首页 > 最新文献

Foundations and Trends in Communications and Information Theory最新文献

英文 中文
Redundancy of Lossless Data Compression for Known Sources by Analytic Methods 基于解析方法的已知源无损数据压缩冗余
IF 2.4 Q3 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2017-05-23 DOI: 10.1561/0100000090
M. Drmota, W. Szpankowski
The term analytic information theory has been coined to describe problems of information theory studied by analytic tools. The approach of applying tools from analysis of algorithms to problems of source coding and, in general, to information theory lies at the crossroad of computer science and information theory. Combining the tools from both areas often provides powerful results, such as computer scientist Abraham Lempel and information theorist Jacob Ziv working together in the late 1970s to develop compression algorithms that are now widely referred to as Lempel-Ziv algorithms and are the basis of the ZIP compression still used extensively in computing today. This monograph surveys the use of these techniques for the rigorous analysis of code redundancy for known sources in lossless data compression. A separate chapter is devoted to precise analyses of each of three types of lossless data compression schemes, namely fixed-to-variable length codes, variable-to-fixed length codes, and variable-to-variable length codes. Each one of these schemes is described in detail, building upon work done in the latter part of the 20th century to present new and powerful techniques. For the first time, this survey presents redundancy for universal variable-to-fixed and variable-to-variable length codes in a comprehensive and coherent manner. The monograph will be of interest to computer scientists and information theorists working on modern coding techniques. Written by two leading experts, it provides the reader with a unique, succinct starting point for their own research into the area.
分析信息论这个术语是用来描述用分析工具研究的信息论问题的。将算法分析中的工具应用于源编码问题的方法,以及通常应用于信息论的方法,处于计算机科学和信息论的十字路口。将这两个领域的工具结合起来通常会产生强大的结果,例如计算机科学家Abraham Lempel和信息理论家Jacob Ziv在20世纪70年代末合作开发了压缩算法,现在被广泛称为Lempel-Ziv算法,并且是ZIP压缩的基础,至今仍在计算中广泛使用。本专著调查了这些技术在无损数据压缩中对已知源的代码冗余进行严格分析的使用。单独的一章专门用于精确分析三种类型的无损数据压缩方案,即固定到可变长度编码,可变到固定长度编码和可变到可变长度编码。这些方案中的每一个都有详细的描述,建立在20世纪后期所做的工作的基础上,提出了新的和强大的技术。本研究首次以一种全面连贯的方式提出了通用可变到固定和可变到可变长度码的冗余。本专著将对从事现代编码技术的计算机科学家和信息理论家感兴趣。由两位领先的专家撰写,它为读者提供了一个独特的,简洁的起点,为他们自己的研究领域。
{"title":"Redundancy of Lossless Data Compression for Known Sources by Analytic Methods","authors":"M. Drmota, W. Szpankowski","doi":"10.1561/0100000090","DOIUrl":"https://doi.org/10.1561/0100000090","url":null,"abstract":"The term analytic information theory has been coined to describe problems of information theory studied by analytic tools. The approach of applying tools from analysis of algorithms to problems of source coding and, in general, to information theory lies at the crossroad of computer science and information theory. Combining the tools from both areas often provides powerful results, such as computer scientist Abraham Lempel and information theorist Jacob Ziv working together in the late 1970s to develop compression algorithms that are now widely referred to as Lempel-Ziv algorithms and are the basis of the ZIP compression still used extensively in computing today. This monograph surveys the use of these techniques for the rigorous analysis of code redundancy for known sources in lossless data compression. A separate chapter is devoted to precise analyses of each of three types of lossless data compression schemes, namely fixed-to-variable length codes, variable-to-fixed length codes, and variable-to-variable length codes. Each one of these schemes is described in detail, building upon work done in the latter part of the 20th century to present new and powerful techniques. For the first time, this survey presents redundancy for universal variable-to-fixed and variable-to-variable length codes in a comprehensive and coherent manner. The