首页 > 最新文献

2015 IEEE Information Theory Workshop (ITW)最新文献

英文 中文
Non-locality distillation as cryptographic game 密码博弈中的非定域蒸馏
Pub Date : 2015-04-01 DOI: 10.1109/ITW.2015.7133124
G. Brassard, Benno Salwey, S. Wolf
Besides being one of the most puzzling aspects of quantum information theory, non-locality has been recognised as a valuable resource for various cryptographic protocols. We study the phenomenon of distillation of non-locality, which is the ability to generate a stronger instance of non-locality from weaker ones. We construct an eavesdropping third party who gains knowledge about the outputs of distillation protocols. This knowledge directly implies an upper bound on the degree of non-locality of the output of the protocol.
除了是量子信息理论中最令人困惑的方面之一外,非定域性已被认为是各种密码协议的宝贵资源。我们研究了非定域性的蒸馏现象,即从较弱的非定域性实例生成较强的非定域性实例的能力。我们构建了一个窃听第三方来获取蒸馏协议的输出信息。这个知识直接暗示了协议输出的非局部性程度的上界。
{"title":"Non-locality distillation as cryptographic game","authors":"G. Brassard, Benno Salwey, S. Wolf","doi":"10.1109/ITW.2015.7133124","DOIUrl":"https://doi.org/10.1109/ITW.2015.7133124","url":null,"abstract":"Besides being one of the most puzzling aspects of quantum information theory, non-locality has been recognised as a valuable resource for various cryptographic protocols. We study the phenomenon of distillation of non-locality, which is the ability to generate a stronger instance of non-locality from weaker ones. We construct an eavesdropping third party who gains knowledge about the outputs of distillation protocols. This knowledge directly implies an upper bound on the degree of non-locality of the output of the protocol.","PeriodicalId":174797,"journal":{"name":"2015 IEEE Information Theory Workshop (ITW)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128523387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Approximation algorithms for erasure correcting Data Exchange 擦除校正数据交换的近似算法
Pub Date : 2015-04-01 DOI: 10.1109/ITW.2015.7133144
M. Yan, A. Sprintson
In the Cooperative Data Exchange (CDE) problem, a group of wireless clients need to exchange data over a shared broadcast channel, such that at the end of the transfer all clients have access to all packets held by other clients. In this paper, we focus on the robust version of the problem in which the clients must be able to complete the transfer even if one of the clients fails before the transfer is complete. The event of a client failure is referred to as an erasure. We show that, while the original CDE problem can be solved in polynomial time, the robust version of the problem is NP-hard, even in the special case when robustness to a single failure is required. Focusing on the practically important special case of a single failure, we establish an approximation algorithm for this problem that can find a solution within a constant factor of the optimum. Our simulation studies show that the algorithm is able to find solutions that are very close to the optimum.
在协作数据交换(CDE)问题中,一组无线客户端需要通过共享广播通道交换数据,这样在传输结束时,所有客户端都可以访问其他客户端持有的所有数据包。在本文中,我们关注的是该问题的鲁棒版本,其中客户端必须能够完成传输,即使其中一个客户端在传输完成之前失败。客户端失败的事件称为擦除。我们证明,虽然原始的CDE问题可以在多项式时间内解决,但问题的鲁棒版本是np困难的,即使在需要对单个故障进行鲁棒性的特殊情况下也是如此。针对单个故障这一具有重要实际意义的特殊情况,我们建立了该问题的近似算法,该算法可以在最优的常数因子范围内找到解。我们的仿真研究表明,该算法能够找到非常接近最优的解。
{"title":"Approximation algorithms for erasure correcting Data Exchange","authors":"M. Yan, A. Sprintson","doi":"10.1109/ITW.2015.7133144","DOIUrl":"https://doi.org/10.1109/ITW.2015.7133144","url":null,"abstract":"In the Cooperative Data Exchange (CDE) problem, a group of wireless clients need to exchange data over a shared broadcast channel, such that at the end of the transfer all clients have access to all packets held by other clients. In this paper, we focus on the robust version of the problem in which the clients must be able to complete the transfer even if one of the clients fails before the transfer is complete. The event of a client failure is referred to as an erasure. We show that, while the original CDE problem can be solved in polynomial time, the robust version of the problem is NP-hard, even in the special case when robustness to a single failure is required. Focusing on the practically important special case of a single failure, we establish an approximation algorithm for this problem that can find a solution within a constant factor of the optimum. Our simulation studies show that the algorithm is able to find solutions that are very close to the optimum.","PeriodicalId":174797,"journal":{"name":"2015 IEEE Information Theory Workshop (ITW)","volume":"44 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120984686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cyclic linear binary locally repairable codes 循环线性二进制局部可修码
