首页 > 最新文献

2016 IEEE International Symposium on Information Theory (ISIT)最新文献

英文 中文
Constructing valid convex hull inequalities for single parity-check codes over prime fields 构造素域上单个奇偶校验码的有效凸包不等式
Pub Date : 2016-07-10 DOI: 10.1109/ISIT.2016.7541637
E. Rosnes, Michael Helmling
In this work, we present an explicit construction of valid inequalities (using no auxiliary variables) for the convex hull of the so-called constant-weight embedding of a single parity-check (SPC) code over any prime field. The construction is based on classes of building blocks that are assembled to form the left-hand side of an inequality according to several rules. In the case of almost doubly-symmetric valid classes we prove that the resulting inequalities are all facet-defining, while we conjecture this to be true if and only if the class is valid and symmetric. Such sets of inequalities have not appeared in the literature before, have a strong theoretical interest, and can be used to develop an efficient (relaxed) adaptive linear programming decoder for general (non-SPC) linear codes over prime fields.
在这项工作中,我们给出了一个有效不等式的显式构造(不使用辅助变量),用于任何素数域上所谓的单个奇偶校验(SPC)码的恒权嵌入凸壳。这种构造是基于构建块的类别,这些构建块根据几个规则组装成不等式的左手边。在几乎双对称有效类的情况下,我们证明了所得到的不等式都是面定义的,同时我们推测当且仅当类是有效对称的。这样的不等式集在以前的文献中没有出现过,具有很强的理论兴趣,并且可以用来开发一个有效的(宽松的)自适应线性规划解码器,用于素域上的一般(非spc)线性码。
{"title":"Constructing valid convex hull inequalities for single parity-check codes over prime fields","authors":"E. Rosnes, Michael Helmling","doi":"10.1109/ISIT.2016.7541637","DOIUrl":"https://doi.org/10.1109/ISIT.2016.7541637","url":null,"abstract":"In this work, we present an explicit construction of valid inequalities (using no auxiliary variables) for the convex hull of the so-called constant-weight embedding of a single parity-check (SPC) code over any prime field. The construction is based on classes of building blocks that are assembled to form the left-hand side of an inequality according to several rules. In the case of almost doubly-symmetric valid classes we prove that the resulting inequalities are all facet-defining, while we conjecture this to be true if and only if the class is valid and symmetric. Such sets of inequalities have not appeared in the literature before, have a strong theoretical interest, and can be used to develop an efficient (relaxed) adaptive linear programming decoder for general (non-SPC) linear codes over prime fields.","PeriodicalId":198767,"journal":{"name":"2016 IEEE International Symposium on Information Theory (ISIT)","volume":"732 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133183688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Conveying data and State with feedback 用反馈传递数据和状态
Pub Date : 2016-07-10 DOI: 10.1109/ISIT.2016.7541504
S. Bross, A. Lapidoth
The Rate-and-State capacity of a state-dependent channel with a state-cognizant encoder is the highest possible rate of communication over the channel when the decoder-in addition to reliably decoding the data-must also reconstruct the state sequence with some required fidelity. Feedback from the channel output to the encoder is shown to increase this capacity even for channels that are memoryless with memoryless states. This capacity is calculated here for such channels with feedback when the state reconstruction fidelity is measured using a single-letter distortion function and the state sequence is revealed to the encoder in one of two different ways: strictly-causally or causally.
