首页 > 最新文献

2015 IEEE Information Theory Workshop (ITW)最新文献

英文 中文
Error correction through language processing 通过语言处理纠正错误
Pub Date : 2015-04-01 DOI: 10.1109/ITW.2015.7133145
Anxiao Jiang, Yue Li, Jehoshua Bruck
There are two fundamental approaches for error correction. One approach is to add external redundancy to data. The other approach is to use the redundancy inside data, even if it is only the residual redundancy after a data compression algorithm. The first approach, namely error-correcting codes (ECCs), has been studied actively over the past seventy years. In this work, we explore the second approach, and show that it can substantially enhance the error-correction performance. This work focuses on error correction of texts in English as a case study. It proposes a scheme that combines language-based decoding with ECC decoding. Both analysis and experimental results are presented. The scheme can be extended to content-based decoding for more types of data with rich structures.
纠错有两种基本方法。一种方法是向数据添加外部冗余。另一种方法是使用数据内部的冗余,即使它只是数据压缩算法后的剩余冗余。第一种方法,即纠错码(ECCs),在过去七十年中得到了积极的研究。在这项工作中,我们探索了第二种方法,并表明它可以大大提高纠错性能。本文以英语文本纠错为例进行了研究。提出了一种基于语言的解码与ECC解码相结合的方案。给出了分析和实验结果。该方案可以扩展到基于内容的解码,适用于更多类型、结构丰富的数据。
{"title":"Error correction through language processing","authors":"Anxiao Jiang, Yue Li, Jehoshua Bruck","doi":"10.1109/ITW.2015.7133145","DOIUrl":"https://doi.org/10.1109/ITW.2015.7133145","url":null,"abstract":"There are two fundamental approaches for error correction. One approach is to add external redundancy to data. The other approach is to use the redundancy inside data, even if it is only the residual redundancy after a data compression algorithm. The first approach, namely error-correcting codes (ECCs), has been studied actively over the past seventy years. In this work, we explore the second approach, and show that it can substantially enhance the error-correction performance. This work focuses on error correction of texts in English as a case study. It proposes a scheme that combines language-based decoding with ECC decoding. Both analysis and experimental results are presented. The scheme can be extended to content-based decoding for more types of data with rich structures.","PeriodicalId":174797,"journal":{"name":"2015 IEEE Information Theory Workshop (ITW)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116341843","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Secrecy-good polar lattices with optimal shaping for the Gaussian wiretap channels 具有最佳形状的高斯窃听信道保密性好的极格
Pub Date : 2015-04-01 DOI: 10.1109/ITW.2015.7133131
Ling Liu, Yanfei Yan, Cong Ling
Polar lattices have been proved to be able to achieve the strong secrecy capacity of the Mod-Λs additive white Gaussian noise (AWGN) wiretap channel. In this work, we propose an explicit shaping scheme and extend polar lattice coding to the genuine Gaussian wiretap channel. This shaping technique is based on discrete lattice Gaussian distribution, which leads to a binary asymmetric channel at each level for the multilevel lattice codes. The construction of polar codes for an asymmetric channel can be converted to that for a related symmetrized channel, and it turns out that this symmetrized channel is equivalent to a scaled Λ/Λ' channel in lattice coding in terms of polarization. By employing the asymmetric polar coding technique, we construct an AWGN-good lattice and a secrecy-good lattice with optimal shaping simultaneously.
