首页 > 最新文献

Proceedings. International Symposium on Information Theory, 2005. ISIT 2005.最新文献

英文 中文
Information theoretical approach to mobile code 移动代码的信息理论方法
Pub Date : 2005-10-31 DOI: 10.1109/ISIT.2005.1523537
K. Cartrysse, J. Lubbe
Mobile code is software code that may be run at a remote location, which is possibly untrustworthy. This paper provides a secrecy model for mobile code based on Shannon's information theoretic model. Due to different characteristics of mobile code, such as the possibility of plaintext-attacks and untrustworthy execution environments, a new definition for the maximum level of secrecy is necessary. This results in different minimum requirements to obtain this level of secrecy. Furthermore, the unicity distance is derived in various situations
移动代码是可以在远程位置运行的软件代码,这可能是不可信的。基于香农的信息理论模型,提出了一种移动代码保密模型。由于移动代码的不同特性,例如可能遭受明文攻击和不可信的执行环境,因此有必要对最大保密级别进行新的定义。这就产生了不同的最低要求来获得这种级别的保密。此外,还推导了不同情况下的唯一距离
{"title":"Information theoretical approach to mobile code","authors":"K. Cartrysse, J. Lubbe","doi":"10.1109/ISIT.2005.1523537","DOIUrl":"https://doi.org/10.1109/ISIT.2005.1523537","url":null,"abstract":"Mobile code is software code that may be run at a remote location, which is possibly untrustworthy. This paper provides a secrecy model for mobile code based on Shannon's information theoretic model. Due to different characteristics of mobile code, such as the possibility of plaintext-attacks and untrustworthy execution environments, a new definition for the maximum level of secrecy is necessary. This results in different minimum requirements to obtain this level of secrecy. Furthermore, the unicity distance is derived in various situations","PeriodicalId":166130,"journal":{"name":"Proceedings. International Symposium on Information Theory, 2005. ISIT 2005.","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126263538","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Verification decoding of raptor codes 猛禽代码的验证解码
Pub Date : 2005-10-31 DOI: 10.1109/ISIT.2005.1523554
R. Karp, M. Luby, A. Shokrollahi
In this paper we extend the double verification algorithm of Luby and Mitzenmacher to the class of Raptor codes, analyze it, and design Raptor codes that perform very well with respect to this algorithm
本文将Luby和Mitzenmacher的双重验证算法扩展到Raptor代码中,对其进行分析,并设计出性能良好的Raptor代码
{"title":"Verification decoding of raptor codes","authors":"R. Karp, M. Luby, A. Shokrollahi","doi":"10.1109/ISIT.2005.1523554","DOIUrl":"https://doi.org/10.1109/ISIT.2005.1523554","url":null,"abstract":"In this paper we extend the double verification algorithm of Luby and Mitzenmacher to the class of Raptor codes, analyze it, and design Raptor codes that perform very well with respect to this algorithm","PeriodicalId":166130,"journal":{"name":"Proceedings. International Symposium on Information Theory, 2005. ISIT 2005.","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129822753","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Collusion of fingerprints via the gradient attack 指纹串通通过梯度攻击
Pub Date : 2005-10-31 DOI: 10.1109/ISIT.2005.1523754
D. Kirovski
The difficulty of building an effective digital rights management system stems from the fact that traditional cryptographic primitives such as encryption or scrambling do not protect audio or video signals once they are played in plain-text. This fact, commonly referred to as "the analog hole," has been responsible for the popularity of multimedia file sharing which cannot be controlled, at least technically, by content's copyright owners. In this paper, we explore a specific issue in multimedia fingerprinting as an answer to "the analog hole" problem. We analyze the collusion resistance of spread-spectrum fingerprints with an arbitrary probability distribution of their source using a recently introduced collusion procedure, the gradient attack