当解码器除了可靠地解码数据外,还必须以一定的保真度重建状态序列时,具有状态识别编码器的状态依赖信道的速率和状态容量是该信道上可能的最高通信速率。从通道输出到编码器的反馈显示,即使对于具有无记忆状态的无记忆通道,也可以增加该容量。当使用单字母失真函数测量状态重建保真度时,并且以两种不同的方式之一(严格因果关系或因果关系)向编码器显示状态序列时,这种容量在这里计算为带有反馈的通道。
{"title":"Conveying data and State with feedback","authors":"S. Bross, A. Lapidoth","doi":"10.1109/ISIT.2016.7541504","DOIUrl":"https://doi.org/10.1109/ISIT.2016.7541504","url":null,"abstract":"The Rate-and-State capacity of a state-dependent channel with a state-cognizant encoder is the highest possible rate of communication over the channel when the decoder-in addition to reliably decoding the data-must also reconstruct the state sequence with some required fidelity. Feedback from the channel output to the encoder is shown to increase this capacity even for channels that are memoryless with memoryless states. This capacity is calculated here for such channels with feedback when the state reconstruction fidelity is measured using a single-letter distortion function and the state sequence is revealed to the encoder in one of two different ways: strictly-causally or causally.","PeriodicalId":198767,"journal":{"name":"2016 IEEE International Symposium on Information Theory (ISIT)","volume":"134 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133242107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Lattice strategies for the ergodic fading dirty paper channel 遍历褪色脏纸通道的点阵策略
Pub Date : 2016-07-10 DOI: 10.1109/ISIT.2016.7541804
Ahmed Hindy, Aria Nosratinia
A modified version of Costa's dirty paper channel is studied, in which both the input signal and the state experience stationary and ergodic time-varying fading. The fading coefficients are assumed to be known exclusively at the receiver. An inner bound of the achievable rates using lattice codes is derived and compared to an outer bound of the capacity. For a wide range of fading distributions, the gap to capacity is within a constant value that does not depend on either the power of the input signal or the state. The results presented in this paper are applied to a class of ergodic fading broadcast channels with receive channel state information, where the achievable rate region is shown to be close to capacity under certain configurations.
研究了一种改进的Costa脏纸信道,其中输入信号和状态都经历平稳和遍历时变衰落。假设衰落系数在接收端是唯一已知的。导出了使用点阵码的可实现速率的内界,并与容量的外界进行了比较。对于大范围的衰落分布,与容量的差距在一个不依赖于输入信号的功率或状态的恒定值内。本文的结果应用于一类具有接收信道状态信息的遍历衰落广播信道,在一定的配置下,可达到的速率区域接近于容量。
{"title":"Lattice strategies for the ergodic fading dirty paper channel","authors":"Ahmed Hindy, Aria Nosratinia","doi":"10.1109/ISIT.2016.7541804","DOIUrl":"https://doi.org/10.1109/ISIT.2016.7541804","url":null,"abstract":"A modified version of Costa's dirty paper channel is studied, in which both the input signal and the state experience stationary and ergodic time-varying fading. The fading coefficients are assumed to be known exclusively at the receiver. An inner bound of the achievable rates using lattice codes is derived and compared to an outer bound of the capacity. For a wide range of fading distributions, the gap to capacity is within a constant value that does not depend on either the power of the input signal or the state. The results presented in this paper are applied to a class of ergodic fading broadcast channels with receive channel state information, where the achievable rate region is shown to be close to capacity under certain configurations.","PeriodicalId":198767,"journal":{"name":"2016 IEEE International Symposium on Information Theory (ISIT)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124108501","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
The weight consistency matrix framework for general non-binary LDPC code optimization: Applications in flash memories 通用非二进制LDPC代码优化的权重一致性矩阵框架:在闪存中的应用
Pub Date : 2016-07-10 DOI: 10.1109/ISIT.2016.7541791
Ahmed Hareedy, Chinmayi Lanka, Clayton Schoeny, L. Dolecek
Transmission channels underlying modern memory systems, e.g., Flash memories, possess a significant amount of asymmetry. While existing LDPC codes optimized for symmetric, AWGN-like channels are being actively considered for Flash applications, we demonstrate that, due to channel asymmetry, such approaches are fairly inadequate. We propose a new, general, combinatorial framework for the analysis and design of non-binary LDPC (NB-LDPC) codes for asymmetric channels. We introduce a refined definition of absorbing sets, which we call general absorbing sets (GASs), and an important subclass of GASs, which we refer to as general absorbing sets of type two (GASTs). Additionally, we study the combinatorial properties of GASTs. We then present the weight consistency matrix (WCM), which succinctly captures key properties in a GAST. Based on these new concepts, we then develop a general code optimization framework, and demonstrate its effectiveness on the realistic highly-asymmetric normal-Laplace mixture (NLM) Flash channel. Our optimized codes enjoy over one order (resp., half of an order) of magnitude performance gain in the uncorrectable BER (UBER) relative to the unoptimized codes (resp. the codes optimized for symmetric channels).
