首页 > 最新文献

2015 IEEE International Symposium on Information Theory (ISIT)最新文献

英文 中文
Energy-subchannel allocation for energy harvesting nodes in frequency-selective channels 频率选择信道中能量收集节点的能量子信道分配
Pub Date : 2015-06-14 DOI: 10.1109/ISIT.2015.7282949
Zhe Wang, Xiaodong Wang, V. Aggarwal
We consider an energy harvesting network with multiple transmission links in a frequency-selective fading channel. We formulate the problem of joint energy and subchannel allocation for all transmitters over a scheduling period, as a mixed integer program. With the predictions of the harvested energy and subchannel gains, we propose an algorithm to efficiently obtain the energy-subchannel allocations for all links over the scheduling period based on controlled water-filling. The proposed algorithm is shown to be asymptotically optimal when the bandwidth of the subchannel goes to zero. Simulation results demonstrate that the performance of the proposed algorithm is close to the upper-bound on the optimal performance, which is also outperforms various heuristic allocation policies.
我们考虑了在频率选择性衰落信道中具有多个传输链路的能量收集网络。我们将一个调度周期内所有发射机的联合能量和子信道分配问题表述为一个混合整数方案。通过对收获能量和子通道增益的预测,提出了一种基于控制充水的调度周期内各链路能量子通道分配的有效算法。当子信道带宽趋近于零时,该算法是渐近最优的。仿真结果表明,所提算法的性能接近最优性能的上界,且优于各种启发式分配策略。
{"title":"Energy-subchannel allocation for energy harvesting nodes in frequency-selective channels","authors":"Zhe Wang, Xiaodong Wang, V. Aggarwal","doi":"10.1109/ISIT.2015.7282949","DOIUrl":"https://doi.org/10.1109/ISIT.2015.7282949","url":null,"abstract":"We consider an energy harvesting network with multiple transmission links in a frequency-selective fading channel. We formulate the problem of joint energy and subchannel allocation for all transmitters over a scheduling period, as a mixed integer program. With the predictions of the harvested energy and subchannel gains, we propose an algorithm to efficiently obtain the energy-subchannel allocations for all links over the scheduling period based on controlled water-filling. The proposed algorithm is shown to be asymptotically optimal when the bandwidth of the subchannel goes to zero. Simulation results demonstrate that the performance of the proposed algorithm is close to the upper-bound on the optimal performance, which is also outperforms various heuristic allocation policies.","PeriodicalId":272313,"journal":{"name":"2015 IEEE International Symposium on Information Theory (ISIT)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127015290","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
On the broadcast capacity of large wireless networks at low SNR 低信噪比下大型无线网络的广播容量研究
Pub Date : 2015-06-14 DOI: 10.1109/ISIT.2015.7282439
S. Haddad, O. Lévêque
The present paper focuses on the problem of broadcasting information in the most efficient manner in a large two-dimensional ad hoc wireless network at low SNR and under line-of-sight propagation. A new communication scheme is proposed, where source nodes first broadcast their data to the entire network, despite the lack of sufficient available power. The signal's power is then reinforced via successive back-and-forth beamforming transmissions between different groups of nodes in the network, so that all nodes are able to decode the transmitted information at the end. This scheme is shown to achieve asymptotically the broadcast capacity of the network, which is expressed in terms of the largest singular value of the matrix of fading coefficients between the nodes in the network. A detailed mathematical analysis is then presented to evaluate the asymptotic behavior of this largest singular value.