极格已被证明能够实现Mod-Λs加性高斯白噪声(AWGN)窃听信道的强保密能力。在这项工作中,我们提出了一种显式整形方案,并将极格编码扩展到真正的高斯窃听信道。该整形技术基于离散晶格高斯分布,使得多层晶格码在每一层上都有一个二元非对称信道。非对称信道的极性编码结构可以转换为相关对称信道的极性编码结构,结果表明,该对称信道在极化方面相当于晶格编码中的缩放Λ/Λ’信道。利用非对称极性编码技术,我们同时构造了一个AWGN-good格和一个最优整形的保密性良好格。
{"title":"Secrecy-good polar lattices with optimal shaping for the Gaussian wiretap channels","authors":"Ling Liu, Yanfei Yan, Cong Ling","doi":"10.1109/ITW.2015.7133131","DOIUrl":"https://doi.org/10.1109/ITW.2015.7133131","url":null,"abstract":"Polar lattices have been proved to be able to achieve the strong secrecy capacity of the Mod-Λs additive white Gaussian noise (AWGN) wiretap channel. In this work, we propose an explicit shaping scheme and extend polar lattice coding to the genuine Gaussian wiretap channel. This shaping technique is based on discrete lattice Gaussian distribution, which leads to a binary asymmetric channel at each level for the multilevel lattice codes. The construction of polar codes for an asymmetric channel can be converted to that for a related symmetrized channel, and it turns out that this symmetrized channel is equivalent to a scaled Λ/Λ' channel in lattice coding in terms of polarization. By employing the asymmetric polar coding technique, we construct an AWGN-good lattice and a secrecy-good lattice with optimal shaping simultaneously.","PeriodicalId":174797,"journal":{"name":"2015 IEEE Information Theory Workshop (ITW)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127920320","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Gaussian estimation under attack uncertainty 攻击不确定性下的高斯估计
Pub Date : 2015-04-01 DOI: 10.1109/ITW.2015.7133120
T. Javidi, Y. Kaspi, Himanshu Tyagi
We consider the estimation of a standard Gaussian random variable under an observation attack where an adversary may add a zero mean Gaussian noise with variance in a bounded, closed interval to an otherwise noiseless observation. A straightforward approach would entail either ignoring the attack and simply using an optimal estimator under normal operation or taking the worst-case attack into account and using a minimax estimator that minimizes the cost under the worst-case attack. In contrast, we seek to characterize the optimal tradeoff between the MSE under normal operation and the MSE under the worst-case attack. Equivalently, we seek a minimax estimator for any fixed prior probability of attack. Our main result shows that a unique minimax estimator exists for every fixed probability of attack and is given by the Bayesian estimator for a least-favorable prior on the set of possible variances. Furthermore, the least-favorable prior is unique and has a finite support. While the minimax estimator is linear when the probability of attack is 0 or 1, our numerical results show that the minimax linear estimator is far from optimal for all other probabilities of attack and a simple nonlinear estimator does much better.
我们考虑在观察攻击下标准高斯随机变量的估计,其中对手可能在有界的封闭区间内添加具有方差的零均值高斯噪声到其他无噪声的观察值。一种直接的方法将需要忽略攻击并在正常操作下简单地使用最优估计器,或者考虑最坏情况攻击并使用最小化最坏情况攻击下成本的最小最大估计器。相反,我们试图描述正常操作下的MSE和最坏情况下的MSE之间的最佳权衡。同样地,我们对任意固定的攻击先验概率寻求极小极大估计量。我们的主要结果表明,对于每一个固定的攻击概率,存在一个唯一的极小极大估计量,并且由可能方差集上的最不利先验的贝叶斯估计量给出。此外,最不利先验是唯一的,具有有限的支持。虽然当攻击概率为0或1时,极大极小估计量是线性的,但我们的数值结果表明,极大极小线性估计量对于所有其他攻击概率都远远不是最优的,而一个简单的非线性估计量做得更好。
{"title":"Gaussian estimation under attack uncertainty","authors":"T. Javidi, Y. Kaspi, Himanshu Tyagi","doi":"10.1109/ITW.2015.7133120","DOIUrl":"https://doi.org/10.1109/ITW.2015.7133120","url":null,"abstract":"We consider the estimation of a standard Gaussian random variable under an observation attack where an adversary may add a zero mean Gaussian noise with variance in a bounded, closed interval to an otherwise noiseless observation. A straightforward approach would entail either ignoring the attack and simply using an optimal estimator under normal operation or taking the worst-case attack into account and using a minimax estimator that minimizes the cost under the worst-case attack. In contrast, we seek to characterize the optimal tradeoff between the MSE under normal operation and the MSE under the worst-case attack. Equivalently, we seek a minimax estimator for any fixed prior probability of attack. Our main result shows that a unique minimax estimator exists for every fixed probability of attack and is given by the Bayesian estimator for a least-favorable prior on the set of possible variances. Furthermore, the least-favorable prior is unique and has a finite support. While the minimax estimator is linear when the probability of attack is 0 or 1, our numerical results show that the minimax linear estimator is far from optimal for all other probabilities of attack and a simple nonlinear estimator does much better.","PeriodicalId":174797,"journal":{"name":"2015 IEEE Information Theory Workshop (ITW)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114901698","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On MMSE properties of optimal codes for the Gaussian wiretap channel 高斯窃听信道最优码的MMSE特性研究
