assumption that the communicating nodes have perfect channel-state information and that interference is always present. In this paper, we study the channel capacity of a wireless network without these assumptions, i.e., a bursty noncoherent wireless network where the users are grouped in cells and the base-station features several receive antennas. We demonstrate that the channel capacity is bounded in the signal-to-noise ratio (SNR) when the number of receive antennas is finite and the probability of presence of interference is strictly positive.
研究无线网络的信道容量时,通常假设通信节点具有完备的信道状态信息,且总是存在干扰。在本文中,我们研究了没有这些假设的无线网络的信道容量,即一个突发非相干无线网络,其中用户分组在小区中,基站具有多个接收天线。我们证明了当接收天线数量有限且存在干扰的概率严格为正时,信道容量在信噪比(SNR)中是有界的。
{"title":"Bursty Wireless Networks of Bounded Capacity","authors":"Grace Villacrés, T. Koch, G. Vazquez-Vilar","doi":"10.1109/ISIT44484.2020.9174034","DOIUrl":"https://doi.org/10.1109/ISIT44484.2020.9174034","url":null,"abstract":"The channel capacity of wireless networks Is often studied under the assumption that the communicating nodes have perfect channel-state information and that interference is always present. In this paper, we study the channel capacity of a wireless network without these assumptions, i.e., a bursty noncoherent wireless network where the users are grouped in cells and the base-station features several receive antennas. We demonstrate that the channel capacity is bounded in the signal-to-noise ratio (SNR) when the number of receive antennas is finite and the probability of presence of interference is strictly positive.","PeriodicalId":159311,"journal":{"name":"2020 IEEE International Symposium on Information Theory (ISIT)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116043879","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the Algorithmic Computability of Achievability and Converse: ϵ-Capacity of Compound Channels and Asymptotic Bounds of Error-Correcting Codes 复合信道的可达性和逆:ϵ-Capacity的算法可计算性及纠错码的渐近界
Pub Date : 2020-06-01 DOI: 10.1109/ISIT44484.2020.9174342
H. Boche, R. Schaefer, H. Poor
A coding theorem consists of two parts: achievability and converse which establish lower and upper bounds on the capacity. This paper analyzes these bounds from a fundamental, algorithmic point of view by studying whether or not such bounds can be computed algorithmically in principle (without putting any constraints on the computational complexity of such algorithms). For this purpose, the concept of Turing machines is used which provides the fundamental performance limits of digital computers. To this end, computable continuous functions are studied and properties of computable sequences of such functions are identified. Subsequently, these findings are exemplarily applied to two different open problems. The first one is the ϵ-capacity of compound channels which is unknown to date. It is studied whether or not the ϵ-capacity can be algorithmically computed and it is shown that there is no computable characterization of the difference between computable upper and lower bounds possible. Thus, computable sharp lower and upper bounds on the ϵ-capacity of computable compound channels cannot exist. The crucial consequence is that the ϵ-capacity cannot be characterized by a finite-letter entropic expression. The second application involves asymptotic bounds for error-correcting codes which is a long-standing open problem in coding theory. Only lower and upper bounds are known which are not sharp. It is conjectured that the asymptotic bound is indeed a non-computable function which would then imply with the previous findings that it is impossible to find computable lower and upper bounds that are asymptotically tight.
