首页 > 最新文献

2008 Information Theory and Applications Workshop最新文献

英文 中文
Filtering sources of unwanted traffic 过滤不需要的流量来源
Pub Date : 2008-08-15 DOI: 10.1109/ITA.2008.4601049
F. Soldo, Karim El Defrawy, A. Markopoulou, B. Krishnamurthy, Jacobus van der Merwe
There is a large and increasing amount of unwanted traffic on the Internet today, including phishing, spam, and distributed denial-of-service attacks. One way to deal with this problem is to filter unwanted traffic at the routers based on source IP addresses. Because of the limited number of available filters in the routers today, aggregation is used in practice: a single filter describes and blocks an entire range of IP addresses. This results in blocking of all (unwanted and wanted) traffic generated from hosts with IP addresses in that range. In this paper, we develop a family of algorithms that, given a blacklist containing the source IP addresses of unwanted traffic and a constraint on the number of filters, construct a set of filtering rules that optimize the tradeoff between the unwanted and legitimate traffic that is blocked. We show that our algorithms are optimal and also computationally efficient. Furthermore, we demonstrate that they are particularly beneficial when applied to realistic distributions of sources of unwanted traffic, which are known to exhibit spatial and temporal clustering.
如今,Internet上存在大量且不断增加的不需要的流量,包括网络钓鱼、垃圾邮件和分布式拒绝服务攻击。解决这个问题的一种方法是根据源IP地址过滤路由器上不需要的流量。由于目前路由器中可用的过滤器数量有限,因此在实践中使用聚合:单个过滤器描述并阻止整个IP地址范围。这将导致从IP地址在该范围内的主机生成的所有(不需要的和需要的)流量被阻塞。在本文中,我们开发了一系列算法,给定包含不需要流量的源IP地址的黑名单和对过滤器数量的约束,构建一组过滤规则来优化被阻止的不需要流量和合法流量之间的权衡。我们证明了我们的算法是最优的,而且计算效率很高。此外,我们证明,当应用于不需要的流量源的实际分布时,它们是特别有益的,这是已知的表现出空间和时间聚类。
{"title":"Filtering sources of unwanted traffic","authors":"F. Soldo, Karim El Defrawy, A. Markopoulou, B. Krishnamurthy, Jacobus van der Merwe","doi":"10.1109/ITA.2008.4601049","DOIUrl":"https://doi.org/10.1109/ITA.2008.4601049","url":null,"abstract":"There is a large and increasing amount of unwanted traffic on the Internet today, including phishing, spam, and distributed denial-of-service attacks. One way to deal with this problem is to filter unwanted traffic at the routers based on source IP addresses. Because of the limited number of available filters in the routers today, aggregation is used in practice: a single filter describes and blocks an entire range of IP addresses. This results in blocking of all (unwanted and wanted) traffic generated from hosts with IP addresses in that range. In this paper, we develop a family of algorithms that, given a blacklist containing the source IP addresses of unwanted traffic and a constraint on the number of filters, construct a set of filtering rules that optimize the tradeoff between the unwanted and legitimate traffic that is blocked. We show that our algorithms are optimal and also computationally efficient. Furthermore, we demonstrate that they are particularly beneficial when applied to realistic distributions of sources of unwanted traffic, which are known to exhibit spatial and temporal clustering.","PeriodicalId":345196,"journal":{"name":"2008 Information Theory and Applications Workshop","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117134456","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Compressed sensing and linear codes over real numbers 压缩感知和实数线性代码
Pub Date : 2008-08-15 DOI: 10.1109/ITA.2008.4601055
Fan Zhang, H. Pfister
Compressed sensing (CS) is a relatively new area of signal processing and statistics that focuses on signal reconstruction from a small number of linear (e.g., dot product) measurements. In this paper, we analyze CS using tools from coding theory because CS can also be viewed as syndrome-based source coding of sparse vectors using linear codes over real numbers. While coding theory does not typically deal with codes over real numbers, there is actually a very close relationship between CS and error-correcting codes over large discrete alphabets. This connection leads naturally to new reconstruction methods and analysis. In some cases, the resulting methods provably require many fewer measurements than previous approaches.