现代存储系统(例如,闪存)的传输通道具有大量的不对称性。虽然现有的LDPC代码优化对称,awgn类通道正在积极考虑Flash应用程序,我们证明,由于通道不对称,这种方法是相当不足的。我们提出了一种新的、通用的组合框架,用于分析和设计非对称信道的非二进制LDPC (NB-LDPC)码。我们引入了吸收集的一个精细化定义,我们称之为一般吸收集(GASs),以及吸收集的一个重要子类,我们称之为二类一般吸收集(gast)。此外,我们还研究了GASTs的组合特性。然后我们给出了权重一致性矩阵(WCM),它简洁地捕获了GAST中的关键属性。基于这些新概念,我们开发了一个通用的代码优化框架,并证明了它在现实的高度不对称正拉普拉斯混合(NLM) Flash信道上的有效性。我们的优化代码享受超过一个订单(响应)。在不可校正误码率(UBER)中,相对于未优化的代码(resp. 1),性能增加了半个数量级。为对称信道优化的代码)。
{"title":"The weight consistency matrix framework for general non-binary LDPC code optimization: Applications in flash memories","authors":"Ahmed Hareedy, Chinmayi Lanka, Clayton Schoeny, L. Dolecek","doi":"10.1109/ISIT.2016.7541791","DOIUrl":"https://doi.org/10.1109/ISIT.2016.7541791","url":null,"abstract":"Transmission channels underlying modern memory systems, e.g., Flash memories, possess a significant amount of asymmetry. While existing LDPC codes optimized for symmetric, AWGN-like channels are being actively considered for Flash applications, we demonstrate that, due to channel asymmetry, such approaches are fairly inadequate. We propose a new, general, combinatorial framework for the analysis and design of non-binary LDPC (NB-LDPC) codes for asymmetric channels. We introduce a refined definition of absorbing sets, which we call general absorbing sets (GASs), and an important subclass of GASs, which we refer to as general absorbing sets of type two (GASTs). Additionally, we study the combinatorial properties of GASTs. We then present the weight consistency matrix (WCM), which succinctly captures key properties in a GAST. Based on these new concepts, we then develop a general code optimization framework, and demonstrate its effectiveness on the realistic highly-asymmetric normal-Laplace mixture (NLM) Flash channel. Our optimized codes enjoy over one order (resp., half of an order) of magnitude performance gain in the uncorrectable BER (UBER) relative to the unoptimized codes (resp. the codes optimized for symmetric channels).","PeriodicalId":198767,"journal":{"name":"2016 IEEE International Symposium on Information Theory (ISIT)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114500407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Estimating the number of defectives with group testing 通过分组测试估计缺陷的数量
Pub Date : 2016-07-10 DOI: 10.1109/ISIT.2016.7541524
Moein Falahatgar, Ashkan Jafarpour, A. Orlitsky, Venkatadheeraj Pichapati, A. Suresh
Estimating the number of defective elements of a set has various biological applications including estimating the prevalence of a disease or disorder. Group testing has been shown to be more efficient than scrutinizing each element separately for defectiveness. In group testing, we query a subset of elements and the result of the query will be defective if the subset contains at least one defective element. We present an adaptive, randomized group-testing algorithm to estimate the number of defective elements with near-optimal number of queries. Our algorithm uses at most 2 log log d + O(1/δ2 log 1/ε) queries and estimates the number of defective elements d up to a multiplicative factor of 1 ± δ, with error probability ≤ ε. Also, we show an information-theoretic lower bound (1 - ε) log log d - 1 on the necessary number of queries any adaptive algorithm makes to estimate the number of defective elements for constant δ.
