首页 > 最新文献

2022 IEEE International Symposium on Information Theory (ISIT)最新文献

英文 中文
On the Secrecy Gain of Formally Unimodular Construction A4 Lattices 形式单模构造A4格的保密增益问题
Pub Date : 2022-06-26 DOI: 10.1109/ISIT50566.2022.9834686
M. F. Bollauf, Hsuan-Yin Lin, Øyvind Ytrehus
Lattice coding for the Gaussian wiretap channel is considered, where the goal is to ensure reliable communication between two authorized parties while preventing an eavesdropper from learning the transmitted messages. Recently, a measure called secrecy gain was proposed as a design criterion to quantify the secrecy-goodness of the applied lattice code. In this paper, the theta series of the so-called formally unimodular lattices obtained by Construction A4 from codes over ${{mathbb{Z}}_4}$ is derived, and we provide a universal approach to determine their secrecy gains. Initial results indicate that Construction A4 lattices can achieve a higher secrecy gain than the best-known formally unimodular lattices from the literature. Furthermore, a new code construction of formally self-dual ${{mathbb{Z}}_4}$-linear codes is presented.
考虑了高斯窃听信道的点状编码,其目标是确保双方之间的可靠通信,同时防止窃听者学习传输的消息。近年来,提出了一种称为保密增益的方法作为量化应用格码的保密性的设计准则。本文推导了构造A4从${{mathbb{Z}}_4}$上的码中得到的所谓形式非模格的级数,并给出了确定其保密增益的通用方法。初步结果表明,构造A4格可以获得比文献中最著名的形式非模格更高的保密增益。在此基础上,提出了形式自对偶${{mathbb{Z}}_4}$-线性码的一种新的码结构。
{"title":"On the Secrecy Gain of Formally Unimodular Construction A4 Lattices","authors":"M. F. Bollauf, Hsuan-Yin Lin, Øyvind Ytrehus","doi":"10.1109/ISIT50566.2022.9834686","DOIUrl":"https://doi.org/10.1109/ISIT50566.2022.9834686","url":null,"abstract":"Lattice coding for the Gaussian wiretap channel is considered, where the goal is to ensure reliable communication between two authorized parties while preventing an eavesdropper from learning the transmitted messages. Recently, a measure called secrecy gain was proposed as a design criterion to quantify the secrecy-goodness of the applied lattice code. In this paper, the theta series of the so-called formally unimodular lattices obtained by Construction A4 from codes over ${{mathbb{Z}}_4}$ is derived, and we provide a universal approach to determine their secrecy gains. Initial results indicate that Construction A4 lattices can achieve a higher secrecy gain than the best-known formally unimodular lattices from the literature. Furthermore, a new code construction of formally self-dual ${{mathbb{Z}}_4}$-linear codes is presented.","PeriodicalId":348168,"journal":{"name":"2022 IEEE International Symposium on Information Theory (ISIT)","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125586251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Information and Energy Transmission with Wavelet-Reconstructed Harvesting Functions 基于小波重构收获函数的信息和能量传输
Pub Date : 2022-06-26 DOI: 10.1109/ISIT50566.2022.9834806
Daewon Seo, Yongjune Kim
In practical simultaneous information and energy transmission (SIET), the exact energy harvesting function is usually unavailable because a harvesting circuit is nonlinear and nonideal. In this work, we consider a SIET problem where the harvesting function is accessible only at sample points that are experimentally taken in the presence of noise. Assuming that the harvesting function is of bounded variation that may have discontinuities, we propose to design SIET based on the wavelet-reconstructed harvesting function. The main focus is its asymptotic performance of expected energy and information rate. Specifically, we propose to design a SIET system based on the wavelet-reconstructed harvesting function with soft-thresholding estimation. Then, the expected loss in energy transmission asymptotically vanishes as the number of samples grows, which turns out to be optimal up to a logarithmic factor. The expected loss in information transmission also vanishes if the target energy delivery is in the interior of the deliverable energy range.