Pub Date : 2015-04-01 DOI: 10.1109/ITW.2015.7133139
R. Bustin, R. Schaefer, H. Poor, S. Shamai
This work examines the properties of “good” codes for the scalar Gaussian wiretap channel that achieve the maximum level of equivocation. Specifically, the minimum mean-square error (MMSE) behavior of these codes is explored as a function of the signal-to-noise ratio (SNR). It is first shown that reliable decoding of the codeword at the legitimate receiver and at the eavesdropper, conditioned on the transmitted message, is a necessary and sufficient condition for an optimally secure code sequence. Moreover, it is observed that a stochastic encoder is required for any code sequence with rate below the channel point-to-point capacity. Then, for code sequences attaining the maximum level of equivocation, it is shown that their codebook sequences must resemble “good” point-to-point, capacity achieving, code sequences. Finally, it is shown that the mapping over such “good” codebook sequences that produces a maximum equivocation code must saturate the eavesdropper. These results support several “rules of thumb” in the design of capacity achieving codes for the Gaussian wiretap.
这项工作检查了“好”代码的属性,为标量高斯窃听信道实现最大程度的模糊。具体来说,这些代码的最小均方误差(MMSE)行为作为信噪比(SNR)的函数进行了探索。首先证明了在合法接收方和窃听方根据所传输的信息对码字进行可靠解码,是最优安全码序列的充分必要条件。此外,观察到对于任何速率低于信道点对点容量的编码序列都需要随机编码器。然后,对于达到最大模糊程度的码序列,表明它们的码本序列必须类似于“好的”点对点、容量实现的码序列。最后,证明了在这样的“好”码本序列上的映射产生最大的模糊码必须使窃听者饱和。这些结果支持了高斯窃听容量实现代码设计中的几个“经验法则”。
{"title":"On MMSE properties of optimal codes for the Gaussian wiretap channel","authors":"R. Bustin, R. Schaefer, H. Poor, S. Shamai","doi":"10.1109/ITW.2015.7133139","DOIUrl":"https://doi.org/10.1109/ITW.2015.7133139","url":null,"abstract":"This work examines the properties of “good” codes for the scalar Gaussian wiretap channel that achieve the maximum level of equivocation. Specifically, the minimum mean-square error (MMSE) behavior of these codes is explored as a function of the signal-to-noise ratio (SNR). It is first shown that reliable decoding of the codeword at the legitimate receiver and at the eavesdropper, conditioned on the transmitted message, is a necessary and sufficient condition for an optimally secure code sequence. Moreover, it is observed that a stochastic encoder is required for any code sequence with rate below the channel point-to-point capacity. Then, for code sequences attaining the maximum level of equivocation, it is shown that their codebook sequences must resemble “good” point-to-point, capacity achieving, code sequences. Finally, it is shown that the mapping over such “good” codebook sequences that produces a maximum equivocation code must saturate the eavesdropper. These results support several “rules of thumb” in the design of capacity achieving codes for the Gaussian wiretap.","PeriodicalId":174797,"journal":{"name":"2015 IEEE Information Theory Workshop (ITW)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130132320","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Greedy MaxCut algorithms and their information content 贪心MaxCut算法及其信息内容
Pub Date : 2015-04-01 DOI: 10.1109/ITW.2015.7133122
Yatao Bian, Alexey Gronskiy, J. Buhmann
MAXCUT defines a classical NP-hard problem for graph partitioning and it serves as a typical case of the symmetric non-monotone Unconstrained Submodular Maximization (USM) problem. Applications of MAXCUT are abundant in machine learning, computer vision and statistical physics. Greedy algorithms to approximately solve MAXCUT rely on greedy vertex labelling or on an edge contraction strategy. These algorithms have been studied by measuring their approximation ratios in the worst case setting but very little is known to characterize their robustness to noise contaminations of the input data in the average case. Adapting the framework of Approximation Set Coding, we present a method to exactly measure the cardinality of the algorithmic approximation sets of five greedy MAXCUT algorithms. Their information contents are explored for graph instances generated by two different noise models: the edge reversal model and Gaussian edge weights model. The results provide insights into the robustness of different greedy heuristics and techniques for MAXCUT, which can be used for algorithm design of general USM problems.
