首页 > 最新文献

2022 IEEE International Symposium on Information Theory (ISIT)最新文献

英文 中文
Simple Binary Hypothesis Testing under Communication Constraints 通信约束下的简单二元假设检验
Pub Date : 2022-06-26 DOI: 10.1109/ISIT50566.2022.9834363
Ankit Pensia, Po-Ling Loh, Varun Jog
We study simple binary hypothesis testing under communication constraints, a.k.a. “decentralized detection”. Here, each sample is mapped to a message from a finite set of messages via a channel before being revealed to a statistician. In the absence of communication constraints, it is well known that the sample complexity is characterized by the Hellinger distance between the distributions. We show that the sample complexity of hypothesis testing under communication constraints is at most a logarithmic factor larger than in the unconstrained setting, and demonstrate that distributions exist in which this characterization is tight. We also provide a polynomial-time algorithm which achieves the aforementioned sample complexity. Our proofs rely on a new reverse data processing inequality and a reverse Markov’s inequality, which may be of independent interest.
我们研究了通信约束下的简单二元假设检验,即“去中心化检测”。在这里,每个样本在显示给统计人员之前,通过通道将其映射到来自有限消息集的消息。在没有通信约束的情况下,众所周知,样本复杂度由分布之间的海灵格距离表征。我们表明,在通信约束下,假设检验的样本复杂性最多比在无约束设置下大一个对数因子,并证明存在这种特征是紧密的分布。我们还提供了一个多项式时间算法来实现上述的样本复杂度。我们的证明依赖于一个新的反向数据处理不等式和一个反向马尔可夫不等式,这可能是独立的兴趣。
{"title":"Simple Binary Hypothesis Testing under Communication Constraints","authors":"Ankit Pensia, Po-Ling Loh, Varun Jog","doi":"10.1109/ISIT50566.2022.9834363","DOIUrl":"https://doi.org/10.1109/ISIT50566.2022.9834363","url":null,"abstract":"We study simple binary hypothesis testing under communication constraints, a.k.a. “decentralized detection”. Here, each sample is mapped to a message from a finite set of messages via a channel before being revealed to a statistician. In the absence of communication constraints, it is well known that the sample complexity is characterized by the Hellinger distance between the distributions. We show that the sample complexity of hypothesis testing under communication constraints is at most a logarithmic factor larger than in the unconstrained setting, and demonstrate that distributions exist in which this characterization is tight. We also provide a polynomial-time algorithm which achieves the aforementioned sample complexity. Our proofs rely on a new reverse data processing inequality and a reverse Markov’s inequality, which may be of independent interest.","PeriodicalId":348168,"journal":{"name":"2022 IEEE International Symposium on Information Theory (ISIT)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114866545","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
On the Bit-Channels for Channel Polarization 信道极化的位信道研究
Pub Date : 2022-06-26 DOI: 10.1109/ISIT50566.2022.9834393
Wen-Yao Chen, Chung-Chin Lu
The problem of constructing polar codes is equivalent to selecting good channels among a set of bit-channels with output alphabet size grows exponentially. To solve the problem, Tal and Vardy proposed a channel quantization algorithm to approximate the original channel by channels with less output symbols. Based on Arıkan’s original work, we derived a matrix form of channel transformation. This formulation automatically merges suitable output symbols, thus reducing the step of preprocessing complexity in Tal and Vardy’s algorithm.