在实际的同步信息和能量传输中,由于采集电路的非线性和非理想性,通常无法获得精确的能量采集功能。在这项工作中,我们考虑了一个SIET问题,其中收获函数只能在实验中存在噪声的样本点上访问。假设收获函数是有界变化,可能有不连续,我们提出了基于小波重构的收获函数来设计SIET。重点研究了期望能量和信息率的渐近性能。具体来说,我们提出了一种基于小波重构收获函数和软阈值估计的SIET系统。然后,随着样本数量的增加,能量传输的预期损失逐渐消失,结果表明,该方法在对数因子范围内是最优的。如果目标能量传递在可传递能量范围内,信息传递中的预期损失也会消失。
{"title":"Information and Energy Transmission with Wavelet-Reconstructed Harvesting Functions","authors":"Daewon Seo, Yongjune Kim","doi":"10.1109/ISIT50566.2022.9834806","DOIUrl":"https://doi.org/10.1109/ISIT50566.2022.9834806","url":null,"abstract":"In practical simultaneous information and energy transmission (SIET), the exact energy harvesting function is usually unavailable because a harvesting circuit is nonlinear and nonideal. In this work, we consider a SIET problem where the harvesting function is accessible only at sample points that are experimentally taken in the presence of noise. Assuming that the harvesting function is of bounded variation that may have discontinuities, we propose to design SIET based on the wavelet-reconstructed harvesting function. The main focus is its asymptotic performance of expected energy and information rate. Specifically, we propose to design a SIET system based on the wavelet-reconstructed harvesting function with soft-thresholding estimation. Then, the expected loss in energy transmission asymptotically vanishes as the number of samples grows, which turns out to be optimal up to a logarithmic factor. The expected loss in information transmission also vanishes if the target energy delivery is in the interior of the deliverable energy range.","PeriodicalId":348168,"journal":{"name":"2022 IEEE International Symposium on Information Theory (ISIT)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125705565","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
On the Capacity of b-Modulated Nonlinear Frequency Division Multiplexing b调制非线性频分复用的容量研究
Pub Date : 2022-06-26 DOI: 10.1109/ISIT50566.2022.9834436
M. Baniasadi, Yu Chen, M. Safari
In this paper, we investigate the capacity of the continuous spectrum of nonlinear frequency division multiplexing (NFDM) systems when data is encoded using b-modulation. Recently, a tractable channel model is proposed for such optical fiber communication systems, describing the received b-modulated signal with an input-dependent complex Gaussian distributed noise. Considering this channel model, we prove that the capacity-achieving distribution is unique and discrete. A search algorithm is proposed to determine the optimal discrete input distribution that maximizes the mutual information. The numerical results show that the optimal input distributions form ring-based constellations. We compare these optimal designs with some conventional ring-based amplitude and phase shift keying (APSK) modulation schemes including 16 APSK, 32 APSK and 64 APSK, to show the achievable performance gains.
本文研究了非线性频分复用(NFDM)系统在采用b调制编码时的连续频谱容量。最近,针对这种光纤通信系统提出了一种可处理的信道模型,该模型描述了接收到的具有输入相关的复高斯分布噪声的b调制信号。考虑到该信道模型,我们证明了容量实现分布是唯一的和离散的。提出了一种使互信息最大化的最优离散输入分布的搜索算法。数值结果表明,最优输入分布形成环状星座。我们将这些优化设计与一些传统的基于环的幅度和相移键控(APSK)调制方案(包括16 APSK, 32 APSK和64 APSK)进行比较,以显示可实现的性能增益。
{"title":"On the Capacity of b-Modulated Nonlinear Frequency Division Multiplexing","authors":"M. Baniasadi, Yu Chen, M. Safari","doi":"10.1109/ISIT50566.2022.9834436","DOIUrl":"https://doi.org/10.1109/ISIT50566.2022.9834436","url":null,"abstract":"In this paper, we investigate the capacity of the continuous spectrum of nonlinear frequency division multiplexing (NFDM) systems when data is encoded using b-modulation. Recently, a tractable channel model is proposed for such optical fiber communication systems, describing the received b-modulated signal with an input-dependent complex Gaussian distributed noise. Considering this channel model, we prove that the capacity-achieving distribution is unique and discrete. A search algorithm is proposed to determine the optimal discrete input distribution that maximizes the mutual information. The numerical results show that the optimal input distributions form ring-based constellations. We compare these optimal designs with some conventional ring-based amplitude and phase shift keying (APSK) modulation schemes including 16 APSK, 32 APSK and 64 APSK, to show the achievable performance gains.","PeriodicalId":348168,"journal":{"name":"2022 IEEE International Symposium on Information Theory (ISIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129874773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Coding Size of Traffic Partition in Switch Memories 交换机内存中流量分区的编码大小
Pub Date : 2022-06-26 DOI: 10.1109/ISIT50566.2022.9834825
Yaniv Sadeh, Ori Rottenstreich, Haim Kaplan
Traffic splitting is a required functionality in networks, for example for load balancing over paths or servers, or by the source’s access restrictions. The capacities of the servers (or the number of users with particular access restrictions) determine the sizes of the parts into which traffic should be split. A recent approach implements traffic splitting within the ternary content addressable memory (TCAM), which is often available in switches. It is important to reduce the amount of memory allocated for this task since TCAMs are power consuming. We analyze the expected size of a representation, for uniformly random ordered partitions. We show that the expected representation size of a random partition is at least half the size for the worst-case partition, and is linear in the number of parts and in the logarithm of the size of the address space.
