首页 > 最新文献

2015 IEEE Information Theory Workshop (ITW)最新文献

英文 中文
Transmitting k samples over the Gaussian channel: Energy-distortion tradeoff 在高斯信道上传输k个样本:能量失真权衡
Pub Date : 2015-06-25 DOI: 10.1109/ITW.2015.7133162
V. Kostina, Yury Polyanskiy, S. Verdú
We investigate the minimum transmitted energy required to reproduce k source samples with a given fidelity after transmission over a memoryless Gaussian channel. In particular, we analyze the reduction in transmitted energy that accrues thanks to the availability of noiseless feedback. Allowing a nonvanishing excess distortion probability ∈ boosts the asymptotic fundamental limit by a factor of 1-∈, with or without feedback. If feedback is available, achieving guaranteed distortion with finite average energy is possible.
我们研究了在无记忆高斯信道传输后以给定保真度再现k源样本所需的最小传输能量。特别地,我们分析了由于无噪声反馈的可用性而产生的传输能量的减少。允许一个不消失的过度失真概率∈,在有或没有反馈的情况下,将渐近基本极限提高1-∈。如果反馈是可用的,以有限的平均能量实现保证失真是可能的。
{"title":"Transmitting k samples over the Gaussian channel: Energy-distortion tradeoff","authors":"V. Kostina, Yury Polyanskiy, S. Verdú","doi":"10.1109/ITW.2015.7133162","DOIUrl":"https://doi.org/10.1109/ITW.2015.7133162","url":null,"abstract":"We investigate the minimum transmitted energy required to reproduce k source samples with a given fidelity after transmission over a memoryless Gaussian channel. In particular, we analyze the reduction in transmitted energy that accrues thanks to the availability of noiseless feedback. Allowing a nonvanishing excess distortion probability ∈ boosts the asymptotic fundamental limit by a factor of 1-∈, with or without feedback. If feedback is available, achieving guaranteed distortion with finite average energy is possible.","PeriodicalId":174797,"journal":{"name":"2015 IEEE Information Theory Workshop (ITW)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125149166","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Zero-latency zero-error codes for parallel asynchronous channels with arbitrary skews 具有任意倾斜的并行异步信道的零延迟零错误代码
Pub Date : 2015-06-25 DOI: 10.1109/ITW.2015.7133092
S. Engelberg, O. Keren
Transmission across asynchronous communication channels can be subjected to delay injection attacks. Delay injection attacks cause arbitrary skews - arbitrary numbers of transmitted signals can arrive after the first signal of the next transmission has arrived. The (common) assumption that all signals form the ith transmission arrive at the decoder before any signal from the (i + 2)th transmission arrives is called a no switch assumption. This paper presents a self-synchronizing zero-latency coding scheme that requires no acknowledge and can perfectly decode any transmission distorted by an arbitrary skew that obeys the no switch assumption.
跨异步通信通道的传输可能受到延迟注入攻击。延迟注入攻击导致任意的倾斜——在下一个传输的第一个信号到达之后,任意数量的传输信号可以到达。第i次传输的所有信号在第i + 2次传输的任何信号到达解码器之前到达解码器的(常见)假设称为无开关假设。本文提出了一种不需要应答的自同步零延迟编码方案,该方案可以完美地解码任何被任意倾斜扭曲的传输,并且符合无开关假设。
{"title":"Zero-latency zero-error codes for parallel asynchronous channels with arbitrary skews","authors":"S. Engelberg, O. Keren","doi":"10.1109/ITW.2015.7133092","DOIUrl":"https://doi.org/10.1109/ITW.2015.7133092","url":null,"abstract":"Transmission across asynchronous communication channels can be subjected to delay injection attacks. Delay injection attacks cause arbitrary skews - arbitrary numbers of transmitted signals can arrive after the first signal of the next transmission has arrived. The (common) assumption that all signals form the ith transmission arrive at the decoder before any signal from the (i + 2)th transmission arrives is called a no switch assumption. This paper presents a self-synchronizing zero-latency coding scheme that requires no acknowledge and can perfectly decode any transmission distorted by an arbitrary skew that obeys the no switch assumption.","PeriodicalId":174797,"journal":{"name":"2015 IEEE Information Theory Workshop (ITW)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126046010","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Non-binary GLD codes and their lattices 非二进制GLD码及其格
Pub Date : 2015-06-25 DOI: 10.1109/ITW.2015.7133127
N. Pietro, Nour Basha, J. Boutros
The recently discovered family of generalized low-density (GLD) lattices brings new mathematical challenges to coding theorists and practitioners. Given the excellent performance of integer GLD lattices in high dimensions and motivated by the simple lattice structure used for fast iterative decoding, this paper is a first attempt to analyze GLD lattices for asymptotically large dimensions. Firstly, we describe non-binary GLD codes and show their asymptotic goodness in terms of minimum Hamming distance. Secondly, we consider a GLD lattice ensemble built via Construction A from non-binary GLD codes, and analyze their goodness with respect to Poltyrev limit on the Gaussian channel. Finally, at large dimensions and using a large code alphabet, we prove that infinite GLD lattice constellations attain Poltyrev capacity limit under maximum likelihood decoding.