Pub Date : 2015-04-01 DOI: 10.1109/ITW.2015.7133128
Pengfei Huang, Eitan Yaakobi, H. Uchikawa, P. Siegel
Locally repairable codes (LRCs) are a class of codes designed for the local correction of erasures. They have received considerable attention in recent years due to their applications in distributed storage. Most existing results on LRCs do not explicitly take into consideration the field size q, i.e., the size of the code alphabet. In particular, for the binary case, only a few specific results are known by Goparaju and Calderbank. Recently, however, an upper bound on the dimension k of LRCs was presented by Cadambe and Mazumdar. The bound takes into account the length n, minimum distance d, locality r, and field size q, and it is applicable to both non-linear and linear codes. In this work, we first develop an improved version of the bound mentioned above for linear codes. We then focus on cyclic linear binary codes. By leveraging the cyclic structure, we notice that the locality of such a code is determined by the minimum distance of its dual code. Using this result, we investigate the locality of a variety of well known cyclic linear binary codes, e.g., Hamming codes and Simplex codes, and also prove their optimality with our improved bound for linear codes. We also discuss the locality of codes which are obtained by applying the operations of Extend, Shorten, Expurgate, Augment, and Lengthen to cyclic linear binary codes. Several families of such modified codes are considered and their optimality is addressed. Finally, we investigate the locality of Reed-Muller codes. Even though they are not cyclic, it is shown that some of the locality results for cyclic codes still apply.
局部可修复码(lrc)是为局部纠删而设计的一类码。近年来,由于它们在分布式存储中的应用,它们受到了相当大的关注。大多数关于lrc的现有结果都没有明确地考虑字段大小q,即代码字母表的大小。特别是对于二进制的情况,Goparaju和Calderbank只知道几个具体的结果。然而,最近Cadambe和Mazumdar给出了lrc维数k的上界。该界考虑了长度n、最小距离d、局部性r和域大小q,适用于非线性和线性码。在这项工作中,我们首先开发了上述线性码界的改进版本。然后我们将重点放在循环线性二进制码上。通过利用循环结构,我们注意到这种码的局部性是由其对偶码的最小距离决定的。利用这一结果,我们研究了各种已知的循环线性二进制码,如Hamming码和单纯形码的局部性,并用改进的线性码界证明了它们的最优性。讨论了对循环线性二进制码进行Extend、Shorten、Expurgate、Augment、Lengthen等运算得到的码的局部性。考虑了这类改进码的几个族,并讨论了它们的最优性。最后,我们研究了Reed-Muller码的局部性。尽管它们不是循环的,但证明了循环码的一些局部性结果仍然适用。
{"title":"Cyclic linear binary locally repairable codes","authors":"Pengfei Huang, Eitan Yaakobi, H. Uchikawa, P. Siegel","doi":"10.1109/ITW.2015.7133128","DOIUrl":"https://doi.org/10.1109/ITW.2015.7133128","url":null,"abstract":"Locally repairable codes (LRCs) are a class of codes designed for the local correction of erasures. They have received considerable attention in recent years due to their applications in distributed storage. Most existing results on LRCs do not explicitly take into consideration the field size q, i.e., the size of the code alphabet. In particular, for the binary case, only a few specific results are known by Goparaju and Calderbank. Recently, however, an upper bound on the dimension k of LRCs was presented by Cadambe and Mazumdar. The bound takes into account the length n, minimum distance d, locality r, and field size q, and it is applicable to both non-linear and linear codes. In this work, we first develop an improved version of the bound mentioned above for linear codes. We then focus on cyclic linear binary codes. By leveraging the cyclic structure, we notice that the locality of such a code is determined by the minimum distance of its dual code. Using this result, we investigate the locality of a variety of well known cyclic linear binary codes, e.g., Hamming codes and Simplex codes, and also prove their optimality with our improved bound for linear codes. We also