首页 > 最新文献

2020 IEEE International Symposium on Information Theory (ISIT)最新文献

英文 中文
Sparse Activity Detection in Cell-Free Massive MIMO systems 无小区大规模MIMO系统的稀疏活动检测
Pub Date : 2020-06-01 DOI: 10.1109/ISIT44484.2020.9174169
Mangqing Guo, M. C. Gursoy, P. Varshney
We investigate the sparse activity detection problem in cell-free massive multiple-input multiple-output (MIMO) systems in this paper. With the approximate message passing (AMP) algorithm, the received pilot signals at the access points (APs) are decomposed into independent circularly symmetric complex Gaussian noise corrupted components. By using the minimum mean-squared error (MMSE) denoiser during the AMP procedure, we obtain a threshold detection rule, and analytically describe the noise covariance matrix of the corrupted components via the state evolution equations, which is helpful for the performance analysis of the detection rule. Using the law of large numbers, it can be shown that the error probability of this threshold detection rule tends to zero when the number of APs, pilots and users tend to infinity while the ratio of the number of pilots and users is kept constant. Numerical results show that the error probability decreases while the number of APs increases, corroborating our theoretical analysis. In addition, we investigate the relationship between the error probability of the threshold detection rule and the number of symbols used for pilot transmissions during each channel coherence interval via numerical results.
本文研究了无单元大规模多输入多输出(MIMO)系统中的稀疏活动检测问题。采用近似消息传递(AMP)算法,将接入点接收到的导频信号分解为独立的圆对称复高斯噪声损坏分量。在AMP过程中利用最小均方误差(MMSE)去噪,得到阈值检测规则,并通过状态演化方程解析描述损坏分量的噪声协方差矩阵,有助于检测规则的性能分析。利用大数定律可以看出,当ap、导频和用户数量趋于无穷大,且导频和用户数量之比保持不变时,该阈值检测规则的错误概率趋于零。数值结果表明,随着ap数量的增加,误差概率减小,这与我们的理论分析一致。此外,我们还通过数值结果研究了阈值检测规则的误差概率与导频传输在每个信道相干间隔内使用的符号数之间的关系。
{"title":"Sparse Activity Detection in Cell-Free Massive MIMO systems","authors":"Mangqing Guo, M. C. Gursoy, P. Varshney","doi":"10.1109/ISIT44484.2020.9174169","DOIUrl":"https://doi.org/10.1109/ISIT44484.2020.9174169","url":null,"abstract":"We investigate the sparse activity detection problem in cell-free massive multiple-input multiple-output (MIMO) systems in this paper. With the approximate message passing (AMP) algorithm, the received pilot signals at the access points (APs) are decomposed into independent circularly symmetric complex Gaussian noise corrupted components. By using the minimum mean-squared error (MMSE) denoiser during the AMP procedure, we obtain a threshold detection rule, and analytically describe the noise covariance matrix of the corrupted components via the state evolution equations, which is helpful for the performance analysis of the detection rule. Using the law of large numbers, it can be shown that the error probability of this threshold detection rule tends to zero when the number of APs, pilots and users tend to infinity while the ratio of the number of pilots and users is kept constant. Numerical results show that the error probability decreases while the number of APs increases, corroborating our theoretical analysis. In addition, we investigate the relationship between the error probability of the threshold detection rule and the number of symbols used for pilot transmissions during each channel coherence interval via numerical results.","PeriodicalId":159311,"journal":{"name":"2020 IEEE International Symposium on Information Theory (ISIT)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126239251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Data Deduplication with Random Substitutions 支持随机替换的重复数据删除
Pub Date : 2020-06-01 DOI: 10.1109/ISIT44484.2020.9174380
Hao Lou, Farzad Farnoud
Data deduplication saves storage space by identifying and removing repeats in the data stream. In this paper, we provide an information-theoretic analysis of the performance of deduplication algorithms with data streams where repeats are not exact. We introduce a source model in which probabilistic substitutions are considered. Two modified versions of fixed-length deduplication are studied and proven to have performance within a constant factor of optimal with the knowledge of repeat length. We also study the variable-length scheme and show that as entropy becomes smaller, the size of the compressed string vanishes relative to the length of the uncompressed string.
