首页 > 最新文献

Proceedings. International Symposium on Information Theory, 2005. ISIT 2005.最新文献

英文 中文
Efficient MIMO detection by successive projection 基于连续投影的高效MIMO检测
Pub Date : 2005-10-31 DOI: 10.1109/ISIT.2005.1523631
Karen Su, I. Wassell
This paper presents a new MIMO detector based on successive projection of the received signal onto the faces of the lattice induced by the channel matrix. Analysis of the relationship between successive algorithms like V-BLAST and the maximum likelihood (ML) sphere decoder, which share a common underlying tree structure, leads to the design of the successive projection algorithm (SPA). Although it is a suboptimal detector, we prove theoretically that when ML detection can be realized in a successive manner, i.e., without back-tracking, ML performance is also achieved by the SPA. The advantageous implications of this result are illustrated via simulation of the average bit error rates attained over a 4 times 4 MIMO flat fading channel. For instance, at a target error rate of 10-3 using 16-QAM modulation, a 2.8 dB improvement over the popular V-BLAST detector is observed at a comparable complexity. We also demonstrate a parameterized SPA, which offers performance profiles approaching that of an ML detector
本文提出了一种新的MIMO检测器,该检测器基于接收信号在信道矩阵诱导的晶格表面上的连续投影。分析了V-BLAST等连续算法与最大似然球解码器(ML)之间的关系,它们具有共同的底层树结构,从而设计了连续投影算法(SPA)。虽然它是一个次优检测器,但我们从理论上证明,当机器学习检测可以以连续的方式实现时,即没有回溯,SPA也可以实现机器学习性能。通过模拟4 × 4 MIMO平坦衰落信道的平均误码率,说明了这一结果的有利意义。例如,在使用16-QAM调制的目标错误率为10-3时,在相当的复杂性下,可以观察到比流行的V-BLAST检测器提高2.8 dB。我们还演示了一个参数化的SPA,它提供了接近ML检测器的性能概况
{"title":"Efficient MIMO detection by successive projection","authors":"Karen Su, I. Wassell","doi":"10.1109/ISIT.2005.1523631","DOIUrl":"https://doi.org/10.1109/ISIT.2005.1523631","url":null,"abstract":"This paper presents a new MIMO detector based on successive projection of the received signal onto the faces of the lattice induced by the channel matrix. Analysis of the relationship between successive algorithms like V-BLAST and the maximum likelihood (ML) sphere decoder, which share a common underlying tree structure, leads to the design of the successive projection algorithm (SPA). Although it is a suboptimal detector, we prove theoretically that when ML detection can be realized in a successive manner, i.e., without back-tracking, ML performance is also achieved by the SPA. The advantageous implications of this result are illustrated via simulation of the average bit error rates attained over a 4 times 4 MIMO flat fading channel. For instance, at a target error rate of 10-3 using 16-QAM modulation, a 2.8 dB improvement over the popular V-BLAST detector is observed at a comparable complexity. We also demonstrate a parameterized SPA, which offers performance profiles approaching that of an ML detector","PeriodicalId":166130,"journal":{"name":"Proceedings. International Symposium on Information Theory, 2005. ISIT 2005.","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127974914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Maximum a posteriori decoding and turbo codes for general memoryless channels 最大后验解码和turbo码一般无内存信道
Pub Date : 2005-10-31 DOI: 10.1109/ISIT.2005.1523540
C. Méasson, R. Urbanke, A. Montanari, T. Richardson
We derive further properties of EXIT and generalized EXIT curves. In particular we present an area theorem for iterative (as compared to MAP) decoding, we show how to compute upper-bounds on the MAP threshold for general channels and we apply these techniques to turbo codes
进一步导出了EXIT曲线和广义EXIT曲线的性质。特别地,我们提出了迭代(与MAP相比)解码的面积定理,我们展示了如何计算一般信道MAP阈值的上界,并将这些技术应用于turbo码