discuss the locality of codes which are obtained by applying the operations of Extend, Shorten, Expurgate, Augment, and Lengthen to cyclic linear binary codes. Several families of such modified codes are considered and their optimality is addressed. Finally, we investigate the locality of Reed-Muller codes. Even though they are not cyclic, it is shown that some of the locality results for cyclic codes still apply.","PeriodicalId":174797,"journal":{"name":"2015 IEEE Information Theory Workshop (ITW)","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122936799","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 42
Multihop virtual full-duplex relay channels 多跳虚拟全双工中继信道
Pub Date : 2015-04-01 DOI: 10.1109/ITW.2015.7133148
Songnam Hong, I. Marić, D. Hui, G. Caire
We introduce a multihop “virtual” full-duplex relay channel as a special case of a general multiple multicast relay network. For such network, quantize-map-and-forward (QMF) (or noisy network coding (NNC)) can achieve the cut-set upper bound within a constant gap where the gap grows linearly with the number of relay stages K. However, this gap may not be negligible for the systems with multihop transmissions (e.g., a power-limited wireless backhaul system operating at high frequencies). In this paper, we obtain an improved result to the capacity scaling where the gap grows logarithmically as log (K). This is achieved by using an optimal quantization at relays and by exploiting relays' messages (decoded in the previous time slot) as side-information at the destination. We further improve the performance of this network by presenting a mixed strategy where each relay can perform either decode-and-forward (DF) or QMF with possibly rate-splitting.
本文介绍了一种多跳“虚拟”全双工中继信道,作为一般多组播中继网络的一种特例。对于这样的网络,量化映射转发(QMF)(或噪声网络编码(NNC))可以在一个恒定的间隙内实现截集上限,其中间隙随着中继级k的数量线性增长。然而,对于具有多跳传输的系统(例如,在高频下工作的功率有限的无线回程系统),这个间隙可能不可忽略。在本文中,我们获得了容量缩放的改进结果,其中间隙以对数方式增长为log (K)。这是通过在中继上使用最佳量化并利用中继的消息(在前一个时隙中解码)作为目的地的侧信息来实现的。我们通过提出一种混合策略进一步提高了该网络的性能,其中每个中继可以执行译码转发(DF)或QMF,并可能进行速率分裂。
{"title":"Multihop virtual full-duplex relay channels","authors":"Songnam Hong, I. Marić, D. Hui, G. Caire","doi":"10.1109/ITW.2015.7133148","DOIUrl":"https://doi.org/10.1109/ITW.2015.7133148","url":null,"abstract":"We introduce a multihop “virtual” full-duplex relay channel as a special case of a general multiple multicast relay network. For such network, quantize-map-and-forward (QMF) (or noisy network coding (NNC)) can achieve the cut-set upper bound within a constant gap where the gap grows linearly with the number of relay stages K. However, this gap may not be negligible for the systems with multihop transmissions (e.g., a power-limited wireless backhaul system operating at high frequencies). In this paper, we obtain an improved result to the capacity scaling where the gap grows logarithmically as log (K). This is achieved by using an optimal quantization at relays and by exploiting relays' messages (decoded in the previous time slot) as side-information at the destination. We further improve the performance of this network by presenting a mixed strategy where each relay can perform either decode-and-forward (DF) or QMF with possibly rate-splitting.","PeriodicalId":174797,"journal":{"name":"2015 IEEE Information Theory Workshop (ITW)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129200646","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Upper bound on the capacity of a cascade of nonlinear and noisy channels 非线性和噪声信道级联容量的上界
Pub Date : 2015-03-26 DOI: 10.1109/ITW.2015.7133167
G. Kramer, Mansoor I. Yousefi, F. Kschischang
An upper bound on the capacity of a cascade of nonlinear and noisy channels is presented. The cascade mimics the split-step Fourier method for computing waveform propagation governed by the stochastic generalized nonlinear Schrödinger equation. It is shown that the spectral efficiency of the cascade is at most log(1+SNR), where SNR is the receiver signal-to-noise ratio. The results may be applied to optical fiber channels. However, the definition of bandwidth is subtle and leaves open interpretations of the bound. Some of these interpretations are discussed.
