首页 > 最新文献

2015 IEEE International Symposium on Information Theory (ISIT)最新文献

英文 中文
Capacity scaling of relay networks with successive relaying 连续中继中继网络的容量扩展
Pub Date : 2015-06-14 DOI: 10.1109/ISIT.2015.7282440
Yu Zhang, Zhaoyang Zhang, L. Ping, Xiaoming Chen, C. Zhong
This paper studies the capacity scaling law of the multi-pair relay network with K source-destination pairs and M relays, where each node is equipped with a single antenna and works in half duplex mode. With the conventional two-slot relaying, the capacity was found to scale as K/2 log (M)+O(1) for fixed K and M → ∞. This paper shows that the capacity scaling law can be further improved to K log (M)+O(1) with successive relaying, as if the relays were full duplex. This scaling law can be achieved by a distributed coherent amplify-and-forward scheme, which only requires local channel state information (CSI) at each relay and statistical CSI at the sources and destinations.
本文研究了具有K个源-目的对和M个中继的多对中继网络的容量缩放规律,其中每个节点配置单天线,工作在半双工模式下。对于传统的双槽中继,对于固定的K和M→∞,容量的比例为K/2 log (M)+O(1)。本文表明,在连续中继的情况下,容量缩放律可以进一步提高到K log (M)+O(1),就像中继是全双工一样。这种比例律可以通过分布式相干放大转发方案来实现,该方案只需要每个中继的本地信道状态信息(CSI)和源和目的地的统计CSI。
{"title":"Capacity scaling of relay networks with successive relaying","authors":"Yu Zhang, Zhaoyang Zhang, L. Ping, Xiaoming Chen, C. Zhong","doi":"10.1109/ISIT.2015.7282440","DOIUrl":"https://doi.org/10.1109/ISIT.2015.7282440","url":null,"abstract":"This paper studies the capacity scaling law of the multi-pair relay network with K source-destination pairs and M relays, where each node is equipped with a single antenna and works in half duplex mode. With the conventional two-slot relaying, the capacity was found to scale as K/2 log (M)+O(1) for fixed K and M → ∞. This paper shows that the capacity scaling law can be further improved to K log (M)+O(1) with successive relaying, as if the relays were full duplex. This scaling law can be achieved by a distributed coherent amplify-and-forward scheme, which only requires local channel state information (CSI) at each relay and statistical CSI at the sources and destinations.","PeriodicalId":272313,"journal":{"name":"2015 IEEE International Symposium on Information Theory (ISIT)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115207109","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
On redundancy rate of FDLZ algorithm and its variants FDLZ算法及其变体的冗余率研究
Pub Date : 2015-06-14 DOI: 10.1109/ISIT.2015.7282804
Ayush Jain, R. Bansal
We use the machinery developed by Wyner [1], for the sources satisfying Markov condition, to obtain an upper bound on the contribution of pointer bits to the compression ratio for fixed database Lempel-Ziv (FDLZ) algorithm to be H + O(1/ log2n) which is an improvement from the previous bound of H + H(1 + o(1))log2 log2n/ log2n . We use the definition of compression ratio as in Yang and Kieffer [2]. Here H is the entropy rate of the source and n is the size of the database. Then using the same definition of compression ratio we obtain an upper bound on the contribution of phrase length bits for the variant of FDLZ suggested in [3] to be O(1/ log2n), which gives an upper bound of O(1/ log2n) on the redundancy rate itself for this version of FDLZ.
