首页 > 最新文献

2014 IEEE Global Conference on Signal and Information Processing (GlobalSIP)最新文献

英文 中文
A non-intrusive PESQ measure 一种非侵入式PESQ测量方法
Pub Date : 2014-12-01 DOI: 10.1109/GlobalSIP.2014.7032266
D. Sharma, Lisa Meredith, Jose Lainez, Daniel Barreda, P. Naylor
We present NISQ, a data-driven non-intrusive speech quality measure that has been trained to predict the PESQ score for a given speech signal. NISQ is based on feature extraction and a binary tree regression based model. A training method using the intrusive PESQ algorithm to automatically label large quantities of speech data is presented and utilized. Our method is shown to predict PESQ with an RMS error of 0.49 on our test database.
我们提出了NISQ,一种数据驱动的非侵入式语音质量度量,经过训练可以预测给定语音信号的PESQ分数。NISQ基于特征提取和二叉树回归模型。提出了一种利用入侵式PESQ算法对大量语音数据进行自动标注的训练方法。我们的方法在我们的测试数据库上预测PESQ的RMS误差为0.49。
{"title":"A non-intrusive PESQ measure","authors":"D. Sharma, Lisa Meredith, Jose Lainez, Daniel Barreda, P. Naylor","doi":"10.1109/GlobalSIP.2014.7032266","DOIUrl":"https://doi.org/10.1109/GlobalSIP.2014.7032266","url":null,"abstract":"We present NISQ, a data-driven non-intrusive speech quality measure that has been trained to predict the PESQ score for a given speech signal. NISQ is based on feature extraction and a binary tree regression based model. A training method using the intrusive PESQ algorithm to automatically label large quantities of speech data is presented and utilized. Our method is shown to predict PESQ with an RMS error of 0.49 on our test database.","PeriodicalId":362306,"journal":{"name":"2014 IEEE Global Conference on Signal and Information Processing (GlobalSIP)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115703217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Outage probability of multiuser cognitive relay networks with orthogonal space-time block code transmission 正交空时分组码传输多用户认知中继网络的中断概率
Pub Date : 2014-12-01 DOI: 10.1109/GlobalSIP.2014.7032328
Pengwei Zhang, Xing Zhang, Jia Xing, Zhenhai Zhang
This paper investigates the outage performance of decode-and-forward (DF) based cognitive relay networks (CRNs) in the presence of multiple secondary destinations (SDs) in a spectrum sharing scenario with orthogonal space-time block code (OSTBC) transmission. By employing an opportunistic scheduling algorithm to select one out of L SDs, we derive both the exact closed-form expression of outage probability and asymptotic expression of which in high signal-to-noise ratio (SNR) region over Rayleigh fading channels. Our theoretical analysis is corroborated by Monte Carlo simulation. The result shows that the outage performance of the system will be improved with the increase of both the number of antennas and SDs. When source and relay are equipped with N transmit antennas, the diversity order is N × min (N, L). Under this condition, if the number of antennas N is smaller than L, the diversity order is N2, which means the conventional multiuser diversity gain can not be achieved.
研究了具有正交空时分组码(OSTBC)传输的频谱共享场景下,基于解码转发(DF)的认知中继网络(crn)在多个次要目的地(sd)存在下的中断性能。利用机会调度算法从L个sd中选择一个,得到了瑞利衰落信道上高信噪比区域中断概率的精确封闭表达式和渐近表达式。我们的理论分析得到了蒙特卡罗模拟的证实。结果表明,随着天线数和SDs的增加,系统的中断性能将得到改善。当源和中继配置N个发射天线时,分集阶数为N × min (N, L),在这种情况下,如果天线数N小于L,分集阶数为N2,即不能实现常规的多用户分集增益。
{"title":"Outage probability of multiuser cognitive relay networks with orthogonal space-time block code transmission","authors":"Pengwei Zhang, Xing Zhang, Jia Xing, Zhenhai Zhang","doi":"10.1109/GlobalSIP.2014.7032328","DOIUrl":"https://doi.org/10.1109/GlobalSIP.2014.7032328","url":null,"abstract":"This paper investigates the outage performance of decode-and-forward (DF) based cognitive relay networks (CRNs) in the presence of multiple secondary destinations (SDs) in a spectrum sharing scenario with orthogonal space-time block code (OSTBC) transmission. By employing an opportunistic scheduling algorithm to select one out of L SDs, we derive both the exact closed-form expression of outage probability and asymptotic expression of which in high signal-to-noise ratio (SNR) region over Rayleigh fading channels. Our theoretical analysis is corroborated by Monte Carlo