首页 > 最新文献

2008 Information Theory and Applications Workshop最新文献

英文 中文
Can the storage capacity of memories built from unreliable components be determined? 由不可靠部件组成的存储器的存储容量能否确定?
Pub Date : 2008-08-15 DOI: 10.1109/ITA.2008.4601020
S. K. Chilappagari, B. Vasic, M. Marcellin
A memory is a device in which information is stored at some time and retrieved at a later time . Let the information be stored in form of bits in registers (memory elements) each of which can store a single bit. The information storage capability of a memory is the number of information bits it stores. Building a memory with information storage capability of k bits with reliable memory elements requires k registers. Such a memory is termed as an irredundant memory. This paper considers the problem of building a memory with memory elements and logic gates which fail according to a known random mechanism. The required minimum redundancy memory in which makes arbitrarily reliable information possible is discussed. For a reliable storage, the information needs to be stored in coded form . To ensure reliability, a correcting circuit is employed which performs error correction and updates the contents of the registers with an estimate of the original codeword.
存储器是一种设备,信息在某一时刻存储在其中,并在稍后的时间检索。让信息以比特的形式存储在寄存器(存储单元)中,每个寄存器可以存储一个比特。存储器的信息存储能力是指它所存储的信息位的数量。用可靠的存储器元件构建具有k位信息存储能力的存储器需要k个寄存器。这种存储器称为非冗余存储器。本文研究了一种基于已知随机机制失效的存储元件和逻辑门组成的存储器问题。讨论了使任意可靠信息成为可能所需的最小冗余存储器。为了可靠的存储,信息需要以编码形式存储。为了确保可靠性,采用了一个校正电路,它执行错误校正,并用原始码字的估计值更新寄存器的内容。
{"title":"Can the storage capacity of memories built from unreliable components be determined?","authors":"S. K. Chilappagari, B. Vasic, M. Marcellin","doi":"10.1109/ITA.2008.4601020","DOIUrl":"https://doi.org/10.1109/ITA.2008.4601020","url":null,"abstract":"A memory is a device in which information is stored at some time and retrieved at a later time . Let the information be stored in form of bits in registers (memory elements) each of which can store a single bit. The information storage capability of a memory is the number of information bits it stores. Building a memory with information storage capability of k bits with reliable memory elements requires k registers. Such a memory is termed as an irredundant memory. This paper considers the problem of building a memory with memory elements and logic gates which fail according to a known random mechanism. The required minimum redundancy memory in which makes arbitrarily reliable information possible is discussed. For a reliable storage, the information needs to be stored in coded form . To ensure reliability, a correcting circuit is employed which performs error correction and updates the contents of the registers with an estimate of the original codeword.","PeriodicalId":345196,"journal":{"name":"2008 Information Theory and Applications Workshop","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114370181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A note on Kloosterman sums and its application 关于Kloosterman和及其应用的注解
Pub Date : 2008-08-15 DOI: 10.1109/ITA.2008.4601016
I. Blake, T. Garefalakis
The number of times the trace of a certain function on an extension field assumes a fixed value in the base field is considered. It is shown that the set of all such values enjoys a Fourier transform like property with Kloosterman sums. The application of this property to coding and cryptography is briefly discussed.
考虑扩展字段上某个函数的跟踪假定基本字段中有固定值的次数。证明了所有这些值的集合具有类似于Kloosterman和的傅里叶变换性质。简要讨论了这一性质在编码和密码学中的应用。
{"title":"A note on Kloosterman sums and its application","authors":"I. Blake, T. Garefalakis","doi":"10.1109/ITA.2008.4601016","DOIUrl":"https://doi.org/10.1109/ITA.2008.4601016","url":null,"abstract":"The number of times the trace of a certain function on an extension field assumes a fixed value in the base field is considered. It is shown that the set of all such values enjoys a Fourier transform like property with Kloosterman sums. The application of this property to coding and cryptography is briefly discussed.","PeriodicalId":345196,"journal":{"name":"2008 Information Theory and Applications Workshop","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124739785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Network tomography via network coding 通过网络编码进行网络断层扫描
Pub Date : 2008-08-15 DOI: 10.1109/ITA.2008.4601041
Gaurav Sharma, S. Jaggi, B. Dey
In this work we show how existing network coding algorithms can be used to perform network tomography, i.e., estimate network topology. We first examine a simple variant of the popular distributed random network codes proposed by (Ho et al.) and show how it can enable each network node to passively estimate the network topology upstream of it at no cost to throughput. The delays introduced by each upstream node and link can also be similarly estimated. We then consider the scenario wherein an adversary hidden in the network wishes to disrupt the estimation of network topology. We show how network error-correcting codes can be used to reliably perform network tomography if the network has sufficient connectivity, and demonstrate that network tomography is impossible otherwise.