{"title":"Maximum a posteriori decoding and turbo codes for general memoryless channels","authors":"C. Méasson, R. Urbanke, A. Montanari, T. Richardson","doi":"10.1109/ISIT.2005.1523540","DOIUrl":"https://doi.org/10.1109/ISIT.2005.1523540","url":null,"abstract":"We derive further properties of EXIT and generalized EXIT curves. In particular we present an area theorem for iterative (as compared to MAP) decoding, we show how to compute upper-bounds on the MAP threshold for general channels and we apply these techniques to turbo codes","PeriodicalId":166130,"journal":{"name":"Proceedings. International Symposium on Information Theory, 2005. ISIT 2005.","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115834105","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Relative entropy and exponential deviation bounds for general Markov chains 一般马尔可夫链的相对熵和指数偏差界
Pub Date : 2005-10-31 DOI: 10.1109/ISIT.2005.1523607
Ioannis Kontoyiannis, L. A. Lastras-Montaño, Sean P. Meyn
We develop explicit, general bounds for the probability that the normalized partial sums of a function of a Markov chain on a general alphabet would exceed the steady-state mean of that function by a given amount. Our bounds combine simple information-theoretic ideas together with techniques from optimization and some fairly elementary tools from analysis. In one direction, we obtain a general bound for the important class of Doeblin chains; this bound is optimal, in the sense that in the special case of independent and identically distributed random variables it essentially reduces to the classical Hoeffding bound. In another direction, motivated by important problems in simulation, we develop a series of bounds in a form which is particularly suited to these problems, and which apply to the more general class of "geometrically ergodic" Markov chains
我们为一般字母表上的马尔可夫链函数的规格化部分和超过该函数的稳态平均值给定量的概率开发了显式的一般界限。我们的界限结合了简单的信息论思想、优化技术和一些相当基本的分析工具。在一个方向上,我们得到了一类重要的Doeblin链的一般界;这个界是最优的,因为在独立同分布随机变量的特殊情况下,它本质上简化为经典的Hoeffding界。在另一个方向上,由于模拟中的重要问题,我们以一种特别适合这些问题的形式开发了一系列边界,并适用于更一般的“几何遍历”马尔可夫链
{"title":"Relative entropy and exponential deviation bounds for general Markov chains","authors":"Ioannis Kontoyiannis, L. A. Lastras-Montaño, Sean P. Meyn","doi":"10.1109/ISIT.2005.1523607","DOIUrl":"https://doi.org/10.1109/ISIT.2005.1523607","url":null,"abstract":"We develop explicit, general bounds for the probability that the normalized partial sums of a function of a Markov chain on a general alphabet would exceed the steady-state mean of that function by a given amount. Our bounds combine simple information-theoretic ideas together with techniques from optimization and some fairly elementary tools from analysis. In one direction, we obtain a general bound for the important class of Doeblin chains; this bound is optimal, in the sense that in the special case of independent and identically distributed random variables it essentially reduces to the classical Hoeffding bound. In another direction, motivated by important problems in simulation, we develop a series of bounds in a form which is particularly suited to these problems, and which apply to the more general class of \"geometrically ergodic\" Markov chains","PeriodicalId":166130,"journal":{"name":"Proceedings. International Symposium on Information Theory, 2005. ISIT 2005.","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131452172","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 49
On sensor network lifetime and data distortion 传感器网络寿命与数据失真
Pub Date : 2005-10-31 DOI: 10.1109/ISIT.2005.1523281
A. Kansal, A. Ramamoorthy, M. Srivastava, G. Pottie