simulation. The result shows that the outage performance of the system will be improved with the increase of both the number of antennas and SDs. When source and relay are equipped with N transmit antennas, the diversity order is N × min (N, L). Under this condition, if the number of antennas N is smaller than L, the diversity order is N2, which means the conventional multiuser diversity gain can not be achieved.","PeriodicalId":362306,"journal":{"name":"2014 IEEE Global Conference on Signal and Information Processing (GlobalSIP)","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124132625","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Capacity of known interference channel with Gaussian modulations 高斯调制下已知干扰信道的容量
Pub Date : 2014-12-01 DOI: 10.1109/GlobalSIP.2014.7032323
Shengli Zhang, S. Liew
In this paper, we investigate the capacity of known interference channel, where the receiver knows the interference data but not the channel gain of the interference data, assuming the use of Gaussian modulations. We first present a tight upper bound for the capacity of this known-interference channel. After that, we obtain the achievable rate of the channel with a blind known interference cancellation (BKIC) scheme in closed form. We prove that this achievable rate can approach the aforementioned upper bound in the high SNR regime. Moreover, it is much larger than the achievable rate of the traditional interference cancellation scheme. In particular, the achievable rate of BKIC continues to increase with SNR in the high SNR regime, while that of the traditional scheme approaches a fixed bound that does not improve with SNR.
在本文中,我们研究已知干扰信道的容量,其中接收机知道干扰数据,但不知道干扰数据的信道增益,假设使用高斯调制。我们首先给出了这个已知干扰信道容量的严格上界。在此基础上,以封闭形式给出了盲已知干扰抵消(BKIC)方案下信道的可实现速率。我们证明了在高信噪比条件下,这个可实现的速率可以接近上述上界。而且,它比传统干扰抵消方案的可实现率要大得多。特别是,在高信噪比下,BKIC的可实现率随着信噪比的增加而不断增加,而传统方案的可实现率接近一个固定的边界,不随信噪比的增加而提高。
{"title":"Capacity of known interference channel with Gaussian modulations","authors":"Shengli Zhang, S. Liew","doi":"10.1109/GlobalSIP.2014.7032323","DOIUrl":"https://doi.org/10.1109/GlobalSIP.2014.7032323","url":null,"abstract":"In this paper, we investigate the capacity of known interference channel, where the receiver knows the interference data but not the channel gain of the interference data, assuming the use of Gaussian modulations. We first present a tight upper bound for the capacity of this known-interference channel. After that, we obtain the achievable rate of the channel with a blind known interference cancellation (BKIC) scheme in closed form. We prove that this achievable rate can approach the aforementioned upper bound in the high SNR regime. Moreover, it is much larger than the achievable rate of the traditional interference cancellation scheme. In particular, the achievable rate of BKIC continues to increase with SNR in the high SNR regime, while that of the traditional scheme approaches a fixed bound that does not improve with SNR.","PeriodicalId":362306,"journal":{"name":"2014 IEEE Global Conference on Signal and Information Processing (GlobalSIP)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116965151","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance of parallel two-pass MDL context tree algorithm 并行两遍MDL上下文树算法的性能
Pub Date : 2014-12-01 DOI: 10.1109/GlobalSIP.2014.7032133
Nikhil Krishnan, D. Baron
Computing problems that handle large amounts of data necessitate the use of lossless data compression for efficient storage and transmission. We present numerical results that showcase the advantages of a novel lossless universal data compression algorithm that uses parallel computational units to increase the throughput with minimal degradation in the compression quality. Our approach is to divide the data into blocks, estimate the minimum description length (MDL) context tree source underlying the entire input, and compress each block in parallel based on the MDL source. Numerical results from a prototype implementation suggest that our algorithm offers a better trade-off between compression and throughput than competing universal data compression algorithms.
