首页 > 最新文献

2012 IEEE Information Theory Workshop最新文献

英文 中文
Fundamental limits on power consumption for lossless signal reconstruction 无损信号重建的基本功耗限制
Pub Date : 2012-09-01 DOI: 10.1109/ITW.2012.6404730
P. Grover
Does approaching fundamental limits on rates of information acquisitionor transmission fundamentally require increased power consumption in the processing circuitry? Our recent work shows that this is the case for channel coding for some simple circuit and channel models. In this paper, we first develop parallel results for source coding. Reinterpreting existing results on complexity of lossless source coding, we first observe that the sum power consumed in computational nodes in the circuitry of the encoder and the decoder diverges to infinity as the target error probability approaches zero and the coding rate approaches the source entropy. Next, focusing on on-chip wires, we show that the power consumed in circuit wiring also diverges to infinity as the error probability approaches zero. For the closely related problem of recovering a sparse signal, we first derive a fundamental bound on the required number of “finite-capacity” (e.g. quantized or noisy) measurements. By extending our bounds on wiring complexity and power consumption to sparse-signal recovery, we observe that there is a tradeoff between measurement power and power required to compute the recovered signal.
接近信息获取或传输速率的基本限制是否需要在处理电路中增加功率消耗?我们最近的工作表明,对于一些简单的电路和信道模型,信道编码就是这种情况。在本文中,我们首先开发了源代码编码的并行结果。重新解释现有的关于无损源编码复杂性的结果,我们首先观察到,当目标错误概率趋近于零,编码速率趋近于源熵时,编码器和解码器电路中计算节点消耗的总功率趋于无穷大。接下来,专注于片上导线,我们展示了当误差概率接近于零时,电路布线中消耗的功率也会发散到无穷大。对于与恢复稀疏信号密切相关的问题,我们首先推导出“有限容量”(例如量化或噪声)测量所需数量的基本界。通过将布线复杂性和功耗的界限扩展到稀疏信号恢复,我们观察到测量功率和计算恢复信号所需的功率之间存在权衡。
{"title":"Fundamental limits on power consumption for lossless signal reconstruction","authors":"P. Grover","doi":"10.1109/ITW.2012.6404730","DOIUrl":"https://doi.org/10.1109/ITW.2012.6404730","url":null,"abstract":"Does approaching fundamental limits on rates of information acquisitionor transmission fundamentally require increased power consumption in the processing circuitry? Our recent work shows that this is the case for channel coding for some simple circuit and channel models. In this paper, we first develop parallel results for source coding. Reinterpreting existing results on complexity of lossless source coding, we first observe that the sum power consumed in computational nodes in the circuitry of the encoder and the decoder diverges to infinity as the target error probability approaches zero and the coding rate approaches the source entropy. Next, focusing on on-chip wires, we show that the power consumed in circuit wiring also diverges to infinity as the error probability approaches zero. For the closely related problem of recovering a sparse signal, we first derive a fundamental bound on the required number of “finite-capacity” (e.g. quantized or noisy) measurements. By extending our bounds on wiring complexity and power consumption to sparse-signal recovery, we observe that there is a tradeoff between measurement power and power required to compute the recovered signal.","PeriodicalId":325771,"journal":{"name":"2012 IEEE Information Theory Workshop","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130089401","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Decode-and-forward for the Gaussian relay channel via standard AWGN coding and decoding 解码和转发为高斯中继信道通过标准AWGN编码和解码
Pub Date : 2012-09-01 DOI: 10.1109/ITW.2012.6404714
A. Khina, Or Ordentlich, U. Erez, Y. Kochman, G. Wornell
This work considers practical implementation of the decode-and-forward relaying protocol for the full-duplex Gaussian relay channel. Unlike previous works which developed coding techniques tailored to this protocol, it is shown that standard codes which are good for the Gaussian scalar channel of fixed signal-to-noise ratio suffice to approach the theoretical performance promised by this protocol. The proposed technique employs only linear operations and successive interference cancelation in conjunction with fixed signal-to-noise ratio base codes, and the achievable rate is solely dictated by the performance of these base codes. The same approach and results carry over to the multiple-antenna case as well.
