首页 > 最新文献

2008 International Symposium on Information Theory and Its Applications最新文献

英文 中文
On the capacity of flash memories 闪存的容量
Pub Date : 2008-12-01 DOI: 10.1109/ISITA.2008.4895389
Anxiao Jiang, Jehoshua Bruck
Flash memories are the most widely used type of non-volatile electronic memories. Compared to magnetic recording and optical recording, flash memories have the unique property that their cell levels, which represent data, are programmed using an iterative procedure that monotonically shifts each cell level upward toward its target value. In this paper, we study the capacity of flash memories to store data. We explore the relationship among their capacity, programming precision and programming time. The study is focused on the capacity of single cells, and an optimal programming algorithm is presented.
闪存是应用最广泛的一种非易失性电子存储器。与磁记录和光学记录相比,闪存具有独特的特性,即其代表数据的单元水平是使用迭代过程编程的,该过程单调地将每个单元水平向上移动到其目标值。在本文中,我们研究了闪存存储数据的容量。探讨了它们的容量、编程精度和编程时间之间的关系。针对单细胞容量问题进行了研究,提出了一种最优规划算法。
{"title":"On the capacity of flash memories","authors":"Anxiao Jiang, Jehoshua Bruck","doi":"10.1109/ISITA.2008.4895389","DOIUrl":"https://doi.org/10.1109/ISITA.2008.4895389","url":null,"abstract":"Flash memories are the most widely used type of non-volatile electronic memories. Compared to magnetic recording and optical recording, flash memories have the unique property that their cell levels, which represent data, are programmed using an iterative procedure that monotonically shifts each cell level upward toward its target value. In this paper, we study the capacity of flash memories to store data. We explore the relationship among their capacity, programming precision and programming time. The study is focused on the capacity of single cells, and an optimal programming algorithm is presented.","PeriodicalId":338675,"journal":{"name":"2008 International Symposium on Information Theory and Its Applications","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116294301","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Lossy source coding algorithm using lossless multi-terminal source codes 有损源编码算法采用无损多终端源代码
Pub Date : 2008-12-01 DOI: 10.1109/ISITA.2008.4895482
J. Muramatsu, S. Miyake
A lossy source coding algorithm is presented that employs lossless multi-terminal source codes. By using nearly optimal lossless multi-terminal source codes, the proposed algorithm achieves the rate-distortion limit. The construction of lossless multi-terminal source codes, which are needed for the lossy source coding algorithm, can be realized by using sparse matrices, known as Low Density Parity Check (LDPC) matrices, or Turbo codes, and practically efficient decoding algorithms such as the Belief Propagation (BP) algorithm and the Linear Codes Linear Program (LCLP) algorithm.
提出了一种采用无损多终端源代码的有损源编码算法。该算法通过使用近乎最优的无损多终端源代码,实现了对码率失真的限制。有损源编码算法所需要的无损多终端源代码的构造可以通过使用稀疏矩阵(称为低密度奇偶校验(LDPC)矩阵)或Turbo码,以及诸如信念传播(BP)算法和线性码线性程序(LCLP)算法等实用高效的译码算法来实现。
{"title":"Lossy source coding algorithm using lossless multi-terminal source codes","authors":"J. Muramatsu, S. Miyake","doi":"10.1109/ISITA.2008.4895482","DOIUrl":"https://doi.org/10.1109/ISITA.2008.4895482","url":null,"abstract":"A lossy source coding algorithm is presented that employs lossless multi-terminal source codes. By using nearly optimal lossless multi-terminal source codes, the proposed algorithm achieves the rate-distortion limit. The construction of lossless multi-terminal source codes, which are needed for the lossy source coding algorithm, can be realized by using sparse matrices, known as Low Density Parity Check (LDPC) matrices, or Turbo codes, and practically efficient decoding algorithms such as the Belief Propagation (BP) algorithm and the Linear Codes Linear Program (LCLP) algorithm.","PeriodicalId":338675,"journal":{"name":"2008 International Symposium on Information Theory and Its Applications","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127152112","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Beamforming design for the MIMO downlink for maximizing Weighted Sum-Rate 最大化加权和速率的MIMO下行波束成形设计
Pub Date : 2008-12-01 DOI: 10.1109/ISITA.2008.4895555
R. Agarwal, J. Cioffi
This work studies linear transmit filter design for weighted sum-rate (WSR) maximization in the multiple input multiple output broadcast channel (MIMO-BC). The problem of finding the optimal transmit filter is non-convex and intractable to solve. Motivated by the iterative algorithm that solves for the optimal transmit and receive filters for minimizing sum-mean square error (MSE), this paper suggests to use weighted minimum mean square error (WMMSE) optimization in the MIMO-BC. The paper presents an iterative algorithm to maximize WSR. Numerical results for sum-rate using the derived filter are provided under different system settings.