重复数据删除通过识别和删除数据流中的重复项来节省存储空间。在本文中,我们对重复数据流不精确的重复数据流的重复数据删除算法的性能进行了信息论分析。我们引入了一个考虑概率替换的源模型。研究了固定长度重复数据删除的两个改进版本,并证明了在知道重复长度的情况下,它们的性能在一个常数的最优因子内。我们还研究了变长方案,并表明当熵变小时,压缩字符串的大小相对于未压缩字符串的长度消失。
{"title":"Data Deduplication with Random Substitutions","authors":"Hao Lou, Farzad Farnoud","doi":"10.1109/ISIT44484.2020.9174380","DOIUrl":"https://doi.org/10.1109/ISIT44484.2020.9174380","url":null,"abstract":"Data deduplication saves storage space by identifying and removing repeats in the data stream. In this paper, we provide an information-theoretic analysis of the performance of deduplication algorithms with data streams where repeats are not exact. We introduce a source model in which probabilistic substitutions are considered. Two modified versions of fixed-length deduplication are studied and proven to have performance within a constant factor of optimal with the knowledge of repeat length. We also study the variable-length scheme and show that as entropy becomes smaller, the size of the compressed string vanishes relative to the length of the uncompressed string.","PeriodicalId":159311,"journal":{"name":"2020 IEEE International Symposium on Information Theory (ISIT)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126042463","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Evasive Active Hypothesis Testing 回避主动假设检验
Pub Date : 2020-06-01 DOI: 10.1109/ISIT44484.2020.9174021
Meng-Che Chang, M. Bloch
We consider an active hypothesis testing scenario in which an adversary obtains observations while legitimate parties engage in a sequential adaptive control policy to estimate an unknown parameter. The objective is for the legitimate parties to evade the adversary by controlling the risk of their test while minimizing the detection ability of the adversary, measured in terms of its error exponent. We develop bounds on the adversary’s error exponent that offer insight into how legitimate adversaries can best evade the adversary’s detection. We illustrate the results in a wireless transmission detection example.
我们考虑一个主动假设测试场景,其中对手获得观察结果,而合法各方参与顺序自适应控制策略来估计未知参数。目标是让合法各方通过控制其测试的风险来逃避对手,同时最小化对手的检测能力(根据其误差指数来衡量)。我们开发了攻击者错误指数的界限,从而深入了解合法的攻击者如何最好地逃避攻击者的检测。我们在一个无线传输检测示例中说明了结果。
{"title":"Evasive Active Hypothesis Testing","authors":"Meng-Che Chang, M. Bloch","doi":"10.1109/ISIT44484.2020.9174021","DOIUrl":"https://doi.org/10.1109/ISIT44484.2020.9174021","url":null,"abstract":"We consider an active hypothesis testing scenario in which an adversary obtains observations while legitimate parties engage in a sequential adaptive control policy to estimate an unknown parameter. The objective is for the legitimate parties to evade the adversary by controlling the risk of their test while minimizing the detection ability of the adversary, measured in terms of its error exponent. We develop bounds on the adversary’s error exponent that offer insight into how legitimate adversaries can best evade the adversary’s detection. We illustrate the results in a wireless transmission detection example.","PeriodicalId":159311,"journal":{"name":"2020 IEEE International Symposium on Information Theory (ISIT)","volume":"129 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128245916","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Explicit and Efficient Constructions of Coding Schemes for the Binary Deletion Channel 二值删除信道编码方案的显式高效构造
Pub Date : 2020-06-01 DOI: 10.1109/ISIT44484.2020.9173977
Roni Con, Amir Shpilka
In the binary deletion channel with parameter p (BDCp) every bit is deleted independently with probability p. [1] proved a lower bound of (1−p)/9 on the capacity of the BDCp, yet currently no explicit construction achieves this rate. In this work we give an explicit family of codes of rate (1 −p)/16, for every p. This improves upon the work of Guruswami and Li [2] that gave a construction of rate (1−p)/120. The codes in our family have polynomial time encoding and decoding algorithms.
