首页 > 最新文献

2006 IEEE Information Theory Workshop - ITW '06 Punta del Este最新文献

英文 中文
On Hybrid ARQ Protocol schemes over the m(≥ 2)-ary Asymmetric Channel m(≥2)任意不对称通道
Pub Date : 2006-03-13 DOI: 10.1109/ITW.2006.1633826
L. Tallini, S. Elmougy, B. Bose
In the ARQ (Automatic Retransmission Request) protocol, the sender keeps retransmitting a codeword until it receives a positive acknowledgment from the receiver sent through the feedback channel. This paper proposes Plain and Diversity Combining ARQ Hybrid protocol communication schemes suitable for the m(≥ 2)-ary asymmetric channel using t-Asymmetric Error Correcting/All Asymmetric Error Detecting (t-AEC/AAED) codes. The analysis shows that error correction definitely improves the throughput of the system compared to the ARQ protocol which uses only error detecting codes. The paper provides simple analytic expressions and bounds for the average number of retransmissions in both Plain and Diversity Combining t-AEC/AAED ARQ (t ≥ 0) protocol systems over the m-ary asymmetric channel, m ≥ 2. These can be applied into the design and analysis of error controlling schemes in practical systems such as VLSI and optical communications.
在ARQ(自动重传请求)协议中,发送方不断重传码字,直到收到通过反馈通道发送的接收方的肯定确认。采用t-非对称纠错/全非对称纠错(t-AEC/AAED)码,提出了适用于m(≥2)路非对称信道的Plain和Diversity - combined ARQ混合协议通信方案。分析表明,与仅使用错误检测码的ARQ协议相比,纠错明显提高了系统的吞吐量。本文给出了m-ary非对称信道m≥2上,Plain和Diversity -组合t- aec /AAED ARQ (t≥0)协议系统的平均重传次数的简单解析表达式和界。这些方法可用于超大规模集成电路和光通信等实际系统中误差控制方案的设计和分析。
{"title":"On Hybrid ARQ Protocol schemes over the m(≥ 2)-ary Asymmetric Channel","authors":"L. Tallini, S. Elmougy, B. Bose","doi":"10.1109/ITW.2006.1633826","DOIUrl":"https://doi.org/10.1109/ITW.2006.1633826","url":null,"abstract":"In the ARQ (Automatic Retransmission Request) protocol, the sender keeps retransmitting a codeword until it receives a positive acknowledgment from the receiver sent through the feedback channel. This paper proposes Plain and Diversity Combining ARQ Hybrid protocol communication schemes suitable for the m(≥ 2)-ary asymmetric channel using t-Asymmetric Error Correcting/All Asymmetric Error Detecting (t-AEC/AAED) codes. The analysis shows that error correction definitely improves the throughput of the system compared to the ARQ protocol which uses only error detecting codes. The paper provides simple analytic expressions and bounds for the average number of retransmissions in both Plain and Diversity Combining t-AEC/AAED ARQ (t ≥ 0) protocol systems over the m-ary asymmetric channel, m ≥ 2. These can be applied into the design and analysis of error controlling schemes in practical systems such as VLSI and optical communications.","PeriodicalId":293144,"journal":{"name":"2006 IEEE Information Theory Workshop - ITW '06 Punta del Este","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132503227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On Coding for 2-D Storage Systems 二维存储系统编码研究
Pub Date : 2006-03-13 DOI: 10.1109/ITW.2006.1633799
J. Wolf
In this paper we compare some aspects of the design and analysis of one-dimensional (1-D) and two-dimensional (2-D) storage systems. We show that for modulation codes and for the detection of signals corrupted by intersymbol interference and additive white Gaussian noise, the design and analysis is much more complicated in the 2-D case as compared with the 1-D case. However, we show that the reverse is true for the design of burst error correcting cyclic codes. That is, we show that one must carefully choose the generator polynomial to obtain a good 1-D burst error correcting code but using a cyclic product code, any arbitrary generator polynomials for the row code and for the column code can produce a good 2-D burst error correcting code.