本文研究了多输入多输出广播信道(MIMO-BC)中加权和速率(WSR)最大化的线性传输滤波器设计。寻找最优传输滤波器的问题是非凸的,难以解决。基于求解最大均方误差(sum-mean square error, MSE)的最优收发滤波器的迭代算法,本文建议在MIMO-BC中采用加权最小均方误差(weighted minimum mean square error, WMMSE)优化。本文提出了一种最大化WSR的迭代算法。在不同的系统设置下,给出了使用该滤波器计算和速率的数值结果。
{"title":"Beamforming design for the MIMO downlink for maximizing Weighted Sum-Rate","authors":"R. Agarwal, J. Cioffi","doi":"10.1109/ISITA.2008.4895555","DOIUrl":"https://doi.org/10.1109/ISITA.2008.4895555","url":null,"abstract":"This work studies linear transmit filter design for weighted sum-rate (WSR) maximization in the multiple input multiple output broadcast channel (MIMO-BC). The problem of finding the optimal transmit filter is non-convex and intractable to solve. Motivated by the iterative algorithm that solves for the optimal transmit and receive filters for minimizing sum-mean square error (MSE), this paper suggests to use weighted minimum mean square error (WMMSE) optimization in the MIMO-BC. The paper presents an iterative algorithm to maximize WSR. Numerical results for sum-rate using the derived filter are provided under different system settings.","PeriodicalId":338675,"journal":{"name":"2008 International Symposium on Information Theory and Its Applications","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125974282","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Modulation codes for reader-tag communication on inductively coupled channels 感应耦合信道上读写器-标签通信的调制码
Pub Date : 2008-12-01 DOI: 10.1109/ISITA.2008.4895477
A. Barbero, G. Horler, E. Rosnes, O. Ytrehus
In this paper we study and compare methods for representing information for transmission on inductively coupled channels. We introduce combined runlength and power constraints on modulation codes for such channels, calculate the capacities of these new constraints, and propose new codes that meet the constraints.
本文研究并比较了电感耦合信道上传输信息的表示方法。我们对这些信道的调制码引入了综合的运行长度和功率约束,计算了这些新约束的容量,并提出了满足这些约束的新码。
{"title":"Modulation codes for reader-tag communication on inductively coupled channels","authors":"A. Barbero, G. Horler, E. Rosnes, O. Ytrehus","doi":"10.1109/ISITA.2008.4895477","DOIUrl":"https://doi.org/10.1109/ISITA.2008.4895477","url":null,"abstract":"In this paper we study and compare methods for representing information for transmission on inductively coupled channels. We introduce combined runlength and power constraints on modulation codes for such channels, calculate the capacities of these new constraints, and propose new codes that meet the constraints.","PeriodicalId":338675,"journal":{"name":"2008 International Symposium on Information Theory and Its Applications","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124210751","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Deniable ring authenticated private key establishment 可否认环认证私钥建立
Pub Date : 2008-12-01 DOI: 10.1109/ISITA.2008.4895467
E.T. Taniguchi, H. Yamamoto
In this paper, we extend the work by M. Naor [7] on deniable ring authentication to include key establishment. Two secure deniable private key establishment protocols will be proposed. These two related schemes create only a secure private channel between Alice and Bob where the identity of Bob remains completely hidden. The first scheme does not require Alice to been within the user set S and in fact does not even require Alice to have a public-private key pair. The second scheme requires that Alice choose a user set S such that she is also within set S. This scheme also indirectly requires that Alice have a public-private key pair. Similar to the deniable ring authentication protocol by Naor, the protocols proposed here only assumes the existence of strong public key encryption schemes where all members have already established public and private keys. Finally, the problem of ciphertext search and ciphertext ambiguity will also be examined and a solution will be proposed.