在参数为p的二进制删除通道(BDCp)中,每一位都以p的概率独立删除。[1]证明了BDCp容量的下界为(1−p)/9,但目前还没有明确的构造达到这个速率。在这项工作中,我们给出了每p的率(1−p)/ 16的显式编码族。这改进了Guruswami和Li[2]的工作,他们给出了率(1−p)/120的构造。我们家族的代码具有多项式时间的编码和解码算法。
{"title":"Explicit and Efficient Constructions of Coding Schemes for the Binary Deletion Channel","authors":"Roni Con, Amir Shpilka","doi":"10.1109/ISIT44484.2020.9173977","DOIUrl":"https://doi.org/10.1109/ISIT44484.2020.9173977","url":null,"abstract":"In the binary deletion channel with parameter p (BDCp) every bit is deleted independently with probability p. [1] proved a lower bound of (1−p)/9 on the capacity of the BDCp, yet currently no explicit construction achieves this rate. In this work we give an explicit family of codes of rate (1 −p)/16, for every p. This improves upon the work of Guruswami and Li [2] that gave a construction of rate (1−p)/120. The codes in our family have polynomial time encoding and decoding algorithms.","PeriodicalId":159311,"journal":{"name":"2020 IEEE International Symposium on Information Theory (ISIT)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124561540","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Distribution Privacy Under Function Recoverability 函数可恢复性下的分布隐私
Pub Date : 2020-06-01 DOI: 10.1109/ISIT44484.2020.9174389
Ajaykrishnan Nageswaran, P. Narayan
A user generates n independent and identically distributed data random variables with a probability mass function that must be guarded from a querier. The querier must recover, with a prescribed accuracy, a given function of the data from each of n independent and identically distributed user-devised query responses. The user chooses the data pmf and the random query responses to maximize distribution privacy as gauged by the divergence between the pmf and the querier's best estimate of it based on the n query responses. A general lower bound is provided for distribution privacy; and, for the case of binaryvalued functions, upper and lower bounds that converge to said bound as n grows. Explicit strategies for the user and querier are identified.
用户生成n个独立且分布相同的数据随机变量,这些变量具有一个概率质量函数,必须对查询器进行保护。查询程序必须以规定的精度从n个独立且相同分布的用户设计的查询响应中的每一个中恢复给定的数据函数。用户选择数据pmf和随机查询响应来最大化分布隐私,这是通过pmf与查询者基于n个查询响应的最佳估计之间的差异来衡量的。给出了分布隐私的一般下界;对于二值函数,随着n的增长,上界和下界收敛于上述边界。确定了用户和查询器的显式策略。
{"title":"Distribution Privacy Under Function Recoverability","authors":"Ajaykrishnan Nageswaran, P. Narayan","doi":"10.1109/ISIT44484.2020.9174389","DOIUrl":"https://doi.org/10.1109/ISIT44484.2020.9174389","url":null,"abstract":"A user generates n independent and identically distributed data random variables with a probability mass function that must be guarded from a querier. The querier must recover, with a prescribed accuracy, a given function of the data from each of n independent and identically distributed user-devised query responses. The user chooses the data pmf and the random query responses to maximize distribution privacy as gauged by the divergence between the pmf and the querier's best estimate of it based on the n query responses. A general lower bound is provided for distribution privacy; and, for the case of binaryvalued functions, upper and lower bounds that converge to said bound as n grows. Explicit strategies for the user and querier are identified.","PeriodicalId":159311,"journal":{"name":"2020 IEEE International Symposium on Information Theory (ISIT)","volume":"124 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124632022","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Universal Data Compression Scheme based on the AIVF Coding Techniques 基于AIVF编码技术的通用数据压缩方案
Pub Date : 2020-06-01 DOI: 10.1109/ISIT44484.2020.9173982
Hirosuke Yamamoto, Koki Imaeda, Kengo Hashimoto, K. Iwata
In the entropy coding, AIVF (almost instantaneous variable-to-fixed length) codes using multiple parsing trees can attain a better compression rate than the Tunstall code, which attains the best compression rate in the class of VF codes with a single parsing tree. Furthermore, the multiple parsing trees of an AIVF code can be multiplexed into a single parsing tree. In this paper, we propose a new universal data compression code based on the techniques of the AIVF code. The proposed universal code can also be considered as an improvement of the LZW code (Welch code). We explain how the AIVF coding techniques can be applied to universal coding by growing dynamically a single parsing tree, and we evaluate the compression rate of the proposed universal code theoretically and using several corpora.