最近发现的广义低密度格族(GLD)给编码理论家和实践者带来了新的数学挑战。考虑到整数GLD格在高维上的优异性能和用于快速迭代译码的简单格结构,本文首次尝试分析渐近大维的GLD格。首先,我们描述了非二进制GLD码,并从最小汉明距离的角度证明了它们的渐近良性。其次,我们考虑了由非二进制GLD码通过构造a构建的GLD晶格集合,并分析了它们在高斯信道上的Poltyrev极限的良度。最后,在大维度和大编码字母下,我们证明了无限GLD晶格星座在最大似然解码下达到了polytyrev容量极限。
{"title":"Non-binary GLD codes and their lattices","authors":"N. Pietro, Nour Basha, J. Boutros","doi":"10.1109/ITW.2015.7133127","DOIUrl":"https://doi.org/10.1109/ITW.2015.7133127","url":null,"abstract":"The recently discovered family of generalized low-density (GLD) lattices brings new mathematical challenges to coding theorists and practitioners. Given the excellent performance of integer GLD lattices in high dimensions and motivated by the simple lattice structure used for fast iterative decoding, this paper is a first attempt to analyze GLD lattices for asymptotically large dimensions. Firstly, we describe non-binary GLD codes and show their asymptotic goodness in terms of minimum Hamming distance. Secondly, we consider a GLD lattice ensemble built via Construction A from non-binary GLD codes, and analyze their goodness with respect to Poltyrev limit on the Gaussian channel. Finally, at large dimensions and using a large code alphabet, we prove that infinite GLD lattice constellations attain Poltyrev capacity limit under maximum likelihood decoding.","PeriodicalId":174797,"journal":{"name":"2015 IEEE Information Theory Workshop (ITW)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128190229","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Compute-and-forward using nested linear codes for the Gaussian MAC 使用高斯MAC的嵌套线性代码进行计算和转发
Pub Date : 2015-06-25 DOI: 10.1109/ITW.2015.7133094
Jingge Zhu, M. Gastpar
The classical modulo-lattice construction of Erez et al. has been successfully applied to several coding problems under Gaussian noise, including coding for computation over multiple-access channels (MAC). For the latter problem, an alternative construction can be developed by extending a recently proposed nested linear code to Gaussian case. In this note, it is shown that using the nested linear code with judiciously chosen input distributions, the original compute-and-forward result is recovered and larger computation rates are achievable. In particular we show that the Gaussian input distribution is not optimal in general for the computation problem over Gaussian MAC. Among other results, new achievable rates for the Gaussian two-way relay channel (TWRC) are given.
Erez等人的经典模格结构已成功应用于高斯噪声下的几个编码问题,包括多址信道(MAC)上的计算编码。对于后一个问题,可以通过将最近提出的嵌套线性代码扩展到高斯情况来开发一种替代结构。在这篇文章中,我们发现使用嵌套的线性代码和明智地选择输入分布,可以恢复原始的计算和转发结果,并且可以实现更高的计算率。特别地,我们表明高斯输入分布通常不是最优的高斯MAC计算问题。在其他结果中,给出了高斯双向中继信道(TWRC)的新可实现速率。
{"title":"Compute-and-forward using nested linear codes for the Gaussian MAC","authors":"Jingge Zhu, M. Gastpar","doi":"10.1109/ITW.2015.7133094","DOIUrl":"https://doi.org/10.1109/ITW.2015.7133094","url":null,"abstract":"The classical modulo-lattice construction of Erez et al. has been successfully applied to several coding problems under Gaussian noise, including coding for computation over multiple-access channels (MAC). For the latter problem, an alternative construction can be developed by extending a recently proposed nested linear code to Gaussian case. In this note, it is shown that using the nested linear code with judiciously chosen input distributions, the original compute-and-forward result is recovered and larger computation rates are achievable. In particular we show that the Gaussian input distribution is not optimal in general for the computation problem over Gaussian MAC. Among other results, new achievable rates for the Gaussian two-way relay channel (TWRC) are given.","PeriodicalId":174797,"journal":{"name":"2015 IEEE Information Theory Workshop (ITW)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128217443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Encoding and decoding algorithms for LP-decodable multipermutation codes lp可解码多排列码的编码和解码算法
Pub Date : 2015-06-25 DOI: 10.1109/ITW.2015.7133088
Xishuo Liu, S. Draper
LP-decodable multipermutation codes are a class of multipermutation codes that can be decoded using linear programming (LP). These codes are defined using linearly constrained multipermutation matrices, which are binary matrices that satisfy particular row sum and column sum constraints. Although generic LP solvers are capable of solving the LP decoding problem, they are not efficient in general because they do not leverage structures of the problem. This motivates us to study efficient decoding algorithms. In this paper, we focus on encoding and decoding algorithms for LP-decodable multipermutation codes. We first describe an algorithm that “ranks” multipermutations. In other words, it maps consecutive integers, one by one, to an ordered list of multipermutations. By leveraging this algorithm, we develop an encoding algorithm for a code proposed by Shieh and Tsai. Regarding decoding algorithms we propose an iterative decoding algorithm based on the alternating direction method of multipliers (ADMM), each iteration of which can be solved efficiently using off-the-shelf techniques. Finally, we study decoding performances of different decoders via simulation.
