首页 > 最新文献

2023 IEEE Information Theory Workshop (ITW)最新文献

英文 中文
A constructive approach to multimedia codes with complete traceability resistant to δ-noise 具有完全可追溯性的抗δ噪声多媒体代码的构建方法
Pub Date : 2023-04-23 DOI: 10.1109/ITW55543.2023.10161685
Marcel Fernández, G. Kabatiansky, Sebastià Martín, C. Tavernier
This paper presents an explicit construction of multimedia codes with complete traceability resistant to the averaging attack and δ-noise. The obtained code is a combination of a class of signature codes together with a generalization of superimposed codes, for which existence lower bounds, using the Lovász Local Lemma, are obtained. The constructions are a consequence of the Moser-Tardos variable framework.
本文提出了一种具有完全可追溯性、可抵御平均攻击和δ噪声的多媒体编码的明确构造。所获得的编码是一类签名编码与叠加编码广义化的结合,利用 Lovász Local Lemma 获得了这些编码的存在性下限。这些构造是 Moser-Tardos 变量框架的结果。
{"title":"A constructive approach to multimedia codes with complete traceability resistant to δ-noise","authors":"Marcel Fernández, G. Kabatiansky, Sebastià Martín, C. Tavernier","doi":"10.1109/ITW55543.2023.10161685","DOIUrl":"https://doi.org/10.1109/ITW55543.2023.10161685","url":null,"abstract":"This paper presents an explicit construction of multimedia codes with complete traceability resistant to the averaging attack and δ-noise. The obtained code is a combination of a class of signature codes together with a generalization of superimposed codes, for which existence lower bounds, using the Lovász Local Lemma, are obtained. The constructions are a consequence of the Moser-Tardos variable framework.","PeriodicalId":439800,"journal":{"name":"2023 IEEE Information Theory Workshop (ITW)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127138190","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improved Bounds For Efficiently Decodable Probabilistic Group Testing With Unreliable Items 基于不可靠项的可译码概率群测试的改进界
Pub Date : 2023-04-23 DOI: 10.1109/ITW55543.2023.10161616
Sarthak Jain, Martina Cardone, S. Mohajer
This work uses non-adaptive probabilistic group testing to find a set of L defective items out of n items. In contrast to traditional group testing, in the considered setup each item can hide itself (or become inactive) during any given test with probability 1−α and is active with probability α. The authors of [Cheraghchi et al.] proposed an efficiently decodable probabilistic group testing scheme which requires $Oleft( {frac{{Llog (n)}}{{{alpha ^3}}}} right)$ tests for the per-instance scenario (where the group testing matrix works for any arbitrary, but fixed, set of L defective items) and $Oleft( {frac{{{L^2}log (n/L)}}{{{alpha ^3}}}} right)$ tests for the universal scenario (where the same group testing matrix works for all possible defective sets of L items). The contribution of this work is two-fold: (i) with a slight modification in the construction of the group testing matrix proposed by [Cheraghchi et al.], the corresponding bounds on the number of sufficient tests are improved to $Oleft( {frac{{Llog (n)}}{{{alpha ^2}}}} right)$ and $Oleft( {frac{{{L^2}log (n/L)}}{{{alpha ^2}}}} right)$ for the per-instance and universal scenarios respectively, while still using their efficient decoding method; and (ii) it is shown that the same bounds also hold for the fixed pool-size probabilistic group testing scenario, where in every test a fixed number of items are included for testing.
