首页 > 最新文献

2020 IEEE International Symposium on Information Theory (ISIT)最新文献

英文 中文
Multi-User Distillation of Common Randomness and Entanglement from Quantum States 来自量子态的共同随机性和纠缠的多用户蒸馏
Pub Date : 2020-06-01 DOI: 10.1109/ISIT44484.2020.9174362
Farzin Salek, A. Winter
The tasks of converting noisy multipartite quantum correlations into noiseless classical and quantum ones using local operations and classical communications (LOCC) are studied. For the former, known as common randomness (CR) distillation, two novel lower bounds on the "distillable common randomness", an operational measure of the total genuine (classical) correlations in a quantum state, are obtained. Our proof relies on a generalization of communication for omniscience (CO) [Csiszár and Narayan, IEEE Trans. Inf. Theory 50: 3047-3061, 2004]. For the latter, we derive two lower bounds on the rate at which Greenberger-Horne-Zeilinger (GHZ) states can be asymptotically distilled from any given pure state under LOCC. Our approach consists in "making coherent" the proposed CR distillation protocols and recycling of resources [Devetak, Harrow and Winter, IEEE Trans. Inf. Theory 54:4587-4618, 2008]. The first lower bound is identical to a recent result by Vrana and Christandl [IEEE Trans. Inf. Theory 65:5945-5958, 2019], which is based on a combinatorial approach to achieve the same rate. Our second lower bound generalises and improves upon this result, and unifies a number of other known lower bounds on GHZ distillation. Full details in the long version [1].
研究了利用局部运算和经典通信(LOCC)将有噪声的多部量子相关转换为无噪声的经典和量子相关的任务。对于前者,称为共同随机性(CR)蒸馏,获得了“可蒸馏的共同随机性”的两个新的下界,这是量子态中总真实(经典)相关的操作度量。我们的证明依赖于全知通信(CO)的泛化[Csiszár和Narayan, IEEE Trans]。[j].科学通报,2004,(2):1 - 4。对于后者,我们导出了在LOCC下,任一给定的纯态可以渐近地提取出greenberger - horn - zeilinger (GHZ)态的速率的两个下界。我们的方法包括“使一致”提出的CR蒸馏协议和资源回收[Devetak, Harrow和Winter, IEEE Trans]。[j].科学通报,2008。第一个下界与Vrana和Christandl [IEEE Trans]最近的结果相同。Inf. Theory 65:5945-5958, 2019],它基于一种组合方法来实现相同的速率。我们的第二个下界推广和改进了这个结果,并统一了一些其他已知的GHZ蒸馏下界。详细信息见[1]长版本。
{"title":"Multi-User Distillation of Common Randomness and Entanglement from Quantum States","authors":"Farzin Salek, A. Winter","doi":"10.1109/ISIT44484.2020.9174362","DOIUrl":"https://doi.org/10.1109/ISIT44484.2020.9174362","url":null,"abstract":"The tasks of converting noisy multipartite quantum correlations into noiseless classical and quantum ones using local operations and classical communications (LOCC) are studied. For the former, known as common randomness (CR) distillation, two novel lower bounds on the \"distillable common randomness\", an operational measure of the total genuine (classical) correlations in a quantum state, are obtained. Our proof relies on a generalization of communication for omniscience (CO) [Csiszár and Narayan, IEEE Trans. Inf. Theory 50: 3047-3061, 2004]. For the latter, we derive two lower bounds on the rate at which Greenberger-Horne-Zeilinger (GHZ) states can be asymptotically distilled from any given pure state under LOCC. Our approach consists in \"making coherent\" the proposed CR distillation protocols and recycling of resources [Devetak, Harrow and Winter, IEEE Trans. Inf. Theory 54:4587-4618, 2008]. The first lower bound is identical to a recent result by Vrana and Christandl [IEEE Trans. Inf. Theory 65:5945-5958, 2019], which is based on a combinatorial approach to achieve the same rate. Our second lower bound generalises and improves upon this result, and unifies a number of other known lower bounds on GHZ distillation. Full details in the long version [1].","PeriodicalId":159311,"journal":{"name":"2020 IEEE International Symposium on Information Theory (ISIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129069967","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Quadratic Privacy-Signaling Games and Payoff Dominant Equilibria 二次隐私信号对策与收益优势均衡
Pub Date : 2020-06-01 DOI: 10.1109/ISIT44484.2020.9174355
Ertan Kazıklı, S. Gezici, S. Yüksel