估计一组缺陷元素的数量有各种各样的生物学应用,包括估计疾病或失调的患病率。小组测试已被证明比单独检查每个元素的缺陷更有效。在组测试中,我们查询元素的子集,如果子集包含至少一个有缺陷的元素,那么查询的结果将是有缺陷的。我们提出了一种自适应的随机组测试算法,以接近最优的查询数量来估计缺陷元素的数量。我们的算法最多使用2 log log d + O(1/δ2 log 1/ε)查询,并估计缺陷元素的数量d达到1±δ的乘因子,误差概率≤ε。此外,我们还给出了一个信息理论下界(1 - ε) log log d - 1关于任何自适应算法为估计常数δ缺陷元素的数量而进行的必要查询次数的下界。
{"title":"Estimating the number of defectives with group testing","authors":"Moein Falahatgar, Ashkan Jafarpour, A. Orlitsky, Venkatadheeraj Pichapati, A. Suresh","doi":"10.1109/ISIT.2016.7541524","DOIUrl":"https://doi.org/10.1109/ISIT.2016.7541524","url":null,"abstract":"Estimating the number of defective elements of a set has various biological applications including estimating the prevalence of a disease or disorder. Group testing has been shown to be more efficient than scrutinizing each element separately for defectiveness. In group testing, we query a subset of elements and the result of the query will be defective if the subset contains at least one defective element. We present an adaptive, randomized group-testing algorithm to estimate the number of defective elements with near-optimal number of queries. Our algorithm uses at most 2 log log d + O(1/δ2 log 1/ε) queries and estimates the number of defective elements d up to a multiplicative factor of 1 ± δ, with error probability ≤ ε. Also, we show an information-theoretic lower bound (1 - ε) log log d - 1 on the necessary number of queries any adaptive algorithm makes to estimate the number of defective elements for constant δ.","PeriodicalId":198767,"journal":{"name":"2016 IEEE International Symposium on Information Theory (ISIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114956173","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
LDPC decoders with missing connections 丢失连接的LDPC解码器
Pub Date : 2016-07-10 DOI: 10.1109/ISIT.2016.7541564
Linjia Chang, Avhishek Chatterjee, L. Varshney
Due to process variation in nanoscale manufacturing, there may be permanently missing connections in information processing hardware. Due to timing errors in circuits, there may be missed messages in intra-chip communications, equivalent to transiently missing connections. In this work, we investigate the performance of message-passing LDPC decoders in the presence of missing connections. We prove concentration and convergence theorems that validate the use of density evolution performance analysis. Arbitrarily small error probability is not possible under miswiring, but we find suitably defined decoding thresholds for communication systems with binary erasure channels and peeling decoders, as well as binary symmetric channels and Gallager A decoders. We see that decoding is robust to missing connections, as decoding thresholds degrade smoothly.
由于纳米制造过程中的工艺变化,信息处理硬件中可能存在永久缺失的连接。由于电路的时序错误,在芯片内通信中可能会有丢失的消息,相当于短暂的丢失连接。在这项工作中,我们研究了在缺少连接的情况下消息传递LDPC解码器的性能。我们证明了集中和收敛定理,验证了密度演化性能分析的使用。在错误布线的情况下,任意小的错误概率是不可能的,但我们找到了合适的解码阈值,用于具有二进制擦除信道和剥离解码器的通信系统,以及二进制对称信道和Gallager A解码器。我们看到,解码对缺失连接是鲁棒的,因为解码阈值会平滑地降低。
{"title":"LDPC decoders with missing connections","authors":"Linjia Chang, Avhishek Chatterjee, L. Varshney","doi":"10.1109/ISIT.2016.7541564","DOIUrl":"https://doi.org/10.1109/ISIT.2016.7541564","url":null,"abstract":"Due to process variation in nanoscale manufacturing, there may be permanently missing connections in information processing hardware. Due to timing errors in circuits, there may be missed messages in intra-chip communications, equivalent to transiently missing connections. In this work, we investigate the performance of message-passing LDPC decoders in the presence of missing connections. We prove concentration and convergence theorems that validate the use of density evolution performance analysis. Arbitrarily small error probability is not possible under miswiring, but we find suitably defined decoding thresholds for communication systems with binary erasure channels and peeling decoders, as well as binary symmetric channels and Gallager A decoders. We see that decoding is robust to missing connections, as decoding thresholds degrade smoothly.","PeriodicalId":198767,"journal":{"name":"2016 IEEE International Symposium on Information Theory (ISIT)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123219903","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Secrecy in broadcast channel with combating helpers and interference channel with selfish users 打击帮助者的广播信道的保密性和自私自利者的干扰信道的保密性
Pub Date : 2016-07-10 DOI: 10.1109/ISIT.2016.7541738
Karim A. Banawan, S. Ulukus
We investigate the secure degrees of freedom (s.d.o.f.) of two new channel models: broadcast channel with combating helpers and interference channel with selfish users. In the first model, over a classical broadcast channel with confidential messages (BCCM), there are two helpers, each associated with one of the receivers. In the second model, over a classical interference channel with confidential messages (ICCM), there is a helper and users are selfish. The goal of introducing these channel models is to investigate various malicious interactions that arise in networks, including active adversaries. By casting each problem as an extensive-form game and applying recursive real interference alignment, we show that, for the first model, the combating intentions of the helpers are neutralized and the full s.d.o.f. is retained; for the second model, selfishness precludes secure communication and no s.d.o.f. is achieved.