本工作使用非自适应概率组检验从n个物品中找出L个有缺陷的物品。与传统的组测试相比,在考虑的设置中,每个项目可以在任何给定的测试中隐藏自己(或变得不活跃),概率为1−α,并以概率为α活跃。[Cheraghchi等人]的作者提出了一种有效可解码的概率组测试方案,该方案需要对每个实例场景(其中组测试矩阵适用于任何任意但固定的L个有缺陷的项目集合)进行$Oleft( {frac{{Llog (n)}}{{{alpha ^3}}}} right)$测试,并对通用场景(其中相同的组测试矩阵适用于所有可能的L个有缺陷的项目集合)进行$Oleft( {frac{{{L^2}log (n/L)}}{{{alpha ^3}}}} right)$测试。这项工作的贡献是双重的:(i)对[Cheraghchi等人]提出的组测试矩阵的构造进行了轻微的修改,在仍然使用其高效解码方法的情况下,对每个实例和通用场景的充分测试数量的相应界分别改进为$Oleft( {frac{{Llog (n)}}{{{alpha ^2}}}} right)$和$Oleft( {frac{{{L^2}log (n/L)}}{{{alpha ^2}}}} right)$;(ii)对于固定池大小的概率组测试场景,也存在相同的界限,其中在每个测试中包含固定数量的项目进行测试。
{"title":"Improved Bounds For Efficiently Decodable Probabilistic Group Testing With Unreliable Items","authors":"Sarthak Jain, Martina Cardone, S. Mohajer","doi":"10.1109/ITW55543.2023.10161616","DOIUrl":"https://doi.org/10.1109/ITW55543.2023.10161616","url":null,"abstract":"This work uses non-adaptive probabilistic group testing to find a set of L defective items out of n items. In contrast to traditional group testing, in the considered setup each item can hide itself (or become inactive) during any given test with probability 1−α and is active with probability α. The authors of [Cheraghchi et al.] proposed an efficiently decodable probabilistic group testing scheme which requires $Oleft( {frac{{Llog (n)}}{{{alpha ^3}}}} right)$ tests for the per-instance scenario (where the group testing matrix works for any arbitrary, but fixed, set of L defective items) and $Oleft( {frac{{{L^2}log (n/L)}}{{{alpha ^3}}}} right)$ tests for the universal scenario (where the same group testing matrix works for all possible defective sets of L items). The contribution of this work is two-fold: (i) with a slight modification in the construction of the group testing matrix proposed by [Cheraghchi et al.], the corresponding bounds on the number of sufficient tests are improved to $Oleft( {frac{{Llog (n)}}{{{alpha ^2}}}} right)$ and $Oleft( {frac{{{L^2}log (n/L)}}{{{alpha ^2}}}} right)$ for the per-instance and universal scenarios respectively, while still using their efficient decoding method; and (ii) it is shown that the same bounds also hold for the fixed pool-size probabilistic group testing scenario, where in every test a fixed number of items are included for testing.","PeriodicalId":439800,"journal":{"name":"2023 IEEE Information Theory Workshop (ITW)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122467101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The Secrecy Capacity of Gaussian Wiretap Channels with Rate-Limited Help at the Encoder 编码器限速帮助下高斯窃听信道的保密能力
Pub Date : 2023-04-23 DOI: 10.1109/ITW55543.2023.10161609
S. Loyka, N. Merhav
The Gaussian wiretap channel (WTC) with rate-limited help, available at the transmitter/encoder (Tx), in addition to or instead of the same help at the legitimate receiver, is studied under various channel configurations. For the degraded or reversely-degraded WTC, rate-limited non-secure Tx help results in a secrecy capacity boost equal to the help rate irrespective of whether the help is causal or not. For the non-degraded WTC, the secrecy capacity boost is lower bounded by the help rate. A capacity-achieving signaling is two-phase time sharing, where wiretap coding without help is used in Phase 1 and help without wiretap coding is used in Phase 2. The secrecy capacity with Tx help is positive for the reversely-degraded channel (where the no-help secrecy capacity is zero) and no Phase 1 is needed to achieve it. Unlike the no-help case, more noise at the legitimate receiver can sometimes result in higher secrecy capacity with Tx help. In the case of the joint Tx/Rx non-secure help, one help link can be omitted without affecting the capacity.
