首页 > 最新文献

2016 IEEE International Symposium on Information Theory (ISIT)最新文献

英文 中文
On the energy-distortion tradeoff for the Gaussian broadcast problem 高斯广播问题的能量失真权衡
Pub Date : 2016-07-10 DOI: 10.1109/ISIT.2016.7541617
Erman Koken, E. Tuncel
The energy-distortion tradeoff for the transmission of a white Gaussian source over the additive white Gaussian broadcast channel is investigated by translating the known upper and lower bounds into the infinite bandwidth regime. While a gap continues to exist between the bounds in this regime, it is shown that in a certain region on the distortion plane, the energy difference between the best known upper and lower bounds is quantifiably small.
通过将已知的上界和下界转换为无限带宽,研究了白高斯源在加性白高斯广播信道上传输的能量失真权衡。虽然在该区域的边界之间继续存在间隙,但表明在畸变平面上的某个区域,已知的上界和下界之间的能量差可量化地小。
{"title":"On the energy-distortion tradeoff for the Gaussian broadcast problem","authors":"Erman Koken, E. Tuncel","doi":"10.1109/ISIT.2016.7541617","DOIUrl":"https://doi.org/10.1109/ISIT.2016.7541617","url":null,"abstract":"The energy-distortion tradeoff for the transmission of a white Gaussian source over the additive white Gaussian broadcast channel is investigated by translating the known upper and lower bounds into the infinite bandwidth regime. While a gap continues to exist between the bounds in this regime, it is shown that in a certain region on the distortion plane, the energy difference between the best known upper and lower bounds is quantifiably small.","PeriodicalId":198767,"journal":{"name":"2016 IEEE International Symposium on Information Theory (ISIT)","volume":"39 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124258294","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Computing the optimal exponent of correct decoding for discrete memoryless sources 离散无记忆源正确译码的最佳指数计算
Pub Date : 2016-07-10 DOI: 10.1109/ISIT.2016.7541555
Y. Jitsumatsu, Y. Oohama
The form of Dueck and Körner's exponent function for correct decoding probability for discrete memoryless channels at rates above the capacity is similar to the form of Csiszár and Körner's exponent function for correct decoding probability in lossy source coding for discrete memoryless sources at rates below the rate distortion function. We recently gave a new algorithm for computing Dueck and Körner's exponent. In this paper, we give an algorithm for computing Csiszár and Körner's exponent. The proposed algorithm can also be used to compute cutoff rate and the rate distortion function.
在高于容量的速率下,离散无记忆信道的正确解码概率的Dueck和Körner的指数函数的形式类似于在低于速率失真函数的速率下,离散无记忆信道的有损耗源编码中正确解码概率的Csiszár和Körner的指数函数的形式。我们最近给出了一种计算Dueck指数和Körner指数的新算法。本文给出了一种计算Csiszár和Körner指数的算法。该算法还可用于计算截止率和率失真函数。
{"title":"Computing the optimal exponent of correct decoding for discrete memoryless sources","authors":"Y. Jitsumatsu, Y. Oohama","doi":"10.1109/ISIT.2016.7541555","DOIUrl":"https://doi.org/10.1109/ISIT.2016.7541555","url":null,"abstract":"The form of Dueck and Körner's exponent function for correct decoding probability for discrete memoryless channels at rates above the capacity is similar to the form of Csiszár and Körner's exponent function for correct decoding probability in lossy source coding for discrete memoryless sources at rates below the rate distortion function. We recently gave a new algorithm for computing Dueck and Körner's exponent. In this paper, we give an algorithm for computing Csiszár and Körner's exponent. The proposed algorithm can also be used to compute cutoff rate and the rate distortion function.","PeriodicalId":198767,"journal":{"name":"2016 IEEE International Symposium on Information Theory (ISIT)","volume":"132 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116661398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Spider Codes: Practical erasure codes for distributed storage systems 蜘蛛码:用于分布式存储系统的实用擦除码
Pub Date : 2016-07-10 DOI: 10.1109/ISIT.2016.7541490
Lluis Pamies-Juarez, Cyril Guyot, R. Mateescu
Distributed storage systems use erasure codes to reliably store data with a small storage overhead. To further improve system performance, some novel erasure codes introduce new features such as the regenerating property or symbol locality, enabling these codes to have optimal repair times and optimal degraded read performance. Unfortunately, the introduction of these new features often exacerbates the performance of other system metrics such as encoding throughput, data reliability, and storage overhead, among others. In this paper we describe the intricate relationships between erasure code properties and system-level performance metrics, showing the different tradeoffs distributed storage designers need to face. We also present Spider Codes, a new erasure code achieving a practical trade-off between the different system-level performance metrics.
