Pub Date : 2004-06-27DOI: 10.1109/ISIT.2004.1365279
S. Sanayei, Aria Nosratinia
In this work we investigate the asymptotic behavior of the capacity of transmit antenna selection, in the limit of large number of transmit antennas, under both low and high SNR regimes. Antenna selection provides a low-cost low complexity solution for MIMO systems.
{"title":"Asymptotic capacity analysis of transmit antenna selection","authors":"S. Sanayei, Aria Nosratinia","doi":"10.1109/ISIT.2004.1365279","DOIUrl":"https://doi.org/10.1109/ISIT.2004.1365279","url":null,"abstract":"In this work we investigate the asymptotic behavior of the capacity of transmit antenna selection, in the limit of large number of transmit antennas, under both low and high SNR regimes. Antenna selection provides a low-cost low complexity solution for MIMO systems.","PeriodicalId":269907,"journal":{"name":"International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128424914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2004-06-27DOI: 10.1109/ISIT.2004.1365322
G. Barriac, Upamanyu Madhow
This paper focuses on optimizing the capacity of a cellular "downlink" in which the base station (BS) is equipped with multiple antennas, while the mobile has a single antenna. The BS has access to both the first and second order statistics of the channel, obtained from mean feedback and covariance feedback, respectively. Our results apply to wideband orthogonal frequency division multiplexing (OFDM) systems, where accurate covariance feedback is obtained without overhead by averaging uplink measurements. Mean feedback is obtained from uplink measurements using reciprocity for time division duplex (TDD) systems, and would require explicit feedback for frequency division duplex (FDD) systems. Since mean feedback degrades rapidly with feedback delay for mobile channels, and requires feedback overhead for FDD systems, our purpose is to quantify the tradeoffs in using covariance feedback alone versus using both covariance and mean feedback.
{"title":"Space-time precoding with mean and covariance feedback: implications for wideband systems","authors":"G. Barriac, Upamanyu Madhow","doi":"10.1109/ISIT.2004.1365322","DOIUrl":"https://doi.org/10.1109/ISIT.2004.1365322","url":null,"abstract":"This paper focuses on optimizing the capacity of a cellular \"downlink\" in which the base station (BS) is equipped with multiple antennas, while the mobile has a single antenna. The BS has access to both the first and second order statistics of the channel, obtained from mean feedback and covariance feedback, respectively. Our results apply to wideband orthogonal frequency division multiplexing (OFDM) systems, where accurate covariance feedback is obtained without overhead by averaging uplink measurements. Mean feedback is obtained from uplink measurements using reciprocity for time division duplex (TDD) systems, and would require explicit feedback for frequency division duplex (FDD) systems. Since mean feedback degrades rapidly with feedback delay for mobile channels, and requires feedback overhead for FDD systems, our purpose is to quantify the tradeoffs in using covariance feedback alone versus using both covariance and mean feedback.","PeriodicalId":269907,"journal":{"name":"International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings.","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128447459","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2004-06-27DOI: 10.1109/ISIT.2004.1365297
J. Weber, M. Fossorier
The chase decoding algorithms are reliability-based algorithms achieving bounded-distance (BD) decoding for any binary linear code of Hamming distance d. The least complex version of the original chase algorithms ("Chase-3") uses O(d) trials of a conventional binary decoder. In this paper, we propose a class of Chase-like BD decoding algorithms of lower complexity than the original Chase-3 algorithm. In particular, the least complex member of this class requires only O(d/sup 2/3/) trials.
{"title":"Limited-trial chase-like bounded-distance decoding","authors":"J. Weber, M. Fossorier","doi":"10.1109/ISIT.2004.1365297","DOIUrl":"https://doi.org/10.1109/ISIT.2004.1365297","url":null,"abstract":"The chase decoding algorithms are reliability-based algorithms achieving bounded-distance (BD) decoding for any binary linear code of Hamming distance d. The least complex version of the original chase algorithms (\"Chase-3\") uses O(d) trials of a conventional binary decoder. In this paper, we propose a class of Chase-like BD decoding algorithms of lower complexity than the original Chase-3 algorithm. In particular, the least complex member of this class requires only O(d/sup 2/3/) trials.","PeriodicalId":269907,"journal":{"name":"International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings.","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128521727","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2004-06-27DOI: 10.1109/ISIT.2004.1365464
Ilju Na, D. Neuhoff
The performance of frog-in-the box (FIB) code index assignments is numerically investigated when maximum likelihood (ML) decoding is used in place of optimal MMSE decoding. Specifically, the reproduction levels are chosen to be those that would be used for a noiseless channel, and the decoder simply maps the channel output to a level whose index codeword is closest to the channel output.