本文主要研究在低信噪比和视距传播条件下,在大型二维自组织无线网络中以最有效的方式广播信息的问题。提出了一种新的通信方案,源节点首先向整个网络广播它们的数据,尽管缺乏足够的可用功率。然后,通过在网络中不同组节点之间的连续来回波束形成传输,信号的功率得到增强,这样所有节点都能够在最后解码传输的信息。该方案可以渐近地实现网络的广播容量,广播容量用网络中节点间衰落系数矩阵的最大奇异值表示。然后给出了一个详细的数学分析来评估这个最大奇异值的渐近行为。
{"title":"On the broadcast capacity of large wireless networks at low SNR","authors":"S. Haddad, O. Lévêque","doi":"10.1109/ISIT.2015.7282439","DOIUrl":"https://doi.org/10.1109/ISIT.2015.7282439","url":null,"abstract":"The present paper focuses on the problem of broadcasting information in the most efficient manner in a large two-dimensional ad hoc wireless network at low SNR and under line-of-sight propagation. A new communication scheme is proposed, where source nodes first broadcast their data to the entire network, despite the lack of sufficient available power. The signal's power is then reinforced via successive back-and-forth beamforming transmissions between different groups of nodes in the network, so that all nodes are able to decode the transmitted information at the end. This scheme is shown to achieve asymptotically the broadcast capacity of the network, which is expressed in terms of the largest singular value of the matrix of fading coefficients between the nodes in the network. A detailed mathematical analysis is then presented to evaluate the asymptotic behavior of this largest singular value.","PeriodicalId":272313,"journal":{"name":"2015 IEEE International Symposium on Information Theory (ISIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129226064","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
How to use independent secret keys for secure broadcasting of common messages 如何使用独立密匙安全地广播公共讯息
Pub Date : 2015-06-14 DOI: 10.1109/ISIT.2015.7282800
R. Schaefer, A. Khisti, H. Poor
The broadcast channel with independent secret keys is studied. In this scenario, a common message has to be securely broadcast to two legitimate receivers in the presence of an eavesdropper. The transmitter shares with each legitimate receiver an independent secret key of arbitrary rate. These keys can either be used as one-time pads to encrypt the common message or can be interpreted as fictitious messages used as randomization resources for wiretap coding. Both approaches are discussed and the secrecy capacity is derived for various cases. Depending on the qualities of the legitimate and eavesdropper channels, either a one-time pad, wiretap coding, or a combination of both turns out to be capacity-achieving.
研究了具有独立密钥的广播信道。在这种情况下,必须在窃听者存在的情况下将一条公共消息安全地广播给两个合法的接收者。发送方与每个合法接收方共享任意速率的独立密钥。这些密钥既可以用作一次性密码簿来加密公共消息,也可以被解释为虚构的消息,用作窃听编码的随机化资源。讨论了这两种方法,并推导了不同情况下的保密能力。根据合法信道和窃听信道的质量,无论是一次性插入、窃听编码,还是两者的组合都可以实现容量实现。
{"title":"How to use independent secret keys for secure broadcasting of common messages","authors":"R. Schaefer, A. Khisti, H. Poor","doi":"10.1109/ISIT.2015.7282800","DOIUrl":"https://doi.org/10.1109/ISIT.2015.7282800","url":null,"abstract":"The broadcast channel with independent secret keys is studied. In this scenario, a common message has to be securely broadcast to two legitimate receivers in the presence of an eavesdropper. The transmitter shares with each legitimate receiver an independent secret key of arbitrary rate. These keys can either be used as one-time pads to encrypt the common message or can be interpreted as fictitious messages used as randomization resources for wiretap coding. Both approaches are discussed and the secrecy capacity is derived for various cases. Depending on the qualities of the legitimate and eavesdropper channels, either a one-time pad, wiretap coding, or a combination of both turns out to be capacity-achieving.","PeriodicalId":272313,"journal":{"name":"2015 IEEE International Symposium on Information Theory (ISIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130596827","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Universality of logarithmic loss in lossy compression 有损压缩中对数损失的普适性
Pub Date : 2015-06-14 DOI: 10.1109/ISIT.2015.7282839
Albert No, T. Weissman
We establish two strong senses of universality of logarithmic loss as a distortion criterion in lossy compression: For any fixed length lossy compression problem under an arbitrary distortion criterion, we show that there is an equivalent lossy compression problem under logarithmic loss. In the successive refinement problem, if the first decoder operates under logarithmic loss, we show that any discrete memoryless source is successively refinable under an arbitrary distortion criterion for the second decoder.