在本文中,我们比较了一维(1-D)和二维(2-D)存储系统设计和分析的一些方面。我们表明,对于调制码以及被码间干扰和加性高斯白噪声破坏的信号的检测,二维情况下的设计和分析比一维情况要复杂得多。然而,我们证明了对于突发纠错循环码的设计是相反的。也就是说,我们表明必须仔细选择生成多项式以获得良好的一维突发纠错码,但使用循环积码,任何任意的行码和列码的生成多项式都可以产生良好的二维突发纠错码。
{"title":"On Coding for 2-D Storage Systems","authors":"J. Wolf","doi":"10.1109/ITW.2006.1633799","DOIUrl":"https://doi.org/10.1109/ITW.2006.1633799","url":null,"abstract":"In this paper we compare some aspects of the design and analysis of one-dimensional (1-D) and two-dimensional (2-D) storage systems. We show that for modulation codes and for the detection of signals corrupted by intersymbol interference and additive white Gaussian noise, the design and analysis is much more complicated in the 2-D case as compared with the 1-D case. However, we show that the reverse is true for the design of burst error correcting cyclic codes. That is, we show that one must carefully choose the generator polynomial to obtain a good 1-D burst error correcting code but using a cyclic product code, any arbitrary generator polynomials for the row code and for the column code can produce a good 2-D burst error correcting code.","PeriodicalId":293144,"journal":{"name":"2006 IEEE Information Theory Workshop - ITW '06 Punta del Este","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129324155","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A New Fast Density Evolution 一种新的快速密度演化
Pub Date : 2006-03-13 DOI: 10.1109/ITW.2006.1633807
Hui Jin, T. Richardson
Density evolution for LDPC codes predicts asymptotic performance and serves as a practical design tool for designing top performing structures [1]. Many papers advocate the use of exit chart methods and other approximations, proclaiming that density evolution is computationally too intensive. In this paper we show that this is not the case: we present a highly efficient and accurate implementation of density evolution for LDPC codes.
LDPC规范的密度演化预测了渐近性能,是设计高性能结构的实用设计工具[1]。许多论文主张使用出口图方法和其他近似方法,宣称密度演化的计算过于密集。在本文中,我们表明情况并非如此:我们提出了LDPC码的密度演化的高效和准确的实现。
{"title":"A New Fast Density Evolution","authors":"Hui Jin, T. Richardson","doi":"10.1109/ITW.2006.1633807","DOIUrl":"https://doi.org/10.1109/ITW.2006.1633807","url":null,"abstract":"Density evolution for LDPC codes predicts asymptotic performance and serves as a practical design tool for designing top performing structures [1]. Many papers advocate the use of exit chart methods and other approximations, proclaiming that density evolution is computationally too intensive. In this paper we show that this is not the case: we present a highly efficient and accurate implementation of density evolution for LDPC codes.","PeriodicalId":293144,"journal":{"name":"2006 IEEE Information Theory Workshop - ITW '06 Punta del Este","volume":"200 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123017292","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Iterative and One-shot Conferencing in Relay Channels 中继信道中的迭代和一次会议
Pub Date : 2006-03-13 DOI: 10.1109/ITW.2006.1633809
Chris T. K. Ng, I. Marić, A. Goldsmith, S. Shamai, R. Yates
We compare the rates of one-shot and iterative conferencing in a cooperative Gaussian relay channel. The relay and receiver cooperate via a conference, as introduced by Willems, in which they exchange a series of communications over orthogonal links. Under one-shot conferencing, decode-and-forward (DF) is capacity-achieving when the relay has a strong channel. On the other hand, Wyner-Ziv compress-and-forward (CF) approaches the cut-set bound when the conference link capacity is large. To contrast with one-shot conferencing, we consider a two-round iterative conference scheme; it comprises CF in the first round, and DF in the second. When the relay has a weak channel, the iterative scheme is disadvantageous. However, when the relay channel is strong, iterative cooperation, with optimal allocation of conferencing resources, outperforms one-shot cooperation provided that the conference link capacity is large. When precise allocation of conferencing resources is not possible, we consider iterative cooperation with symmetric conference links, and show that the iterative scheme still surpasses one-shot cooperation, albeit under more restricted conditions.