处理大量数据的计算问题需要使用无损数据压缩来实现高效的存储和传输。我们给出的数值结果展示了一种新的无损通用数据压缩算法的优势,该算法使用并行计算单元来提高吞吐量,同时最小化压缩质量的退化。我们的方法是将数据划分为块,估计整个输入的最小描述长度(MDL)上下文树源,并基于MDL源并行压缩每个块。原型实现的数值结果表明,我们的算法比竞争的通用数据压缩算法在压缩和吞吐量之间提供了更好的权衡。
{"title":"Performance of parallel two-pass MDL context tree algorithm","authors":"Nikhil Krishnan, D. Baron","doi":"10.1109/GlobalSIP.2014.7032133","DOIUrl":"https://doi.org/10.1109/GlobalSIP.2014.7032133","url":null,"abstract":"Computing problems that handle large amounts of data necessitate the use of lossless data compression for efficient storage and transmission. We present numerical results that showcase the advantages of a novel lossless universal data compression algorithm that uses parallel computational units to increase the throughput with minimal degradation in the compression quality. Our approach is to divide the data into blocks, estimate the minimum description length (MDL) context tree source underlying the entire input, and compress each block in parallel based on the MDL source. Numerical results from a prototype implementation suggest that our algorithm offers a better trade-off between compression and throughput than competing universal data compression algorithms.","PeriodicalId":362306,"journal":{"name":"2014 IEEE Global Conference on Signal and Information Processing (GlobalSIP)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117142152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Performance analysis of cognitive radio networks with interference cancellation 具有干扰抵消的认知无线网络性能分析
Pub Date : 2014-12-01 DOI: 10.1109/GlobalSIP.2014.7032334
Kang Song, Baofeng Ji, Yongming Huang, Luxi Yang
This paper investigates the performance of cognitive radio network (CogNet). An interference cancellation scheme employed at secondary transmitter is first discussed based on the cancellation of cross interference from secondary transmitter to primary receiver. Then, we derive the expressions of the probability density function (PDF) and cumulative distribution function (CDF) of the received SNRs of both primary receiver and secondary receiver, and provide the closed-form overall outage probability expression of the system, which shows that the overall performance of the CogNet is improved with interference cancellation performed at the secondary transmitter. The numerical results finally verify the accuracy of our analysis.
本文研究了认知无线网络的性能。首先讨论了一种基于消除从二次发射机到主接收机的交叉干扰的二次发射机干扰消除方案。在此基础上,推导了主接收机和副接收机接收信噪比的概率密度函数(PDF)和累积分布函数(CDF)表达式,并给出了系统的闭式总体中断概率表达式,表明在副接收机进行干扰消除后,CogNet的总体性能得到了提高。最后的数值结果验证了分析的准确性。
{"title":"Performance analysis of cognitive radio networks with interference cancellation","authors":"Kang Song, Baofeng Ji, Yongming Huang, Luxi Yang","doi":"10.1109/GlobalSIP.2014.7032334","DOIUrl":"https://doi.org/10.1109/GlobalSIP.2014.7032334","url":null,"abstract":"This paper investigates the performance of cognitive radio network (CogNet). An interference cancellation scheme employed at secondary transmitter is first discussed based on the cancellation of cross interference from secondary transmitter to primary receiver. Then, we derive the expressions of the probability density function (PDF) and cumulative distribution function (CDF) of the received SNRs of both primary receiver and secondary receiver, and provide the closed-form overall outage probability expression of the system, which shows that the overall performance of the CogNet is improved with interference cancellation performed at the secondary transmitter. The numerical results finally verify the accuracy of our analysis.","PeriodicalId":362306,"journal":{"name":"2014 IEEE Global Conference on Signal and Information Processing (GlobalSIP)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123911133","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Single-user and multiple access channels with energy harvesting transmitters and receivers 带有能量收集发射器和接收器的单用户和多访问通道
Pub Date : 2014-12-01 DOI: 10.1109/GlobalSIP.2014.7032109
A. Arafa, S. Ulukus
We consider the effects of decoding costs in energy harvesting communication systems. In our setting, receivers, in addition to transmitters, rely solely on energy harvested from nature, and need to spend some energy in order to decode their intended packets. We model the decoding energy as an increasing convex function of the rate of the incoming data. In this setting, in addition to the traditional energy causality constraints at the transmitters, we have the decoding causality constraints, where energy spent by the receiver for decoding cannot exceed its harvested energy. We first consider the point-to-point single-user problem where the goal is to maximize the total throughput by a given deadline subject to both energy and decoding causality constraints. We then consider the multiple access channel (MAC) where the transmitters and the receiver harvest energy from nature, and characterize the maximum departure region.
