首页 > 最新文献

2015 IEEE International Symposium on Information Theory (ISIT)最新文献

英文 中文
Detection of graph structures via communications over a multiaccess Boolean channel 通过多址布尔信道通信的图结构检测
Pub Date : 2015-06-14 DOI: 10.1109/ISIT.2015.7282917
Shuhang Wu, Shuangqing Wei, Yue Wang, R. Vaidyanathan, Jian Yuan, Xiqin Wang
In this paper, we propose a novel model to study the efficiency of detecting latent connection relationships, represented by a given set of graphs, among N users. A subset of active nodes transmit following a common codebook over a multiple access Boolean channel. To maximize the error exponent of the structure detection, we formulate an optimization problem whose objective is to max-minimize the pairwise Chernoff information, and the constraint is a probability simplex due to the users' multiple dependency relationships, which are further shown to have close relationship to the internal connectivity of graphs. Case studies are provided to show certain inherent properties of the optimal solution. In addition, we present a particular case with two equally weighted complementary Paley graphs of prime square order, whose optimal solution for the codebook is proved and the resulting exponent is shown to be O(1/N). The case study demonstrates how the fundamental graph discrepancy property affects the solution to the problem.
在本文中,我们提出了一个新的模型来研究N个用户中潜在连接关系的检测效率,该关系由给定的一组图表示。活动节点的子集在一个多址布尔信道上跟随一个公共码本进行传输。为了使结构检测的误差指数最大化,我们提出了一个优化问题,其目标是最大-最小成对Chernoff信息,并且由于用户的多重依赖关系,约束是一个概率单纯形,进一步证明了这种依赖关系与图的内部连通性密切相关。通过实例分析,说明了最优解的某些固有性质。此外,我们还给出了具有两个等权互补的素数平方阶Paley图的特殊情况,证明了其码本的最优解,并证明了其指数为O(1/N)。通过实例分析,说明了基本图差性如何影响问题的求解。
{"title":"Detection of graph structures via communications over a multiaccess Boolean channel","authors":"Shuhang Wu, Shuangqing Wei, Yue Wang, R. Vaidyanathan, Jian Yuan, Xiqin Wang","doi":"10.1109/ISIT.2015.7282917","DOIUrl":"https://doi.org/10.1109/ISIT.2015.7282917","url":null,"abstract":"In this paper, we propose a novel model to study the efficiency of detecting latent connection relationships, represented by a given set of graphs, among N users. A subset of active nodes transmit following a common codebook over a multiple access Boolean channel. To maximize the error exponent of the structure detection, we formulate an optimization problem whose objective is to max-minimize the pairwise Chernoff information, and the constraint is a probability simplex due to the users' multiple dependency relationships, which are further shown to have close relationship to the internal connectivity of graphs. Case studies are provided to show certain inherent properties of the optimal solution. In addition, we present a particular case with two equally weighted complementary Paley graphs of prime square order, whose optimal solution for the codebook is proved and the resulting exponent is shown to be O(1/N). The case study demonstrates how the fundamental graph discrepancy property affects the solution to the problem.","PeriodicalId":272313,"journal":{"name":"2015 IEEE International Symposium on Information Theory (ISIT)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122935338","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Secrecy for MISO broadcast channels with heterogeneous CSIT 具有异构CSIT的MISO广播信道的保密性
Pub Date : 2015-06-14 DOI: 10.1109/ISIT.2015.7282799
P. Mukherjee, R. Tandon, S. Ulukus
We consider the two-user multiple-input single-output (MISO) broadcast channel with confidential messages (BCCM), in which the nature of channel state information at the transmitter (CSIT) from each user can be of the form P, D and N, corresponding to perfect and instantaneous, completely delayed, and no CSIT, respectively. We focus on the cases with heterogeneous CSIT from the users, that is, the states PD, PN and DN. The main contribution of this paper is to establish the exact secure degrees of freedom (s.d.o.f.) regions of the MISO BCCM in all of these three heterogeneous states. The results highlight the impact of availability of CSIT on the s.d.o.f. region.