我们比较了合作高斯中继信道中一次会议和迭代会议的速率。正如Willems所介绍的那样,中继器和接收器通过一个会议进行合作,在这个会议中,它们通过正交链路交换一系列通信。在单次会议条件下,当中继具有强信道时,DF(译码转发)实现容量实现。另一方面,当会议链路容量较大时,Wyner-Ziv压缩转发(CF)逼近切集边界。与单次会议相比,我们考虑了两轮迭代会议方案;它由第一轮的CF和第二轮的DF组成。当中继具有弱信道时,迭代方案是不利的。但在中继信道较强的情况下,在会议链路容量较大的情况下,会议资源配置最优的迭代合作优于一次性合作。当会议资源无法精确分配时,我们考虑了对称会议链路的迭代合作,并证明了迭代方案仍然优于一次合作,尽管在更严格的条件下。
{"title":"Iterative and One-shot Conferencing in Relay Channels","authors":"Chris T. K. Ng, I. Marić, A. Goldsmith, S. Shamai, R. Yates","doi":"10.1109/ITW.2006.1633809","DOIUrl":"https://doi.org/10.1109/ITW.2006.1633809","url":null,"abstract":"We compare the rates of one-shot and iterative conferencing in a cooperative Gaussian relay channel. The relay and receiver cooperate via a conference, as introduced by Willems, in which they exchange a series of communications over orthogonal links. Under one-shot conferencing, decode-and-forward (DF) is capacity-achieving when the relay has a strong channel. On the other hand, Wyner-Ziv compress-and-forward (CF) approaches the cut-set bound when the conference link capacity is large. To contrast with one-shot conferencing, we consider a two-round iterative conference scheme; it comprises CF in the first round, and DF in the second. When the relay has a weak channel, the iterative scheme is disadvantageous. However, when the relay channel is strong, iterative cooperation, with optimal allocation of conferencing resources, outperforms one-shot cooperation provided that the conference link capacity is large. When precise allocation of conferencing resources is not possible, we consider iterative cooperation with symmetric conference links, and show that the iterative scheme still surpasses one-shot cooperation, albeit under more restricted conditions.","PeriodicalId":293144,"journal":{"name":"2006 IEEE Information Theory Workshop - ITW '06 Punta del Este","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123663024","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 45
The error exponent with delay for lossless source coding 带延迟的无损源编码误差指数
Pub Date : 2006-03-13 DOI: 10.1109/ITW.2006.1633822
Cheng Chang, A. Sahai
In channel coding, reliable communication takes place at rates below capacity at the fundamental cost of end-to-end delay. Error exponents tell us how much faster convergence is when we settle for less rate. For lossless source coding, entropy takes the place of capacity and error exponents tell us how much faster convergence is when we use more rate. While in channel coding without feedback the block error exponent is a good proxy for studying the more fundamental tradeoff with fixed end-to-end delay, it is not so in source coding. Block-coding error exponents are quite conservative (despite being tight!) when it comes to the tradeoff with delay. Nonblock codes can achieve much better performance with fixed delay and we present both the fundamental bound and how to achieve it in a delay-universal manner. The proof gives substance to Shannon's cryptic statement about how the duality between source and channel coding is like the duality between the past and the future.