我们考虑了解码成本对能量收集通信系统的影响。在我们的设置中,除了发射器之外,接收器完全依赖于从大自然中获取的能量,并且需要花费一些能量来解码它们预期的数据包。我们将解码能量建模为输入数据速率的递增凸函数。在这种情况下,除了发射器的传统能量因果关系约束外,我们还有解码因果关系约束,其中接收器用于解码的能量不能超过其收获的能量。我们首先考虑点对点单用户问题,其目标是在给定的截止日期前在能量和解码因果关系约束下最大化总吞吐量。然后,我们考虑了多址信道(MAC),其中发射机和接收机从自然中获取能量,并表征了最大偏离区域。
{"title":"Single-user and multiple access channels with energy harvesting transmitters and receivers","authors":"A. Arafa, S. Ulukus","doi":"10.1109/GlobalSIP.2014.7032109","DOIUrl":"https://doi.org/10.1109/GlobalSIP.2014.7032109","url":null,"abstract":"We consider the effects of decoding costs in energy harvesting communication systems. In our setting, receivers, in addition to transmitters, rely solely on energy harvested from nature, and need to spend some energy in order to decode their intended packets. We model the decoding energy as an increasing convex function of the rate of the incoming data. In this setting, in addition to the traditional energy causality constraints at the transmitters, we have the decoding causality constraints, where energy spent by the receiver for decoding cannot exceed its harvested energy. We first consider the point-to-point single-user problem where the goal is to maximize the total throughput by a given deadline subject to both energy and decoding causality constraints. We then consider the multiple access channel (MAC) where the transmitters and the receiver harvest energy from nature, and characterize the maximum departure region.","PeriodicalId":362306,"journal":{"name":"2014 IEEE Global Conference on Signal and Information Processing (GlobalSIP)","volume":"197 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125728943","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Profile driven dataflow optimisation of mean shift visual tracking 平均偏移视觉跟踪的剖面驱动数据流优化
Pub Date : 2014-12-01 DOI: 10.1109/GlobalSIP.2014.7032066
Deepayan Bhowmik, A. Wallace, Robert J. Stewart, Xinyuan Qian, G. Michaelson
Profile guided optimisation is a common technique used by compilers and runtime systems to shorten execution runtimes and to optimise locality aware scheduling and memory access on heterogeneous hardware platforms. Some profiling tools trace the execution of low level code, whilst others are designed for abstract models of computation to provide rich domain-specific context in profiling reports. We have implemented mean shift, a computer vision tracking algorithm, in the RVC-CAL dataflow language and use both dynamic runtime and static dataflow profiling mechanisms to identify and eliminate bottlenecks in our naive initial version. We use these profiling reports to tune the CPU scheduler reducing runtime by 88%, and to optimise our dataflow implementation that reduces runtime by a further 43% - an overall runtime reduction of 93%. We also assess the portability of our mean shift optimisations by trading off CPU runtime against resource utilisation on FPGAs. Applying all dataflow optimisations reduces FPGA design space significantly, requiring fewer slice LUTs and less block memory.
概要文件引导的优化是编译器和运行时系统使用的一种常用技术,用于缩短执行运行时间,并优化异构硬件平台上的位置感知调度和内存访问。一些分析工具跟踪低级代码的执行,而另一些则是为抽象的计算模型而设计的,以便在分析报告中提供丰富的特定于领域的上下文。我们在RVC-CAL数据流语言中实现了mean shift(一种计算机视觉跟踪算法),并使用动态运行时和静态数据流分析机制来识别和消除初始版本中的瓶颈。我们使用这些分析报告来调优CPU调度器,使运行时间减少88%,并优化我们的数据流实现,使运行时间进一步减少43%——总体运行时间减少93%。我们还通过权衡CPU运行时和fpga上的资源利用率来评估平均移位优化的可移植性。应用所有数据流优化大大减少了FPGA设计空间,需要更少的片lut和更少的块内存。
{"title":"Profile driven dataflow optimisation of mean shift visual tracking","authors":"Deepayan Bhowmik, A. Wallace, Robert J. Stewart, Xinyuan Qian, G. Michaelson","doi":"10.1109/GlobalSIP.2014.7032066","DOIUrl":"https://doi.org/10.1109/GlobalSIP.2014.7032066","url":null,"abstract":"Profile guided optimisation is a common technique used by compilers and runtime systems to shorten execution runtimes and to optimise locality aware scheduling and memory access on heterogeneous hardware platforms. Some profiling tools trace the execution of low level code, whilst others are designed for abstract models of computation to provide rich domain-specific context in profiling reports. We have implemented mean shift, a computer vision tracking algorithm, in the RVC-CAL dataflow language and use both dynamic runtime and static dataflow profiling mechanisms to identify and eliminate bottlenecks in our naive initial version. We use these profiling reports to tune the CPU scheduler reducing runtime by 88%, and to optimise our dataflow implementation that reduces runtime by a further 43% - an overall runtime reduction of 93%. We also assess the portability of our mean shift optimisations by trading off CPU runtime against resource utilisation on FPGAs. Applying all dataflow optimisations reduces FPGA design space significantly, requiring fewer slice LUTs and less block memory.","PeriodicalId":362306,"journal":{"name":"2014 IEEE Global Conference on Signal and Information Processing (GlobalSIP)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124657356","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Distributed opportunistic spectrum access with spatial reuse in cognitive radio networks 认知无线电网络中空间复用的分布式机会频谱接入