流量分割是网络中必需的功能,例如用于路径或服务器上的负载平衡,或通过源的访问限制。服务器的容量(或具有特定访问限制的用户数量)决定了应该将流量分成的部分的大小。最近的一种方法是在三元内容可寻址内存(TCAM)中实现流量分割,这通常在交换机中可用。减少为此任务分配的内存量非常重要,因为tcam非常耗电。我们分析了一个表示的期望大小,对于均匀随机有序分区。我们表明,随机分区的预期表示大小至少是最坏情况分区的一半,并且在部分数量和地址空间大小的对数上是线性的。
{"title":"Coding Size of Traffic Partition in Switch Memories","authors":"Yaniv Sadeh, Ori Rottenstreich, Haim Kaplan","doi":"10.1109/ISIT50566.2022.9834825","DOIUrl":"https://doi.org/10.1109/ISIT50566.2022.9834825","url":null,"abstract":"Traffic splitting is a required functionality in networks, for example for load balancing over paths or servers, or by the source’s access restrictions. The capacities of the servers (or the number of users with particular access restrictions) determine the sizes of the parts into which traffic should be split. A recent approach implements traffic splitting within the ternary content addressable memory (TCAM), which is often available in switches. It is important to reduce the amount of memory allocated for this task since TCAMs are power consuming. We analyze the expected size of a representation, for uniformly random ordered partitions. We show that the expected representation size of a random partition is at least half the size for the worst-case partition, and is linear in the number of parts and in the logarithm of the size of the address space.","PeriodicalId":348168,"journal":{"name":"2022 IEEE International Symposium on Information Theory (ISIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130181467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
How Useful Is Delayed Feedback in AoI Minimization — A Study on Systems With Queues in Both Forward and Backward Directions 延迟反馈在AoI最小化中的作用——对具有正向和反向队列的系统的研究
Pub Date : 2022-06-26 DOI: 10.1109/ISIT50566.2022.9834697
Chih-Chun Wang
One canonical example of Age-Of-Information (AoI) minimization is the update-through-queues models. Existing results fall into two categories: The open-loop setting for which the sender is oblivious of the actual packet departure time, versus the closed-loop setting for which the decision is based on instantaneous Acknowledgement (ACK). Neither setting perfectly reflects modern networked systems, which almost always rely on feedback that experiences some delay. Motivated by this observation, this work subjects the ACK traffic to an independent queue so that the closed-loop decision is made based on delayed feedback. Near-optimal schedulers have been devised, which smoothly transition from the instantaneous-ACK to the openloop schemes depending on how long the feedback delay is. The results thus quantify the benefits of delayed feedback for AoI minimization in the update-through-queues systems.