我们建立了对数损失作为有损压缩失真判据的两个强普适性:对于任意失真判据下的任意定长有损压缩问题,我们证明了在对数损失下存在等价的有损压缩问题。在连续细化问题中,如果第一解码器在对数损耗下工作,我们证明了任何离散无记忆源在任意失真准则下对第二解码器都是连续可细化的。
{"title":"Universality of logarithmic loss in lossy compression","authors":"Albert No, T. Weissman","doi":"10.1109/ISIT.2015.7282839","DOIUrl":"https://doi.org/10.1109/ISIT.2015.7282839","url":null,"abstract":"We establish two strong senses of universality of logarithmic loss as a distortion criterion in lossy compression: For any fixed length lossy compression problem under an arbitrary distortion criterion, we show that there is an equivalent lossy compression problem under logarithmic loss. In the successive refinement problem, if the first decoder operates under logarithmic loss, we show that any discrete memoryless source is successively refinable under an arbitrary distortion criterion for the second decoder.","PeriodicalId":272313,"journal":{"name":"2015 IEEE International Symposium on Information Theory (ISIT)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123359362","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Predicting the outcomes of every process for which an asymptotically accurate stationary predictor exists is impossible 对于存在渐近精确平稳预测器的每一个过程,预测结果是不可能的
Pub Date : 2015-06-14 DOI: 10.1109/ISIT.2015.7282646
D. Ryabko, B. Ryabko
The problem of prediction consists in forecasting the conditional distribution of the next outcome given the past. Assume that the source generating the data is such that there is a stationary predictor whose error converges to zero (in a certain sense). The question is whether there is a universal predictor for all such sources, that is, a predictor whose error goes to zero if any of the sources that have this property is chosen to generate the data. This question is answered in the negative, contrasting a number of previously established positive results concerning related but smaller sets of processes.
预测的问题在于根据过去的情况预测下一个结果的条件分布。假设生成数据的源是这样的,存在一个平稳预测器,其误差收敛于零(在某种意义上)。问题是是否存在一个适用于所有这些源的通用预测器,也就是说,如果选择任何具有此属性的源来生成数据,那么该预测器的误差将变为零。这个问题的答案是否定的,这与先前确定的一些有关但较小的进程的肯定结果形成了对比。
{"title":"Predicting the outcomes of every process for which an asymptotically accurate stationary predictor exists is impossible","authors":"D. Ryabko, B. Ryabko","doi":"10.1109/ISIT.2015.7282646","DOIUrl":"https://doi.org/10.1109/ISIT.2015.7282646","url":null,"abstract":"The problem of prediction consists in forecasting the conditional distribution of the next outcome given the past. Assume that the source generating the data is such that there is a stationary predictor whose error converges to zero (in a certain sense). The question is whether there is a universal predictor for all such sources, that is, a predictor whose error goes to zero if any of the sources that have this property is chosen to generate the data. This question is answered in the negative, contrasting a number of previously established positive results concerning related but smaller sets of processes.","PeriodicalId":272313,"journal":{"name":"2015 IEEE International Symposium on Information Theory (ISIT)","volume":"256 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123359552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Optimality of Walrand-Varaiya type policies and approximation results for zero delay coding of Markov sources 马尔可夫源零延迟编码的Walrand-Varaiya型策略的最优性及逼近结果
Pub Date : 2015-06-14 DOI: 10.1109/ISIT.2015.7282682
Richard G. Wood, T. Linder, S. Yüksel
Optimal zero-delay coding (quantization) of a finite-state Markov source is considered. Building on our earlier work and previous literature, using a stochastic control problem formulation, the existence and structure of optimal quantization policies are studied. Our main result establishes, for infinite horizon problems, the optimality of deterministic and stationary (Walrand-Varaiya type) Markov coding policies. In addition, the ε-optimality of finite-memory quantizers is established and the dependence between the memory length and ε is quantified. Numerical results are also presented.