我们使用Wyner[1]开发的机制,对于满足马尔可夫条件的源,得到了固定数据库Lempel-Ziv (FDLZ)算法的指针位对压缩比贡献的上界为H + O(1/ log2n),这是对H + H(1 + O(1))log2 log2n/ log2n的改进。我们使用Yang和Kieffer[2]中的压缩比定义。这里H是源的熵率,n是数据库的大小。然后,使用相同的压缩比定义,我们得到了[3]中提出的FDLZ变体的短语长度位贡献的上界为O(1/ log2n),从而给出了该版本FDLZ的冗余率本身的上界为O(1/ log2n)。
{"title":"On redundancy rate of FDLZ algorithm and its variants","authors":"Ayush Jain, R. Bansal","doi":"10.1109/ISIT.2015.7282804","DOIUrl":"https://doi.org/10.1109/ISIT.2015.7282804","url":null,"abstract":"We use the machinery developed by Wyner [1], for the sources satisfying Markov condition, to obtain an upper bound on the contribution of pointer bits to the compression ratio for fixed database Lempel-Ziv (FDLZ) algorithm to be H + O(1/ log2n) which is an improvement from the previous bound of H + H(1 + o(1))log2 log2n/ log2n . We use the definition of compression ratio as in Yang and Kieffer [2]. Here H is the entropy rate of the source and n is the size of the database. Then using the same definition of compression ratio we obtain an upper bound on the contribution of phrase length bits for the variant of FDLZ suggested in [3] to be O(1/ log2n), which gives an upper bound of O(1/ log2n) on the redundancy rate itself for this version of FDLZ.","PeriodicalId":272313,"journal":{"name":"2015 IEEE International Symposium on Information Theory (ISIT)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124261736","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Degrees of freedom region of the MIMO two-transmit, two-receive network with General message sets 具有通用消息集的MIMO两发两收网络的自由度区域
Pub Date : 2015-06-14 DOI: 10.1109/ISIT.2015.7282618
Yao-Shian Wang, M. Varanasi
We establish the degrees of freedom (DoF) region for the multiple-input multiple-output (MIMO) two-transmit, two-receive network which has an arbitrary number of antennas at each of its four terminals. General message sets are considered, from which all possible communication scenarios based on two-transmit, two-receive network can be regarded as special cases. An outer bound is given first and then it is shown to be tight. In particular, we propose a linear precoding scheme that can achieve all the DoF tuples in the region. Time extension and asymmetric complex signaling are utilized when necessary. The scheme works for both constant channel as well as time/frequency varying channel scenarios. From our general result, one can obtain the degrees of freedom region and the corresponding DoF-optimal precoding scheme for the two-transmit, two-receive network with any subset of all possible messages. Some of these DoF regions have been found before, but many are new. Our work sheds light on the optimal message sets design that could take the most advantage of channel resources in a flexible and efficient manner.
我们建立了多输入多输出(MIMO)双发射双接收网络的自由度(DoF)区域,该网络在其四个终端中的每一个都具有任意数量的天线。考虑通用消息集,将基于双发双收网络的所有可能通信场景视为特殊情况。首先给出一个外边界,然后证明它是紧的。特别地,我们提出了一种线性预编码方案,可以实现区域内所有的DoF元组。必要时使用时间扩展和非对称复杂信号。该方案既适用于恒定信道,也适用于时变/频变信道。从我们的一般结果,我们可以得到具有所有可能消息的任意子集的两发两收网络的自由度区域和相应的dof最优预编码方案。其中一些DoF区域以前已经被发现,但许多是新的。我们的工作揭示了最优的消息集设计,可以以灵活有效的方式充分利用信道资源。
{"title":"Degrees of freedom region of the MIMO two-transmit, two-receive network with General message sets","authors":"Yao-Shian Wang, M. Varanasi","doi":"10.1109/ISIT.2015.7282618","DOIUrl":"https://doi.org/10.1109/ISIT.2015.7282618","url":null,"abstract":"We establish the degrees of freedom (DoF) region for the multiple-input multiple-output (MIMO) two-transmit, two-receive network which has an arbitrary number of antennas at each of its four terminals. General message sets are considered, from which all possible communication scenarios based on two-transmit, two-receive network can be regarded as special cases. An outer bound is given first and then it is shown to be tight. In particular, we propose a linear precoding scheme that can achieve all the DoF tuples in the region. Time extension and asymmetric complex signaling are utilized when necessary. The scheme works for both constant channel as well as time/frequency varying channel scenarios. From our