{"title":"Frog-in-the-box index codes with maximum likelihood decoding for robust scalar quantization","authors":"Ilju Na, D. Neuhoff","doi":"10.1109/ISIT.2004.1365464","DOIUrl":"https://doi.org/10.1109/ISIT.2004.1365464","url":null,"abstract":"The performance of frog-in-the box (FIB) code index assignments is numerically investigated when maximum likelihood (ML) decoding is used in place of optimal MMSE decoding. Specifically, the reproduction levels are chosen to be those that would be used for a noiseless channel, and the decoder simply maps the channel output to a level whose index codeword is closest to the channel output.","PeriodicalId":269907,"journal":{"name":"International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings.","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128544117","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2004-06-27DOI: 10.1109/ISIT.2004.1365472
A. Kapur, M. Varanasi
The max-min fairness idea is applied to optimize the CDMA capacity region. For any given signal set, a fair rate-allocation algorithm is specified. The notion of fair capacity is introduced and a signal design algorithm is proposed that produces signal sets with near-maximum fair capacity under (a) optimum decoding and (b) suboptimal decoding based on MMSE filtering and successive decoding, when there is sufficient bandwidth.
{"title":"A max-min fair approach to optimize the CDMA capacity region","authors":"A. Kapur, M. Varanasi","doi":"10.1109/ISIT.2004.1365472","DOIUrl":"https://doi.org/10.1109/ISIT.2004.1365472","url":null,"abstract":"The max-min fairness idea is applied to optimize the CDMA capacity region. For any given signal set, a fair rate-allocation algorithm is specified. The notion of fair capacity is introduced and a signal design algorithm is proposed that produces signal sets with near-maximum fair capacity under (a) optimum decoding and (b) suboptimal decoding based on MMSE filtering and successive decoding, when there is sufficient bandwidth.","PeriodicalId":269907,"journal":{"name":"International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings.","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128670307","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2004-06-27DOI: 10.1109/ISIT.2004.1365160
Y. Xin, I. Fair
This paper investigate the extension of Golay complementary sequences to a larger family of sequences which we call multiple L-shift complementary sequences ( L 2 I ). It is well-known that the peak-to-average power ratio (PAPR) value of any Golay complementary sequence is less than or equal to 2. We show that the PAPR of each multiple L-shift complementary sequence is less than or equal to 2L. Other properties of multiple L-shift complementary sequences are also discussed.
{"title":"Multiple-shift complementary sequences and their peak-to-average power ratio values","authors":"Y. Xin, I. Fair","doi":"10.1109/ISIT.2004.1365160","DOIUrl":"https://doi.org/10.1109/ISIT.2004.1365160","url":null,"abstract":"This paper investigate the extension of Golay complementary sequences to a larger family of sequences which we call multiple L-shift complementary sequences ( L 2 I ). It is well-known that the peak-to-average power ratio (PAPR) value of any Golay complementary sequence is less than or equal to 2. We show that the PAPR of each multiple L-shift complementary sequence is less than or equal to 2L. Other properties of multiple L-shift complementary sequences are also discussed.","PeriodicalId":269907,"journal":{"name":"International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129337688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2004-06-27DOI: 10.1109/ISIT.2004.1365199
S. Forchhammer
A method for designing quasistationary probability measures for two-dimensional (2-D) constraints is presented. This measure is derived from a modified bit-stuff coding scheme and it gives the capacity of the coding scheme. This provides a constructive lower bound on the capacity of the 2-D constraint. The main examples are checkerboard codes with binary elements. The capacity for one instance of the modified bit-stuffing for the 2-D runlength-limited RLL(2,/spl infin/) constraint is calculated to be 0.4414 bits/symbol. For the constraint given by a minimum (1-norm) distance of 3 between 1s a code with capacity 0.3497 bits/symbol is given.
{"title":"Analysis of bit-stuffing codes and lower bounds on capacity for 2-D constrained arrays using quasistationary measures","authors":"S. Forchhammer","doi":"10.1109/ISIT.2004.1365199","DOIUrl":"https://doi.org/10.1109/ISIT.2004.1365199","url":null,"abstract":"A method for designing quasistationary probability measures for two-dimensional (2-D) constraints is presented. This measure is derived from a modified bit-stuff coding scheme and it gives the capacity of the coding scheme. This provides a constructive lower bound on the capacity of the 2-D constraint. The main examples are checkerboard codes with binary elements. The capacity for one instance of the modified bit-stuffing for the 2-D runlength-limited RLL(2,/spl infin/) constraint is calculated to be 0.4414 bits/symbol. For the constraint given by a minimum (1-norm) distance of 3 between 1s a code with capacity 0.3497 bits/symbol is given.","PeriodicalId":269907,"journal":{"name":"International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings.","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130028758","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2004-06-27DOI: 10.1109/ISIT.2004.1365119
C. Florens, M. Sharif, R. McEliece
This paper presents the data collection function in sensory networks. Specifically we derive relationships between data collection time and transmission range, data packet size and channel noise in the simple line scenario. To develop intuition these relationships are studied in the limit case where the number of sensor nodes becomes large.