构造极性码的问题相当于从一组输出字母大小呈指数增长的位信道中选择好的信道。为了解决这个问题,Tal和Vardy提出了一种信道量化算法,用输出符号较少的信道近似原始信道。在Arıkan的基础上,导出了信道变换的矩阵形式。该公式自动合并合适的输出符号,从而减少了Tal和Vardy算法的预处理复杂度。
{"title":"On the Bit-Channels for Channel Polarization","authors":"Wen-Yao Chen, Chung-Chin Lu","doi":"10.1109/ISIT50566.2022.9834393","DOIUrl":"https://doi.org/10.1109/ISIT50566.2022.9834393","url":null,"abstract":"The problem of constructing polar codes is equivalent to selecting good channels among a set of bit-channels with output alphabet size grows exponentially. To solve the problem, Tal and Vardy proposed a channel quantization algorithm to approximate the original channel by channels with less output symbols. Based on Arıkan’s original work, we derived a matrix form of channel transformation. This formulation automatically merges suitable output symbols, thus reducing the step of preprocessing complexity in Tal and Vardy’s algorithm.","PeriodicalId":348168,"journal":{"name":"2022 IEEE International Symposium on Information Theory (ISIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131960355","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Group Testing with Blocks of Positives 阳性块组测试
Pub Date : 2022-06-26 DOI: 10.1109/ISIT50566.2022.9834611
T. V. Bui, Y. M. Chee, J. Scarlett, Van Khu Vu
The main goal of group testing is to identify a small number of positive items among a large population of n items. In this work, we consider a new model of group testing in which the input items are linearly ordered, and the positives are subsets of small blocks (at unknown locations) of consecutive items over that order. When the number of blocks is at least one and at most k, and the number of items in a block is at most d, we show that there exists a deterministic and explicit design that can identify the positives with O(k2d log (n/d)) tests in O(poly(k, n/d)+kd) time. The number of tests in our proposed design is less than that of in standard combinatorial group testing by a factor of at least d/ log (kd). We also show that there exists a randomized design that can identify the positives with O(k(log (n/d)+d log k)) tests in O(k(log2 (n/d)+k log k+d log k)) time with high probability.
群体测试的主要目标是在大量的n个项目中识别出少量的阳性项目。在这项工作中,我们考虑了一种新的组测试模型,其中输入项目是线性有序的,阳性是该顺序上连续项目的小块(在未知位置)的子集。当块数至少为1个,最多为k个,且块中的项目数最多为d个时,我们证明存在一种确定性的显式设计,该设计可以在O(poly(k, n/d)+kd)时间内用O(k2d log (n/d))次测试识别阳性。在我们提出的设计中,试验的数量比标准组合组试验的数量少至少d/ log (kd)。我们还表明,存在一种随机设计,可以在O(k(log2 (n/d)+k log k+d log k))时间内以高概率识别O(k(log (n/d)+d log k))次测试的阳性结果。
{"title":"Group Testing with Blocks of Positives","authors":"T. V. Bui, Y. M. Chee, J. Scarlett, Van Khu Vu","doi":"10.1109/ISIT50566.2022.9834611","DOIUrl":"https://doi.org/10.1109/ISIT50566.2022.9834611","url":null,"abstract":"The main goal of group testing is to identify a small number of positive items among a large population of n items. In this work, we consider a new model of group testing in which the input items are linearly ordered, and the positives are subsets of small blocks (at unknown locations) of consecutive items over that order. When the number of blocks is at least one and at most k, and the number of items in a block is at most d, we show that there exists a deterministic and explicit design that can identify the positives with O(k2d log (n/d)) tests in O(poly(k, n/d)+kd) time. The number of tests in our proposed design is less than that of in standard combinatorial group testing by a factor of at least d/ log (kd). We also show that there exists a randomized design that can identify the positives with O(k(log (n/d)+d log k)) tests in O(k(log2 (n/d)+k log k+d log k)) time with high probability.","PeriodicalId":348168,"journal":{"name":"2022 IEEE International Symposium on Information Theory (ISIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130161292","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Reduction of Delay for Delayed Bit-Interleaved Coded Modulation 延迟位交错编码调制的延迟降低
Pub Date : 2022-06-26 DOI: 10.1109/ISIT50566.2022.9834478
G. Hosoya
This study focuses on delayed bit-interleaved coded modulation (DBICM) for a two-dimensional signal constellation and shows that the capacity of DBICM is identical to the coded modulation capacity with less delay than before. An appropriate bit-labeling scheme based on Gray labeling for each signal point is also considered to prevent the performance degradation of DBICM. The results of the numerical calculations and simulations indicate that the proposed method improves performance.