We consider a privacy-signaling game problem in which a transmitter with privacy concerns and a receiver, which does not pay attention to these privacy concerns, communicate. In this communication scenario, the transmitter observes a pair of correlated random variables which are modeled as jointly Gaussian. The transmitter constructs its message based on these random variables with the aim to hide one of them and convey the other one. In contrast, the objective of the receiver is to accurately estimate both of the random variables so as to gather as much information as possible. These conflicting objectives are analyzed in a game theoretic framework where depending on the commitment conditions (of the sender), we consider Nash or Stackelberg equilibria. We show that a payoff dominant (i.e., most desirable for both players) Nash equilibrium is attained by affine policies and we explicitly characterize these policies. In addition, the strategies at the characterized Nash equilibrium is shown to form also a Stackelberg equilibrium. Furthermore, we show that there always exists an informative Stackelberg equilibrium for the multidimensional parameter setup. We also revisit the information bottleneck problem within our Stackelberg framework under the mean squared error distortion criterion where the information bottleneck setup has a further restriction that only one of the parameters is observed at the sender. We fully characterize the Stackelberg equilibria under certain conditions and when these conditions are not met we establish the existence of informative equilibria.
我们考虑一个隐私信号博弈问题,其中一个具有隐私问题的发送者和一个不关注这些隐私问题的接收者进行通信。在这种通信场景中,发射机观察到一对相关的随机变量,它们被建模为联合高斯。发射机根据这些随机变量构造自己的信息,目的是隐藏其中一个,传递另一个。相反,接收者的目标是准确地估计两个随机变量,以收集尽可能多的信息。这些相互冲突的目标在博弈论框架中进行分析,根据(发送者)的承诺条件,我们考虑纳什或斯塔克尔伯格均衡。我们证明了一个收益优势(即,双方最理想的)纳什均衡是通过仿射策略实现的,我们明确地描述了这些策略。此外,在特征纳什均衡下的策略也形成了Stackelberg均衡。此外,我们证明了多维参数设置总是存在一个信息Stackelberg平衡。我们还在均方误差失真准则下重新审视Stackelberg框架中的信息瓶颈问题,其中信息瓶颈设置有一个进一步的限制,即在发送端只观察到一个参数。我们在一定条件下充分刻画了Stackelberg均衡,当这些条件不满足时,我们建立了信息均衡的存在性。
{"title":"Quadratic Privacy-Signaling Games and Payoff Dominant Equilibria","authors":"Ertan Kazıklı, S. Gezici, S. Yüksel","doi":"10.1109/ISIT44484.2020.9174355","DOIUrl":"https://doi.org/10.1109/ISIT44484.2020.9174355","url":null,"abstract":"We consider a privacy-signaling game problem in which a transmitter with privacy concerns and a receiver, which does not pay attention to these privacy concerns, communicate. In this communication scenario, the transmitter observes a pair of correlated random variables which are modeled as jointly Gaussian. The transmitter constructs its message based on these random variables with the aim to hide one of them and convey the other one. In contrast, the objective of the receiver is to accurately estimate both of the random variables so as to gather as much information as possible. These conflicting objectives are analyzed in a game theoretic framework where depending on the commitment conditions (of the sender), we consider Nash or Stackelberg equilibria. We show that a payoff dominant (i.e., most desirable for both players) Nash equilibrium is attained by affine policies and we explicitly characterize these policies. In addition, the strategies at the characterized Nash equilibrium is shown to form also a Stackelberg equilibrium. Furthermore, we show that there always exists an informative Stackelberg equilibrium for the multidimensional parameter setup. We also revisit the information bottleneck problem within our Stackelberg framework under the mean squared error distortion criterion where the information bottleneck setup has a further restriction that only one of the parameters is observed at the sender. We fully characterize the Stackelberg equilibria under certain conditions and when these conditions are not met we establish the existence of informative equilibria.","PeriodicalId":159311,"journal":{"name":"2020 IEEE International Symposium on Information Theory (ISIT)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129126097","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
On the Randomized Babai Point 关于随机Babai点
Pub Date : 2020-06-01 DOI: 10.1109/ISIT44484.2020.9174519
X. Chang, Zhilong Chen, Yingzi Xu
Estimating the integer parameter vector in a linear model with additive Gaussian noise arises from many applications, including communications. The optimal approach is to solve an integer least squares (ILS) problem, which is unfortunately NP-hard. Recently Klein’s randomized algorithm, which finds a sub-optimal solution to the ILS problem, to be referred to as the randomized Babai point, has attracted much attention. This paper presents a formula of the success probability of the randomized Babai point and some interesting properties, and compares it with the deterministic Babai point.
