首页 > 最新文献

2012 IEEE Information Theory Workshop最新文献

英文 中文
The combinatorial structure of linear deterministic interference channels 线性确定性干涉信道的组合结构
Pub Date : 2012-09-01 DOI: 10.1109/ITW.2012.6404720
S. Saha, R. Berry
Approximate solutions to some long-standing multi-terminal information theoretic problems, in particular interference channels, have been made possible by study of the corresponding linear deterministic models. Here, we illustrate a combinatorial structure underlying linear deterministic interference channels (LDIC). This enables a systematic design of sum-capacity achievable schemes in a general 2-user LDIC.
对于一些长期存在的多终端信息理论问题,特别是干扰信道问题,通过研究相应的线性确定性模型,可以得到近似解。在这里,我们展示了线性确定性干涉通道(LDIC)的组合结构。这使得在一般的2用户LDIC中系统地设计可实现的和容量方案成为可能。
{"title":"The combinatorial structure of linear deterministic interference channels","authors":"S. Saha, R. Berry","doi":"10.1109/ITW.2012.6404720","DOIUrl":"https://doi.org/10.1109/ITW.2012.6404720","url":null,"abstract":"Approximate solutions to some long-standing multi-terminal information theoretic problems, in particular interference channels, have been made possible by study of the corresponding linear deterministic models. Here, we illustrate a combinatorial structure underlying linear deterministic interference channels (LDIC). This enables a systematic design of sum-capacity achievable schemes in a general 2-user LDIC.","PeriodicalId":325771,"journal":{"name":"2012 IEEE Information Theory Workshop","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114626679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Two-source extractors for leaky sources 泄漏源的双源提取器
Pub Date : 2012-09-01 DOI: 10.1109/ITW.2012.6404713
Yu Yu, Xiangxue Li, Hai-feng Qian
A (worst-case) 2-source extractor is a deterministic algorithm that transforms pairwise independent weak random sources into almost uniform random strings. Despite non-constructive proofs that such objects exist with almost optimal parameters, it has been a longstanding open problem to construct `explicit' (aka efficient) functions for sources of `small' constant entropy rate. In particular, best known constructions either require entropy rate of at least 0.4999 (due to Bourgain), or one source must remain with constant entropy rate above half (due to Raz). Motivated by cryptographic applications, we observe that if one source is a leaky source (or it contains a few deterministically extractable entropy), then we will be able to efficiently extract almost all entropy from both sources with nearly optimal entropy loss. Further, our extractor (for leaky sources) does not suffer from the half entropy rate barrier, and it works for all linear (and even sub-linear) entropy sources. The extractor is constructed using the technique of alternating extraction by Dziembowski and Pietrzak (FOCS 2007). Finally, we show that the extractor is almost a worse-case extractor (for the same parameters) in the sense that it only fails for a negligible fraction of sources.