在信道编码中,以端到端延迟为基本代价,以低于容量的速率进行可靠通信。误差指数告诉我们当我们满足于较低的速率时收敛速度有多快。对于无损源编码,熵取代了容量,误差指数告诉我们当我们使用更高的速率时收敛速度有多快。在没有反馈的信道编码中,块误差指数是研究端到端固定延迟的更基本的权衡的一个很好的代理,而在源编码中则不是这样。当涉及到与延迟的权衡时,块编码错误指数是相当保守的(尽管很严格!)。在固定延迟条件下,非分组码可以获得更好的性能,我们给出了基本边界以及如何以延迟通用的方式实现它。该证明为香农关于源和信道编码之间的二元性如何像过去和未来之间的二元性的神秘陈述提供了实质内容。
{"title":"The error exponent with delay for lossless source coding","authors":"Cheng Chang, A. Sahai","doi":"10.1109/ITW.2006.1633822","DOIUrl":"https://doi.org/10.1109/ITW.2006.1633822","url":null,"abstract":"In channel coding, reliable communication takes place at rates below capacity at the fundamental cost of end-to-end delay. Error exponents tell us how much faster convergence is when we settle for less rate. For lossless source coding, entropy takes the place of capacity and error exponents tell us how much faster convergence is when we use more rate. While in channel coding without feedback the block error exponent is a good proxy for studying the more fundamental tradeoff with fixed end-to-end delay, it is not so in source coding. Block-coding error exponents are quite conservative (despite being tight!) when it comes to the tradeoff with delay. Nonblock codes can achieve much better performance with fixed delay and we present both the fundamental bound and how to achieve it in a delay-universal manner. The proof gives substance to Shannon's cryptic statement about how the duality between source and channel coding is like the duality between the past and the future.","PeriodicalId":293144,"journal":{"name":"2006 IEEE Information Theory Workshop - ITW '06 Punta del Este","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121572403","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Fidelity of a Quantum ARQ Protocol 量子ARQ协议的保真度
Pub Date : 2006-03-13 DOI: 10.1109/ITW.2006.1633778
A. Ashikhmin
We consider a generalization of a classical ARQ protocol for the case of quantum error correcting codes and the quantum depolarizing channel. We define the fidelity of the ARQ protocol as the probability that the outcome of a measurement of the received quantum state is collinear to the transmitted quantum state, under the condition that the measurement outcome belongs to the code space. Further, we derive tight upper and lower bounds on the exponent of the fidelity of the ARQ protocol. The obtained bounds show a threshold behavior of the fidelity. Namely, in asymptotics, as the code length tends to infinity, the fidelity tends to either 1 or 0 depending on the code rate and the probability of error of the quantum depolarizing channel.
在量子纠错码和量子去极化信道的情况下,我们考虑了经典ARQ协议的推广。我们将ARQ协议的保真度定义为在测量结果属于码空间的条件下,接收量子态的测量结果与传输量子态共线的概率。进一步,我们推导出了ARQ协议保真度指数的紧上界和下界。得到的边界显示出保真度的阈值行为。也就是说,在渐近情况下,当码长趋于无穷大时,保真度根据量子去极化信道的码率和误差概率趋于1或0。
{"title":"Fidelity of a Quantum ARQ Protocol","authors":"A. Ashikhmin","doi":"10.1109/ITW.2006.1633778","DOIUrl":"https://doi.org/10.1109/ITW.2006.1633778","url":null,"abstract":"We consider a generalization of a classical ARQ protocol for the case of quantum error correcting codes and the quantum depolarizing channel. We define the fidelity of the ARQ protocol as the probability that the outcome of a measurement of the received quantum state is collinear to the transmitted quantum state, under the condition that the measurement outcome belongs to the code space. Further, we derive tight upper and lower bounds on the exponent of the fidelity of the ARQ protocol. The obtained bounds show a threshold behavior of the fidelity. Namely, in asymptotics, as the code length tends to infinity, the fidelity tends to either 1 or 0 depending on the code rate and the probability of error of the quantum depolarizing channel.","PeriodicalId":293144,"journal":{"name":"2006 IEEE Information Theory Workshop - ITW '06 Punta del Este","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125242153","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
List Decoding in Average-Case Complexity and Pseudorandomness 平均复杂度和伪随机的列表解码
Pub Date : 2006-03-13 DOI: 10.1109/ITW.2006.1633776
V. Guruswami
This is a brief survey into the applications of list decoding in complexity theory, specifically in relating the worst-case and average-case complexity of computational problems, and in construction of pseudorandom generators. Since we do not have space for full proofs, the aim is to give a flavor of the utility of list decoding in these settings together with pointers to where further details can be found.
