首页 > 最新文献

2015 IEEE Information Theory Workshop (ITW)最新文献

英文 中文
On the noisy feedback capacity of Gaussian broadcast channels 高斯广播信道的噪声反馈能力研究
Pub Date : 2015-02-16 DOI: 10.1109/ITW.2015.7133117
S. R. Pillai, V. Prabhakaran
It is well known that, in general, feedback may enlarge the capacity region of Gaussian broadcast channels. This has been demonstrated even when the feedback is noisy (or partial-but-perfect) and only from one of the receivers. The only case known where feedback has been shown not to enlarge the capacity region is when the channel is physically degraded. In this paper, we show that for a class of two-user Gaussian broadcast channels (not necessarily physically degraded), passively feeding back the stronger user's signal over a link corrupted by Gaussian noise does not enlarge the capacity region if the variance of feedback noise is above a certain threshold.
众所周知,一般情况下,反馈会扩大高斯广播信道的容量范围。即使反馈是嘈杂的(或部分但完美的),并且只来自其中一个接收器,也证明了这一点。唯一已知的反馈不会扩大容量区域的情况是当信道物理退化时。在本文中,我们证明了对于一类双用户高斯广播信道(不一定是物理退化的),如果反馈噪声的方差超过一定的阈值,则被动地在被高斯噪声破坏的链路上反馈较强的用户信号不会扩大容量区域。
{"title":"On the noisy feedback capacity of Gaussian broadcast channels","authors":"S. R. Pillai, V. Prabhakaran","doi":"10.1109/ITW.2015.7133117","DOIUrl":"https://doi.org/10.1109/ITW.2015.7133117","url":null,"abstract":"It is well known that, in general, feedback may enlarge the capacity region of Gaussian broadcast channels. This has been demonstrated even when the feedback is noisy (or partial-but-perfect) and only from one of the receivers. The only case known where feedback has been shown not to enlarge the capacity region is when the channel is physically degraded. In this paper, we show that for a class of two-user Gaussian broadcast channels (not necessarily physically degraded), passively feeding back the stronger user's signal over a link corrupted by Gaussian noise does not enlarge the capacity region if the variance of feedback noise is above a certain threshold.","PeriodicalId":174797,"journal":{"name":"2015 IEEE Information Theory Workshop (ITW)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131243745","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Coding for network-coded slotted ALOHA 为网络编码的开槽ALOHA编码
Pub Date : 2015-02-12 DOI: 10.1109/ITW.2015.7133085
Shenghao Yang, Yi Chen, S. Liew, Lizhao You
Slotted ALOHA can benefit from physical-layer network coding (PNC) by decoding one or multiple linear combinations of the packets simultaneously transmitted in a timeslot, forming a system of linear equations. Different systems of linear equations are recovered in different timeslots. A message decoder then recovers the original packets of all the users by jointly solving multiple systems of linear equations obtained over different timeslots. We propose the batched BP decoding algorithm that combines belief propagation (BP) and local Gaussian elimination. Compared with pure Gaussian elimination decoding, our algorithm reduces the decoding complexity from cubic to linear function of the number of users. Compared with the ordinary BP decoding algorithm for low-density generator-matrix codes, our algorithm has better performance and the same order of computational complexity. We analyze the performance of the batched BP decoding algorithm by generalizing the tree-based approach and provide an approach to optimize the system performance.