(最坏情况下)2源提取器是一种确定性算法,它将成对独立的弱随机源转换为几乎一致的随机字符串。尽管非建设性的证据表明,这些对象存在几乎最优的参数,但为“小”恒定熵率源构建“显式”(即有效)函数一直是一个长期存在的开放问题。特别是,最著名的结构要么要求熵率至少为0.4999(由于布尔甘),要么一个源必须保持恒定的熵率超过一半(由于拉兹)。在密码学应用的激励下,我们观察到,如果一个源是泄漏源(或者它包含一些确定性可提取的熵),那么我们将能够有效地从两个源中提取几乎所有的熵,并且熵损失接近最优。此外,我们的提取器(对于泄漏源)不受半熵率障碍的影响,它适用于所有线性(甚至亚线性)熵源。提取器采用Dziembowski和Pietrzak (FOCS 2007)的交替提取技术构建。最后,我们展示了提取器几乎是一个更坏的情况提取器(对于相同的参数),因为它只对可忽略不计的部分源失效。
{"title":"Two-source extractors for leaky sources","authors":"Yu Yu, Xiangxue Li, Hai-feng Qian","doi":"10.1109/ITW.2012.6404713","DOIUrl":"https://doi.org/10.1109/ITW.2012.6404713","url":null,"abstract":"A (worst-case) 2-source extractor is a deterministic algorithm that transforms pairwise independent weak random sources into almost uniform random strings. Despite non-constructive proofs that such objects exist with almost optimal parameters, it has been a longstanding open problem to construct `explicit' (aka efficient) functions for sources of `small' constant entropy rate. In particular, best known constructions either require entropy rate of at least 0.4999 (due to Bourgain), or one source must remain with constant entropy rate above half (due to Raz). Motivated by cryptographic applications, we observe that if one source is a leaky source (or it contains a few deterministically extractable entropy), then we will be able to efficiently extract almost all entropy from both sources with nearly optimal entropy loss. Further, our extractor (for leaky sources) does not suffer from the half entropy rate barrier, and it works for all linear (and even sub-linear) entropy sources. The extractor is constructed using the technique of alternating extraction by Dziembowski and Pietrzak (FOCS 2007). Finally, we show that the extractor is almost a worse-case extractor (for the same parameters) in the sense that it only fails for a negligible fraction of sources.","PeriodicalId":325771,"journal":{"name":"2012 IEEE Information Theory Workshop","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133538232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Error exponents for block Markov superposition encoding with varying decoding latency 具有不同解码延迟的块马尔可夫叠加编码的错误指数
Pub Date : 2012-09-01 DOI: 10.1109/ITW.2012.6404666
Glenn Bradford, J. N. Laneman
Block Markov superposition encoding has been used on a number of channels to enable transmitter cooperation, including the decode-and-forward (DF) relaying scheme on the full-duplex relay channel. We analyze the error performance of DF with regular encoding and sliding window decoding as the window size of the decoder is allowed to grow. Specifically, we use Gallager's random coding exponent to analyze the behavior of DF in the finite block length regime where the error probability cannot be made arbitrarily small for a fixed rate and block length. Although using a larger decoding window may not result in a better achievable rate in the infinite block length regime, doing so for finite block lengths enables a higher rate of transmission for a given error probability. In particular, these rate enhancements can lead to a larger range of operating scenarios in which relaying can outperform direct transmission.
块马尔可夫叠加编码已在许多信道上使用,以实现发射机合作,包括全双工中继信道上的解码转发(DF)中继方案。在允许解码器的窗口大小增大的情况下,我们分析了正则编码和滑动窗口解码下DF的误差性能。具体来说,我们使用Gallager随机编码指数来分析DF在有限块长度域中的行为,在这种情况下,对于固定的速率和块长度,错误概率不能任意小。尽管在无限块长度的情况下,使用更大的解码窗口可能不会产生更好的可实现速率,但在有限块长度的情况下,这样做可以在给定的错误概率下获得更高的传输速率。特别是,这些速率增强可以导致更大范围的操作场景,其中中继可以优于直接传输。
{"title":"Error exponents for block Markov superposition encoding with varying decoding latency","authors":"Glenn Bradford, J. N. Laneman","doi":"10.1109/ITW.2012.6404666","DOIUrl":"https://doi.org/10.1109/ITW.2012.6404666","url":null,"abstract":"Block Markov superposition encoding has been used on a number of channels to enable transmitter cooperation, including the decode-and-forward (DF) relaying scheme on the full-duplex relay channel. We analyze the error performance of DF with regular encoding and sliding window decoding as the window size of the decoder is allowed to grow. Specifically, we use Gallager's random coding exponent to analyze the behavior of DF in the finite block length regime where the error probability cannot be made arbitrarily small for a fixed rate and block length. Although using a larger decoding window may not result in a better achievable rate in the infinite block length regime, doing so for finite block lengths enables a higher rate of transmission for a given error probability. In particular, these rate enhancements can lead to a larger range of operating scenarios in which relaying can outperform direct transmission.","PeriodicalId":325771,"journal":{"name":"2012 IEEE Information Theory Workshop","volume":"126 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133421361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Towards integrating Quantize-Map-Forward relaying into LTE LTE中量化映射前向中继集成的研究
Pub Date : 2012-09-01 DOI: 10.1109/ITW.2012.6404661
E. Atsan, R. Knopp, S. Diggavi, C. Fragouli
We present a method to integrate the Quantize-Map-Forward (QMF) relaying scheme [1] into the standard LTE operation, for a two-relay diamond network configuration. Our approach implements QMF using mainly existing LTE modules and functionalities, and results in minimal changes in the standard link-layer LTE operation. In particular, the destination operation is only affected in that we adapt the log-likelihood ratio (LLR) calculations at the decoder input to take into account the existence of relays; thus, the decoding complexity and operations (apart the LLR calculations) are not modified. We report extensive performance evaluations of our scheme using the OpenAirInterface (OAI) link-level simulation tools.