monograph will be of interest to computer scientists and information theorists working on modern coding techniques. Written by two leading experts, it provides the reader with a unique, succinct starting point for their own research into the area.","PeriodicalId":45236,"journal":{"name":"Foundations and Trends in Communications and Information Theory","volume":"1117 ","pages":"277-417"},"PeriodicalIF":2.4,"publicationDate":"2017-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1561/0100000090","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72433545","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Community Detection and Stochastic Block Models 社区检测与随机块模型
IF 2.4 Q3 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2017-03-29 DOI: 10.1561/0100000067
The stochastic block model (SBM) is a random graph model with planted clusters. It is widely employed as a canonical model to study clustering and community detection, and provides generally a fertile ground to study the statistical and computational tradeoffs that arise in network and data sciences. This note surveys the recent developments that establish the fundamental limits for community detection in the SBM, both with respect to information-theoretic and computational thresholds, and for various recovery requirements such as exact, partial and weak recovery (a.k.a., detection). The main results discussed are the phase transitions for exact recovery at the Chernoff-Hellinger threshold, the phase transition for weak recovery at the Kesten-Stigum threshold, the optimal distortion-SNR tradeoff for partial recovery, the learning of the SBM parameters and the gap between information-theoretic and computational thresholds. The note also covers some of the algorithms developed in the quest of achieving the limits, in particular two-round algorithms via graph-splitting, semi-definite programming, linearized belief propagation, classical and nonbacktracking spectral methods. A few open problems are also discussed.
随机块模型(SBM)是一种带有植簇的随机图模型。它被广泛用作研究聚类和社区检测的规范模型,并且通常为研究网络和数据科学中出现的统计和计算权衡提供了肥沃的土壤。本文调查了最近的发展,这些发展确立了SBM中社区检测的基本限制,包括信息论和计算阈值,以及各种恢复要求,如精确、部分和弱恢复(又称检测)。讨论的主要结果是切诺夫-海林格阈值下精确恢复的相变,凯斯顿-斯蒂格姆阈值下弱恢复的相变,部分恢复的最优失真-信噪比权衡,SBM参数的学习以及信息理论和计算阈值之间的差距。本文还介绍了为实现极限而开发的一些算法,特别是通过图分割、半确定规划、线性化信念传播、经典和非回溯谱方法的两轮算法。本文还讨论了几个有待解决的问题。
{"title":"Community Detection and Stochastic Block Models","authors":"","doi":"10.1561/0100000067","DOIUrl":"https://doi.org/10.1561/0100000067","url":null,"abstract":"The stochastic block model (SBM) is a random graph model with planted clusters. It is widely employed as a canonical model to study clustering and community detection, and provides generally a fertile ground to study the statistical and computational tradeoffs that arise in network and data sciences. \u0000 \u0000This note surveys the recent developments that establish the fundamental limits for community detection in the SBM, both with respect to information-theoretic and computational thresholds, and for various recovery requirements such as exact, partial and weak recovery (a.k.a., detection). The main results discussed are the phase transitions for exact recovery at the Chernoff-Hellinger threshold, the phase transition for weak recovery at the Kesten-Stigum threshold, the optimal distortion-SNR tradeoff for partial recovery, the learning of the SBM parameters and the gap between information-theoretic and computational thresholds. \u0000 \u0000The note also covers some of the algorithms developed in the quest of achieving the limits, in particular two-round algorithms via graph-splitting, semi-definite programming, linearized belief propagation, classical and nonbacktracking spectral methods. A few open problems are also discussed.","PeriodicalId":45236,"journal":{"name":"Foundations and Trends in Communications and Information Theory","volume":"80 1","pages":"1-162"},"PeriodicalIF":2.4,"publicationDate":"2017-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77940869","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1005