槽ALOHA可以从物理层网络编码(PNC)中获益,通过解码在一个时隙中同时传输的数据包的一个或多个线性组合,形成一个线性方程系统。在不同的时隙恢复不同的线性方程组。然后,通过联合求解在不同时隙上获得的多个线性方程组,消息解码器恢复所有用户的原始数据包。提出了一种将信念传播(BP)和局部高斯消去相结合的批量BP解码算法。与纯高斯消去译码相比,我们的算法将译码复杂度从用户数量的三次函数降低到线性函数。与普通的低密度生成矩阵码BP译码算法相比,该算法具有更好的译码性能和相同数量级的计算复杂度。我们通过推广基于树的方法分析了批处理BP解码算法的性能,并提供了一种优化系统性能的方法。
{"title":"Coding for network-coded slotted ALOHA","authors":"Shenghao Yang, Yi Chen, S. Liew, Lizhao You","doi":"10.1109/ITW.2015.7133085","DOIUrl":"https://doi.org/10.1109/ITW.2015.7133085","url":null,"abstract":"Slotted ALOHA can benefit from physical-layer network coding (PNC) by decoding one or multiple linear combinations of the packets simultaneously transmitted in a timeslot, forming a system of linear equations. Different systems of linear equations are recovered in different timeslots. A message decoder then recovers the original packets of all the users by jointly solving multiple systems of linear equations obtained over different timeslots. We propose the batched BP decoding algorithm that combines belief propagation (BP) and local Gaussian elimination. Compared with pure Gaussian elimination decoding, our algorithm reduces the decoding complexity from cubic to linear function of the number of users. Compared with the ordinary BP decoding algorithm for low-density generator-matrix codes, our algorithm has better performance and the same order of computational complexity. We analyze the performance of the batched BP decoding algorithm by generalizing the tree-based approach and provide an approach to optimize the system performance.","PeriodicalId":174797,"journal":{"name":"2015 IEEE Information Theory Workshop (ITW)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130942753","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Upper bound on function computation in directed acyclic networks 有向无环网络中函数计算的上界
Pub Date : 2015-01-05 DOI: 10.1109/ITW.2015.7133086
Cupjin Huang, Zihan Tan, Shenghao Yang
Function computation in directed acyclic networks is considered, where a sink node wants to compute a target function with the inputs generated at multiple source nodes. The network links are error-free but capacity-limited, and the intermediate network nodes perform network coding. The target function is required to be computed with zero error. The computing rate of a network code is measured by the average number of times that the target function can be computed for one use of the network. We propose a cut-set bound on the computing rate using an equivalence relation associated with the inputs of the target function. Our bound holds for general target functions and network topologies. We also show that our bound is tight for some special cases where the computing capacity can be characterized.
考虑有向无环网络中的函数计算,其中汇聚节点希望使用多个源节点生成的输入计算目标函数。网络链路无差错,但容量有限,中间网络节点执行网络编码。要求目标函数的计算误差为零。网络代码的计算率是通过一次使用网络可以计算目标函数的平均次数来衡量的。我们利用与目标函数输入相关联的等价关系,提出了计算率的切集界。我们的界适用于一般目标函数和网络拓扑。我们还证明了在某些特殊情况下,我们的界是紧的,其中计算能力可以表征。
{"title":"Upper bound on function computation in directed acyclic networks","authors":"Cupjin Huang, Zihan Tan, Shenghao Yang","doi":"10.1109/ITW.2015.7133086","DOIUrl":"https://doi.org/10.1109/ITW.2015.7133086","url":null,"abstract":"Function computation in directed acyclic networks is considered, where a sink node wants to compute a target function with the inputs generated at multiple source nodes. The network links are error-free but capacity-limited, and the intermediate network nodes perform network coding. The target function is required to be computed with zero error. The computing rate of a network code is measured by the average number of times that the target function can be computed for one use of the network. We propose a cut-set bound on the computing rate using an equivalence relation associated with the inputs of the target function. Our bound holds for general target functions and network topologies. We also show that our bound is tight for some special cases where the computing capacity can be characterized.","PeriodicalId":174797,"journal":{"name":"2015 IEEE Information Theory Workshop (ITW)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117224794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Stochastic interpretation for the Arimoto algorithm Arimoto算法的随机解释
Pub Date : 2014-12-15 DOI: 10.1109/ITW.2015.7133141
Sergey Tridenski, R. Zamir
The Arimoto algorithm computes the Gallager function maxQ E0(ρ, Q) for a given channel P (y | x) and parameter ρ, by means of alternating maximization. Along the way, it generates a sequence of input distributions Q1(x), Q2(x), ..., that converges to the maximizing input Q*(x). We propose a stochastic interpretation for the Arimoto algorithm. We show that for a random (i.i.d.) codebook with a distribution Qk(x), the next distribution Qk+1(x) in the Arimoto algorithm is equal to the type (Q') of the feasible transmitted codeword that maximizes the conditional Gallager exponent (conditioned on a specific transmitted codeword type Q'). This interpretation is a first step toward finding a stochastic mechanism for on-line channel input adaptation.