在本文中,我们扩展了M. Naor[7]在可否认环认证方面的工作,使其包含密钥建立。提出了两种安全的可否认私钥建立协议。这两个相关的方案只在Alice和Bob之间创建一个安全的私有通道,其中Bob的身份完全隐藏。第一种方案不要求Alice在用户集S内,实际上甚至不要求Alice拥有公私钥对。第二种方案要求Alice选择一个用户集S,这样她也在集合S内。该方案还间接要求Alice拥有一个公私钥对。与Naor提出的可否认环认证协议类似,本文提出的协议仅假设存在强公钥加密方案,其中所有成员都已经建立了公钥和私钥。最后,对密文搜索和密文歧义问题进行了研究,并提出了解决方案。
{"title":"Deniable ring authenticated private key establishment","authors":"E.T. Taniguchi, H. Yamamoto","doi":"10.1109/ISITA.2008.4895467","DOIUrl":"https://doi.org/10.1109/ISITA.2008.4895467","url":null,"abstract":"In this paper, we extend the work by M. Naor [7] on deniable ring authentication to include key establishment. Two secure deniable private key establishment protocols will be proposed. These two related schemes create only a secure private channel between Alice and Bob where the identity of Bob remains completely hidden. The first scheme does not require Alice to been within the user set S and in fact does not even require Alice to have a public-private key pair. The second scheme requires that Alice choose a user set S such that she is also within set S. This scheme also indirectly requires that Alice have a public-private key pair. Similar to the deniable ring authentication protocol by Naor, the protocols proposed here only assumes the existence of strong public key encryption schemes where all members have already established public and private keys. Finally, the problem of ciphertext search and ciphertext ambiguity will also be examined and a solution will be proposed.","PeriodicalId":338675,"journal":{"name":"2008 International Symposium on Information Theory and Its Applications","volume":"EM-28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126525741","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Iterative delay compensation algorithm to mitigate NLOS influence for positioning 迭代延迟补偿算法减轻NLOS对定位的影响
Pub Date : 2008-12-01 DOI: 10.1109/ISITA.2008.4895440
K. Enda, R. Kohno
It is important for sensor networks to estimate the sensor tag accurately, for example, RFID. Time difference of arrival (TDOA) positioning algorithm is well known as the positioning algorithm of the sensor tag. Therefore, the positioning accuracy of conventional linear search algorithm is decreased exceedingly in non-line-of sight (NLOS) environment. In this paper, we propose the iterative NLOS delay compensation algorithm based on TDOA in order to fulfill high accuracy in the damaged propagation through NLOS environment. At first, the temporary position is estimated by normal TDOA method and transmission start time is estimated. Next, the time difference between transmission start time and node arrival time is compensated by delay compensation function (DCOMF), and reliability of each node is decided by reliability weight function (RELF). Finally, abnormal error occurred in serious NLOS environment is improved by limitation method. By those iterative processes, the positioning accuracy is improved.