给出了非线性噪声信道级联容量的上界。级联模拟了计算由随机广义非线性Schrödinger方程控制的波形传播的分步傅立叶方法。结果表明,级联的频谱效率不超过log(1+SNR),其中SNR为接收机信噪比。研究结果可应用于光纤通道。然而,带宽的定义是微妙的,留下了开放的边界解释。本文讨论了其中的一些解释。
{"title":"Upper bound on the capacity of a cascade of nonlinear and noisy channels","authors":"G. Kramer, Mansoor I. Yousefi, F. Kschischang","doi":"10.1109/ITW.2015.7133167","DOIUrl":"https://doi.org/10.1109/ITW.2015.7133167","url":null,"abstract":"An upper bound on the capacity of a cascade of nonlinear and noisy channels is presented. The cascade mimics the split-step Fourier method for computing waveform propagation governed by the stochastic generalized nonlinear Schrödinger equation. It is shown that the spectral efficiency of the cascade is at most log(1+SNR), where SNR is the receiver signal-to-noise ratio. The results may be applied to optical fiber channels. However, the definition of bandwidth is subtle and leaves open interpretations of the bound. Some of these interpretations are discussed.","PeriodicalId":174797,"journal":{"name":"2015 IEEE Information Theory Workshop (ITW)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114228759","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 76
The AWGN BC with MAC feedback: A reduction to noiseless feedback via interaction 带MAC反馈的AWGN BC:通过相互作用减少到无噪声反馈
Pub Date : 2015-03-18 DOI: 10.1109/ITW.2015.7133153
Assaf Ben-Yishai, O. Shayevitz
We consider the problem of communication over a two-user Additive White Gaussian Noise Broadcast Channel (AWGN-BC) with an AWGN Multiple Access (MAC) active feedback. We describe a constructive reduction from this setup to the well-studied setup of linear-feedback coding over the AWGN-BC with noiseless feedback (and different parameters). This reduction facilitates the design of linear-feedback coding schemes in the (passive) noiseless feedback regime, which can then be easily and constructively transformed into coding schemes in the MAC feedback regime that attain the exact same rates. Our construction introduces an element of interaction into the coding protocol, and is based on modulo-lattice operations. As an example, we apply our method to the Ozarow-Leung scheme, and demonstrate how MAC feedback can be used to enlarge the capacity region of the AWGN-BC.
研究了具有AWGN多址主动反馈的双用户加性高斯白噪声广播信道(AWGN- bc)的通信问题。我们描述了从这种设置到经过充分研究的AWGN-BC上具有无噪声反馈(和不同参数)的线性反馈编码设置的建设性减少。这种减少有助于在(被动)无噪声反馈体系中设计线性反馈编码方案,然后可以很容易地和建设性地将其转换为MAC反馈体系中达到完全相同速率的编码方案。我们的构造在编码协议中引入了交互元素,并基于模格运算。作为一个例子,我们将我们的方法应用于Ozarow-Leung方案,并演示了如何使用MAC反馈来扩大AWGN-BC的容量区域。
{"title":"The AWGN BC with MAC feedback: A reduction to noiseless feedback via interaction","authors":"Assaf Ben-Yishai, O. Shayevitz","doi":"10.1109/ITW.2015.7133153","DOIUrl":"https://doi.org/10.1109/ITW.2015.7133153","url":null,"abstract":"We consider the problem of communication over a two-user Additive White Gaussian Noise Broadcast Channel (AWGN-BC) with an AWGN Multiple Access (MAC) active feedback. We describe a constructive reduction from this setup to the well-studied setup of linear-feedback coding over the AWGN-BC with noiseless feedback (and different parameters). This reduction facilitates the design of linear-feedback coding schemes in the (passive) noiseless feedback regime, which can then be easily and constructively transformed into coding schemes in the MAC feedback regime that attain the exact same rates. Our construction introduces an element of interaction into the coding protocol, and is based on modulo-lattice operations. As an example, we apply our method to the Ozarow-Leung scheme, and demonstrate how MAC feedback can be used to enlarge the capacity region of the AWGN-BC.","PeriodicalId":174797,"journal":{"name":"2015 IEEE Information Theory Workshop (ITW)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115030094","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Deep learning and the information bottleneck principle 深度学习与信息瓶颈原理
Pub Date : 2015-03-09 DOI: 10.1109/ITW.2015.7133169
Naftali Tishby, Noga Zaslavsky
Deep Neural Networks (DNNs) are analyzed via the theoretical framework of the information bottleneck (IB) principle. We first show that any DNN can be quantified by the mutual information between the layers and the input and output variables. Using this representation we can calculate the optimal information theoretic limits of the DNN and obtain finite sample generalization bounds. The advantage of getting closer to the theoretical limit is quantifiable both by the generalization bound and by the network's simplicity. We argue that both the optimal architecture, number of layers and features/connections at each layer, are related to the bifurcation points of the information bottleneck tradeoff, namely, relevant compression of the input layer with respect to the output layer. The hierarchical representations at the layered network naturally correspond to the structural phase transitions along the information curve. We believe that this new insight can lead to new optimality bounds and deep learning algorithms.