在具有加性高斯噪声的线性模型中估计整数参数向量有许多应用,包括通信。最优方法是解决整数最小二乘(ILS)问题,不幸的是,这是np困难的。最近Klein的随机化算法引起了人们的广泛关注,该算法为ILS问题寻找次优解,称为随机巴巴伊点。本文给出了随机化巴贝点的成功概率公式和一些有趣的性质,并将其与确定性巴贝点进行了比较。
{"title":"On the Randomized Babai Point","authors":"X. Chang, Zhilong Chen, Yingzi Xu","doi":"10.1109/ISIT44484.2020.9174519","DOIUrl":"https://doi.org/10.1109/ISIT44484.2020.9174519","url":null,"abstract":"Estimating the integer parameter vector in a linear model with additive Gaussian noise arises from many applications, including communications. The optimal approach is to solve an integer least squares (ILS) problem, which is unfortunately NP-hard. Recently Klein’s randomized algorithm, which finds a sub-optimal solution to the ILS problem, to be referred to as the randomized Babai point, has attracted much attention. This paper presents a formula of the success probability of the randomized Babai point and some interesting properties, and compares it with the deterministic Babai point.","PeriodicalId":159311,"journal":{"name":"2020 IEEE International Symposium on Information Theory (ISIT)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114229008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Efficient Maximum-Likelihood Decoding of Reed–Muller RM(m−3,m) Codes Reed-Muller RM(m−3,m)码的高效最大似然译码
Pub Date : 2020-06-01 DOI: 10.1109/ISIT44484.2020.9174065
A. Thangaraj, H. Pfister
Reed–Muller (RM) codes, a classical family of codes known for their elegant algebraic structure, have recently been shown to achieve capacity under maximum-likelihood (ML) decoding on the binary erasure channel and this has rekindled interest in their efficient decoding. We consider the code family RM(m−3,m) and develop a new ML decoder, for transmission over the binary symmetric channel, that exploits their large symmetry group. The new decoder has lower complexity than an earlier method introduced by Seroussi and Lempel in 1983.
Reed-Muller (RM)码是一种以其优雅的代数结构而闻名的经典码族,最近在二进制擦除信道上显示出在最大似然(ML)解码下的容量,这重新引起了人们对其有效解码的兴趣。我们考虑编码族RM(m−3,m),并开发了一种新的ML解码器,用于在二进制对称信道上传输,利用它们的大对称群。新的解码器比Seroussi和Lempel在1983年引入的更早的方法具有更低的复杂性。
{"title":"Efficient Maximum-Likelihood Decoding of Reed–Muller RM(m−3,m) Codes","authors":"A. Thangaraj, H. Pfister","doi":"10.1109/ISIT44484.2020.9174065","DOIUrl":"https://doi.org/10.1109/ISIT44484.2020.9174065","url":null,"abstract":"Reed–Muller (RM) codes, a classical family of codes known for their elegant algebraic structure, have recently been shown to achieve capacity under maximum-likelihood (ML) decoding on the binary erasure channel and this has rekindled interest in their efficient decoding. We consider the code family RM(m−3,m) and develop a new ML decoder, for transmission over the binary symmetric channel, that exploits their large symmetry group. The new decoder has lower complexity than an earlier method introduced by Seroussi and Lempel in 1983.","PeriodicalId":159311,"journal":{"name":"2020 IEEE International Symposium on Information Theory (ISIT)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114528789","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A Two-way QKD Protocol Outperforming One-way Protocols at Low QBER 双向QKD协议在低QBER下优于单向协议
Pub Date : 2020-06-01 DOI: 10.1109/ISIT44484.2020.9174522
Jari Lietzén, R. Vehkalahti, O. Tirkkonen
Two-way quantum key distribution (QKD) protocols can provide positive secret key rates for considerably higher quantum bit error rates (QBER) than one-way protocols. However, when QBER is low, only modest key rate gains have been achieved. This is one of the major obstacles for using two-way protocols. In this paper we introduce a new two-way QKD protocol which is a step towards overcoming this shortcoming. Under the assumption that the eavesdropper can only perform individual symmetric quantum attacks, our protocol performs quantum key distribution with a secret key rate that is higher than the information theoretical bound limiting the performance of any one-way protocol. This holds true also for very low QBER values.