我们考虑双用户多输入单输出(MISO)保密消息广播信道(BCCM),其中每个用户在发射机(CSIT)的信道状态信息的性质可以分别为P, D和N,分别对应于完美和瞬时,完全延迟和无CSIT。我们重点研究来自用户的异构CSIT情况,即PD、PN和DN状态。本文的主要贡献是建立了MISO BCCM在所有这三种异构状态下的精确安全自由度(s.d.o.f.)区域。结果突出了CSIT的可用性对s.d.o.f.地区的影响。
{"title":"Secrecy for MISO broadcast channels with heterogeneous CSIT","authors":"P. Mukherjee, R. Tandon, S. Ulukus","doi":"10.1109/ISIT.2015.7282799","DOIUrl":"https://doi.org/10.1109/ISIT.2015.7282799","url":null,"abstract":"We consider the two-user multiple-input single-output (MISO) broadcast channel with confidential messages (BCCM), in which the nature of channel state information at the transmitter (CSIT) from each user can be of the form P, D and N, corresponding to perfect and instantaneous, completely delayed, and no CSIT, respectively. We focus on the cases with heterogeneous CSIT from the users, that is, the states PD, PN and DN. The main contribution of this paper is to establish the exact secure degrees of freedom (s.d.o.f.) regions of the MISO BCCM in all of these three heterogeneous states. The results highlight the impact of availability of CSIT on the s.d.o.f. region.","PeriodicalId":272313,"journal":{"name":"2015 IEEE International Symposium on Information Theory (ISIT)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122495777","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Collision scheduling for cellular networks 蜂窝网络的碰撞调度
Pub Date : 2015-06-14 DOI: 10.1109/ISIT.2015.7282689
Wenbo He, Chen Feng, Corina I. Ionita, B. Nazer
Consider a cellular network composed of several base stations with overlapping coverage areas. Conventional scheduling algorithms ensure that each base station hears only a single user over each orthogonal sub-channel, i.e., collisions are avoided. Recent work on compute-and-forward has demonstrated that it is possible for a receiver to decode a linear combination of interfering codewords. We examine how the adoption of the compute-and-forward technique affects the scheduling problem for cellular networks. Specifically, instead of avoiding collisions, the base stations can schedule collisions to obtain a set of linear combinations that can be solved for the original messages. For the special case of two base stations, we propose a simple scheduling algorithm that finds the minimal number of sub-channels needed for each user to successfully communicate one packet. For the general case, we formulate an integer program that can be solved using dynamic programming with pseudo-polynomial complexity with respect to the number of users.
考虑一个由多个覆盖区域重叠的基站组成的蜂窝网络。传统的调度算法确保每个基站在每个正交子信道上只接收到一个用户,即避免了冲突。最近的研究表明,接收器可以解码干扰码字的线性组合。我们研究了采用计算转发技术如何影响蜂窝网络的调度问题。具体来说,基站可以调度冲突,而不是避免冲突,以获得一组可以求解原始消息的线性组合。对于两个基站的特殊情况,我们提出了一种简单的调度算法,该算法可以找到每个用户成功通信一个数据包所需的最小子信道数量。对于一般情况,我们构造了一个整数规划,该规划可以用相对于用户数量的伪多项式复杂度的动态规划来求解。
{"title":"Collision scheduling for cellular networks","authors":"Wenbo He, Chen Feng, Corina I. Ionita, B. Nazer","doi":"10.1109/ISIT.2015.7282689","DOIUrl":"https://doi.org/10.1109/ISIT.2015.7282689","url":null,"abstract":"Consider a cellular network composed of several base stations with overlapping coverage areas. Conventional scheduling algorithms ensure that each base station hears only a single user over each orthogonal sub-channel, i.e., collisions are avoided. Recent work on compute-and-forward has demonstrated that it is possible for a receiver to decode a linear combination of interfering codewords. We examine how the adoption of the compute-and-forward technique affects the scheduling problem for cellular networks. Specifically, instead of avoiding collisions, the base stations can schedule collisions to obtain a set of linear combinations that can be solved for the original messages. For the special case of two base stations, we propose a simple scheduling algorithm that finds the minimal number of sub-channels needed for each user to successfully communicate one packet. For the general case, we formulate an integer program that can be solved using dynamic programming with pseudo-polynomial complexity with respect to the number of users.","PeriodicalId":272313,"journal":{"name":"2015 IEEE International Symposium on Information Theory (ISIT)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122898418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