在这项工作中,我们展示了如何使用现有的网络编码算法来执行网络断层扫描,即估计网络拓扑。我们首先研究了(Ho等人)提出的流行的分布式随机网络代码的一个简单变体,并展示了它如何使每个网络节点能够在不影响吞吐量的情况下被动地估计其上游的网络拓扑。每个上游节点和链路引入的延迟也可以类似地估计。然后我们考虑隐藏在网络中的对手希望破坏网络拓扑估计的场景。我们展示了如果网络具有足够的连接性,如何使用网络纠错码来可靠地执行网络断层扫描,并演示了否则网络断层扫描是不可能的。
{"title":"Network tomography via network coding","authors":"Gaurav Sharma, S. Jaggi, B. Dey","doi":"10.1109/ITA.2008.4601041","DOIUrl":"https://doi.org/10.1109/ITA.2008.4601041","url":null,"abstract":"In this work we show how existing network coding algorithms can be used to perform network tomography, i.e., estimate network topology. We first examine a simple variant of the popular distributed random network codes proposed by (Ho et al.) and show how it can enable each network node to passively estimate the network topology upstream of it at no cost to throughput. The delays introduced by each upstream node and link can also be similarly estimated. We then consider the scenario wherein an adversary hidden in the network wishes to disrupt the estimation of network topology. We show how network error-correcting codes can be used to reliably perform network tomography if the network has sufficient connectivity, and demonstrate that network tomography is impossible otherwise.","PeriodicalId":345196,"journal":{"name":"2008 Information Theory and Applications Workshop","volume":"147 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115571535","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
On the single-slot capacity of random access over a Gaussian MAC 高斯MAC上随机接入的单时隙容量
Pub Date : 2008-08-15 DOI: 10.1109/ITA.2008.4601022
O. Dabeer
Consider a Gaussian multiple access channel (MAC) with two users, which do not always have a message to transmit. Neither user knows if the other is transmitting or not. Each user has two possible achievable rates depending on whether the other user is transmitting or not. Hence, in general, any coding scheme is characterized by a 4-tuple of rates. For given power constraints, we prove inner and outer bounds to the (4-dimensional) capacity region.
考虑一个有两个用户的高斯多址通道(MAC),它们并不总是有消息要传输。两个用户都不知道对方是否在传输。每个用户都有两种可能的可实现速率,这取决于其他用户是否在传输。因此,一般来说,任何编码方案的特征都是4元组的速率。对于给定的功率约束,我们证明了(四维)容量区域的内界和外界。
{"title":"On the single-slot capacity of random access over a Gaussian MAC","authors":"O. Dabeer","doi":"10.1109/ITA.2008.4601022","DOIUrl":"https://doi.org/10.1109/ITA.2008.4601022","url":null,"abstract":"Consider a Gaussian multiple access channel (MAC) with two users, which do not always have a message to transmit. Neither user knows if the other is transmitting or not. Each user has two possible achievable rates depending on whether the other user is transmitting or not. Hence, in general, any coding scheme is characterized by a 4-tuple of rates. For given power constraints, we prove inner and outer bounds to the (4-dimensional) capacity region.","PeriodicalId":345196,"journal":{"name":"2008 Information Theory and Applications Workshop","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125883704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimal real-time encoder-decoding of Markov sources over noisy channels 马尔可夫源在噪声信道上的最佳实时编解码
Pub Date : 2008-08-15 DOI: 10.1109/ITA.2008.4601048
Aditya Mahajan, D. Teneketzis
A real-time communication system consisting of a first-order Markov source, a real-time encoder, a discrete memoryless channel, and a real-time decoder is considered. The quality of reconstruction is determined by a distortion function between the current source output and its reconstruction at the decoder. The distortion function does not accept delays. The objective is to choose encoding and decoding strategies to minimize the total expected distortion over a finite horizon. The problem is modelled as a decentralized stochastic control problem. A two step solution methodology is developed which provides a sequential decomposition of the problem and reduces exponentially the complexity to search for an optimal solution. The key step of our methodology is identifying information state sufficient for performance evaluation. The methodology can be extended to real-time communication problems with noisy feedback, feedback control problems with a noisy channel in the feedback loop, and decentralized diagnosis in logical discrete event systems.