一个编码定理由可得性和逆性两部分组成,它们建立了容量的下界和上界。本文从基本的、算法的角度分析这些边界,研究这些边界原则上是否可以算法计算(不限制这些算法的计算复杂度)。为此,图灵机的概念被使用,它提供了数字计算机的基本性能限制。为此,研究了可计算连续函数,并确定了这些函数的可计算序列的性质。随后,这些发现被典型地应用于两个不同的开放问题。第一个是复合通道的ϵ-capacity,这是迄今未知的。研究了ϵ-capacity是否可以算法计算,结果表明,对于可计算的上界和下界之差,不可能有可计算的表征。因此,在可计算复合通道ϵ-capacity上不存在可计算的尖锐下界和上界。关键的结果是ϵ-capacity不能用有限字母的熵表达式来表征。第二个应用涉及到纠错码的渐近界,这是编码理论中一个长期存在的开放性问题。只有下界和上界是已知的,它们是不明显的。我们推测渐近界确实是一个不可计算的函数,这就意味着不可能找到渐近紧的可计算下界和上界。
{"title":"On the Algorithmic Computability of Achievability and Converse: ϵ-Capacity of Compound Channels and Asymptotic Bounds of Error-Correcting Codes","authors":"H. Boche, R. Schaefer, H. Poor","doi":"10.1109/ISIT44484.2020.9174342","DOIUrl":"https://doi.org/10.1109/ISIT44484.2020.9174342","url":null,"abstract":"A coding theorem consists of two parts: achievability and converse which establish lower and upper bounds on the capacity. This paper analyzes these bounds from a fundamental, algorithmic point of view by studying whether or not such bounds can be computed algorithmically in principle (without putting any constraints on the computational complexity of such algorithms). For this purpose, the concept of Turing machines is used which provides the fundamental performance limits of digital computers. To this end, computable continuous functions are studied and properties of computable sequences of such functions are identified. Subsequently, these findings are exemplarily applied to two different open problems. The first one is the ϵ-capacity of compound channels which is unknown to date. It is studied whether or not the ϵ-capacity can be algorithmically computed and it is shown that there is no computable characterization of the difference between computable upper and lower bounds possible. Thus, computable sharp lower and upper bounds on the ϵ-capacity of computable compound channels cannot exist. The crucial consequence is that the ϵ-capacity cannot be characterized by a finite-letter entropic expression. The second application involves asymptotic bounds for error-correcting codes which is a long-standing open problem in coding theory. Only lower and upper bounds are known which are not sharp. It is conjectured that the asymptotic bound is indeed a non-computable function which would then imply with the previous findings that it is impossible to find computable lower and upper bounds that are asymptotically tight.","PeriodicalId":159311,"journal":{"name":"2020 IEEE International Symposium on Information Theory (ISIT)","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122411287","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Rate-Diversity Optimal Multiblock Space-Time Codes via Sum-Rank Codes 基于和秩码的速率分集优化多块空时码
Pub Date : 2020-06-01 DOI: 10.1109/ISIT44484.2020.9174329
Mohannad Shehadeh, F. Kschischang
Just as rank-metric or Gabidulin codes may be used to construct rate-diversity tradeoff optimal space-time codes, a recently introduced generalization for the sum-rank metric, linearized Reed-Solomon codes, accomplishes the same in the case of multiple fading blocks. We provide the first explicit construction of minimal-delay rate-diversity optimal multiblock space-time codes as an application of linearized Reed-Solomon codes. We then demonstrate in simulation an example of a 2-block 2-by-2 code which, with a small performance penalty—less than 1 dB at a codeword error rate of 1e-4—matches the bit rate of a full diversity alternative while using a much smaller transmitted constellation. A stack decoder for this code is then suggested.
正如秩-度量码或Gabidulin码可用于构建率分集权衡最优空时码一样,最近引入的一种对秩和度量的推广,即线性化Reed-Solomon码,在多个衰落块的情况下实现了相同的目标。作为线性化Reed-Solomon码的应用,我们首次明确构造了最小延迟率分集的最优多块空时码。然后,我们在模拟中演示了一个2块2乘2码的示例,该示例具有较小的性能损失(在码字错误率为1e-4时小于1 dB),与使用更小的传输星座时的全分集替代方案的比特率相匹配。然后建议对此代码使用堆栈解码器。
{"title":"Rate-Diversity Optimal Multiblock Space-Time Codes via Sum-Rank Codes","authors":"Mohannad Shehadeh, F. Kschischang","doi":"10.1109/ISIT44484.2020.9174329","DOIUrl":"https://doi.org/10.1109/ISIT44484.2020.9174329","url":null,"abstract":"Just as rank-metric or Gabidulin codes may be used to construct rate-diversity tradeoff optimal space-time codes, a recently introduced generalization for the sum-rank metric, linearized Reed-Solomon codes, accomplishes the same in the case of multiple fading blocks. We provide the first explicit construction of minimal-delay rate-diversity optimal multiblock space-time codes as an application of linearized Reed-Solomon codes. We then demonstrate in simulation an example of a 2-block 2-by-2 code which, with a small performance penalty—less than 1 dB at a codeword error rate of 1e-4—matches the bit rate of a full diversity alternative while using a much smaller transmitted constellation. A stack decoder for this code is then suggested.","PeriodicalId":159311,"journal":{"name":"2020 IEEE International Symposium on Information Theory (ISIT)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121914333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Multi-Cast Channels with Hierarchical Flow 具有分层流的多播通道
Pub Date : 2020-06-01 DOI: 10.1109/ISIT44484.2020.9174439
Jonathan Ponniah, Liang-Liang Xie
A general network is studied in which messages are relayed from multiple sources to multiple destinations according to a certain hierarchical order. The framework of flow decomposition is used to show the class of regular-order decode-forward index-coding schemes is computable. A shifting algorithm finds encoding/decoding schemes in ${text{P}}(|mathcal{N}|){text{EXP}}(|mathcal{S}|)$ time that achieve desired rate-vectors, where $mathcal{N}$ is the set of nodes and $mathcal{S} subseteq mathcal{N}$ is the subset of source nodes in the channel.
