首页 > 最新文献

2012 IEEE Information Theory Workshop最新文献

英文 中文
To code or not to code: Revisited 写代码还是不写代码:重访
Pub Date : 2012-12-01 DOI: 10.1109/ITW.2012.6404746
V. Kostina, S. Verdú
We revisit the dilemma of whether one should or should not code when operating under delay constraints. In those curious cases when the source and the channel are probabilistically matched so that symbol-by-symbol coding is optimal in terms of the average distortion achieved, we show that it also achieves the dispersion of joint source-channel coding. Moreover, even in the absence of such probabilistic matching between the source and the channel, symbol-by-symbol transmission, though asymptotically suboptimal, might outperform not only separate source-channel coding but also the best known random-coding joint source-channel coding achievability bound in the finite blocklength regime.
我们重新审视在延迟约束下操作时是否应该编码的困境。在那些奇怪的情况下,当源和信道是概率匹配的,以便逐符号编码在实现的平均失真方面是最佳的,我们表明它也实现了联合源信道编码的色散。此外,即使在源和信道之间没有这种概率匹配的情况下,逐符号传输虽然是渐近次优的,但可能不仅优于单独的源信道编码,而且优于在有限块长度制度下最著名的随机编码联合源信道编码的可实现性界限。
{"title":"To code or not to code: Revisited","authors":"V. Kostina, S. Verdú","doi":"10.1109/ITW.2012.6404746","DOIUrl":"https://doi.org/10.1109/ITW.2012.6404746","url":null,"abstract":"We revisit the dilemma of whether one should or should not code when operating under delay constraints. In those curious cases when the source and the channel are probabilistically matched so that symbol-by-symbol coding is optimal in terms of the average distortion achieved, we show that it also achieves the dispersion of joint source-channel coding. Moreover, even in the absence of such probabilistic matching between the source and the channel, symbol-by-symbol transmission, though asymptotically suboptimal, might outperform not only separate source-channel coding but also the best known random-coding joint source-channel coding achievability bound in the finite blocklength regime.","PeriodicalId":325771,"journal":{"name":"2012 IEEE Information Theory Workshop","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114806416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Aspect of security in the cognitive relay assisted interference channels 认知中继辅助干扰通道安全方面的研究
Pub Date : 2012-12-01 DOI: 10.1109/ITW.2012.6404758
Md. Zahurul I. Sarkar, T. Ratnarajah
We consider the problem of secret communication through cognitive relay assisted interference channels where the secondary users are allowed to transmit simultaneously with the primary users over the same channel in the presence of an eavesdropper. At first, we investigate the effect of diversity in enhancing security of the cognitive interference channels with multiple relays. Then, the performance of cognitive relay beamforming system is optimized in such a way that the eavesdropper gets zero bits of information maintaining interferences at the primary receiver under a certain threshold. Finally, we characterize secrecy rate at the primary and secondary receivers compensating interferences using zero-forcing (ZF) precoding at the cognitive relay.
我们考虑了通过认知中继辅助干扰信道进行秘密通信的问题,在这种信道中,允许辅助用户在窃听者存在的情况下与主用户在同一信道上同时传输。首先,我们研究了分集对多中继认知干扰信道安全性的增强作用。然后,对认知中继波束形成系统的性能进行优化,使窃听者在一定阈值下获得零比特信息,并在主接收端保持干扰。最后,我们描述了在认知中继中使用零强迫(ZF)预编码补偿干扰的主、从接收机的保密率。
{"title":"Aspect of security in the cognitive relay assisted interference channels","authors":"Md. Zahurul I. Sarkar, T. Ratnarajah","doi":"10.1109/ITW.2012.6404758","DOIUrl":"https://doi.org/10.1109/ITW.2012.6404758","url":null,"abstract":"We consider the problem of secret communication through cognitive relay assisted interference channels where the secondary users are allowed to transmit simultaneously with the primary users over the same channel in the presence of an eavesdropper. At first, we investigate the effect of diversity in enhancing security of the cognitive interference channels with multiple relays. Then, the performance of cognitive relay beamforming system is optimized in such a way that the eavesdropper gets zero bits of information maintaining interferences at the primary receiver under a certain threshold. Finally, we characterize secrecy rate at the primary and secondary receivers compensating interferences using zero-forcing (ZF) precoding at the cognitive relay.","PeriodicalId":325771,"journal":{"name":"2012 IEEE Information Theory Workshop","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121858007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Achievable rate regions for compound multiple access channel with channel state information 具有信道状态信息的复合多址信道的可实现速率区域
Pub Date : 2012-09-03 DOI: 10.1109/ITW.2012.6404764
Mostafa Monemizadeh, G. Hodtani
We study the two-user discrete memoryless compound multiple access channel (MAC) with common message and two specially correlated channel states each known non-causally by one of the encoders. Two channel states are correlated in the sense of Slepian-Wolf (SW) in which two correlated states are modeled by three independent states: a common state and two private states. By using superposition coding, binning scheme and jointly decoding, we propose several achievable rates for various cases of the two-user compound MAC with non-causal Slepian-Wolf channel states available at encoders and common message or conferencing encoders. Also, we show that the obtained achievable rate regions are optimal when perfect states are known at both decoders as well.