MAXCUT定义了一个经典的NP-hard图划分问题,它是对称非单调无约束子模最大化(USM)问题的一个典型例子。MAXCUT在机器学习、计算机视觉和统计物理等领域有着广泛的应用。近似求解MAXCUT的贪婪算法依赖于贪婪顶点标记或边缘收缩策略。这些算法已经通过测量它们在最坏情况下的近似比率进行了研究,但在平均情况下,它们对输入数据的噪声污染的鲁棒性特征知之甚少。采用近似集编码的框架,提出了一种精确测量五种贪心MAXCUT算法近似集基数的方法。通过两种不同的噪声模型(边缘反转模型和高斯边缘权重模型)生成的图实例,探讨了它们的信息内容。研究结果揭示了不同贪婪启发式算法和MAXCUT算法的鲁棒性,可用于通用USM问题的算法设计。
{"title":"Greedy MaxCut algorithms and their information content","authors":"Yatao Bian, Alexey Gronskiy, J. Buhmann","doi":"10.1109/ITW.2015.7133122","DOIUrl":"https://doi.org/10.1109/ITW.2015.7133122","url":null,"abstract":"MAXCUT defines a classical NP-hard problem for graph partitioning and it serves as a typical case of the symmetric non-monotone Unconstrained Submodular Maximization (USM) problem. Applications of MAXCUT are abundant in machine learning, computer vision and statistical physics. Greedy algorithms to approximately solve MAXCUT rely on greedy vertex labelling or on an edge contraction strategy. These algorithms have been studied by measuring their approximation ratios in the worst case setting but very little is known to characterize their robustness to noise contaminations of the input data in the average case. Adapting the framework of Approximation Set Coding, we present a method to exactly measure the cardinality of the algorithmic approximation sets of five greedy MAXCUT algorithms. Their information contents are explored for graph instances generated by two different noise models: the edge reversal model and Gaussian edge weights model. The results provide insights into the robustness of different greedy heuristics and techniques for MAXCUT, which can be used for algorithm design of general USM problems.","PeriodicalId":174797,"journal":{"name":"2015 IEEE Information Theory Workshop (ITW)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131706519","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Asymmetric Lee distance codes: New bounds and constructions 非对称李距离码:新的边界和结构
Pub Date : 2015-04-01 DOI: 10.1109/ITW.2015.7133171
Ryan Gabrys, H. M. Kiah, O. Milenkovic
We continue our study of a new family of asymmetric Lee codes that arise in the design and implementation of emerging DNA-based storage systems and systems which use parallel string transmission protocols. The codewords are defined over a quaternary alphabet, although the results carry over to other alphabet sizes, and have symbol distances dictated by their underlying binary representation. Our contributions include deriving new bounds for the size of the largest code in this metric based on Delsarte-like linear programming methods and describing new constructions for non-linear asymmetric Lee codes.