Multiterminal Secrecy by Public Discussion 公众讨论的多终端保密
IF 2.4 Q3 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2016-08-25 DOI: 10.1561/0100000072
P. Narayan, Himanshu Tyagi
This monograph describes principles of information theoretic secrecygeneration by legitimate parties with public discussion in the presenceof an eavesdropper. The parties are guaranteed secrecy in the form ofindependence from the eavesdropper's observation of the communication.Part I develops basic technical tools for secrecy generation, many ofwhich are potentially of independent interest beyond secrecy settings.Various information theoretic and cryptographic notions of secrecy arecompared. Emphasis is placed on central themes of interactive communicationand common randomness as well as on core methods ofbalanced coloring and leftover hash for extracting secret uniform randomness.Achievability and converse results are shown to emerge from"single shot" incarnations that serve to explain essential structure.Part II applies the methods of Part I to secrecy generation in twosettings: a multiterminal source model and a multiterminal channelmodel, in both of which the legitimate parties are afforded privilegedaccess to correlated observations of which the eavesdropper has onlypartial knowledge. Characterizations of secret key capacity bring outinherent connections to the data compression concept of omniscienceand, for a specialized source model, to a combinatorial problem of maximalspanning tree packing in a multigraph. Interactive common informationis seen to govern the minimum rate of communication needed toachieve secret key capacity in the two-terminal source model. Furthermore,necessary and sufficient conditions are analyzed for the securecomputation of a given function in the multiterminal source model.Based largely on known recent results, this self-contained monographalso includes new formulations with associated new proofs. Supplementingeach chapter in Part II are descriptions of several openproblems.
本专著描述了在窃听者在场的情况下,合法各方公开讨论的信息理论秘密生成原则。双方以不受窃听者对通信的观察的独立性的形式保证保密。第一部分开发了用于生成保密的基本技术工具,其中许多工具在保密设置之外具有潜在的独立利益。比较了各种信息论和密码学的保密概念。重点讨论了交互通信和共同随机性的中心主题,以及用于提取秘密均匀随机性的平衡着色和剩余哈希的核心方法。可实现性和相反的结果出现在解释基本结构的“单枪”化身中。第二部分将第一部分的方法应用于两种情况下的保密生成:多终端源模型和多终端信道模型,在这两种情况下,合法各方都被赋予特权访问相关的观察结果,而窃听者只有部分知识。密钥容量的特征与全知的数据压缩概念有内在的联系,对于一个特殊的源模型,与多图中最大生成树包装的组合问题有内在的联系。在双端源模型中,交互式公共信息被视为控制实现密钥容量所需的最小通信速率。进一步分析了多端源模型中给定函数安全计算的充分必要条件。在很大程度上基于最近已知的结果,这个自成一体的专著还包括新的公式与相关的新证明。第二部分的每一章都是对几个开放问题的描述。
{"title":"Multiterminal Secrecy by Public Discussion","authors":"P. Narayan, Himanshu Tyagi","doi":"10.1561/0100000072","DOIUrl":"https://doi.org/10.1561/0100000072","url":null,"abstract":"This monograph describes principles of information theoretic secrecygeneration by legitimate parties with public discussion in the presenceof an eavesdropper. The parties are guaranteed secrecy in the form ofindependence from the eavesdropper's observation of the communication.Part I develops basic technical tools for secrecy generation, many ofwhich are potentially of independent interest beyond secrecy settings.Various information theoretic and cryptographic notions of secrecy arecompared. Emphasis is placed on central themes of interactive communicationand common randomness as well as on core methods ofbalanced coloring and leftover hash for extracting secret uniform randomness.Achievability and converse results are shown to emerge from\"single shot\" incarnations that serve to explain essential structure.Part II applies the methods of Part I to secrecy generation in twosettings: a multiterminal source model and a multiterminal channelmodel, in both of which the legitimate parties are afforded privilegedaccess to correlated observations of which the eavesdropper has onlypartial knowledge. Characterizations of secret key capacity bring outinherent connections to the data