LDPC code design for binary-input binary-output Z interference channels 二输入二输出Z干扰信道的LDPC码设计
Pub Date : 2015-06-14 DOI: 10.1109/ISIT.2015.7282622
S. Sharifi, A. Tanc, T. Duman
In this paper, we explore code optimization for two-user discrete memoryless interference channels (DMICs) wherein the inputs and outputs of the channel are from a finite alphabet. For encoding, we employ irregular low-density parity-check (LDPC) codes combined with non-linear trellis codes (NLTCs) to satisfy the desired distribution of zeros and ones in the transmitted codewords. At the receiver sides, we adopt BCJR algorithm based decoders to compute the symbol-by-symbol log-likelihood ratios (LLRs) of LDPC coded bits to be fed to message passing decoders. As a specific example, we consider the binary-input binary-output Z interference channel (BIBO ZIC) for which the transmitted and received signals are binary and one of the receivers is interference free. For a specific example of a BIBO ZIC, we examine the Han-Kobayashi inner bound on the achievable rate pairs and show that with a simple scheme of sending the messages as private one can achieve the sum-capacity of the channel. We also perform code optimization and demonstrate that the jointly optimized codes outperform the optimal single user codes with time sharing.
在本文中,我们探讨了两用户离散无记忆干扰信道(dmic)的代码优化,其中信道的输入和输出来自有限字母。在编码方面,我们采用了不规则低密度奇偶校验码(LDPC)和非线性栅格码(NLTCs)相结合的编码方式来满足传输码字中0和1的期望分布。在接收端,我们采用基于BCJR算法的解码器来计算LDPC编码比特的逐符号对数似然比(LLRs),以馈送给消息传递解码器。作为一个具体的例子,我们考虑二进制输入二进制输出的Z干扰信道(BIBO ZIC),其中发送和接收的信号是二进制的,其中一个接收器是无干扰的。对于BIBO ZIC的一个具体示例,我们研究了可实现速率对上的Han-Kobayashi内界,并表明通过将消息作为私有发送的简单方案可以实现信道的和容量。我们还进行了代码优化,并证明了联合优化的代码优于具有时间共享的最佳单用户代码。
{"title":"LDPC code design for binary-input binary-output Z interference channels","authors":"S. Sharifi, A. Tanc, T. Duman","doi":"10.1109/ISIT.2015.7282622","DOIUrl":"https://doi.org/10.1109/ISIT.2015.7282622","url":null,"abstract":"In this paper, we explore code optimization for two-user discrete memoryless interference channels (DMICs) wherein the inputs and outputs of the channel are from a finite alphabet. For encoding, we employ irregular low-density parity-check (LDPC) codes combined with non-linear trellis codes (NLTCs) to satisfy the desired distribution of zeros and ones in the transmitted codewords. At the receiver sides, we adopt BCJR algorithm based decoders to compute the symbol-by-symbol log-likelihood ratios (LLRs) of LDPC coded bits to be fed to message passing decoders. As a specific example, we consider the binary-input binary-output Z interference channel (BIBO ZIC) for which the transmitted and received signals are binary and one of the receivers is interference free. For a specific example of a BIBO ZIC, we examine the Han-Kobayashi inner bound on the achievable rate pairs and show that with a simple scheme of sending the messages as private one can achieve the sum-capacity of the channel. We also perform code optimization and demonstrate that the jointly optimized codes outperform the optimal single user codes with time sharing.","PeriodicalId":272313,"journal":{"name":"2015 IEEE International Symposium on Information Theory (ISIT)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123004535","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Maximum Likelihood Estimation of information measures 信息测度的最大似然估计
Pub Date : 2015-06-14 DOI: 10.1109/ISIT.2015.7282573
Jiantao Jiao, K. Venkat, Yanjun Han, T. Weissman
