首页 > 最新文献

2015 IEEE Information Theory Workshop (ITW)最新文献

英文 中文
Subset-universal lossy compression 子集通用有损压缩
Pub Date : 2014-11-03 DOI: 10.1109/ITW.2015.7133146
Or Ordentlich, O. Shayevitz
A lossy source code C with rate R for a discrete memoryless source S is called subset-universal if for every 0 <; R' <; R, almost every subset of 2nR' of its codewords achieves average distortion close to the source's distortion-rate function D(R'). In this paper we prove the asymptotic existence of such codes. Moreover, we show the asymptotic existence of a code that is subset-universal with respect to all sources with the same alphabet.
离散无内存源S的率为R的有损源代码C称为子集泛型,如果对每一个0 <;R ' <;R,其码字的几乎每个2nR'子集都达到接近源失真率函数D(R')的平均失真。本文证明了这类码的渐近存在性。此外,我们还证明了一个码的渐近存在性,该码对于所有具有相同字母表的源都是子集泛的。
{"title":"Subset-universal lossy compression","authors":"Or Ordentlich, O. Shayevitz","doi":"10.1109/ITW.2015.7133146","DOIUrl":"https://doi.org/10.1109/ITW.2015.7133146","url":null,"abstract":"A lossy source code C with rate R for a discrete memoryless source S is called subset-universal if for every 0 <; R' <; R, almost every subset of 2nR' of its codewords achieves average distortion close to the source's distortion-rate function D(R'). In this paper we prove the asymptotic existence of such codes. Moreover, we show the asymptotic existence of a code that is subset-universal with respect to all sources with the same alphabet.","PeriodicalId":174797,"journal":{"name":"2015 IEEE Information Theory Workshop (ITW)","volume":"437 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114117390","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Achievable and converse bounds over a general channel and general decoding metric 在一般信道和一般解码度量上的可达界和逆界
Pub Date : 2014-11-02 DOI: 10.1109/ITW.2015.7133137
Nir Elkayam, M. Feder
Achievable and converse bounds for general channels and mismatched decoding are derived. The direct (achievable) bound is derived using random coding and the analysis is tight up to factor 2. The converse is given in term of the achievable bound and the factor between them is given. This gives performance of the best rate-R code with possible mismatched decoding metric over a general channel, up to the factor that is identified. In the matched case we show that the converse equals the minimax meta-converse of Polyanskiy et al. [1].
推导了一般信道和不匹配解码的可达界和逆界。直接(可实现)界是使用随机编码导出的,分析紧密到因子2。用可达界的形式给出了逆函数,并给出了它们之间的因子。这提供了最佳的rate-R码的性能,在一般信道上可能存在不匹配的解码度量,直到确定的因素。在匹配情况下,我们证明了逆等于Polyanskiy等人[1]的极小极大元逆。
{"title":"Achievable and converse bounds over a general channel and general decoding metric","authors":"Nir Elkayam, M. Feder","doi":"10.1109/ITW.2015.7133137","DOIUrl":"https://doi.org/10.1109/ITW.2015.7133137","url":null,"abstract":"Achievable and converse bounds for general channels and mismatched decoding are derived. The direct (achievable) bound is derived using random coding and the analysis is tight up to factor 2. The converse is given in term of the achievable bound and the factor between them is given. This gives performance of the best rate-R code with possible mismatched decoding metric over a general channel, up to the factor that is identified. In the matched case we show that the converse equals the minimax meta-converse of Polyanskiy et al. [1].","PeriodicalId":174797,"journal":{"name":"2015 IEEE Information Theory Workshop (ITW)","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123203577","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Capacity region continuity of the compound broadcast channel with confidential messages 包含机密信息的复合广播信道的容量区域连续性
Pub Date : 2014-11-02 DOI: 10.1109/ITW.2015.7133119
Andrea Grigorescu, H. Boche, R. Schaefer, H. Poor
The compound broadcast channel with confidential messages (BCC) generalizes the BCC by modeling the uncertainty of the channel. For the compound BCC, it is known only that the actual channel realization belongs to a pre-specified uncertainty set of channels and that it is constant during the entire transmission. For reliable and secure communication it is necessary to operate at a rate pair within the compound BCC capacity region. Therefore, the question of whether small variations of the uncertainty set lead to large losses of the compound BCC capacity region is of interest, and this problem is studied here. In particular, it is shown that the compound BCC model is robust, i.e., the capacity region depends continuously on the uncertainty set.