基于信息瓶颈原理的理论框架对深度神经网络进行了分析。我们首先证明任何深度神经网络都可以通过层与输入和输出变量之间的相互信息来量化。利用这种表示,我们可以计算出深度神经网络的最优信息论极限,并得到有限的样本泛化界。接近理论极限的好处可以通过泛化边界和网络的简单性来量化。我们认为,最优架构、层数和每层的特征/连接都与信息瓶颈权衡的分岔点有关,即输入层相对于输出层的相关压缩。分层网络中的分层表示自然地对应于沿着信息曲线的结构相变。我们相信这种新的见解可以导致新的最优性边界和深度学习算法。
{"title":"Deep learning and the information bottleneck principle","authors":"Naftali Tishby, Noga Zaslavsky","doi":"10.1109/ITW.2015.7133169","DOIUrl":"https://doi.org/10.1109/ITW.2015.7133169","url":null,"abstract":"Deep Neural Networks (DNNs) are analyzed via the theoretical framework of the information bottleneck (IB) principle. We first show that any DNN can be quantified by the mutual information between the layers and the input and output variables. Using this representation we can calculate the optimal information theoretic limits of the DNN and obtain finite sample generalization bounds. The advantage of getting closer to the theoretical limit is quantifiable both by the generalization bound and by the network's simplicity. We argue that both the optimal architecture, number of layers and features/connections at each layer, are related to the bifurcation points of the information bottleneck tradeoff, namely, relevant compression of the input layer with respect to the output layer. The hierarchical representations at the layered network naturally correspond to the structural phase transitions along the information curve. We believe that this new insight can lead to new optimality bounds and deep learning algorithms.","PeriodicalId":174797,"journal":{"name":"2015 IEEE Information Theory Workshop (ITW)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132472811","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1194
Optimal linear and cyclic locally repairable codes over small fields 小域上的最优线性和循环局部可修码
Pub Date : 2015-02-24 DOI: 10.1109/ITW.2015.7133123
A. Zeh, Eitan Yaakobi
We consider locally repairable codes over small fields and propose constructions of optimal cyclic and linear codes in terms of the dimension for a given distance and length. Four new constructions of optimal linear codes over small fields with locality properties are developed. The first two approaches give binary cyclic codes with locality two. While the first construction has availability one, the second binary code is characterized by multiple available repair sets based on a binary Simplex code. The third approach extends the first one to q-ary cyclic codes including (binary) extension fields, where the locality property is determined by the properties of a shortened first-order Reed- Muller code. Non-cyclic optimal binary linear codes with locality greater than two are obtained by the fourth construction.