我们研究了两种新的信道模型的安全自由度(s.d.o.f.):带有战斗助手的广播信道和带有自私用户的干扰信道。在第一个模型中,在具有机密消息(BCCM)的经典广播信道上,有两个助手,每个助手与一个接收者相关联。在第二个模型中,在经典的带有机密消息的干扰信道(ICCM)上,存在一个助手,用户是自私的。引入这些通道模型的目的是研究网络中出现的各种恶意交互,包括主动攻击者。通过将每个问题作为一个广泛形式的博弈并应用递归的实际干涉对齐,我们表明,对于第一个模型,助手的战斗意图被中和并且保留了完整的s.d.o.f.;对于第二个模型,自私排除了安全通信,并且没有实现S.D.O.F.。
{"title":"Secrecy in broadcast channel with combating helpers and interference channel with selfish users","authors":"Karim A. Banawan, S. Ulukus","doi":"10.1109/ISIT.2016.7541738","DOIUrl":"https://doi.org/10.1109/ISIT.2016.7541738","url":null,"abstract":"We investigate the secure degrees of freedom (s.d.o.f.) of two new channel models: broadcast channel with combating helpers and interference channel with selfish users. In the first model, over a classical broadcast channel with confidential messages (BCCM), there are two helpers, each associated with one of the receivers. In the second model, over a classical interference channel with confidential messages (ICCM), there is a helper and users are selfish. The goal of introducing these channel models is to investigate various malicious interactions that arise in networks, including active adversaries. By casting each problem as an extensive-form game and applying recursive real interference alignment, we show that, for the first model, the combating intentions of the helpers are neutralized and the full s.d.o.f. is retained; for the second model, selfishness precludes secure communication and no s.d.o.f. is achieved.","PeriodicalId":198767,"journal":{"name":"2016 IEEE International Symposium on Information Theory (ISIT)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123566442","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
On vectorial bent functions with Dillon-type exponents 关于狄龙型指数的向量弯曲函数
Pub Date : 2016-07-10 DOI: 10.1109/ISIT.2016.7541347
Lucien Lapierre, P. Lisoněk
We study vectorial bent functions with Dillon-type exponents. These functions have attracted attention because they are hyperbent whenever they are bent, and they achieve the highest possible algebraic degree among all bent functions on the same domain. In low dimensions we determine the simplest possible forms of such functions when they map to GF(4). We prove non-existence results for certain monomial and multinomial bent functions mapping to large codomains.
研究了具有狄龙指数的向量弯曲函数。这些函数因其在任何时候被弯曲都是超弯曲的,并且它们在同一域上的所有弯曲函数中达到可能的最高代数度而受到人们的关注。在低维情况下,当这些函数映射到GF(4)时,我们确定了它们的最简单可能形式。证明了映射到大上域的某些单项式和多项式弯曲函数的不存在性。
{"title":"On vectorial bent functions with Dillon-type exponents","authors":"Lucien Lapierre, P. Lisoněk","doi":"10.1109/ISIT.2016.7541347","DOIUrl":"https://doi.org/10.1109/ISIT.2016.7541347","url":null,"abstract":"We study vectorial bent functions with Dillon-type exponents. These functions have attracted attention because they are hyperbent whenever they are bent, and they achieve the highest possible algebraic degree among all bent functions on the same domain. In low dimensions we determine the simplest possible forms of such functions when they map to GF(4). We prove non-existence results for certain monomial and multinomial bent functions mapping to large codomains.","PeriodicalId":198767,"journal":{"name":"2016 IEEE International Symposium on Information Theory (ISIT)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121936449","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Operator algebra approach to quantum capacities 量子容量的算子代数方法
Pub Date : 2016-07-10 DOI: 10.1109/ISIT.2016.7541588
Li Gao, M. Junge, Nicholas Laracuente
Using a suitable algebraic setup, we find new estimates of the quantum capacity and the potential quantum capacity for non-degradable channels obtained by random unitaries associated with a finite group. This approach can be generalized to quantum groups and uses new tools from operator algebras and interpolation of Rényi-type entropies. As an application, we obtain new estimates for the depolarizing channel in high dimension.