本工作考虑了全双工高斯中继信道的译码转发中继协议的实际实现。与以往针对该协议开发的编码技术不同,研究表明,适用于固定信噪比的高斯标量信道的标准编码足以接近该协议所承诺的理论性能。所提出的技术仅采用线性运算和连续干扰消除与固定信噪比基码相结合,并且可实现的速率仅由这些基码的性能决定。同样的方法和结果也适用于多天线的情况。
{"title":"Decode-and-forward for the Gaussian relay channel via standard AWGN coding and decoding","authors":"A. Khina, Or Ordentlich, U. Erez, Y. Kochman, G. Wornell","doi":"10.1109/ITW.2012.6404714","DOIUrl":"https://doi.org/10.1109/ITW.2012.6404714","url":null,"abstract":"This work considers practical implementation of the decode-and-forward relaying protocol for the full-duplex Gaussian relay channel. Unlike previous works which developed coding techniques tailored to this protocol, it is shown that standard codes which are good for the Gaussian scalar channel of fixed signal-to-noise ratio suffice to approach the theoretical performance promised by this protocol. The proposed technique employs only linear operations and successive interference cancelation in conjunction with fixed signal-to-noise ratio base codes, and the achievable rate is solely dictated by the performance of these base codes. The same approach and results carry over to the multiple-antenna case as well.","PeriodicalId":325771,"journal":{"name":"2012 IEEE Information Theory Workshop","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121399206","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
A theoretical approach to gene network identification 基因网络识别的理论方法
Pub Date : 2012-09-01 DOI: 10.1109/ITW.2012.6404709
J. Birget, D. Lun, Anthony Wirth, Dawei Hong
We take a theoretical approach to the problem of identification, or “reverse engineering”, of gene regulatory networks. Through a mathematical model of a gene regulatory network, we examine fundamental questions on the limits and achievability of network identification. We apply simplifying assumptions to construct an acyclic binary model, and we assume that the identification strategy is restricted to perturbing the network by gene expression assignments, followed by expression profile measurements at steady-state. Further, we assume the presence of side information, which we call sensitivity, that is likely to be present in actual gene networks. We show that with sensitivity side information and realistic topology assumptions we can identify the topology of acyclic binary networks using O(n) assignments and measurements, n being the number of genes in the network. Our work establishes a theoretical framework for examining an important technological problem where a number of significant questions remain open.
我们采取理论方法来识别问题,或“逆向工程”,基因调控网络。通过基因调控网络的数学模型,我们研究了网络识别的限制和可实现性的基本问题。我们应用简化假设来构建一个无环二元模型,并假设识别策略仅限于通过基因表达赋值来干扰网络,然后在稳态下进行表达谱测量。此外,我们假设存在侧信息,我们称之为敏感性,这可能存在于实际的基因网络中。我们表明,在敏感侧信息和现实的拓扑假设下,我们可以使用O(n)分配和测量来识别无环二元网络的拓扑,n是网络中基因的数量。我们的工作建立了一个理论框架,用于检查一个重要的技术问题,其中许多重要的问题仍然开放。
{"title":"A theoretical approach to gene network identification","authors":"J. Birget, D. Lun, Anthony Wirth, Dawei Hong","doi":"10.1109/ITW.2012.6404709","DOIUrl":"https://doi.org/10.1109/ITW.2012.6404709","url":null,"abstract":"We take a theoretical approach to the problem of identification, or “reverse engineering”, of gene regulatory networks. Through a mathematical model of a gene regulatory network, we examine fundamental questions on the limits and achievability of network identification. We apply simplifying assumptions to construct an acyclic binary model, and we assume that the identification strategy is restricted to perturbing the network by gene expression assignments, followed by expression profile measurements at steady-state. Further, we assume the presence of side information, which we call sensitivity, that is likely to be present in actual gene networks. We show that with sensitivity side information and realistic topology assumptions we can identify the topology of acyclic binary networks using O(n) assignments and measurements, n being the number of genes in the network. Our work establishes a theoretical framework for examining an important technological problem where a number of significant questions remain open.","PeriodicalId":325771,"journal":{"name":"2012 IEEE Information Theory Workshop","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129521746","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Grassmannian signalling achieves the ergodic high SNR capacity of the non-coherent MIMO relay channel within an SNR-independent gap 格拉斯曼信令在信噪比无关的间隙内实现了非相干MIMO中继信道的遍历高信噪比容量
Pub Date : 2012-09-01 DOI: 10.1109/ITW.2012.6404711
R. Gohary, H. Yanikomeroglu
This paper considers the ergodic non-coherent capacity of a multiple-input multiple-output frequency-flat block Rayleigh fading relay channel. It is shown that for this channel restricting the input distribution to be isotropic on a compact Grassmann manifold maximizes an upper bound on the cut-set bound at high signal-to-noise ratios (SNRs). Furthermore, Grassmannian signalling at the source achieves this bound within an SNR-independent gap. For moderate-to-high SNRs, a Grassmannian decode-and-forward (DF) relaying scheme is devised, and the optimal signalling dimensionality that minimizes the gap to the upper bound is obtained.