分布式存储系统采用erasure code(擦除码)技术,以较小的存储开销可靠地存储数据。为了进一步提高系统性能,一些新的擦除码引入了新的特性,如再生特性或符号局域性,使这些码具有最佳的修复时间和最佳的降级读性能。不幸的是,这些新特性的引入通常会加剧其他系统指标的性能,例如编码吞吐量、数据可靠性和存储开销等。在本文中,我们描述了擦除代码属性和系统级性能指标之间的复杂关系,展示了分布式存储设计者需要面对的不同权衡。我们还介绍了Spider Codes,这是一种新的擦除代码,实现了不同系统级性能指标之间的实际权衡。
{"title":"Spider Codes: Practical erasure codes for distributed storage systems","authors":"Lluis Pamies-Juarez, Cyril Guyot, R. Mateescu","doi":"10.1109/ISIT.2016.7541490","DOIUrl":"https://doi.org/10.1109/ISIT.2016.7541490","url":null,"abstract":"Distributed storage systems use erasure codes to reliably store data with a small storage overhead. To further improve system performance, some novel erasure codes introduce new features such as the regenerating property or symbol locality, enabling these codes to have optimal repair times and optimal degraded read performance. Unfortunately, the introduction of these new features often exacerbates the performance of other system metrics such as encoding throughput, data reliability, and storage overhead, among others. In this paper we describe the intricate relationships between erasure code properties and system-level performance metrics, showing the different tradeoffs distributed storage designers need to face. We also present Spider Codes, a new erasure code achieving a practical trade-off between the different system-level performance metrics.","PeriodicalId":198767,"journal":{"name":"2016 IEEE International Symposium on Information Theory (ISIT)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121273133","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
On the optimality of zero-forcing and treating interference as noise for K-user MIMO interference channels k -用户MIMO干扰信道的零强制和噪声处理的最优性
Pub Date : 2016-07-10 DOI: 10.1109/ISIT.2016.7541775
Chunhua Geng, S. Jafar
In this work, we first establish that for the class of interference channels identified by Geng et al. where treating interference as noise (TIN) is optimal from the generalized degrees-of-freedom (GDoF) perspective, if the number of antennas at each node is scaled by a common constant factor, then the GDoF region scales by the same factor almost surely, and the TIN scheme remains optimal for the entire GDoF region. Next, we demonstrate that for K-user MIMO interference channels with different antenna numbers for transmitters and receivers, there exist non-trivial parameter regimes where a simple scheme of zero-forcing strong interference and treating the others as noise achieves the sum GDoF.
在这项工作中,我们首先建立了对于耿等人识别的干扰通道类别,从广义自由度(GDoF)的角度来看,将干扰视为噪声(TIN)是最优的,如果每个节点的天线数量按公共常数因子缩放,那么gof区域几乎肯定会按相同因子缩放,并且TIN方案对于整个gof区域仍然是最优的。接下来,我们证明了对于发射机和接收机具有不同天线数的k用户MIMO干扰信道,存在非平凡参数制度,其中零强迫强干扰和将其他干扰视为噪声的简单方案可以获得和gof。
{"title":"On the optimality of zero-forcing and treating interference as noise for K-user MIMO interference channels","authors":"Chunhua Geng, S. Jafar","doi":"10.1109/ISIT.2016.7541775","DOIUrl":"https://doi.org/10.1109/ISIT.2016.7541775","url":null,"abstract":"In this work, we first establish that for the class of interference channels identified by Geng et al. where treating interference as noise (TIN) is optimal from the generalized degrees-of-freedom (GDoF) perspective, if the number of antennas at each node is scaled by a common constant factor, then the GDoF region scales by the same factor almost surely, and the TIN scheme remains optimal for the entire GDoF region. Next, we demonstrate that for K-user MIMO interference channels with different antenna numbers for transmitters and receivers, there exist non-trivial parameter regimes where a simple scheme of zero-forcing strong interference and treating the others as noise achieves the sum GDoF.","PeriodicalId":198767,"journal":{"name":"2016 IEEE International Symposium on Information Theory (ISIT)","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114190309","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Effects of the approximations from BP to AMP for small-sized problems 小尺度问题中BP到AMP近似的影响
Pub Date : 2016-07-10 DOI: 10.1109/ISIT.2016.7541403
Arise Kuriya, Toshiyuki TANAKA
Approximate Massage Passing (AMP) algorithm is derived from Belief Propagation (BP) algorithm by introducing approximations. While the properties and behaviors of AMP in large systems are well studied and understood, there are few studies about AMP applied to relatively small sized problems where the effect of the approximations are neither negligible nor trivial. We investigate AMP in small-sized problems, especially focusing on the effects of the approximations and the mechanism of the performance degradation. To observe the effects of the approximations, we conduct numerical experiments which compare AMP and BP algorithms. We apply these algorithms to the problems of CDMA-MUD and Ising perceptron learning. In the numerical experiments, the results via Bayes optimal estimation obtained via exactly calculating marginals and an approximated BP algorithm which is obtained as an intermediate step to derive AMP from BP are also provided and discussed for the comparisons.
