首页 > 最新文献

2012 IEEE Information Theory Workshop最新文献

英文 中文
On channel capacity of communication via antenna arrays with receiver noise matching 考虑接收机噪声匹配的天线阵列通信信道容量研究
Pub Date : 2012-09-01 DOI: 10.1109/ITW.2012.6404701
R. Müller, B. Godana, M. A. Sedaghat, J. Huber
We consider the total capacity of a Gaussian multiple-access MIMO channel with a linear array of R receive antennas and T distributed transmit antennas. If the spatial distribution of transmit antennas weighed by their path loss and marginalized to a sphere around the receive array is proportional to the ratio of receive antenna directivity to transmit antenna directivity, the capacity is shown to approach Rlog(1 + SNR) as T → ∞, irrespective of the inter-element distance at the receiver.We further show that the capacity for other distributions of transmit antennas can be even greater, as the inter-element distance approaches zero.
我们考虑了一个由R个接收天线和T个分布发射天线组成的线性阵列的高斯多址MIMO信道的总容量。如果以发射天线的路径损耗为权重并边缘到接收阵列周围的一个球体的发射天线的空间分布与接收天线的方向性与发射天线的方向性之比成正比,则无论接收器处的元间距离如何,其容量都接近于Rlog(1 + SNR) = T→∞。我们进一步表明,当元件间距离接近于零时,其他发射天线分布的容量可能更大。
{"title":"On channel capacity of communication via antenna arrays with receiver noise matching","authors":"R. Müller, B. Godana, M. A. Sedaghat, J. Huber","doi":"10.1109/ITW.2012.6404701","DOIUrl":"https://doi.org/10.1109/ITW.2012.6404701","url":null,"abstract":"We consider the total capacity of a Gaussian multiple-access MIMO channel with a linear array of R receive antennas and T distributed transmit antennas. If the spatial distribution of transmit antennas weighed by their path loss and marginalized to a sphere around the receive array is proportional to the ratio of receive antenna directivity to transmit antenna directivity, the capacity is shown to approach Rlog(1 + SNR) as T → ∞, irrespective of the inter-element distance at the receiver.We further show that the capacity for other distributions of transmit antennas can be even greater, as the inter-element distance approaches zero.","PeriodicalId":325771,"journal":{"name":"2012 IEEE Information Theory Workshop","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125746595","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Optimal reliability over a class of binary-input channels with feedback 一类带反馈的二元输入信道的最优可靠性
Pub Date : 2012-09-01 DOI: 10.1109/ITW.2012.6404700
Mohammad Naghshvar, M. Wigger, T. Javidi
This paper considers the problem of variable-length coding over a binary-input channel with noiseless feedback. A deterministic sequential coding scheme is proposed and shown to attain the optimal error exponent for any binary-input channel whose capacity is achieved by the uniform input distribution. The proposed scheme is deterministic and has only one phase of operation, in contrast to all previous coding schemes that achieve the optimal error exponent.
研究了具有无噪声反馈的二值输入信道上的变长编码问题。本文提出了一种确定性序列编码方案,并证明了该方案能够获得任意二值输入信道的最优误差指数,该信道的容量由均匀输入分布决定。与以往所有实现最优误差指数的编码方案相比,该方案具有确定性,并且只有一个阶段的操作。
{"title":"Optimal reliability over a class of binary-input channels with feedback","authors":"Mohammad Naghshvar, M. Wigger, T. Javidi","doi":"10.1109/ITW.2012.6404700","DOIUrl":"https://doi.org/10.1109/ITW.2012.6404700","url":null,"abstract":"This paper considers the problem of variable-length coding over a binary-input channel with noiseless feedback. A deterministic sequential coding scheme is proposed and shown to attain the optimal error exponent for any binary-input channel whose capacity is achieved by the uniform input distribution. The proposed scheme is deterministic and has only one phase of operation, in contrast to all previous coding schemes that achieve the optimal error exponent.","PeriodicalId":325771,"journal":{"name":"2012 IEEE Information Theory Workshop","volume":"509 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115891004","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Network coding with computation alignment 网络编码与计算对齐
Pub Date : 2012-09-01 DOI: 10.1109/ITW.2012.6404725
Naveen Goela, Changho Suh, M. Gastpar
Determining the capacity of multi-receiver networks with arbitrary message demands is an open problem in the network coding literature. In this paper, we consider a multi-source, multi-receiver symmetric deterministic network model parameterized by channel coefficients (inspired by wireless network flow) in which the receivers compute a sum of the symbols generated at the sources. Scalar and vector linear coding strategies are analyzed. It is shown that computation alignment over finite field vector spaces is necessary to achieve the computation capacities in the network. To aid in the construction of coding strategies, network equivalence theorems are established for the decomposition of deterministic models into elementary sub-networks. The linear coding capacity for computation is characterized for all channel parameters considered in the model for a countably infinite class of networks. The constructive coding schemes introduced herein for a specific class of networks provide an optimistic viewpoint for the application of structured codes in network communication.
