首页 > 最新文献

2020 IEEE International Symposium on Information Theory (ISIT)最新文献

英文 中文
A Functional Construction of Codes for Multiple Access and Broadcast Channels 多址和广播信道码的功能构造
Pub Date : 2020-06-01 DOI: 10.1109/ISIT44484.2020.9174259
Shouvik Ganguly, Lele Wang, Young-Han Kim
Codes are developed for two-user multiple access and broadcast channels starting from Gelfand-Pinsker codes with known block lengths, rates, and error performances. Guarantees are provided on the block error rates of the MAC and BC codes in terms of the parameters of the constituent Gelfand- Pinsker codes. These guarantees hold as long as the constituent codes satisfy the assumed properties on rate, codeword weights, and performances, irrespective of the basic structure and other properties.
代码是为双用户多址和广播频道开发的,从Gelfand-Pinsker代码开始,具有已知的块长度,速率和错误性能。根据组成Gelfand- Pinsker码的参数,对MAC码和BC码的块错误率进行了保证。只要组成代码在速率、码字权重和性能方面满足假定的属性,而不考虑基本结构和其他属性,这些保证就有效。
{"title":"A Functional Construction of Codes for Multiple Access and Broadcast Channels","authors":"Shouvik Ganguly, Lele Wang, Young-Han Kim","doi":"10.1109/ISIT44484.2020.9174259","DOIUrl":"https://doi.org/10.1109/ISIT44484.2020.9174259","url":null,"abstract":"Codes are developed for two-user multiple access and broadcast channels starting from Gelfand-Pinsker codes with known block lengths, rates, and error performances. Guarantees are provided on the block error rates of the MAC and BC codes in terms of the parameters of the constituent Gelfand- Pinsker codes. These guarantees hold as long as the constituent codes satisfy the assumed properties on rate, codeword weights, and performances, irrespective of the basic structure and other properties.","PeriodicalId":159311,"journal":{"name":"2020 IEEE International Symposium on Information Theory (ISIT)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133631919","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
On the α-loss Landscape in the Logistic Model Logistic模型中的α-损失格局
Pub Date : 2020-06-01 DOI: 10.1109/ISIT44484.2020.9174356
Tyler Sypherd, Mario Díaz, L. Sankar, Gautam Dasarathy
We analyze the optimization landscape of a recently introduced tunable class of loss functions called α-loss, α ∈ (0, ∞], in the logistic model. This family encapsulates the exponential loss (α = 1/2), the log-loss (α = 1), and the 0-1 loss (α = ∞) and contains compelling properties that enable the practitioner to discern among a host of operating conditions relevant to emerging learning methods. Specifically, we study the evolution of the optimization landscape of α-loss with respect to α using tools drawn from the study of strictly-locally-quasi-convex functions in addition to geometric techniques. We interpret these results in terms of optimization complexity via normalized gradient descent.
我们分析了logistic模型中最近引入的可调损失函数α-loss, α∈(0,∞)的优化情况。该系列包含指数损失(α = 1/2),对数损失(α = 1)和0-1损失(α =∞),并包含令人信服的特性,使从业者能够在与新兴学习方法相关的大量操作条件中进行辨别。具体来说,我们利用严格局部拟凸函数的研究工具和几何技术研究了α-损失相对于α的优化景观的演变。我们通过归一化梯度下降来解释这些结果的优化复杂度。
{"title":"On the α-loss Landscape in the Logistic Model","authors":"Tyler Sypherd, Mario Díaz, L. Sankar, Gautam Dasarathy","doi":"10.1109/ISIT44484.2020.9174356","DOIUrl":"https://doi.org/10.1109/ISIT44484.2020.9174356","url":null,"abstract":"We analyze the optimization landscape of a recently introduced tunable class of loss functions called α-loss, α ∈ (0, ∞], in the logistic model. This family encapsulates the exponential loss (α = 1/2), the log-loss (α = 1), and the 0-1 loss (α = ∞) and contains compelling properties that enable the practitioner to discern among a host of operating conditions relevant to emerging learning methods. Specifically, we study the evolution of the optimization landscape of α-loss with respect to α using tools drawn from the study of strictly-locally-quasi-convex functions in addition to geometric techniques. We interpret these results in terms of optimization complexity via normalized gradient descent.","PeriodicalId":159311,"journal":{"name":"2020 IEEE International Symposium on Information Theory (ISIT)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134526658","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A General Derivative Identity for the Conditional Mean Estimator in Gaussian Noise and Some Applications 高斯噪声下条件均值估计量的一般导数恒等式及其应用
Pub Date : 2020-06-01 DOI: 10.1109/ISIT44484.2020.9174071
Alex Dytso, H. Poor, S. Shamai
This paper provides a general derivative identity for the conditional mean estimator of an arbitrary vector signal in Gaussian noise with an arbitrary covariance matrix. This new identity is used to recover and generalize many known identities in the literature and derive some new identities. For example, a new identity is discovered, which shows that an arbitrary higher-order conditional moment is completely determined by the first conditional moment.Several applications of the identities are shown. For instance, by using one of the identities, a simple proof of the uniqueness of the conditional mean estimator as a function of the distribution of the signal is shown. Moreover, one of the identities is used to extend the notion of empirical Bayes to higher-order conditional moments. Specifically, based on a random sample of noisy observations, a consistent estimator for a conditional expectation of any order is derived.