本文简要介绍了列表解码在复杂性理论中的应用,特别是在计算问题的最坏情况和平均情况复杂性方面,以及在伪随机生成器的构造方面。由于我们没有足够的空间来提供完整的证明,因此我们的目的是在这些设置中提供列表解码的实用程序,以及可以找到进一步细节的指针。
{"title":"List Decoding in Average-Case Complexity and Pseudorandomness","authors":"V. Guruswami","doi":"10.1109/ITW.2006.1633776","DOIUrl":"https://doi.org/10.1109/ITW.2006.1633776","url":null,"abstract":"This is a brief survey into the applications of list decoding in complexity theory, specifically in relating the worst-case and average-case complexity of computational problems, and in construction of pseudorandom generators. Since we do not have space for full proofs, the aim is to give a flavor of the utility of list decoding in these settings together with pointers to where further details can be found.","PeriodicalId":293144,"journal":{"name":"2006 IEEE Information Theory Workshop - ITW '06 Punta del Este","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126081439","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
The Shortest Path Problem in the Bandit Setting 强盗环境下的最短路径问题
Pub Date : 2006-03-13 DOI: 10.1109/ITW.2006.1633787
A. György, T. Linder, G. Lugosi
The on-line shortest path problem is considered in the bandit setting. Given a weighted directed acyclic graph whose edge weights can change in an arbitrary way, a decision maker has to pick in each round a path between two distinguished vertices, such that the weight of this path, given as the sum of the weights of its composing edges, be as small as possible. The decision maker has only limited information on how the weights of the edges are generated. In particular, the edge weights in the current round are unknown to the decision maker when it chooses a path, and after choosing a path, it learns only the weights of those edges that belong to the chosen path. An algorithm is given whose average cumulative loss in n rounds exceeds that of the best path, matched off-line to the entire sequence of the edge weights, by a quantity that is proportional to 1/√n and depends only polynomially on the number of edges of the graph. The algorithm can be implemented with linear complexity in the number of rounds n and in the number of edges. This result improves earlier algorithms which have performance bounds that either depend exponentially on the number of edges or converge to zero at a slower rate than O(1/√n).
考虑了强盗环境下的在线最短路径问题。给定一个加权的有向无环图,其边的权值可以任意改变,决策者必须在每轮中选择两个不同顶点之间的路径,使该路径的权值尽可能小,即其组成边的权值之和。决策者对于如何生成边的权重只有有限的信息。特别是,决策者在选择路径时,当前回合的边权是未知的,在选择路径后,它只学习属于所选路径的那些边的权值。给出一种算法,其n轮的平均累积损失超过与整个边权序列离线匹配的最佳路径的损失,其数量与1/√n成正比,并且仅多项式地依赖于图的边数。该算法可以在轮数n和边数上实现线性复杂度。这个结果改进了早期的算法,这些算法的性能边界要么依赖于边缘数量的指数,要么以低于0(1/√n)的速度收敛到零。
{"title":"The Shortest Path Problem in the Bandit Setting","authors":"A. György, T. Linder, G. Lugosi","doi":"10.1109/ITW.2006.1633787","DOIUrl":"https://doi.org/10.1109/ITW.2006.1633787","url":null,"abstract":"The on-line shortest path problem is considered in the bandit setting. Given a weighted directed acyclic graph whose edge weights can change in an arbitrary way, a decision maker has to pick in each round a path between two distinguished vertices, such that the weight of this path, given as the sum of the weights of its composing edges, be as small as possible. The decision maker has only limited information on how the weights of the edges are generated. In particular, the edge weights in the current round are unknown to the decision maker when it chooses a path, and after choosing a path, it learns only the weights of those edges that belong to the chosen path. An algorithm is given whose average cumulative loss in n rounds exceeds that of the best path, matched off-line to the entire sequence of the edge weights, by a quantity that is proportional to 1/√n and depends only polynomially on the number of edges of the graph. The algorithm can be implemented with linear complexity in the number of rounds n and in the number of edges. This result improves earlier algorithms which have performance bounds that either depend exponentially on the number of edges or converge to zero at a slower rate than O(1/√n).","PeriodicalId":293144,"journal":{"name":"2006 IEEE Information Theory Workshop - ITW '06 Punta del Este","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130257562","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