研究了多输入多输出平块瑞利衰落中继信道的遍历非相干容量。结果表明,在高信噪比(SNRs)条件下,将该通道的输入分布限制为紧致格拉斯曼流形上的各向同性,可使切集界上界达到最大值。此外,源处的格拉斯曼信号在信噪比无关的间隙内实现了这个界限。针对中高信噪比,设计了一种格拉斯曼式解码转发(DF)中继方案,并获得了使距离上界最小的最优信令维数。
{"title":"Grassmannian signalling achieves the ergodic high SNR capacity of the non-coherent MIMO relay channel within an SNR-independent gap","authors":"R. Gohary, H. Yanikomeroglu","doi":"10.1109/ITW.2012.6404711","DOIUrl":"https://doi.org/10.1109/ITW.2012.6404711","url":null,"abstract":"This paper considers the ergodic non-coherent capacity of a multiple-input multiple-output frequency-flat block Rayleigh fading relay channel. It is shown that for this channel restricting the input distribution to be isotropic on a compact Grassmann manifold maximizes an upper bound on the cut-set bound at high signal-to-noise ratios (SNRs). Furthermore, Grassmannian signalling at the source achieves this bound within an SNR-independent gap. For moderate-to-high SNRs, a Grassmannian decode-and-forward (DF) relaying scheme is devised, and the optimal signalling dimensionality that minimizes the gap to the upper bound is obtained.","PeriodicalId":325771,"journal":{"name":"2012 IEEE Information Theory Workshop","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130758774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Constructing good QC-LDPC codes by pre-lifting protographs 用预提升原型构造好的QC-LDPC代码
Pub Date : 2012-09-01 DOI: 10.1109/ITW.2012.6404658
David G. M. Mitchell, R. Smarandache, D. Costello
Quasi-cyclic (QC) low-density parity-check (LDPC) codes are of great interest to code designers because of their implementation advantages and algebraic properties that facilitate their analysis. In this paper, we present some new results on QC-LDPC codes that are constructed using a two-step lifting procedure based on a protograph, and, by implementing this method instead of the usual one-step procedure, we are able to show improved minimum distance and girth properties. We also present two design rules to construct QC-LDPC codes: one uses only circulant permutation matrices at the first (pre-lifting) stage and the other uses a selection of non-commuting permutation matrices. For both techniques, we obtain a demonstrable increase in the minimum distance compared to a one-step circulant-based lifting. The expected performance improvement is verified by simulation results.
准循环(QC)低密度奇偶校验(LDPC)码由于其实现优势和便于分析的代数性质而引起了码设计者的极大兴趣。在本文中,我们给出了用基于原型的两步提升程序构造QC-LDPC码的一些新结果,并且,通过实现这种方法而不是通常的一步程序,我们能够显示出改进的最小距离和周长性质。我们还提出了构造QC-LDPC码的两个设计规则:一个在第一(提升前)阶段仅使用循环置换矩阵,另一个使用非交换置换矩阵的选择。对于这两种技术,与一步循环举升相比,我们获得了明显的最小距离增加。仿真结果验证了预期的性能改进。
{"title":"Constructing good QC-LDPC codes by pre-lifting protographs","authors":"David G. M. Mitchell, R. Smarandache, D. Costello","doi":"10.1109/ITW.2012.6404658","DOIUrl":"https://doi.org/10.1109/ITW.2012.6404658","url":null,"abstract":"Quasi-cyclic (QC) low-density parity-check (LDPC) codes are of great interest to code designers because of their implementation advantages and algebraic properties that facilitate their analysis. In this paper, we present some new results on QC-LDPC codes that are constructed using a two-step lifting procedure based on a protograph, and, by implementing this method instead of the usual one-step procedure, we are able to show improved minimum distance and girth properties. We also present two design rules to construct QC-LDPC codes: one uses only circulant permutation matrices at the first (pre-lifting) stage and the other uses a selection of non-commuting permutation matrices. For both techniques, we obtain a demonstrable increase in the minimum distance compared to a one-step circulant-based lifting. The expected performance improvement is verified by simulation results.","PeriodicalId":325771,"journal":{"name":"2012 IEEE Information Theory Workshop","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124324430","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An MDL-based change-detection algorithm with its applications to learning piecewise stationary memoryless sources 一种基于mdl的变化检测算法及其在分段平稳无记忆源学习中的应用
Pub Date : 2012-09-01 DOI: 10.1109/ITW.2012.6404736
Hiroki Kanazawa, K. Yamanishi
Kleinberg has proposed an algorithm for detecting bursts from a data sequence, which has turned out to be effective in the scenario of data mining, such as topic detection, change-detection. In this paper we extend Kleinberg's algorithm in an information-theoretic fashion to obtain a new class of algorithms and apply it into learning of piecewise stationary memoryless sources (PSMSs). The keys of the proposed algorithm are; 1) the parameter space is discretized so that discretization scale depends on the Fisher information, and 2) the optimal path over the discretized parameter space is efficiently computed using the dynamic programming method so that the sum of the data and parameter description lengths is minimized on the basis of the MDL principle. We prove that an upper bound on the total code-length for the proposed algorithm asymptotically matches Merhav's lower bound.