确定具有任意消息需求的多接收网络的容量是网络编码文献中的一个开放性问题。在本文中,我们考虑了一个由信道系数参数化的多源、多接收机对称确定性网络模型(受无线网络流的启发),其中接收机计算源处产生的符号的和。分析了标量和矢量线性编码策略。结果表明,在有限场向量空间上进行计算对齐是实现网络计算能力的必要条件。为了帮助编码策略的构建,建立了将确定性模型分解为基本子网络的网络等价定理。对一类可数无限网络,对模型中所考虑的所有信道参数的线性编码计算能力进行了表征。本文介绍的针对特定网络类型的结构化编码方案为结构化编码在网络通信中的应用提供了一个乐观的观点。
{"title":"Network coding with computation alignment","authors":"Naveen Goela, Changho Suh, M. Gastpar","doi":"10.1109/ITW.2012.6404725","DOIUrl":"https://doi.org/10.1109/ITW.2012.6404725","url":null,"abstract":"Determining the capacity of multi-receiver networks with arbitrary message demands is an open problem in the network coding literature. In this paper, we consider a multi-source, multi-receiver symmetric deterministic network model parameterized by channel coefficients (inspired by wireless network flow) in which the receivers compute a sum of the symbols generated at the sources. Scalar and vector linear coding strategies are analyzed. It is shown that computation alignment over finite field vector spaces is necessary to achieve the computation capacities in the network. To aid in the construction of coding strategies, network equivalence theorems are established for the decomposition of deterministic models into elementary sub-networks. The linear coding capacity for computation is characterized for all channel parameters considered in the model for a countably infinite class of networks. The constructive coding schemes introduced herein for a specific class of networks provide an optimistic viewpoint for the application of structured codes in network communication.","PeriodicalId":325771,"journal":{"name":"2012 IEEE Information Theory Workshop","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132008394","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Characterizing the entropy function region via extreme rays 用极值射线表征熵函数区域
Pub Date : 2012-09-01 DOI: 10.1109/ITW.2012.6404674
Qi Chen, R. Yeung
Contrary to the traditional method of information inequalities, in this paper, the entropy function region Γn* and its closure ̅Γn* are characterized via extreme rays of its outer bound polymatroidal region Γn. The characterization of Γ3* and the tightness of Γn as an outer bound on ̅Γn* are studied.
与传统的信息不等式方法不同,本文利用熵函数区域Γn*及其闭包* Γn*的外界多拟面区域Γn的极值射线来表征熵函数区域。研究了Γ3*的性质和Γn作为* *的外界的严密性。
{"title":"Characterizing the entropy function region via extreme rays","authors":"Qi Chen, R. Yeung","doi":"10.1109/ITW.2012.6404674","DOIUrl":"https://doi.org/10.1109/ITW.2012.6404674","url":null,"abstract":"Contrary to the traditional method of information inequalities, in this paper, the entropy function region Γ<sub>n</sub>* and its closure ̅Γ<sub>n</sub>* are characterized via extreme rays of its outer bound polymatroidal region Γ<sub>n</sub>. The characterization of Γ<sub>3</sub>* and the tightness of Γ<sub>n</sub> as an outer bound on ̅Γ<sub>n</sub>* are studied.","PeriodicalId":325771,"journal":{"name":"2012 IEEE Information Theory Workshop","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131855842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
On the role of deterministic models in K × K × K wireless networks 确定性模型在K × K × K无线网络中的作用
Pub Date : 2012-09-01 DOI: 10.1109/ITW.2012.6404749
Ilan Shomorony, A. Avestimehr
This paper establishes a connection between the capacity region of the K × K × K wireless network under the AWGN channel model and under a truncated deterministic channel model, which allows any outer bound on the capacity region of the truncated network to be translated into an outer bound on the capacity region of the AWGN network. The result is obtained through the utilization of a recent worst-case noise theorem [1], which shows that perturbing the noise distribution in AWGN networks only increases the capacity region.