在熵编码中,使用多个解析树的AIVF(几乎瞬时变到定长)码比使用单个解析树的Tunstall码获得更好的压缩率,后者在该类VF码中获得了最好的压缩率。此外,AIVF代码的多个解析树可以复用为一个解析树。本文在AIVF码技术的基础上,提出了一种新的通用数据压缩码。建议的通用代码也可以被认为是对LZW代码(韦尔奇代码)的改进。我们解释了AIVF编码技术如何通过动态增长单个解析树来应用于通用编码,并从理论上和使用几个语料库评估了所提出的通用编码的压缩率。
{"title":"A Universal Data Compression Scheme based on the AIVF Coding Techniques","authors":"Hirosuke Yamamoto, Koki Imaeda, Kengo Hashimoto, K. Iwata","doi":"10.1109/ISIT44484.2020.9173982","DOIUrl":"https://doi.org/10.1109/ISIT44484.2020.9173982","url":null,"abstract":"In the entropy coding, AIVF (almost instantaneous variable-to-fixed length) codes using multiple parsing trees can attain a better compression rate than the Tunstall code, which attains the best compression rate in the class of VF codes with a single parsing tree. Furthermore, the multiple parsing trees of an AIVF code can be multiplexed into a single parsing tree. In this paper, we propose a new universal data compression code based on the techniques of the AIVF code. The proposed universal code can also be considered as an improvement of the LZW code (Welch code). We explain how the AIVF coding techniques can be applied to universal coding by growing dynamically a single parsing tree, and we evaluate the compression rate of the proposed universal code theoretically and using several corpora.","PeriodicalId":159311,"journal":{"name":"2020 IEEE International Symposium on Information Theory (ISIT)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124958109","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Delay-Optimal Coding for Secure Transmission over Parallel Burst Erasure Channels with an Eavesdropper 带窃听器的并行突发擦除信道安全传输延迟最优编码
Pub Date : 2020-06-01 DOI: 10.1109/ISIT44484.2020.9174235
Anna Frank
For streaming applications, we consider parallel burst erasure channels in the presence of an eavesdropper. The legitimate receiver must perfectly recover each source symbol subject to a decoding delay constraint without the eavesdropper gaining any information from his observation. For a certain class of code parameters, we propose delay-optimal M-link codes that recover multiple bursts of erasures of a limited length, and where the codes provide perfect security even if the eavesdropper can observe a link of his choice. Our codes achieve the maximum secrecy rate for the channel model.
对于流媒体应用,我们考虑在窃听器存在的情况下并行突发擦除信道。合法的接收方必须在解码延迟约束下完全恢复每个源符号,而窃听者不能从他的观察中获得任何信息。对于一类特定的码参数,我们提出了延迟最优的m -链路码,该码可以恢复有限长度的多次擦除,并且即使窃听者可以观察到他所选择的链路,该码也可以提供完美的安全性。我们的代码实现了信道模型的最大保密率。
{"title":"Delay-Optimal Coding for Secure Transmission over Parallel Burst Erasure Channels with an Eavesdropper","authors":"Anna Frank","doi":"10.1109/ISIT44484.2020.9174235","DOIUrl":"https://doi.org/10.1109/ISIT44484.2020.9174235","url":null,"abstract":"For streaming applications, we consider parallel burst erasure channels in the presence of an eavesdropper. The legitimate receiver must perfectly recover each source symbol subject to a decoding delay constraint without the eavesdropper gaining any information from his observation. For a certain class of code parameters, we propose delay-optimal M-link codes that recover multiple bursts of erasures of a limited length, and where the codes provide perfect security even if the eavesdropper can observe a link of his choice. Our codes achieve the maximum secrecy rate for the channel model.","PeriodicalId":159311,"journal":{"name":"2020 IEEE International Symposium on Information Theory (ISIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131137381","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
When does Partial Noisy Feedback Enlarge the Capacity of a Gaussian Broadcast Channel? 部分噪声反馈何时增大高斯广播信道的容量?
Pub Date : 2020-06-01 DOI: 10.1109/ISIT44484.2020.9174173
Aditya Narayan Ravi, S. R. Pillai, V. Prabhakaran, M. Wigger
Feedback is known to enlarge the capacity region of a Gaussian Broadcast Channel (GBC) with independent noise realizations at the receivers, and an average power constraint at the transmitter. The capacity enlargement may occur even when there is noisy feedback from only one of the two receivers. However, recent results show the existence of a feedback noise threshold, beyond which one-sided feedback from only the stronger receiver is futile in enlarging the capacity region. The current paper presents a tight characterization of the feedback noise threshold, which separates the regimes where feedback from only the stronger receiver enlarges the capacity or leaves it unchanged. The scheme used to prove this result also leads to some interesting observations on noisy feedback from only the weak receiver.