The Maximum Likelihood Estimator (MLE) is widely used in estimating information measures, and involves “plugging-in” the empirical distribution of the data to estimate a given functional of the unknown distribution. In this work we propose a general framework and procedure to analyze the nonasymptotic performance of the MLE in estimating functionals of discrete distributions, under the worst-case mean squared error criterion. We show that existing theory is insufficient for analyzing the bias of the MLE, and propose to apply the theory of approximation using positive linear operators to study this bias. The variance is controlled using the well-known tools from the literature on concentration inequalities. Our techniques completely characterize the maximum L2 risk incurred by the MLE in estimating the Shannon entropy H(P) = Σi=1S -piln pi, and Fα(P) = Σi=1Spiα up to a multiplicative constant. As a corollary, for Shannon entropy estimation, we show that it is necessary and sufficient to have n ≪ S observations for the MLE to be consistent, where S represents the support size. In addition, we obtain that it is necessary and sufficient to consider n ≪ S1/α samples for the MLE to consistently estimate Fα(P); 0 <;α <; 1. The minimax rate-optimal estimators for both problems require S/ln S and S1/α / ln S samples, which implies that the MLE is strictly sub-optimal. When 1 <; α <; 3/2, we show that the maximum L2 rate of convergence for the MLE is n-2(α-1) for infinite support size, while the minimax L2 rate is (n ln n)-2(α-1). When α ≥ 3/2, the MLE achieves the minimax optimal L2 convergence rate n-1 regardless of the support size.
极大似然估计(MLE)广泛用于估计信息测度,它涉及“插入”数据的经验分布来估计未知分布的给定函数。在这项工作中,我们提出了一个一般的框架和程序来分析在最坏情况均方误差准则下估计离散分布函数的最大似然估计的非渐近性能。我们证明了现有的理论不足以分析最大似然估计的偏差,并提出了使用正线性算子的近似理论来研究这种偏差。方差是用集中不平等文献中著名的工具来控制的。我们的技术完全表征了在估计香农熵H(P) = Σi=1S -piln pi和Fα(P) = Σi=1Spiα直至相乘常数时MLE所引起的最大L2风险。作为推论,对于香农熵估计,我们表明有n≪S观测值才能使MLE保持一致,其中S表示支撑尺寸。此外,我们发现考虑n≪S1/α样品对于MLE一致地估计Fα(P)是必要和充分的;0 1/α / ln S样本,这意味着MLE是严格次优的。当支持尺寸为无限时,最大似然函数的收敛速率为n-2(α-1),最小最大似然函数的收敛速率为(n ln n)-2(α-1)。当α≥3/2时,无论支持大小如何,MLE都能达到最小最大最优L2收敛速率n-1。
{"title":"Maximum Likelihood Estimation of information measures","authors":"Jiantao Jiao, K. Venkat, Yanjun Han, T. Weissman","doi":"10.1109/ISIT.2015.7282573","DOIUrl":"https://doi.org/10.1109/ISIT.2015.7282573","url":null,"abstract":"The Maximum Likelihood Estimator (MLE) is widely used in estimating information measures, and involves “plugging-in” the empirical distribution of the data to estimate a given functional of the unknown distribution. In this work we propose a general framework and procedure to analyze the nonasymptotic performance of the MLE in estimating functionals of discrete distributions, under the worst-case mean squared error criterion. We show that existing theory is insufficient for analyzing the bias of the MLE, and propose to apply the theory of approximation using positive linear operators to study this bias. The variance is controlled using the well-known tools from the literature on concentration inequalities. Our techniques completely characterize the maximum L<sub>2</sub> risk incurred by the MLE in estimating the Shannon entropy H(P) = Σ<sub>i=1</sub><sup>S</sup> -p<sub>i</sub>ln p<sub>i</sub>, and F<sub>α</sub>(P) = Σ<sub>i=1</sub><sup>S</sup>p<sub>i</sub><sup>α</sup> up to a multiplicative constant. As a corollary, for Shannon entropy estimation, we show that it is necessary and sufficient to have n ≪ S observations for the MLE to be consistent, where S represents the support size. In addition, we obtain that it is necessary and sufficient to consider n ≪ S<sup>1/α</sup> samples for the MLE to consistently estimate F<sub>α</sub>(P); 0 <;α <; 1. The minimax rate-optimal estimators for both problems require S/ln S and S<sup>1/α</sup> / ln S samples, which implies that the MLE is strictly sub-optimal. When 1 <; α <; 3/2, we show that the maximum L<sub>2</sub> rate of convergence for the MLE is n<sup>-2(α-1)</sup> for infinite support size, while the minimax L<sub>2</sub> rate is (n ln n)<sup>-2(α-1)</sup>. When α ≥ 3/2, the MLE achieves the minimax optimal L<sub>2</sub> convergence rate n<sup>-1</sup> regardless of the support size.","PeriodicalId":272313,"journal":{"name":"2015 IEEE International Symposium on Information Theory (ISIT)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114297006","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