本文建立了AWGN信道模型下的K × K × K无线网络容量区域与截断确定性信道模型下的连接,使得截断网络容量区域的任何外界都可以转化为AWGN网络容量区域的外界。利用最近的最坏情况噪声定理[1]得到的结果表明,干扰AWGN网络中的噪声分布只会增加容量区域。
{"title":"On the role of deterministic models in K × K × K wireless networks","authors":"Ilan Shomorony, A. Avestimehr","doi":"10.1109/ITW.2012.6404749","DOIUrl":"https://doi.org/10.1109/ITW.2012.6404749","url":null,"abstract":"This paper establishes a connection between the capacity region of the K × K × K wireless network under the AWGN channel model and under a truncated deterministic channel model, which allows any outer bound on the capacity region of the truncated network to be translated into an outer bound on the capacity region of the AWGN network. The result is obtained through the utilization of a recent worst-case noise theorem [1], which shows that perturbing the noise distribution in AWGN networks only increases the capacity region.","PeriodicalId":325771,"journal":{"name":"2012 IEEE Information Theory Workshop","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115590214","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
An information-theoretic protocol compiler 一个信息论协议编译器
Pub Date : 2012-09-01 DOI: 10.1109/ITW.2012.6404657
A. Sahai
One of the most fundamental goals in cryptography is to design protocols that remain secure when adversarial participants can engage in arbitrary malicious behavior. In 1986, Goldreich, Micali, and Wigderson presented a powerful paradigm for designing such protocols: their approach reduced the task of designing secure protocols to designing protocols that only guarantee security against “honest-but-curious” participants. By making use of zero-knowledge proofs, the GMW paradigm enforces honest behavior without compromising secrecy. Over the past two decades, this approach has been the dominant paradigm for cryptographic protocol design, based on zero-knowledge protocols based on computational hardness assumptions. In this work, we describe a new general paradigm/protocol compiler for secure protocol design known as the IPS compiler, that departs considerably from the GMW framework, and provides a method for obtaining efficient protocols with information-theoretic security guarantees in settings where appropriate channels exist. This new approach also reduces the task of designing secure protocols to designing protocols that only guarantee security against honest-but-curious participants. However, the new approach avoids the use of zero-knowledge proofs, and instead makes use of multi-party protocols in a much simpler setting - where the majority of participants are completely honest (such multi-party protocols can exist with information-theoretic security guarantees without assuming any special channels). The IPS paradigm yields protocols that rely on Oblivious Transfer channels (OT) as a building block. This offers a number of advantages in generality and efficiency. In contrast to the GMW paradigm, by avoiding the use of zero-knowledge proofs, the IPS paradigm is able to treat all of its building blocks as “black boxes”. This allows improvement over previous results in the area of secure computation. In particular, the IPS compiler yields conceptually simpler and more efficient ways for basing unconditionally secure cryptography on OT and other noisy channels; more efficient protocols for generating a large number of OTs using a small number of OTs; and secure and efficient protocols which only make a blackbox use of cryptographic primitives or underlying algebraic structures in settings where no such protocols were known before.