建立一个有效的数字版权管理系统的困难源于这样一个事实,即传统的加密原语,如加密或加扰,一旦以明文形式播放音频或视频信号,就不能保护它们。这一事实通常被称为“模拟漏洞”,它导致了多媒体文件共享的流行,至少在技术上,内容的版权所有者是无法控制的。在本文中,我们探讨了多媒体指纹识别中的一个具体问题,作为对“模拟孔”问题的回答。我们利用最近引入的一种合谋过程——梯度攻击,分析了源具有任意概率分布的扩频指纹的合谋抗扰性
{"title":"Collusion of fingerprints via the gradient attack","authors":"D. Kirovski","doi":"10.1109/ISIT.2005.1523754","DOIUrl":"https://doi.org/10.1109/ISIT.2005.1523754","url":null,"abstract":"The difficulty of building an effective digital rights management system stems from the fact that traditional cryptographic primitives such as encryption or scrambling do not protect audio or video signals once they are played in plain-text. This fact, commonly referred to as \"the analog hole,\" has been responsible for the popularity of multimedia file sharing which cannot be controlled, at least technically, by content's copyright owners. In this paper, we explore a specific issue in multimedia fingerprinting as an answer to \"the analog hole\" problem. We analyze the collusion resistance of spread-spectrum fingerprints with an arbitrary probability distribution of their source using a recently introduced collusion procedure, the gradient attack","PeriodicalId":166130,"journal":{"name":"Proceedings. International Symposium on Information Theory, 2005. ISIT 2005.","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129209456","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Strongly secure ramp secret sharing schemes 高度安全的坡道秘密共享方案
Pub Date : 2005-10-31 DOI: 10.1109/ISIT.2005.1523536
Mitsugu Iwamoto, Hirosuke Yamamoto
Ramp secret sharing (SS) schemes can be classified into strong ramp SS schemes and weak ramp SS schemes. The strong ramp SS schemes do not leak out any part of a secret explicitly even in the case where some information about the secret leaks from a non-qualified set of shares, and hence, they are more desirable than weak ramp SS schemes. However, it is not known how to construct the strong ramp SS schemes in the case of general access structures. In this paper, it is shown that a strong ramp SS scheme can always be constructed from a SS scheme with plural secrets for any feasible general access structure. As a byproduct, it is pointed out that threshold ramp SS schemes based on Shamir's polynomial interpolation method are not always strong
斜坡秘密共享方案可分为强斜坡秘密共享方案和弱斜坡秘密共享方案。强斜坡SS方案不会显式地泄露秘密的任何部分,即使在有关秘密的一些信息从一组非限定的共享中泄露的情况下,因此,它们比弱斜坡SS方案更可取。然而,对于一般的通道结构如何构建强匝道SS方案,目前尚不清楚。本文证明了对于任何可行的通用访问结构,都可以由具有复数秘密的SS方案构造出一个强斜坡SS方案。结果表明,基于Shamir多项式插值方法的阈值斜坡SS方案并不总是强的
{"title":"Strongly secure ramp secret sharing schemes","authors":"Mitsugu Iwamoto, Hirosuke Yamamoto","doi":"10.1109/ISIT.2005.1523536","DOIUrl":"https://doi.org/10.1109/ISIT.2005.1523536","url":null,"abstract":"Ramp secret sharing (SS) schemes can be classified into strong ramp SS schemes and weak ramp SS schemes. The strong ramp SS schemes do not leak out any part of a secret explicitly even in the case where some information about the secret leaks from a non-qualified set of shares, and hence, they are more desirable than weak ramp SS schemes. However, it is not known how to construct the strong ramp SS schemes in the case of general access structures. In this paper, it is shown that a strong ramp SS scheme can always be constructed from a SS scheme with plural secrets for any feasible general access structure. As a byproduct, it is pointed out that threshold ramp SS schemes based on Shamir's polynomial interpolation method are not always strong","PeriodicalId":166130,"journal":{"name":"Proceedings. International Symposium on Information Theory, 2005. ISIT 2005.","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128560853","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Fundamental limits of diversity-embedded codes over fading channels 分集嵌入码在衰落信道上的基本限制
Pub Date : 2005-10-31 DOI: 10.1109/ISIT.2005.1523387
S. Diggavi, David Tse
