首页 > 最新文献

2012 IEEE Information Theory Workshop最新文献

英文 中文
Capacity of a class of relay channels with state 一类具有状态的中继通道的容量
Pub Date : 2012-09-01 DOI: 10.1109/ITW.2012.6404675
Iñaki Estella Aguerri, Deniz Gündüz
The class of orthogonal relay channels with state in which the source and the relay are connected through a channel that depends on a state sequence is considered. It is assumed that the state sequence is fully known at the destination while it is not known at the source or the relay. The source and the relay are connected to the destination through orthogonal channels. The capacity of this class of relay channels is characterized and it is shown to be achieved by the partial decode-compress-and-forward (pDCF) scheme. To the best of our knowledge, this is the first single relay channel model for which the capacity is achieved by pDCF, while partial decode-and-forward (pDF) and compress-and-forward (CF) schemes are suboptimal in general.
考虑了一类带状态的正交中继通道,其中源和中继通过依赖于状态序列的通道连接。假设状态序列在目的端是完全已知的,而在源端或中继端是未知的。源和继电器通过正交通道连接到目的端。这类中继信道的容量被表征,并被证明是通过部分解码压缩转发(pDCF)方案实现的。据我们所知,这是第一个通过pDCF实现容量的单中继信道模型,而部分解码转发(pDF)和压缩转发(CF)方案通常是次优的。
{"title":"Capacity of a class of relay channels with state","authors":"Iñaki Estella Aguerri, Deniz Gündüz","doi":"10.1109/ITW.2012.6404675","DOIUrl":"https://doi.org/10.1109/ITW.2012.6404675","url":null,"abstract":"The class of orthogonal relay channels with state in which the source and the relay are connected through a channel that depends on a state sequence is considered. It is assumed that the state sequence is fully known at the destination while it is not known at the source or the relay. The source and the relay are connected to the destination through orthogonal channels. The capacity of this class of relay channels is characterized and it is shown to be achieved by the partial decode-compress-and-forward (pDCF) scheme. To the best of our knowledge, this is the first single relay channel model for which the capacity is achieved by pDCF, while partial decode-and-forward (pDF) and compress-and-forward (CF) schemes are suboptimal in general.","PeriodicalId":325771,"journal":{"name":"2012 IEEE Information Theory Workshop","volume":"153 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128598477","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Characterizing pseudoentropy 描述pseudoentropy
Pub Date : 2012-09-01 DOI: 10.1109/ITW.2012.6404635
S. Vadhan, C. Zheng
We provide a characterization of “pseudoentropy” in terms of hardness of sampling: Let (X, B) be jointly distributed random variables such that B takes values in a polynomial-sized set. We show that no polynomial-time algorithm can distinguish B from some random variable of higher Shannon entropy given X if and only if there is no probabilistic polynomial-time S such that (X, S(X)) has small KL divergence from (X, B). As an application of this characterization, we show that if f is a one-way function (f is easy to compute but hard to invert), then (f(Un),Un) has “next-bit pseudoentropy” at least n + log n, establishing a conjecture of Haitner, Reingold, and Vadhan (STOC '10). Plugging this into the construction of Haitner et al., we obtain a simpler construction of pseudorandom generators from one-way functions.