研究了一种双用户离散无记忆复合多址信道(MAC),该信道具有共同的消息和两个特殊相关的信道状态,每个状态由一个编码器非因果地知道。两个通道状态在睡眠-狼(SW)的意义上是相关的,其中两个相关状态由三个独立的状态建模:一个公共状态和两个私有状态。通过使用叠加编码、分组和联合解码,我们提出了在编码器和公共消息或会议编码器上具有非因果睡眠-狼信道状态的双用户复合MAC的各种情况下可以实现的几种速率。此外,我们还表明,当两个解码器的完美状态都已知时,所获得的可实现速率区域是最优的。
{"title":"Achievable rate regions for compound multiple access channel with channel state information","authors":"Mostafa Monemizadeh, G. Hodtani","doi":"10.1109/ITW.2012.6404764","DOIUrl":"https://doi.org/10.1109/ITW.2012.6404764","url":null,"abstract":"We study the two-user discrete memoryless compound multiple access channel (MAC) with common message and two specially correlated channel states each known non-causally by one of the encoders. Two channel states are correlated in the sense of Slepian-Wolf (SW) in which two correlated states are modeled by three independent states: a common state and two private states. By using superposition coding, binning scheme and jointly decoding, we propose several achievable rates for various cases of the two-user compound MAC with non-causal Slepian-Wolf channel states available at encoders and common message or conferencing encoders. Also, we show that the obtained achievable rate regions are optimal when perfect states are known at both decoders as well.","PeriodicalId":325771,"journal":{"name":"2012 IEEE Information Theory Workshop","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122802650","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Sequential normalized maximum likelihood in log-loss prediction 对数损失预测中的顺序归一化最大似然
Pub Date : 2012-09-01 DOI: 10.1109/ITW.2012.6404734
W. Kotłowski, P. Grünwald
The paper considers sequential prediction of individual sequences with log loss using an exponential family of distributions. We first show that the commonly used maximum likelihood strategy is suboptimal and requires an additional assumption about boundedness of the data sequence. We then show that both problems can be be addressed by adding the currently predicted outcome to the calculation of the maximum likelihood, followed by normalization of the distribution. The strategy obtained in this way is known in the literature as the sequential normalized maximum likelihood (SNML) strategy. We show that for general exponential families, the regret is bounded by the familiar (k/2)logn and thus optimal up to O(1). We also introduce an approximation to SNML, flattened maximum likelihood, much easier to compute that SNML itself, while retaining the optimal regret under some additional assumptions. We finally discuss the relationship to the Bayes strategy with Jeffreys' prior.