信息年龄(Age-Of-Information, AoI)最小化的一个典型示例是通过队列更新模型。现有的结果分为两类:开环设置(发送方不知道实际的数据包出发时间)和闭环设置(决策基于瞬时确认(ACK))。这两种设置都不能完美地反映现代网络系统,因为现代网络系统几乎总是依赖于有一定延迟的反馈。基于这一观察结果,这项工作将ACK流量置于一个独立的队列中,以便基于延迟反馈做出闭环决策。设计了接近最优的调度器,根据反馈延迟的长短,从瞬时ack方案平稳地过渡到开环方案。因此,结果量化了延迟反馈对通过队列更新系统中AoI最小化的好处。
{"title":"How Useful Is Delayed Feedback in AoI Minimization — A Study on Systems With Queues in Both Forward and Backward Directions","authors":"Chih-Chun Wang","doi":"10.1109/ISIT50566.2022.9834697","DOIUrl":"https://doi.org/10.1109/ISIT50566.2022.9834697","url":null,"abstract":"One canonical example of Age-Of-Information (AoI) minimization is the update-through-queues models. Existing results fall into two categories: The open-loop setting for which the sender is oblivious of the actual packet departure time, versus the closed-loop setting for which the decision is based on instantaneous Acknowledgement (ACK). Neither setting perfectly reflects modern networked systems, which almost always rely on feedback that experiences some delay. Motivated by this observation, this work subjects the ACK traffic to an independent queue so that the closed-loop decision is made based on delayed feedback. Near-optimal schedulers have been devised, which smoothly transition from the instantaneous-ACK to the openloop schemes depending on how long the feedback delay is. The results thus quantify the benefits of delayed feedback for AoI minimization in the update-through-queues systems.","PeriodicalId":348168,"journal":{"name":"2022 IEEE International Symposium on Information Theory (ISIT)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129464250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Upper Confidence Interval Strategies for Multi-Armed Bandits with Entropy Rewards 熵奖励下多武装盗匪的上置信区间策略
Pub Date : 2022-06-26 DOI: 10.1109/ISIT50566.2022.9834746
N. Weinberger, M. Yemini
We introduce a multi-armed bandit problem with information-based rewards. At each round, a player chooses an arm, observes a symbol, and receives an unobserved reward in the form of the symbol’s self-information. The player aims to maximize the expected total reward associated with the entropy values of the arms played. We propose two algorithms based on upper confidence bounds (UCB) for this model. The first algorithm optimistically corrects the bias term in the entropy estimation. The second algorithm relies on data-dependent UCBs that adapt to sources with small entropy values. We provide performance guarantees by upper bounding the expected regret of each of the algorithms, and compare their asymptotic behavior to the Lai-Robbins lower bound. Finally, we provide numerical results illustrating the regret of the algorithms presented.
我们引入了一个基于信息奖励的多武装强盗问题。在每一轮中,玩家选择一只手臂,观察一个符号,并以符号的自我信息的形式获得一个未被观察到的奖励。玩家的目标是最大化与所玩武器的熵值相关的预期总奖励。我们提出了两种基于上置信度(UCB)的算法。第一种算法乐观地修正了熵估计中的偏差项。第二种算法依赖于数据依赖的ucb,该ucb适应具有小熵值的源。我们通过每个算法的期望遗憾上限来提供性能保证,并将它们的渐近行为与Lai-Robbins下界进行比较。最后,我们提供了数值结果来说明所提出算法的缺点。
{"title":"Upper Confidence Interval Strategies for Multi-Armed Bandits with Entropy Rewards","authors":"N. Weinberger, M. Yemini","doi":"10.1109/ISIT50566.2022.9834746","DOIUrl":"https://doi.org/10.1109/ISIT50566.2022.9834746","url":null,"abstract":"We introduce a multi-armed bandit problem with information-based rewards. At each round, a player chooses an arm, observes a symbol, and receives an unobserved reward in the form of the symbol’s self-information. The player aims to maximize the expected total reward associated with the entropy values of the arms played. We propose two algorithms based on upper confidence bounds (UCB) for this model. The first algorithm optimistically corrects the bias term in the entropy estimation. The second algorithm relies on data-dependent UCBs that adapt to sources with small entropy values. We provide performance guarantees by upper bounding the expected regret of each of the algorithms, and compare their asymptotic behavior to the Lai-Robbins lower bound. Finally, we provide numerical results illustrating the regret of the algorithms presented.","PeriodicalId":348168,"journal":{"name":"2022 IEEE International Symposium on Information Theory (ISIT)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129536420","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An Improved Capacity Bound for Secure Network Function Computation 一种改进的安全网络功能计算容量界限
Pub Date : 2022-06-26 DOI: 10.1109/ISIT50566.2022.9834882
Xuan Guang, Y. Bai, R. Yeung
The problem of secure network function computation over a directed acyclic network is investigated in this paper. In such a network, a sink node desires to compute with zero error a target function f, of which the inputs are generated at multiple source nodes, while a wiretapper, who can access any one but not more than one wiretap set in a given collection of wiretap sets, obtains no information about the source inputs. The secure computing rate of a secure function-computing network code is the average number of times the target function can be securely computed for one use of the network. In the paper, we are interested in securely computing linear functions with the wiretapper who can eavesdrop any subset of edges up to a certain size r, referred to as the security level. We obtain an improved upper bound on the secure computing capacity, which is applicable to arbitrary network topologies and arbitrary security levels. When the security level r is equal to 0, our improved upper bound reduces to the computing capacity without security consideration. Furthermore, by applying the improved upper bound, we obtain a non-trivial upper bound on the maximum security level such that the function can be securely computed with a positive rate. We also present a lower bound on the secure computing capacity and give some sufficient conditions in terms of the network topology on the tightness of the lower bound. Together with the improved upper bound, the secure computing capacity for a class of security models can be fully characterized.