压缩感知(CS)是信号处理和统计的一个相对较新的领域,它侧重于从少量线性(例如,点积)测量中重建信号。在本文中,我们使用编码理论的工具来分析CS,因为CS也可以被视为使用实数上的线性编码的稀疏向量的基于综合征的源编码。虽然编码理论通常不处理实数上的代码,但实际上CS和大型离散字母上的纠错代码之间存在非常密切的关系。这种联系自然导致了新的重建方法和分析。在某些情况下,所得到的方法比以前的方法需要更少的测量。
{"title":"Compressed sensing and linear codes over real numbers","authors":"Fan Zhang, H. Pfister","doi":"10.1109/ITA.2008.4601055","DOIUrl":"https://doi.org/10.1109/ITA.2008.4601055","url":null,"abstract":"Compressed sensing (CS) is a relatively new area of signal processing and statistics that focuses on signal reconstruction from a small number of linear (e.g., dot product) measurements. In this paper, we analyze CS using tools from coding theory because CS can also be viewed as syndrome-based source coding of sparse vectors using linear codes over real numbers. While coding theory does not typically deal with codes over real numbers, there is actually a very close relationship between CS and error-correcting codes over large discrete alphabets. This connection leads naturally to new reconstruction methods and analysis. In some cases, the resulting methods provably require many fewer measurements than previous approaches.","PeriodicalId":345196,"journal":{"name":"2008 Information Theory and Applications Workshop","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120950355","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 54
The supremum sum-rate loss of quadratic Gaussian direct multiterminal source coding 二次高斯直接多端信源编码的最大和率损耗
Pub Date : 2008-08-15 DOI: 10.1109/ITA.2008.4601088
Yang Yang, Zixiang Xiong
Wagner et al. recently characterized the rate region for the quadratic Gaussian two-terminal source coding problem. They also show that the Berger-Tung sum-rate bound is tight in the symmetric case, where all sources are positively symmetric and all target distortions are equal. This work studies the sum-rate loss of quadratic Gaussian direct multiterminal source coding. We first give the minimum sum-rate for joint encoding of Gaussian sources in the symmetric case, we than show that the supremum of the sum-rate loss due to distributed encoding in this case is 1/2 log2 5/4 = 0.161 b/s when L = 2 and increases in the order of radic(L)/2 log2 e b/s as the number of terminals L goes to infinity. The supremum sum-rate loss of 0.161 b/s in the symmetric case equals to that in general quadratic Gaussian two-terminal source coding without the symmetric assumption. It is conjectured that this equality holds for any number of terminals.
Wagner等人最近对二次高斯双端源编码问题的速率区域进行了表征。他们还表明,在对称情况下,所有源都是正对称的,所有目标畸变都是相等的,Berger-Tung和速率界是紧的。本文研究了二次高斯直接多端信源编码的和率损耗。我们首先给出了对称情况下高斯源联合编码的最小和速率,然后证明了在这种情况下,分布式编码导致的和速率损失的最大值是1/2 log2 5/4 = 0.161 b/s,并且随着终端数L趋于无穷,以根号(L)/2 log2 e /s的顺序增加。对称情况下的最大和速率损耗为0.161 b/s,与一般二次高斯双端码源编码不对称情况下的最大和速率损耗相等。据推测,这个等式对任意数量的终端都成立。
{"title":"The supremum sum-rate loss of quadratic Gaussian direct multiterminal source coding","authors":"Yang Yang, Zixiang Xiong","doi":"10.1109/ITA.2008.4601088","DOIUrl":"https://doi.org/10.1109/ITA.2008.4601088","url":null,"abstract":"Wagner et al. recently characterized the rate region for the quadratic Gaussian two-terminal source coding problem. They also show that the Berger-Tung sum-rate bound is tight in the symmetric case, where all sources are positively symmetric and all target distortions are equal. This work studies the sum-rate loss of quadratic Gaussian direct multiterminal source coding. We first give the minimum sum-rate for joint encoding of Gaussian sources in the symmetric case, we than show that the supremum of the sum-rate loss due to distributed encoding in this case is 1/2 log2 5/4 = 0.161 b/s when L = 2 and increases in the order of radic(L)/2 log2 e b/s as the number of terminals L goes to infinity. The supremum sum-rate loss of 0.161 b/s in the symmetric case equals to that in general quadratic Gaussian two-terminal source coding without the symmetric assumption. It is conjectured that this equality holds for any number of terminals.","PeriodicalId":345196,"journal":{"name":"2008 Information Theory and Applications Workshop","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121332222","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