近似按摩传递(AMP)算法是在信念传播(BP)算法的基础上通过引入近似而衍生出来的。虽然AMP在大型系统中的性质和行为已经得到了很好的研究和理解,但很少有研究将AMP应用于相对较小的问题,其中近似的影响既不能忽略也不能微不足道。我们在小尺度问题中研究了AMP,特别关注了近似的影响和性能下降的机制。为了观察近似的效果,我们进行了数值实验,比较了AMP算法和BP算法。我们将这些算法应用于CDMA-MUD和Ising感知器学习问题。在数值实验中,给出了通过精确计算边际得到的Bayes最优估计结果,以及作为中间步骤从BP得到AMP的近似BP算法,并对其进行了比较讨论。
{"title":"Effects of the approximations from BP to AMP for small-sized problems","authors":"Arise Kuriya, Toshiyuki TANAKA","doi":"10.1109/ISIT.2016.7541403","DOIUrl":"https://doi.org/10.1109/ISIT.2016.7541403","url":null,"abstract":"Approximate Massage Passing (AMP) algorithm is derived from Belief Propagation (BP) algorithm by introducing approximations. While the properties and behaviors of AMP in large systems are well studied and understood, there are few studies about AMP applied to relatively small sized problems where the effect of the approximations are neither negligible nor trivial. We investigate AMP in small-sized problems, especially focusing on the effects of the approximations and the mechanism of the performance degradation. To observe the effects of the approximations, we conduct numerical experiments which compare AMP and BP algorithms. We apply these algorithms to the problems of CDMA-MUD and Ising perceptron learning. In the numerical experiments, the results via Bayes optimal estimation obtained via exactly calculating marginals and an approximated BP algorithm which is obtained as an intermediate step to derive AMP from BP are also provided and discussed for the comparisons.","PeriodicalId":198767,"journal":{"name":"2016 IEEE International Symposium on Information Theory (ISIT)","volume":"161 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114268972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Robustness of cooperative communication schemes to channel models 协作通信方案对信道模型的鲁棒性
Pub Date : 2016-07-10 DOI: 10.1109/ISIT.2016.7541688
Vasuki Narasimha Swamy, G. Ranade, A. Sahai
Cooperative communication to extract multi-user diversity and network coding are two ideas for improving wireless protocols. These ideas can be exploited to design protocols for low-latency high-reliability communication for control. Given the high-performance constraints for this communication, it is critical, to understand how sensitive such protocols are to modeling assumptions. We examine the impact of channel reciprocity, quasi-static fading, and the spatial independence of channel fades in this paper. This paper uses simple models to explore the performance sensitivity to assumptions. It turns out that wireless network-coding is moderately sensitive to channel reciprocity and non-reciprocity costs about 2dB SNR. The loss of the quasi-static fading assumption has a similar cost for the network coding based protocol but has a negligible effect on the protocol that doesn't use network coding. The real sensitivity of cooperative communication protocols is to the spatial independence assumptions. Capping the amount of independence to a small number degrades performance but perhaps more surprisingly, a simple Gilbert-Elliott-inspired model shows that having a random amount of independence can also severely impact performance.