研究了有向无环网络上安全网络函数的计算问题。在这种网络中,汇聚节点希望以零误差计算目标函数f,其输入来自多个源节点,而窃听者在给定的窃听集集合中可以访问任何一个窃听集,但不能访问多个窃听集,因此无法获得有关源输入的信息。安全函数计算网络代码的安全计算率是指在网络的一次使用中,目标函数可以被安全计算的平均次数。在本文中,我们感兴趣的是与窃听者安全地计算线性函数,窃听者可以窃听到一定大小r的任何边子集,称为安全级别。我们得到了一个改进的安全计算能力上界,它适用于任意网络拓扑和任意安全级别。当安全级别r = 0时,改进上界降低为不考虑安全的计算能力。进一步,通过应用改进的上界,我们得到了最大安全级别上的非平凡上界,使得函数可以安全地以正速率计算。给出了安全计算能力的一个下界,并从网络拓扑的角度给出了下界紧性的一些充分条件。结合改进的上界,可以充分表征一类安全模型的安全计算能力。
{"title":"An Improved Capacity Bound for Secure Network Function Computation","authors":"Xuan Guang, Y. Bai, R. Yeung","doi":"10.1109/ISIT50566.2022.9834882","DOIUrl":"https://doi.org/10.1109/ISIT50566.2022.9834882","url":null,"abstract":"The problem of secure network function computation over a directed acyclic network is investigated in this paper. In such a network, a sink node desires to compute with zero error a target function f, of which the inputs are generated at multiple source nodes, while a wiretapper, who can access any one but not more than one wiretap set in a given collection of wiretap sets, obtains no information about the source inputs. The secure computing rate of a secure function-computing network code is the average number of times the target function can be securely computed for one use of the network. In the paper, we are interested in securely computing linear functions with the wiretapper who can eavesdrop any subset of edges up to a certain size r, referred to as the security level. We obtain an improved upper bound on the secure computing capacity, which is applicable to arbitrary network topologies and arbitrary security levels. When the security level r is equal to 0, our improved upper bound reduces to the computing capacity without security consideration. Furthermore, by applying the improved upper bound, we obtain a non-trivial upper bound on the maximum security level such that the function can be securely computed with a positive rate. We also present a lower bound on the secure computing capacity and give some sufficient conditions in terms of the network topology on the tightness of the lower bound. Together with the improved upper bound, the secure computing capacity for a class of security models can be fully characterized.","PeriodicalId":348168,"journal":{"name":"2022 IEEE International Symposium on Information Theory (ISIT)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129595330","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On Meta-Bound for Lower Bounds of Bayes Risk 关于贝叶斯风险下界的元界
Pub Date : 2022-06-26 DOI: 10.1109/ISIT50566.2022.9834810
Shota Saito
For the problem of parameter estimation in a Bayesian setting, information-theoretic lower bounds of the Bayes risk have been investigated. Previous studies have proven the lower bound of the Bayes risk in a different manner and characterized the lower bound via different quantities such as the mutual information, Sibson’s α-mutual information, and Csiszár’s f-informativity. In this paper, we introduce an inequality called a "meta-bound for lower bounds of the Bayes risk" and show that the previous results can be derived from this bound.