本文给出了高斯噪声中具有任意协方差矩阵的任意矢量信号的条件均值估计量的一般导数恒等式。利用这一新恒等式对文献中许多已知的恒等式进行恢复和推广,并推导出一些新的恒等式。例如,发现了一个新的恒等式,表明任意高阶条件矩完全由第一阶条件矩决定。给出了这些恒等式的几种应用。例如,通过使用其中一个恒等式,给出了条件均值估计量作为信号分布函数的唯一性的一个简单证明。此外,其中一个恒等式用于将经验贝叶斯的概念扩展到高阶条件矩。具体地说,基于噪声观测的随机样本,导出了任意阶的条件期望的一致估计量。
{"title":"A General Derivative Identity for the Conditional Mean Estimator in Gaussian Noise and Some Applications","authors":"Alex Dytso, H. Poor, S. Shamai","doi":"10.1109/ISIT44484.2020.9174071","DOIUrl":"https://doi.org/10.1109/ISIT44484.2020.9174071","url":null,"abstract":"This paper provides a general derivative identity for the conditional mean estimator of an arbitrary vector signal in Gaussian noise with an arbitrary covariance matrix. This new identity is used to recover and generalize many known identities in the literature and derive some new identities. For example, a new identity is discovered, which shows that an arbitrary higher-order conditional moment is completely determined by the first conditional moment.Several applications of the identities are shown. For instance, by using one of the identities, a simple proof of the uniqueness of the conditional mean estimator as a function of the distribution of the signal is shown. Moreover, one of the identities is used to extend the notion of empirical Bayes to higher-order conditional moments. Specifically, based on a random sample of noisy observations, a consistent estimator for a conditional expectation of any order is derived.","PeriodicalId":159311,"journal":{"name":"2020 IEEE International Symposium on Information Theory (ISIT)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130365254","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Minimum Storage Rack-Aware Regenerating Codes with Exact Repair and Small Sub-Packetization 具有精确修复和小子分组的最小存储货架感知再生码
Pub Date : 2020-06-01 DOI: 10.1109/ISIT44484.2020.9174461
Hanxu Hou, P. Lee, Y. Han
Modern data centers often organize storage nodes in racks, in which the cross-rack communication cost is typically much higher than the intra-rack communication cost. Rack-aware regenerating codes have recently been proposed to achieve the optimal trade-off between storage redundancy and cross-rack repair bandwidth, subject to the condition that the original data can be reconstructed from a sufficient number of any non-failed nodes. In this paper, we present a coding framework that transforms any minimum-storage regenerating (MSR) code to a minimum-storage rack-aware regenerating (MSRR) code, such that the cross-rack repair bandwidth is minimized subject to the minimum storage redundancy. To this end, we can construct a family of exact-repair constructions for the MSRR codes for all admissible parameters. Furthermore, our constructions achieve low sub-packetization, which is critical for mitigating the I/O overhead during repair.