general result, one can obtain the degrees of freedom region and the corresponding DoF-optimal precoding scheme for the two-transmit, two-receive network with any subset of all possible messages. Some of these DoF regions have been found before, but many are new. Our work sheds light on the optimal message sets design that could take the most advantage of channel resources in a flexible and efficient manner.","PeriodicalId":272313,"journal":{"name":"2015 IEEE International Symposium on Information Theory (ISIT)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114730895","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
General capacity region for the fully-connected 3-node packet erasure network 全连接3节点擦除网络的通用容量区域
Pub Date : 2015-06-14 DOI: 10.1109/ISIT.2015.7282936
Jaemin Han, Chih-Chun Wang
This work considers the fully-connected 3-node packet erasure network: For each time slot, with some probabilities a packet sent by any node i may be received by both of the other nodes j and k; received only by node j (or node k); or received by neither nodes. Interference is avoided by enforcing that at most one node can transmit in each time slot. We assume that node i can always reach node j, possibly with the help of the third node k, for any i ≠ j pairs (thus the term fully-connected). One example of this model is any Wi-Fi network with 3 nodes within the hearing range of each other. We consider the most general traffic demands. Namely, there are six private-information flows with rates (R1→2,R1→3,R2→1, R2→3,R3→1,R3→2), respectively, and three common-information flows with rates (R1→23,R2→31,R3→12), respectively. We characterize the 9-dimensional Shannon capacity region within a gap that is inversely proportional to the packet size (bits). The gap can be attributed to exchanging reception status (ACK) and can be further reduced to 0 if we allow ACK to be transmitted via a separate control channel. For normal-sized packets, say 12000 bits, our results have thus effectively characterized the capacity region. Technical contributions of this work include a new converse for many-to-many network communications and a new capacity-approaching simple linear network coding scheme.
本文考虑全连接的3节点数据包擦除网络:对于每个时隙,任意节点i发送的数据包以一定概率同时被其他节点j和k接收;仅被节点j(或节点k)接收;或者两个节点都没有接收到。通过强制在每个时隙中最多只能传输一个节点来避免干扰。我们假设对于任意i≠j对(因此称为完全连接),节点i总能到达节点j,可能需要第三个节点k的帮助。这种模式的一个例子是任何有3个节点的Wi-Fi网络在彼此的听力范围内。我们考虑最一般的交通需求。即分别有6个速率为R1→2、R1→3、R2→1、R2→3、R3→1、R3→2的私有信息流和3个速率为R1→23、R2→31、R3→12的公共信息流。我们在一个与数据包大小(比特)成反比的间隙内表征9维香农容量区域。这个差距可以归因于交换接收状态(ACK),如果我们允许ACK通过单独的控制通道传输,可以进一步减少到0。对于正常大小的数据包,例如12000位,我们的结果因此有效地描述了容量区域。这项工作的技术贡献包括一个新的多对多网络通信的反向和一个新的容量接近的简单线性网络编码方案。
{"title":"General capacity region for the fully-connected 3-node packet erasure network","authors":"Jaemin Han, Chih-Chun Wang","doi":"10.1109/ISIT.2015.7282936","DOIUrl":"https://doi.org/10.1109/ISIT.2015.7282936","url":null,"abstract":"This work considers the fully-connected 3-node packet erasure network: For each time slot, with some probabilities a packet sent by any node i may be received by both of the other nodes j and k; received only by node j (or node k); or received by neither nodes. Interference is avoided by enforcing that at most one node can transmit in each time slot. We assume that node i can always reach node j, possibly with the help of the third node k, for any i ≠ j pairs (thus the term fully-connected). One example of this model is any Wi-Fi network with 3 nodes within the hearing range of each other. We consider the most general traffic demands. Namely, there are six private-information flows with rates (R<sub>1→2</sub>,R<sub>1→3</sub>,R<sub>2→1</sub>, R<sub>2→3</sub>,R<sub>3→1</sub>,R<sub>3→2</sub>), respectively, and three common-information flows with rates (R<sub>1→23</sub>,R<sub>2→31</sub>,R<sub>3→12</sub>), respectively. We characterize the 9-dimensional Shannon capacity region within a gap that is inversely proportional to the packet size (bits). The gap can be attributed to exchanging reception status (ACK) and can be further reduced to 0 if we allow