LDPC decoder strategies for achieving low error floors 实现低错误层的LDPC解码器策略
Pub Date : 2008-08-15 DOI: 10.1109/ITA.2008.4601062
Yang Han, W. Ryan
One of the most significant impediments to the use of LDPC codes in many communication and storage systems is the error-rate floor phenomenon associated with their iterative decoders. The error floor has been attributed to certain subgraphs of an LDPC codepsilas Tanner graph induced by so-called trapping sets. We show in this paper that once we identify the trapping sets of an LDPC code of interest, a sum-product algorithm (SPA) decoder can be custom-designed to yield floors that are orders of magnitude lower than the conventional SPA decoder. We present three classes of such decoders: (1) a bi-mode decoder, (2) a bit-pinning decoder which utilizes one or more outer algebraic codes, and (3) three generalized-LDPC decoders. We demonstrate the effectiveness of these decoders for two codes, the rate-1/2 (2640,1320) Margulis code which is notorious for its floors and a rate-0.3 (640,192) quasi-cyclic code which has been devised for this study. Although the paper focuses on these two codes, the decoder design techniques presented are fully generalizable to any LDPC code.
在许多通信和存储系统中使用LDPC码的最重要障碍之一是与其迭代解码器相关的误码率下限现象。错误层归因于由所谓的捕获集引起的LDPC共深度坦纳图的某些子图。我们在本文中表明,一旦我们确定了感兴趣的LDPC代码的捕获集,就可以定制设计和积算法(SPA)解码器,以产生比传统SPA解码器低几个数量级的地板。我们提出了三类这样的解码器:(1)双模解码器,(2)利用一个或多个外部代数码的位钉解码器,以及(3)三个广义ldpc解码器。我们证明了这些解码器对两个码的有效性,速率-1/2(2640,1320)马古利斯码,这是臭名昭著的层和速率-0.3(640,192)准循环码,这是为本研究设计的。虽然本文的重点是这两种码,但所提出的解码器设计技术完全适用于任何LDPC码。
{"title":"LDPC decoder strategies for achieving low error floors","authors":"Yang Han, W. Ryan","doi":"10.1109/ITA.2008.4601062","DOIUrl":"https://doi.org/10.1109/ITA.2008.4601062","url":null,"abstract":"One of the most significant impediments to the use of LDPC codes in many communication and storage systems is the error-rate floor phenomenon associated with their iterative decoders. The error floor has been attributed to certain subgraphs of an LDPC codepsilas Tanner graph induced by so-called trapping sets. We show in this paper that once we identify the trapping sets of an LDPC code of interest, a sum-product algorithm (SPA) decoder can be custom-designed to yield floors that are orders of magnitude lower than the conventional SPA decoder. We present three classes of such decoders: (1) a bi-mode decoder, (2) a bit-pinning decoder which utilizes one or more outer algebraic codes, and (3) three generalized-LDPC decoders. We demonstrate the effectiveness of these decoders for two codes, the rate-1/2 (2640,1320) Margulis code which is notorious for its floors and a rate-0.3 (640,192) quasi-cyclic code which has been devised for this study. Although the paper focuses on these two codes, the decoder design techniques presented are fully generalizable to any LDPC code.","PeriodicalId":345196,"journal":{"name":"2008 Information Theory and Applications Workshop","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129147113","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 40
A mutual information invariance approach to symmetry in discrete memoryless channels 离散无记忆信道对称的互信息不变性方法
Pub Date : 2008-08-15 DOI: 10.1109/ITA.2008.4601087
B. Xie, R. Wesel
There are numerous notions of symmetry for discrete memoryless channels. A common goal of these various definitions is that the capacity may be easily computed once the channel is declared to be symmetric. In this paper we focus on a class of definitions of symmetry characterized by the invariance of the channel mutual information over a group of permutations of the input distribution. For definitions of symmetry within this class, we give a simple proof of the optimality of the uniform distribution. The fundamental channels are all symmetric with a general enough definition of symmetry. This paper provides a definition of symmetry that covers these fundamental channels along with a proof that is simple enough to find itself on the chalkboard of even the most introductory class in information theory.