我们提出了一种方法,将量化映射前向(QMF)中继方案[1]集成到标准LTE操作中,用于双中继菱形网络配置。我们的方法主要使用现有的LTE模块和功能来实现QMF,并且对标准链路层LTE操作的变化最小。特别地,只有当我们在解码器输入处调整对数似然比(LLR)计算以考虑继电器的存在时,目标操作才会受到影响;因此,解码的复杂度和操作(除了LLR计算)没有被修改。我们报告了使用OpenAirInterface (OAI)链路级仿真工具对我们的方案进行了广泛的性能评估。
{"title":"Towards integrating Quantize-Map-Forward relaying into LTE","authors":"E. Atsan, R. Knopp, S. Diggavi, C. Fragouli","doi":"10.1109/ITW.2012.6404661","DOIUrl":"https://doi.org/10.1109/ITW.2012.6404661","url":null,"abstract":"We present a method to integrate the Quantize-Map-Forward (QMF) relaying scheme [1] into the standard LTE operation, for a two-relay diamond network configuration. Our approach implements QMF using mainly existing LTE modules and functionalities, and results in minimal changes in the standard link-layer LTE operation. In particular, the destination operation is only affected in that we adapt the log-likelihood ratio (LLR) calculations at the decoder input to take into account the existence of relays; thus, the decoding complexity and operations (apart the LLR calculations) are not modified. We report extensive performance evaluations of our scheme using the OpenAirInterface (OAI) link-level simulation tools.","PeriodicalId":325771,"journal":{"name":"2012 IEEE Information Theory Workshop","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116053378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Compressing multisets using tries 使用重试压缩多集
Pub Date : 2012-09-01 DOI: 10.1109/ITW.2012.6404756
Vincent Gripon, M. Rabbat, Vitaly Skachek, W. Gross
We consider the problem of efficient and lossless representation of a multiset of m words drawn with repetition from a set of size 2n. One expects that encoding the (unordered) multiset should lead to significant savings in rate as compared to encoding an (ordered) sequence with the same words, since information about the order of words in the sequence corresponds to a permutation. We propose and analyze a practical multiset encoder/decoder based on the trie data structure. The act of encoding requires O(m(n + log m)) operations, and decoding requires O(mn) operations. Of particular interest is the case where cardinality of the multiset scales as m = 1/c2n for some c >; 1, as n → ∞. Under this scaling, and when the words in the multiset are drawn independently and uniformly, we show that the proposed encoding leads to an arbitrary improvement in rate over encoding an ordered sequence with the same words. Moreover, the expected length of the proposed codes in this setting is asymptotically within a constant factor of 5/3 of the lower bound.