我们根据采样的硬度提供了“伪熵”的表征:设(X, B)是联合分布的随机变量,使得B在多项式大小的集合中取值。我们表明,没有多项式时间算法能区分B从高等夏侬熵给出一些随机变量X当且仅当没有概率多项式时间年代这样(X, S (X))小KL分歧(X, B)。作为应用程序的特征,我们表明,如果f是单向函数(f是容易计算,但难以反转),然后(f(联合国)、联合国)”下pseudoentropy”至少n + o (log n),建立一个猜想Haitner, Reingold, Vadhan(获得STOC 10)。将此代入Haitner等人的构造中,我们从单向函数中获得了更简单的伪随机生成器构造。
{"title":"Characterizing pseudoentropy","authors":"S. Vadhan, C. Zheng","doi":"10.1109/ITW.2012.6404635","DOIUrl":"https://doi.org/10.1109/ITW.2012.6404635","url":null,"abstract":"We provide a characterization of “pseudoentropy” in terms of hardness of sampling: Let (X, B) be jointly distributed random variables such that B takes values in a polynomial-sized set. We show that no polynomial-time algorithm can distinguish B from some random variable of higher Shannon entropy given X if and only if there is no probabilistic polynomial-time S such that (X, S(X)) has small KL divergence from (X, B). As an application of this characterization, we show that if f is a one-way function (f is easy to compute but hard to invert), then (f(Un),Un) has “next-bit pseudoentropy” at least n + log n, establishing a conjecture of Haitner, Reingold, and Vadhan (STOC '10). Plugging this into the construction of Haitner et al., we obtain a simpler construction of pseudorandom generators from one-way functions.","PeriodicalId":325771,"journal":{"name":"2012 IEEE Information Theory Workshop","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130587106","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
On uncoded transmission and blocklength 关于非编码传输和块长度
Pub Date : 2012-09-01 DOI: 10.1109/ITW.2012.6404648
Y. Kochman, G. Wornell
This work considers the definition of the excess-distortion exponent, used to measure the asymptotic finite blocklength behavior of joint source-channel coding. We arrive at the conclusion that it is not a meaningful measure for the operational tradeoffs of a scheme. We propose a new definition, which makes a distinction between the processing block of the coding scheme (which implies delay and may be connected to complexity), the fidelity blocklength (reflecting the quality of the reconstruction as required by the application), and the resource blocklength (depending on hardware or shared medium considerations). As an aside, the exponent of uncoded schemes is analyzed. This results in finding the joint source-channel coding excess-distortion exponent in some cases where it was not known previously.
本文考虑了过度失真指数的定义,用于测量联合信源信道编码的渐近有限块长行为。我们得出的结论是,对于方案的操作权衡,它不是一个有意义的度量。我们提出了一个新的定义,它区分了编码方案的处理块(这意味着延迟并且可能与复杂性有关),保真块长度(反映应用程序所需的重建质量)和资源块长度(取决于硬件或共享介质考虑)。另外,对非编码方案的指数进行了分析。这导致在以前不知道的某些情况下发现联合源信道编码过度失真指数。
{"title":"On uncoded transmission and blocklength","authors":"Y. Kochman, G. Wornell","doi":"10.1109/ITW.2012.6404648","DOIUrl":"https://doi.org/10.1109/ITW.2012.6404648","url":null,"abstract":"This work considers the definition of the excess-distortion exponent, used to measure the asymptotic finite blocklength behavior of joint source-channel coding. We arrive at the conclusion that it is not a meaningful measure for the operational tradeoffs of a scheme. We propose a new definition, which makes a distinction between the processing block of the coding scheme (which implies delay and may be connected to complexity), the fidelity blocklength (reflecting the quality of the reconstruction as required by the application), and the resource blocklength (depending on hardware or shared medium considerations). As an aside, the exponent of uncoded schemes is analyzed. This results in finding the joint source-channel coding excess-distortion exponent in some cases where it was not known previously.","PeriodicalId":325771,"journal":{"name":"2012 IEEE Information Theory Workshop","volume":"80 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130739195","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Reduced complexity window decoding schedules for coupled LDPC codes 降低了耦合LDPC码的复杂度窗口解码时间表
Pub Date : 2012-09-01 DOI: 10.1109/ITW.2012.6404660
N. Hassan, A. E. Pusane, M. Lentmaier, G. Fettweis, D. Costello
Window decoding schedules are very attractive for message passing decoding of spatially coupled LDPC codes. They take advantage of the inherent convolutional code structure and allow continuous transmission with low decoding latency and complexity. In this paper we show that the decoding complexity can be further reduced if suitable message passing schedules are applied within the decoding window. An improvement based schedule is presented that easily adapts to different ensemble structures, window sizes, and channel parameters. Its combination with a serial (on-demand) schedule is also considered. Results from a computer search based schedule are shown for comparison.