ACK to be transmitted via a separate control channel. For normal-sized packets, say 12000 bits, our results have thus effectively characterized the capacity region. Technical contributions of this work include a new converse for many-to-many network communications and a new capacity-approaching simple linear network coding scheme.","PeriodicalId":272313,"journal":{"name":"2015 IEEE International Symposium on Information Theory (ISIT)","volume":"266 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116396894","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Nonlinear codes outperform the best linear codes on the binary erasure channel 非线性码在二进制擦除信道上的性能优于最佳线性码
Pub Date : 2015-06-14 DOI: 10.1109/ISIT.2015.7282756
Po-Ning Chen, Hsuan-Yin Lin, S. M. Moser
The exact value of the average error probability of an arbitrary code (linear or nonlinear) using maximum likelihood decoding is studied on binary erasure channels (BECs) with arbitrary erasure probability 0 <; δ <; 1. The family of the fair linear codes, which are equivalent to a concatenation of several Hadamard linear codes, is proven to perform better (in the sense of average error probability with respect to maximum-likelihood decoding) than all other linear codes for many values of the blocklength n and for a dimension k = 3. It is then noted that the family of fair linear codes and the family of fair nonlinear weak flip codes both maximize the minimum Hamming distance under certain blocklengths. However, the fair nonlinear weak flip codes actually outperform the fair linear codes, i.e., linearity and global optimality cannot be simultaneously achieved for the number of codewords being M = 23.
在任意擦除概率为0 <的二进制擦除信道(BECs)上,研究了使用最大似然译码的任意码(线性或非线性)的平均错误概率的精确值;δ<;1. 公平线性码族相当于几个Hadamard线性码的串联,对于块长度n的许多值和维度k = 3,证明比所有其他线性码表现更好(就最大似然解码的平均错误概率而言)。结果表明,在一定的块长度下,公平线性码族和公平非线性弱反转码族都能使最小汉明距离最大化。然而,公平的非线性弱反转码实际上优于公平的线性码,即在码字数M = 23时,不能同时实现线性和全局最优性。
{"title":"Nonlinear codes outperform the best linear codes on the binary erasure channel","authors":"Po-Ning Chen, Hsuan-Yin Lin, S. M. Moser","doi":"10.1109/ISIT.2015.7282756","DOIUrl":"https://doi.org/10.1109/ISIT.2015.7282756","url":null,"abstract":"The exact value of the average error probability of an arbitrary code (linear or nonlinear) using maximum likelihood decoding is studied on binary erasure channels (BECs) with arbitrary erasure probability 0 <; δ <; 1. The family of the fair linear codes, which are equivalent to a concatenation of several Hadamard linear codes, is proven to perform better (in the sense of average error probability with respect to maximum-likelihood decoding) than all other linear codes for many values of the blocklength n and for a dimension k = 3. It is then noted that the family of fair linear codes and the family of fair nonlinear weak flip codes both maximize the minimum Hamming distance under certain blocklengths. However, the fair nonlinear weak flip codes actually outperform the fair linear codes, i.e., linearity and global optimality cannot be simultaneously achieved for the number of codewords being M = 23.","PeriodicalId":272313,"journal":{"name":"2015 IEEE International Symposium on Information Theory (ISIT)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123452354","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Secret key capacity: Talk or keep silent? 秘钥能力:说话还是保持沉默?
Pub Date : 2015-06-14 DOI: 10.1109/ISIT.2015.7282463
Huishuai Zhang, Yingbin Liang, L. Lai
The problem of when all terminals must talk to achieve the secrecy capacity in the multiterminal source model is investigated. Two conditions under which respectively a given terminal does not need to and must talk to achieve the secrecy capacity are characterized. The cases when all terminals must talk to achieve secrecy capacity are shown to be many more than those conjectured in [1] for systems with four or more terminals. There is a gap between the above two conditions, in which whether a given terminal need to talk is not clear. A conjecture is further made in order to narrow down the gap.