LP可解码多置换码是一类可以使用线性规划(LP)进行解码的多置换码。这些代码是使用线性约束的多置换矩阵定义的,这些矩阵是满足特定行和和约束的二进制矩阵。尽管通用LP求解器能够解决LP解码问题,但它们通常效率不高,因为它们没有利用问题的结构。这促使我们研究高效的解码算法。本文主要研究了lp可解码多置换码的编码和解码算法。我们首先描述了一个对多重排列进行“排序”的算法。换句话说,它将连续整数一个接一个地映射到多重排列的有序列表。利用该算法,我们为Shieh和Tsai提出的代码开发了一种编码算法。在译码算法方面,我们提出了一种基于乘法器交替方向法(ADMM)的迭代译码算法,该算法的每次迭代都可以使用现成的技术高效地求解。最后,通过仿真研究了不同解码器的译码性能。
{"title":"Encoding and decoding algorithms for LP-decodable multipermutation codes","authors":"Xishuo Liu, S. Draper","doi":"10.1109/ITW.2015.7133088","DOIUrl":"https://doi.org/10.1109/ITW.2015.7133088","url":null,"abstract":"LP-decodable multipermutation codes are a class of multipermutation codes that can be decoded using linear programming (LP). These codes are defined using linearly constrained multipermutation matrices, which are binary matrices that satisfy particular row sum and column sum constraints. Although generic LP solvers are capable of solving the LP decoding problem, they are not efficient in general because they do not leverage structures of the problem. This motivates us to study efficient decoding algorithms. In this paper, we focus on encoding and decoding algorithms for LP-decodable multipermutation codes. We first describe an algorithm that “ranks” multipermutations. In other words, it maps consecutive integers, one by one, to an ordered list of multipermutations. By leveraging this algorithm, we develop an encoding algorithm for a code proposed by Shieh and Tsai. Regarding decoding algorithms we propose an iterative decoding algorithm based on the alternating direction method of multipliers (ADMM), each iteration of which can be solved efficiently using off-the-shelf techniques. Finally, we study decoding performances of different decoders via simulation.","PeriodicalId":174797,"journal":{"name":"2015 IEEE Information Theory Workshop (ITW)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125642384","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Harmonic analysis of binary functions 二元函数的调和分析
Pub Date : 2015-06-25 DOI: 10.1109/ITW.2015.7133147
J. Belfiore, Y. Hong, E. Viterbo
In this paper we introduce the two-modular Fourier transform of a binary function f : R → R defined over a finite commutative ring R = F2[X]/φ(X), where F2[X] is the ring of polynomials with binary coefficients and φ(X) is a polynomial of degree n, which is not a multiple of X. We also introduce the corresponding inverse Fourier transform. We then prove the corresponding convolution theorem.