本文研究了二维信号星座的延迟比特交织编码调制(DBICM),结果表明,DBICM的容量与编码调制容量相同,且延迟比以前小。为了防止DBICM的性能下降,还考虑了基于灰度标记的比特标记方案。数值计算和仿真结果表明,该方法提高了性能。
{"title":"Reduction of Delay for Delayed Bit-Interleaved Coded Modulation","authors":"G. Hosoya","doi":"10.1109/ISIT50566.2022.9834478","DOIUrl":"https://doi.org/10.1109/ISIT50566.2022.9834478","url":null,"abstract":"This study focuses on delayed bit-interleaved coded modulation (DBICM) for a two-dimensional signal constellation and shows that the capacity of DBICM is identical to the coded modulation capacity with less delay than before. An appropriate bit-labeling scheme based on Gray labeling for each signal point is also considered to prevent the performance degradation of DBICM. The results of the numerical calculations and simulations indicate that the proposed method improves performance.","PeriodicalId":348168,"journal":{"name":"2022 IEEE International Symposium on Information Theory (ISIT)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130170677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Matched Information Rate Codes for Binary-Input Intersymbol Interference Wiretap Channels 二值输入码间干扰窃听信道的匹配信息率码
Pub Date : 2022-06-26 DOI: 10.1109/ISIT50566.2022.9834578
A. Nouri, R. Asvadi
A two-stage coding scheme is proposed for reliable and secure transmission over intersymbol interference wiretap channels (ISI-WTCs). It is shown that the ultimate bound on the secure rate of linear block codes over ISI-WTCs is achieved by an independent and uniformly distributed (i.u.d.) input process. Aiming to exceed the i.u.d. secure rate, the proposed scheme comprises the concatenation of an inner trellis code and an outer coset code. The inner stage emulates a Markov process for achieving the constrained secrecy capacity of the ISI-WTC. In contrast, the outer stage vanishes an obtained upper bound on the rate of information leakage toward satisfying the so-called weak secrecy criterion. A carefully modified density evolution confirms the secrecy and the reliability efficiency of the proposed coding scheme at secure rates close to the constrained secrecy capacity.
为了在码间干扰窃听信道(isi - wtc)上实现可靠、安全的传输,提出了一种两级编码方案。结果表明,独立且均匀分布(i.u.d)的输入过程可以实现isi - wtc上线性分组码安全率的最终界。该方案采用内部网格码和外部coset码的连接方式,以达到超过iud安全速率的目的。内部阶段模拟了一个马尔可夫过程,以实现ISI-WTC的受限保密能力。而在外部阶段,为了满足所谓的弱保密准则,信息泄漏率的上界被消去。经过仔细修改的密度演化验证了所提出的编码方案在接近约束保密能力的安全速率下的保密性和可靠性效率。
{"title":"Matched Information Rate Codes for Binary-Input Intersymbol Interference Wiretap Channels","authors":"A. Nouri, R. Asvadi","doi":"10.1109/ISIT50566.2022.9834578","DOIUrl":"https://doi.org/10.1109/ISIT50566.2022.9834578","url":null,"abstract":"A two-stage coding scheme is proposed for reliable and secure transmission over intersymbol interference wiretap channels (ISI-WTCs). It is shown that the ultimate bound on the secure rate of linear block codes over ISI-WTCs is achieved by an independent and uniformly distributed (i.u.d.) input process. Aiming to exceed the i.u.d. secure rate, the proposed scheme comprises the concatenation of an inner trellis code and an outer coset code. The inner stage emulates a Markov process for achieving the constrained secrecy capacity of the ISI-WTC. In contrast, the outer stage vanishes an obtained upper bound on the rate of information leakage toward satisfying the so-called weak secrecy criterion. A carefully modified density evolution confirms the secrecy and the reliability efficiency of the proposed coding scheme at secure rates close to the constrained secrecy capacity.","PeriodicalId":348168,"journal":{"name":"2022 IEEE International Symposium on Information Theory (ISIT)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134016937","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Excess-Distortion Exponents for Successive Refinement Using Gaussian Codebooks 高斯码本连续细化的过度失真指数
Pub Date : 2022-06-26 DOI: 10.1109/ISIT50566.2022.9834848
Zhuangfei Wu, Lin Bai, Lin Zhou
This paper is eligible for the Jack Keil Wolf ISIT Student Paper Award. We derive achievability results on large deviations for mismatched successive refinement where one uses random i.i.d. Gaussian codebooks and minimum Euclidean distance encoding to compress an arbitrary memoryless source. Specifically, we consider both separate and joint excess-distortion criterion and derive achievable error exponents for both cases. Under the mismatched coding scheme, we show that the exponent of the joint excess-distortion probability equals the exponent of one of the separate excess-distortion probabilities, depending on the compression rate of the second encoder only. When specialized to a Gaussian memoryless source (GMS), we obtain the first achievable error exponent region. However, in contrast to the second-order asymptotics and to the large deviations for mismatched rate-distortion, the specialized result for GMS is not optimal. Further investigations are required to close the gap.