Kleinberg提出了一种从数据序列中检测突发的算法,该算法在数据挖掘的场景中非常有效,如主题检测、变化检测等。本文从信息论的角度对Kleinberg算法进行了扩展,得到了一类新的算法,并将其应用于分段平稳无记忆源的学习。该算法的关键字为;1)对参数空间进行离散化,使离散化尺度依赖于Fisher信息;2)根据MDL原理,利用动态规划方法高效地计算离散化参数空间上的最优路径,使数据和参数描述长度之和最小。我们证明了该算法的总码长上界与Merhav下界渐近匹配。
{"title":"An MDL-based change-detection algorithm with its applications to learning piecewise stationary memoryless sources","authors":"Hiroki Kanazawa, K. Yamanishi","doi":"10.1109/ITW.2012.6404736","DOIUrl":"https://doi.org/10.1109/ITW.2012.6404736","url":null,"abstract":"Kleinberg has proposed an algorithm for detecting bursts from a data sequence, which has turned out to be effective in the scenario of data mining, such as topic detection, change-detection. In this paper we extend Kleinberg's algorithm in an information-theoretic fashion to obtain a new class of algorithms and apply it into learning of piecewise stationary memoryless sources (PSMSs). The keys of the proposed algorithm are; 1) the parameter space is discretized so that discretization scale depends on the Fisher information, and 2) the optimal path over the discretized parameter space is efficiently computed using the dynamic programming method so that the sum of the data and parameter description lengths is minimized on the basis of the MDL principle. We prove that an upper bound on the total code-length for the proposed algorithm asymptotically matches Merhav's lower bound.","PeriodicalId":325771,"journal":{"name":"2012 IEEE Information Theory Workshop","volume":"42 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128772462","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Privacy amplification theorem for bounded storage eavesdropper 有界存储窃听器的隐私放大定理
Pub Date : 2012-09-01 DOI: 10.1109/ITW.2012.6404652
Shun Watanabe, Y. Oohama
In this paper, we consider a situation such that legitimate parties, Alice and Bob, share an identical source to generate a secret key, and an eavesdropper, Eve, can access a correlated data that is stored in a storage with bounded size. Then, Alice and Bob want to extract a secret as long as possible. We show a privacy amplification theorem for this problem, i.e., we clarify the rate of key generation for given rate of Eve's storage. The problem can be regarded as a dual randomness generation problem of the Wyner-Ahlswede-Körner type source coding system, and the techniques used in the proof are exchanged, i.e., the so-called Markov lemma is used in the converse part, and the so-called image size characterization is used in the direct part.