本文介绍了在有限交换环R = F2[X]/φ(X)上定义的二元函数f: R→R的双模傅里叶变换,其中F2[X]是二元系数多项式环,φ(X)是n次多项式,不是X的倍数,并给出了相应的傅里叶反变换。然后证明相应的卷积定理。
{"title":"Harmonic analysis of binary functions","authors":"J. Belfiore, Y. Hong, E. Viterbo","doi":"10.1109/ITW.2015.7133147","DOIUrl":"https://doi.org/10.1109/ITW.2015.7133147","url":null,"abstract":"In this paper we introduce the two-modular Fourier transform of a binary function f : R → R defined over a finite commutative ring R = F2[X]/φ(X), where F2[X] is the ring of polynomials with binary coefficients and φ(X) is a polynomial of degree n, which is not a multiple of X. We also introduce the corresponding inverse Fourier transform. We then prove the corresponding convolution theorem.","PeriodicalId":174797,"journal":{"name":"2015 IEEE Information Theory Workshop (ITW)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130142798","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On compute-and-forward with feedback 在电脑上进行反馈
Pub Date : 2015-06-25 DOI: 10.1109/ITW.2015.7133154
Or Ordentlich, U. Erez, B. Nazer
We consider a Gaussian multiple-access channel where each user's message is identified with a vector of elements from a finite field, and the receiver's goal is to decode a linear combination of these finite field vectors. It is further assumed that each transmitter can causally observe the channel's output through a clean feedback link. We propose a novel coding scheme for this setup, which can be seen as an extension of the Cover-Leung scheme for the computation problem. This scheme is shown to achieve computation rates higher than the best known computation rates for the same scenario without feedback. In particular, for the symmetric two-user Gaussian multiple-access channel, the proposed scheme attains a symmetric computation rate greater than 1/2 log(3/4 + SNR).
我们考虑一个高斯多址信道,其中每个用户的消息都用有限域的元素向量来标识,接收器的目标是解码这些有限域向量的线性组合。进一步假设每个发射机可以通过一个干净的反馈链路因果观察信道的输出。我们提出了一种新的编码方案,它可以看作是Cover-Leung方案在计算问题上的扩展。在没有反馈的情况下,该方案的计算速率高于已知的最佳计算速率。特别是对于对称双用户高斯多址信道,该方案的对称计算率大于1/2 log(3/4 + SNR)。
{"title":"On compute-and-forward with feedback","authors":"Or Ordentlich, U. Erez, B. Nazer","doi":"10.1109/ITW.2015.7133154","DOIUrl":"https://doi.org/10.1109/ITW.2015.7133154","url":null,"abstract":"We consider a Gaussian multiple-access channel where each user's message is identified with a vector of elements from a finite field, and the receiver's goal is to decode a linear combination of these finite field vectors. It is further assumed that each transmitter can causally observe the channel's output through a clean feedback link. We propose a novel coding scheme for this setup, which can be seen as an extension of the Cover-Leung scheme for the computation problem. This scheme is shown to achieve computation rates higher than the best known computation rates for the same scenario without feedback. In particular, for the symmetric two-user Gaussian multiple-access channel, the proposed scheme attains a symmetric computation rate greater than 1/2 log(3/4 + SNR).","PeriodicalId":174797,"journal":{"name":"2015 IEEE Information Theory Workshop (ITW)","volume":"216 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114356728","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Secret-key cryptography from ideal primitives: A systematic overview 基于理想原语的秘密密钥加密:系统概述
Pub Date : 2015-06-25 DOI: 10.1109/ITW.2015.7133163
Peter Gazi, Stefano Tessaro
Secret-key constructions are often proved secure in a model where one or more underlying components are replaced by an idealized oracle accessible to the attacker. This model gives rise to information-theoretic security analyses, and several advances have been made in this area over the last few years. This paper provides a systematic overview of what is achievable in this model, and how existing works fit into this view.
在一个模型中,一个或多个底层组件被攻击者可以访问的理想oracle所取代,秘钥结构通常被证明是安全的。该模型引起了信息论安全分析,并且在过去几年中在该领域取得了一些进展。本文提供了一个系统的概述,在这个模型中可以实现什么,以及现有的工作如何适应这个观点。
{"title":"Secret-key cryptography from ideal primitives: A systematic overview","authors":"Peter Gazi, Stefano Tessaro","doi":"10.1109/ITW.2015.7133163","DOIUrl":"https://doi.org/10.1109/ITW.2015.7133163","url":null,"abstract":"Secret-key constructions are often proved secure in a model where one or more underlying components are replaced by an idealized oracle accessible to the attacker. This model gives rise to information-theoretic security analyses, and several advances have been made in this area over the last few years. This paper provides a systematic overview of what is achievable in this model, and how existing works fit into this view.","PeriodicalId":174797,"journal":{"name":"2015 IEEE Information Theory Workshop (ITW)","volume":"361 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124546648","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Powers of codes and applications to cryptography 代码的力量和密码学的应用
Pub Date : 2015-06-25 DOI: 10.1109/ITW.2015.7133155
Ignacio Cascudo
Given a linear error correcting code C, its m-th power is defined as the linear span of the set of all coordinate-wise products of m (not necessarily distinct) codewords in C. The study of powers of codes (and especially squares) is relevant in a number of recent results in several areas of cryptography where we need to bound certain parameters (such as the dimension and the minimum distance) of both a linear code and some power of it simultaneously. These areas include most notably secret sharing and multiparty computation, but also two-party cryptography and public key cryptography. In this paper, some of these applications will be discussed together with several recent results and some open challenges.