在不同的信道配置下,研究了在发送/编码器(Tx)提供速率限制帮助的高斯窃听信道(WTC),以及在合法接收端提供相同的帮助。对于降级或反向降级的WTC,速率限制的非安全Tx帮助会导致与帮助速率相等的保密容量提升,而不管帮助是否是因果关系。对于未退化的WTC,保密能力的提升被帮助率所限制。增容信令为两阶段分时信令,第一阶段采用无帮助的窃听编码,第二阶段采用无帮助的窃听编码。具有Tx帮助的保密能力对于反向降级信道(其中无帮助保密能力为零)是正的,并且不需要阶段1来实现它。与无帮助的情况不同,合法接收方的更多噪声有时会导致Tx帮助的更高保密能力。在Tx/Rx联合非安全帮助的情况下,在不影响容量的情况下,可以省略一条帮助链路。
{"title":"The Secrecy Capacity of Gaussian Wiretap Channels with Rate-Limited Help at the Encoder","authors":"S. Loyka, N. Merhav","doi":"10.1109/ITW55543.2023.10161609","DOIUrl":"https://doi.org/10.1109/ITW55543.2023.10161609","url":null,"abstract":"The Gaussian wiretap channel (WTC) with rate-limited help, available at the transmitter/encoder (Tx), in addition to or instead of the same help at the legitimate receiver, is studied under various channel configurations. For the degraded or reversely-degraded WTC, rate-limited non-secure Tx help results in a secrecy capacity boost equal to the help rate irrespective of whether the help is causal or not. For the non-degraded WTC, the secrecy capacity boost is lower bounded by the help rate. A capacity-achieving signaling is two-phase time sharing, where wiretap coding without help is used in Phase 1 and help without wiretap coding is used in Phase 2. The secrecy capacity with Tx help is positive for the reversely-degraded channel (where the no-help secrecy capacity is zero) and no Phase 1 is needed to achieve it. Unlike the no-help case, more noise at the legitimate receiver can sometimes result in higher secrecy capacity with Tx help. In the case of the joint Tx/Rx non-secure help, one help link can be omitted without affecting the capacity.","PeriodicalId":439800,"journal":{"name":"2023 IEEE Information Theory Workshop (ITW)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114754982","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Concentration Properties of Generalized Random Gilbert-Varshamov Codes 广义随机Gilbert-Varshamov码的集中性质
Pub Date : 2023-04-23 DOI: 10.1109/ITW55543.2023.10161687
Lan V. Truong
We study the typical error exponent of constant composition generalized random Gilbert-Varshamov (RGV) codes over discrete memoryless channels (DMC) channels with generalized likelihood decoding. We show that the typical error exponent of the RGV ensemble is equal to the expurgated error exponent, provided that the RGV codebook parameters are chosen appropriately. We also prove that the exponent of a randomly chosen RGV code converges in probability to the typical error exponent; the lower tail is shown to decay exponentially while the upper tail decays double-exponentially above the expurgated exponent.
研究了离散无记忆信道(DMC)上具有广义似然译码的常组成广义随机Gilbert-Varshamov (RGV)码的典型误差指数。结果表明,只要选择合适的RGV码本参数,RGV集成的典型误差指数等于消去后的误差指数。我们还证明了随机选择的RGV码的指数在概率上收敛于典型误差指数;下尾呈指数衰减,而上尾在消去指数之上呈双指数衰减。
{"title":"Concentration Properties of Generalized Random Gilbert-Varshamov Codes","authors":"Lan V. Truong","doi":"10.1109/ITW55543.2023.10161687","DOIUrl":"https://doi.org/10.1109/ITW55543.2023.10161687","url":null,"abstract":"We study the typical error exponent of constant composition generalized random Gilbert-Varshamov (RGV) codes over discrete memoryless channels (DMC) channels with generalized likelihood decoding. We show that the typical error exponent of the RGV ensemble is equal to the expurgated error exponent, provided that the RGV codebook parameters are chosen appropriately. We also prove that the exponent of a randomly chosen RGV code converges in probability to the typical error exponent; the lower tail is shown to decay exponentially while the upper tail decays double-exponentially above the expurgated exponent.","PeriodicalId":439800,"journal":{"name":"2023 IEEE Information Theory Workshop (ITW)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115838004","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Asymmetric tree correlation testing for graph alignment 图对齐的非对称树相关测试
Pub Date : 2023-04-23 DOI: 10.1109/ITW55543.2023.10161653
Jakob Maier, L. Massoulié
We consider the partial graph alignment problem on two correlated sparse Erdős–Rényi graphs with differing edge or node densities. Exploiting that these graphs are locally tree-like, we come to consider a hypothesis testing problem on correlated Galton-Watson trees. To solve this problem, we give several equivalent conditions for the existence of likelihood-ratio tests with vanishing type-I-error and significant power. We then show that these same conditions enable the partial graph alignment algorithm MPAlign to succeed.This paper generalizes recent results from Ganassali L., Massoulié L. and Lelarge M. to the asymmetric edge and node density case. This extension allows for greater applicability of the results and resolves a special case of the subgraph isomorphism problem.