我们继续研究在设计和实现新兴的基于dna的存储系统和使用并行字符串传输协议的系统中出现的新的非对称李码家族。码字是在四元字母表上定义的,尽管结果可以转移到其他字母表大小,并且符号距离由其底层二进制表示决定。我们的贡献包括基于delsarte类线性规划方法推导出该度量中最大码的新边界,并描述了非线性非对称李码的新结构。
{"title":"Asymmetric Lee distance codes: New bounds and constructions","authors":"Ryan Gabrys, H. M. Kiah, O. Milenkovic","doi":"10.1109/ITW.2015.7133171","DOIUrl":"https://doi.org/10.1109/ITW.2015.7133171","url":null,"abstract":"We continue our study of a new family of asymmetric Lee codes that arise in the design and implementation of emerging DNA-based storage systems and systems which use parallel string transmission protocols. The codewords are defined over a quaternary alphabet, although the results carry over to other alphabet sizes, and have symbol distances dictated by their underlying binary representation. Our contributions include deriving new bounds for the size of the largest code in this metric based on Delsarte-like linear programming methods and describing new constructions for non-linear asymmetric Lee codes.","PeriodicalId":174797,"journal":{"name":"2015 IEEE Information Theory Workshop (ITW)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125124912","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Nested lattice codes for secure bidirectional relaying with asymmetric channel gains 具有非对称信道增益的安全双向中继的嵌套晶格码
Pub Date : 2015-04-01 DOI: 10.1109/ITW.2015.7133151
Shashank Vatedka, N. Kashyap
The basic problem of secure bidirectional relaying involves two users who want to exchange messages via an intermediate “honest-but-curious” relay node. There is no direct link between the users; all communication must take place via the relay node. The links between the user nodes and the relay are wireless links with Gaussian noise. It is required that the users' messages be kept secure from the relay. In prior work, we proposed coding schemes based on nested lattices for this problem, assuming that the channel gains from the two user nodes to the relay are identical. We also analyzed the power-rate tradeoff for secure and reliable message exchange using our coding schemes. In this paper, we extend our prior work to the case when the channel gains are not necessarily identical, and are known to the relay node but perhaps not to the users. We show that using our scheme, perfect secrecy can be obtained only for certain values of the channel gains, and analyze the power-rate tradeoff in these cases. We also make similar observations for our strongly-secure scheme.
安全双向中继的基本问题涉及两个想要通过中间“诚实但好奇”中继节点交换消息的用户。用户之间没有直接联系;所有通信必须通过中继节点进行。用户节点和中继之间的链路是带有高斯噪声的无线链路。用户的消息必须对中继保持安全。在之前的工作中,我们提出了基于嵌套格的编码方案,假设从两个用户节点到中继的信道增益相同。我们还分析了使用我们的编码方案进行安全可靠消息交换的功耗权衡。在本文中,我们将之前的工作扩展到信道增益不一定相同的情况,并且中继节点已知,但用户可能不知道。我们证明了使用我们的方案,只有在特定的信道增益值下才能获得完全保密,并分析了在这些情况下的功率率权衡。我们还对我们的强安全方案进行了类似的观察。
{"title":"Nested lattice codes for secure bidirectional relaying with asymmetric channel gains","authors":"Shashank Vatedka, N. Kashyap","doi":"10.1109/ITW.2015.7133151","DOIUrl":"https://doi.org/10.1109/ITW.2015.7133151","url":null,"abstract":"The basic problem of secure bidirectional relaying involves two users who want to exchange messages via an intermediate “honest-but-curious” relay node. There is no direct link between the users; all communication must take place via the relay node. The links between the user nodes and the relay are wireless links with Gaussian noise. It is required that the users' messages be kept secure from the relay. In prior work, we proposed coding schemes based on nested lattices for this problem, assuming that the channel gains from the two user nodes to the relay are identical. We also analyzed the power-rate tradeoff for secure and reliable message exchange using our coding schemes. In this paper, we extend our prior work to the case when the channel gains are not necessarily identical, and are known to the relay node but perhaps not to the users. We show that using our scheme, perfect secrecy can be obtained only for certain values of the channel gains, and analyze the power-rate tradeoff in these cases. We also make similar observations for our strongly-secure scheme.","PeriodicalId":174797,"journal":{"name":"2015 IEEE Information Theory Workshop (ITW)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129228137","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Boosting output distributions in finite blocklength channel coding converse bounds 提高有限块长度信道编码逆界的输出分布
Pub Date : 2015-04-01 DOI: 10.1109/ITW.2015.7133158
O. Kosut
Point-to-point channel coding is studied in the finite blocklength regime. Many existing converse bounds involve an optimization over a distribution on the channel output. This paper provides a method for generating good, if not optimal, output distributions. In particular, given any candidate output distribution, a “boosting” procedure is given that constructs a new distribution which improves the converse bound derived from the divergence spectrum. For discrete memoryless channels, it is shown that using the i.i.d. capacity-achieving output distribution as an initial guess in this procedure results in an output distribution that is good enough to derive the third-order coding rate for most channels. The finite blocklengths bounds are then applied to the Z channel.