Arimoto算法通过交替最大化的方法计算给定信道P (y | x)和参数ρ的Gallager函数maxqe0 (ρ, Q)。在此过程中,它生成一系列输入分布Q1(x), Q2(x),…,它收敛于最大输入Q*(x)。我们提出了Arimoto算法的随机解释。我们证明了对于一个随机(i.i.d)码本,其分布为Qk(x), Arimoto算法中的下一个分布Qk+1(x)等于使条件Gallager指数(以特定传输码字类型Q'为条件)最大化的可行传输码字的类型(Q')。这种解释是寻找在线通道输入适应的随机机制的第一步。
{"title":"Stochastic interpretation for the Arimoto algorithm","authors":"Sergey Tridenski, R. Zamir","doi":"10.1109/ITW.2015.7133141","DOIUrl":"https://doi.org/10.1109/ITW.2015.7133141","url":null,"abstract":"The Arimoto algorithm computes the Gallager function maxQ E0(ρ, Q) for a given channel P (y | x) and parameter ρ, by means of alternating maximization. Along the way, it generates a sequence of input distributions Q1(x), Q2(x), ..., that converges to the maximizing input Q*(x). We propose a stochastic interpretation for the Arimoto algorithm. We show that for a random (i.i.d.) codebook with a distribution Qk(x), the next distribution Qk+1(x) in the Arimoto algorithm is equal to the type (Q') of the feasible transmitted codeword that maximizes the conditional Gallager exponent (conditioned on a specific transmitted codeword type Q'). This interpretation is a first step toward finding a stochastic mechanism for on-line channel input adaptation.","PeriodicalId":174797,"journal":{"name":"2015 IEEE Information Theory Workshop (ITW)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129841664","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Distortion-transmission trade-off in real-time transmission of Markov sources 马尔可夫信源实时传输中的失真-传输权衡
Pub Date : 2014-12-01 DOI: 10.1109/ITW.2015.7133149
Jhelum Chakravorty, Aditya Mahajan
The problem of optimal real-time transmission of a Markov source under constraints on the expected number of transmissions is considered, both for the discounted and long term average cases. This setup is motivated by applications where transmission is sporadic and the cost of switching on the radio and transmitting is significantly more important than the size of the transmitted data packet. For this model, we characterize the distortion-transmission function, i.e., the minimum expected distortion that can be achieved when the expected number of transmissions is less than or equal to a particular value. In particular, we show that the distortion-transmission function is a piecewise linear, convex, and decreasing function. We also give an explicit characterization of each vertex of the piecewise linear function. The results are illustrated using an example of a birth-death Markov chain.