对于空间耦合LDPC码的消息传递译码来说,窗口译码是一种非常有吸引力的译码方式。它们利用固有的卷积码结构,允许以低解码延迟和复杂性进行连续传输。在本文中,我们证明了在解码窗口内采用合适的消息传递调度可以进一步降低解码复杂度。提出了一种基于改进的方案,该方案可以很容易地适应不同的集成结构、窗口大小和通道参数。还考虑了它与串行(按需)调度的组合。结果从计算机搜索为基础的时间表显示比较。
{"title":"Reduced complexity window decoding schedules for coupled LDPC codes","authors":"N. Hassan, A. E. Pusane, M. Lentmaier, G. Fettweis, D. Costello","doi":"10.1109/ITW.2012.6404660","DOIUrl":"https://doi.org/10.1109/ITW.2012.6404660","url":null,"abstract":"Window decoding schedules are very attractive for message passing decoding of spatially coupled LDPC codes. They take advantage of the inherent convolutional code structure and allow continuous transmission with low decoding latency and complexity. In this paper we show that the decoding complexity can be further reduced if suitable message passing schedules are applied within the decoding window. An improvement based schedule is presented that easily adapts to different ensemble structures, window sizes, and channel parameters. Its combination with a serial (on-demand) schedule is also considered. Results from a computer search based schedule are shown for comparison.","PeriodicalId":325771,"journal":{"name":"2012 IEEE Information Theory Workshop","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128788477","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Non-binary protograph-based LDPC codes for short block-lengths 短块长度的非二进制基于原型的LDPC代码
Pub Date : 2012-09-01 DOI: 10.1109/ITW.2012.6404676
Ben-Yue Chang, D. Divsalar, L. Dolecek
This paper presents two complementary constructions of finite-length non-binary protograph-based codes with the focus on the short block-length regime. The first class is based on the existing approaches of applying the copy-and-permute operations to the constituent protograph with unweighted edges, followed by assigning non-binary scales to the edges of the derived graph. The second class is novel and is based on the so-called graph cover of a non-binary protograph: the original protograph has fixed edge scalings and copy-and-permute operations are applied to the edge-weighted protograph. The second class is arguably more restrictive, but in turn it offers simpler design and implementation. We provide design and construction of these non-binary codes for short block-lengths. Performance, cycle distribution and the minimum distance of the binary image of selected codes over AWGN is provided for information block-lengths as low as 64 bits.
本文提出了基于有限长度非二进制原型码的两种互补结构,并重点讨论了短块长度机制。第一类是基于现有的方法,将复制和置换操作应用于具有未加权边的组成原型图,然后为派生图的边缘分配非二进制尺度。第二类是新颖的,它基于所谓的非二进制原生图的图盖:原始原生图具有固定的边缘缩放,复制和置换操作应用于边缘加权的原生图。第二类的限制更严格,但反过来它提供了更简单的设计和实现。我们提供了这些短块长度的非二进制码的设计和构造。给出了信息块长度低至64位时所选码在AWGN上的性能、周期分布和二值图像的最小距离。
{"title":"Non-binary protograph-based LDPC codes for short block-lengths","authors":"Ben-Yue Chang, D. Divsalar, L. Dolecek","doi":"10.1109/ITW.2012.6404676","DOIUrl":"https://doi.org/10.1109/ITW.2012.6404676","url":null,"abstract":"This paper presents two complementary constructions of finite-length non-binary protograph-based codes with the focus on the short block-length regime. The first class is based on the existing approaches of applying the copy-and-permute operations to the constituent protograph with unweighted edges, followed by assigning non-binary scales to the edges of the derived graph. The second class is novel and is based on the so-called graph cover of a non-binary protograph: the original protograph has fixed edge scalings and copy-and-permute operations are applied to the edge-weighted protograph. The second class is arguably more restrictive, but in turn it offers simpler design and implementation. We provide design and construction of these non-binary codes for short block-lengths. Performance, cycle distribution and the minimum distance of the binary image of selected codes over AWGN is provided for information block-lengths as low as 64 bits.","PeriodicalId":325771,"journal":{"name":"2012 IEEE Information Theory Workshop","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126664459","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 38
A new achievable region for Gaussian multiple descriptions based on subset typicality 基于子集典型性的高斯多重描述新可实现区域
Pub Date : 2012-09-01 DOI: 10.1109/ITW.2012.6404715
Kumar Viswanatha, E. Akyol, K. Rose
This paper addresses the L-channel multiple descriptions problem for a Gaussian source under mean squared error (MSE) distortion metric. We focus on particular cross-sections of the general rate-distortion region where a subset the 2L - 1 distortion constraints are not imposed. Specifically, we assume that certain descriptions are never received simultaneously at the decoder and thereby the transmitted codewords require joint typicality only within prescribed subsets. We derive a new encoding scheme and an associated rate-distortion region wherein joint typicality of codewords only within the prescribed subsets is maintained. We show that enforcing joint typicality of all the codewords entails strict suboptimality in the achievable rate-distortion region. Specifically, we consider a 3 descriptions scenario wherein descriptions 1 and 3 are never received simultaneously at the decoder and show that a strictly larger achievable region is obtained when the encoder maintains joint typicality of codewords only within the required subsets. To prove these results, we derive a lemma called the `subset typicality lemma' which plays a critical role in establishing the new achievable region.