密码学中最基本的目标之一是设计在敌对参与者可能从事任意恶意行为时保持安全的协议。1986年,Goldreich、Micali和Wigderson提出了一个设计此类协议的强大范例:他们的方法将设计安全协议的任务简化为设计仅针对“诚实但好奇”参与者的安全保障协议。通过使用零知识证明,GMW范式在不损害保密性的情况下强制执行诚实行为。在过去的二十年里,这种方法一直是加密协议设计的主要范例,它基于基于计算硬度假设的零知识协议。在这项工作中,我们描述了一种新的通用范例/协议编译器,称为IPS编译器,用于安全协议设计,它与GMW框架有很大的不同,并提供了一种在适当通道存在的情况下获得具有信息论安全保证的有效协议的方法。这种新方法还将设计安全协议的任务简化为设计仅针对诚实但好奇的参与者保证安全性的协议。然而,新方法避免使用零知识证明,而是在一个更简单的设置中使用多方协议——其中大多数参与者是完全诚实的(这种多方协议可以在信息论安全保证下存在,而无需假设任何特殊通道)。IPS范式产生依赖于遗忘传输通道(OT)作为构建块的协议。这在通用性和效率方面提供了许多优势。与GMW范式相反,通过避免使用零知识证明,IPS范式能够将其所有构建块视为“黑盒”。这允许在安全计算领域对以前的结果进行改进。特别是,IPS编译器提供了概念上更简单和更有效的方法,用于基于OT和其他噪声信道的无条件安全加密;使用少量OTs生成大量OTs的更有效的协议;以及安全高效的协议,这些协议只在以前不知道此类协议的设置中使用加密原语或底层代数结构的黑盒。
{"title":"An information-theoretic protocol compiler","authors":"A. Sahai","doi":"10.1109/ITW.2012.6404657","DOIUrl":"https://doi.org/10.1109/ITW.2012.6404657","url":null,"abstract":"One of the most fundamental goals in cryptography is to design protocols that remain secure when adversarial participants can engage in arbitrary malicious behavior. In 1986, Goldreich, Micali, and Wigderson presented a powerful paradigm for designing such protocols: their approach reduced the task of designing secure protocols to designing protocols that only guarantee security against “honest-but-curious” participants. By making use of zero-knowledge proofs, the GMW paradigm enforces honest behavior without compromising secrecy. Over the past two decades, this approach has been the dominant paradigm for cryptographic protocol design, based on zero-knowledge protocols based on computational hardness assumptions. In this work, we describe a new general paradigm/protocol compiler for secure protocol design known as the IPS compiler, that departs considerably from the GMW framework, and provides a method for obtaining efficient protocols with information-theoretic security guarantees in settings where appropriate channels exist. This new approach also reduces the task of designing secure protocols to designing protocols that only guarantee security against honest-but-curious participants. However, the new approach avoids the use of zero-knowledge proofs, and instead makes use of multi-party protocols in a much simpler setting - where the majority of participants are completely honest (such multi-party protocols can exist with information-theoretic security guarantees without assuming any special channels). The IPS paradigm yields protocols that rely on Oblivious Transfer channels (OT) as a building block. This offers a number of advantages in generality and efficiency. In contrast to the GMW paradigm, by avoiding the use of zero-knowledge proofs, the IPS paradigm is able to treat all of its building blocks as “black boxes”. This allows improvement over previous results in the area of secure computation. In particular, the IPS compiler yields conceptually simpler and more efficient ways for basing unconditionally secure cryptography on OT and other noisy channels; more efficient protocols for generating a large number of OTs using a small number of OTs; and secure and efficient protocols which only make a blackbox use of cryptographic primitives or underlying algebraic structures in settings where no such protocols were known before.","PeriodicalId":325771,"journal":{"name":"2012 IEEE Information Theory Workshop","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123909673","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Suppressing pseudocodewords by penalizing the objective of LP decoding 通过惩罚LP译码目标来抑制伪码字
Pub Date : 2012-09-01 DOI: 10.1109/ITW.2012.6404695
Xishuo Liu, S. Draper, B. Recht
In this paper, we present a new class of decoders for low density parity check (LDPC) codes. We are motivated by the observation that the linear programming (LP) decoder has worse error performance than belief propagation (BP) decoders at low SNRs. We base our new decoders on the alternating direction method of multipliers (ADMM) decomposition technique for LP decoding. The ADMM not only efficiently solves the LP decoding problem, but also makes it possible to explore other decoding algorithms. In particular, we add various penalty terms to the linear objective of LP decoding with the goal of suppressing pseudocodewords. Simulation results show that the new decoders achieve much better error performance compared to LP decoder at low SNRs. What is more, similar to the LP decoder, no error floor is observed at high SNRs.