现代数据中心通常将存储节点组织在机架中,机架间的通信成本通常比机架内的通信成本高得多。最近提出了机架感知再生码,以实现存储冗余和跨机架修复带宽之间的最佳权衡,前提是原始数据可以从足够数量的任何非故障节点重构。在本文中,我们提出了一种编码框架,将任意最小存储再生(MSR)代码转换为最小存储机架感知再生(MSRR)代码,使跨机架修复带宽在最小存储冗余的情况下最小化。为此,我们可以为所有允许的参数构造一组MSRR代码的精确修复结构。此外,我们的结构实现了低子分组,这对于减少修复期间的I/O开销至关重要。
{"title":"Minimum Storage Rack-Aware Regenerating Codes with Exact Repair and Small Sub-Packetization","authors":"Hanxu Hou, P. Lee, Y. Han","doi":"10.1109/ISIT44484.2020.9174461","DOIUrl":"https://doi.org/10.1109/ISIT44484.2020.9174461","url":null,"abstract":"Modern data centers often organize storage nodes in racks, in which the cross-rack communication cost is typically much higher than the intra-rack communication cost. Rack-aware regenerating codes have recently been proposed to achieve the optimal trade-off between storage redundancy and cross-rack repair bandwidth, subject to the condition that the original data can be reconstructed from a sufficient number of any non-failed nodes. In this paper, we present a coding framework that transforms any minimum-storage regenerating (MSR) code to a minimum-storage rack-aware regenerating (MSRR) code, such that the cross-rack repair bandwidth is minimized subject to the minimum storage redundancy. To this end, we can construct a family of exact-repair constructions for the MSRR codes for all admissible parameters. Furthermore, our constructions achieve low sub-packetization, which is critical for mitigating the I/O overhead during repair.","PeriodicalId":159311,"journal":{"name":"2020 IEEE International Symposium on Information Theory (ISIT)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115334617","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Recursive Trellis Decoding Techniques of Polar Codes 极坐标码的递归网格译码技术
Pub Date : 2020-06-01 DOI: 10.1109/ISIT44484.2020.9174282
P. Trifonov
Recursive trellis decoding of polar codes is considered. Polar codes are shown to have much lower recursive trellis decoding complexity compared to similar Reed-Muller codes. Furthermore, a low-latency decoding algorithm, which combines recursive trellis and successive cancellation decoding methods, is presented.
研究了极坐标码的递归网格译码。与相似的Reed-Muller编码相比,Polar编码具有更低的递归网格解码复杂度。在此基础上,提出了一种结合递归网格和逐次消去解码方法的低延迟解码算法。
{"title":"Recursive Trellis Decoding Techniques of Polar Codes","authors":"P. Trifonov","doi":"10.1109/ISIT44484.2020.9174282","DOIUrl":"https://doi.org/10.1109/ISIT44484.2020.9174282","url":null,"abstract":"Recursive trellis decoding of polar codes is considered. Polar codes are shown to have much lower recursive trellis decoding complexity compared to similar Reed-Muller codes. Furthermore, a low-latency decoding algorithm, which combines recursive trellis and successive cancellation decoding methods, is presented.","PeriodicalId":159311,"journal":{"name":"2020 IEEE International Symposium on Information Theory (ISIT)","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114777905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Coded Computation Against Straggling Channel Decoders in the Cloud for Gaussian Channels 高斯信道云中离散信道解码器的编码计算
Pub Date : 2020-06-01 DOI: 10.1109/ISIT44484.2020.9174145
Jinwen Shi, Cong Ling, O. Simeone, J. Kliewer
The uplink of a Cloud Radio Access Network (C-RAN) architecture is studied, where decoding in the cloud takes place at distributed decoding processors. To mitigate the impact of straggling decoders in the cloud, the cloud re-encodes the received frames via a linear code before distributing them to the decoding processors, which estimate linear combinations of the codewords. Focusing on Gaussian channels, and assuming the use of lattice codes at the users, we derive the computational rates and frame error probabilities at the cloud. The approach differs from Compute-and-Forward in that the combination of codewords is not caused by the channel but purposefully created in the cloud by encoding the received signals to reduce the decoding delay.