Pub Date : 2014-12-01 DOI: 10.1109/GlobalSIP.2014.7032321
Yi Zhang, Wee Peng Tay, K. H. Li, M. Esseghir, D. Gaïti
We formulate and study a multi-user multi-armed bandit (MAB) problem for opportunistic spectrum access (OSA) that exploits the temporal-spatial reuse of PU channels so that SUs who do not interfere with each other can make use of the same PU channel. We propose a three-stage distributed channel allocation policy for OSA, where SUs collaboratively find an optimal channel access grouping, and independently learn the channel availability statistics to maximize the total expected number of successful SU transmissions. We adopt a distributed synchronous greedy graph coloring algorithm to cluster SUs into maximal independent sets, and a distributed average consensus algorithm to learn the sizes of the independent sets, with SUs belonging to a larger set being assigned a smaller access rank. Each SU then independently learns the PU channel statistics using a revised ε-greedy policy based on its assigned access rank. We provide the theoretical upper bound for the regret, and simulations suggest that our proposed policy has a significantly smaller regret than a random access policy and an adaptive randomization policy.
我们制定并研究了机会频谱接入(OSA)的多用户多臂强盗(MAB)问题,该问题利用PU信道的时空重用,使互不干扰的su可以使用相同的PU信道。我们提出了一种三阶段的OSA分布式信道分配策略,其中SU协作找到最优的信道访问分组,并独立学习信道可用性统计数据,以最大化成功传输的SU总数。我们采用分布式同步贪婪图着色算法将SUs聚为最大独立集,并采用分布式平均一致性算法学习独立集的大小,其中属于较大集的su被分配较小的访问秩。然后,每个SU根据其分配的访问等级,使用修改后的ε-贪心策略独立学习PU通道统计信息。我们提供了后悔的理论上限,仿真结果表明,我们提出的策略的后悔明显小于随机访问策略和自适应随机化策略。
{"title":"Distributed opportunistic spectrum access with spatial reuse in cognitive radio networks","authors":"Yi Zhang, Wee Peng Tay, K. H. Li, M. Esseghir, D. Gaïti","doi":"10.1109/GlobalSIP.2014.7032321","DOIUrl":"https://doi.org/10.1109/GlobalSIP.2014.7032321","url":null,"abstract":"We formulate and study a multi-user multi-armed bandit (MAB) problem for opportunistic spectrum access (OSA) that exploits the temporal-spatial reuse of PU channels so that SUs who do not interfere with each other can make use of the same PU channel. We propose a three-stage distributed channel allocation policy for OSA, where SUs collaboratively find an optimal channel access grouping, and independently learn the channel availability statistics to maximize the total expected number of successful SU transmissions. We adopt a distributed synchronous greedy graph coloring algorithm to cluster SUs into maximal independent sets, and a distributed average consensus algorithm to learn the sizes of the independent sets, with SUs belonging to a larger set being assigned a smaller access rank. Each SU then independently learns the PU channel statistics using a revised ε-greedy policy based on its assigned access rank. We provide the theoretical upper bound for the regret, and simulations suggest that our proposed policy has a significantly smaller regret than a random access policy and an adaptive randomization policy.","PeriodicalId":362306,"journal":{"name":"2014 IEEE Global Conference on Signal and Information Processing (GlobalSIP)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124695768","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Dithering and betweenness centrality in weighted graphs 加权图中的抖动和中间性中心性
Pub Date : 2014-12-01 DOI: 10.1109/GlobalSIP.2014.7032239
Santiago Segarra, Alejandro Ribeiro
This paper applies dithering to design a node centrality measure for weighted graphs. The construction is an improvement on the stable betweenness centrality measure which, in turn, was introduced as a robust alternative to the well-known betweenness centrality. We interpret any given graph as the mean representation of a distribution of graphs and define the dithered centrality value as the expected centrality value across all graphs in the distribution. We show that the dithered stable betweenness centrality measure preserves robustness in the presence of noise while improving the behavior of stable betweenness. Numerical experiments demonstrate the advantages of dithering by comparing the performance of betweenness, stable betweenness and dithered stable betweenness centralities in terms of robustness to noise, dependence on the number and quality of alternative paths, and distribution of centrality values across the graph.