我们考虑了两个具有不同边密度或节点密度的相关稀疏图Erdős-Rényi的部分图对齐问题。利用这些图是局部树状的,我们来考虑一个相关高尔顿-沃森树的假设检验问题。为了解决这一问题,我们给出了一类误差消失且幂次显著的似然比检验存在的几个等价条件。然后,我们展示了这些相同的条件使部分图对齐算法MPAlign成功。本文将Ganassali L., massouli L.和llarge M.的最新结果推广到不对称边和节点密度情况。这种扩展允许结果更大的适用性,并解决了子图同构问题的一个特殊情况。
{"title":"Asymmetric tree correlation testing for graph alignment","authors":"Jakob Maier, L. Massoulié","doi":"10.1109/ITW55543.2023.10161653","DOIUrl":"https://doi.org/10.1109/ITW55543.2023.10161653","url":null,"abstract":"We consider the partial graph alignment problem on two correlated sparse Erdős–Rényi graphs with differing edge or node densities. Exploiting that these graphs are locally tree-like, we come to consider a hypothesis testing problem on correlated Galton-Watson trees. To solve this problem, we give several equivalent conditions for the existence of likelihood-ratio tests with vanishing type-I-error and significant power. We then show that these same conditions enable the partial graph alignment algorithm MPAlign to succeed.This paper generalizes recent results from Ganassali L., Massoulié L. and Lelarge M. to the asymmetric edge and node density case. This extension allows for greater applicability of the results and resolves a special case of the subgraph isomorphism problem.","PeriodicalId":439800,"journal":{"name":"2023 IEEE Information Theory Workshop (ITW)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114807645","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Bidirectional Piggybacking Design for All Nodes with Sub-Packetization l = r 具有子分组l = r的所有节点双向承载设计
Pub Date : 2023-04-23 DOI: 10.1109/ITW55543.2023.10161644
Ke Wang, Zhifang Zhang
Piggybacking design has been applied extensively in distributed storage systems in recent years, since it can reduce repair bandwidth significantly with small sub-packetization. In this work, we propose a bidirectional piggybacking design (BPD) with sub-packetization l = r, where r = n − k equals the redundancy of an [n,k] linear code. Unlike most existing piggybacking designs, there is no distinction between systematic nodes and parity nodes in BPD and the piggybacks are added bidirectionally. Consequently, BPD leads to lower average repair bandwidth than previous piggybacking designs at equal subpacketization level when r ≥ 3. However, BPD needs larger fields to maintain the MDS property. We prove two upper bounds on the field size for explicit BPD and existential constructions respectively. By computer search, our BPD can be given over a field much smaller than the proved upper bounds. As an example, we provide the BPD for the [14], [10] Reed-Solomon (RS) code over F28 and obtain approximately 50% savings in the average repair bandwidth compared with the trivial repair approach. This is the lowest repair bandwidth achieved so far for [14], [10]256 RS codes with sub-packetization l ≤ 4.