双向量子密钥分发(QKD)协议可以在比单向协议高得多的量子误码率(QBER)下提供正密钥速率。然而,当QBER较低时,只实现了适度的关键利率增长。这是使用双向协议的主要障碍之一。在本文中,我们介绍了一种新的双向QKD协议,这是克服这一缺点的一步。在假设窃听者只能进行单个对称量子攻击的情况下,我们的协议以高于限制任何单向协议性能的信息理论边界的秘钥速率进行量子密钥分发。这也适用于非常低的QBER值。
{"title":"A Two-way QKD Protocol Outperforming One-way Protocols at Low QBER","authors":"Jari Lietzén, R. Vehkalahti, O. Tirkkonen","doi":"10.1109/ISIT44484.2020.9174522","DOIUrl":"https://doi.org/10.1109/ISIT44484.2020.9174522","url":null,"abstract":"Two-way quantum key distribution (QKD) protocols can provide positive secret key rates for considerably higher quantum bit error rates (QBER) than one-way protocols. However, when QBER is low, only modest key rate gains have been achieved. This is one of the major obstacles for using two-way protocols. In this paper we introduce a new two-way QKD protocol which is a step towards overcoming this shortcoming. Under the assumption that the eavesdropper can only perform individual symmetric quantum attacks, our protocol performs quantum key distribution with a secret key rate that is higher than the information theoretical bound limiting the performance of any one-way protocol. This holds true also for very low QBER values.","PeriodicalId":159311,"journal":{"name":"2020 IEEE International Symposium on Information Theory (ISIT)","volume":"279 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114622662","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Bounding the Achievable Region of Sparse NOMA 稀疏NOMA的可达区域边界
Pub Date : 2020-06-01 DOI: 10.1109/ISIT44484.2020.9174238
B. M. Zaidel, O. Shental, S. Shamai
Non-orthogonal multiple access (NOMA) is a promising technology in the design of efficient state-of-the-art communication, particularly 5G and beyond cellular systems. Understanding its fundamental information-theoretic limits is hence of paramount interest. This paper focuses on regular sparse NOMA (where only a fixed and finite number of orthogonal resources is allocated to any designated user, and vice versa), and extends a previous analysis by the authors to a setting where the system comprises two classes of users with different power constraints. Explicit rigorous closed-form analytical inner and outer bounds on the achievable rate (total class throughput) region in the large-system limit are derived. The inner bound is based on the conditional vector entropy power inequality (EPI), while the outer bound relies on a recent strengthened version of the EPI by Courtade. The closed-form bounds provide valuable insights into the potential performance gains of regular sparse NOMA in practically oriented settings, comprising, e.g., a combination of low-complexity devices and broadband users with higher transmit power capabilities, or combinations of cell-edge users with users located close to the cell center. Conditions are identified where superior performance over dense code-domain NOMA is guaranteed, and a relatively small gap to the ultimate performance limits is attainable. The bounds may also serve as a useful tool for future analyses involving interference networks, as, e.g., Wyner-type cellular models.