Diversity-embedded codes for fading channels are high-rate codes that are designed so that they have a high-diversity code embedded within them. This allows a form of communication where the high-rate code opportunistically takes advantage of good channel realizations whereas the embedded high-diversity code ensures that at least part of the information is received reliably. This can also be thought as coding the data into two streams such that the high-priority stream has higher reliability than the low-priority stream. For SISO (single-input-single-output), SIMO, MISO and parallel fading channels, we characterize the achievable rates and reliability of the two streams in the high SNR regime in terms of the diversity-multiplexing tradeoff. We exhibit the performance gain over a single-stream code. We also show some constructions for finite block lengths that achieve the optimal performance
衰落信道的分集嵌入码是一种高速率码,其设计使其具有高分集嵌入码。这允许一种通信形式,其中高速率代码机会地利用良好的信道实现,而嵌入的高分集代码确保至少部分信息被可靠地接收。这也可以被认为是将数据编码成两个流,这样高优先级流比低优先级流具有更高的可靠性。对于SISO(单输入-单输出)、SIMO、MISO和并行衰落信道,我们根据分集-复用权衡来表征高信噪比下两种流的可实现速率和可靠性。我们展示了单流代码的性能增益。我们还展示了一些有限块长度的结构,以达到最佳性能
{"title":"Fundamental limits of diversity-embedded codes over fading channels","authors":"S. Diggavi, David Tse","doi":"10.1109/ISIT.2005.1523387","DOIUrl":"https://doi.org/10.1109/ISIT.2005.1523387","url":null,"abstract":"Diversity-embedded codes for fading channels are high-rate codes that are designed so that they have a high-diversity code embedded within them. This allows a form of communication where the high-rate code opportunistically takes advantage of good channel realizations whereas the embedded high-diversity code ensures that at least part of the information is received reliably. This can also be thought as coding the data into two streams such that the high-priority stream has higher reliability than the low-priority stream. For SISO (single-input-single-output), SIMO, MISO and parallel fading channels, we characterize the achievable rates and reliability of the two streams in the high SNR regime in terms of the diversity-multiplexing tradeoff. We exhibit the performance gain over a single-stream code. We also show some constructions for finite block lengths that achieve the optimal performance","PeriodicalId":166130,"journal":{"name":"Proceedings. International Symposium on Information Theory, 2005. ISIT 2005.","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124602475","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 33
Rateless space-time coding 无速率空时编码
Pub Date : 2005-10-31 DOI: 10.1109/ISIT.2005.1523683
U. Erez, G. Wornell, M. Trott
Rateless codes are good codes of infinite length that have the property that prefixes of such codes are themselves good codes. This makes them attractive for applications in which the channel quality is uncertain, where systems transmit as much of a codeword as necessary for decoding to be possible. In particular, rateless codes are potentially attractive for wireless communication. In a recent work, a rateless coding scheme was proposed for the AWGN channel, based on layering, repetition and random dithering. We extend this scheme to multiple-input single-output (MISO) Gaussian channels. We show that the rate loss associated with orthogonal design space-time codes may be alleviated by layering and dithering, very similar to the rateless approach for the AWGN channel. We then combine the two schemes and arrive at a close-to-capacity rateless code for MISO channels. The required complexity depends on the fraction of capacity that is targeted, is linear in the capacity of the channel and does not depend on the number of transmit antennas. Furthermore, the coding scheme uses only one base AWGN code
无速率码是具有无限长度的好码,这种码的前缀本身就是好码。这使得它们对信道质量不确定的应用程序很有吸引力,在这些应用程序中,系统传输尽可能多的码字以实现解码。特别是,无速率码对于无线通信具有潜在的吸引力。在最近的一项研究中,提出了一种基于分层、重复和随机抖动的无速率AWGN信道编码方案。我们将该方案扩展到多输入单输出(MISO)高斯信道。我们表明,与正交设计空时码相关的速率损失可以通过分层和抖动来减轻,这与AWGN信道的无速率方法非常相似。然后,我们将这两种方案结合起来,得到MISO信道的接近容量的无速率代码。所需的复杂性取决于目标容量的比例,与信道容量呈线性关系,而不取决于发射天线的数量。此外,该编码方案仅使用一个AWGN基码