On involutions of finite fields 关于有限域的对合
Pub Date : 2015-06-14 DOI: 10.1109/ISIT.2015.7282442
P. Charpin, Sihem Mesnager, Sumanta Sarkar
In this paper we study involutions over a finite field of order 2n. We present some classes, several constructions of involutions and we study the set of their fixed points.
本文研究了2n阶有限域上的渐开线。给出了对合圈的若干类、几种构造,并研究了它们不动点的集合。
{"title":"On involutions of finite fields","authors":"P. Charpin, Sihem Mesnager, Sumanta Sarkar","doi":"10.1109/ISIT.2015.7282442","DOIUrl":"https://doi.org/10.1109/ISIT.2015.7282442","url":null,"abstract":"In this paper we study involutions over a finite field of order 2n. We present some classes, several constructions of involutions and we study the set of their fixed points.","PeriodicalId":272313,"journal":{"name":"2015 IEEE International Symposium on Information Theory (ISIT)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114392722","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Spectrum of sizes for perfect burst deletion-correcting codes 完美突发删除校正码的尺寸谱
Pub Date : 2015-06-14 DOI: 10.1109/ISIT.2015.7282792
Y. M. Chee, Yang Li, Xiande Zhang
Perfect deletion-correcting codes of the same length over the same alphabet can have different sizes. The interesting problem of determining the possible sizes of perfect deletion-correcting codes has previously been studied. In this paper, we study the corresponding problem for burst deletion-correcting codes. We completely determine the spectrum of sizes for perfect burst deletion-correcting codes for certain classes of parameters and also construct new classes of perfect deletion-correcting codes.
相同长度的完全删除纠正码在相同的字母表上可以有不同的大小。确定完美删除纠正码的可能大小的有趣问题先前已经被研究过。本文研究了突发删除纠错码的相应问题。我们完整地确定了一类参数的完全突发缺失校正码的大小谱,并构造了一类新的完全缺失校正码。
{"title":"Spectrum of sizes for perfect burst deletion-correcting codes","authors":"Y. M. Chee, Yang Li, Xiande Zhang","doi":"10.1109/ISIT.2015.7282792","DOIUrl":"https://doi.org/10.1109/ISIT.2015.7282792","url":null,"abstract":"Perfect deletion-correcting codes of the same length over the same alphabet can have different sizes. The interesting problem of determining the possible sizes of perfect deletion-correcting codes has previously been studied. In this paper, we study the corresponding problem for burst deletion-correcting codes. We completely determine the spectrum of sizes for perfect burst deletion-correcting codes for certain classes of parameters and also construct new classes of perfect deletion-correcting codes.","PeriodicalId":272313,"journal":{"name":"2015 IEEE International Symposium on Information Theory (ISIT)","volume":"18 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122223001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fundamental limit and pointwise asymptotics of the Bayes code for Markov sources 马尔可夫源的贝叶斯代码的基本极限和点渐近性
Pub Date : 2015-06-14 DOI: 10.1109/ISIT.2015.7282803
Shota Saito, Nozomi Miya, T. Matsushima
This paper considers universal lossless variable-length source coding problem and deals with one of the fundamental limits and pointwise asymptotics of the Bayes code for stationary ergodic finite order Markov sources. As investigation of the fundamental limits, we show upper and lower bounds of the minimum rate such that the probability which exceeds it is less than ε ∈ (0, 1). Furthermore, we prove that the codeword length of the Bayes code satisfies the asymptotic normality (pointwise √n asymptotics) and the law of the iterated logarithm (pointwise √n log log n asymptotics), where n represents length of a source sequence and “log” is the natural logarithm.