研究了在多终端源模型中,所有终端何时必须通信才能达到保密能力的问题。描述了给定终端不需要通话和必须通话以实现保密能力的两种情况。对于具有四个或更多终端的系统,所有终端必须通信以实现保密能力的情况比[1]中推测的要多得多。上述两种情况之间存在差距,即给定终端是否需要通话并不清楚。为了缩小差距,进一步提出了一个猜想。
{"title":"Secret key capacity: Talk or keep silent?","authors":"Huishuai Zhang, Yingbin Liang, L. Lai","doi":"10.1109/ISIT.2015.7282463","DOIUrl":"https://doi.org/10.1109/ISIT.2015.7282463","url":null,"abstract":"The problem of when all terminals must talk to achieve the secrecy capacity in the multiterminal source model is investigated. Two conditions under which respectively a given terminal does not need to and must talk to achieve the secrecy capacity are characterized. The cases when all terminals must talk to achieve secrecy capacity are shown to be many more than those conjectured in [1] for systems with four or more terminals. There is a gap between the above two conditions, in which whether a given terminal need to talk is not clear. A conjecture is further made in order to narrow down the gap.","PeriodicalId":272313,"journal":{"name":"2015 IEEE International Symposium on Information Theory (ISIT)","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123978351","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Optimal path encoding for software-defined networks 软件定义网络的最优路径编码
Pub Date : 2015-06-14 DOI: 10.1109/ISIT.2015.7282878
A. Hari, Urs Niesen, G. Wilfong
Packet networks need to maintain state in the form of forwarding tables at each switch. The cost of this state increases as networks support ever more sophisticated per-flow routing, traffic engineering, and service chaining. Per-flow or per-path state at the switches can be eliminated by encoding each packet's desired path in its header. A key component of such a method is an efficient encoding of paths through the network. We introduce a mathematical formulation of this optimal path-encoding problem. We prove that the problem is APX-hard, by showing that approximating it to within a factor less than 8/7 is NP-hard. Thus, at best we can hope for a constant-factor approximation algorithm. We then present such an algorithm, approximating the optimal path-encoding problem to within a factor 2. Finally, we provide empirical results illustrating the effectiveness of the proposed algorithm.
分组网络需要在每个交换机上以转发表的形式保持状态。随着网络支持越来越复杂的每流路由、流量工程和服务链,这种状态的成本也在增加。交换机上的按流或按路径状态可以通过在每个包的报头中编码所需的路径来消除。这种方法的一个关键组成部分是通过网络的路径的有效编码。我们引入了这个最优路径编码问题的数学公式。我们证明了这个问题是apx困难的,通过表明在小于8/7的因子内逼近它是np困难的。因此,我们最多只能希望得到一个常因子近似算法。然后,我们提出了这样一个算法,将最优路径编码问题逼近到因子2以内。最后,我们提供了实证结果来说明所提出算法的有效性。
{"title":"Optimal path encoding for software-defined networks","authors":"A. Hari, Urs Niesen, G. Wilfong","doi":"10.1109/ISIT.2015.7282878","DOIUrl":"https://doi.org/10.1109/ISIT.2015.7282878","url":null,"abstract":"Packet networks need to maintain state in the form of forwarding tables at each switch. The cost of this state increases as networks support ever more sophisticated per-flow routing, traffic engineering, and service chaining. Per-flow or per-path state at the switches can be eliminated by encoding each packet's desired path in its header. A key component of such a method is an efficient encoding of paths through the network. We introduce a mathematical formulation of this optimal path-encoding problem. We prove that the problem is APX-hard, by showing that approximating it to within a factor less than 8/7 is NP-hard. Thus, at best we can hope for a constant-factor approximation algorithm. We then present such an algorithm, approximating the optimal path-encoding problem to within a factor 2. Finally, we provide empirical results illustrating the effectiveness of the proposed algorithm.","PeriodicalId":272313,"journal":{"name":"2015 IEEE International Symposium on Information Theory (ISIT)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129393845","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Hermitian codes in distributed storage systems with optimal error-correcting capacity 具有最优纠错能力的分布式存储系统中的厄米码
Pub Date : 2015-06-14 DOI: 10.1109/ISIT.2015.7282525
Bin Wang, Haibin Kan, K. Shum
Maximum distance separable (MDS) erasure codes are widely used in distributed storage systems (DSS) for better storage efficiency and protection against Byzantine attacks. In this paper, we aim at enhancing the error-correction capacity of DSS in a hostile network. Firstly, we apply Hermitian code in DSS and presented a special placing mode for the encoded symbols. A reconstruction algorithm in error-free network is given. Next we show that the burst-error-correcting algorithm by Ren can correct more errors than Reed-Solomon code. We proposed an erasure rollback strategy in decoding. The new reconstructing algorithm improves both the lower and upper bound of error-correcting capacity. It has better computing complexity than Reed-Solomon code with the same storage efficiency.