我们考虑小域上的局部可修码,并根据给定距离和长度的维数提出了最优循环码和线性码的构造。提出了具有局域性的小域最优线性码的四种新构造。前两种方法给出了位置为2的二进制循环码。虽然第一种结构具有可用性,但第二种二进制代码具有基于二进制单纯形码的多个可用修复集的特征。第三种方法将第一种方法扩展到包含(二进制)扩展域的q元循环码,其中的局域性由缩短的一阶Reed- Muller码的性质决定。通过第四次构造,得到了局部大于2的非循环最优二进制线性码。
{"title":"Optimal linear and cyclic locally repairable codes over small fields","authors":"A. Zeh, Eitan Yaakobi","doi":"10.1109/ITW.2015.7133123","DOIUrl":"https://doi.org/10.1109/ITW.2015.7133123","url":null,"abstract":"We consider locally repairable codes over small fields and propose constructions of optimal cyclic and linear codes in terms of the dimension for a given distance and length. Four new constructions of optimal linear codes over small fields with locality properties are developed. The first two approaches give binary cyclic codes with locality two. While the first construction has availability one, the second binary code is characterized by multiple available repair sets based on a binary Simplex code. The third approach extends the first one to q-ary cyclic codes including (binary) extension fields, where the locality property is determined by the properties of a shortened first-order Reed- Muller code. Non-cyclic optimal binary linear codes with locality greater than two are obtained by the fourth construction.","PeriodicalId":174797,"journal":{"name":"2015 IEEE Information Theory Workshop (ITW)","volume":"99 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126101118","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 64
Tight bounds for symmetric divergence measures and a new inequality relating f-divergences 对称散度测度的紧界和关于f-散度的一个新不等式
Pub Date : 2015-02-23 DOI: 10.1109/ITW.2015.7133079
I. Sason
Tight bounds for several symmetric divergence measures are introduced, given in terms of the total variation distance. Each of these bounds is attained by a pair of 2 or 3-element probability distributions. An application of these bounds for lossless source coding is provided, refining and improving a certain bound by Csiszár. A new inequality relating f-divergences is derived, and its use is exemplified. The last section of this conference paper is not included in the recent journal paper [16], as well as some new remarks that are linked to new references.
介绍了几种对称散度测度的紧界,用总变差距离表示。这些边界中的每一个都是由一对2或3元素概率分布获得的。给出了这些边界在无损源编码中的应用,通过Csiszár对某个边界进行了细化和改进。导出了一个关于f-散度的不等式,并举例说明了它的用法。本次会议论文的最后一节没有被收录在最近的期刊论文[16]中,也有一些新的注释被链接到新的参考文献中。
{"title":"Tight bounds for symmetric divergence measures and a new inequality relating f-divergences","authors":"I. Sason","doi":"10.1109/ITW.2015.7133079","DOIUrl":"https://doi.org/10.1109/ITW.2015.7133079","url":null,"abstract":"Tight bounds for several symmetric divergence measures are introduced, given in terms of the total variation distance. Each of these bounds is attained by a pair of 2 or 3-element probability distributions. An application of these bounds for lossless source coding is provided, refining and improving a certain bound by Csiszár. A new inequality relating f-divergences is derived, and its use is exemplified. The last section of this conference paper is not included in the recent journal paper [16], as well as some new remarks that are linked to new references.","PeriodicalId":174797,"journal":{"name":"2015 IEEE Information Theory Workshop (ITW)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127489750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Unique factorization and controllability of tail-biting trellis realizations via controller granule decompositions 通过控制器颗粒分解实现咬尾网格的独特分解和可控性
Pub Date : 2015-02-23 DOI: 10.1109/ITW.2015.7133082
G. David Forney
The Conti-Boston factorization theorem (CBFT) for linear tail-biting trellis realizations is extended to group realizations with a new and simpler proof, based on a controller granule decomposition of the behavior and known controllability results for group realizations. Further controllability results are given; e.g., a trellis realization is controllable if and only if its top (controllability) granule is trivial.
基于控制器颗粒的行为分解和群实现的已知可控性结果,将线性咬尾网格实现的coni - boston分解定理(CBFT)扩展到群实现,并给出了一个新的更简单的证明。给出了进一步的可控性结果;例如,一个网格实现是可控的,当且仅当它的顶部(可控性)颗粒是平凡的。
{"title":"Unique factorization and controllability of tail-biting trellis realizations via controller granule decompositions","authors":"G. David Forney","doi":"10.1109/ITW.2015.7133082","DOIUrl":"https://doi.org/10.1109/ITW.2015.7133082","url":null,"abstract":"The Conti-Boston factorization theorem (CBFT) for linear tail-biting trellis realizations is extended to group realizations with a new and simpler proof, based on a controller granule decomposition of the behavior and known controllability results for group realizations. Further controllability results are given; e.g., a trellis realization is controllable if and only if its top (controllability) granule is trivial.","PeriodicalId":174797,"journal":{"name":"2015 IEEE Information Theory Workshop (ITW)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117078179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2015 IEEE Information Theory Workshop (ITW)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1