我们考虑从一个大小为2n的集合中通过重复绘制的m个单词的多集的高效无损表示问题。与用相同的单词编码(有序)序列相比,对(无序)多集进行编码可以显著节省速率,因为关于序列中单词顺序的信息对应于排列。提出并分析了一种实用的基于trie数据结构的多集编码器/解码器。编码需要O(m(n + log m))次操作,解码需要O(mn)次操作。特别有趣的是,对于某些c >,多集的基数规模为m = 1/c2n的情况;1,当n→∞。在这种尺度下,当多集中的单词独立且均匀地绘制时,我们证明了所提出的编码比用相同的单词编码有序序列的速率有任意的提高。此外,在这种情况下,所提出的代码的期望长度渐近地在下界的5/3的常数因子内。
{"title":"Compressing multisets using tries","authors":"Vincent Gripon, M. Rabbat, Vitaly Skachek, W. Gross","doi":"10.1109/ITW.2012.6404756","DOIUrl":"https://doi.org/10.1109/ITW.2012.6404756","url":null,"abstract":"We consider the problem of efficient and lossless representation of a multiset of m words drawn with repetition from a set of size 2n. One expects that encoding the (unordered) multiset should lead to significant savings in rate as compared to encoding an (ordered) sequence with the same words, since information about the order of words in the sequence corresponds to a permutation. We propose and analyze a practical multiset encoder/decoder based on the trie data structure. The act of encoding requires O(m(n + log m)) operations, and decoding requires O(mn) operations. Of particular interest is the case where cardinality of the multiset scales as m = 1/c2n for some c >; 1, as n → ∞. Under this scaling, and when the words in the multiset are drawn independently and uniformly, we show that the proposed encoding leads to an arbitrary improvement in rate over encoding an ordered sequence with the same words. Moreover, the expected length of the proposed codes in this setting is asymptotically within a constant factor of 5/3 of the lower bound.","PeriodicalId":325771,"journal":{"name":"2012 IEEE Information Theory Workshop","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116291954","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
On the additive complexity of the cyclotomic FFT algorithm 分环FFT算法的加性复杂度
Pub Date : 2012-09-01 DOI: 10.1109/ITW.2012.6404732
P. Trifonov
The problem of efficient evaluation of the discrete Fourier transform over finite fields is considered. The techniques for additive complexity reduction of the cyclotomic FFT algorithm are proposed. The first one is based on the classical simultaneous reduction algorithm. The second one is based on a factorization of the presummation matrix into a sparse and block-diagonal ones. The proposed methods provide smaller asymptotic complexity, although for small-sized problems the required number of operations appears to be higher than the complexity of computer-optimized algorithms.
研究有限域上离散傅里叶变换的有效求值问题。提出了切眼FFT算法的加性复杂度降低技术。第一种是基于经典的同步约简算法。第二种方法是将假设矩阵分解为稀疏矩阵和对角块矩阵。所提出的方法提供了较小的渐近复杂性,尽管对于小型问题所需的操作次数似乎高于计算机优化算法的复杂性。
{"title":"On the additive complexity of the cyclotomic FFT algorithm","authors":"P. Trifonov","doi":"10.1109/ITW.2012.6404732","DOIUrl":"https://doi.org/10.1109/ITW.2012.6404732","url":null,"abstract":"The problem of efficient evaluation of the discrete Fourier transform over finite fields is considered. The techniques for additive complexity reduction of the cyclotomic FFT algorithm are proposed. The first one is based on the classical simultaneous reduction algorithm. The second one is based on a factorization of the presummation matrix into a sparse and block-diagonal ones. The proposed methods provide smaller asymptotic complexity, although for small-sized problems the required number of operations appears to be higher than the complexity of computer-optimized algorithms.","PeriodicalId":325771,"journal":{"name":"2012 IEEE Information Theory Workshop","volume":"140 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133579443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Differential privacy as a protocol constraint 作为协议约束的差分隐私
Pub Date : 2012-09-01 DOI: 10.1109/ITW.2012.6404769
Ilya Mironov
Differential privacy, introduced in 2006, has become a standard definition of privacy for statistical computations. Most of the research on differential privacy has explored questions arising in the client-server setting, where privacy guarantees are one-sided and cover data held by just one of the protocol participants. We observe that differential privacy complements the classic definition of secure multi-party computations by allowing one to quantify information leaked through the output of the computation. This view leads to a number of interesting questions, where differential privacy is treated as a constraint on the protocol. We survey the state-of-the-art of differential privacy in a multi-party setting and formulate several open problems.