非正交多址(NOMA)是一种很有前途的技术,适用于设计最先进的高效通信,特别是5G及以后的蜂窝系统。因此,了解其基本的信息论限制是最重要的。本文的重点是正则稀疏NOMA(其中只有固定和有限数量的正交资源分配给任何指定用户,反之亦然),并将作者之前的分析扩展到系统包含两类具有不同功率约束的用户的设置。导出了大系统极限下可达速率(总类吞吐量)区域的显式严格封闭解析内界和外界。内界基于条件向量熵功率不等式(EPI),而外界依赖于Courtade最近加强的EPI版本。封闭形式的边界为常规稀疏NOMA在面向实际的设置中潜在的性能增益提供了有价值的见解,这些设置包括,例如,低复杂性设备和具有更高发射功率能力的宽带用户的组合,或蜂窝边缘用户与靠近蜂窝中心的用户的组合。确定了保证优于密集代码域NOMA的性能的条件,并且可以实现与最终性能限制相对较小的差距。边界也可以作为一个有用的工具,用于涉及干扰网络的未来分析,例如,wyner型细胞模型。
{"title":"Bounding the Achievable Region of Sparse NOMA","authors":"B. M. Zaidel, O. Shental, S. Shamai","doi":"10.1109/ISIT44484.2020.9174238","DOIUrl":"https://doi.org/10.1109/ISIT44484.2020.9174238","url":null,"abstract":"Non-orthogonal multiple access (NOMA) is a promising technology in the design of efficient state-of-the-art communication, particularly 5G and beyond cellular systems. Understanding its fundamental information-theoretic limits is hence of paramount interest. This paper focuses on regular sparse NOMA (where only a fixed and finite number of orthogonal resources is allocated to any designated user, and vice versa), and extends a previous analysis by the authors to a setting where the system comprises two classes of users with different power constraints. Explicit rigorous closed-form analytical inner and outer bounds on the achievable rate (total class throughput) region in the large-system limit are derived. The inner bound is based on the conditional vector entropy power inequality (EPI), while the outer bound relies on a recent strengthened version of the EPI by Courtade. The closed-form bounds provide valuable insights into the potential performance gains of regular sparse NOMA in practically oriented settings, comprising, e.g., a combination of low-complexity devices and broadband users with higher transmit power capabilities, or combinations of cell-edge users with users located close to the cell center. Conditions are identified where superior performance over dense code-domain NOMA is guaranteed, and a relatively small gap to the ultimate performance limits is attainable. The bounds may also serve as a useful tool for future analyses involving interference networks, as, e.g., Wyner-type cellular models.","PeriodicalId":159311,"journal":{"name":"2020 IEEE International Symposium on Information Theory (ISIT)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114718327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Interleaved Block Coding for Achieving Gaussian Random Access Channel Capacity 实现高斯随机接入信道容量的交错分组编码
Pub Date : 2020-06-01 DOI: 10.1109/ISIT44484.2020.9174008
Tugcan Aktas, P. Sen
This paper studies the detection problem for the Gaussian random access channels, in which only a randomly chosen αK out of K senders wish to convey their messages to a receiver that has the side information of which sender is actively transmitting. A novel coding scheme, referred to as L-interleaved block coding, based on interleaving L single-user codes and successive cancellation decoding is proposed for the symmetric rate tuples in the capacity region of this channel. L-interleaved block coding with L sufficiently large is shown to achieve arbitrarily close to the symmetric capacity. Therefore, it replaces the efforts of finding capacity achieving codes for the Gaussian random access channels with selecting L off-the-shelf codes for Gaussian point-to-point channels for L sufficiently large. An example illustrates that this scheme with a small number of blocks (L = 16) achieves more than 0.95 of the symmetric capacity when two senders are active.