{"title":"Delay issues in linear sensory networks","authors":"C. Florens, M. Sharif, R. McEliece","doi":"10.1109/ISIT.2004.1365119","DOIUrl":"https://doi.org/10.1109/ISIT.2004.1365119","url":null,"abstract":"This paper presents the data collection function in sensory networks. Specifically we derive relationships between data collection time and transmission range, data packet size and channel noise in the simple line scenario. To develop intuition these relationships are studied in the limit case where the number of sensor nodes becomes large.","PeriodicalId":269907,"journal":{"name":"International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130057861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2004-06-27DOI: 10.1109/ISIT.2004.1365597
T. Linder, R. Zamir
In causal source coding, the reconstruction is restricted to be a function of the present and past source samples, while the variable-length code stream may be noncausal. Neuhoff and Gilbert [1982] showed that for memoryless sources, optimum performance among all causal lossy source codes is achieved by time-sharing at most two memoryless codes (scalar quantizers) followed by entropy coding. We extend this result to causal coding of individual sequences in the limit of small distortion. The optimum performance of finite-memory variable-rate causal codes in this setting is characterized by a deterministic analogue of differential entropy, which we call "Lempel-Ziv differential entropy." As a by-product, we also provide an individual-sequence version of the Shannon lower bound to the rate-distortion function.
{"title":"Causal coding of individual sequences and the Lempel-Ziv differential entropy","authors":"T. Linder, R. Zamir","doi":"10.1109/ISIT.2004.1365597","DOIUrl":"https://doi.org/10.1109/ISIT.2004.1365597","url":null,"abstract":"In causal source coding, the reconstruction is restricted to be a function of the present and past source samples, while the variable-length code stream may be noncausal. Neuhoff and Gilbert [1982] showed that for memoryless sources, optimum performance among all causal lossy source codes is achieved by time-sharing at most two memoryless codes (scalar quantizers) followed by entropy coding. We extend this result to causal coding of individual sequences in the limit of small distortion. The optimum performance of finite-memory variable-rate causal codes in this setting is characterized by a deterministic analogue of differential entropy, which we call \"Lempel-Ziv differential entropy.\" As a by-product, we also provide an individual-sequence version of the Shannon lower bound to the rate-distortion function.","PeriodicalId":269907,"journal":{"name":"International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131059585","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2004-06-27DOI: 10.1109/ISIT.2004.1365556
S. Vijayakumaran, Y. Levinbook, T. Wong
The problem of estimating the location and time of origin of an instantaneous source of a particular gas using a simple sensor network is investigated in this paper. Here, the gas spreads by diffusion and the sensors make a binary decision on the existence of the gas by measuring its concentration in their immediate vicinity. The inability of the sensors to go beyond a binary resolution of the concentration justifies their classification as dumb. In this paper, it is restricted to the one-dimensional case where the sensors form a linear array. The analysis of the Cramer-Rao bound (CRB) to study the limits of estimation performance is numerically calculated. Based on the number of gas molecules the Poisson distribution by a Gaussian distribution with mean and variance is approximated.
{"title":"On diffusive source localization using dumb sensors","authors":"S. Vijayakumaran, Y. Levinbook, T. Wong","doi":"10.1109/ISIT.2004.1365556","DOIUrl":"https://doi.org/10.1109/ISIT.2004.1365556","url":null,"abstract":"The problem of estimating the location and time of origin of an instantaneous source of a particular gas using a simple sensor network is investigated in this paper. Here, the gas spreads by diffusion and the sensors make a binary decision on the existence of the gas by measuring its concentration in their immediate vicinity. The inability of the sensors to go beyond a binary resolution of the concentration justifies their classification as dumb. In this paper, it is restricted to the one-dimensional case where the sensors form a linear array. The analysis of the Cramer-Rao bound (CRB) to study the limits of estimation performance is numerically calculated. Based on the number of gas molecules the Poisson distribution by a Gaussian distribution with mean and variance is approximated.","PeriodicalId":269907,"journal":{"name":"International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings.","volume":"174 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131885301","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}