最大距离可分离(Maximum distance分离式)擦除码被广泛应用于分布式存储系统中,以提高存储效率和防御拜占庭攻击。本文旨在提高DSS在敌对网络中的纠错能力。首先,我们将厄米码应用于决策支持系统中,并提出了一种特殊的编码符号放置方式。给出了一种无差错网络重构算法。接下来,我们证明了Ren的突发纠错算法比Reed-Solomon码可以纠错更多的错误。提出了一种译码中的擦除回滚策略。新的重构算法提高了纠错能力的上界和下界。在相同的存储效率下,它比Reed-Solomon代码具有更好的计算复杂度。
{"title":"Hermitian codes in distributed storage systems with optimal error-correcting capacity","authors":"Bin Wang, Haibin Kan, K. Shum","doi":"10.1109/ISIT.2015.7282525","DOIUrl":"https://doi.org/10.1109/ISIT.2015.7282525","url":null,"abstract":"Maximum distance separable (MDS) erasure codes are widely used in distributed storage systems (DSS) for better storage efficiency and protection against Byzantine attacks. In this paper, we aim at enhancing the error-correction capacity of DSS in a hostile network. Firstly, we apply Hermitian code in DSS and presented a special placing mode for the encoded symbols. A reconstruction algorithm in error-free network is given. Next we show that the burst-error-correcting algorithm by Ren can correct more errors than Reed-Solomon code. We proposed an erasure rollback strategy in decoding. The new reconstructing algorithm improves both the lower and upper bound of error-correcting capacity. It has better computing complexity than Reed-Solomon code with the same storage efficiency.","PeriodicalId":272313,"journal":{"name":"2015 IEEE International Symposium on Information Theory (ISIT)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128357307","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The likelihood decoder: Error exponents and mismatch 可能性解码器:错误指数和不匹配
Pub Date : 2015-06-14 DOI: 10.1109/ISIT.2015.7282422
J. Scarlett, Alfonso Martinez, A. G. Fàbregas
This paper studies likelihood decoding for channel coding over discrete memoryless channels. It is shown that the likelihood decoder recovers the same random-coding error exponents as the maximum-likelihood decoder for i.i.d. and constant-composition random codes. The role of mismatch in likelihood decoding is studied, and the notion of the mismatched likelihood decoder capacity is introduced. It is shown, both in the case of random coding and optimized codebooks, that the mismatched likelihood decoder can lead to strictly worse achievable rates and error exponents compared to the corresponding mismatched maximum-metric decoder.