研究了一种通用网络,在这种网络中,消息按照一定的层次顺序从多个源转发到多个目的地。利用流分解的框架证明了一类正序前向译码索引编码方案是可计算的。移动算法在${text{P}}(|mathcal{N}|){text{EXP}}(|mathcal{S}|)$ time中找到实现所需速率向量的编码/解码方案,其中$mathcal{N}$是节点的集合,$mathcal{S} subseteq mathcal{N}$是信道中源节点的子集。
{"title":"Multi-Cast Channels with Hierarchical Flow","authors":"Jonathan Ponniah, Liang-Liang Xie","doi":"10.1109/ISIT44484.2020.9174439","DOIUrl":"https://doi.org/10.1109/ISIT44484.2020.9174439","url":null,"abstract":"A general network is studied in which messages are relayed from multiple sources to multiple destinations according to a certain hierarchical order. The framework of flow decomposition is used to show the class of regular-order decode-forward index-coding schemes is computable. A shifting algorithm finds encoding/decoding schemes in ${text{P}}(|mathcal{N}|){text{EXP}}(|mathcal{S}|)$ time that achieve desired rate-vectors, where $mathcal{N}$ is the set of nodes and $mathcal{S} subseteq mathcal{N}$ is the subset of source nodes in the channel.","PeriodicalId":159311,"journal":{"name":"2020 IEEE International Symposium on Information Theory (ISIT)","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117300146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mechanisms for Hiding Sensitive Genotypes with Information-Theoretic Privacy 利用信息论隐私隐藏敏感基因型的机制
Pub Date : 2020-06-01 DOI: 10.1109/ISIT44484.2020.9174492
Fangwei Ye, Hyunghoon Cho, S. Rouayheb
The growing availability of personal genomics services comes with increasing concerns for genomic privacy. Individuals may wish to withhold sensitive genotypes that contain critical health-related information when sharing their data with such services. A straightforward solution that masks only the sensitive genotypes does not ensure privacy due to the correlation structure within the genome. Here, we develop an informationtheoretic mechanism for masking sensitive genotypes, which ensures no information about the sensitive genotypes is leaked. We also propose an efficient algorithmic implementation of our mechanism for genomic data governed by hidden Markov models. Our work is a step towards more rigorous control of privacy in genomic data sharing.
随着个人基因组服务的日益普及,人们对基因组隐私的担忧也日益增加。个人在与此类服务共享数据时,可能希望保留包含关键健康相关信息的敏感基因型。由于基因组内的相关结构,仅掩盖敏感基因型的直接解决方案并不能确保隐私。在此,我们开发了一种信息理论机制来掩盖敏感基因型,以确保敏感基因型的信息不被泄露。我们还提出了一种有效的算法来实现由隐马尔可夫模型控制的基因组数据机制。我们的工作是朝着更严格地控制基因组数据共享中的隐私迈出的一步。
{"title":"Mechanisms for Hiding Sensitive Genotypes with Information-Theoretic Privacy","authors":"Fangwei Ye, Hyunghoon Cho, S. Rouayheb","doi":"10.1109/ISIT44484.2020.9174492","DOIUrl":"https://doi.org/10.1109/ISIT44484.2020.9174492","url":null,"abstract":"The growing availability of personal genomics services comes with increasing concerns for genomic privacy. Individuals may wish to withhold sensitive genotypes that contain critical health-related information when sharing their data with such services. A straightforward solution that masks only the sensitive genotypes does not ensure privacy due to the correlation structure within the genome. Here, we develop an informationtheoretic mechanism for masking sensitive genotypes, which ensures no information about the sensitive genotypes is leaked. We also propose an efficient algorithmic implementation of our mechanism for genomic data governed by hidden Markov models. Our work is a step towards more rigorous control of privacy in genomic data sharing.","PeriodicalId":159311,"journal":{"name":"2020 IEEE International Symposium on Information Theory (ISIT)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128319846","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
期刊
2020 IEEE International Symposium on Information Theory (ISIT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1