研究了平稳遍历有限阶马尔可夫源的通用无损变长码问题,讨论了贝叶斯码的一个基本极限和点渐近性。作为基本极限的研究,我们证明了最小率的上界和下界,使得超过它的概率小于ε∈(0,1)。此外,我们证明了贝叶斯码的码字长度满足渐近正态性(点向√n渐近性)和迭代对数定律(点向√n log log n渐近性),其中n表示源序列的长度,“log”是自然对数。
{"title":"Fundamental limit and pointwise asymptotics of the Bayes code for Markov sources","authors":"Shota Saito, Nozomi Miya, T. Matsushima","doi":"10.1109/ISIT.2015.7282803","DOIUrl":"https://doi.org/10.1109/ISIT.2015.7282803","url":null,"abstract":"This paper considers universal lossless variable-length source coding problem and deals with one of the fundamental limits and pointwise asymptotics of the Bayes code for stationary ergodic finite order Markov sources. As investigation of the fundamental limits, we show upper and lower bounds of the minimum rate such that the probability which exceeds it is less than ε ∈ (0, 1). Furthermore, we prove that the codeword length of the Bayes code satisfies the asymptotic normality (pointwise √n asymptotics) and the law of the iterated logarithm (pointwise √n log log n asymptotics), where n represents length of a source sequence and “log” is the natural logarithm.","PeriodicalId":272313,"journal":{"name":"2015 IEEE International Symposium on Information Theory (ISIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129757592","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Finite codelength analysis of the sequential waveform nulling receiver for M-ary PSK m级PSK顺序波形零化接收机的有限码长分析
Pub Date : 2015-06-14 DOI: 10.1109/ISIT.2015.7282739
Si-Hui Tan, Z. Dutton, R. Nair, S. Guha
The conditions for a quantum measurement to discriminate a set of states with the minimum probability of error were specified by Yuen, Kennedy and Lax, and are often termed the YKL conditions [1]. Since light is quantum mechanical, the ultimate limit on minimum-error discrimination of an optical modulation constellation is determined by the YKL bound. Standard optical receivers (i.e., direct, homodyne or heterodyne detection)-even at their respective ideal operation limits-cannot achieve this performance. Recently, it was shown that a `sequential waveform nulling' (SWN) receiver can, not only discriminate an arbitrary M-ary coherent-state (ideal laser-light) constellation asymptotically at the YKL bound in the high-power limit, but that it achieves a factor of 4 better in the asymptotic error-probability exponent compared with heterodyne detection-the only conventional optical receiver that can in principle be employed for detecting an arbitrary phase-and-amplitude modulated constellation [2]. The SWN receiver can be built with standard optical components; i.e., beamsplitters, local-oscillator lasers, delay loops and single-photon detectors. However on the other hand, in the high power regime, heterodyne detection is known to achieve a reliable communication rate that asymptotically approaches the Holevo capacity of a lossy-noisy optical channel (the ultimate limit to the classical capacity of a quantum channel) [3]. In fact, in the high power regime, heterodyne detection was also shown recently to achieve the optimal second-order coding rate, when using the optimal (Gaussian) input distribution [4]. In this paper, we show that when restricted to the M-ary phase-shift keying (PSK) ensemble, that the SWN receiver's superiority over heterodyne detection in its asymptotic error exponent of the demodulation error probability, translates to a slightly higher capacity and a pronouncedly higher finite blocklength reliable-communication rate. We also quantify, via a numerical calculation, the dependence of the SWN receiver's capacity on the order in which the PSK constellation points are nulled. Our results suggest that for short-latency PSK-modulated optical communication in the high spectral efficiency regime-for which heterodyne detection is the conventional receiver choice-that it may be beneficial to employ the SWN receiver, despite the widely-regarded capacity optimality of heterodyne detection in this operating regime.