研究了有限块长度条件下的点对点信道编码。许多现有的逆界涉及对通道输出的分布进行优化。本文提供了一种生成良好(如果不是最优)输出分布的方法。特别地,给定任何候选输出分布,给出了一个“增强”过程,该过程构造了一个新的分布,该分布改进了由散度谱导出的逆界。对于离散的无记忆信道,结果表明,在此过程中,使用i.i.d容量实现输出分布作为初始猜测,可以得到足够好的输出分布,可以推导出大多数信道的三阶编码率。然后将有限块长度边界应用于Z通道。
{"title":"Boosting output distributions in finite blocklength channel coding converse bounds","authors":"O. Kosut","doi":"10.1109/ITW.2015.7133158","DOIUrl":"https://doi.org/10.1109/ITW.2015.7133158","url":null,"abstract":"Point-to-point channel coding is studied in the finite blocklength regime. Many existing converse bounds involve an optimization over a distribution on the channel output. This paper provides a method for generating good, if not optimal, output distributions. In particular, given any candidate output distribution, a “boosting” procedure is given that constructs a new distribution which improves the converse bound derived from the divergence spectrum. For discrete memoryless channels, it is shown that using the i.i.d. capacity-achieving output distribution as an initial guess in this procedure results in an output distribution that is good enough to derive the third-order coding rate for most channels. The finite blocklengths bounds are then applied to the Z channel.","PeriodicalId":174797,"journal":{"name":"2015 IEEE Information Theory Workshop (ITW)","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124656294","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
ADMM decoding of error correction codes: From geometries to algorithms 纠错码的ADMM解码:从几何图形到算法
Pub Date : 2015-04-01 DOI: 10.1109/ITW.2015.7133156
Xishuo Liu, S. Draper
Many code constraints can be represented using factor graphs. By relaxing these factorable coding constraints to linear constraints, it is straightforward to form a decoding optimization problem. Furthermore, by pairing these factor graphs with the alternating directions method of multipliers (ADMM) technique of large-scale optimization, one can develop distributed algorithms to solve the decoding optimization problems. However, the non-trivial part has always been developing an efficient algorithm for the subroutines of ADMM, which directly relates to the geometries of the relaxed coding constraints. In this paper, we focus on summarizing existing results and distilling insights to these problems. First, we review the ADMM formulation and geometries involved in the subroutines. Next, we present a linear time algorithm for projecting onto an ℓ1 ball with box constraints.
许多代码约束可以用因子图表示。通过将这些可分解的编码约束放宽为线性约束,可以直接形成解码优化问题。此外,通过将这些因子图与大规模优化的乘法器交替方向法(ADMM)技术配对,可以开发分布式算法来解决解码优化问题。然而,对于ADMM的子程序,开发一种有效的算法一直是重要的部分,这直接关系到放宽编码约束的几何形状。在本文中,我们着重于总结现有的结果并提炼出对这些问题的见解。首先,我们回顾了ADMM公式和子程序中涉及的几何形状。其次,我们提出了一个线性时间算法,用于投影到具有框约束的1个球上。
{"title":"ADMM decoding of error correction codes: From geometries to algorithms","authors":"Xishuo Liu, S. Draper","doi":"10.1109/ITW.2015.7133156","DOIUrl":"https://doi.org/10.1109/ITW.2015.7133156","url":null,"abstract":"Many code constraints can be represented using factor graphs. By relaxing these factorable coding constraints to linear constraints, it is straightforward to form a decoding optimization problem. Furthermore, by pairing these factor graphs with the alternating directions method of multipliers (ADMM) technique of large-scale optimization, one can develop distributed algorithms to solve the decoding optimization problems. However, the non-trivial part has always been developing an efficient algorithm for the subroutines of ADMM, which directly relates to the geometries of the relaxed coding constraints. In this paper, we focus on summarizing existing results and distilling insights to these problems. First, we review the ADMM formulation and geometries involved in the subroutines. Next, we present a linear time algorithm for projecting onto an ℓ1 ball with box constraints.","PeriodicalId":174797,"journal":{"name":"2015 IEEE Information Theory Workshop (ITW)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126468479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Talking reliably, secretly, and efficiently: A “complete” characterization 可靠、秘密、高效地交谈:一个“完整”的性格特征