考虑了在期望传输数约束下马尔可夫源的最优实时传输问题,包括贴现情况和长期平均情况。这种设置是由传输是零星的应用程序驱动的,并且打开无线电和传输的成本比传输数据包的大小重要得多。对于该模型,我们描述了失真-传输函数的特征,即当期望传输数小于或等于特定值时可以实现的最小期望失真。特别地,我们证明了失真传输函数是一个分段线性、凸和递减函数。我们还给出了分段线性函数的每个顶点的显式表征。用一个生-死马尔可夫链的例子说明了结果。
{"title":"Distortion-transmission trade-off in real-time transmission of Markov sources","authors":"Jhelum Chakravorty, Aditya Mahajan","doi":"10.1109/ITW.2015.7133149","DOIUrl":"https://doi.org/10.1109/ITW.2015.7133149","url":null,"abstract":"The problem of optimal real-time transmission of a Markov source under constraints on the expected number of transmissions is considered, both for the discounted and long term average cases. This setup is motivated by applications where transmission is sporadic and the cost of switching on the radio and transmitting is significantly more important than the size of the transmitted data packet. For this model, we characterize the distortion-transmission function, i.e., the minimum expected distortion that can be achieved when the expected number of transmissions is less than or equal to a particular value. In particular, we show that the distortion-transmission function is a piecewise linear, convex, and decreasing function. We also give an explicit characterization of each vertex of the piecewise linear function. The results are illustrated using an example of a birth-death Markov chain.","PeriodicalId":174797,"journal":{"name":"2015 IEEE Information Theory Workshop (ITW)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122891338","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Zero-error function computation through a bidirectional relay 通过双向继电器计算零误差函数
Pub Date : 2014-11-25 DOI: 10.1109/ITW.2015.7133111
Jithin Ravi, B. Dey
We consider zero error function computation in a three node wireless network. Nodes A and B observe X and Y respectively, and want to compute a function f(X, Y ) with zero error. To achieve this, nodes A and B send messages to a relay node C at rates RA and RB respectively. The relay C then broadcasts a message to A and B at rate RC to help them compute f(X, Y ) with zero error. We allow block coding, and study the region of rate-triples (RA, RB, RC) that are feasible. The rate region is characterized in terms of graph coloring of some suitably defined probabilistic graphs. We give single letter inner and outer bounds which meet for some simple examples. We provide a sufficient condition on the joint distribution pXY under which the relay can also compute f(X, Y ) if A and B can compute it with zero error.
考虑三节点无线网络中的零误差函数计算。节点A和节点B分别观察X和Y,并希望计算一个零误差的函数f(X, Y)。为了实现这一点,节点A和B分别以速率RA和RB向中继节点C发送消息。然后,中继C以速率RC向a和B广播消息,以帮助它们零错误地计算f(X, Y)。我们允许分组编码,并研究了可行的速率三元组(RA, RB, RC)区域。用适当定义的概率图的图着色来表征速率区域。对于一些简单的例子,我们给出了满足的单字母内界和外界。给出了联合分布pXY的一个充分条件,在此条件下,如果a和B可以计算f(X, Y),且误差为零,继电器也可以计算f(X, Y)。
{"title":"Zero-error function computation through a bidirectional relay","authors":"Jithin Ravi, B. Dey","doi":"10.1109/ITW.2015.7133111","DOIUrl":"https://doi.org/10.1109/ITW.2015.7133111","url":null,"abstract":"We consider zero error function computation in a three node wireless network. Nodes A and B observe X and Y respectively, and want to compute a function f(X, Y ) with zero error. To achieve this, nodes A and B send messages to a relay node C at rates RA and RB respectively. The relay C then broadcasts a message to A and B at rate RC to help them compute f(X, Y ) with zero error. We allow block coding, and study the region of rate-triples (RA, RB, RC) that are feasible. The rate region is characterized in terms of graph coloring of some suitably defined probabilistic graphs. We give single letter inner and outer bounds which meet for some simple examples. We provide a sufficient condition on the joint distribution pXY under which the relay can also compute f(X, Y ) if A and B can compute it with zero error.","PeriodicalId":174797,"journal":{"name":"2015 IEEE Information Theory Workshop (ITW)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126073642","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A comparison of skewed and orthogonal lattices in Gaussian wiretap channels 高斯窃听通道中偏斜晶格与正交晶格的比较
Pub Date : 2014-11-21 DOI: 10.1109/ITW.2015.7133106
Alex Karrila, C. Hollanti
We consider lattice coset-coded transmissions over a wiretap channel with additive white Gaussian noise (AWGN). Examining a function that can be interpreted as either the legitimate receiver's error probability or the eavesdropper's correct decision probability, we rigorously show that, albeit offering simple bit labeling, orthogonal nested lattices are suboptimal for coset coding in terms of both the legitimate receiver's and the eavesdropper's probabilities.