利用指数族分布研究具有对数损失的单个序列的序贯预测。我们首先证明了常用的最大似然策略是次优的,并且需要一个关于数据序列有界性的额外假设。然后,我们表明,这两个问题都可以通过将当前预测的结果添加到最大似然的计算中,然后对分布进行归一化来解决。以这种方式获得的策略在文献中称为顺序规范化最大似然(SNML)策略。我们表明,对于一般指数族,遗憾是由熟悉的(k/2)logn的边界,因此最优到O(1)。我们还引入了SNML的近似值,即扁平化的最大似然,更容易计算SNML本身,同时在一些额外的假设下保留了最优后悔。最后讨论了与Jeffreys先验的贝叶斯策略的关系。
{"title":"Sequential normalized maximum likelihood in log-loss prediction","authors":"W. Kotłowski, P. Grünwald","doi":"10.1109/ITW.2012.6404734","DOIUrl":"https://doi.org/10.1109/ITW.2012.6404734","url":null,"abstract":"The paper considers sequential prediction of individual sequences with log loss using an exponential family of distributions. We first show that the commonly used maximum likelihood strategy is suboptimal and requires an additional assumption about boundedness of the data sequence. We then show that both problems can be be addressed by adding the currently predicted outcome to the calculation of the maximum likelihood, followed by normalization of the distribution. The strategy obtained in this way is known in the literature as the sequential normalized maximum likelihood (SNML) strategy. We show that for general exponential families, the regret is bounded by the familiar (k/2)logn and thus optimal up to O(1). We also introduce an approximation to SNML, flattened maximum likelihood, much easier to compute that SNML itself, while retaining the optimal regret under some additional assumptions. We finally discuss the relationship to the Bayes strategy with Jeffreys' prior.","PeriodicalId":325771,"journal":{"name":"2012 IEEE Information Theory Workshop","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124441779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
On random binning versus conditional codebook methods in multiple descriptions coding 多描述编码中随机分组与条件码本方法的比较
Pub Date : 2012-09-01 DOI: 10.1109/ITW.2012.6404683
E. Akyol, Kumar Viswanatha, K. Rose
There are two common types of encoding paradigms in multiple descriptions (MD) coding: i) an approach based on conditional codebook generation, which was originally initiated by El-Gamal and Cover for the 2 channel setting and later extended to more than 2 channels by Venkataramani, Kramer and Goyal (VKG), ii) and an approach based on Slepian and Wolf's random binning technique, proposed by Pradhan, Puri and Ramchandran (PPR) for L >; 2 descriptions. It is well known that the achievable region due to PPR subsumes the VKG region for the symmetric Gaussian MD problem. Motivated by several practical advantages of random binning based methods over the conditional codebook encoding, this paper focuses on the following important questions: Does a random binning based scheme achieve the performance of conditional codebook encoding, even for the 2 descriptions scenario? Are random binning based approaches beneficial for settings that are not fully symmetric? This paper answers both these questions in the affirmative. Specifically, we propose a 2 descriptions coding scheme, based on random binning, which subsumes the currently known largest region for this problem due to Zhang and Berger. Moreover, we propose its extensions to L >; 2 channels and derive the associated achievable regions. The proposed scheme enjoys the advantages of both encoding paradigms making it particularly useful when there is symmetry only within a subset of the descriptions.
多描述(MD)编码中有两种常见的编码范式:i)基于条件码本生成的方法,最初由El-Gamal和Cover提出,用于2通道设置,后来由Venkataramani, Kramer和Goyal (VKG)扩展到2通道以上;ii)基于Slepian和Wolf的随机分箱技术的方法,由Pradhan, Puri和Ramchandran (PPR)提出,用于L >;2描述。众所周知,对于对称高斯MD问题,由于PPR的可实现区域包含了VKG区域。由于基于随机分组的方法相对于条件码本编码的几个实际优势,本文主要关注以下重要问题:基于随机分组的方案是否能够达到条件码本编码的性能,即使是在2个描述场景下?基于随机分组的方法对不完全对称的设置有益吗?本文对这两个问题都作了肯定的回答。具体来说,我们提出了一种基于随机分组的2描述编码方案,该方案包含了Zhang和Berger提出的目前已知的针对该问题的最大区域。并将其推广到L >;2个通道并推导出相关的可实现区域。所提出的方案具有两种编码范式的优点,使其在仅在描述的子集中存在对称性时特别有用。