带机密消息的复合广播信道(BCC)通过对信道的不确定性进行建模,对BCC进行了推广。对于复合BCC,只知道实际信道实现属于预先指定的信道不确定性集合,并且在整个传输过程中它是恒定的。为了实现可靠和安全的通信,有必要在复合BCC容量区域内以速率对运行。因此,不确定性集的小变化是否会导致复合BCC容量区域的大损失是一个令人感兴趣的问题,本文对此问题进行了研究。特别地,证明了复合BCC模型具有鲁棒性,即容量区域连续依赖于不确定性集。
{"title":"Capacity region continuity of the compound broadcast channel with confidential messages","authors":"Andrea Grigorescu, H. Boche, R. Schaefer, H. Poor","doi":"10.1109/ITW.2015.7133119","DOIUrl":"https://doi.org/10.1109/ITW.2015.7133119","url":null,"abstract":"The compound broadcast channel with confidential messages (BCC) generalizes the BCC by modeling the uncertainty of the channel. For the compound BCC, it is known only that the actual channel realization belongs to a pre-specified uncertainty set of channels and that it is constant during the entire transmission. For reliable and secure communication it is necessary to operate at a rate pair within the compound BCC capacity region. Therefore, the question of whether small variations of the uncertainty set lead to large losses of the compound BCC capacity region is of interest, and this problem is studied here. In particular, it is shown that the compound BCC model is robust, i.e., the capacity region depends continuously on the uncertainty set.","PeriodicalId":174797,"journal":{"name":"2015 IEEE Information Theory Workshop (ITW)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131009443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Refined upper bounds on stopping redundancy of binary linear codes 改进了二进制线性码停止冗余的上界
Pub Date : 2014-10-31 DOI: 10.1109/ITW.2015.7133087
Yauhen Yakimenka, Vitaly Skachek
The l-th stopping redundancy ρι(C) of the binary [n, k, d] code C, 1 ≤ l ≤ d, is defined as the minimum number of rows in the parity-check matrix of C, such that the smallest stopping set is of size at least l. The stopping redundancy ρ(C) is defined as ρd(C). In this work, we improve on the probabilistic analysis of stopping redundancy, proposed by Han, Siegel and Vardy, which yields the best bounds known today. In our approach, we judiciously select the first few rows in the parity-check matrix, and then continue with the probabilistic method. By using similar techniques, we improve also on the best known bounds on ρι(C), for 1 ≤ l ≤ d. Our approach is compared to the existing methods by numerical computations.