在本文中,我们考虑这样一种情况:合法各方Alice和Bob共享相同的源来生成密钥,而窃听者Eve可以访问存储在有限大小的存储中的相关数据。然后,Alice和Bob想要尽可能长地提取一个秘密。我们展示了这个问题的隐私放大定理,即,我们阐明了给定夏娃存储速率的密钥生成速率。该问题可以看作是Wyner-Ahlswede-Körner型源编码系统的对偶随机生成问题,并且在证明中使用的技术进行了交换,即在逆向部分使用所谓的马尔可夫引理,在正向部分使用所谓的图像尺寸表征。
{"title":"Privacy amplification theorem for bounded storage eavesdropper","authors":"Shun Watanabe, Y. Oohama","doi":"10.1109/ITW.2012.6404652","DOIUrl":"https://doi.org/10.1109/ITW.2012.6404652","url":null,"abstract":"In this paper, we consider a situation such that legitimate parties, Alice and Bob, share an identical source to generate a secret key, and an eavesdropper, Eve, can access a correlated data that is stored in a storage with bounded size. Then, Alice and Bob want to extract a secret as long as possible. We show a privacy amplification theorem for this problem, i.e., we clarify the rate of key generation for given rate of Eve's storage. The problem can be regarded as a dual randomness generation problem of the Wyner-Ahlswede-Körner type source coding system, and the techniques used in the proof are exchanged, i.e., the so-called Markov lemma is used in the converse part, and the so-called image size characterization is used in the direct part.","PeriodicalId":325771,"journal":{"name":"2012 IEEE Information Theory Workshop","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128539920","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Finite-length performance of spatially-coupled LDPC codes under TEP decoding 空间耦合LDPC码在TEP译码下的有限长度性能
Pub Date : 2012-09-01 DOI: 10.1109/ITW.2012.6404722
P. Olmos, F. Pérez-Cruz, Luis Salamanca, J. J. Murillo-Fuentes
Spatially-coupled (SC) LDPC codes are constructed from a set of L regular sparse codes of length M. In the asymptotic limit of these parameters, SC codes present an excellent decoding threshold under belief propagation (BP) decoding, close to the maximum a posteriori (MAP) threshold of the underlying regular code. In the finite-length regime, we need both dimensions, L and M, to be sufficiently large, yielding a very large code length and decoding latency. In this paper, and for the erasure channel, we show that the finite-length performance of SC codes is improved if we consider the tree-structured expectation propagation (TEP) algorithm in the decoding stage. When applied to the decoding of SC LDPC codes, it allows using shorter codes to achieve similar error rates. We also propose a window-sliding scheme for the TEP decoder to reduce the decoding latency.
空间耦合(SC) LDPC码由长度为m的L个正则稀疏码组成,在这些参数的渐近极限下,SC码在信念传播(BP)译码下表现出良好的译码阈值,接近底层正则码的最大后验阈值。在有限长度的情况下,我们需要L和M这两个维度都足够大,从而产生非常大的代码长度和解码延迟。在本文中,对于擦除信道,我们证明了如果在解码阶段考虑树结构期望传播(TEP)算法,则SC码的有限长度性能得到了改善。当应用于解码SC LDPC码时,它允许使用更短的码来实现相似的错误率。我们还为TEP解码器提出了一种窗口滑动方案,以减少解码延迟。
{"title":"Finite-length performance of spatially-coupled LDPC codes under TEP decoding","authors":"P. Olmos, F. Pérez-Cruz, Luis Salamanca, J. J. Murillo-Fuentes","doi":"10.1109/ITW.2012.6404722","DOIUrl":"https://doi.org/10.1109/ITW.2012.6404722","url":null,"abstract":"Spatially-coupled (SC) LDPC codes are constructed from a set of L regular sparse codes of length M. In the asymptotic limit of these parameters, SC codes present an excellent decoding threshold under belief propagation (BP) decoding, close to the maximum a posteriori (MAP) threshold of the underlying regular code. In the finite-length regime, we need both dimensions, L and M, to be sufficiently large, yielding a very large code length and decoding latency. In this paper, and for the erasure channel, we show that the finite-length performance of SC codes is improved if we consider the tree-structured expectation propagation (TEP) algorithm in the decoding stage. When applied to the decoding of SC LDPC codes, it allows using shorter codes to achieve similar error rates. We also propose a window-sliding scheme for the TEP decoder to reduce the decoding latency.","PeriodicalId":325771,"journal":{"name":"2012 IEEE Information Theory Workshop","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116924412","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The analog formulation of sparsity implies infinite divisibility and rules out Bernoulli-Gaussian priors 稀疏性的模拟公式意味着无限可除性,并排除伯努利-高斯先验
Pub Date : 2012-09-01 DOI: 10.1109/ITW.2012.6404765
A. Amini, U. Kamilov, M. Unser
Motivated by the analog nature of real-world signals, we investigate continuous-time random processes. For this purpose, we consider the stochastic processes that can be whitened by linear transformations and we show that the distribution of their samples is necessarily infinitely divisible. As a consequence, such a modeling rules out the Bernoulli-Gaussian distribution since we are able to show in this paper that it is not infinitely divisible. In other words, while the Bernoulli-Gaussian distribution is among the most studied priors for modeling sparse signals, it cannot be associated with any continuous-time stochastic process. Instead, we propose to adapt the priors that correspond to the increments of compound Poisson processes, which are both sparse and infinitely divisible.