考虑了一个由一阶马尔可夫信源、实时编码器、离散无记忆信道和实时解码器组成的实时通信系统。重构的质量由电流源输出和解码器重构之间的失真函数决定。失真函数不接受延迟。目标是选择编码和解码策略,使有限视界内的总期望失真最小化。该问题被建模为一个分散的随机控制问题。提出了一种两步求解方法,它提供了问题的顺序分解,并以指数方式降低了寻找最优解的复杂性。我们的方法的关键步骤是确定足够的信息状态进行性能评估。该方法可以扩展到具有噪声反馈的实时通信问题,反馈环路中具有噪声通道的反馈控制问题,以及逻辑离散事件系统中的分散诊断。
{"title":"Optimal real-time encoder-decoding of Markov sources over noisy channels","authors":"Aditya Mahajan, D. Teneketzis","doi":"10.1109/ITA.2008.4601048","DOIUrl":"https://doi.org/10.1109/ITA.2008.4601048","url":null,"abstract":"A real-time communication system consisting of a first-order Markov source, a real-time encoder, a discrete memoryless channel, and a real-time decoder is considered. The quality of reconstruction is determined by a distortion function between the current source output and its reconstruction at the decoder. The distortion function does not accept delays. The objective is to choose encoding and decoding strategies to minimize the total expected distortion over a finite horizon. The problem is modelled as a decentralized stochastic control problem. A two step solution methodology is developed which provides a sequential decomposition of the problem and reduces exponentially the complexity to search for an optimal solution. The key step of our methodology is identifying information state sufficient for performance evaluation. The methodology can be extended to real-time communication problems with noisy feedback, feedback control problems with a noisy channel in the feedback loop, and decentralized diagnosis in logical discrete event systems.","PeriodicalId":345196,"journal":{"name":"2008 Information Theory and Applications Workshop","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130671401","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Feedback schemes for multiuser MIMO-OFDM downlink 多用户MIMO-OFDM下行链路反馈方案
Pub Date : 2008-08-15 DOI: 10.1109/ITA.2008.4601019
G. Caire, H. Shirani-Mehr
We consider a MIMO-OFDM broadcast channel and compare achievable ergodic rates under three channel state feedback schemes: analog feedback, direction quantized feedback and ldquotime-domainrdquo channel quantized feedback. The third scheme is new, and it is inspired by rate-distortion theory of Gaussian correlated sources. For each scheme we derive the conditions under which the system achieves full multiplexing gain. The first two schemes are direct extensions of previously proposed schemes to the OFDM case. The key difference with respect to the widely treated frequency-flat case is that in MIMO-OFDM the ldquofrequency-domainrdquo channel is a Gaussian correlated source. The new ldquotime-domainrdquo quantization scheme takes advantage of the channel frequency correlation structure and outperforms the other schemes. Furthermore, it is by far simpler to implement than complicated spherical vector quantization. In particular, we observe that no structured codebook design and vector quantization is actually needed for efficient channel state information feedback.