本文研究了高斯随机接入信道的检测问题,其中K个发送方中只有随机选择的αK个发送方希望将其消息传递给具有主动发送方的侧信息的接收方。针对该信道容量区域的对称速率元组,提出了一种基于交错L单用户码和连续对消译码的L交错分组编码方案。L足够大的L交织块编码可以实现任意接近对称容量。因此,它取代了为高斯随机接入信道寻找容量实现码的努力,为L足够大的高斯点对点信道选择L个现成的码。一个例子表明,当两个发送方都处于活动状态时,该方案具有少量块(L = 16),可以达到对称容量的0.95以上。
{"title":"Interleaved Block Coding for Achieving Gaussian Random Access Channel Capacity","authors":"Tugcan Aktas, P. Sen","doi":"10.1109/ISIT44484.2020.9174008","DOIUrl":"https://doi.org/10.1109/ISIT44484.2020.9174008","url":null,"abstract":"This paper studies the detection problem for the Gaussian random access channels, in which only a randomly chosen αK out of K senders wish to convey their messages to a receiver that has the side information of which sender is actively transmitting. A novel coding scheme, referred to as L-interleaved block coding, based on interleaving L single-user codes and successive cancellation decoding is proposed for the symmetric rate tuples in the capacity region of this channel. L-interleaved block coding with L sufficiently large is shown to achieve arbitrarily close to the symmetric capacity. Therefore, it replaces the efforts of finding capacity achieving codes for the Gaussian random access channels with selecting L off-the-shelf codes for Gaussian point-to-point channels for L sufficiently large. An example illustrates that this scheme with a small number of blocks (L = 16) achieves more than 0.95 of the symmetric capacity when two senders are active.","PeriodicalId":159311,"journal":{"name":"2020 IEEE International Symposium on Information Theory (ISIT)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127781093","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
How else can we define Information Flow in Neural Circuits? 我们还能如何定义神经回路中的信息流呢?
Pub Date : 2020-06-01 DOI: 10.1109/ISIT44484.2020.9174028
Praveen Venkatesh, Sanghamitra Dutta, P. Grover
Recently, we developed a systematic framework for defining and inferring flows of information about a specific message in neural circuits [2], [3]. We defined a computational model of a neural circuit consisting of computational nodes and transmissions being sent between these nodes over time. We then gave a formal definition of information flow pertaining to a specific message, which was capable of identifying paths along which information flowed in such a system. However, this definition also had some non-intuitive properties, such as the existence of "orphans"—nodes from which information flowed out, even though no information flowed in. In part, these non-intuitive properties arose because we restricted our attention to measures that were functions of transmissions at a single time instant, and measures that were observational rather than counterfactual. In this paper, we consider alternative definitions, including one that is a function of transmissions at multiple time instants, one that is counterfactual, and a new observational definition. We show that a definition of information flow based on counterfactual causal influence (CCI) guarantees the existence of information paths while also having no orphans. We also prove that no observational definition of information flow that satisfies the information path property can match CCI in every instance. Furthermore, each of the definitions we examine (including CCI) is shown to have examples in which the information flow can take a non-intuitive path. Nevertheless, we believe our framework remains more amenable to drawing clear interpretations than classical tools used in neuroscience, such as Granger Causality.The full version of this paper is available online [1].
最近,我们开发了一个系统框架,用于定义和推断神经回路中特定信息的信息流[2],[3]。我们定义了一个神经回路的计算模型,由计算节点和这些节点之间随时间发送的传输组成。然后,我们给出了与特定消息相关的信息流的正式定义,该定义能够识别信息在这样的系统中流动的路径。然而,这个定义也有一些非直观的属性,比如“孤儿”的存在——即使没有信息流入,信息也会从这些节点流出。在某种程度上,这些非直觉性质的出现,是因为我们把注意力限制在单一时间瞬间传输的函数上,以及观察性而非反事实性的测量上。在本文中,我们考虑了替代定义,包括一个是多个时间瞬间传输的函数,一个是反事实的,以及一个新的观测定义。我们证明了基于反事实因果影响(CCI)的信息流定义保证了信息路径的存在,同时也没有孤儿。我们还证明了任何满足信息路径属性的信息流观测定义都不能在每个实例中匹配CCI。此外,我们研究的每个定义(包括CCI)都显示了一些示例,其中信息流可以采用非直观的路径。尽管如此,我们相信我们的框架仍然比神经科学中使用的经典工具(如格兰杰因果关系)更容易得到清晰的解释。全文可在网上查阅[1]。