对于离散的无记忆通道,有许多对称的概念。这些不同定义的共同目标是,一旦将通道声明为对称,就可以很容易地计算出容量。本文讨论了一类对称的定义,其特征是信道互信息在输入分布的一组排列上的不变性。对于这类对称的定义,我们给出了均匀分布最优性的一个简单证明。基本通道都是对称的,具有足够普遍的对称定义。本文提供了一个涵盖这些基本通道的对称定义,并提供了一个简单的证明,甚至可以在信息论入门课程的黑板上找到它。
{"title":"A mutual information invariance approach to symmetry in discrete memoryless channels","authors":"B. Xie, R. Wesel","doi":"10.1109/ITA.2008.4601087","DOIUrl":"https://doi.org/10.1109/ITA.2008.4601087","url":null,"abstract":"There are numerous notions of symmetry for discrete memoryless channels. A common goal of these various definitions is that the capacity may be easily computed once the channel is declared to be symmetric. In this paper we focus on a class of definitions of symmetry characterized by the invariance of the channel mutual information over a group of permutations of the input distribution. For definitions of symmetry within this class, we give a simple proof of the optimality of the uniform distribution. The fundamental channels are all symmetric with a general enough definition of symmetry. This paper provides a definition of symmetry that covers these fundamental channels along with a proof that is simple enough to find itself on the chalkboard of even the most introductory class in information theory.","PeriodicalId":345196,"journal":{"name":"2008 Information Theory and Applications Workshop","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130613276","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Recursive analysis of ad hoc networks with packet queueing, channel contention and hybrid ARQ 具有分组排队、信道争用和混合ARQ的自组网递归分析
Pub Date : 2008-08-15 DOI: 10.1109/ITA.2008.4601098
M. Levorato, S. Tomasin, M. Zorzi
In this paper we present a recursive algorithm to compute some important performance metrics for wireless networks, such as throughput, channel occupancy, average number of packets in the queue and service time. Our model comprises packet queuing, channel access contention, backoff and hybrid automatic retransmission request (HARQ) error control. The analysis is carried out recursively to reduce the computational complexity and makes use of semi-Markov processes and renewal theory. We present results showing that the proposed model is able to accurately predict the aforementioned metrics even for networks with many nodes, where traditional analysis requires infeasible complexity to account for the overall network status.
本文提出了一种递归算法来计算无线网络的一些重要性能指标,如吞吐量、信道占用、队列中的平均分组数和服务时间。该模型包括分组排队、信道访问争用、回退和混合自动重传请求(HARQ)错误控制。利用半马尔可夫过程和更新理论,递归地进行分析以降低计算复杂度。我们提出的结果表明,即使对于具有许多节点的网络,所提出的模型也能够准确地预测上述指标,而传统的分析需要不可思议的复杂性来考虑整体网络状态。
{"title":"Recursive analysis of ad hoc networks with packet queueing, channel contention and hybrid ARQ","authors":"M. Levorato, S. Tomasin, M. Zorzi","doi":"10.1109/ITA.2008.4601098","DOIUrl":"https://doi.org/10.1109/ITA.2008.4601098","url":null,"abstract":"In this paper we present a recursive algorithm to compute some important performance metrics for wireless networks, such as throughput, channel occupancy, average number of packets in the queue and service time. Our model comprises packet queuing, channel access contention, backoff and hybrid automatic retransmission request (HARQ) error control. The analysis is carried out recursively to reduce the computational complexity and makes use of semi-Markov processes and renewal theory. We present results showing that the proposed model is able to accurately predict the aforementioned metrics even for networks with many nodes, where traditional analysis requires infeasible complexity to account for the overall network status.","PeriodicalId":345196,"journal":{"name":"2008 Information Theory and Applications Workshop","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121333936","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Prediction and modeling with partial dependencies 部分依赖的预测和建模
Pub Date : 2008-08-15 DOI: 10.1109/ITA.2008.4601082
T. Tjalkens
The author consider a binary classification problem with a feature vector of high dimensionality. Spam mail filters are a popular example hereof. A Bayesian approach requires us to estimate the probability of a feature vector given the class of the object. Due to the size of the feature vector this is an unfeasible task. A useful approach is to split the feature space into several (conditionally) independent subspaces. This results in a new problem, namely how to find the ldquobestrdquo subdivision. In this paper the author consider a weighing approach that will perform (asymptotically) as good as the best subdivision and still has a manageable complexity.