{"title":"Rateless space-time coding","authors":"U. Erez, G. Wornell, M. Trott","doi":"10.1109/ISIT.2005.1523683","DOIUrl":"https://doi.org/10.1109/ISIT.2005.1523683","url":null,"abstract":"Rateless codes are good codes of infinite length that have the property that prefixes of such codes are themselves good codes. This makes them attractive for applications in which the channel quality is uncertain, where systems transmit as much of a codeword as necessary for decoding to be possible. In particular, rateless codes are potentially attractive for wireless communication. In a recent work, a rateless coding scheme was proposed for the AWGN channel, based on layering, repetition and random dithering. We extend this scheme to multiple-input single-output (MISO) Gaussian channels. We show that the rate loss associated with orthogonal design space-time codes may be alleviated by layering and dithering, very similar to the rateless approach for the AWGN channel. We then combine the two schemes and arrive at a close-to-capacity rateless code for MISO channels. The required complexity depends on the fraction of capacity that is targeted, is linear in the capacity of the channel and does not depend on the number of transmit antennas. Furthermore, the coding scheme uses only one base AWGN code","PeriodicalId":166130,"journal":{"name":"Proceedings. International Symposium on Information Theory, 2005. ISIT 2005.","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130898551","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
A geometrical analysis on transmit antenna selection for spatial multiplexing systems with linear receivers 线性接收机空间复用系统发射天线选择的几何分析
Pub Date : 2005-10-31 DOI: 10.1109/ISIT.2005.1523606
Hongyuan Zhang, H. Dai, Quan Zhou
For MIMO diversity schemes, it is well known that antenna selection methods that optimize the post-processing signal-to-noise ratio can preserve the diversity order of the full MIMO system. On the other hand, the diversity order achieved by antenna selection in spatial multiplexing (SM) systems, especially those exploiting practical coding and decoding schemes, has not thus far been rigorously analyzed. In this paper, from a geometrical standpoint, we propose a new framework to theoretically analyze the diversity order achieved by transmit antenna selection for independently encoded SM systems with linear receivers. Our results show that a diversity order of (NT -1)(NR -1) can be achieved for an NRtimesNT SM system in which L = 2 antennas are selected from the transmit side
对于MIMO分集方案,优化后处理信噪比的天线选择方法可以保持整个MIMO系统的分集顺序。另一方面,空间复用(SM)系统中,特别是那些利用实际编码和解码方案的系统中,天线选择所获得的分集顺序迄今尚未得到严格的分析。本文从几何角度出发,提出了一个新的框架,从理论上分析线性接收独立编码SM系统的发射天线选择所获得的分集顺序。我们的研究结果表明,当从发射端选择L = 2天线时,NRtimesNT SM系统可以实现(NT -1)(NR -1)的分集顺序
{"title":"A geometrical analysis on transmit antenna selection for spatial multiplexing systems with linear receivers","authors":"Hongyuan Zhang, H. Dai, Quan Zhou","doi":"10.1109/ISIT.2005.1523606","DOIUrl":"https://doi.org/10.1109/ISIT.2005.1523606","url":null,"abstract":"For MIMO diversity schemes, it is well known that antenna selection methods that optimize the post-processing signal-to-noise ratio can preserve the diversity order of the full MIMO system. On the other hand, the diversity order achieved by antenna selection in spatial multiplexing (SM) systems, especially those exploiting practical coding and decoding schemes, has not thus far been rigorously analyzed. In this paper, from a geometrical standpoint, we propose a new framework to theoretically analyze the diversity order achieved by transmit antenna selection for independently encoded SM systems with linear receivers. Our results show that a diversity order of (NT -1)(NR -1) can be achieved for an NRtimesNT SM system in which L = 2 antennas are selected from the transmit side","PeriodicalId":166130,"journal":{"name":"Proceedings. International Symposium on Information Theory, 2005. ISIT 2005.","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128895410","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Staleness vs. waiting time in universal discrete broadcast 通用离散广播中的陈腐与等待时间