{"title":"On random binning versus conditional codebook methods in multiple descriptions coding","authors":"E. Akyol, Kumar Viswanatha, K. Rose","doi":"10.1109/ITW.2012.6404683","DOIUrl":"https://doi.org/10.1109/ITW.2012.6404683","url":null,"abstract":"There are two common types of encoding paradigms in multiple descriptions (MD) coding: i) an approach based on conditional codebook generation, which was originally initiated by El-Gamal and Cover for the 2 channel setting and later extended to more than 2 channels by Venkataramani, Kramer and Goyal (VKG), ii) and an approach based on Slepian and Wolf's random binning technique, proposed by Pradhan, Puri and Ramchandran (PPR) for L >; 2 descriptions. It is well known that the achievable region due to PPR subsumes the VKG region for the symmetric Gaussian MD problem. Motivated by several practical advantages of random binning based methods over the conditional codebook encoding, this paper focuses on the following important questions: Does a random binning based scheme achieve the performance of conditional codebook encoding, even for the 2 descriptions scenario? Are random binning based approaches beneficial for settings that are not fully symmetric? This paper answers both these questions in the affirmative. Specifically, we propose a 2 descriptions coding scheme, based on random binning, which subsumes the currently known largest region for this problem due to Zhang and Berger. Moreover, we propose its extensions to L >; 2 channels and derive the associated achievable regions. The proposed scheme enjoys the advantages of both encoding paradigms making it particularly useful when there is symmetry only within a subset of the descriptions.","PeriodicalId":325771,"journal":{"name":"2012 IEEE Information Theory Workshop","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123261516","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Communication amid uncertainty 不确定环境下的沟通
Pub Date : 2012-09-01 DOI: 10.1109/ITW.2012.6404647
M. Sudan
The classical theory of communication, starting with the work of Shannon, has always that assumed the meaning of the messages being exchanged is known to the sender and receiver. This assumption set aside a tricky issue and allowed the theory to focus on the more pressing engineering problem of the time - namely communicating the bits efficiently and reliably. In the current times, we see increasing evidence that this question can no longer be set aside. On the one hand, communication of the bits have become very reliable, so reliability is no longer the pressing concern today. On the other hand, increasingly these bits are operated on by computers or mechanical devices. In such settings it becomes essential that the computers and machines know what the bits mean. In this article intended to accompany a talk to be given at the workshop, we describe some of our attempts to extract the notion of meaning, and the challenges this task poses. Meaning is best understood by focussing on the phenomenon of “misunderstanding”, i.e., when the receiver does not understand what the sender says. Misunderstanding, in turn, seems to emerge principally from “uncertainty”: Senders and receivers are uncertain about what the other knows/believes. We illustrate the problem in a simple setting, before moving on to describing our attempts to tackle the general complex task. Based on joint works with Brendan Juba (Harvard), Oded Goldreich (Weizmann), Adam Kalai (MSR New England), and Sanjeev Khanna (U. Penn.).
从香农的工作开始,经典的通信理论一直假设被交换的信息的意义是发送者和接收者都知道的。这一假设搁置了一个棘手的问题,使该理论能够专注于当时更紧迫的工程问题——即有效、可靠地传输比特。在当前时代,我们看到越来越多的证据表明,这个问题不能再被搁置一边。一方面,比特的通信已经变得非常可靠,因此可靠性不再是当今迫切关注的问题。另一方面,这些比特越来越多地由计算机或机械设备操作。在这种情况下,计算机和机器必须知道比特的含义。在这篇文章中,我们描述了我们提取意义概念的一些尝试,以及这项任务带来的挑战。通过关注“误解”现象,即接收者不理解发送者所说的话,可以最好地理解意思。误解,反过来,似乎主要来自“不确定性”:发送者和接收者不确定对方知道/相信什么。在继续描述如何处理一般复杂任务之前,我们先用一个简单的环境来说明这个问题。基于与Brendan Juba(哈佛),Oded Goldreich(魏茨曼),Adam Kalai (MSR新英格兰)和Sanjeev Khanna(宾夕法尼亚大学)的合作作品。
{"title":"Communication amid uncertainty","authors":"M. Sudan","doi":"10.1109/ITW.2012.6404647","DOIUrl":"https://doi.org/10.1109/ITW.2012.6404647","url":null,"abstract":"The classical theory of communication, starting with the work of Shannon, has always that assumed the meaning of the messages being exchanged is known to the sender and receiver. This assumption set aside a tricky issue and allowed the theory to focus on the more pressing engineering problem of the time - namely communicating the bits efficiently and reliably. In the current times, we see increasing evidence that this question can no longer be set aside. On the one hand, communication of the bits have become very reliable, so reliability is no longer the pressing concern today. On the other hand, increasingly these bits are operated on by