定义二进制[n, k, d]码C, 1≤l≤d的第l个停止冗余ρι(C)为C的奇偶校验矩阵的最小行数,使得最小的停止集的大小至少为1,定义停止冗余ρ(C)为ρd(C)。在这项工作中,我们改进了由Han, Siegel和Vardy提出的停止冗余的概率分析,该分析产生了今天已知的最佳边界。在我们的方法中,我们明智地选择奇偶校验矩阵中的前几行,然后继续使用概率方法。通过使用类似的技术,我们还改进了1≤l≤d时ρι(C)的已知界。通过数值计算将我们的方法与现有方法进行了比较。
{"title":"Refined upper bounds on stopping redundancy of binary linear codes","authors":"Yauhen Yakimenka, Vitaly Skachek","doi":"10.1109/ITW.2015.7133087","DOIUrl":"https://doi.org/10.1109/ITW.2015.7133087","url":null,"abstract":"The l-th stopping redundancy ρ<sub>ι</sub>(C) of the binary [n, k, d] code C, 1 ≤ l ≤ d, is defined as the minimum number of rows in the parity-check matrix of C, such that the smallest stopping set is of size at least l. The stopping redundancy ρ(C) is defined as ρ<sub>d</sub>(C). In this work, we improve on the probabilistic analysis of stopping redundancy, proposed by Han, Siegel and Vardy, which yields the best bounds known today. In our approach, we judiciously select the first few rows in the parity-check matrix, and then continue with the probabilistic method. By using similar techniques, we improve also on the best known bounds on ρ<sub>ι</sub>(C), for 1 ≤ l ≤ d. Our approach is compared to the existing methods by numerical computations.","PeriodicalId":174797,"journal":{"name":"2015 IEEE Information Theory Workshop (ITW)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133406894","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Codes for DNA storage channels DNA存储通道的代码
Pub Date : 2014-10-31 DOI: 10.1109/ITW.2015.7133132
H. M. Kiah, Gregory J. Puleo, O. Milenkovic
We consider the problem of assembling a sequence based on a collection of its substrings observed through a noisy channel. This problem of reconstructing sequences from traces was first investigated in the noiseless setting under the name of “Markov type” analysis. Here, we explain the connection between the problem and the problem of DNA synthesis and sequencing, and introduce the notion of a DNA storage channel. We analyze the number of sequence equivalence classes under the channel mapping and propose new asymmetric coding techniques to combat the effects of synthesis noise. In our analysis, we make use of Ehrhart theory for rational polytopes.
我们考虑了基于通过噪声信道观察到的子串集合组装序列的问题。从轨迹重建序列的问题首先在无噪声环境下以“马尔可夫型”分析的名义进行了研究。在这里,我们解释了这个问题与DNA合成和测序问题之间的联系,并介绍了DNA存储通道的概念。我们分析了信道映射下序列等价类的数量,并提出了新的非对称编码技术来对抗合成噪声的影响。在我们的分析中,我们使用了有理多面体的Ehrhart理论。
{"title":"Codes for DNA storage channels","authors":"H. M. Kiah, Gregory J. Puleo, O. Milenkovic","doi":"10.1109/ITW.2015.7133132","DOIUrl":"https://doi.org/10.1109/ITW.2015.7133132","url":null,"abstract":"We consider the problem of assembling a sequence based on a collection of its substrings observed through a noisy channel. This problem of reconstructing sequences from traces was first investigated in the noiseless setting under the name of “Markov type” analysis. Here, we explain the connection between the problem and the problem of DNA synthesis and sequencing, and introduce the notion of a DNA storage channel. We analyze the number of sequence equivalence classes under the channel mapping and propose new asymmetric coding techniques to combat the effects of synthesis noise. In our analysis, we make use of Ehrhart theory for rational polytopes.","PeriodicalId":174797,"journal":{"name":"2015 IEEE Information Theory Workshop (ITW)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114242987","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Non-adaptive group testing with inhibitors 非适应性组抑制剂试验
Pub Date : 2014-10-30 DOI: 10.1109/ITW.2015.7133108
A. Ganesan, S. Jaggi, Venkatesh Saligrama
Group testing with inhibitors (GTI) introduced by Farach at al. is studied in this paper. There are three types of items, d defectives, r inhibitors and n-d-r normal items in a population of n items. The presence of any inhibitor in a test can prevent the expression of a defective. For this model, we propose a probabilistic non-adaptive pooling design with a low complexity decoding algorithm. We show that the sample complexity of the number of tests required for guaranteed recovery with vanishing error probability using the proposed algorithm scales as T = O(d log n) and equation in the regimes r = O(d) and d = o(r) respectively. In the former regime, the number of tests meets the lower bound order while in the latter regime, the number of tests is shown to exceed the lower bound order by a log r over d multiplicative factor. The decoding complexity of the proposed decoding algorithm scales as O(nT).