研究了有限状态马尔可夫源的最优零延迟编码(量化)问题。在我们之前的工作和先前的文献的基础上,使用随机控制问题公式,研究了最优量化策略的存在性和结构。我们的主要结果建立了,对于无限视界问题,确定性和平稳(Walrand-Varaiya型)马尔可夫编码策略的最优性。此外,建立了有限记忆量化器的ε-最优性,量化了记忆长度与ε之间的关系。并给出了数值结果。
{"title":"Optimality of Walrand-Varaiya type policies and approximation results for zero delay coding of Markov sources","authors":"Richard G. Wood, T. Linder, S. Yüksel","doi":"10.1109/ISIT.2015.7282682","DOIUrl":"https://doi.org/10.1109/ISIT.2015.7282682","url":null,"abstract":"Optimal zero-delay coding (quantization) of a finite-state Markov source is considered. Building on our earlier work and previous literature, using a stochastic control problem formulation, the existence and structure of optimal quantization policies are studied. Our main result establishes, for infinite horizon problems, the optimality of deterministic and stationary (Walrand-Varaiya type) Markov coding policies. In addition, the ε-optimality of finite-memory quantizers is established and the dependence between the memory length and ε is quantified. Numerical results are also presented.","PeriodicalId":272313,"journal":{"name":"2015 IEEE International Symposium on Information Theory (ISIT)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123653036","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Minimum squared-error, energy-constrained encoding by adaptive threshold models of neurons 最小二乘误差,能量约束的神经元自适应阈值模型编码
Pub Date : 2015-06-14 DOI: 10.1109/ISIT.2015.7282673
Erik C. Johnson, Douglas L. Jones, R. Ratnam
In the nervous system, sensory neurons encode signals as a sequence of action potentials (spikes). However, spike generation is metabolically expensive. Achieving high coding fidelity may require a high spike rate. Here we propose that neurons achieve a trade-off by optimally timing spikes so that maximum fidelity is achieved for a given spike rate. The proposed neural encoder generates spikes which are reconstructed by a linear filter, with energy modeled as a constraint proportional to the average spike-rate. We develop expressions for the encoding error and derive the optimal parameters in the limit of high spike-firing rates. The energy-constrained neural encoder is compared with experimental spike-times from two sensory neurons, one cortical and one peripheral. The proposed energy-constrained neural encoder closely approximates the experimentally recorded spike-times, and the decoded experimental inputs are within 2dB of the predicted distortion-energy curve for both neurons.
在神经系统中,感觉神经元将信号编码为一系列动作电位(spike)。然而,刺突的产生在代谢上是昂贵的。实现高编码保真度可能需要高尖峰率。在这里,我们提出神经元通过最佳定时尖峰来实现权衡,以便在给定的尖峰速率下实现最大的保真度。所提出的神经编码器产生的峰值由线性滤波器重构,能量建模为与平均峰值率成比例的约束。我们建立了编码误差的表达式,并推导了在高脉冲发射率极限下的最优参数。将能量受限的神经编码器与两个感觉神经元(一个皮质神经元和一个外周神经元)的实验峰值时间进行了比较。所提出的能量约束神经编码器与实验记录的峰值时间非常接近,并且解码的实验输入与两个神经元的预测扭曲-能量曲线的距离在2dB以内。
{"title":"Minimum squared-error, energy-constrained encoding by adaptive threshold models of neurons","authors":"Erik C. Johnson, Douglas L. Jones, R. Ratnam","doi":"10.1109/ISIT.2015.7282673","DOIUrl":"https://doi.org/10.1109/ISIT.2015.7282673","url":null,"abstract":"In the nervous system, sensory neurons encode signals as a sequence of action potentials (spikes). However, spike generation is metabolically expensive. Achieving high coding fidelity may require a high spike rate. Here we propose that neurons achieve a trade-off by optimally timing spikes so that maximum fidelity is achieved for a given spike rate. The proposed neural encoder generates spikes which are reconstructed by a linear filter, with energy modeled as a constraint proportional to the average spike-rate. We develop expressions for the encoding error and derive the optimal parameters in the limit of high spike-firing rates. The energy-constrained neural encoder is compared with experimental spike-times from two sensory neurons, one cortical and one peripheral. The proposed energy-constrained neural encoder closely approximates the experimentally recorded spike-times, and the decoded experimental inputs are within 2dB of the predicted distortion-energy curve for both neurons.","PeriodicalId":272313,"journal":{"name":"2015 IEEE International Symposium on Information Theory (ISIT)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114220674","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
On the finite-SNR Diversity-Multiplexing Tradeoff in large Rayleigh product channels 大瑞利产品信道中有限信噪比分集复用权衡
Pub Date : 2015-06-14 DOI: 10.1109/ISIT.2015.7282925
Zhong Zheng, Lu Wei, R. Speicher, R. Müller, Jyri Hämäläinen, J. Corander
The Diversity-Multiplexing Tradeoff (DMT) is studied for the large Rayleigh product channel at non-asymptotic SNRs. The first result is that, as matrix dimensions growing to infinity, the channel capacity converges to a Gaussian random variable. Based on this, we derive a compact expression for the finite-SNR DMT. From the analytical and numerical results, we gain useful insight into the fundamental tradeoff of the considered channel model in the realistic SNR regime.