Fidelity is one of the key considerations in data collection schemes for sensor networks. A second important consideration is the energy expense of achieving that fidelity. Data from multiple correlated sensors is collected over multi-hop routes and fused to reproduce the phenomenon. However, the same distortion may be achieved using multiple rate allocations among the correlated sensors. These rate allocations would typically have different energy cost in routing depending on the network topology. We consider the interplay between these two considerations of distortion and energy. First, we describe the various factors that affect this trade-off. Second, we discuss bounds on the achievable performance with respect to this trade-off. Specifically, we relate the network lifetime Lt to the distortion D of the delivered data. Finally, we present low-complexity approximations for the efficient computation of the Lt(D) bound
保真度是传感器网络数据采集方案的关键考虑因素之一。第二个重要的考虑因素是实现这种保真度的能源消耗。通过多跳路由收集来自多个相关传感器的数据并融合以再现该现象。然而,在相关传感器之间使用多个速率分配可以实现相同的失真。根据网络拓扑的不同,这些速率分配通常在路由中具有不同的能量成本。我们考虑畸变和能量这两个因素之间的相互作用。首先,我们描述了影响这种权衡的各种因素。其次,我们讨论了关于这种权衡的可实现性能的界限。具体来说,我们将网络寿命Lt与传输数据的失真D联系起来。最后,我们提出了一种低复杂度的近似方法,用于Lt(D)界的有效计算
{"title":"On sensor network lifetime and data distortion","authors":"A. Kansal, A. Ramamoorthy, M. Srivastava, G. Pottie","doi":"10.1109/ISIT.2005.1523281","DOIUrl":"https://doi.org/10.1109/ISIT.2005.1523281","url":null,"abstract":"Fidelity is one of the key considerations in data collection schemes for sensor networks. A second important consideration is the energy expense of achieving that fidelity. Data from multiple correlated sensors is collected over multi-hop routes and fused to reproduce the phenomenon. However, the same distortion may be achieved using multiple rate allocations among the correlated sensors. These rate allocations would typically have different energy cost in routing depending on the network topology. We consider the interplay between these two considerations of distortion and energy. First, we describe the various factors that affect this trade-off. Second, we discuss bounds on the achievable performance with respect to this trade-off. Specifically, we relate the network lifetime Lt to the distortion D of the delivered data. Finally, we present low-complexity approximations for the efficient computation of the Lt(D) bound","PeriodicalId":166130,"journal":{"name":"Proceedings. International Symposium on Information Theory, 2005. ISIT 2005.","volume":"126 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132033669","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 46
Near separability of optimal multiple description source codes 近可分性的最优多重描述源代码
Pub Date : 2005-10-31 DOI: 10.1109/ISIT.2005.1523655
H. Feng
In this paper, we first present new upper and lower bounds for the rate loss of multiple description source codes (MDSCs). For a two-description MDSC (2DSC), the rate loss of description i with distortion Di is Li = Ri $R(Di ), i isin {1, 2}, where Ri is the rate of the ith description; the joint rate loss associated with decoding the two descriptions together to achieve central distortion D0 is L 0 = R1 + R2 - R(D0). We show that given any memoryless source with variance sigma2 and mean squared error distortion measure, for any optimal 2DSC, (a) 0 les L0 les 0.8802 if D0 les D1 + D2 - sigma2; (b) 0 les L1, L2 les 0.4401 if D0 ges (1/D1 + 1/D2 - 1/sigma2)-1; (c) 0 les L1, L2 les 0.3802 and R(max{D1, D2}) - 1 les L0 les R(max{D1, D2}) + 0.3802 otherwise. We also present a tighter bound on the distance between the El Gamal-Cover inner bound and the achievable region. In addition, these new bounds, which are easy to compute, inspire new designs of low-complexity near-optimal 2DSC. In essence, we demonstrate that any optimal 2DSC can be nearly separated into a multi-resolution source code and a traditional single-resolution code, and the resulting rate penalty for each description is less than 0.6901 bit/sample for general sources and less than 0.5 bit/sample for successively refinable sources