Yuen、Kennedy和Lax规定了量子测量以最小误差概率区分一组状态的条件,通常称为YKL条件[1]。由于光是量子力学的,因此光调制星座的最小误差判别的最终极限由YKL界决定。标准光学接收器(即直接、外差或外差检测)即使在各自的理想工作极限下也无法达到这种性能。最近,研究表明,“顺序波形零化”(SWN)接收器不仅可以在高功率极限下在YKL界渐近地分辨任意m相干态(理想激光)星座,而且与外差检测相比,它的渐近误差概率指数高出4倍,外差检测是唯一一个原则上可以用于检测任意相位和振幅调制星座的传统光学接收器[2]。SWN接收器可以使用标准光学元件构建;例如,分束器,本地振荡器激光器,延迟环路和单光子探测器。然而,另一方面,在高功率条件下,外差检测已知可以实现可靠的通信速率,该速率渐近于有损噪声光信道的Holevo容量(量子信道经典容量的极限)[3]。事实上,在高功率情况下,外差检测最近也被证明可以在使用最优(高斯)输入分布时实现最优二阶编码率[4]。在本文中,我们证明了当限制在m级相移键控(PSK)集成时,SWN接收机在解调误差概率的渐近误差指数上优于外差检测,转化为略高的容量和明显更高的有限块长可靠通信速率。我们还通过数值计算量化了SWN接收机容量与PSK星座点失效顺序的依赖关系。我们的研究结果表明,对于高频谱效率体制下的短延迟psk调制光通信(外差检测是传统的接收器选择),尽管在这种工作体制下外差检测的容量被广泛认为是最优的,但使用SWN接收器可能是有益的。
{"title":"Finite codelength analysis of the sequential waveform nulling receiver for M-ary PSK","authors":"Si-Hui Tan, Z. Dutton, R. Nair, S. Guha","doi":"10.1109/ISIT.2015.7282739","DOIUrl":"https://doi.org/10.1109/ISIT.2015.7282739","url":null,"abstract":"The conditions for a quantum measurement to discriminate a set of states with the minimum probability of error were specified by Yuen, Kennedy and Lax, and are often termed the YKL conditions [1]. Since light is quantum mechanical, the ultimate limit on minimum-error discrimination of an optical modulation constellation is determined by the YKL bound. Standard optical receivers (i.e., direct, homodyne or heterodyne detection)-even at their respective ideal operation limits-cannot achieve this performance. Recently, it was shown that a `sequential waveform nulling' (SWN) receiver can, not only discriminate an arbitrary M-ary coherent-state (ideal laser-light) constellation asymptotically at the YKL bound in the high-power limit, but that it achieves a factor of 4 better in the asymptotic error-probability exponent compared with heterodyne detection-the only conventional optical receiver that can in principle be employed for detecting an arbitrary phase-and-amplitude modulated constellation [2]. The SWN receiver can be built with standard optical components; i.e., beamsplitters, local-oscillator lasers, delay loops and single-photon detectors. However on the other hand, in the high power regime, heterodyne detection is known to achieve a reliable communication rate that asymptotically approaches the Holevo capacity of a lossy-noisy optical channel (the ultimate limit to the classical capacity of a quantum channel) [3]. In fact, in the high power regime, heterodyne detection was also shown recently to achieve the optimal second-order coding rate, when using the optimal (Gaussian) input distribution [4]. In this paper, we show that when restricted to the M-ary phase-shift keying (PSK) ensemble, that the SWN receiver's superiority over heterodyne detection in its asymptotic error exponent of the demodulation error probability, translates to a slightly higher capacity and a pronouncedly higher finite blocklength reliable-communication rate. We also quantify, via a numerical calculation, the dependence of the SWN receiver's capacity on the order in which the PSK constellation points are nulled. Our results suggest that for short-latency PSK-modulated optical communication in the high spectral efficiency regime-for which heterodyne detection is the conventional receiver choice-that it may be beneficial to employ the SWN receiver, despite the widely-regarded capacity optimality of heterodyne detection in this operating regime.","PeriodicalId":272313,"journal":{"name":"2015 IEEE International Symposium on Information Theory (ISIT)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128483225","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Design of efficient channels with given input statistics 给定输入统计的有效信道设计