针对贝叶斯环境下的参数估计问题,研究了贝叶斯风险的信息下界。以往的研究以不同的方式证明了贝叶斯风险的下界,并通过互信息、Sibson α-互信息、Csiszár f-信息性等不同的量来表征下界。在本文中,我们引入了一个叫做“贝叶斯风险下界的元界”的不等式,并证明了前面的结果可以从这个界中推导出来。
{"title":"On Meta-Bound for Lower Bounds of Bayes Risk","authors":"Shota Saito","doi":"10.1109/ISIT50566.2022.9834810","DOIUrl":"https://doi.org/10.1109/ISIT50566.2022.9834810","url":null,"abstract":"For the problem of parameter estimation in a Bayesian setting, information-theoretic lower bounds of the Bayes risk have been investigated. Previous studies have proven the lower bound of the Bayes risk in a different manner and characterized the lower bound via different quantities such as the mutual information, Sibson’s α-mutual information, and Csiszár’s f-informativity. In this paper, we introduce an inequality called a \"meta-bound for lower bounds of the Bayes risk\" and show that the previous results can be derived from this bound.","PeriodicalId":348168,"journal":{"name":"2022 IEEE International Symposium on Information Theory (ISIT)","volume":"2016 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128069360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Towards Efficient Repair and Coding of Binary MDS Array Codes with Small Sub-packetization 基于小分组的二进制MDS阵列码的高效修复与编码
Pub Date : 2022-06-26 DOI: 10.1109/ISIT50566.2022.9834869
Hanxu Hou, Y. Han, Bo Bai, Gong Zhang
Large-scale high code-rate maximum distance separable (MDS) codes are critical and important in distributed storage systems that can provide high fault tolerance with extremely small storage redundancy. Repair access (defined as the total amount of symbols accessed in repairing one single-node failure) is a key metric of designing MDS codes. In large-scale MDS codes, one single-node failure can be recovered by connecting a large number of helper nodes. However, one or more helper nodes may be busy and can not send symbols during the repair process. In this paper, we define the total amount of symbols accessed in repairing one single-node failure with one or more busy nodes as the repair access with busy-node. We then propose a class of MDS array codes over a well-designed binary cyclic ring that is with small sub-packetization, small repair access, small repair access with busy-node, and small encoding complexity.
大规模高码率最大距离可分离码(MDS)在分布式存储系统中是非常重要的,它可以在极小的存储冗余下提供高容错性。修复访问(定义为修复单个节点故障时访问的符号总数)是设计MDS代码的关键指标。在大规模MDS代码中,可以通过连接大量辅助节点来恢复单个节点的故障。但是,一个或多个辅助节点可能很忙,无法在修复过程中发送符号。本文将用一个或多个忙节点修复一个单节点故障所访问的符号总量定义为带忙节点的修复访问。然后,我们提出了一类经过精心设计的二元循环环上的MDS阵列编码,该编码具有小的子分组、小的修复访问、小的繁忙节点修复访问和小的编码复杂度。
{"title":"Towards Efficient Repair and Coding of Binary MDS Array Codes with Small Sub-packetization","authors":"Hanxu Hou, Y. Han, Bo Bai, Gong Zhang","doi":"10.1109/ISIT50566.2022.9834869","DOIUrl":"https://doi.org/10.1109/ISIT50566.2022.9834869","url":null,"abstract":"Large-scale high code-rate maximum distance separable (MDS) codes are critical and important in distributed storage systems that can provide high fault tolerance with extremely small storage redundancy. Repair access (defined as the total amount of symbols accessed in repairing one single-node failure) is a key metric of designing MDS codes. In large-scale MDS codes, one single-node failure can be recovered by connecting a large number of helper nodes. However, one or more helper nodes may be busy and can not send symbols during the repair process. In this paper, we define the total amount of symbols accessed in repairing one single-node failure with one or more busy nodes as the repair access with busy-node. We then propose a class of MDS array codes over a well-designed binary cyclic ring that is with small sub-packetization, small repair access, small repair access with busy-node, and small encoding complexity.","PeriodicalId":348168,"journal":{"name":"2022 IEEE International Symposium on Information Theory (ISIT)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128581984","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The Random Number Partitioning Problem: Overlap Gap Property and Algorithmic Barriers 随机数划分问题:重叠间隙性质和算法障碍
Pub Date : 2022-06-26 DOI: 10.1109/ISIT50566.2022.9834647
D. Gamarnik, Eren C. Kizildag
We focus on the problem of algorithmically finding a near-optimal solution for the (random) number partitioning problem (NPP), a problem that is of great practical and theoretical significance. The NPP possesses a striking gap between the existential and best algorithmic guarantee: when its input has i.i.d. standard Gaussian entries, the optimal value of NPP is $Theta left( {sqrt n {2^{ - n}}} right)$ (w.h.p.); whereas the best polynomial-time algorithm achieves an exponentially worse value of only ${2^{ - Theta left( {{{log }^2}n} right)}}$ (w.h.p.). In this paper, we inquire into the origin of this gap by studying the landscape of the NPP through the lens of statistical physics and establish the presence of the Overlap Gap Property (OGP), a topological barrier for large classes of algorithms. We then leverage the OGP to establish that (a) sufficiently stable algorithms fail to find a near-optimal solution with value below $left. {{2^{ - omega (nlog - 1/5}}n} right)$; and (b) a very natural Monte Carlo Markov Chain dynamics mixes slowly. A technical innovation of our paper is that we consider the overlap structure of m–tuples of near- optimal solutions where m itself grows in n. Our hardness result for stable algorithms is based on a Ramsey-theoretic argument from extremal combinatorics. To the best of our knowledge, this is the first usage of Ramsey Theory to show algorithmic hardness.