协同通信提取多用户分集和网络编码是改进无线协议的两个思路。这些思想可以用于设计用于控制的低延迟高可靠性通信的协议。考虑到这种通信的高性能约束,理解这种协议对建模假设的敏感性是至关重要的。本文研究了信道互易性、准静态衰落和信道衰落的空间独立性的影响。本文使用简单的模型来探讨性能对假设的敏感性。结果表明,无线网络编码对信道互易具有中等敏感性,非互易的信噪比约为2dB。准静态衰落假设的损失对基于网络编码的协议具有类似的代价,但对不使用网络编码的协议的影响可以忽略不计。协作通信协议的真正敏感性在于空间独立性假设。将独立性的数量限制在较小的数量会降低性能,但也许更令人惊讶的是,一个简单的吉尔伯特-埃利奥特模型表明,拥有随机数量的独立性也会严重影响性能。
{"title":"Robustness of cooperative communication schemes to channel models","authors":"Vasuki Narasimha Swamy, G. Ranade, A. Sahai","doi":"10.1109/ISIT.2016.7541688","DOIUrl":"https://doi.org/10.1109/ISIT.2016.7541688","url":null,"abstract":"Cooperative communication to extract multi-user diversity and network coding are two ideas for improving wireless protocols. These ideas can be exploited to design protocols for low-latency high-reliability communication for control. Given the high-performance constraints for this communication, it is critical, to understand how sensitive such protocols are to modeling assumptions. We examine the impact of channel reciprocity, quasi-static fading, and the spatial independence of channel fades in this paper. This paper uses simple models to explore the performance sensitivity to assumptions. It turns out that wireless network-coding is moderately sensitive to channel reciprocity and non-reciprocity costs about 2dB SNR. The loss of the quasi-static fading assumption has a similar cost for the network coding based protocol but has a negligible effect on the protocol that doesn't use network coding. The real sensitivity of cooperative communication protocols is to the spatial independence assumptions. Capping the amount of independence to a small number degrades performance but perhaps more surprisingly, a simple Gilbert-Elliott-inspired model shows that having a random amount of independence can also severely impact performance.","PeriodicalId":198767,"journal":{"name":"2016 IEEE International Symposium on Information Theory (ISIT)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114271381","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Constructions of batch codes with near-optimal redundancy 具有近最优冗余的批处理代码的构造
Pub Date : 2016-07-10 DOI: 10.1109/ISIT.2016.7541488
A. Vardy, Eitan Yaakobi
Batch codes, first studied by Ishai et al., are a coding scheme to encode n information bits into m buckets, in a way that every batch request of k bits can be decoded while at most one bit is read from each bucket. In this work we study the class of multiset primitive batch codes, in which every bucket stores a single bit and bits can be requested multiple times. We simply refer to these codes as batch codes. The main problem under this paradigm is to optimize the number of encoded bits, which is the number of buckets, for given n and k, and we denote this value by B(n, k). Since there are several asymptotically optimal constructions of these codes, we are motivated to evaluate their optimality by their redundancy. Thus we define the optimal redundancy of batch codes to be rB(n, k) ??? B(n, k) - n. Our main result in this paper claims that for any fixed k, rB(n, k) = O(√n log(n)).