我们考虑了一个MIMO-OFDM广播信道,并比较了三种信道状态反馈方案:模拟反馈、方向量化反馈和ldquotime-domainrdquo信道量化反馈下可实现的遍频率。第三种方案是新的,它受到高斯相关源的率失真理论的启发。对于每一种方案,我们推导出了系统达到完全复用增益的条件。前两种方案是之前提出的OFDM方案的直接扩展。与广泛处理的频率平坦情况的关键区别在于,在MIMO-OFDM中,低频域信道是高斯相关源。新的ldquotime-domainrdquo量化方案利用了信道频率相关结构,优于其他方案。此外,它比复杂的球面矢量量化要简单得多。特别是,我们观察到有效的信道状态信息反馈实际上不需要结构化码本设计和矢量量化。
{"title":"Feedback schemes for multiuser MIMO-OFDM downlink","authors":"G. Caire, H. Shirani-Mehr","doi":"10.1109/ITA.2008.4601019","DOIUrl":"https://doi.org/10.1109/ITA.2008.4601019","url":null,"abstract":"We consider a MIMO-OFDM broadcast channel and compare achievable ergodic rates under three channel state feedback schemes: analog feedback, direction quantized feedback and ldquotime-domainrdquo channel quantized feedback. The third scheme is new, and it is inspired by rate-distortion theory of Gaussian correlated sources. For each scheme we derive the conditions under which the system achieves full multiplexing gain. The first two schemes are direct extensions of previously proposed schemes to the OFDM case. The key difference with respect to the widely treated frequency-flat case is that in MIMO-OFDM the ldquofrequency-domainrdquo channel is a Gaussian correlated source. The new ldquotime-domainrdquo quantization scheme takes advantage of the channel frequency correlation structure and outperforms the other schemes. Furthermore, it is by far simpler to implement than complicated spherical vector quantization. In particular, we observe that no structured codebook design and vector quantization is actually needed for efficient channel state information feedback.","PeriodicalId":345196,"journal":{"name":"2008 Information Theory and Applications Workshop","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114872208","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A relay-assisted distributed source coding problem 中继辅助分布式源编码问题
Pub Date : 2008-08-15 DOI: 10.1109/ITA.2008.4601039
P. Ishwar, S. Pradhan
A relay-assisted distributed source coding problem with three statistically correlated sources is formulated and studied. Natural lower bounds for the rates are presented. The lower bounds are shown to be achievable for three special classes of joint source distributions. The achievable coding strategies for the three special classes are observed to have markedly different characteristics. A special class for which the lower bounds are not achievable is presented. A single unified coding strategy which subsumes all four special classes is derived.
提出并研究了一个具有三个统计相关源的中继辅助分布式信源编码问题。给出了速率的自然下界。对于三种特殊的联合源分布,证明了其下界是可以实现的。三种特殊类别的可实现编码策略具有明显不同的特征。给出了一个下界不可达的特殊类。导出了包含所有四种特殊类的统一编码策略。
{"title":"A relay-assisted distributed source coding problem","authors":"P. Ishwar, S. Pradhan","doi":"10.1109/ITA.2008.4601039","DOIUrl":"https://doi.org/10.1109/ITA.2008.4601039","url":null,"abstract":"A relay-assisted distributed source coding problem with three statistically correlated sources is formulated and studied. Natural lower bounds for the rates are presented. The lower bounds are shown to be achievable for three special classes of joint source distributions. The achievable coding strategies for the three special classes are observed to have markedly different characteristics. A special class for which the lower bounds are not achievable is presented. A single unified coding strategy which subsumes all four special classes is derived.","PeriodicalId":345196,"journal":{"name":"2008 Information Theory and Applications Workshop","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116380300","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Pattern entropy - revisited 模式熵——重访
Pub Date : 2008-08-15 DOI: 10.1109/ITA.2008.4601072
G. Shamir
A pattern of a sequence is a sequence of integer indices with each index describing the order of first occurrence of the respective symbol in the original sequence. Several recent works studied entropy and entropy rate of patterns. Specifically, in a recent paper, tight general bounds on the block entropy of patterns of sequences generated by independent and identically distributed (i.i.d.) sources were derived. In this paper, precise approximations are given to the pattern block entropies for patterns of sequences generated by i.i.d. uniform and monotonic distributions, including distributions over the integers, and the geometric distribution. Numerical non-asymptotic bounds on the pattern block entropies of these distributions are provided even for very short blocks, and even for distributions that have infinite i.i.d. entropy rates. Conditional index entropy is also studied for distributions over smaller alphabets.