这篇论文有资格获得Jack Keil Wolf ISIT学生论文奖。我们推导了在大偏差下不匹配连续细化的可实现性结果,其中使用随机i.i.d高斯码本和最小欧几里得距离编码来压缩任意无内存源。具体地说,我们考虑了单独和联合的过度畸变判据,并推导了两种情况下可实现的误差指数。在不匹配编码方案下,我们证明了联合过度失真概率的指数等于单独过度失真概率之一的指数,仅依赖于第二个编码器的压缩率。当对高斯无记忆源(GMS)进行专门化处理时,我们得到了第一个可实现的误差指数区域。然而,与二阶渐近和不匹配率失真的大偏差相比,GMS的专门化结果不是最优的。需要进一步的调查来缩小差距。
{"title":"Excess-Distortion Exponents for Successive Refinement Using Gaussian Codebooks","authors":"Zhuangfei Wu, Lin Bai, Lin Zhou","doi":"10.1109/ISIT50566.2022.9834848","DOIUrl":"https://doi.org/10.1109/ISIT50566.2022.9834848","url":null,"abstract":"This paper is eligible for the Jack Keil Wolf ISIT Student Paper Award. We derive achievability results on large deviations for mismatched successive refinement where one uses random i.i.d. Gaussian codebooks and minimum Euclidean distance encoding to compress an arbitrary memoryless source. Specifically, we consider both separate and joint excess-distortion criterion and derive achievable error exponents for both cases. Under the mismatched coding scheme, we show that the exponent of the joint excess-distortion probability equals the exponent of one of the separate excess-distortion probabilities, depending on the compression rate of the second encoder only. When specialized to a Gaussian memoryless source (GMS), we obtain the first achievable error exponent region. However, in contrast to the second-order asymptotics and to the large deviations for mismatched rate-distortion, the specialized result for GMS is not optimal. Further investigations are required to close the gap.","PeriodicalId":348168,"journal":{"name":"2022 IEEE International Symposium on Information Theory (ISIT)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134595376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Coding with Cyclic PAM and Vector Quantization for the RLWE/MLWE Channel RLWE/MLWE信道的循环PAM和矢量量化编码
Pub Date : 2022-06-26 DOI: 10.1109/ISIT50566.2022.9834501
I. Bocharova, H. Hollmann, Karan Khathuria, B. Kudryashov, Vitaly Skachek
In some lattice-based cryptosystems, the encryption and decryption processes can be interpreted as a noisy communication channel. In this work, we focus on cryptosystems based on the ring learning with errors (RLWE) and module learning with errors (MLWE) problems, e.g. Kyber. We provide new coding schemes for the communication channel involved in these cryptosystems. For encoding we use an error-correction code (ECC) along with modulo Q pulse amplitude modulation (PAM) (for some fixed small prime power Q), and vector dequantization. For decoding we perform vector quantization followed by hard/soft decision decoding (HDD/SDD) for the ECC. This construction provides remarkable reduction in the decryption failure rate (DFR), compared to some earlier proposed coding schemes for the same bitrate. For example, in Kyber encryption scheme, we reduce the DFR from 2−174 (uncoded) to 2−1325 (using HDD) or 2−1414 (using SDD).
在一些基于格的密码系统中,加解密过程可以解释为一个有噪声的通信信道。在这项工作中,我们重点研究了基于错误环学习(RLWE)和错误模块学习(MLWE)问题的密码系统,例如Kyber。我们为这些密码系统中涉及的通信信道提供了新的编码方案。对于编码,我们使用纠错码(ECC)以及模Q脉冲幅度调制(PAM)(用于一些固定的小素数功率Q)和矢量去量化。对于解码,我们执行矢量量化,然后对ECC进行硬/软判决解码(HDD/SDD)。与之前提出的相同比特率的编码方案相比,这种结构显著降低了解密失败率(DFR)。例如,在Kyber加密方案中,我们将DFR从2−174(未编码)降低到2−1325(使用HDD)或2−1414(使用SDD)。
{"title":"Coding with Cyclic PAM and Vector Quantization for the RLWE/MLWE Channel","authors":"I. Bocharova, H. Hollmann, Karan Khathuria, B. Kudryashov, Vitaly Skachek","doi":"10.1109/ISIT50566.2022.9834501","DOIUrl":"https://doi.org/10.1109/ISIT50566.2022.9834501","url":null,"abstract":"In some lattice-based cryptosystems, the encryption and decryption processes can be interpreted as a noisy communication channel. In this work, we focus on cryptosystems based on the ring learning with errors (RLWE) and module learning with errors (MLWE) problems, e.g. Kyber. We provide new coding schemes for the communication channel involved in these cryptosystems. For encoding we use an error-correction code (ECC) along with modulo Q pulse amplitude modulation (PAM) (for some fixed small prime power Q), and vector dequantization. For decoding we perform vector quantization followed by hard/soft decision decoding (HDD/SDD) for the ECC. This construction provides remarkable reduction in the decryption failure rate (DFR), compared to some earlier proposed coding schemes for the same bitrate. For example, in Kyber encryption scheme, we reduce the DFR from 2−174 (uncoded) to 2−1325 (using HDD) or 2−1414 (using SDD).","PeriodicalId":348168,"journal":{"name":"2022 IEEE International Symposium on Information Theory (ISIT)","volume":"519 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134371967","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Capacity of Noisy Permutation Channels 噪声置换信道的容量