Pub Date : 2005-10-31 DOI: 10.1109/ISIT.2005.1523721
M. Langberg, A. Sprintson, Jehoshua Bruck
In this paper we study the distribution of dynamic data over a broadcast channel to a large number of passive clients. The data is simultaneously distributed to clients in the form of discrete packets, each packet captures the most recent state of the information source. Clients obtain the information by accessing the channel and listening for the next available packet. This scenario, referred to as discrete broadcast, has many practical applications such as the distribution of stock information to wireless mobile devices and downloading up-to-date battle information in military networks. Our goal is minimize the amount of time a client has to wait in order to obtain a new data packet, i.e., the waiting time of the client. We show that we can significantly reduce the waiting time by adding redundancy to the schedule. We identify universal schedules that guarantee low waiting time for any client, regardless of the access pattern. A key point in the design of data distribution systems is to ensure that the transmitted information is always up-to-date. Accordingly, we introduce the notion of staleness that captures the amount of time that passes from the moment the information is generated, until it is delivered to the client. We investigate the fundamental trade-off between the staleness and the waiting time. In particular, we present schedules that yield lowest possible waiting time for any given staleness constraint
本文研究了通过广播信道向大量被动客户端传输动态数据的问题。数据以离散数据包的形式同时分发给客户端,每个数据包捕获信息源的最新状态。客户端通过访问通道并侦听下一个可用数据包来获取信息。这种情况被称为离散广播,具有许多实际应用,例如将库存信息分发到无线移动设备以及在军事网络中下载最新的战斗信息。我们的目标是最小化客户端为获取新数据包而等待的时间,即客户端的等待时间。我们表明,我们可以通过在调度中添加冗余来显著减少等待时间。我们确定了保证任何客户端等待时间较短的通用调度,无论访问模式如何。数据分发系统设计的一个关键问题是确保传输的信息始终是最新的。因此,我们引入了过期的概念,它捕获了从信息生成到交付给客户端的时间。我们研究了过期和等待时间之间的基本权衡。特别地,我们给出了在任何给定的过期约束下产生尽可能低的等待时间的调度
{"title":"Staleness vs. waiting time in universal discrete broadcast","authors":"M. Langberg, A. Sprintson, Jehoshua Bruck","doi":"10.1109/ISIT.2005.1523721","DOIUrl":"https://doi.org/10.1109/ISIT.2005.1523721","url":null,"abstract":"In this paper we study the distribution of dynamic data over a broadcast channel to a large number of passive clients. The data is simultaneously distributed to clients in the form of discrete packets, each packet captures the most recent state of the information source. Clients obtain the information by accessing the channel and listening for the next available packet. This scenario, referred to as discrete broadcast, has many practical applications such as the distribution of stock information to wireless mobile devices and downloading up-to-date battle information in military networks. Our goal is minimize the amount of time a client has to wait in order to obtain a new data packet, i.e., the waiting time of the client. We show that we can significantly reduce the waiting time by adding redundancy to the schedule. We identify universal schedules that guarantee low waiting time for any client, regardless of the access pattern. A key point in the design of data distribution systems is to ensure that the transmitted information is always up-to-date. Accordingly, we introduce the notion of staleness that captures the amount of time that passes from the moment the information is generated, until it is delivered to the client. We investigate the fundamental trade-off between the staleness and the waiting time. In particular, we present schedules that yield lowest possible waiting time for any given staleness constraint","PeriodicalId":166130,"journal":{"name":"Proceedings. International Symposium on Information Theory, 2005. ISIT 2005.","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120937946","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Dense full-diversity matrix lattices for four transmit antenna MISO channel 四个发射天线MISO信道的密集全分集矩阵格