{"title":"How else can we define Information Flow in Neural Circuits?","authors":"Praveen Venkatesh, Sanghamitra Dutta, P. Grover","doi":"10.1109/ISIT44484.2020.9174028","DOIUrl":"https://doi.org/10.1109/ISIT44484.2020.9174028","url":null,"abstract":"Recently, we developed a systematic framework for defining and inferring flows of information about a specific message in neural circuits [2], [3]. We defined a computational model of a neural circuit consisting of computational nodes and transmissions being sent between these nodes over time. We then gave a formal definition of information flow pertaining to a specific message, which was capable of identifying paths along which information flowed in such a system. However, this definition also had some non-intuitive properties, such as the existence of \"orphans\"—nodes from which information flowed out, even though no information flowed in. In part, these non-intuitive properties arose because we restricted our attention to measures that were functions of transmissions at a single time instant, and measures that were observational rather than counterfactual. In this paper, we consider alternative definitions, including one that is a function of transmissions at multiple time instants, one that is counterfactual, and a new observational definition. We show that a definition of information flow based on counterfactual causal influence (CCI) guarantees the existence of information paths while also having no orphans. We also prove that no observational definition of information flow that satisfies the information path property can match CCI in every instance. Furthermore, each of the definitions we examine (including CCI) is shown to have examples in which the information flow can take a non-intuitive path. Nevertheless, we believe our framework remains more amenable to drawing clear interpretations than classical tools used in neuroscience, such as Granger Causality.The full version of this paper is available online [1].","PeriodicalId":159311,"journal":{"name":"2020 IEEE International Symposium on Information Theory (ISIT)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126416170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Polar Codes with Balanced Codewords 具有平衡码字的极性码
Pub Date : 2020-06-01 DOI: 10.1109/ISIT44484.2020.9174042
Utkarsh Gupta, H. M. Kiah, A. Vardy, Hanwen Yao
The imbalance of a binary word refers to the absolute difference between the number of ones and zeros in the word. Motivated by applications in DNA-based data storage and the success of polar codes, we study the problem of reducing imbalance in the codewords of a polar code. To this end, we adapt the technique of Mazumdar, Roth, and Vontobel by considering balancing sets that correspond to low-order Reed-Muller (RM) codes. Such balancing sets are likely to be included as subcodes in polar codes.Specifically, using the first-order RM code, we show that any message can be encoded into a length-n polar codeword with imbalance at most o(n) in O(nlogn)-time. We then reduce the imbalance even further using two methods. First, we constrain the ambient space $mathbb{X}$ and analyze the imbalance that the first-order RM code can achieve for words in $mathbb{X}$. We demonstrate that for codelengths up to 128, the first-order RM code achieves zero imbalance for appropriate choices of $mathbb{X}$ that sacrifice only a few message bits. Second, we augment the balancing set by considering higher order RM codes. We give a simple recursive upper bound for the guaranteed imbalance of RM codes. We also prove that the second-order RM code $mathbb{R}mathbb{M}left( {2,m} right)$ balances all even-weight words for m ⩽ 5, while the RM code of order m − 3 balances all even-weight words for m ⩾ 5.
二进制词的不平衡是指该词中1和0的绝对数量之差。由于在dna数据存储中的应用和极性码的成功,我们研究了降低极性码码字不平衡的问题。为此,我们采用Mazumdar, Roth和Vontobel的技术,考虑与低阶Reed-Muller (RM)码对应的平衡集。这种平衡集很可能作为子码包含在极码中。具体地说,使用一阶RM编码,我们证明了任何消息都可以在o(nlogn)时间内编码成长度为n且不平衡最多为o(n)的极性码字。然后我们使用两种方法进一步减小不平衡。首先,我们约束环境空间$mathbb{X}$,并分析一阶RM代码可以为$mathbb{X}$中的单词实现的不平衡。我们证明,对于高达128的码长,一阶RM代码在适当选择$mathbb{X}$时实现了零不平衡,只牺牲了几个消息位。其次,我们通过考虑高阶RM码来扩大平衡集。给出了RM码保证不平衡的一个简单递归上界。我们还证明了二阶RM代码$mathbb{R}mathbb{M}left({2, M} right)$平衡了M≥5的所有偶数权重词,而M−3阶RM代码平衡了M≥5的所有偶数权重词。