考虑一个具有高维特征向量的二值分类问题。垃圾邮件过滤器就是一个很流行的例子。贝叶斯方法要求我们估计给定对象类别的特征向量的概率。由于特征向量的大小,这是一个不可行的任务。一种有用的方法是将特征空间分割成几个(有条件地)独立的子空间。这就产生了一个新的问题,即如何找到最适合的细分。在本文中,作者考虑了一种加权方法,它将执行(渐近)与最佳细分一样好,并且仍然具有可管理的复杂性。
{"title":"Prediction and modeling with partial dependencies","authors":"T. Tjalkens","doi":"10.1109/ITA.2008.4601082","DOIUrl":"https://doi.org/10.1109/ITA.2008.4601082","url":null,"abstract":"The author consider a binary classification problem with a feature vector of high dimensionality. Spam mail filters are a popular example hereof. A Bayesian approach requires us to estimate the probability of a feature vector given the class of the object. Due to the size of the feature vector this is an unfeasible task. A useful approach is to split the feature space into several (conditionally) independent subspaces. This results in a new problem, namely how to find the ldquobestrdquo subdivision. In this paper the author consider a weighing approach that will perform (asymptotically) as good as the best subdivision and still has a manageable complexity.","PeriodicalId":345196,"journal":{"name":"2008 Information Theory and Applications Workshop","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131384211","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Rate allocation in multiuser cognitive radio systems with successive group decoding 连续群译码多用户认知无线电系统的速率分配
Pub Date : 2008-08-15 DOI: 10.1109/ITA.2008.4601086
N. Prasad, Xiaodong Wang
We consider the problem of rate allocation in classical as well as generalized multiuser cognitive radio systems. Each user intends to communicate with its designated receiver and all receivers employ successive group decoders with specified complexity constraints. Rate allocations in the classical case are obtained by using algorithms designed for a fi user Gaussian Interference Channel (GIC). In the generalized cognitive radio system the transmission rates of the primary users are assumed to be pre-determined such that each primary user is decodable at its (primary) receiver in the GIC consisting only of the primary transmitter-receiver pairs. We investigate the problem of selecting an active set of secondary users that are allowed to co-exist with the primary users and allocating rates to them under the constraints that each primary user achieves its pre-determined rate and no primary receiver decodes any secondary user. Each secondary receiver however is free to decode any other user whose codebook it is aware of. The key feature of the rate allocation algorithms we design is that inspite of using distributed and low-complexity ldquogreedyrdquo sub-routines, they can achieve globally optimal solutions.