本文研究了Farach等人引入的抑制剂(GTI)的群体试验。有三种类型的项目,d缺陷,r抑制剂和n-d-r正常项目在n个项目的群体。测试中任何抑制剂的存在都可以阻止缺陷基因的表达。针对该模型,我们提出了一种具有低复杂度解码算法的概率非自适应池化设计。我们表明,使用所提出的算法,在r = O(d)和d = O(r)的范围内,保证错误概率消失的恢复所需的测试次数的样本复杂度分别为T = O(d)和d = O(r)。在前一种情况下,测试的次数满足下界阶,而在后一种情况下,测试的次数被证明超过下界阶一个log r / d乘因子。所提出的译码算法的译码复杂度为0 (nT)。
{"title":"Non-adaptive group testing with inhibitors","authors":"A. Ganesan, S. Jaggi, Venkatesh Saligrama","doi":"10.1109/ITW.2015.7133108","DOIUrl":"https://doi.org/10.1109/ITW.2015.7133108","url":null,"abstract":"Group testing with inhibitors (GTI) introduced by Farach at al. is studied in this paper. There are three types of items, d defectives, r inhibitors and n-d-r normal items in a population of n items. The presence of any inhibitor in a test can prevent the expression of a defective. For this model, we propose a probabilistic non-adaptive pooling design with a low complexity decoding algorithm. We show that the sample complexity of the number of tests required for guaranteed recovery with vanishing error probability using the proposed algorithm scales as T = O(d log n) and equation in the regimes r = O(d) and d = o(r) respectively. In the former regime, the number of tests meets the lower bound order while in the latter regime, the number of tests is shown to exceed the lower bound order by a log r over d multiplicative factor. The decoding complexity of the proposed decoding algorithm scales as O(nT).","PeriodicalId":174797,"journal":{"name":"2015 IEEE Information Theory Workshop (ITW)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131913684","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
The approximate optimality of simple schedules for half-duplex multi-relay networks 半双工多中继网络中简单调度的近似最优性
Pub Date : 2014-10-27 DOI: 10.1109/ITW.2015.7133090
Martina Cardone, Daniela Tuninetti, R. Knopp
In ISIT2012 Brahma, Özgür and Fragouli conjectured that in a half-duplex diamond relay network (a Gaussian noise network without a direct source-destination link and with N non-interfering relays) an approximately optimal relay scheduling (achieving the cut-set upper bound to within a constant gap uniformly over all channel gains) exists with at most N + 1 active states (only N + 1 out of the 2N possible relay listen-transmit configurations have a strictly positive probability). Such relay scheduling policies are said to be simple. In ITW2013 we conjectured that simple relay policies are optimal for any half-duplex Gaussian multi-relay network, that is, simple schedules are not a consequence of the diamond network's sparse topology. In this paper we formally prove the conjecture beyond Gaussian networks. In particular, for any memoryless half-duplex N-relay network for which the cut-set bound is approximately optimal to within a constant gap under some conditions (satisfied for example by Gaussian networks), an optimal schedule exists with at most N + 1 active states. The key step of our proof is to write the minimum of a submodular function by means of its Lovász extension and use the greedy algorithm for submodular polyhedra to highlight structural properties of the optimal solution. This, together with the saddle-point property of min-max problems and the existence of optimal basic feasible solutions in linear programs, proves the claim.