序列的模式是一个整数索引序列,每个索引描述原始序列中各自符号首次出现的顺序。最近的一些研究研究了模式的熵和熵率。具体而言,在最近的一篇论文中,导出了由独立和同分布(i.i.d)源生成的序列模式的块熵的紧密一般界。本文给出了由均匀分布和单调分布(包括整数分布和几何分布)生成的序列模式的模式块熵的精确逼近。对于这些分布的模式块熵的数值非渐近边界,即使对于非常短的块,甚至对于具有无限熵率的分布,也提供了。条件索引熵也研究了分布在较小的字母。
{"title":"Pattern entropy - revisited","authors":"G. Shamir","doi":"10.1109/ITA.2008.4601072","DOIUrl":"https://doi.org/10.1109/ITA.2008.4601072","url":null,"abstract":"A pattern of a sequence is a sequence of integer indices with each index describing the order of first occurrence of the respective symbol in the original sequence. Several recent works studied entropy and entropy rate of patterns. Specifically, in a recent paper, tight general bounds on the block entropy of patterns of sequences generated by independent and identically distributed (i.i.d.) sources were derived. In this paper, precise approximations are given to the pattern block entropies for patterns of sequences generated by i.i.d. uniform and monotonic distributions, including distributions over the integers, and the geometric distribution. Numerical non-asymptotic bounds on the pattern block entropies of these distributions are provided even for very short blocks, and even for distributions that have infinite i.i.d. entropy rates. Conditional index entropy is also studied for distributions over smaller alphabets.","PeriodicalId":345196,"journal":{"name":"2008 Information Theory and Applications Workshop","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127256078","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
MultiGigabit millimeter wave communication: System concepts and challenges 多千兆毫米波通信:系统概念和挑战
Pub Date : 2008-08-15 DOI: 10.1109/ITA.2008.4601047
Upamanyu Madhow
The millimeter wave band from 60-95 GHz offers large swathes of unlicensed and semi-unlicensed spectrum, which may well form the basis for the next revolution in wireless communication, in which wireless catches up with wires.With the rapid scaling of silicon processes, low-cost implementations for radio frequency front-ends are on the horizon. A key challenge now is to parlay these breakthroughs into innovative system concepts. We review three such concepts here.Millimeter wave MIMO: The small carrier wavelength enables spatial multiplexing in line-of-sight environments, potentially resulting in point-to-point outdoor wireless links at optical speeds (40 Gbps) using bandwidths of the order of 5 GHz. Directional multihop networking: Indoor Gigabit wireless links based on 60 GHz unlicensed spectrum are subject to disruption due to line-of-sight blockage by obstacles such as furniture and humans. We show that a multihop architecture with a small number of relays assures full network connectivity. All-digital multiGigabit baseband: Since high-speed analog-to- digital conversion (ADC) is costly and power-hungry, in order to design all-digital baseband processing that can be implemented inexpensively by riding Moore's law, we must be able to perform signal processing with sloppy ADC. We discuss Shannon-theoretic limits and signal processing challenges in this context.