在本文中,我们首先提出了多描述源代码(MDSCs)的速率损失的上下界。对于双描述MDSC (2DSC),具有畸变Di的描述i的速率损失为Li = Ri $R(Di), i = in{1,2},其中Ri为第i个描述的速率;将两种描述一起解码以实现中心失真D0的联合速率损失为l0 = R1 + R2 - R(D0)。我们证明了给定任何方差为sigma2且均方误差失真测量的无记忆源,对于任何最优的2DSC, (a)如果D0小于D1 + D2 - sigma2,则L0小于0.8802;(b)当D0 ges (1/D1 + 1/D2 -1 /sigma2)-1时,0 les L1, L2 les 0.4401;(c) 0列L1, L2列0.3802,R(max{D1, D2}) - 1列L0列R(max{D1, D2}) + 0.3802,否则。我们还提出了El gamal -盖层内界与可达区域之间距离的更严格的界限。此外,这些易于计算的新边界激发了低复杂度近最优2DSC的新设计。从本质上讲,我们证明了任何最优的2DSC几乎可以分为多分辨率源代码和传统的单分辨率代码,并且对于一般源,每个描述的结果率惩罚小于0.6901比特/样本,对于连续可细化源,每个描述的结果率惩罚小于0.5比特/样本
{"title":"Near separability of optimal multiple description source codes","authors":"H. Feng","doi":"10.1109/ISIT.2005.1523655","DOIUrl":"https://doi.org/10.1109/ISIT.2005.1523655","url":null,"abstract":"In this paper, we first present new upper and lower bounds for the rate loss of multiple description source codes (MDSCs). For a two-description MDSC (2DSC), the rate loss of description i with distortion D<sub>i</sub> is L<sub>i</sub> = R<sub>i</sub> $R(D<sub>i </sub>), i isin {1, 2}, where R<sub>i</sub> is the rate of the ith description; the joint rate loss associated with decoding the two descriptions together to achieve central distortion D<sub>0</sub> is L <sub>0</sub> = R<sub>1</sub> + R<sub>2</sub> - R(D<sub>0</sub>). We show that given any memoryless source with variance sigma<sup>2</sup> and mean squared error distortion measure, for any optimal 2DSC, (a) 0 les L<sub>0</sub> les 0.8802 if D<sub>0</sub> les D<sub>1</sub> + D<sub>2</sub> - sigma<sup>2</sup>; (b) 0 les L<sub>1</sub>, L<sub>2 </sub> les 0.4401 if D<sub>0</sub> ges (1/D<sub>1</sub> + 1/D<sub>2 </sub> - 1/sigma<sup>2</sup>)<sup>-1</sup>; (c) 0 les L<sub>1</sub>, L<sub>2</sub> les 0.3802 and R(max{D<sub>1</sub>, D<sub>2</sub>}) - 1 les L<sub>0</sub> les R(max{D<sub>1</sub>, D<sub>2</sub>}) + 0.3802 otherwise. We also present a tighter bound on the distance between the El Gamal-Cover inner bound and the achievable region. In addition, these new bounds, which are easy to compute, inspire new designs of low-complexity near-optimal 2DSC. In essence, we demonstrate that any optimal 2DSC can be nearly separated into a multi-resolution source code and a traditional single-resolution code, and the resulting rate penalty for each description is less than 0.6901 bit/sample for general sources and less than 0.5 bit/sample for successively refinable sources","PeriodicalId":166130,"journal":{"name":"Proceedings. International Symposium on Information Theory, 2005. ISIT 2005.","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132410677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Toward a theory of avalanche-creating and error-controlling encoding schemes 雪崩产生与错误控制编码方案的理论探讨
Pub Date : 2005-10-31 DOI: 10.1109/ISIT.2005.1523777
G. Malewicz
This paper introduces a theory of avalanche-creating and error-controlling encoding schemes. We consider a Hamming space {0, 1} n and the problem of finding a bijection g : {0, 1}n rarr {0, 1}n, with inverse h = g-1, that creates avalanche and controls error. That is, for any vectors u and v that are at most b1 apart, their images g(u) and g(v) are at least b2 apart; and for any vectors v and e, the distance between h(g(v) + e) and v is at most the length of e (the distance from e to 0n) plus b3. It appears that the two objectives of achieving avalanche effect and error control simultaneously in a single encoding scheme are contradictory. This paper is the first attempt at understanding the tradeoffs. Toward this end, the paper determines nontrivial cases when desired encoding schemes can be efficiently constructed, cases when schemes exist but it is not known how to construct them efficiently, and cases when schemes do not exist at all
本文介绍了雪崩产生和错误控制编码方案的原理。我们考虑一个汉明空间{0,1}n和寻找一个双射g: {0,1}n rarr {0,1}n的问题,逆h = g-1,它产生雪崩并控制误差。也就是说,对于任意向量u和v间距不超过b1,它们的像g(u)和g(v)间距至少为b2;对于任意向量v和e, h(g(v) + e)和v之间的距离不超过e的长度(e到0n的距离)加上b3。在一种编码方案中同时实现雪崩效应和误差控制的两个目标似乎是矛盾的。本文是理解这种权衡的第一次尝试。为此,本文确定了可以有效构造所需编码方案的非平凡情况,存在编码方案但不知道如何有效构造编码方案的情况,以及根本不存在编码方案的情况