本文研究了均方误差(MSE)失真度量下高斯源的l通道多重描述问题。我们将重点放在一般速率失真区域的特定横截面上,其中不施加2L - 1失真约束的子集。具体来说,我们假设解码器从未同时接收到某些描述,因此传输的码字仅在规定的子集内需要联合典型性。我们推导了一种新的编码方案和相关的率失真区域,其中码字仅在规定的子集内保持联合典型性。我们证明了强制所有码字的联合典型性需要在可实现的率失真区域内实现严格的次优性。具体来说,我们考虑一个3描述场景,其中描述1和3从未在解码器同时接收,并且表明当编码器仅在所需子集内保持码字的联合典型性时,可以获得更大的可实现区域。为了证明这些结果,我们推导了一个被称为“子集典型引理”的引理,它在建立新的可实现区域中起着关键作用。
{"title":"A new achievable region for Gaussian multiple descriptions based on subset typicality","authors":"Kumar Viswanatha, E. Akyol, K. Rose","doi":"10.1109/ITW.2012.6404715","DOIUrl":"https://doi.org/10.1109/ITW.2012.6404715","url":null,"abstract":"This paper addresses the L-channel multiple descriptions problem for a Gaussian source under mean squared error (MSE) distortion metric. We focus on particular cross-sections of the general rate-distortion region where a subset the 2L - 1 distortion constraints are not imposed. Specifically, we assume that certain descriptions are never received simultaneously at the decoder and thereby the transmitted codewords require joint typicality only within prescribed subsets. We derive a new encoding scheme and an associated rate-distortion region wherein joint typicality of codewords only within the prescribed subsets is maintained. We show that enforcing joint typicality of all the codewords entails strict suboptimality in the achievable rate-distortion region. Specifically, we consider a 3 descriptions scenario wherein descriptions 1 and 3 are never received simultaneously at the decoder and show that a strictly larger achievable region is obtained when the encoder maintains joint typicality of codewords only within the required subsets. To prove these results, we derive a lemma called the `subset typicality lemma' which plays a critical role in establishing the new achievable region.","PeriodicalId":325771,"journal":{"name":"2012 IEEE Information Theory Workshop","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116754659","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On secure multiparty sampling for more than two parties 关于两方以上的安全多方抽样
Pub Date : 2012-09-01 DOI: 10.1109/ITW.2012.6404773
M. Prabhakaran, V. Prabhakaran
We investigate secure multi-party sampling problems involving more than two parties. In the public discussion model, we give a simple characterization of the distributions that can be sampled without any setup. In a model which allows private point-to-point communication, we reduce the problem of characterizing distributions that can be securely sampled using pairwise setups to the problem of characterizing distributions that can be sampled without any setups.