对于传感器网络来说,准确地估计传感器标签是非常重要的,例如RFID。到达时间差(TDOA)定位算法是众所周知的传感器标签定位算法。因此,在非视线环境下,传统的线性搜索算法的定位精度大大降低。本文提出了一种基于TDOA的迭代NLOS延迟补偿算法,以满足NLOS环境中损坏传播的高精度要求。首先用常规TDOA法估计临时位置,估计传输开始时间。然后,通过延迟补偿函数(DCOMF)补偿传输开始时间与节点到达时间之间的时间差,并通过可靠性权重函数(RELF)决定各节点的可靠性。最后,采用限制方法对严重非目视环境下出现的异常误差进行了改进。通过这些迭代过程,提高了定位精度。
{"title":"Iterative delay compensation algorithm to mitigate NLOS influence for positioning","authors":"K. Enda, R. Kohno","doi":"10.1109/ISITA.2008.4895440","DOIUrl":"https://doi.org/10.1109/ISITA.2008.4895440","url":null,"abstract":"It is important for sensor networks to estimate the sensor tag accurately, for example, RFID. Time difference of arrival (TDOA) positioning algorithm is well known as the positioning algorithm of the sensor tag. Therefore, the positioning accuracy of conventional linear search algorithm is decreased exceedingly in non-line-of sight (NLOS) environment. In this paper, we propose the iterative NLOS delay compensation algorithm based on TDOA in order to fulfill high accuracy in the damaged propagation through NLOS environment. At first, the temporary position is estimated by normal TDOA method and transmission start time is estimated. Next, the time difference between transmission start time and node arrival time is compensated by delay compensation function (DCOMF), and reliability of each node is decided by reliability weight function (RELF). Finally, abnormal error occurred in serious NLOS environment is improved by limitation method. By those iterative processes, the positioning accuracy is improved.","PeriodicalId":338675,"journal":{"name":"2008 International Symposium on Information Theory and Its Applications","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133729541","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Bursty narrowband relay networks in the low-SNR regime 低信噪比条件下的突发窄带中继网络
Pub Date : 2008-12-01 DOI: 10.1109/ISITA.2008.4895549
Tony Q. S. Quek, Hyundong Shin
In a wireless network, the use of cooperation among nodes can significantly improve capacity and robustness to fading. Node cooperation can take many forms, including relaying and coordinated beamforming. However, many cooperation techniques have been developed for operation in narrowband systems for high signal-to-noise ratio (SNR) applications. It is important to study how relay networks perform in a low-SNR regime, where the available degrees of freedom is large and the resulting SNR per degree of freedom is small. In this paper, we investigate the achievable rates and scaling laws of bursty amplify-and-forward relay networks in the low-SNR regime. Specifically, our results allow us to understand the effect of different system parameters on the achievable rates and scaling laws in the low-SNR regime, and highlight the role of bursty transmissions in this regime. These results entirely depend on the geographic locations of the nodes and are applicable for both fixed and random networks. We identify four scaling regimes that depend on the growth of the number of relay nodes and the increase of burstiness relative to the SNR.
在无线网络中,利用节点间的协作可以显著提高网络容量和抗衰落的鲁棒性。节点合作可以采取多种形式,包括中继和协调波束形成。然而,针对高信噪比(SNR)应用的窄带系统,已经开发了许多合作技术。研究中继网络在低信噪比条件下的性能是很重要的,在这种情况下,可用的自由度很大,而每个自由度的信噪比很小。本文研究了低信噪比条件下突发放大转发中继网络的可实现速率和标度规律。具体来说,我们的研究结果使我们能够理解不同系统参数对低信噪比下可实现速率和标度规律的影响,并突出了突发传输在该状态下的作用。这些结果完全取决于节点的地理位置,适用于固定和随机网络。我们确定了四种缩放机制,它们依赖于中继节点数量的增长和相对于信噪比的突发性的增加。
{"title":"Bursty narrowband relay networks in the low-SNR regime","authors":"Tony Q. S. Quek, Hyundong Shin","doi":"10.1109/ISITA.2008.4895549","DOIUrl":"https://doi.org/10.1109/ISITA.2008.4895549","url":null,"abstract":"In a wireless network, the use of cooperation among nodes can significantly improve capacity and robustness to fading. Node cooperation can take many forms, including relaying and coordinated beamforming. However, many cooperation techniques have been developed for operation in narrowband systems for high signal-to-noise ratio (SNR) applications. It is important to study how relay networks perform in a low-SNR regime, where the available degrees of freedom is large and the resulting SNR per degree of freedom is small. In this paper, we investigate the achievable rates and scaling laws of bursty amplify-and-forward relay networks in the