研究了经典多用户认知无线电系统和广义多用户认知无线电系统的速率分配问题。每个用户都打算与其指定的接收器通信,所有接收器都使用具有指定复杂性约束的连续组解码器。经典情况下的速率分配是采用针对fi用户高斯干扰信道设计的算法来实现的。在广义认知无线电系统中,假定主要用户的传输速率是预先确定的,使得每个主要用户在仅由主要发送-接收对组成的GIC中的其(主要)接收器上可解码。我们研究了在每个主用户达到其预定速率且主接收端不解码任何辅助用户的约束下,选择一组允许与主用户共存的活跃辅助用户并为其分配速率的问题。然而,每个辅助接收器可以自由地解码它所知道的任何其他用户的密码本。我们设计的速率分配算法的关键特点是,尽管使用分布式和低复杂度的ldquogreedyrdquo子例程,但它们可以获得全局最优解。
{"title":"Rate allocation in multiuser cognitive radio systems with successive group decoding","authors":"N. Prasad, Xiaodong Wang","doi":"10.1109/ITA.2008.4601086","DOIUrl":"https://doi.org/10.1109/ITA.2008.4601086","url":null,"abstract":"We consider the problem of rate allocation in classical as well as generalized multiuser cognitive radio systems. Each user intends to communicate with its designated receiver and all receivers employ successive group decoders with specified complexity constraints. Rate allocations in the classical case are obtained by using algorithms designed for a fi user Gaussian Interference Channel (GIC). In the generalized cognitive radio system the transmission rates of the primary users are assumed to be pre-determined such that each primary user is decodable at its (primary) receiver in the GIC consisting only of the primary transmitter-receiver pairs. We investigate the problem of selecting an active set of secondary users that are allowed to co-exist with the primary users and allocating rates to them under the constraints that each primary user achieves its pre-determined rate and no primary receiver decodes any secondary user. Each secondary receiver however is free to decode any other user whose codebook it is aware of. The key feature of the rate allocation algorithms we design is that inspite of using distributed and low-complexity ldquogreedyrdquo sub-routines, they can achieve globally optimal solutions.","PeriodicalId":345196,"journal":{"name":"2008 Information Theory and Applications Workshop","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127803344","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Optimal multiple description and multiresolution scalar quantizer design 优化多重描述和多分辨率标量量化器设计
Pub Date : 2008-08-15 DOI: 10.1109/ITA.2008.4601027
M. Effros
The author presents new algorithms for fixed-rate multiple description and multiresolution scalar quantizer design. The algorithms both run in time polynomial in the size of the source alphabet and guarantee globally optimal solutions. To the authorpsilas knowledge, these are the first globally optimal design algorithms for multiple description and multiresolution quantizers.
提出了固定速率多重描述和多分辨率标量量化器设计的新算法。该算法在源字母大小的时间多项式内运行,并保证全局最优解。据作者所知,这是第一个针对多描述和多分辨率量化器的全局优化设计算法。
{"title":"Optimal multiple description and multiresolution scalar quantizer design","authors":"M. Effros","doi":"10.1109/ITA.2008.4601027","DOIUrl":"https://doi.org/10.1109/ITA.2008.4601027","url":null,"abstract":"The author presents new algorithms for fixed-rate multiple description and multiresolution scalar quantizer design. The algorithms both run in time polynomial in the size of the source alphabet and guarantee globally optimal solutions. To the authorpsilas knowledge, these are the first globally optimal design algorithms for multiple description and multiresolution quantizers.","PeriodicalId":345196,"journal":{"name":"2008 Information Theory and Applications Workshop","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115926131","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A message-passing solver for linear systems 线性系统的消息传递求解器
Pub Date : 2008-08-15 DOI: 10.1109/ITA.2008.4601073
O. Shental, Danny Bickson, Paul H. Siegel, Jack K. Wolf, D. Dolev
We develop an efficient distributed message-passing solution for systems of linear equations based upon Gaussian belief propagation that does not involve direct matrix inversion.
我们开发了一种基于高斯信念传播的线性方程组的高效分布式消息传递解,该解不涉及直接矩阵反演。
{"title":"A message-passing solver for linear systems","authors":"O. Shental, Danny Bickson, Paul H. Siegel, Jack K. Wolf, D. Dolev","doi":"10.1109/ITA.2008.4601073","DOIUrl":"https://doi.org/10.1109/ITA.2008.4601073","url":null,"abstract":"We develop an efficient distributed message-passing solution for systems of linear equations based upon Gaussian belief propagation that does not involve direct matrix inversion.","PeriodicalId":345196,"journal":{"name":"2008 Information Theory and Applications Workshop","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124382475","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
期刊
2008 Information Theory and Applications Workshop
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1