2006年引入的差分隐私已经成为统计计算隐私的标准定义。大多数关于差异隐私的研究都探讨了客户端-服务器设置中出现的问题,其中隐私保证是片面的,只涵盖协议参与者之一持有的数据。我们观察到,差分隐私通过允许人们量化通过计算输出泄露的信息来补充安全多方计算的经典定义。这种观点导致了许多有趣的问题,其中差异隐私被视为协议的约束。我们调查了多方环境下差分隐私的现状,并提出了几个有待解决的问题。
{"title":"Differential privacy as a protocol constraint","authors":"Ilya Mironov","doi":"10.1109/ITW.2012.6404769","DOIUrl":"https://doi.org/10.1109/ITW.2012.6404769","url":null,"abstract":"Differential privacy, introduced in 2006, has become a standard definition of privacy for statistical computations. Most of the research on differential privacy has explored questions arising in the client-server setting, where privacy guarantees are one-sided and cover data held by just one of the protocol participants. We observe that differential privacy complements the classic definition of secure multi-party computations by allowing one to quantify information leaked through the output of the computation. This view leads to a number of interesting questions, where differential privacy is treated as a constraint on the protocol. We survey the state-of-the-art of differential privacy in a multi-party setting and formulate several open problems.","PeriodicalId":325771,"journal":{"name":"2012 IEEE Information Theory Workshop","volume":"205 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133069122","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Construction of lattices from polar codes 用极码构造格
Pub Date : 2012-09-01 DOI: 10.1109/ITW.2012.6404640
Yanfei Yan, Cong Ling
We employ polar codes as the building blocks of Construction D to construct lattices for the additive white Gaussian noise (AWGN) channel. The construction of these component polar codes is based on the idea of Pedarsani et al. for binary-input memoryless symmetric (BMS) channels. Our lattice construction takes the advantage of the performance gain of polar codes over Reed-Muller codes. Simulation results show the lattices constructed from polar codes outperform the benchmark Barnes-Wall lattices, which are constructed from Reed-Muller codes.
我们采用极码作为构造D的构造块来构造加性高斯白噪声(AWGN)信道的格。这些分量极码的构造是基于Pedarsani等人对二进制输入无记忆对称(BMS)信道的思想。我们的晶格结构利用了极性码相对于里德-穆勒码的性能增益。仿真结果表明,用极码构造的格子比用Reed-Muller码构造的格子性能更好。
{"title":"A Construction of lattices from polar codes","authors":"Yanfei Yan, Cong Ling","doi":"10.1109/ITW.2012.6404640","DOIUrl":"https://doi.org/10.1109/ITW.2012.6404640","url":null,"abstract":"We employ polar codes as the building blocks of Construction D to construct lattices for the additive white Gaussian noise (AWGN) channel. The construction of these component polar codes is based on the idea of Pedarsani et al. for binary-input memoryless symmetric (BMS) channels. Our lattice construction takes the advantage of the performance gain of polar codes over Reed-Muller codes. Simulation results show the lattices constructed from polar codes outperform the benchmark Barnes-Wall lattices, which are constructed from Reed-Muller codes.","PeriodicalId":325771,"journal":{"name":"2012 IEEE Information Theory Workshop","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121955763","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Coded cooperative data exchange for multiple unicasts 多个单播的编码协作数据交换
Pub Date : 2012-09-01 DOI: 10.1109/ITW.2012.6404743
Shahriar Etemadi Tajbakhsh, P. Sadeghi
The advantages of coded cooperative data exchange has been studied in the literature. In this problem, a group of wireless clients are interested in the same set of packets (a multicast scenario). Each client initially holds a subset of packets and wills to obtain its missing packets in a cooperative setting by exchanging packets with its peers. Cooperation via short range transmission links among the clients (which are faster, cheaper and more reliable) is an alternative for retransmissions by the base station. In this paper, we extend the problem of cooperative data exchange to the case of multiple unicasts to a set of n clients, where each client ci is interested in a specific message xi and the clients cooperate with each others to compensate the errors occurred over the downlink. Moreover, our proposed method maintains the secrecy of individuals' messages at the price of a substantially small overhead.