{"title":"Toward a theory of avalanche-creating and error-controlling encoding schemes","authors":"G. Malewicz","doi":"10.1109/ISIT.2005.1523777","DOIUrl":"https://doi.org/10.1109/ISIT.2005.1523777","url":null,"abstract":"This paper introduces a theory of avalanche-creating and error-controlling encoding schemes. We consider a Hamming space {0, 1} n and the problem of finding a bijection g : {0, 1}n rarr {0, 1}n, with inverse h = g-1, that creates avalanche and controls error. That is, for any vectors u and v that are at most b1 apart, their images g(u) and g(v) are at least b2 apart; and for any vectors v and e, the distance between h(g(v) + e) and v is at most the length of e (the distance from e to 0n) plus b3. It appears that the two objectives of achieving avalanche effect and error control simultaneously in a single encoding scheme are contradictory. This paper is the first attempt at understanding the tradeoffs. Toward this end, the paper determines nontrivial cases when desired encoding schemes can be efficiently constructed, cases when schemes exist but it is not known how to construct them efficiently, and cases when schemes do not exist at all","PeriodicalId":166130,"journal":{"name":"Proceedings. International Symposium on Information Theory, 2005. ISIT 2005.","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130151458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A universal scheme for learning 学习的通用方案
Pub Date : 2005-10-31 DOI: 10.1109/ISIT.2005.1523523
V. Farias, C. Moallemi, Benjamin Van Roy, T. Weissman
We consider the problem of optimal control of a Kth order Markov process so as to minimize long-term average cost, a framework with many applications in communications and beyond. Specifically, we wish to do so without knowledge of either the transition kernel or even the order K. We develop and analyze two algorithms, based on the Lempel-Ziv scheme for data compression, that maintain probability estimates along variable length contexts. We establish that eventually, with probability 1, the optimal action is taken at each context. Further, in the case of the second algorithm, we establish almost sure asymptotic optimality
我们考虑了一个k阶马尔可夫过程的最优控制问题,以使长期平均代价最小化,这个框架在通信和其他领域有许多应用。具体来说,我们希望在不知道转换核甚至k阶的情况下做到这一点。我们基于数据压缩的Lempel-Ziv方案开发并分析了两种算法,这两种算法保持了沿可变长度上下文的概率估计。我们最终确定,在每种情况下采取最佳行动的概率为1。此外,对于第二种算法,我们建立了几乎确定的渐近最优性
{"title":"A universal scheme for learning","authors":"V. Farias, C. Moallemi, Benjamin Van Roy, T. Weissman","doi":"10.1109/ISIT.2005.1523523","DOIUrl":"https://doi.org/10.1109/ISIT.2005.1523523","url":null,"abstract":"We consider the problem of optimal control of a Kth order Markov process so as to minimize long-term average cost, a framework with many applications in communications and beyond. Specifically, we wish to do so without knowledge of either the transition kernel or even the order K. We develop and analyze two algorithms, based on the Lempel-Ziv scheme for data compression, that maintain probability estimates along variable length contexts. We establish that eventually, with probability 1, the optimal action is taken at each context. Further, in the case of the second algorithm, we establish almost sure asymptotic optimality","PeriodicalId":166130,"journal":{"name":"Proceedings. International Symposium on Information Theory, 2005. ISIT 2005.","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134225091","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sequential random binning for streaming distributed source coding 流式分布式源编码的顺序随机分组
Pub Date : 2005-10-31 DOI: 10.1109/ISIT.2005.1523572
S. Draper, Cheng Chang, A. Sahai