Pub Date : 2015-06-14 DOI: 10.1109/ISIT.2015.7282798
T. Berger, Mustafa Sungkar
The classic problem for a channel with inputs X, outputs Y, and conditional probability pY |X(y|x) is to find the distribution pX(x) that maximizes Shannon's I(X; Y) subject perhaps to constraints imposed on pX(x). Here, we seek instead, for a specified pX(x), the channel pY|X(y|x) that maximizes I(X; Y) subject to constraints on pY |X(y|x). That is, we investigate the part of joint source-channel coding that matches channels to sources. We assume that pX(x) and pY |X(y|x) are pdfs, eventually relaxing this assumption somewhat. We consider only time-discrete memoryless channels. Our motivation for studying this problem stems from neuroscience. Energy costs therefore must be analyzed and addressed in detail if one hopes to understand how Nature has built neuron “channels” that are so astoundingly energy efficient. However, our general theory is not limited to neuroscience nor limited solely to constraints on energy expenditure.
对于输入X,输出Y,条件概率pY |X(Y |X)的通道,经典问题是找到最大化香农I(X;Y)可能受到pX(x)的约束。这里,对于指定的pX(x),我们寻求通道pY| x (y|x)使I(x;Y)受pY |X(Y |x)的约束。也就是说,我们研究了将信道与源匹配的联合信源编码部分。我们假设pX(x)和pY |x (y|x)是pdf,最终稍微放松了这个假设。我们只考虑时间离散的无记忆信道。我们研究这个问题的动机源于神经科学。因此,如果人们希望了解大自然如何建立如此惊人的节能神经元“通道”,就必须详细分析和解决能源成本问题。然而,我们的一般理论并不局限于神经科学,也不局限于能量消耗的限制。
{"title":"Design of efficient channels with given input statistics","authors":"T. Berger, Mustafa Sungkar","doi":"10.1109/ISIT.2015.7282798","DOIUrl":"https://doi.org/10.1109/ISIT.2015.7282798","url":null,"abstract":"The classic problem for a channel with inputs X, outputs Y, and conditional probability pY |X(y|x) is to find the distribution pX(x) that maximizes Shannon's I(X; Y) subject perhaps to constraints imposed on pX(x). Here, we seek instead, for a specified pX(x), the channel pY|X(y|x) that maximizes I(X; Y) subject to constraints on pY |X(y|x). That is, we investigate the part of joint source-channel coding that matches channels to sources. We assume that pX(x) and pY |X(y|x) are pdfs, eventually relaxing this assumption somewhat. We consider only time-discrete memoryless channels. Our motivation for studying this problem stems from neuroscience. Energy costs therefore must be analyzed and addressed in detail if one hopes to understand how Nature has built neuron “channels” that are so astoundingly energy efficient. However, our general theory is not limited to neuroscience nor limited solely to constraints on energy expenditure.","PeriodicalId":272313,"journal":{"name":"2015 IEEE International Symposium on Information Theory (ISIT)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124763095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2015 IEEE International Symposium on Information Theory (ISIT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1