已知反馈可以扩大高斯广播信道(GBC)的容量区域,接收器具有独立的噪声实现,发射器具有平均功率约束。即使只有来自两个接收器中的一个的噪声反馈,也可能发生容量增大。然而,最近的结果表明存在一个反馈噪声阈值,超过这个阈值,仅来自较强的接收器的片面反馈对于扩大容量区域是无效的。目前的论文提出了反馈噪声阈值的一个严格的特征,它区分了只有来自较强的接收器的反馈增大容量或保持容量不变的制度。用于证明这一结果的方案也导致了一些有趣的观察,仅从弱接收器的噪声反馈。
{"title":"When does Partial Noisy Feedback Enlarge the Capacity of a Gaussian Broadcast Channel?","authors":"Aditya Narayan Ravi, S. R. Pillai, V. Prabhakaran, M. Wigger","doi":"10.1109/ISIT44484.2020.9174173","DOIUrl":"https://doi.org/10.1109/ISIT44484.2020.9174173","url":null,"abstract":"Feedback is known to enlarge the capacity region of a Gaussian Broadcast Channel (GBC) with independent noise realizations at the receivers, and an average power constraint at the transmitter. The capacity enlargement may occur even when there is noisy feedback from only one of the two receivers. However, recent results show the existence of a feedback noise threshold, beyond which one-sided feedback from only the stronger receiver is futile in enlarging the capacity region. The current paper presents a tight characterization of the feedback noise threshold, which separates the regimes where feedback from only the stronger receiver enlarges the capacity or leaves it unchanged. The scheme used to prove this result also leads to some interesting observations on noisy feedback from only the weak receiver.","PeriodicalId":159311,"journal":{"name":"2020 IEEE International Symposium on Information Theory (ISIT)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128873818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Complexity of Estimating Rényi Entropy of Markov Chains 马尔可夫链r<s:1>熵估计的复杂性
Pub Date : 2020-06-01 DOI: 10.1109/ISIT44484.2020.9174261
Maciej Obremski, M. Skorski
Estimating entropy of random processes is one of the fundamental problems of machine learning and property testing. It has numerous applications to anything from DNA testing and predictability of human behaviour to modeling neural activity and cryptography. We investigate the problem of Renyi entropy estimation for sources that form Markov chains.Kamath and Verd (ISIT’16) showed that good mixing properties are essential for that task. We prove that even with very good mixing time, estimation of entropy of order α > 1 requires Ω(K2−1/α) samples, where K is the size of the alphabet; particularly min-entropy requires Ω(K2) sample size and collision entropy requires Ω(K3/2) samples. Our results hold both in asymptotic and non-asymptotic regimes (under mild restrictions). The analysis is completed by the upper complexity bound of O(K2) for the standard plug-in estimator. This leads to an interesting open question how to improve upon a plugin estimator, which looks much more challenging than for IID sources (which tensorize nicely).We achieve the results by applying Le Cam’s method to two Markov chains which differ by an appropriately chosen sparse perturbation; the discrepancy between these chains is estimated with help of perturbation theory. Our techniques might be of independent interest.