在本文中,我们提出了一类新的低密度奇偶校验码解码器。我们的动机是观察到线性规划(LP)解码器在低信噪比下比信念传播(BP)解码器具有更差的误差性能。我们的译码器是基于低频译码器的交替方向乘法器(ADMM)分解技术。ADMM不仅有效地解决了LP解码问题,而且为探索其他解码算法提供了可能。特别是,我们在LP解码的线性目标中加入了各种惩罚项,目的是抑制伪码字。仿真结果表明,在低信噪比条件下,该解码器比LP解码器具有更好的误差性能。更重要的是,类似于LP解码器,在高信噪比下没有观察到错误底限。
{"title":"Suppressing pseudocodewords by penalizing the objective of LP decoding","authors":"Xishuo Liu, S. Draper, B. Recht","doi":"10.1109/ITW.2012.6404695","DOIUrl":"https://doi.org/10.1109/ITW.2012.6404695","url":null,"abstract":"In this paper, we present a new class of decoders for low density parity check (LDPC) codes. We are motivated by the observation that the linear programming (LP) decoder has worse error performance than belief propagation (BP) decoders at low SNRs. We base our new decoders on the alternating direction method of multipliers (ADMM) decomposition technique for LP decoding. The ADMM not only efficiently solves the LP decoding problem, but also makes it possible to explore other decoding algorithms. In particular, we add various penalty terms to the linear objective of LP decoding with the goal of suppressing pseudocodewords. Simulation results show that the new decoders achieve much better error performance compared to LP decoder at low SNRs. What is more, similar to the LP decoder, no error floor is observed at high SNRs.","PeriodicalId":325771,"journal":{"name":"2012 IEEE Information Theory Workshop","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114449150","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
Spatially coupled quantum LDPC codes 空间耦合量子LDPC码
Pub Date : 2012-09-01 DOI: 10.1109/ITW.2012.6404686
I. Andriyanova, D. Maurice, J. Tillich
We propose here a new construction of spatially coupled quantum LDPC codes using a small amount of entangled qubit pairs shared between the encoder and the decoder which improves quite significantly all other constructions of quantum LDPC codes or turbo-codes with the same rate.
本文提出了一种利用编码器和解码器之间共享少量纠缠量子比特对的空间耦合量子LDPC码的新结构,该结构在相同速率下显着改进了所有其他量子LDPC码或涡轮码的结构。
{"title":"Spatially coupled quantum LDPC codes","authors":"I. Andriyanova, D. Maurice, J. Tillich","doi":"10.1109/ITW.2012.6404686","DOIUrl":"https://doi.org/10.1109/ITW.2012.6404686","url":null,"abstract":"We propose here a new construction of spatially coupled quantum LDPC codes using a small amount of entangled qubit pairs shared between the encoder and the decoder which improves quite significantly all other constructions of quantum LDPC codes or turbo-codes with the same rate.","PeriodicalId":325771,"journal":{"name":"2012 IEEE Information Theory Workshop","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114422234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Multi-terminal source coding: Zero-rate encoders cannot enlarge the rate region 多终端源编码:零速率编码器不能扩大速率区域
Pub Date : 2012-09-01 DOI: 10.1109/ITW.2012.6404684
B. Vellambi
This work proves that in the multi-terminal source coding problem, any achievable rate point achievable with asymptotically zero rate on a subset of links can also be achieved without any communication over the same subset of links, or equivalently, when the links in the subset are removed from the network. This work shows that asymptotically zero-rate communication over a subset of links cannot be crucial for the inclusion of a rate point in the rate region in spite of the absence of an explicit characterization of the rate region.