利用一种合适的代数设置,我们得到了由有限群相关的随机酉所得到的不可降解通道的量子容量和潜在量子容量的新估计。这种方法可以推广到量子群,并使用了算子代数和r型熵插值的新工具。作为应用,我们得到了高维去极化信道的新估计。
{"title":"Operator algebra approach to quantum capacities","authors":"Li Gao, M. Junge, Nicholas Laracuente","doi":"10.1109/ISIT.2016.7541588","DOIUrl":"https://doi.org/10.1109/ISIT.2016.7541588","url":null,"abstract":"Using a suitable algebraic setup, we find new estimates of the quantum capacity and the potential quantum capacity for non-degradable channels obtained by random unitaries associated with a finite group. This approach can be generalized to quantum groups and uses new tools from operator algebras and interpolation of Rényi-type entropies. As an application, we obtain new estimates for the depolarizing channel in high dimension.","PeriodicalId":198767,"journal":{"name":"2016 IEEE International Symposium on Information Theory (ISIT)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122122650","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the duplication distance of binary strings 关于二进制字符串的重复距离
Pub Date : 2016-07-10 DOI: 10.1109/ISIT.2016.7541301
N. Alon, Jehoshua Bruck, Farzad Farnoud, Siddhartha Jain
We study the tandem duplication distance between binary sequences and their roots. This distance is motivated by genomic tandem duplication mutations and counts the smallest number of tandem duplication events that are required to take one sequence to another. We consider both exact and approximate tandem duplications, the latter leading to a combined duplication/Hamming distance. The paper focuses on the maximum value of the duplication distance to the root. For exact duplication, denoting the maximum distance to the root of a sequence of length n by f(n), we prove that f(n) = Θ(n). For the case of approximate duplication, where a β-fraction of symbols may be duplicated incorrectly, we show using the Plotkin bound that the maximum distance has a sharp transition from linear to logarithmic in n at β = 1/2.
研究了二值序列与其根之间的串联重复距离。这个距离是由基因组串联重复突变引起的,它计算了从一个序列到另一个序列所需的串联重复事件的最小数量。我们考虑精确和近似串联复制,后者导致组合复制/汉明距离。本文主要研究到根的复制距离的最大值。对于精确复制,表示到长度为n × f(n)的序列根的最大距离,我们证明了f(n) = Θ(n)。对于近似重复的情况,其中β-分数的符号可能被不正确地复制,我们使用Plotkin界表明,在β = 1/2时,最大距离在n上有一个从线性到对数的急剧过渡。
{"title":"On the duplication distance of binary strings","authors":"N. Alon, Jehoshua Bruck, Farzad Farnoud, Siddhartha Jain","doi":"10.1109/ISIT.2016.7541301","DOIUrl":"https://doi.org/10.1109/ISIT.2016.7541301","url":null,"abstract":"We study the tandem duplication distance between binary sequences and their roots. This distance is motivated by genomic tandem duplication mutations and counts the smallest number of tandem duplication events that are required to take one sequence to another. We consider both exact and approximate tandem duplications, the latter leading to a combined duplication/Hamming distance. The paper focuses on the maximum value of the duplication distance to the root. For exact duplication, denoting the maximum distance to the root of a sequence of length n by f(n), we prove that f(n) = Θ(n). For the case of approximate duplication, where a β-fraction of symbols may be duplicated incorrectly, we show using the Plotkin bound that the maximum distance has a sharp transition from linear to logarithmic in n at β = 1/2.","PeriodicalId":198767,"journal":{"name":"2016 IEEE International Symposium on Information Theory (ISIT)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124510373","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2016 IEEE International Symposium on Information Theory (ISIT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1