在ISIT2012梵天,Ozgur Fragouli猜想在半双工钻石继电器网络(没有直接源目的地的高斯噪声网络链接和N互不干扰的继电器)一个近似最优中继调度(实现割集上界统一在一个固定的差距在所有频道收益)存在最多N + 1活跃状态(只有N + 1的2 N可能继电器listen-transmit配置有一个严格的积极的概率)。这种中继调度策略被认为是简单的。在ITW2013中,我们推测简单中继策略对于任何半双工高斯多中继网络都是最优的,也就是说,简单调度不是菱形网络稀疏拓扑的结果。本文正式证明了高斯网络的猜想。特别地,对于任何无记忆半双工N中继网络,其切集界在某些条件下(例如由高斯网络满足)在一个恒定的间隙内近似最优,存在一个最优调度,最多有N + 1个活动状态。证明的关键步骤是利用次模函数Lovász的扩展写出次模函数的最小值,并使用次模多面体的贪心算法来突出最优解的结构性质。结合最小-极大问题的鞍点性质和线性规划中最优基本可行解的存在性,证明了这一说法。
{"title":"The approximate optimality of simple schedules for half-duplex multi-relay networks","authors":"Martina Cardone, Daniela Tuninetti, R. Knopp","doi":"10.1109/ITW.2015.7133090","DOIUrl":"https://doi.org/10.1109/ITW.2015.7133090","url":null,"abstract":"In ISIT2012 Brahma, Özgür and Fragouli conjectured that in a half-duplex diamond relay network (a Gaussian noise network without a direct source-destination link and with N non-interfering relays) an approximately optimal relay scheduling (achieving the cut-set upper bound to within a constant gap uniformly over all channel gains) exists with at most N + 1 active states (only N + 1 out of the 2N possible relay listen-transmit configurations have a strictly positive probability). Such relay scheduling policies are said to be simple. In ITW2013 we conjectured that simple relay policies are optimal for any half-duplex Gaussian multi-relay network, that is, simple schedules are not a consequence of the diamond network's sparse topology. In this paper we formally prove the conjecture beyond Gaussian networks. In particular, for any memoryless half-duplex N-relay network for which the cut-set bound is approximately optimal to within a constant gap under some conditions (satisfied for example by Gaussian networks), an optimal schedule exists with at most N + 1 active states. The key step of our proof is to write the minimum of a submodular function by means of its Lovász extension and use the greedy algorithm for submodular polyhedra to highlight structural properties of the optimal solution. This, together with the saddle-point property of min-max problems and the existence of optimal basic feasible solutions in linear programs, proves the claim.","PeriodicalId":174797,"journal":{"name":"2015 IEEE Information Theory Workshop (ITW)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134276621","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Polar coding for the general wiretap channel 一般窃听信道的极性编码
Pub Date : 2014-10-14 DOI: 10.1109/ITW.2015.7133080
Yi-Peng Wei, S. Ulukus
Information-theoretic work for wiretap channels is mostly based on random coding schemes. Designing practical coding schemes to achieve information-theoretic security is an important problem. By applying two recently developed techniques for polar codes, namely, universal polar coding and polar coding for asymmetric channels, we propose a polar coding scheme to achieve the secrecy capacity of the general wiretap channel.
窃听信道的信息论工作主要是基于随机编码方案。设计实用的编码方案来实现信息论的安全是一个重要的问题。通过应用两种最新发展的极性编码技术,即通用极性编码和非对称信道的极性编码,我们提出了一种极性编码方案,以实现一般窃听信道的保密能力。
{"title":"Polar coding for the general wiretap channel","authors":"Yi-Peng Wei, S. Ulukus","doi":"10.1109/ITW.2015.7133080","DOIUrl":"https://doi.org/10.1109/ITW.2015.7133080","url":null,"abstract":"Information-theoretic work for wiretap channels is mostly based on random coding schemes. Designing practical coding schemes to achieve information-theoretic security is an important problem. By applying two recently developed techniques for polar codes, namely, universal polar coding and polar coding for asymmetric channels, we propose a polar coding scheme to achieve the secrecy capacity of the general wiretap channel.","PeriodicalId":174797,"journal":{"name":"2015 IEEE Information Theory Workshop (ITW)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115235802","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
Conditioning and covariance on caterpillars 毛虫的条件作用和协方差
Pub Date : 2014-07-16 DOI: 10.1109/ITW.2015.7133115
Sarah R. Allen, R. O'Donnell
Let X1, ..., Xn be joint {±1}-valued random variables. It is known that conditioning on a random subset of O(1/ε2) of them reduces their average pairwise covariance to below ε (in expectation). We conjecture that O(1/ε2) can be improved to O(1/ε). The motivation for the problem and our conjectured improvement comes from the theory of global correlation rounding for convex relaxation hierarchies. We suggest attempting the conjecture in the case that X1, ..., Xn are the leaves of an information flow tree. We prove the conjecture in the case that the information flow tree is a caterpillar graph (similar to a two-state hidden Markov model).