Ishai等人首先研究的批处理码是一种将n个信息位编码到m个桶中的编码方案,每个k位的批处理请求可以被解码,而每个桶最多只能读取1位。在本研究中,我们研究了一类多集原始批码,其中每个桶存储一个比特,并且比特可以被多次请求。我们简单地把这些代码称为批处理代码。这种范式下的主要问题是优化编码比特的数量,即给定n和k的桶的数量,我们用B(n, k)表示这个值。由于这些代码有几个渐近最优结构,我们被激励通过它们的冗余来评估它们的最优性。因此,我们定义批码的最优冗余为rB(n, k) ??B(n, k) - n。本文的主要结果表明,对于任意固定的k, rB(n, k) = O(√n log(n))。
{"title":"Constructions of batch codes with near-optimal redundancy","authors":"A. Vardy, Eitan Yaakobi","doi":"10.1109/ISIT.2016.7541488","DOIUrl":"https://doi.org/10.1109/ISIT.2016.7541488","url":null,"abstract":"Batch codes, first studied by Ishai et al., are a coding scheme to encode n information bits into m buckets, in a way that every batch request of k bits can be decoded while at most one bit is read from each bucket. In this work we study the class of multiset primitive batch codes, in which every bucket stores a single bit and bits can be requested multiple times. We simply refer to these codes as batch codes. The main problem under this paradigm is to optimize the number of encoded bits, which is the number of buckets, for given n and k, and we denote this value by B(n, k). Since there are several asymptotically optimal constructions of these codes, we are motivated to evaluate their optimality by their redundancy. Thus we define the optimal redundancy of batch codes to be rB(n, k) ??? B(n, k) - n. Our main result in this paper claims that for any fixed k, rB(n, k) = O(√n log(n)).","PeriodicalId":198767,"journal":{"name":"2016 IEEE International Symposium on Information Theory (ISIT)","volume":"153 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114517341","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
On the impossibility of information-theoretic composable coin toss extension 论信息论可组合抛硬币可拓的不可能性
Pub Date : 2016-07-10 DOI: 10.1109/ISIT.2016.7541861
Gregor Seiler, U. Maurer
Shared randomness is an important resource in cryptography. It is well-known that in the information-theoretic setting there is no protocol that allows two parties who do not trust each other to obtain a uniformly distributed shared bit string solely by exchanging messages such that a dishonest party can not influence the result. On the other hand, in the situation where the two parties already share a random bit string and want to use it in order to construct a longer random bit string, it is only known to be impossible when the protocols are restricted in the number of messages to be exchanged. In this paper we prove that it is also impossible when arbitrarily many messages are allowed.
共享随机性是密码学中的一种重要资源。众所周知,在信息论环境中,没有任何协议允许互不信任的双方仅通过交换消息来获得均匀分布的共享位串,从而使不诚实的一方无法影响结果。另一方面,在双方已经共享了一个随机比特串,并希望使用它来构建一个更长的随机比特串的情况下,只有在协议被限制要交换的消息数量时,才知道这是不可能的。在本文中,我们证明了当允许任意多个消息时,这也是不可能的。
{"title":"On the impossibility of information-theoretic composable coin toss extension","authors":"Gregor Seiler, U. Maurer","doi":"10.1109/ISIT.2016.7541861","DOIUrl":"https://doi.org/10.1109/ISIT.2016.7541861","url":null,"abstract":"Shared randomness is an important resource in cryptography. It is well-known that in the information-theoretic setting there is no protocol that allows two parties who do not trust each other to obtain a uniformly distributed shared bit string solely by exchanging messages such that a dishonest party can not influence the result. On the other hand, in the situation where the two parties already share a random bit string and want to use it in order to construct a longer random bit string, it is only known to be impossible when the protocols are restricted in the number of messages to be exchanged. In this paper we prove that it is also impossible when arbitrarily many messages are allowed.","PeriodicalId":198767,"journal":{"name":"2016 IEEE International Symposium on Information Theory (ISIT)","volume":"26 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116834546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cognitive hierarchy theory for heterogeneous uplink multiple access in the Internet of Things 物联网异构上行多址的认知层次理论
Pub Date : 2016-07-10 DOI: 10.1109/ISIT.2016.7541499
Nof Abuzainab, W. Saad, H. Poor
In this paper, the problem of distributed uplink random access is studied for an Internet of Things (IoT) system, composed of heterogeneous group of nodes compromising both machine-type devices (MTDs) and human-type devices (HTDs). The problem is formulated as a noncooperative game between the heterogeneous IoT devices whose goal is to find the transmission probabilities and service rates that meet their individual quality-of-service (QoS) requirements. To solve this game while capturing the heterogeneity of the devices, in terms of resource constraints and QoS needs, a novel approach based on the behavioral game framework of cognitive hierarchy (CH) theory is proposed. This approach enables the IoT devices to reach a CH equilibrium concept that adequately factors in the various levels of rationality corresponding to the heterogeneous capabilities of MTDs and HTDs. Simulation results show that the proposed CH solution can significantly improve the performance, in terms of energy efficiency, for both MTDs and HTDs, achieving, on the average, a 67% improvement compared to the traditional Nash equilibrium-based game-theoretic solutions.