本文将抖动技术应用于加权图的节点中心性度量。该构造是对稳定中间性度量的改进,而稳定中间性度量又被引入作为众所周知的中间性度量的鲁棒替代方案。我们将任何给定的图解释为图分布的平均表示,并将抖动中心性值定义为分布中所有图的预期中心性值。我们证明了抖动稳定中间度中心性度量在噪声存在下保持了鲁棒性,同时改善了稳定中间度的行为。数值实验通过比较中间度、稳定中间度和抖动稳定中间度中心性对噪声的鲁棒性、对备选路径数量和质量的依赖性以及图中中心性值的分布,证明了抖动的优势。
{"title":"Dithering and betweenness centrality in weighted graphs","authors":"Santiago Segarra, Alejandro Ribeiro","doi":"10.1109/GlobalSIP.2014.7032239","DOIUrl":"https://doi.org/10.1109/GlobalSIP.2014.7032239","url":null,"abstract":"This paper applies dithering to design a node centrality measure for weighted graphs. The construction is an improvement on the stable betweenness centrality measure which, in turn, was introduced as a robust alternative to the well-known betweenness centrality. We interpret any given graph as the mean representation of a distribution of graphs and define the dithered centrality value as the expected centrality value across all graphs in the distribution. We show that the dithered stable betweenness centrality measure preserves robustness in the presence of noise while improving the behavior of stable betweenness. Numerical experiments demonstrate the advantages of dithering by comparing the performance of betweenness, stable betweenness and dithered stable betweenness centralities in terms of robustness to noise, dependence on the number and quality of alternative paths, and distribution of centrality values across the graph.","PeriodicalId":362306,"journal":{"name":"2014 IEEE Global Conference on Signal and Information Processing (GlobalSIP)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130559582","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Achievable secrecy in arbitrary erasure networks with feedback 带反馈的任意擦除网络中可实现的保密性
Pub Date : 2014-12-01 DOI: 10.1109/GlobalSIP.2014.7032245
László Czap, Athanasios Papadopoulos, C. Fragouli
We present achievability schemes for secure message transmission in the presence of a passive eavesdropper, over arbitrary networks, where each edge corresponds to an independent erasure channel and we have available public channel state feedback. Our schemes are efficiently described through linear programming formulations, that generalize the information flow linear programs to networks with security constraints; different sources of secrecy show up as parameters in our linear programs, and solving the optimization problem enables to select the optimal (in terms of rate) scheme that integrates them. As far as we know, these are the first linear programming formulations for secret message transmission over arbitrary networks with erasures and channel state feedback.
我们提出了在存在被动窃听者的情况下,通过任意网络进行安全信息传输的可实现性方案,其中每条边都对应一个独立的擦除信道,并且我们有可用的公共信道状态反馈。我们的方案是通过线性规划公式有效描述的,它将信息流线性规划推广到了具有安全约束的网络中;不同的保密源作为参数出现在我们的线性规划中,解决优化问题可以选择将它们整合在一起的最优方案(就速率而言)。据我们所知,这些都是第一种线性编程公式,用于在具有擦除和信道状态反馈的任意网络上传输秘密信息。
{"title":"Achievable secrecy in arbitrary erasure networks with feedback","authors":"László Czap, Athanasios Papadopoulos, C. Fragouli","doi":"10.1109/GlobalSIP.2014.7032245","DOIUrl":"https://doi.org/10.1109/GlobalSIP.2014.7032245","url":null,"abstract":"We present achievability schemes for secure message transmission in the presence of a passive eavesdropper, over arbitrary networks, where each edge corresponds to an independent erasure channel and we have available public channel state feedback. Our schemes are efficiently described through linear programming formulations, that generalize the information flow linear programs to networks with security constraints; different sources of secrecy show up as parameters in our linear programs, and solving the optimization problem enables to select the optimal (in terms of rate) scheme that integrates them. As far as we know, these are the first linear programming formulations for secret message transmission over arbitrary networks with erasures and channel state feedback.","PeriodicalId":362306,"journal":{"name":"2014 IEEE Global Conference on Signal and Information Processing (GlobalSIP)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130988019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2014 IEEE Global Conference on Signal and Information Processing (GlobalSIP)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1