设X1,…, Xn为联合{±1}值随机变量。已知,对其中的O(1/ε2)个随机子集施加条件,可使它们的平均成对协方差低于ε(期望)。我们推测O(1/ε2)可以改进为O(1/ε)。问题的动机和我们推测的改进来自凸松弛层次的全局相关舍入理论。我们建议在X1,…的情况下尝试这个猜想。, Xn是信息流树的叶子。在信息流树为履带图(类似于两态隐马尔可夫模型)的情况下,证明了该猜想。
{"title":"Conditioning and covariance on caterpillars","authors":"Sarah R. Allen, R. O'Donnell","doi":"10.1109/ITW.2015.7133115","DOIUrl":"https://doi.org/10.1109/ITW.2015.7133115","url":null,"abstract":"Let X<sub>1</sub>, ..., X<sub>n</sub> be joint {±1}-valued random variables. It is known that conditioning on a random subset of O(1/ε<sup>2</sup>) of them reduces their average pairwise covariance to below ε (in expectation). We conjecture that O(1/ε<sup>2</sup>) can be improved to O(1/ε). The motivation for the problem and our conjectured improvement comes from the theory of global correlation rounding for convex relaxation hierarchies. We suggest attempting the conjecture in the case that X<sub>1</sub>, ..., X<sub>n</sub> are the leaves of an information flow tree. We prove the conjecture in the case that the information flow tree is a caterpillar graph (similar to a two-state hidden Markov model).","PeriodicalId":174797,"journal":{"name":"2015 IEEE Information Theory Workshop (ITW)","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132519597","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Capacity of Binary State Symmetric Channel with and without feedback and transmission cost 有无反馈的二进制状态对称信道容量与传输代价
Pub Date : 2014-01-31 DOI: 10.1109/ITW.2015.7133133
C. Kourtellaris, C. Charalambous
We consider a unit memory channel, called Binary State Symmetric Channel (BSSC), in which the channel state is the modulo2 addition of the current channel input and the previous channel output. We derive closed form expressions for the capacity and corresponding channel input distribution for the BSSC with and without feedback and transmission cost. We also show that the capacity of the BSSC, with or without feedback, is achieved by a first order symmetric Markov process.
我们考虑一个单元存储器通道,称为二进制状态对称通道(BSSC),其中通道状态是当前通道输入和前一个通道输出的模2相加。导出了有反馈和无传输费用时BSSC的容量和相应信道输入分布的封闭表达式。我们还证明了有或没有反馈的BSSC的容量是通过一阶对称马尔可夫过程实现的。
{"title":"Capacity of Binary State Symmetric Channel with and without feedback and transmission cost","authors":"C. Kourtellaris, C. Charalambous","doi":"10.1109/ITW.2015.7133133","DOIUrl":"https://doi.org/10.1109/ITW.2015.7133133","url":null,"abstract":"We consider a unit memory channel, called Binary State Symmetric Channel (BSSC), in which the channel state is the modulo2 addition of the current channel input and the previous channel output. We derive closed form expressions for the capacity and corresponding channel input distribution for the BSSC with and without feedback and transmission cost. We also show that the capacity of the BSSC, with or without feedback, is achieved by a first order symmetric Markov process.","PeriodicalId":174797,"journal":{"name":"2015 IEEE Information Theory Workshop (ITW)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115380152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
期刊
2015 IEEE Information Theory Workshop (ITW)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1