本文研究了离散无记忆信道上信道编码的似然解码。结果表明,似然解码器恢复的随机编码误差指数与最大似然解码器恢复的随机编码误差指数相同。研究了错配在似然译码中的作用,引入了错配似然译码容量的概念。结果表明,在随机编码和优化码本的情况下,与相应的不匹配的最大度量解码器相比,不匹配的似然解码器可能导致更差的可实现率和错误指数。
{"title":"The likelihood decoder: Error exponents and mismatch","authors":"J. Scarlett, Alfonso Martinez, A. G. Fàbregas","doi":"10.1109/ISIT.2015.7282422","DOIUrl":"https://doi.org/10.1109/ISIT.2015.7282422","url":null,"abstract":"This paper studies likelihood decoding for channel coding over discrete memoryless channels. It is shown that the likelihood decoder recovers the same random-coding error exponents as the maximum-likelihood decoder for i.i.d. and constant-composition random codes. The role of mismatch in likelihood decoding is studied, and the notion of the mismatched likelihood decoder capacity is introduced. It is shown, both in the case of random coding and optimized codebooks, that the mismatched likelihood decoder can lead to strictly worse achievable rates and error exponents compared to the corresponding mismatched maximum-metric decoder.","PeriodicalId":272313,"journal":{"name":"2015 IEEE International Symposium on Information Theory (ISIT)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128472827","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Opportunistic in-network computation for wireless sensor networks 无线传感器网络的机会网络内计算
Pub Date : 2015-06-14 DOI: 10.1109/ISIT.2015.7282777
Sang-Woon Jeon, B. Jung
Function computation over wireless sensor networks is investigated, where K sensors measure their observations and a fusion center wishes to estimate a pre-defined function of the observations via fading multiple access channels (MACs). The arithmetic sum and type functions are considered since they yield various fundamental sample statistics such as mean, variance, maximum, minimum, etc. We propose a novel opportunistic in-network computation (INC) scheme in which a subset of sensors with large channel gains opportunistically participate in the transmission at each time slot, while all sensors in a network simultaneously send their observations or only a single sensor sends its observation in the conventional INC schemes. We analyze the ergodic computation rate of the proposed INC scheme and prove that it achieves a non-vanishing computation rate even when the number of sensors K tends to infinity, which provides a significant rate improvement compared to the conventional INC schemes whose computation rates converge to zero as K increases.
研究了无线传感器网络上的函数计算,其中K个传感器测量它们的观测值,融合中心希望通过衰落多址信道(mac)估计观测值的预定义函数。算术和和类型函数被考虑,因为它们产生各种基本的样本统计,如平均值、方差、最大值、最小值等。我们提出了一种新的机会网络内计算(INC)方案,在该方案中,具有较大信道增益的传感器子集机会地参与每个时隙的传输,而网络中的所有传感器同时发送它们的观测值,或者在传统的机会网络内计算方案中只有单个传感器发送其观测值。我们分析了所提出的INC方案的遍历计算速率,并证明了当传感器个数K趋于无穷大时,该方案仍能实现不消失的计算速率,与传统INC方案的计算速率随K的增加收敛于零相比,有了显著的提高。
{"title":"Opportunistic in-network computation for wireless sensor networks","authors":"Sang-Woon Jeon, B. Jung","doi":"10.1109/ISIT.2015.7282777","DOIUrl":"https://doi.org/10.1109/ISIT.2015.7282777","url":null,"abstract":"Function computation over wireless sensor networks is investigated, where K sensors measure their observations and a fusion center wishes to estimate a pre-defined function of the observations via fading multiple access channels (MACs). The arithmetic sum and type functions are considered since they yield various fundamental sample statistics such as mean, variance, maximum, minimum, etc. We propose a novel opportunistic in-network computation (INC) scheme in which a subset of sensors with large channel gains opportunistically participate in the transmission at each time slot, while all sensors in a network simultaneously send their observations or only a single sensor sends its observation in the conventional INC schemes. We analyze the ergodic computation rate of the proposed INC scheme and prove that it achieves a non-vanishing computation rate even when the number of sensors K tends to infinity, which provides a significant rate improvement compared to the conventional INC schemes whose computation rates converge to zero as K increases.","PeriodicalId":272313,"journal":{"name":"2015 IEEE International Symposium on Information Theory (ISIT)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128549519","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2015 IEEE International Symposium on Information Theory (ISIT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1