computers or mechanical devices. In such settings it becomes essential that the computers and machines know what the bits mean. In this article intended to accompany a talk to be given at the workshop, we describe some of our attempts to extract the notion of meaning, and the challenges this task poses. Meaning is best understood by focussing on the phenomenon of “misunderstanding”, i.e., when the receiver does not understand what the sender says. Misunderstanding, in turn, seems to emerge principally from “uncertainty”: Senders and receivers are uncertain about what the other knows/believes. We illustrate the problem in a simple setting, before moving on to describing our attempts to tackle the general complex task. Based on joint works with Brendan Juba (Harvard), Oded Goldreich (Weizmann), Adam Kalai (MSR New England), and Sanjeev Khanna (U. Penn.).","PeriodicalId":325771,"journal":{"name":"2012 IEEE Information Theory Workshop","volume":"379 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126725286","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Secret-key agreement over a non-coherent block-fading MIMO wiretap channel 非相干块衰落MIMO窃听信道上的密钥协议
Pub Date : 2012-09-01 DOI: 10.1109/ITW.2012.6404646
Mattias Andersson, A. Khisti, M. Skoglund
We study secret-key agreement over a non-coherent block-fading multiple input multiple output (MIMO) wiretap channel. We give an achievable scheme based on training and source emulation and analyze the rate in the high SNR regime. Based on this analysis we find the optimal number of antennas to use for training. Our main result is that if the sum of the number of antennas at Alice and Bob is larger than the coherence time of the channel, the achievable rate does not depend on the number of antennas at Eve. In this case source emulation is not needed, and using only training is optimal. We also consider the case when there is no public channel available. In this case we show that secret-key agreement is still possible by using the wireless channel for discussion, giving the same number of secure degrees of freedom as in the case with a public channel.
我们研究了非相干块衰落多输入多输出(MIMO)窃听信道上的密钥协议。给出了一种基于训练和源仿真的可实现方案,并对高信噪比下的速率进行了分析。基于此分析,我们找到了用于训练的最佳天线数量。我们的主要结果是,如果Alice和Bob处的天线数量之和大于信道的相干时间,则可实现的速率不依赖于Eve处的天线数量。在这种情况下,不需要源仿真,只使用训练是最优的。我们也会考虑没有公共频道的情况。在这种情况下,我们表明,通过使用无线信道进行讨论,仍然可以实现密钥协议,并提供与公共信道相同数量的安全自由度。
{"title":"Secret-key agreement over a non-coherent block-fading MIMO wiretap channel","authors":"Mattias Andersson, A. Khisti, M. Skoglund","doi":"10.1109/ITW.2012.6404646","DOIUrl":"https://doi.org/10.1109/ITW.2012.6404646","url":null,"abstract":"We study secret-key agreement over a non-coherent block-fading multiple input multiple output (MIMO) wiretap channel. We give an achievable scheme based on training and source emulation and analyze the rate in the high SNR regime. Based on this analysis we find the optimal number of antennas to use for training. Our main result is that if the sum of the number of antennas at Alice and Bob is larger than the coherence time of the channel, the achievable rate does not depend on the number of antennas at Eve. In this case source emulation is not needed, and using only training is optimal. We also consider the case when there is no public channel available. In this case we show that secret-key agreement is still possible by using the wireless channel for discussion, giving the same number of secure degrees of freedom as in the case with a public channel.","PeriodicalId":325771,"journal":{"name":"2012 IEEE Information Theory Workshop","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126847120","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Results on combinatorial joint source-channel coding 组合联合信信道编码的结果
Pub Date : 2012-09-01 DOI: 10.1109/ITW.2012.6404637
Y. Kochman, A. Mazumdar, Yury Polyanskiy
This paper continues the investigation of the combinatorial formulation of the joint source-channel coding problem. In particular, the connections are drawn to error-reducing codes, isometric embeddings and list-decodable codes. The optimal performance for the repetition construction is derived and is shown to be achievable by low complexity Markov decoders. The compound variation of the problem is proposed and some initial results are put forward.