文献已经研究了编码协作数据交换的优点。在这个问题中,一组无线客户端对同一组数据包感兴趣(多播场景)。每个客户端最初持有一个数据包子集,并希望通过与对等端交换数据包,在协作设置中获取其丢失的数据包。客户之间通过短距离传输链路进行合作(这种方式更快、更便宜、更可靠)是由基站重新传输的另一种选择。在本文中,我们将协作数据交换问题扩展到多个单播情况下的n个客户端,其中每个客户端ci对特定的消息xi感兴趣,并且客户端相互合作以补偿下行链路上发生的错误。此外,我们提出的方法以很小的开销为代价保持了个人消息的保密性。
{"title":"Coded cooperative data exchange for multiple unicasts","authors":"Shahriar Etemadi Tajbakhsh, P. Sadeghi","doi":"10.1109/ITW.2012.6404743","DOIUrl":"https://doi.org/10.1109/ITW.2012.6404743","url":null,"abstract":"The advantages of coded cooperative data exchange has been studied in the literature. In this problem, a group of wireless clients are interested in the same set of packets (a multicast scenario). Each client initially holds a subset of packets and wills to obtain its missing packets in a cooperative setting by exchanging packets with its peers. Cooperation via short range transmission links among the clients (which are faster, cheaper and more reliable) is an alternative for retransmissions by the base station. In this paper, we extend the problem of cooperative data exchange to the case of multiple unicasts to a set of n clients, where each client ci is interested in a specific message xi and the clients cooperate with each others to compensate the errors occurred over the downlink. Moreover, our proposed method maintains the secrecy of individuals' messages at the price of a substantially small overhead.","PeriodicalId":325771,"journal":{"name":"2012 IEEE Information Theory Workshop","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129258917","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 37
Source coding for dependent sources 依赖源的源代码
Pub Date : 2012-09-01 DOI: 10.1109/ITW.2012.6404766
M. Langberg, M. Effros
In this work, we address the capacity region of multi-source multi-terminal network communication problems, and study the change in capacity when one moves form independent to dependent source information. Specifically, we ask whether the trade off between capacity and source independence is of continuous nature. We tie the question at hand to that of edge removal which has seen recent interest.
本文研究了多源多终端网络通信的容量区域问题,研究了源信息从独立到依赖时容量的变化。具体来说,我们要问的是容量和源独立性之间的权衡是否具有连续性。我们将手头的问题与最近引起兴趣的边缘去除问题联系起来。
{"title":"Source coding for dependent sources","authors":"M. Langberg, M. Effros","doi":"10.1109/ITW.2012.6404766","DOIUrl":"https://doi.org/10.1109/ITW.2012.6404766","url":null,"abstract":"In this work, we address the capacity region of multi-source multi-terminal network communication problems, and study the change in capacity when one moves form independent to dependent source information. Specifically, we ask whether the trade off between capacity and source independence is of continuous nature. We tie the question at hand to that of edge removal which has seen recent interest.","PeriodicalId":325771,"journal":{"name":"2012 IEEE Information Theory Workshop","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127824565","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
期刊
2012 IEEE Information Theory Workshop
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1