随机过程的熵估计是机器学习和性能测试的基本问题之一。它有许多应用,从DNA测试和人类行为的可预测性到神经活动建模和密码学。研究了马尔可夫链源的Renyi熵估计问题。Kamath和Verd (ISIT ' 16)表明,良好的混合性能对于这项任务至关重要。我们证明了即使有很好的混合时间,估计α > 1阶的熵需要Ω(K2−1/α)个样本,其中K是字母表的大小;特别是最小熵需要Ω(K2)样本量,碰撞熵需要Ω(K3/2)样本量。我们的结果在渐近和非渐近情况下(在温和的限制下)都成立。该分析由标准插件估计器的复杂度上限O(K2)完成。这导致了一个有趣的开放性问题,即如何改进插件估计器,这看起来比IID源更具挑战性(IID源的张紧性很好)。我们将Le Cam方法应用于两个马尔可夫链,它们通过适当选择的稀疏扰动而不同,从而获得了结果;利用微扰理论估计了这些链之间的差异。我们的技术可能有独立的价值。
{"title":"Complexity of Estimating Rényi Entropy of Markov Chains","authors":"Maciej Obremski, M. Skorski","doi":"10.1109/ISIT44484.2020.9174261","DOIUrl":"https://doi.org/10.1109/ISIT44484.2020.9174261","url":null,"abstract":"Estimating entropy of random processes is one of the fundamental problems of machine learning and property testing. It has numerous applications to anything from DNA testing and predictability of human behaviour to modeling neural activity and cryptography. We investigate the problem of Renyi entropy estimation for sources that form Markov chains.Kamath and Verd (ISIT’16) showed that good mixing properties are essential for that task. We prove that even with very good mixing time, estimation of entropy of order α > 1 requires Ω(K2−1/α) samples, where K is the size of the alphabet; particularly min-entropy requires Ω(K2) sample size and collision entropy requires Ω(K3/2) samples. Our results hold both in asymptotic and non-asymptotic regimes (under mild restrictions). The analysis is completed by the upper complexity bound of O(K2) for the standard plug-in estimator. This leads to an interesting open question how to improve upon a plugin estimator, which looks much more challenging than for IID sources (which tensorize nicely).We achieve the results by applying Le Cam’s method to two Markov chains which differ by an appropriately chosen sparse perturbation; the discrepancy between these chains is estimated with help of perturbation theory. Our techniques might be of independent interest.","PeriodicalId":159311,"journal":{"name":"2020 IEEE International Symposium on Information Theory (ISIT)","volume":"59 1-3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120992410","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Exact Expressions in Source and Channel Coding Problems Using Integral Representations 用积分表示的源和信道编码问题中的精确表达式
Pub Date : 2020-06-01 DOI: 10.1109/ISIT44484.2020.9174294
N. Merhav, I. Sason
We explore known integral representations of the logarithmic and power functions, and demonstrate their usefulness for information-theoretic analyses. We obtain compact, easily–computable exact formulas for several source and channel coding problems that involve expectations and higher moments of the logarithm of a positive random variable and the moment of order ρ>0 of a non-negative random variable (or the sum of i.i.d. positive random variables). These integral representations are used in a variety of applications, including the calculation of the degradation in mutual information between the channel input and output as a result of jamming, universal lossless data compression, Shannon and Rényi entropy evaluations, and the ergodic capacity evaluation of the single-input, multiple–output (SIMO) Gaussian channel with random parameters (known to both transmitter and receiver). The integral representation of the logarithmic function and its variants are anticipated to serve as a rigorous alternative to the popular (but non–rigorous) replica method (at least in some situations).
我们探索已知的对数函数和幂函数的积分表示,并证明它们对信息论分析的有用性。我们获得了几个源和信道编码问题的紧凑,易于计算的精确公式,这些问题涉及正随机变量的对数的期望和更高矩以及非负随机变量的ρ>0阶矩(或iid个正随机变量的和)。这些积分表示用于各种应用,包括信道输入和输出之间互信息因干扰而退化的计算,通用无损数据压缩,Shannon和rsamunyi熵评估,以及具有随机参数(发射器和接收器都知道)的单输入多输出(SIMO)高斯信道的遍历容量评估。对数函数及其变体的积分表示预计将作为流行的(但不严格的)复制方法的严格替代方法(至少在某些情况下)。
{"title":"Exact Expressions in Source and Channel Coding Problems Using Integral Representations","authors":"N. Merhav, I. Sason","doi":"10.1109/ISIT44484.2020.9174294","DOIUrl":"https://doi.org/10.1109/ISIT44484.2020.9174294","url":null,"abstract":"We explore known integral representations of the logarithmic and power functions, and demonstrate their usefulness for information-theoretic analyses. We obtain compact, easily–computable exact formulas for several source and channel coding problems that involve expectations and higher moments of the logarithm of a positive random variable and the moment of order ρ>0 of a non-negative random variable (or the sum of i.i.d. positive random variables). These integral representations are used in a variety of applications, including the calculation of the degradation in mutual information between the channel input and output as a result of jamming, universal lossless data compression, Shannon and Rényi entropy evaluations, and the ergodic capacity evaluation of the single-input, multiple–output (SIMO) Gaussian channel with random parameters (known to both transmitter and receiver). The integral representation of the logarithmic function and its variants are anticipated to serve as a rigorous alternative to the popular (but non–rigorous) replica method (at least in some situations).","PeriodicalId":159311,"journal":{"name":"2020 IEEE International Symposium on Information Theory (ISIT)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122356417","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2020 IEEE International Symposium on Information Theory (ISIT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1