本文主要研究了随机数字划分问题(NPP)的近最优解算法问题,这是一个具有重要实际意义和理论意义的问题。NPP在存在性和最佳算法保证之间存在着显著的差距:当其输入有i个标准高斯条目时,NPP的最优值为$Theta left( {sqrt n {2^{ - n}}} right)$ (w.h.p.);而最佳多项式时间算法的指数差值仅为${2^{ - Theta left( {{{log }^2}n} right)}}$ (w.h.p.)。在本文中,我们通过统计物理学的视角研究了NPP的景观,探讨了这种差距的起源,并建立了重叠差距属性(OGP)的存在,这是一种大型算法的拓扑障碍。然后,我们利用OGP来确定(a)足够稳定的算法无法找到值低于$left. {{2^{ - omega (nlog - 1/5}}n} right)$的近最优解;(b)一个非常自然的蒙特卡洛马尔可夫链动力学混合缓慢。本文的一个技术创新是我们考虑了近似最优解的m元组的重叠结构,其中m本身在n中增长。我们的稳定算法的硬度结果是基于极值组合学的拉姆齐理论论点。据我们所知,这是第一次使用拉姆齐理论来显示算法的硬度。
{"title":"The Random Number Partitioning Problem: Overlap Gap Property and Algorithmic Barriers","authors":"D. Gamarnik, Eren C. Kizildag","doi":"10.1109/ISIT50566.2022.9834647","DOIUrl":"https://doi.org/10.1109/ISIT50566.2022.9834647","url":null,"abstract":"We focus on the problem of algorithmically finding a near-optimal solution for the (random) number partitioning problem (NPP), a problem that is of great practical and theoretical significance. The NPP possesses a striking gap between the existential and best algorithmic guarantee: when its input has i.i.d. standard Gaussian entries, the optimal value of NPP is $Theta left( {sqrt n {2^{ - n}}} right)$ (w.h.p.); whereas the best polynomial-time algorithm achieves an exponentially worse value of only ${2^{ - Theta left( {{{log }^2}n} right)}}$ (w.h.p.). In this paper, we inquire into the origin of this gap by studying the landscape of the NPP through the lens of statistical physics and establish the presence of the Overlap Gap Property (OGP), a topological barrier for large classes of algorithms. We then leverage the OGP to establish that (a) sufficiently stable algorithms fail to find a near-optimal solution with value below $left. {{2^{ - omega (nlog - 1/5}}n} right)$; and (b) a very natural Monte Carlo Markov Chain dynamics mixes slowly. A technical innovation of our paper is that we consider the overlap structure of m–tuples of near- optimal solutions where m itself grows in n. Our hardness result for stable algorithms is based on a Ramsey-theoretic argument from extremal combinatorics. To the best of our knowledge, this is the first usage of Ramsey Theory to show algorithmic hardness.","PeriodicalId":348168,"journal":{"name":"2022 IEEE International Symposium on Information Theory (ISIT)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124517121","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2022 IEEE International Symposium on Information Theory (ISIT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1