研究了非渐近信噪比下大瑞利积信道的分集-复用权衡问题。第一个结果是,当矩阵维数增长到无穷大时,信道容量收敛到一个高斯随机变量。在此基础上,导出了有限信噪比DMT的紧凑表达式。从分析和数值结果中,我们获得了在实际信噪比条件下所考虑的信道模型的基本权衡的有用见解。
{"title":"On the finite-SNR Diversity-Multiplexing Tradeoff in large Rayleigh product channels","authors":"Zhong Zheng, Lu Wei, R. Speicher, R. Müller, Jyri Hämäläinen, J. Corander","doi":"10.1109/ISIT.2015.7282925","DOIUrl":"https://doi.org/10.1109/ISIT.2015.7282925","url":null,"abstract":"The Diversity-Multiplexing Tradeoff (DMT) is studied for the large Rayleigh product channel at non-asymptotic SNRs. The first result is that, as matrix dimensions growing to infinity, the channel capacity converges to a Gaussian random variable. Based on this, we derive a compact expression for the finite-SNR DMT. From the analytical and numerical results, we gain useful insight into the fundamental tradeoff of the considered channel model in the realistic SNR regime.","PeriodicalId":272313,"journal":{"name":"2015 IEEE International Symposium on Information Theory (ISIT)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116325602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
On the sum rate of multiple description coding with tree-structured distortion constraints 基于树结构失真约束的多描述编码和速率研究
Pub Date : 2015-06-14 DOI: 10.1109/ISIT.2015.7282762
Yinfei Xu, Jun Chen, Qiao Wang
A single-letter lower bound on the sum rate of multiple description coding with tree-structured distortion constraints is established and is shown to be tight in the quadratic Gaussian case.
建立了具有树结构失真约束的多重描述编码和速率的单字母下界,并证明了该下界在二次高斯情况下是紧的。
{"title":"On the sum rate of multiple description coding with tree-structured distortion constraints","authors":"Yinfei Xu, Jun Chen, Qiao Wang","doi":"10.1109/ISIT.2015.7282762","DOIUrl":"https://doi.org/10.1109/ISIT.2015.7282762","url":null,"abstract":"A single-letter lower bound on the sum rate of multiple description coding with tree-structured distortion constraints is established and is shown to be tight in the quadratic Gaussian case.","PeriodicalId":272313,"journal":{"name":"2015 IEEE International Symposium on Information Theory (ISIT)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121666637","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Limits of low-probability-of-detection communication over a discrete memoryless channel 离散无存储器信道上低检测概率通信的限制
Pub Date : 2015-06-14 DOI: 10.1109/ISIT.2015.7282911
Ligong Wang, G. Wornell, Lizhong Zheng
This paper considers the problem of communication over a discrete memoryless channel subject to the constraint that the probability that an adversary who observes the channel outputs can detect the communication is low. Specifically, the relative entropy between the output distributions when a codeword is transmitted and when no input is provided to the channel must be sufficiently small. For a channel whose output distribution induced by the zero input symbol is not a mixture of the output distributions induced by other input symbols, it is shown that the maximum number of bits that can be transmitted under this criterion scales like the square root of the blocklength. Exact expressions for the scaling constant are also derived.
本文考虑了一个离散无记忆信道上的通信问题,该问题受观察信道输出的对手检测到通信的概率较低的约束。具体来说,当发送码字和不向信道提供输入时,输出分布之间的相对熵必须足够小。对于由零输入符号诱导的输出分布不是由其他输入符号诱导的输出分布的混合的信道,表明在该准则下可以传输的最大比特数与块长度的平方根相似。并给出了标度常数的精确表达式。
{"title":"Limits of low-probability-of-detection communication over a discrete memoryless channel","authors":"Ligong Wang, G. Wornell, Lizhong Zheng","doi":"10.1109/ISIT.2015.7282911","DOIUrl":"https://doi.org/10.1109/ISIT.2015.7282911","url":null,"abstract":"This paper considers the problem of communication over a discrete memoryless channel subject to the constraint that the probability that an adversary who observes the channel outputs can detect the communication is low. Specifically, the relative entropy between the output distributions when a codeword is transmitted and when no input is provided to the channel must be sufficiently small. For a channel whose output distribution induced by the zero input symbol is not a mixture of the output distributions induced by other input symbols, it is shown that the maximum number of bits that can be transmitted under this criterion scales like the square root of the blocklength. Exact expressions for the scaling constant are also derived.","PeriodicalId":272313,"journal":{"name":"2015 IEEE International Symposium on Information Theory (ISIT)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114816685","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
期刊
2015 IEEE International Symposium on Information Theory (ISIT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1