由于真实世界信号的模拟性质,我们研究了连续时间随机过程。为此,我们考虑了可以用线性变换白化的随机过程,并证明了它们的样本分布必然是无限可分的。因此,这样的建模排除了伯努利-高斯分布,因为我们能够在本文中证明它不是无限可分的。换句话说,虽然伯努利-高斯分布是对稀疏信号建模研究最多的先验之一,但它不能与任何连续时间随机过程相关联。相反,我们建议调整与复合泊松过程的增量相对应的先验,这些过程既稀疏又无限可分。
{"title":"The analog formulation of sparsity implies infinite divisibility and rules out Bernoulli-Gaussian priors","authors":"A. Amini, U. Kamilov, M. Unser","doi":"10.1109/ITW.2012.6404765","DOIUrl":"https://doi.org/10.1109/ITW.2012.6404765","url":null,"abstract":"Motivated by the analog nature of real-world signals, we investigate continuous-time random processes. For this purpose, we consider the stochastic processes that can be whitened by linear transformations and we show that the distribution of their samples is necessarily infinitely divisible. As a consequence, such a modeling rules out the Bernoulli-Gaussian distribution since we are able to show in this paper that it is not infinitely divisible. In other words, while the Bernoulli-Gaussian distribution is among the most studied priors for modeling sparse signals, it cannot be associated with any continuous-time stochastic process. Instead, we propose to adapt the priors that correspond to the increments of compound Poisson processes, which are both sparse and infinitely divisible.","PeriodicalId":325771,"journal":{"name":"2012 IEEE Information Theory Workshop","volume":"148 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130658723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
The energy harvesting multiple access channel with energy storage losses 具有储能损耗的能量收集多址信道
Pub Date : 2012-09-01 DOI: 10.1109/ITW.2012.6404772
Kaya Tutuncuoglu, A. Yener
This work considers a Gaussian multiple access channel with two energy harvesting transmitters with lossy energy storage. The power allocation policy maximizing the average weighted sum rate given the energy harvesting profiles is found. In particular, it is shown that the optimal policy has a double-threshold structure on each of the transmit powers, while the two transmit powers interact through the multivariate achievable rate function which determines the thresholds. For the special case of sum rate maximization in a Gaussian MAC channel, it is shown that the thresholds apply to the sum power, and the optimal policy consists of three thresholds, rather than four, which enables the user with a more efficient battery to be given priority in energy storage.
本文研究了具有两个能量收集发射机的高斯多址信道。在给定能量收集曲线的情况下,找到了使平均加权和率最大化的功率分配策略。特别是,最优策略在每个发射功率上都具有双阈值结构,而两个发射功率通过多元可达率函数相互作用,该函数决定阈值。对于高斯MAC信道中和速率最大化的特殊情况,表明阈值适用于和功率,并且最优策略由三个阈值组成,而不是四个,这使得具有更高效电池的用户在储能中具有优先权。
{"title":"The energy harvesting multiple access channel with energy storage losses","authors":"Kaya Tutuncuoglu, A. Yener","doi":"10.1109/ITW.2012.6404772","DOIUrl":"https://doi.org/10.1109/ITW.2012.6404772","url":null,"abstract":"This work considers a Gaussian multiple access channel with two energy harvesting transmitters with lossy energy storage. The power allocation policy maximizing the average weighted sum rate given the energy harvesting profiles is found. In particular, it is shown that the optimal policy has a double-threshold structure on each of the transmit powers, while the two transmit powers interact through the multivariate achievable rate function which determines the thresholds. For the special case of sum rate maximization in a Gaussian MAC channel, it is shown that the thresholds apply to the sum power, and the optimal policy consists of three thresholds, rather than four, which enables the user with a more efficient battery to be given priority in energy storage.","PeriodicalId":325771,"journal":{"name":"2012 IEEE Information Theory Workshop","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125667365","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
期刊
2012 IEEE Information Theory Workshop
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1