研究了云无线接入网(C-RAN)架构的上行链路,其中云中的解码在分布式解码处理器上进行。为了减轻云中离散解码器的影响,云在将接收到的帧分配给解码处理器之前,通过线性编码对其进行重新编码,解码处理器估计码字的线性组合。以高斯信道为研究对象,假设在用户端使用格码,推导出云端的计算速率和帧错误概率。这种方法与“计算和转发”的不同之处在于,码字的组合不是由信道引起的,而是通过对接收到的信号进行编码来减少解码延迟,从而有目的地在云中创建。
{"title":"Coded Computation Against Straggling Channel Decoders in the Cloud for Gaussian Channels","authors":"Jinwen Shi, Cong Ling, O. Simeone, J. Kliewer","doi":"10.1109/ISIT44484.2020.9174145","DOIUrl":"https://doi.org/10.1109/ISIT44484.2020.9174145","url":null,"abstract":"The uplink of a Cloud Radio Access Network (C-RAN) architecture is studied, where decoding in the cloud takes place at distributed decoding processors. To mitigate the impact of straggling decoders in the cloud, the cloud re-encodes the received frames via a linear code before distributing them to the decoding processors, which estimate linear combinations of the codewords. Focusing on Gaussian channels, and assuming the use of lattice codes at the users, we derive the computational rates and frame error probabilities at the cloud. The approach differs from Compute-and-Forward in that the combination of codewords is not caused by the channel but purposefully created in the cloud by encoding the received signals to reduce the decoding delay.","PeriodicalId":159311,"journal":{"name":"2020 IEEE International Symposium on Information Theory (ISIT)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114802806","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Capacity of Line-of-Sight MIMO Channels 视距MIMO信道容量
Pub Date : 2020-06-01 DOI: 10.1109/ISIT44484.2020.9173939
Heedong Do, N. Lee, A. Lozano
We establish an upper bound on the informationtheoretic capacity of line-of-sight (LOS) multiantenna channels with arbitrary antenna arrangements and identify array structures that, properly configured, can attain at least 96.6% of such capacity at every signal-to-noise ratio (SNR). In the process, we determine how to configure the arrays as a function of the SNR. At low- and high-SNR specifically, the configured arrays revert to simpler structures and become capacity-achieving.
我们建立了具有任意天线布置的视距(LOS)多天线信道的信息理论容量的上限,并确定了正确配置的阵列结构,在每种信噪比(SNR)下都可以达到至少96.6%的容量。在此过程中,我们确定如何配置阵列作为信噪比的函数。特别是在低信噪比和高信噪比下,配置的阵列恢复到更简单的结构并成为容量实现。
{"title":"Capacity of Line-of-Sight MIMO Channels","authors":"Heedong Do, N. Lee, A. Lozano","doi":"10.1109/ISIT44484.2020.9173939","DOIUrl":"https://doi.org/10.1109/ISIT44484.2020.9173939","url":null,"abstract":"We establish an upper bound on the informationtheoretic capacity of line-of-sight (LOS) multiantenna channels with arbitrary antenna arrangements and identify array structures that, properly configured, can attain at least 96.6% of such capacity at every signal-to-noise ratio (SNR). In the process, we determine how to configure the arrays as a function of the SNR. At low- and high-SNR specifically, the configured arrays revert to simpler structures and become capacity-achieving.","PeriodicalId":159311,"journal":{"name":"2020 IEEE International Symposium on Information Theory (ISIT)","volume":"15 7","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114085667","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Optimal Locally Repairable Constacyclic Codes of Prime Power Lengths 素数功率长度的最优局部可修恒环码
Pub Date : 2020-06-01 DOI: 10.1109/ISIT44484.2020.9174100
Wei Zhao, K. Shum, Shenghao Yang
A locally repairable code (LRC) with locality r allows for the recovery of any erased symbol of a codeword by accessing only r other symbols of the same codeword. The LRCs achieving the Singleton-like bound are said to be optimal. In this paper, we completely characterize the locality of any constacyclic codes of length ps over finite fields. Using this characterization, we determine all the optimal constacyclic LRCs of prime power lengths over finite fields, i.e., there are no other optimal constacyclic LRCs of prime power length except for those we characterized in this paper. We classify all the optimal constacyclic LRCs into seven classes. The first six classes of constacyclic LRCs classified in this paper have unbounded length, and can achieve smaller locality comparing to those codes constructed by Luo, Xing and Yuan, which also provide unbounded length.