我们调查涉及两方以上的安全多方抽样问题。在公共讨论模型中,我们给出了可以在没有任何设置的情况下采样的分布的简单表征。在一个允许私有点对点通信的模型中,我们将可以使用两两设置进行安全采样的分布的特征化问题简化为可以不使用任何设置进行采样的分布的特征化问题。
{"title":"On secure multiparty sampling for more than two parties","authors":"M. Prabhakaran, V. Prabhakaran","doi":"10.1109/ITW.2012.6404773","DOIUrl":"https://doi.org/10.1109/ITW.2012.6404773","url":null,"abstract":"We investigate secure multi-party sampling problems involving more than two parties. In the public discussion model, we give a simple characterization of the distributions that can be sampled without any setup. In a model which allows private point-to-point communication, we reduce the problem of characterizing distributions that can be securely sampled using pairwise setups to the problem of characterizing distributions that can be sampled without any setups.","PeriodicalId":325771,"journal":{"name":"2012 IEEE Information Theory Workshop","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116763250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Combining superposition coding and binning achieves capacity for the Gaussian cognitive interference channel 将叠加编码与分组相结合,实现了高斯认知干扰信道的容量
Pub Date : 2012-09-01 DOI: 10.1109/ITW.2012.6404664
S. Rini, E. Kurniawan, A. Goldsmith
The cognitive interference channel models cognitive overlay radio systems, in which cognitive radios overhear the transmission of neighboring nodes. For the Gaussian case capacity is known in three subsets of the parameter space: the “weak interference”, “very strong interference” and “primary decodes cognitive” regime. Capacity in the “very strong interference” regime is achieved by superposing the cognitive message over the primary message while in the “primary decodes cognitive” regime the cognitive message is binned against the primary message. This paper provides a new capacity result obtained by combining the capacity achieving schemes in these two regimes thus generalizing and extending these results. Interestingly, the capacity achieving strategy for a given channel also depends on the level of cooperation among the users: that is, either superposition coding or binning is employed depending on the amount of power allotted by the cognitive transmitter to aid the primary user.
认知干扰信道对认知叠加无线电系统进行了建模,在这种系统中,认知无线电会偷听相邻节点的传输。对于高斯情况,容量在参数空间的三个子集中是已知的:“弱干扰”,“强干扰”和“初级解码认知”机制。在“非常强干扰”机制中,能力是通过将认知信息叠加在主要信息上实现的,而在“主要解码认知”机制中,认知信息与主要信息相关联。本文将这两种情况下的容量实现方案结合起来,给出了一个新的容量结果,从而推广和推广了这些结果。有趣的是,给定信道的容量实现策略还取决于用户之间的合作水平:即,根据认知发射机分配给主用户的功率大小,采用叠加编码或分组。
{"title":"Combining superposition coding and binning achieves capacity for the Gaussian cognitive interference channel","authors":"S. Rini, E. Kurniawan, A. Goldsmith","doi":"10.1109/ITW.2012.6404664","DOIUrl":"https://doi.org/10.1109/ITW.2012.6404664","url":null,"abstract":"The cognitive interference channel models cognitive overlay radio systems, in which cognitive radios overhear the transmission of neighboring nodes. For the Gaussian case capacity is known in three subsets of the parameter space: the “weak interference”, “very strong interference” and “primary decodes cognitive” regime. Capacity in the “very strong interference” regime is achieved by superposing the cognitive message over the primary message while in the “primary decodes cognitive” regime the cognitive message is binned against the primary message. This paper provides a new capacity result obtained by combining the capacity achieving schemes in these two regimes thus generalizing and extending these results. Interestingly, the capacity achieving strategy for a given channel also depends on the level of cooperation among the users: that is, either superposition coding or binning is employed depending on the amount of power allotted by the cognitive transmitter to aid the primary user.","PeriodicalId":325771,"journal":{"name":"2012 IEEE Information Theory Workshop","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131568544","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Retargeting LT codes using XORs at the relay 在继电器上使用xor重新定位LT代码
Pub Date : 2012-09-01 DOI: 10.1109/ITW.2012.6404745
Shirish S. Karande
We consider a network where multiple sources communicate via a single relay to sinks with non-uniform and unequal demands. The LT distributions employed at the sources may be ill-matched to the demands of the sinks connected to the relay. We consider a probabilistic “morphing” of two or more fountain-encoded streams into a single stream better suited for the demand patterns downstream of the relay. The relay observes symbols generated from two distinct fountain codes, and can decide to forward a symbol from one source, or the other source, or the X-OR of the two symbols. We propose a linear programming based design of Generalized LT codes, which with appropriate substitutions is utilized to design the probabilities for the relay. Simulation results show that the designs obtained on the basis of the proposed optimization problem, when compared with multiplexing or simple mixing, reduce the number of symbols that have to be downloaded to guarantee a desired probability of successful decoding.