Pub Date : 2015-04-01 DOI: 10.1109/ITW.2015.7133143
Q. Zhang, S. Kadhe, Mayank Bakshi, S. Jaggi, A. Sprintson
We consider reliable and secure communication of information over a multipath network. A transmitter Alice sends messages to the receiver Bob in the presence of a hidden adversary Calvin. The adversary Calvin can both eavesdrop and jam on (possibly non-identical) subsets of transmission links. The goal is to communicate reliably (intended receiver can understand the messages) and secretly (adversary cannot understand the messages). Two kinds of jamming, additive and overwrite, are considered. Additive jamming corresponds to wireless network model while overwrite jamming corresponds to wired network model and storage systems. The multipath network consists of C parallel links. Calvin can both jam and eavesdrop any zio number of links, can eavesdrop (but not jam) any zi/o number of links, and can jam (but not eavesdrop) any zo/i number of links. We present the first “complete” information-theoretic characterization of maximum achievable rate as a function of the number of links that can be jammed and/or eavesdropped for equal and unequal link capacity multipath networks under additive and overwrite jamming in the large alphabet regime. Our achievability and converse proofs require non-trivial combination of information theoretic and coding theoretic ideas and our achievability schemes are computationally efficient. The PHaSE-Saving techniques1 are used for achievability while a “stochastic” singleton bound is obtained for converse.
我们考虑在多路径网络上可靠和安全的信息通信。发送者Alice在一个隐藏的对手Calvin面前向接收者Bob发送消息。对手卡尔文可以窃听和干扰(可能不相同的)传输链路子集。目标是可靠地(预期的接收方能够理解消息)和秘密地(对手无法理解消息)进行通信。考虑了叠加干扰和覆盖干扰两种干扰形式。加性干扰对应于无线网络模型,覆盖性干扰对应于有线网络模型和存储系统。多路径网络由C条并行链路组成。Calvin可以干扰和窃听任意zio个数的链路,可以窃听(但不能干扰)任意zi/o个数的链路,可以干扰(但不能窃听)任意zo/i个数的链路。我们提出了第一个“完整”的信息理论特征,即在大字母系统中,在加性和覆盖干扰下,相等和不等链路容量的多径网络可以被阻塞和/或窃听的链路数的函数的最大可达速率。我们的可实现性和逆证明需要信息论和编码论思想的非平凡结合,我们的可实现性方案具有计算效率。节约相位技术用于可实现性,而反向则获得“随机”单例界。
{"title":"Talking reliably, secretly, and efficiently: A “complete” characterization","authors":"Q. Zhang, S. Kadhe, Mayank Bakshi, S. Jaggi, A. Sprintson","doi":"10.1109/ITW.2015.7133143","DOIUrl":"https://doi.org/10.1109/ITW.2015.7133143","url":null,"abstract":"We consider reliable and secure communication of information over a multipath network. A transmitter Alice sends messages to the receiver Bob in the presence of a hidden adversary Calvin. The adversary Calvin can both eavesdrop and jam on (possibly non-identical) subsets of transmission links. The goal is to communicate reliably (intended receiver can understand the messages) and secretly (adversary cannot understand the messages). Two kinds of jamming, additive and overwrite, are considered. Additive jamming corresponds to wireless network model while overwrite jamming corresponds to wired network model and storage systems. The multipath network consists of C parallel links. Calvin can both jam and eavesdrop any zio number of links, can eavesdrop (but not jam) any zi/o number of links, and can jam (but not eavesdrop) any zo/i number of links. We present the first “complete” information-theoretic characterization of maximum achievable rate as a function of the number of links that can be jammed and/or eavesdropped for equal and unequal link capacity multipath networks under additive and overwrite jamming in the large alphabet regime. Our achievability and converse proofs require non-trivial combination of information theoretic and coding theoretic ideas and our achievability schemes are computationally efficient. The PHaSE-Saving techniques1 are used for achievability while a “stochastic” singleton bound is obtained for converse.","PeriodicalId":174797,"journal":{"name":"2015 IEEE Information Theory Workshop (ITW)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114868561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
期刊
2015 IEEE Information Theory Workshop (ITW)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1