我们考虑了在带有加性高斯白噪声(AWGN)的窃听信道上的格集编码传输。检查一个可以解释为合法接收者的错误概率或窃听者的正确决策概率的函数,我们严格地表明,尽管提供了简单的位标记,正交嵌套格对于合法接收者和窃听者的概率来说都是次优的。
{"title":"A comparison of skewed and orthogonal lattices in Gaussian wiretap channels","authors":"Alex Karrila, C. Hollanti","doi":"10.1109/ITW.2015.7133106","DOIUrl":"https://doi.org/10.1109/ITW.2015.7133106","url":null,"abstract":"We consider lattice coset-coded transmissions over a wiretap channel with additive white Gaussian noise (AWGN). Examining a function that can be interpreted as either the legitimate receiver's error probability or the eavesdropper's correct decision probability, we rigorously show that, albeit offering simple bit labeling, orthogonal nested lattices are suboptimal for coset coding in terms of both the legitimate receiver's and the eavesdropper's probabilities.","PeriodicalId":174797,"journal":{"name":"2015 IEEE Information Theory Workshop (ITW)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133874993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Distributed storage allocations for neighborhood-based data access 基于邻域的数据访问的分布式存储分配
Pub Date : 2014-11-11 DOI: 10.1109/ITW.2015.7133126
D. Jakovetić, Aleksandar Minja, D. Bajović, D. Vukobratović
We introduce a neighborhood-based data access model for distributed coded storage allocation. Storage nodes are connected in a generic network and data is accessed locally: a user accesses a randomly chosen storage node, which subsequently queries its neighborhood to recover the data object. We aim at finding an optimal allocation that minimizes the overall storage budget while ensuring recovery with probability one. We show that the problem reduces to finding the fractional dominating set of the underlying network. Furthermore, we develop a fully distributed algorithm where each storage node communicates only with its neighborhood in order to find its optimal storage allocation. The proposed algorithm is based upon the recently proposed proximal center method-an efficient dual decomposition based on accelerated dual gradient method. We show that our algorithm achieves a (1 + ε)-approximation ratio in O(dmax3/2/ε) iterations and per-node communications, where dmax is the maximal degree across nodes. Simulations demonstrate the effectiveness of the algorithm.
提出了一种基于邻域的分布式编码存储分配数据访问模型。存储节点之间采用通用网络连接,本地访问数据:用户访问任意一个存储节点,然后查询其邻域以恢复数据对象。我们的目标是找到一个最优分配,使整体存储预算最小化,同时确保恢复概率为1。我们证明了问题简化为寻找底层网络的分数支配集。此外,我们开发了一种完全分布式算法,其中每个存储节点仅与其邻域通信,以找到其最佳存储分配。该算法基于最近提出的一种基于加速对偶梯度的高效对偶分解方法——近中心法。我们证明了我们的算法在O(dmax3/2/ε)迭代和每节点通信中实现了(1 + ε)-近似比,其中dmax是节点间的最大度。仿真验证了该算法的有效性。
{"title":"Distributed storage allocations for neighborhood-based data access","authors":"D. Jakovetić, Aleksandar Minja, D. Bajović, D. Vukobratović","doi":"10.1109/ITW.2015.7133126","DOIUrl":"https://doi.org/10.1109/ITW.2015.7133126","url":null,"abstract":"We introduce a neighborhood-based data access model for distributed coded storage allocation. Storage nodes are connected in a generic network and data is accessed locally: a user accesses a randomly chosen storage node, which subsequently queries its neighborhood to recover the data object. We aim at finding an optimal allocation that minimizes the overall storage budget while ensuring recovery with probability one. We show that the problem reduces to finding the fractional dominating set of the underlying network. Furthermore, we develop a fully distributed algorithm where each storage node communicates only with its neighborhood in order to find its optimal storage allocation. The proposed algorithm is based upon the recently proposed proximal center method-an efficient dual decomposition based on accelerated dual gradient method. We show that our algorithm achieves a (1 + ε)-approximation ratio in O(dmax3/2/ε) iterations and per-node communications, where dmax is the maximal degree across nodes. Simulations demonstrate the effectiveness of the algorithm.","PeriodicalId":174797,"journal":{"name":"2015 IEEE Information Theory Workshop (ITW)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128884038","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Upper bound on the capacity of discrete-time Wiener phase noise channels 离散维纳相位噪声信道容量的上界
Pub Date : 2014-11-03 DOI: 10.1109/ITW.2015.7133136
L. Barletta, G. Kramer
A discrete-time Wiener phase noise channel with an integrate-and-dump multi-sample receiver is studied. An upper bound to the capacity with an average input power constraint is derived, and a high signal-to-noise ratio (SNR) analysis is performed. If the oversampling factor grows as SNRα for 0 ≤ α ≤ 1, then the capacity pre-log is at most (1 + α)/2 at high SNR.