On the Coding Advantage of Multiple Unicast Sessions in Undirected Graphs 论无向图中多单播会话的编码优势
Pub Date : 2006-03-13 DOI: 10.1109/ITW.2006.1633813
K. Jain, V. Vazirani, G. Yuval
Li and Li conjectured that in an undirected network with multiple unicast sessions, network coding does not lead to any coding gain. Surprisingly enough, so far this conjecture could not be verified even for the simple network consisting of K3,2with four source-sink pairs. Using entropy calculus, we provide the first verification of the Li-Li conjecture for this network. We extend our bound to the case of an arbitrary directed bipartite network.
Li和Li推测,在具有多个单播会话的无向网络中,网络编码不会导致任何编码增益。令人惊讶的是,到目前为止,即使是由k3,2和四个源-汇对组成的简单网络,也无法验证这一猜想。利用熵演算,我们首次验证了该网络的Li-Li猜想。我们将边界推广到任意有向二部网络的情况。
{"title":"On the Coding Advantage of Multiple Unicast Sessions in Undirected Graphs","authors":"K. Jain, V. Vazirani, G. Yuval","doi":"10.1109/ITW.2006.1633813","DOIUrl":"https://doi.org/10.1109/ITW.2006.1633813","url":null,"abstract":"Li and Li conjectured that in an undirected network with multiple unicast sessions, network coding does not lead to any coding gain. Surprisingly enough, so far this conjecture could not be verified even for the simple network consisting of K3,2with four source-sink pairs. Using entropy calculus, we provide the first verification of the Li-Li conjecture for this network. We extend our bound to the case of an arbitrary directed bipartite network.","PeriodicalId":293144,"journal":{"name":"2006 IEEE Information Theory Workshop - ITW '06 Punta del Este","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128203874","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Upper bounds for a Commutative Group Code 交换群码的上界
Pub Date : 2006-03-13 DOI: 10.1109/ITW.2006.1633828
R. M. Siqueira, S. Costa
Good spherical codes have large minimum squared distance. An important quota in the theory of spherical codes is the maximum number of points M(n, rho) displayed on the sphere Sn-1, having a minimum squared distance rho. The aim of this work is to study this problem within the class of group codes. We establish a bound for the number of points of a commutative group code in dimension even.
好的球形代码具有较大的最小平方距离。球码理论中的一个重要指标是在球Sn-1上显示的点的最大数目M(n, rho)具有最小平方距离rho。本文的目的是在群码的范畴内研究这一问题。建立了偶维交换群码的点个数的界。
{"title":"Upper bounds for a Commutative Group Code","authors":"R. M. Siqueira, S. Costa","doi":"10.1109/ITW.2006.1633828","DOIUrl":"https://doi.org/10.1109/ITW.2006.1633828","url":null,"abstract":"Good spherical codes have large minimum squared distance. An important quota in the theory of spherical codes is the maximum number of points M(n, rho) displayed on the sphere Sn-1, having a minimum squared distance rho. The aim of this work is to study this problem within the class of group codes. We establish a bound for the number of points of a commutative group code in dimension even.","PeriodicalId":293144,"journal":{"name":"2006 IEEE Information Theory Workshop - ITW '06 Punta del Este","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134408488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2006 IEEE Information Theory Workshop - ITW '06 Punta del Este
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1