本文继续研究联合信源信道编码问题的组合形式。特别是,这些连接被绘制到减少错误的代码、等距嵌入和列表可解码的代码。推导了重复构造的最佳性能,并证明了低复杂度马尔可夫解码器可以实现。提出了该问题的复合变分,并给出了一些初步结果。
{"title":"Results on combinatorial joint source-channel coding","authors":"Y. Kochman, A. Mazumdar, Yury Polyanskiy","doi":"10.1109/ITW.2012.6404637","DOIUrl":"https://doi.org/10.1109/ITW.2012.6404637","url":null,"abstract":"This paper continues the investigation of the combinatorial formulation of the joint source-channel coding problem. In particular, the connections are drawn to error-reducing codes, isometric embeddings and list-decodable codes. The optimal performance for the repetition construction is derived and is shown to be achievable by low complexity Markov decoders. The compound variation of the problem is proposed and some initial results are put forward.","PeriodicalId":325771,"journal":{"name":"2012 IEEE Information Theory Workshop","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129598945","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Gaussian wiretap channel with a batteryless energy harvesting transmitter 高斯窃听信道与一个无电池能量收集发射器
Pub Date : 2012-09-01 DOI: 10.1109/ITW.2012.6404771
Omur Ozel, E. Ekrem, S. Ulukus
We study the Gaussian wiretap channel with an energy harvesting transmitter which does not have a battery to save energy. In the absence of a battery, the necessary transmission energy is maintained by an i.i.d. energy arrival process. We observe that this channel is an instance of the state-dependent wiretap channel with state available only to the transmitter causally, where the state is the available energy at the transmitter. We prove that the entire capacity-equivocation region can be obtained by single-letter Shannon strategies and its boundary is achieved by input distributions with support set of Lebesgue measure zero.
我们研究了高斯窃听信道与能量收集发射机,它没有电池,以节省能源。在没有电池的情况下,必要的传输能量由i.i.d能量到达过程来维持。我们观察到,该信道是状态相关窃听信道的一个实例,其状态仅对发射机可用,其中状态是发射机的可用能量。我们证明了用单字母香农策略可以得到整个能力模糊区域,其边界由支持集为勒贝格测度为零的输入分布得到。
{"title":"Gaussian wiretap channel with a batteryless energy harvesting transmitter","authors":"Omur Ozel, E. Ekrem, S. Ulukus","doi":"10.1109/ITW.2012.6404771","DOIUrl":"https://doi.org/10.1109/ITW.2012.6404771","url":null,"abstract":"We study the Gaussian wiretap channel with an energy harvesting transmitter which does not have a battery to save energy. In the absence of a battery, the necessary transmission energy is maintained by an i.i.d. energy arrival process. We observe that this channel is an instance of the state-dependent wiretap channel with state available only to the transmitter causally, where the state is the available energy at the transmitter. We prove that the entire capacity-equivocation region can be obtained by single-letter Shannon strategies and its boundary is achieved by input distributions with support set of Lebesgue measure zero.","PeriodicalId":325771,"journal":{"name":"2012 IEEE Information Theory Workshop","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128423969","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Uniform random number generation by using sparse matrix 利用稀疏矩阵生成均匀随机数
Pub Date : 2012-09-01 DOI: 10.1109/ITW.2012.6404748
J. Muramatsu, S. Miyake
We investigate the problem of (independent) uniform random number generation and secret key agreement. A generator for the (independent) uniform random numbers is constructed by using a sparse matrix and it is applied to a secret key agreement protocol with strong secrecy. It is proved that the rate of the proposed codes can achieve the fundamental limits.
研究了(独立的)一致随机数生成和密钥协议问题。利用稀疏矩阵构造了(独立)一致随机数生成器,并将其应用于具有强保密性的密钥协议中。实验证明,所提出的码率可以达到基本极限。
{"title":"Uniform random number generation by using sparse matrix","authors":"J. Muramatsu, S. Miyake","doi":"10.1109/ITW.2012.6404748","DOIUrl":"https://doi.org/10.1109/ITW.2012.6404748","url":null,"abstract":"We investigate the problem of (independent) uniform random number generation and secret key agreement. A generator for the (independent) uniform random numbers is constructed by using a sparse matrix and it is applied to a secret key agreement protocol with strong secrecy. It is proved that the rate of the proposed codes can achieve the fundamental limits.","PeriodicalId":325771,"journal":{"name":"2012 IEEE Information Theory Workshop","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114307501","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
期刊
2012 IEEE Information Theory Workshop
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1