60-95千兆赫的毫米波频段提供了大量未经许可和半未经许可的频谱,这很可能构成无线通信的下一次革命的基础,在这场革命中,无线将赶上有线。随着硅工艺的快速扩展,射频前端的低成本实现即将出现。现在的一个关键挑战是将这些突破转化为创新的系统概念。我们在这里回顾三个这样的概念。毫米波MIMO:小载波波长可在视线环境中实现空间多路复用,可能导致使用5 GHz带宽的光学速度(40 Gbps)的点对点户外无线链路。定向多跳网络:基于60 GHz未经许可频谱的室内千兆无线链路容易因家具和人等障碍物阻挡视线而中断。我们证明了具有少量中继的多跳架构可以确保完整的网络连接。全数字多千兆基带:由于高速模数转换(ADC)是昂贵和耗电的,为了设计全数字基带处理,可以通过摩尔定律实现低成本,我们必须能够使用粗糙的ADC进行信号处理。我们在此背景下讨论香农理论极限和信号处理挑战。
{"title":"MultiGigabit millimeter wave communication: System concepts and challenges","authors":"Upamanyu Madhow","doi":"10.1109/ITA.2008.4601047","DOIUrl":"https://doi.org/10.1109/ITA.2008.4601047","url":null,"abstract":"The millimeter wave band from 60-95 GHz offers large swathes of unlicensed and semi-unlicensed spectrum, which may well form the basis for the next revolution in wireless communication, in which wireless catches up with wires.With the rapid scaling of silicon processes, low-cost implementations for radio frequency front-ends are on the horizon. A key challenge now is to parlay these breakthroughs into innovative system concepts. We review three such concepts here.Millimeter wave MIMO: The small carrier wavelength enables spatial multiplexing in line-of-sight environments, potentially resulting in point-to-point outdoor wireless links at optical speeds (40 Gbps) using bandwidths of the order of 5 GHz. Directional multihop networking: Indoor Gigabit wireless links based on 60 GHz unlicensed spectrum are subject to disruption due to line-of-sight blockage by obstacles such as furniture and humans. We show that a multihop architecture with a small number of relays assures full network connectivity. All-digital multiGigabit baseband: Since high-speed analog-to- digital conversion (ADC) is costly and power-hungry, in order to design all-digital baseband processing that can be implemented inexpensively by riding Moore's law, we must be able to perform signal processing with sloppy ADC. We discuss Shannon-theoretic limits and signal processing challenges in this context.","PeriodicalId":345196,"journal":{"name":"2008 Information Theory and Applications Workshop","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125538519","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
On the spectrum of large random hermitian finite-band matrices 大随机厄米特有限带矩阵的谱
Pub Date : 2008-05-09 DOI: 10.1109/ITA.2008.4601092
O. Somekh, O. Simeone, B. M. Zaidel, H. Poor, S. Shamai
The open problem of calculating the limiting spectrum (or its Shannon transform) of increasingly large random Hermitian finite-band matrices is described. In general, these matrices include a finite number of non-zero diagonals around their main diagonal regardless of their size. Two different communication setups which may be modeled using such matrices are presented: a simple cellular uplink channel, and a time varying inter-symbol interference channel. Selected recent information-theoretic works dealing directly with such channels are reviewed. Finally, several characteristics of the still unknown limiting spectrum of such matrices are listed, and some reflections are touched upon.
描述了计算越来越大的随机厄米有限带矩阵的极限谱(或其香农变换)的开放问题。一般来说,这些矩阵在它们的主对角线周围包含有限数量的非零对角线,而不管它们的大小。提出了两种不同的通信设置,可以使用这种矩阵建模:一个简单的蜂窝上行信道和一个时变的符号间干扰信道。本文回顾了最近直接处理这些通道的信息论著作。最后,给出了这类矩阵的极限谱的几个未知特征,并提出了一些思考。
{"title":"On the spectrum of large random hermitian finite-band matrices","authors":"O. Somekh, O. Simeone, B. M. Zaidel, H. Poor, S. Shamai","doi":"10.1109/ITA.2008.4601092","DOIUrl":"https://doi.org/10.1109/ITA.2008.4601092","url":null,"abstract":"The open problem of calculating the limiting spectrum (or its Shannon transform) of increasingly large random Hermitian finite-band matrices is described. In general, these matrices include a finite number of non-zero diagonals around their main diagonal regardless of their size. Two different communication setups which may be modeled using such matrices are presented: a simple cellular uplink channel, and a time varying inter-symbol interference channel. Selected recent information-theoretic works dealing directly with such channels are reviewed. Finally, several characteristics of the still unknown limiting spectrum of such matrices are listed, and some reflections are touched upon.","PeriodicalId":345196,"journal":{"name":"2008 Information Theory and Applications Workshop","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133105978","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
期刊
2008 Information Theory and Applications Workshop
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1