本工作证明了在多终端信源编码问题中,在链路子集上任意可达的速率点在速率渐近为零的情况下也可以在同一链路子集上不进行任何通信的情况下达到,或者等效地,当该子集中的链路从网络中移除时。这项工作表明,尽管没有明确的速率区域特征,但在一组链路上的渐近零速率通信对于在速率区域中包含速率点并不重要。
{"title":"Multi-terminal source coding: Zero-rate encoders cannot enlarge the rate region","authors":"B. Vellambi","doi":"10.1109/ITW.2012.6404684","DOIUrl":"https://doi.org/10.1109/ITW.2012.6404684","url":null,"abstract":"This work proves that in the multi-terminal source coding problem, any achievable rate point achievable with asymptotically zero rate on a subset of links can also be achieved without any communication over the same subset of links, or equivalently, when the links in the subset are removed from the network. This work shows that asymptotically zero-rate communication over a subset of links cannot be crucial for the inclusion of a rate point in the rate region in spite of the absence of an explicit characterization of the rate region.","PeriodicalId":325771,"journal":{"name":"2012 IEEE Information Theory Workshop","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121980489","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Capacity region of two symmetric nearby erasure channels with channel state feedback 具有信道状态反馈的两个对称邻近擦除信道的容量区域
Pub Date : 2012-09-01 DOI: 10.1109/ITW.2012.6404691
Chih-Chun Wang
This work considers a commonly encountered wireless transmission scenario: Two nearby 1-hop flows s1 → d1 and s2 → d2 are within the transmission range of each other. The network nodes thus have to share the time resources, which limits the sum-rate performance. On the other hand, both si and di can (occasionally) overhear the transmission of the other pair (sj, dj) for all i ≠ j, which opens up the opportunity of using network coding (NC) and ACK/NACK to improve the throughput. The key challenge, however, is that any dedicated communication between s1 and s2 also consumes the precious time resources. Hence NC coordination must be achieved through unreliable overhearing. In this work, the above scenario is modeled as four wireless nodes interconnected by broadcast erasure channels with channel state feedback. The corresponding capacity region (R1,R2) is fully characterized for the setting of symmetric, spatially independent erasure channels.
本文考虑了一个常见的无线传输场景:两个相邻的1跳流s1→d1和s2→d2在彼此的传输范围内。因此,网络节点必须共享时间资源,这限制了求和速率的性能。另一方面,对于所有i≠j的情况,si和di都可以(偶尔)偷听到另一对(sj, dj)的传输,这就为使用网络编码(NC)和ACK/NACK来提高吞吐量提供了机会。然而,关键的挑战是s1和s2之间的任何专用通信也会消耗宝贵的时间资源。因此,数控协调必须通过不可靠的偷听来实现。在这项工作中,上述场景被建模为四个无线节点,通过带有信道状态反馈的广播擦除信道相互连接。相应的容量区域(R1,R2)被完全表征为对称的、空间独立的擦除通道的设置。
{"title":"Capacity region of two symmetric nearby erasure channels with channel state feedback","authors":"Chih-Chun Wang","doi":"10.1109/ITW.2012.6404691","DOIUrl":"https://doi.org/10.1109/ITW.2012.6404691","url":null,"abstract":"This work considers a commonly encountered wireless transmission scenario: Two nearby 1-hop flows s<sub>1</sub> → d<sub>1</sub> and s<sub>2</sub> → d<sub>2</sub> are within the transmission range of each other. The network nodes thus have to share the time resources, which limits the sum-rate performance. On the other hand, both s<sub>i</sub> and d<sub>i</sub> can (occasionally) overhear the transmission of the other pair (s<sub>j</sub>, d<sub>j</sub>) for all i ≠ j, which opens up the opportunity of using network coding (NC) and ACK/NACK to improve the throughput. The key challenge, however, is that any dedicated communication between s<sub>1</sub> and s<sub>2</sub> also consumes the precious time resources. Hence NC coordination must be achieved through unreliable overhearing. In this work, the above scenario is modeled as four wireless nodes interconnected by broadcast erasure channels with channel state feedback. The corresponding capacity region (R1,R2) is fully characterized for the setting of symmetric, spatially independent erasure channels.","PeriodicalId":325771,"journal":{"name":"2012 IEEE Information Theory Workshop","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125026161","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
期刊
2012 IEEE Information Theory Workshop
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1