近年来,承载设计在分布式存储系统中得到了广泛的应用,因为它可以在较小的子分组下显著减少修复带宽。在这项工作中,我们提出了一种双向承载设计(BPD),子分组为l = r,其中r = n−k等于一个[n,k]线性码的冗余。与大多数现有的负载设计不同,BPD中没有系统节点和奇偶校验节点的区别,并且负载是双向添加的。因此,当r≥3时,在相同的亚分组水平下,BPD的平均修复带宽比以前的承载设计要低。但是,BPD需要更大的字段来维护MDS属性。我们分别证明了显式BPD和存在结构的域大小的两个上界。通过计算机搜索,我们的BPD可以在一个比证明的上界小得多的域上给出。作为一个例子,我们为F28上的[14]、[10]Reed-Solomon (RS)代码提供了BPD,与普通修复方法相比,平均修复带宽节省了大约50%。这是迄今为止对子分组1≤4的[14]、[10]256 RS码实现的最低修复带宽。
{"title":"Bidirectional Piggybacking Design for All Nodes with Sub-Packetization l = r","authors":"Ke Wang, Zhifang Zhang","doi":"10.1109/ITW55543.2023.10161644","DOIUrl":"https://doi.org/10.1109/ITW55543.2023.10161644","url":null,"abstract":"Piggybacking design has been applied extensively in distributed storage systems in recent years, since it can reduce repair bandwidth significantly with small sub-packetization. In this work, we propose a bidirectional piggybacking design (BPD) with sub-packetization l = r, where r = n − k equals the redundancy of an [n,k] linear code. Unlike most existing piggybacking designs, there is no distinction between systematic nodes and parity nodes in BPD and the piggybacks are added bidirectionally. Consequently, BPD leads to lower average repair bandwidth than previous piggybacking designs at equal subpacketization level when r ≥ 3. However, BPD needs larger fields to maintain the MDS property. We prove two upper bounds on the field size for explicit BPD and existential constructions respectively. By computer search, our BPD can be given over a field much smaller than the proved upper bounds. As an example, we provide the BPD for the [14], [10] Reed-Solomon (RS) code over F28 and obtain approximately 50% savings in the average repair bandwidth compared with the trivial repair approach. This is the lowest repair bandwidth achieved so far for [14], [10]256 RS codes with sub-packetization l ≤ 4.","PeriodicalId":439800,"journal":{"name":"2023 IEEE Information Theory Workshop (ITW)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128635467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improved Alpha-Information Bounds for Higher-Order Masked Cryptographic Implementations 高阶掩码加密实现的改进alpha -信息边界
Pub Date : 2023-04-23 DOI: 10.1109/ITW55543.2023.10161608
Yi Liu, Julien Béguinot, Wei Cheng, S. Guilley, Loïc Masure, O. Rioul, François-Xavier Standaert
Embedded cryptographic devices are usually protected against side-channel attacks by masking strategies. In this paper, the security of protected cryptographic implementations is evaluated for any masking order, using alpha-information measures. Universal upper bounds on the probability of success of any type of side-channel attack are derived. These also provide lower bounds on the minimum number of queries required to achieve a given success rate. An important issue, solved in this paper, is to remove the loss factor due to the masking field size.
嵌入式加密设备通常通过屏蔽策略来防止侧信道攻击。在本文中,使用alpha-information度量对任何掩蔽顺序的受保护加密实现的安全性进行了评估。导出了任何类型的侧信道攻击成功概率的通用上界。这些还提供了实现给定成功率所需的最小查询数的下限。本文解决的一个重要问题是消除由于掩蔽场大小造成的损失因子。
{"title":"Improved Alpha-Information Bounds for Higher-Order Masked Cryptographic Implementations","authors":"Yi Liu, Julien Béguinot, Wei Cheng, S. Guilley, Loïc Masure, O. Rioul, François-Xavier Standaert","doi":"10.1109/ITW55543.2023.10161608","DOIUrl":"https://doi.org/10.1109/ITW55543.2023.10161608","url":null,"abstract":"Embedded cryptographic devices are usually protected against side-channel attacks by masking strategies. In this paper, the security of protected cryptographic implementations is evaluated for any masking order, using alpha-information measures. Universal upper bounds on the probability of success of any type of side-channel attack are derived. These also provide lower bounds on the minimum number of queries required to achieve a given success rate. An important issue, solved in this paper, is to remove the loss factor due to the masking field size.","PeriodicalId":439800,"journal":{"name":"2023 IEEE Information Theory Workshop (ITW)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127478953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Generalization of the Equal Coding Theorem 等价编码定理的一个推广
Pub Date : 2023-04-23 DOI: 10.1109/ITW55543.2023.10161633
Hui-An Shen, S. M. Moser, J. Pfister
We reformulate the Equal Coding Theorem in sensory neural encoding with ON- and OFF-neurons as a channel capacity problem. We then present a capacity-based proof of the Equal Coding Theorem, and generalize it to neurons with different firing probabilities. We also briefly discuss the biological implications of this generalization.