本文研究了一个物联网系统的分布式上行随机接入问题,该系统由一组异构节点组成,其中既有机器型设备(MTDs),也有人型设备(HTDs)。该问题被表述为异构物联网设备之间的非合作博弈,其目标是找到满足各自服务质量(QoS)要求的传输概率和服务速率。从资源约束和QoS需求两方面考虑,为解决这一博弈问题,提出了一种基于认知层次(CH)理论的行为博弈框架。这种方法使物联网设备能够达到CH平衡概念,充分考虑到mtd和htd的异构能力所对应的各种理性水平。仿真结果表明,所提出的CH解决方案可以显著提高MTDs和HTDs的性能,在能源效率方面,与传统的基于纳什均衡的博弈论解决方案相比,平均提高67%。
{"title":"Cognitive hierarchy theory for heterogeneous uplink multiple access in the Internet of Things","authors":"Nof Abuzainab, W. Saad, H. Poor","doi":"10.1109/ISIT.2016.7541499","DOIUrl":"https://doi.org/10.1109/ISIT.2016.7541499","url":null,"abstract":"In this paper, the problem of distributed uplink random access is studied for an Internet of Things (IoT) system, composed of heterogeneous group of nodes compromising both machine-type devices (MTDs) and human-type devices (HTDs). The problem is formulated as a noncooperative game between the heterogeneous IoT devices whose goal is to find the transmission probabilities and service rates that meet their individual quality-of-service (QoS) requirements. To solve this game while capturing the heterogeneity of the devices, in terms of resource constraints and QoS needs, a novel approach based on the behavioral game framework of cognitive hierarchy (CH) theory is proposed. This approach enables the IoT devices to reach a CH equilibrium concept that adequately factors in the various levels of rationality corresponding to the heterogeneous capabilities of MTDs and HTDs. Simulation results show that the proposed CH solution can significantly improve the performance, in terms of energy efficiency, for both MTDs and HTDs, achieving, on the average, a 67% improvement compared to the traditional Nash equilibrium-based game-theoretic solutions.","PeriodicalId":198767,"journal":{"name":"2016 IEEE International Symposium on Information Theory (ISIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129833649","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
The capacity of some Pólya string models 一些Pólya字符串模型的容量
Pub Date : 2016-07-10 DOI: 10.1109/ISIT.2016.7541303
Ohad Elishco, Farzad Farnoud, Moshe Schwartz, Jehoshua Bruck
We study random string-duplication systems, called Pólya string models, motivated by certain random mutation processes in the genome of living organisms. Unlike previous works that study the combinatorial capacity of string-duplication systems, or peripheral properties such as symbol frequency, this work provides exact capacity or bounds on it, for several probabilistic models. In particular, we give the exact capacity of the random tandem-duplication system, and the end-duplication system, and bound the capacity of the complement tandem-duplication system. Interesting connections are drawn between the former and the beta distribution common to population genetics, as well as between the latter system and signatures of random permutations.
我们研究随机字符串复制系统,称为Pólya字符串模型,由生物体基因组中的某些随机突变过程驱动。与先前研究字符串复制系统的组合容量或符号频率等外围特性的工作不同,这项工作为几个概率模型提供了精确的容量或边界。特别给出了随机串联复制系统和末端复制系统的精确容量,并对补体串联复制系统的容量进行了定界。前者与群体遗传学中常见的beta分布之间,以及后者与随机排列特征之间,都有有趣的联系。
{"title":"The capacity of some Pólya string models","authors":"Ohad Elishco, Farzad Farnoud, Moshe Schwartz, Jehoshua Bruck","doi":"10.1109/ISIT.2016.7541303","DOIUrl":"https://doi.org/10.1109/ISIT.2016.7541303","url":null,"abstract":"We study random string-duplication systems, called Pólya string models, motivated by certain random mutation processes in the genome of living organisms. Unlike previous works that study the combinatorial capacity of string-duplication systems, or peripheral properties such as symbol frequency, this work provides exact capacity or bounds on it, for several probabilistic models. In particular, we give the exact capacity of the random tandem-duplication system, and the end-duplication system, and bound the capacity of the complement tandem-duplication system. Interesting connections are drawn between the former and the beta distribution common to population genetics, as well as between the latter system and signatures of random permutations.","PeriodicalId":198767,"journal":{"name":"2016 IEEE International Symposium on Information Theory (ISIT)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128216865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
期刊
2016 IEEE International Symposium on Information Theory (ISIT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1