low-SNR regime. Specifically, our results allow us to understand the effect of different system parameters on the achievable rates and scaling laws in the low-SNR regime, and highlight the role of bursty transmissions in this regime. These results entirely depend on the geographic locations of the nodes and are applicable for both fixed and random networks. We identify four scaling regimes that depend on the growth of the number of relay nodes and the increase of burstiness relative to the SNR.","PeriodicalId":338675,"journal":{"name":"2008 International Symposium on Information Theory and Its Applications","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130435322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Improvement of Referrer SPAM blocking system 推荐人垃圾邮件拦截系统的改进
Pub Date : 2008-12-01 DOI: 10.1109/ISITA.2008.4895560
Y. Kimura, A. Watanabe, T. Katoh, B. B. Bista, T. Takata
In recent years, the use of Weblog is increasing rapidly and some people are using functions to record referer (URL of the page that the site visitor was viewing immediately before) and create back-links to the URL. Recently, as the main purpose to guide visitors to harmful sites, people are using this function to misinterpret referer information and access a large number of sites indiscriminately causing the problem called referrer spam. To combat the referrer spam, the authors have proposed the referrer spam blocking system using Bayesian filter. However, the proposed system has non-negligible false negative (i.e. undetected spam request) ratio of 12%. In this paper, we improve the previous proposed system by introducing image optical character recognition technique. We implement prototype and evaluate computational cost and filtering performance of the proposed scheme and we attain low false negative ratio with reasonable additional computational cost.
近年来,Weblog的使用正在迅速增加,一些人正在使用功能来记录referer(网站访问者之前立即访问的页面的URL)并创建到该URL的反向链接。最近,人们以引导访问者访问有害网站为主要目的,利用这一功能误读推荐人信息,不加区分地访问大量网站,造成了被称为推荐人垃圾邮件的问题。为了对抗推荐人垃圾邮件,作者提出了一种基于贝叶斯过滤的推荐人垃圾邮件拦截系统。然而,所提出的系统具有不可忽略的假阴性(即未检测到的垃圾邮件请求)比率为12%。在本文中,我们通过引入图像光学字符识别技术来改进先前提出的系统。我们实现了原型并评估了该方案的计算成本和滤波性能,在合理的额外计算成本下获得了较低的假负率。
{"title":"Improvement of Referrer SPAM blocking system","authors":"Y. Kimura, A. Watanabe, T. Katoh, B. B. Bista, T. Takata","doi":"10.1109/ISITA.2008.4895560","DOIUrl":"https://doi.org/10.1109/ISITA.2008.4895560","url":null,"abstract":"In recent years, the use of Weblog is increasing rapidly and some people are using functions to record referer (URL of the page that the site visitor was viewing immediately before) and create back-links to the URL. Recently, as the main purpose to guide visitors to harmful sites, people are using this function to misinterpret referer information and access a large number of sites indiscriminately causing the problem called referrer spam. To combat the referrer spam, the authors have proposed the referrer spam blocking system using Bayesian filter. However, the proposed system has non-negligible false negative (i.e. undetected spam request) ratio of 12%. In this paper, we improve the previous proposed system by introducing image optical character recognition technique. We implement prototype and evaluate computational cost and filtering performance of the proposed scheme and we attain low false negative ratio with reasonable additional computational cost.","PeriodicalId":338675,"journal":{"name":"2008 International Symposium on Information Theory and Its Applications","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116985366","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The optimum approximation of signals having quite small side-lobes 副瓣很小的信号的最佳近似
Pub Date : 2008-12-01 DOI: 10.1109/ISITA.2008.4895626
Y. Kida, T. Kida
We consider set of signals with a main-lobe and a pair of small side-lobes. Weighted square-integral of the main-lobe is assumed to be bounded. Moreover, in order to define divergence of side-lobes of error in the sense of worst-case amplitude in attenuation band, we introduce a measure like Kullback-Leibler divergence and this measure is assumed to be bounded. We prove that the presented approximation minimizes various measures of error of running approximation at the same time.