我们将打开和关闭神经元的感觉神经编码中的相等编码定理重新表述为信道容量问题。然后,我们提出了一个基于容量的等编码定理的证明,并将其推广到具有不同放电概率的神经元。我们还简要讨论了这种概括的生物学含义。
{"title":"A Generalization of the Equal Coding Theorem","authors":"Hui-An Shen, S. M. Moser, J. Pfister","doi":"10.1109/ITW55543.2023.10161633","DOIUrl":"https://doi.org/10.1109/ITW55543.2023.10161633","url":null,"abstract":"We reformulate the Equal Coding Theorem in sensory neural encoding with ON- and OFF-neurons as a channel capacity problem. We then present a capacity-based proof of the Equal Coding Theorem, and generalize it to neurons with different firing probabilities. We also briefly discuss the biological implications of this generalization.","PeriodicalId":439800,"journal":{"name":"2023 IEEE Information Theory Workshop (ITW)","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129134631","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Erasure Queue-Channel with Feedback: Optimal Transmission Control to Maximize Capacity 带反馈的擦除队列-信道:容量最大化的最优传输控制
Pub Date : 2023-04-23 DOI: 10.1109/ITW55543.2023.10161665
K. Varma, K. Jagannathan
A queue-channel is a model that captures waiting time-dependent degradation of information bits—a scenario motivated by quantum communications and delay-sensitive streaming. Recent work has characterised the capacity of the erasure queue-channel [1], and other noise models encountered in quantum communications. In this paper, we study an erasure queue-channel with feedback, and ask after the optimal transmission strategy to minimize waiting-induced erasures. Specifically, we assume that instantaneous feedback of queue-length (or of the queue-channel output) is available at the transmitter, which can modulate the rate of Poisson transmissions into the queue-channel. We pose an optimal control problem using HJB-style equations to maximize the information capacity, when the transmitter can choose from a bounded set of transmission rates. We show (under a numerically verifiable condition) that the optimal transmission policy is a single-threshold policy of the bang-bang type. In other words, transmitting at the maximum (minimum) possible rate when the queue is below (above) a threshold, maximizes the information capacity of the erasure queue-channel with feedback.