局部性为r的局部可修复码(LRC)允许通过仅访问同一码字的r个其他符号来恢复被擦除的码字符号。达到类单态边界的lrc被称为最优的。本文完全刻画了有限域上任意长度为ps的恒环码的局部性。利用这一性质,我们确定了有限域上所有素数幂长的最优恒圈lrc,即除了本文所描述的最优恒圈lrc外,不存在其他素数幂长的最优恒圈lrc。我们将所有最优恒循环lrc分为7类。本文分类的前6类恒环lrc具有无界长度,与同样具有无界长度的Luo、Xing和Yuan构造的码相比,具有更小的局部性。
{"title":"Optimal Locally Repairable Constacyclic Codes of Prime Power Lengths","authors":"Wei Zhao, K. Shum, Shenghao Yang","doi":"10.1109/ISIT44484.2020.9174100","DOIUrl":"https://doi.org/10.1109/ISIT44484.2020.9174100","url":null,"abstract":"A locally repairable code (LRC) with locality r allows for the recovery of any erased symbol of a codeword by accessing only r other symbols of the same codeword. The LRCs achieving the Singleton-like bound are said to be optimal. In this paper, we completely characterize the locality of any constacyclic codes of length ps over finite fields. Using this characterization, we determine all the optimal constacyclic LRCs of prime power lengths over finite fields, i.e., there are no other optimal constacyclic LRCs of prime power length except for those we characterized in this paper. We classify all the optimal constacyclic LRCs into seven classes. The first six classes of constacyclic LRCs classified in this paper have unbounded length, and can achieve smaller locality comparing to those codes constructed by Luo, Xing and Yuan, which also provide unbounded length.","PeriodicalId":159311,"journal":{"name":"2020 IEEE International Symposium on Information Theory (ISIT)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116147795","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Hypergraph-based Coding Schemes for Two Source Coding Problems under Maximal Distortion 两种最大失真源编码问题的超图编码方案
Pub Date : 2020-06-01 DOI: 10.1109/ISIT44484.2020.9174396
Sourya Basu, Daewon Seo, L. Varshney
We consider two problems in multiterminal source coding under maximal distortion: distributed coding for computing and successive refinement. In distributed coding for computing, we propose a hypergraph-based coding scheme which matches the sum-rate bound of the Berger-Tung inner bound. Further, this scheme matches the entire Berger-Tung inner region when the sources are independent and it outperforms existing graph-based coding schemes. For successive refinement, we propose a hypergraph-based scheme that attains the entire rate region.
研究了最大失真条件下多端信源编码的两个问题:分布式编码计算和逐次细化。在计算分布式编码中,我们提出了一种基于超图的编码方案,该方案匹配Berger-Tung内界的和率界。此外,当源独立时,该方案匹配整个Berger-Tung内区域,并且优于现有的基于图的编码方案。对于连续改进,我们提出了一个基于超图的方案,以获得整个速率区域。
{"title":"Hypergraph-based Coding Schemes for Two Source Coding Problems under Maximal Distortion","authors":"Sourya Basu, Daewon Seo, L. Varshney","doi":"10.1109/ISIT44484.2020.9174396","DOIUrl":"https://doi.org/10.1109/ISIT44484.2020.9174396","url":null,"abstract":"We consider two problems in multiterminal source coding under maximal distortion: distributed coding for computing and successive refinement. In distributed coding for computing, we propose a hypergraph-based coding scheme which matches the sum-rate bound of the Berger-Tung inner bound. Further, this scheme matches the entire Berger-Tung inner region when the sources are independent and it outperforms existing graph-based coding schemes. For successive refinement, we propose a hypergraph-based scheme that attains the entire rate region.","PeriodicalId":159311,"journal":{"name":"2020 IEEE International Symposium on Information Theory (ISIT)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123332417","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
k-Connectivity in Random Graphs induced by Pairwise Key Predistribution Schemes 密钥预分布随机图的k-连通性
Pub Date : 2020-06-01 DOI: 10.1109/ISIT44484.2020.9174528
Mansi Sood, Osman Yağan
Random key predistribution schemes serve as a viable solution for facilitating secure communication in Wireless Sensor Networks (WSNs). We analyze reliable connectivity of a heterogeneous WSN under the random pairwise key predistribution scheme of Chan et al. According to this scheme, each of the n sensor nodes is classified as type-1 (respectively, type-2) with probability μ (respectively, 1 − μ) where 0 < μ < 1. Each type-1 (respectively, type-2) node is paired with 1 (respectively, Kn) other node selected uniformly at random; each pair is then assigned a unique pairwise key so that they can securely communicate with each other. A main question in the design of secure and heterogeneous WSNs is how should the parameters n, μ, and Kn be selected such that resulting network exhibits certain desirable properties with high probability. Of particular interest is the strength of connectivity often studied in terms of k-connectivity; i.e., with k = 1, 2, …, the property that the network remains connected despite the removal of any k − 1 nodes or links. In this paper, we answer this question by analyzing the inhomogeneous random K-out graph model naturally induced under the heterogeneous pairwise scheme. It was recently established that this graph is 1-connected asymptotically almost surely (a.a.s.) if and only if Kn = ω(1). Here, we show that for k = 2, 3, …, we need to set ${K_n} = frac{1}{{1 - mu }}left( {log n + (k - 2)log log n + omega (1)} right)$ for the network to be k-connected a.a.s. The result is given in the form of a zero-one law indicating that the network is a.a.s. not k-connected when ${K_n} = frac{1}{{1 - mu }}left( {log n + (k - 2)log log n - omega (1)} right)$. We present simulation results to demonstrate the usefulness of the results in the finite node regime.