研究了带积转储多采样接收机的离散时间维纳相位噪声信道。导出了在平均输入功率约束下的容量上限,并进行了高信噪比(SNR)分析。如果过采样因子在0≤α≤1时随信噪比α增大,则在高信噪比下容量预对数最大为(1 + α)/2。
{"title":"Upper bound on the capacity of discrete-time Wiener phase noise channels","authors":"L. Barletta, G. Kramer","doi":"10.1109/ITW.2015.7133136","DOIUrl":"https://doi.org/10.1109/ITW.2015.7133136","url":null,"abstract":"A discrete-time Wiener phase noise channel with an integrate-and-dump multi-sample receiver is studied. An upper bound to the capacity with an average input power constraint is derived, and a high signal-to-noise ratio (SNR) analysis is performed. If the oversampling factor grows as SNR<sup>α</sup> for 0 ≤ α ≤ 1, then the capacity pre-log is at most (1 + α)/2 at high SNR.","PeriodicalId":174797,"journal":{"name":"2015 IEEE Information Theory Workshop (ITW)","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131205935","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Bounds for complexity of syndrome decoding for poset metrics 偏序集度量的综合征解码复杂度的界
Pub Date : 2014-11-03 DOI: 10.1109/ITW.2015.7133130
Marcelo Firer, Jerry Anderson Pinheiro
In this work we show how to decompose a linear code relatively to any given poset metric. We prove that the complexity of syndrome decoding is determined by a maximal (primary) such decomposition and then show that a refinement of a partial order leads to a refinement of the primary decomposition. Using this and considering already known results about hierarchical posets, we can establish upper and lower bounds for the complexity of syndrome decoding relatively to a poset metric.
在这项工作中,我们展示了如何分解线性码相对于任何给定的偏置度量。我们证明了综合征解码的复杂度是由一个极大的(初等)分解决定的,然后证明了一个偏阶的细化导致初等分解的细化。利用这一点,并考虑到已有的关于层次偏序集的结果,我们可以建立相对于偏序集度量的综合征解码复杂性的上界和下界。
{"title":"Bounds for complexity of syndrome decoding for poset metrics","authors":"Marcelo Firer, Jerry Anderson Pinheiro","doi":"10.1109/ITW.2015.7133130","DOIUrl":"https://doi.org/10.1109/ITW.2015.7133130","url":null,"abstract":"In this work we show how to decompose a linear code relatively to any given poset metric. We prove that the complexity of syndrome decoding is determined by a maximal (primary) such decomposition and then show that a refinement of a partial order leads to a refinement of the primary decomposition. Using this and considering already known results about hierarchical posets, we can establish upper and lower bounds for the complexity of syndrome decoding relatively to a poset metric.","PeriodicalId":174797,"journal":{"name":"2015 IEEE Information Theory Workshop (ITW)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125617330","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
2015 IEEE Information Theory Workshop (ITW)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1