Random binning arguments underlie many results in information theory. In this paper we introduce and analyze a novel type of causal random binning "sequential" binning. This binning is used to get streaming Slepian-Wolf codes with an "anytime" character. At the decoder, the probability of estimation error on any particular symbol goes to zero exponentially fast with delay. In the non-distributed context, we show equivalent results for fixed-rate streaming entropy coding. Because of space constraints, we present full derivations only for the latter, stating the results for the distributed problem. We give bounds on error exponents for both universal and maximum-likelihood decoders
随机分组论证是信息论中许多结果的基础。本文介绍并分析了一种新型的因果随机分型——序列分型。这个分组用于获得带有“anytime”字符的流化sleep - wolf代码。在解码器处,任意特定符号的估计误差概率随时延呈指数级快速趋近于零。在非分布式环境中,我们展示了固定速率流熵编码的等效结果。由于篇幅的限制,我们只给出了后者的完整推导,说明了分布式问题的结果。我们给出了通用解码器和最大似然解码器的误差指数的界限
{"title":"Sequential random binning for streaming distributed source coding","authors":"S. Draper, Cheng Chang, A. Sahai","doi":"10.1109/ISIT.2005.1523572","DOIUrl":"https://doi.org/10.1109/ISIT.2005.1523572","url":null,"abstract":"Random binning arguments underlie many results in information theory. In this paper we introduce and analyze a novel type of causal random binning \"sequential\" binning. This binning is used to get streaming Slepian-Wolf codes with an \"anytime\" character. At the decoder, the probability of estimation error on any particular symbol goes to zero exponentially fast with delay. In the non-distributed context, we show equivalent results for fixed-rate streaming entropy coding. Because of space constraints, we present full derivations only for the latter, stating the results for the distributed problem. We give bounds on error exponents for both universal and maximum-likelihood decoders","PeriodicalId":166130,"journal":{"name":"Proceedings. International Symposium on Information Theory, 2005. ISIT 2005.","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134527526","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
On the rate loss and construction of source codes for broadcast channels 广播信道码率损失与码结构研究
Pub Date : 2005-10-31 DOI: 10.1109/ISIT.2005.1523297
H. Feng, M. Effros
In this paper, we first define and bound the rate loss of source codes for broadcast channels. Our broadcast channel model comprises one transmitter and two receivers; the transmitter is connected to each receiver by a private channel and to both receivers by a common channel. The transmitter sends a description of source (X, Y) through these channels, receiver 1 reconstructs X with distortion D1, and receiver 2 reconstructs Y with distortion D2. Suppose the rates of the common channel and private channels 1 and 2 are R0, R1, and R2, respectively. The work of Gray and Wyner gives a complete characterization of all achievable rate triples (R0,R1,R2) given any distortion pair (D1,D2). In this paper, we define the rate loss as the gap between the achievable region and the outer bound composed by the rate-distortion functions, i.e., R0+R1+R2 ≥ RX,Y (D1,D2), R0 + R1 ≥ RX(D1), and R0 + R2 ≥ RY (D2). We upper bound the rate loss for general sources by functions of distortions and upper bound the rate loss for Gaussian sources by constants, which implies that though the outer bound is generally not achievable, it may be quite close to the achievable region. This also bounds the gap between the achievable region and the inner bound proposed by Gray and Wyner and bounds the performance penalty associated with using separate decoders rather than joint decoders. We then construct such source codes using entropy-constrained dithered quantizers. The resulting implementation has low complexity and performance close to the theoretical optimum. In particular, the gap between its performance and the theoretical optimum can be bounded from above by constants for Gaussian sources.