随机密钥预分配方案是实现无线传感器网络安全通信的可行方案。本文分析了Chan等人提出的随机密钥对预分配方案下异构WSN的可靠连通性。根据该方案,n个传感器节点中的每一个都被分类为类型1(分别为,类型2),其概率为μ(分别为,1−μ),其中0 < μ < 1。每个1型(分别,2型)节点与随机均匀选择的1个(分别,Kn)其他节点配对;然后为每对配对分配一个唯一的配对密钥,以便它们可以安全地相互通信。在设计安全的异构WSNs时,一个主要问题是如何选择n、μ和Kn参数,使网络高概率地表现出某些期望的特性。特别有趣的是连通性的强度,通常用k-连通性来研究;即,当k = 1,2,…时,尽管移除任何k−1个节点或链路,网络仍保持连接的性质。本文通过对非齐次随机K-out图模型的分析,回答了这一问题。最近证明,当且仅当Kn = ω(1)时,此图是渐近几乎肯定的1连通。这里,我们表明,当k = 2,3,…时,我们需要设置${K_n} = frac{1}{{1 - mu }}left( {log n + (k - 2)log log n + omega (1)} right)$使网络a.a.s.为k连通。结果以0 - 1定律的形式给出,表明当${K_n} = frac{1}{{1 - mu }}left( {log n + (k - 2)log log n - omega (1)} right)$时网络a.a.s.为非k连通。我们给出了仿真结果来证明结果在有限节点状态下的有效性。
{"title":"k-Connectivity in Random Graphs induced by Pairwise Key Predistribution Schemes","authors":"Mansi Sood, Osman Yağan","doi":"10.1109/ISIT44484.2020.9174528","DOIUrl":"https://doi.org/10.1109/ISIT44484.2020.9174528","url":null,"abstract":"Random key predistribution schemes serve as a viable solution for facilitating secure communication in Wireless Sensor Networks (WSNs). We analyze reliable connectivity of a heterogeneous WSN under the random pairwise key predistribution scheme of Chan et al. According to this scheme, each of the n sensor nodes is classified as type-1 (respectively, type-2) with probability μ (respectively, 1 − μ) where 0 < μ < 1. Each type-1 (respectively, type-2) node is paired with 1 (respectively, Kn) other node selected uniformly at random; each pair is then assigned a unique pairwise key so that they can securely communicate with each other. A main question in the design of secure and heterogeneous WSNs is how should the parameters n, μ, and Kn be selected such that resulting network exhibits certain desirable properties with high probability. Of particular interest is the strength of connectivity often studied in terms of k-connectivity; i.e., with k = 1, 2, …, the property that the network remains connected despite the removal of any k − 1 nodes or links. In this paper, we answer this question by analyzing the inhomogeneous random K-out graph model naturally induced under the heterogeneous pairwise scheme. It was recently established that this graph is 1-connected asymptotically almost surely (a.a.s.) if and only if Kn = ω(1). Here, we show that for k = 2, 3, …, we need to set ${K_n} = frac{1}{{1 - mu }}left( {log n + (k - 2)log log n + omega (1)} right)$ for the network to be k-connected a.a.s. The result is given in the form of a zero-one law indicating that the network is a.a.s. not k-connected when ${K_n} = frac{1}{{1 - mu }}left( {log n + (k - 2)log log n - omega (1)} right)$. We present simulation results to demonstrate the usefulness of the results in the finite node regime.","PeriodicalId":159311,"journal":{"name":"2020 IEEE International Symposium on Information Theory (ISIT)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122908141","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
2020 IEEE International Symposium on Information Theory (ISIT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1