给定一个线性纠错码C、m力量被定义为线性的所有坐标态的集合m(不一定是不同的)的产品码字在C代码的研究力量(特别是广场)相关的最近的加密结果在几个方面我们需要绑定某些参数(如尺寸和最小距离)的一个线性代码,同时它的某些权力。这些领域包括最显著的秘密共享和多方计算,以及两方加密和公钥加密。在本文中,将讨论其中的一些应用,以及一些最近的结果和一些开放的挑战。
{"title":"Powers of codes and applications to cryptography","authors":"Ignacio Cascudo","doi":"10.1109/ITW.2015.7133155","DOIUrl":"https://doi.org/10.1109/ITW.2015.7133155","url":null,"abstract":"Given a linear error correcting code C, its m-th power is defined as the linear span of the set of all coordinate-wise products of m (not necessarily distinct) codewords in C. The study of powers of codes (and especially squares) is relevant in a number of recent results in several areas of cryptography where we need to bound certain parameters (such as the dimension and the minimum distance) of both a linear code and some power of it simultaneously. These areas include most notably secret sharing and multiparty computation, but also two-party cryptography and public key cryptography. In this paper, some of these applications will be discussed together with several recent results and some open challenges.","PeriodicalId":174797,"journal":{"name":"2015 IEEE Information Theory Workshop (ITW)","volume":"245 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124298664","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Point-wise analysis of redundancy in SWLZ algorithm for φ-mixing sources φ-混合源SWLZ算法中冗余度的逐点分析
Pub Date : 2015-06-25 DOI: 10.1109/ITW.2015.7133103
Ayush Jain, R. Bansal
In this paper, we bound the number of phrases of the sliding window Lempel-Ziv (SWLZ) algorithm using an upper bound on the expected number of phrases in the fixed database Lempel-Ziv (FDLZ) algorithm for a class of φ-mixing sources which includes Markov sources, unifilar sources and finite state sources as special cases, as developed by Yang and Kieffer [1]. We use this bound to obtain a point-wise upper bound on the redundancy rate of SWLZ algorithm to be 2H(log2log2nw/log2nw) + O(log2log2log2nw/log2nw). Here H is the entropy rate of the source and nw is the window size.
在本文中,我们使用固定数据库Lempel-Ziv (FDLZ)算法中期望短语数的上界对滑动窗口Lempel-Ziv (SWLZ)算法的短语数进行了定界,该算法适用于一类φ-混合源,其中包括由Yang和Kieffer[1]提出的马尔可夫源、相似源和有限状态源作为特殊情况。我们利用这个界得到了SWLZ算法冗余率的逐点上界为2H(log2log2nw/log2nw) + O(log2log2log2nw/log2nw)。这里H是源的熵率nw是窗口大小。
{"title":"Point-wise analysis of redundancy in SWLZ algorithm for φ-mixing sources","authors":"Ayush Jain, R. Bansal","doi":"10.1109/ITW.2015.7133103","DOIUrl":"https://doi.org/10.1109/ITW.2015.7133103","url":null,"abstract":"In this paper, we bound the number of phrases of the sliding window Lempel-Ziv (SWLZ) algorithm using an upper bound on the expected number of phrases in the fixed database Lempel-Ziv (FDLZ) algorithm for a class of φ-mixing sources which includes Markov sources, unifilar sources and finite state sources as special cases, as developed by Yang and Kieffer [1]. We use this bound to obtain a point-wise upper bound on the redundancy rate of SWLZ algorithm to be 2H(log<sub>2</sub>log<sub>2</sub>n<sub>w</sub>/log<sub>2</sub>n<sub>w</sub>) + O(log<sub>2</sub>log<sub>2</sub>log<sub>2</sub>n<sub>w</sub>/log<sub>2</sub>n<sub>w</sub>). Here H is the entropy rate of the source and n<sub>w</sub> is the window size.","PeriodicalId":174797,"journal":{"name":"2015 IEEE Information Theory Workshop (ITW)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126790904","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2015 IEEE Information Theory Workshop (ITW)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1