本文首先对广播信道的码率损失进行了定义和绑定。我们的广播信道模型包括一个发射机和两个接收机;发射器通过专用信道连接到每个接收器,并通过公共信道连接到两个接收器。发射器通过这些通道发送源(X, Y)的描述,接收器1以失真D1重建X,接收器2以失真D2重建Y。假设公共通道1和私有通道2的速率分别为R0、R1和R2。Gray和Wyner的工作给出了给定任意失真对(D1,D2)的所有可实现的速率三元组(R0,R1,R2)的完整表征。本文将速率损失定义为R0+R1+R2≥RX、Y (D1,D2)、R0+R1≥RX(D1)、R0+ R2≥RY (D2)等速率畸变函数构成的可达区域与外界之间的间隙。我们用畸变函数为一般源的速率损失上界,用常数为高斯源的速率损失上界,这意味着虽然外界通常是不可达到的,但它可能非常接近可达到的区域。这也限制了Gray和Wyner提出的可实现区域和内部边界之间的差距,并限制了使用单独解码器而不是联合解码器所带来的性能损失。然后,我们使用熵约束的抖动量化器构造这样的源代码。所得到的实现具有较低的复杂度和接近理论最优的性能。特别是,它的性能和理论最优之间的差距可以由上面的高斯源常数来界定。
{"title":"On the rate loss and construction of source codes for broadcast channels","authors":"H. Feng, M. Effros","doi":"10.1109/ISIT.2005.1523297","DOIUrl":"https://doi.org/10.1109/ISIT.2005.1523297","url":null,"abstract":"In this paper, we first define and bound the rate loss of source codes for broadcast channels. Our broadcast channel model comprises one transmitter and two receivers; the transmitter is connected to each receiver by a private channel and to both receivers by a common channel. The transmitter sends a description of source (X, Y) through these channels, receiver 1 reconstructs X with distortion D1, and receiver 2 reconstructs Y with distortion D2. Suppose the rates of the common channel and private channels 1 and 2 are R0, R1, and R2, respectively. The work of Gray and Wyner gives a complete characterization of all achievable rate triples (R0,R1,R2) given any distortion pair (D1,D2). In this paper, we define the rate loss as the gap between the achievable region and the outer bound composed by the rate-distortion functions, i.e., R0+R1+R2 ≥ RX,Y (D1,D2), R0 + R1 ≥ RX(D1), and R0 + R2 ≥ RY (D2). We upper bound the rate loss for general sources by functions of distortions and upper bound the rate loss for Gaussian sources by constants, which implies that though the outer bound is generally not achievable, it may be quite close to the achievable region. This also bounds the gap between the achievable region and the inner bound proposed by Gray and Wyner and bounds the performance penalty associated with using separate decoders rather than joint decoders. We then construct such source codes using entropy-constrained dithered quantizers. The resulting implementation has low complexity and performance close to the theoretical optimum. In particular, the gap between its performance and the theoretical optimum can be bounded from above by constants for Gaussian sources.","PeriodicalId":166130,"journal":{"name":"Proceedings. International Symposium on Information Theory, 2005. ISIT 2005.","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132598530","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Error-correcting signature code for multiple-access adder channel 多址加法器信道的纠错签名码
Pub Date : 2005-10-31 DOI: 10.1109/ISIT.2005.1523703
Jun Cheng, K. Kamoi, Y. Watanabe
Error-correcting signature code is proposed. An n/2-decodable signature code with code length n - 1 and cardinality n - 1 is developed from an Hadamard matrix of order n. The code is used to identify users through the multiple-access adder channel, even in the presence of channel noise
提出了纠错签名码。从阶为n的Hadamard矩阵中开发了一个码长为n - 1、基数为n - 1的n/2可解码签名码。该码用于通过多址加法器信道识别用户,即使存在信道噪声
{"title":"Error-correcting signature code for multiple-access adder channel","authors":"Jun Cheng, K. Kamoi, Y. Watanabe","doi":"10.1109/ISIT.2005.1523703","DOIUrl":"https://doi.org/10.1109/ISIT.2005.1523703","url":null,"abstract":"Error-correcting signature code is proposed. An n/2-decodable signature code with code length n - 1 and cardinality n - 1 is developed from an Hadamard matrix of order n. The code is used to identify users through the multiple-access adder channel, even in the presence of channel noise","PeriodicalId":166130,"journal":{"name":"Proceedings. International Symposium on Information Theory, 2005. ISIT 2005.","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130740037","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
Proceedings. International Symposium on Information Theory, 2005. ISIT 2005.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1