Pub Date : 2005-10-31 DOI: 10.1109/ISIT.2005.1523550
J. Hiltunen, C. Hollanti, J. Lahtonen
We construct some geometrically dense matrix lattices with good minimum determinants for 4 transmit antenna MISO applications. The construction is based on the theory of rings of algebraic integers and related subrings of the Hamiltonian quaternions. Simulations in a quasi-static Rayleigh fading channel show that our dense quaternionic constructions outperform the earlier rectangular lattices as well as the DAST-lattice
我们构造了一些具有良好最小行列式的几何密集矩阵格,用于4发射天线MISO应用。该结构基于代数整数环理论和哈密顿四元数的相关子数。在准静态瑞利衰落信道中的模拟表明,我们的密集四元数结构优于早期的矩形晶格和dast晶格
{"title":"Dense full-diversity matrix lattices for four transmit antenna MISO channel","authors":"J. Hiltunen, C. Hollanti, J. Lahtonen","doi":"10.1109/ISIT.2005.1523550","DOIUrl":"https://doi.org/10.1109/ISIT.2005.1523550","url":null,"abstract":"We construct some geometrically dense matrix lattices with good minimum determinants for 4 transmit antenna MISO applications. The construction is based on the theory of rings of algebraic integers and related subrings of the Hamiltonian quaternions. Simulations in a quasi-static Rayleigh fading channel show that our dense quaternionic constructions outperform the earlier rectangular lattices as well as the DAST-lattice","PeriodicalId":166130,"journal":{"name":"Proceedings. International Symposium on Information Theory, 2005. ISIT 2005.","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126575527","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Detection error probabilities in noncoherent channels 非相干信道中的检测误差概率
Pub Date : 2005-10-31 DOI: 10.1109/ISIT.2005.1523409
Daniel J. Ryan, I. Clarkson, I. Collings
This paper presents performance bounds for block-based detection of PAM and QAM transmitted over non-coherent channels. Such channels give rise to inherent detection ambiguities since multiple possible transmit sequences can have the same likelihood. The number of ambiguous sequences is a function of the block length. In this paper, we derive the probability of detection error in terms of a Dedekind zeta function of the block length, for infinite-sized constellations and zero noise. We also provide expressions for finite constellations which can be evaluated in polynomial time with the constellation size, as opposed to checking all possible sequences
本文给出了基于块的非相干信道上传输的PAM和QAM检测的性能界限。由于多个可能的传输序列可能具有相同的似然,因此这种信道产生固有的检测模糊性。歧义序列的数量是块长度的函数。在这篇论文中,我们导出了在无限大的星座和零噪声条件下,用块长度的Dedekind zeta函数来表示检测误差的概率。我们还提供了有限星座的表达式,它可以在多项式时间内计算星座大小,而不是检查所有可能的序列
{"title":"Detection error probabilities in noncoherent channels","authors":"Daniel J. Ryan, I. Clarkson, I. Collings","doi":"10.1109/ISIT.2005.1523409","DOIUrl":"https://doi.org/10.1109/ISIT.2005.1523409","url":null,"abstract":"This paper presents performance bounds for block-based detection of PAM and QAM transmitted over non-coherent channels. Such channels give rise to inherent detection ambiguities since multiple possible transmit sequences can have the same likelihood. The number of ambiguous sequences is a function of the block length. In this paper, we derive the probability of detection error in terms of a Dedekind zeta function of the block length, for infinite-sized constellations and zero noise. We also provide expressions for finite constellations which can be evaluated in polynomial time with the constellation size, as opposed to checking all possible sequences","PeriodicalId":166130,"journal":{"name":"Proceedings. International Symposium on Information Theory, 2005. ISIT 2005.","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126631149","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
Proceedings. International Symposium on Information Theory, 2005. ISIT 2005.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1