{"title":"Polar Codes with Balanced Codewords","authors":"Utkarsh Gupta, H. M. Kiah, A. Vardy, Hanwen Yao","doi":"10.1109/ISIT44484.2020.9174042","DOIUrl":"https://doi.org/10.1109/ISIT44484.2020.9174042","url":null,"abstract":"The imbalance of a binary word refers to the absolute difference between the number of ones and zeros in the word. Motivated by applications in DNA-based data storage and the success of polar codes, we study the problem of reducing imbalance in the codewords of a polar code. To this end, we adapt the technique of Mazumdar, Roth, and Vontobel by considering balancing sets that correspond to low-order Reed-Muller (RM) codes. Such balancing sets are likely to be included as subcodes in polar codes.Specifically, using the first-order RM code, we show that any message can be encoded into a length-n polar codeword with imbalance at most o(n) in O(nlogn)-time. We then reduce the imbalance even further using two methods. First, we constrain the ambient space $mathbb{X}$ and analyze the imbalance that the first-order RM code can achieve for words in $mathbb{X}$. We demonstrate that for codelengths up to 128, the first-order RM code achieves zero imbalance for appropriate choices of $mathbb{X}$ that sacrifice only a few message bits. Second, we augment the balancing set by considering higher order RM codes. We give a simple recursive upper bound for the guaranteed imbalance of RM codes. We also prove that the second-order RM code $mathbb{R}mathbb{M}left( {2,m} right)$ balances all even-weight words for m ⩽ 5, while the RM code of order m − 3 balances all even-weight words for m ⩾ 5.","PeriodicalId":159311,"journal":{"name":"2020 IEEE International Symposium on Information Theory (ISIT)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125674564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sequential anomaly detection with observation control under a generalized error metric 广义误差度量下具有观测控制的序列异常检测
Pub Date : 2020-06-01 DOI: 10.1109/ISIT44484.2020.9174081
Aristomenis Tsopelakos, Georgios Fellouris
The problem of sequential anomaly detection is considered under sampling constraints and generalized error control. It is assumed that there is no prior information on the number of anomalies. It is required to control the probability at least k errors, of any kind, upon stopping, where k is a user specified integer. It is possible to sample only a fixed number of processes at each sampling instance. The processes to be sampled are determined based on the already acquired observations. The goal is to find a procedure that consists of a stopping rule and a decision rule and a sampling rule that satisfy the sampling and error constraints, and have as small as possible average sample size for every possible scenario regarding the subset of anomalous processes. We characterize the optimal expected sample size for this problem to a first order approximation as the error probability vanishes to zero, and we propose procedures that achieve it. The performance of those procedures is compared in a simulation study for different values of k.
研究了在采样约束和广义误差控制下的序列异常检测问题。假设没有关于异常数量的先验信息。要求在停止时控制至少k种错误的概率,其中k是用户指定的整数。在每个采样实例中可能只采样固定数量的进程。要采样的过程是根据已经获得的观察结果确定的。目标是找到一个过程,该过程由一个停止规则、一个决策规则和一个满足抽样和误差约束的抽样规则组成,并且对于关于异常过程子集的每个可能场景具有尽可能小的平均样本量。我们将该问题的最佳期望样本量表征为一阶近似,因为错误概率消失为零,并且我们提出了实现它的程序。在不同k值的模拟研究中比较了这些程序的性能。
{"title":"Sequential anomaly detection with observation control under a generalized error metric","authors":"Aristomenis Tsopelakos, Georgios Fellouris","doi":"10.1109/ISIT44484.2020.9174081","DOIUrl":"https://doi.org/10.1109/ISIT44484.2020.9174081","url":null,"abstract":"The problem of sequential anomaly detection is considered under sampling constraints and generalized error control. It is assumed that there is no prior information on the number of anomalies. It is required to control the probability at least k errors, of any kind, upon stopping, where k is a user specified integer. It is possible to sample only a fixed number of processes at each sampling instance. The processes to be sampled are determined based on the already acquired observations. The goal is to find a procedure that consists of a stopping rule and a decision rule and a sampling rule that satisfy the sampling and error constraints, and have as small as possible average sample size for every possible scenario regarding the subset of anomalous processes. We characterize the optimal expected sample size for this problem to a first order approximation as the error probability vanishes to zero, and we propose procedures that achieve it. The performance of those procedures is compared in a simulation study for different values of k.","PeriodicalId":159311,"journal":{"name":"2020 IEEE International Symposium on Information Theory (ISIT)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131366920","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
2020 IEEE International Symposium on Information Theory (ISIT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1