Pub Date : 2022-06-26 DOI: 10.1109/ISIT50566.2022.9834509
Jennifer Tang, Yury Polyanskiy
We establish the capacity of a class of communication channels introduced in [2]. The n-letter input from a finite alphabet is passed through a discrete memoryless channel PZ|X and then the output n-letter sequence is uniformly permuted. We show that the maximal communication rate (normalized by log n) equals $frac{1}{2}left( {operatorname{rank} left( {{P_{Zmid X}}} right) - 1} right)$ whenever PZ|X is strictly positive. This is done by establishing a converse bound matching the achievability of [2]. The two main ingredients of our proof are (1) a sharp bound on the entropy of a uniformly sampled vector from a type class and observed through a DMC; and (2) the covering ε-net of a probability simplex with Kullback-Leibler divergence as a metric. In addition to strictly positive DMC we also find the noisy permutation capacity for q-ary erasure channels, the Z-channel and others.
我们建立了[2]中介绍的一类通信信道的容量。有限字母表的n个字母输入通过一个离散的无内存通道PZ|X,然后输出的n个字母序列被均匀排列。我们证明,当PZ|X为严格正时,最大通信速率(通过log n归一化)等于$frac{1}{2}left( {operatorname{rank} left( {{P_{Zmid X}}} right) - 1} right)$。这是通过建立与[2]的可实现性相匹配的逆界来实现的。我们的证明的两个主要成分是:(1)从类型类中均匀采样向量的熵的锐界,并通过DMC观察;(2)以Kullback-Leibler散度为度量的概率单纯形的覆盖ε-net。除了严格正DMC外,我们还发现了q元擦除信道、z信道和其他信道的噪声置换容量。
{"title":"Capacity of Noisy Permutation Channels","authors":"Jennifer Tang, Yury Polyanskiy","doi":"10.1109/ISIT50566.2022.9834509","DOIUrl":"https://doi.org/10.1109/ISIT50566.2022.9834509","url":null,"abstract":"We establish the capacity of a class of communication channels introduced in [2]. The n-letter input from a finite alphabet is passed through a discrete memoryless channel PZ|X and then the output n-letter sequence is uniformly permuted. We show that the maximal communication rate (normalized by log n) equals $frac{1}{2}left( {operatorname{rank} left( {{P_{Zmid X}}} right) - 1} right)$ whenever PZ|X is strictly positive. This is done by establishing a converse bound matching the achievability of [2]. The two main ingredients of our proof are (1) a sharp bound on the entropy of a uniformly sampled vector from a type class and observed through a DMC; and (2) the covering ε-net of a probability simplex with Kullback-Leibler divergence as a metric. In addition to strictly positive DMC we also find the noisy permutation capacity for q-ary erasure channels, the Z-channel and others.","PeriodicalId":348168,"journal":{"name":"2022 IEEE International Symposium on Information Theory (ISIT)","volume":"189 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131494638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
The Compound Information Bottleneck Program 复合信息瓶颈程序
Pub Date : 2022-06-26 DOI: 10.1109/ISIT50566.2022.9834812
Michael Dikshtein, N. Weinberger, S. Shamai
Motivated by the emerging technology of oblivious processing in remote radio heads with universal decoders, we formulate and analyze in this paper a compound version of the information bottleneck problem. In this problem, a Markov chain X→Y→ Z is assumed, and the marginals PX and PY are set. The mutual information between X and Z is sought to be maximized over the choice of the conditional probability of Z given Y from a given class, under the worst choice of the joint probability of the pair (X,Y) from a different class. We provide values, bounds, and various characterizations for specific instances of this problem: the binary symmetric case, the scalar Gaussian case, the vector Gaussian case, the symmetric modulo-additive case, and the total variation constraints case. Finally, for the general case, we propose a Blahut-Arimoto type of alternating iterations algorithm to find a consistent solution to this problem.