队列通道是一种模型,它捕获与等待时间相关的信息位退化——这是一种由量子通信和延迟敏感流驱动的场景。最近的工作描述了擦除队列信道的容量[1],以及量子通信中遇到的其他噪声模型。本文研究了一种带反馈的擦除队列信道,并探讨了最小化等待引起的擦除的最优传输策略。具体地说,我们假设在发送端可以获得队列长度(或队列信道输出)的瞬时反馈,这可以调制进入队列信道的泊松传输速率。当发射机可以从一组有界的传输速率中进行选择时,我们提出了一个利用hjb型方程使信息容量最大化的最优控制问题。我们证明(在数值可验证的条件下)最优传输策略是bang-bang型的单阈值策略。换句话说,当队列低于(高于)阈值时,以最大(最小)可能的速率传输,可以最大化带有反馈的擦除队列信道的信息容量。
{"title":"An Erasure Queue-Channel with Feedback: Optimal Transmission Control to Maximize Capacity","authors":"K. Varma, K. Jagannathan","doi":"10.1109/ITW55543.2023.10161665","DOIUrl":"https://doi.org/10.1109/ITW55543.2023.10161665","url":null,"abstract":"A queue-channel is a model that captures waiting time-dependent degradation of information bits—a scenario motivated by quantum communications and delay-sensitive streaming. Recent work has characterised the capacity of the erasure queue-channel [1], and other noise models encountered in quantum communications. In this paper, we study an erasure queue-channel with feedback, and ask after the optimal transmission strategy to minimize waiting-induced erasures. Specifically, we assume that instantaneous feedback of queue-length (or of the queue-channel output) is available at the transmitter, which can modulate the rate of Poisson transmissions into the queue-channel. We pose an optimal control problem using HJB-style equations to maximize the information capacity, when the transmitter can choose from a bounded set of transmission rates. We show (under a numerically verifiable condition) that the optimal transmission policy is a single-threshold policy of the bang-bang type. In other words, transmitting at the maximum (minimum) possible rate when the queue is below (above) a threshold, maximizes the information capacity of the erasure queue-channel with feedback.","PeriodicalId":439800,"journal":{"name":"2023 IEEE Information Theory Workshop (ITW)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124883964","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
New Construction of (k + r,k) Systematic MDS Array Codes with r ≤ 4 r≤4的(k + r,k)系统MDS阵列码的新构造
Pub Date : 2023-04-23 DOI: 10.1109/ITW55543.2023.10161610
Zhe Zhai, Q. T. Sun, Sheng Jin, Shaoteng Liu, Xiangyu Chen
Given a prime L, we present a new construction of (L−1)-dimensional (k+r,k) systematic array codes with r ≤ 4, and concretely characterize sufficient conditions on the selection of L to guarantee the codes’ MDS property. The largest possible k that can be supported by the new MDS array codes is 2L−4, nearly twice as large as that supported by classical MDS array codes such as EVENODD codes and RDP codes. Moreover, the number of XORs per original data bit required in encoding of the new codes asymptotically approaches r with increasing k and L, same as EVENODD codes and RDP codes. In addition, for the case r = 4, the explicit conditions on L we obtain to guarantee the new codes’ MDS property can also be used to guarantee the MDS property of EVENODD codes and RDP codes, but are more general than the well known ones in the literature.
在给定素数L的情况下,提出了一种新的(L−1)维(k+r,k)系统阵列码的构造,且r≤4,并具体刻画了保证码的MDS特性的L的选择的充分条件。新MDS阵列码支持的最大k值为2L−4,几乎是EVENODD、RDP等传统MDS阵列码支持k值的2倍。此外,与EVENODD码和RDP码一样,编码新码时每个原始数据位所需的xor数随着k和L的增加而渐近于r。此外,对于r = 4的情况,我们得到的保证新码的MDS性质的显式条件L也可用于保证EVENODD码和RDP码的MDS性质,但比文献中已知的条件更为一般。
{"title":"New Construction of (k + r,k) Systematic MDS Array Codes with r ≤ 4","authors":"Zhe Zhai, Q. T. Sun, Sheng Jin, Shaoteng Liu, Xiangyu Chen","doi":"10.1109/ITW55543.2023.10161610","DOIUrl":"https://doi.org/10.1109/ITW55543.2023.10161610","url":null,"abstract":"Given a prime L, we present a new construction of (L−1)-dimensional (k+r,k) systematic array codes with r ≤ 4, and concretely characterize sufficient conditions on the selection of L to guarantee the codes’ MDS property. The largest possible k that can be supported by the new MDS array codes is 2L−4, nearly twice as large as that supported by classical MDS array codes such as EVENODD codes and RDP codes. Moreover, the number of XORs per original data bit required in encoding of the new codes asymptotically approaches r with increasing k and L, same as EVENODD codes and RDP codes. In addition, for the case r = 4, the explicit conditions on L we obtain to guarantee the new codes’ MDS property can also be used to guarantee the MDS property of EVENODD codes and RDP codes, but are more general than the well known ones in the literature.","PeriodicalId":439800,"journal":{"name":"2023 IEEE Information Theory Workshop (ITW)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133232958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2023 IEEE Information Theory Workshop (ITW)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1