我们考虑一组具有一个主瓣和一对小副瓣的信号。假设主瓣的加权平方积分是有界的。此外,为了在衰减带的最坏振幅意义上定义误差旁瓣的散度,我们引入了Kullback-Leibler散度,并假定该散度是有界的。我们证明了所提出的近似能同时使运行近似的各种误差最小化。
{"title":"The optimum approximation of signals having quite small side-lobes","authors":"Y. Kida, T. Kida","doi":"10.1109/ISITA.2008.4895626","DOIUrl":"https://doi.org/10.1109/ISITA.2008.4895626","url":null,"abstract":"We consider set of signals with a main-lobe and a pair of small side-lobes. Weighted square-integral of the main-lobe is assumed to be bounded. Moreover, in order to define divergence of side-lobes of error in the sense of worst-case amplitude in attenuation band, we introduce a measure like Kullback-Leibler divergence and this measure is assumed to be bounded. We prove that the presented approximation minimizes various measures of error of running approximation at the same time.","PeriodicalId":338675,"journal":{"name":"2008 International Symposium on Information Theory and Its Applications","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131075511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Gaussian Z-interference channel with a relay link: Achievable rate region and asymptotic sum capacity 具有中继链路的高斯z干涉信道:可实现速率区域和渐近求和容量
Pub Date : 2008-12-01 DOI: 10.1109/ISITA.2008.4895518
Lei Zhou, Wei Yu
This paper studies a Gaussian Z-interference channel with a rate-limited digital relay link from the interference-free receiver to the interfered receiver. An achievable rate region is derived based on a combination of the Han-Kobayashi common-private information splitting technique and a partial interference-forwarding relaying strategy in which a part of the interference is decoded then forwarded through the digital link using a binning strategy for interference cancellation. The proposed strategy is shown to be capacity achieving in the strong interference regime, and asymptotically sum capacity approaching in the weak interference regime in the high signal-to-noise ratio and high interference-to-noise ratio limit.
本文研究了一种从无干扰接收机到受干扰接收机之间具有限速数字中继链路的高斯z型干扰信道。基于Han-Kobayashi公共-私有信息分离技术和部分干扰转发中继策略的组合,导出了一个可实现的速率区域,其中部分干扰被解码,然后通过数字链路使用分箱策略进行干扰消除转发。结果表明,该策略在强干扰条件下实现容量,在高信噪比和高干扰条件下实现弱干扰条件下的渐近和容量逼近。
{"title":"Gaussian Z-interference channel with a relay link: Achievable rate region and asymptotic sum capacity","authors":"Lei Zhou, Wei Yu","doi":"10.1109/ISITA.2008.4895518","DOIUrl":"https://doi.org/10.1109/ISITA.2008.4895518","url":null,"abstract":"This paper studies a Gaussian Z-interference channel with a rate-limited digital relay link from the interference-free receiver to the interfered receiver. An achievable rate region is derived based on a combination of the Han-Kobayashi common-private information splitting technique and a partial interference-forwarding relaying strategy in which a part of the interference is decoded then forwarded through the digital link using a binning strategy for interference cancellation. The proposed strategy is shown to be capacity achieving in the strong interference regime, and asymptotically sum capacity approaching in the weak interference regime in the high signal-to-noise ratio and high interference-to-noise ratio limit.","PeriodicalId":338675,"journal":{"name":"2008 International Symposium on Information Theory and Its Applications","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133451449","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
期刊
2008 International Symposium on Information Theory and Its Applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1