在具有通用解码器的远程无线电头的遗忘处理技术的激励下,我们在本文中制定和分析了信息瓶颈问题的复合版本。在这个问题中,假设有一条马尔可夫链X→Y→Z,并确定其边际PX和PY。X和Z之间的互信息寻求在给定类中给定Y的Z的条件概率的选择上最大化,在不同类中对(X,Y)的联合概率的最差选择下。我们为这个问题的具体实例提供了值、界和各种特征:二元对称情况、标量高斯情况、向量高斯情况、对称模加性情况和总变分约束情况。最后,对于一般情况,我们提出了Blahut-Arimoto型交替迭代算法来寻找该问题的一致解。
{"title":"The Compound Information Bottleneck Program","authors":"Michael Dikshtein, N. Weinberger, S. Shamai","doi":"10.1109/ISIT50566.2022.9834812","DOIUrl":"https://doi.org/10.1109/ISIT50566.2022.9834812","url":null,"abstract":"Motivated by the emerging technology of oblivious processing in remote radio heads with universal decoders, we formulate and analyze in this paper a compound version of the information bottleneck problem. In this problem, a Markov chain X→Y→ Z is assumed, and the marginals PX and PY are set. The mutual information between X and Z is sought to be maximized over the choice of the conditional probability of Z given Y from a given class, under the worst choice of the joint probability of the pair (X,Y) from a different class. We provide values, bounds, and various characterizations for specific instances of this problem: the binary symmetric case, the scalar Gaussian case, the vector Gaussian case, the symmetric modulo-additive case, and the total variation constraints case. Finally, for the general case, we propose a Blahut-Arimoto type of alternating iterations algorithm to find a consistent solution to this problem.","PeriodicalId":348168,"journal":{"name":"2022 IEEE International Symposium on Information Theory (ISIT)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127567040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Simple Coding Scheme Attaining Positive Information Velocity 一种获得正信息速度的简单编码方案
Pub Date : 2022-06-26 DOI: 10.1109/ISIT50566.2022.9834857
Yan Hao Ling, J. Scarlett
In this paper, we study the problem of relaying a single bit of information across a series of binary symmetric channels, and the associated trade-off between the number of hops m, the transmission time n, and the error probability. We introduce a simple, efficient, and deterministic protocol that attains positive information velocity (i.e., a non-vanishing ratio $frac{m}{n}$ and small error probability) and is significantly simpler than existing protocols that do so. In addition, we characterize the optimal low-noise and high-noise scaling laws of the information velocity, and we adapt our 1-bit protocol to transmit k bits over m hops with ${mathcal{O}}(m + k)$ transmission time.
在本文中,我们研究了在一系列二进制对称信道上中继单个比特信息的问题,以及相关的跳数m、传输时间n和错误概率之间的权衡。我们引入了一种简单、高效和确定性的协议,该协议实现了正的信息速度(即,非消失比$frac{m}{n}$和小错误概率),并且比现有的协议简单得多。此外,我们描述了信息速度的最佳低噪声和高噪声缩放规律,并使我们的1位协议以${mathcal{O}}(m + k)$传输时间在m跳上传输k位。
{"title":"A Simple Coding Scheme Attaining Positive Information Velocity","authors":"Yan Hao Ling, J. Scarlett","doi":"10.1109/ISIT50566.2022.9834857","DOIUrl":"https://doi.org/10.1109/ISIT50566.2022.9834857","url":null,"abstract":"In this paper, we study the problem of relaying a single bit of information across a series of binary symmetric channels, and the associated trade-off between the number of hops m, the transmission time n, and the error probability. We introduce a simple, efficient, and deterministic protocol that attains positive information velocity (i.e., a non-vanishing ratio $frac{m}{n}$ and small error probability) and is significantly simpler than existing protocols that do so. In addition, we characterize the optimal low-noise and high-noise scaling laws of the information velocity, and we adapt our 1-bit protocol to transmit k bits over m hops with ${mathcal{O}}(m + k)$ transmission time.","PeriodicalId":348168,"journal":{"name":"2022 IEEE International Symposium on Information Theory (ISIT)","volume":"35 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115642636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2022 IEEE International Symposium on Information Theory (ISIT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1