我们考虑一个网络,其中多个源通过单个中继通信到具有不均匀和不相等需求的接收器。源处使用的低电压分布可能与连接到继电器的接收器的需求不匹配。我们考虑将两个或多个喷泉编码流概率地“变形”为更适合中继下游需求模式的单个流。中继观察由两个不同的喷泉码产生的符号,并可以决定从一个源或另一个源转发一个符号,或两个符号的x或。我们提出了一种基于线性规划的广义LT码的设计方法,并采用适当的替换来设计继电器的概率。仿真结果表明,与复用或简单混合相比,基于该优化问题的设计减少了需要下载的符号数量,从而保证了期望的成功解码概率。
{"title":"Retargeting LT codes using XORs at the relay","authors":"Shirish S. Karande","doi":"10.1109/ITW.2012.6404745","DOIUrl":"https://doi.org/10.1109/ITW.2012.6404745","url":null,"abstract":"We consider a network where multiple sources communicate via a single relay to sinks with non-uniform and unequal demands. The LT distributions employed at the sources may be ill-matched to the demands of the sinks connected to the relay. We consider a probabilistic “morphing” of two or more fountain-encoded streams into a single stream better suited for the demand patterns downstream of the relay. The relay observes symbols generated from two distinct fountain codes, and can decide to forward a symbol from one source, or the other source, or the X-OR of the two symbols. We propose a linear programming based design of Generalized LT codes, which with appropriate substitutions is utilized to design the probabilities for the relay. Simulation results show that the designs obtained on the basis of the proposed optimization problem, when compared with multiplexing or simple mixing, reduce the number of symbols that have to be downloaded to guarantee a desired probability of successful decoding.","PeriodicalId":325771,"journal":{"name":"2012 IEEE Information Theory Workshop","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127752519","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Approaching maximum likelihood decoding of finite length LDPC codes via FAID diversity 利用FAID分集逼近有限长度LDPC码的最大似然译码
Pub Date : 2012-09-01 DOI: 10.1109/ITW.2012.6404721
D. Declercq, Erbao Li, B. Vasic, S. Planjery
We introduce a generic approach, called FAID diversity, for improving the error correction capability of regular low-density parity check codes, beyond the belief propagation performance. The method relies on operating a set of finite alphabet iterative decoders (FAID). The message-passing update rules are interpreted as discrete dynamical systems, and are judiciously chosen to ensure that decoders have different dynamics on a specific finite-length code. An algorithm is proposed which uses random jumps in the iterative message passing trajectories, such that the system is not trapped in periodic attractors. We show by simulations that the FAID diversity approach with random jumps has the potential of approaching the performance of maximum-likelihood decoding for finite-length regular, column-weight three codes.
为了提高常规低密度奇偶校验码在信念传播性能之外的纠错能力,我们引入了一种称为FAID分集的通用方法。该方法依赖于操作一组有限字母表迭代解码器(FAID)。消息传递更新规则被解释为离散的动态系统,并被明智地选择以确保解码器在特定的有限长度代码上具有不同的动态。提出了一种在迭代信息传递轨迹中使用随机跳变的算法,使系统不会陷入周期性吸引子。我们通过模拟表明,随机跳跃的FAID分集方法对于有限长度规则、列权三码具有接近最大似然解码性能的潜力。
{"title":"Approaching maximum likelihood decoding of finite length LDPC codes via FAID diversity","authors":"D. Declercq, Erbao Li, B. Vasic, S. Planjery","doi":"10.1109/ITW.2012.6404721","DOIUrl":"https://doi.org/10.1109/ITW.2012.6404721","url":null,"abstract":"We introduce a generic approach, called FAID diversity, for improving the error correction capability of regular low-density parity check codes, beyond the belief propagation performance. The method relies on operating a set of finite alphabet iterative decoders (FAID). The message-passing update rules are interpreted as discrete dynamical systems, and are judiciously chosen to ensure that decoders have different dynamics on a specific finite-length code. An algorithm is proposed which uses random jumps in the iterative message passing trajectories, such that the system is not trapped in periodic attractors. We show by simulations that the FAID diversity approach with random jumps has the potential of approaching the performance of maximum-likelihood decoding for finite-length regular, column-weight three codes.","PeriodicalId":325771,"journal":{"name":"2012 IEEE Information Theory Workshop","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115083300","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
期刊
2012 IEEE Information Theory Workshop
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1