compression concept of omniscienceand, for a specialized source model, to a combinatorial problem of maximalspanning tree packing in a multigraph. Interactive common informationis seen to govern the minimum rate of communication needed toachieve secret key capacity in the two-terminal source model. Furthermore,necessary and sufficient conditions are analyzed for the securecomputation of a given function in the multiterminal source model.Based largely on known recent results, this self-contained monographalso includes new formulations with associated new proofs. Supplementingeach chapter in Part II are descriptions of several openproblems.","PeriodicalId":45236,"journal":{"name":"Foundations and Trends in Communications and Information Theory","volume":"90 1","pages":"129-275"},"PeriodicalIF":2.4,"publicationDate":"2016-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80346102","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
Channel Coding Methods for Non-Volatile Memories 非易失性存储器的信道编码方法
IF 2.4 Q3 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2016-01-13 DOI: 10.1561/0100000084
L. Dolecek, Frederic Sala
Non-volatile memories NVMs have emerged as the primary replacement of hard-disk drives for a variety of storage applications, including personal electronics, mobile computing, intelligent vehicles, enterprise storage, data warehousing, and data-intensive computing systems. Channel coding schemes are a necessary tool for ensuring target reliability and performance of NVMs. However, due to operational asymmetries in NVMs, conventional coding approaches - commonly based on designing for the Hamming metric - no longer apply. Given the immediate need for practical solutions and the shortfalls of existing methods, the fast-growing discipline of coding for NVMs has resulted in several key innovations that not only answer the needs of modern storage systems but also directly contribute to the analytical toolbox of coding theory at large. This monograph discusses recent advances in coding for NVMs, covering topics such as error correction coding based on novel algebraic and graph-based methods, rank modulation, rewriting codes, and constrained coding. Our goal for this work is multifold: to illuminate the advantages - as well as challenges - associated with modern NVMs, to present a succinct overview of several exciting recent developments in coding for memories, and, by presenting numerous potential research directions, to inspire other researchers to contribute to this timely and thriving discipline.
非易失性存储器nvm已经成为硬盘驱动器的主要替代品,用于各种存储应用,包括个人电子产品、移动计算、智能汽车、企业存储、数据仓库和数据密集型计算系统。信道编码方案是保证虚拟机目标可靠性和性能的必要工具。然而,由于nvm中的操作不对称,传统的编码方法——通常基于汉明度量的设计——不再适用。考虑到对实际解决方案的迫切需求和现有方法的不足,快速发展的nvm编码学科已经产生了几个关键的创新,这些创新不仅满足了现代存储系统的需求,而且还直接为编码理论的分析工具箱做出了贡献。本专著讨论了nvm编码的最新进展,涵盖了诸如基于新颖代数和基于图的方法的纠错编码、秩调制、重写编码和约束编码等主题。我们这项工作的目标是多方面的:阐明与现代NVMs相关的优势和挑战,简要概述记忆编码的几个令人兴奋的最新发展,并通过提出许多潜在的研究方向,激励其他研究人员为这一及时而蓬勃发展的学科做出贡献。
{"title":"Channel Coding Methods for Non-Volatile Memories","authors":"L. Dolecek, Frederic Sala","doi":"10.1561/0100000084","DOIUrl":"https://doi.org/10.1561/0100000084","url":null,"abstract":"Non-volatile memories NVMs have emerged as the primary replacement of hard-disk drives for a variety of storage applications, including personal electronics, mobile computing, intelligent vehicles, enterprise storage, data warehousing, and data-intensive computing systems. Channel coding schemes are a necessary tool for ensuring target reliability and performance of NVMs. However, due to operational asymmetries in NVMs, conventional coding approaches - commonly based on designing for the Hamming metric - no longer apply. Given the immediate need for practical solutions and the shortfalls of existing methods, the fast-growing discipline of coding for NVMs has resulted in several key innovations that not only answer the needs of modern storage systems but also directly contribute to the analytical toolbox of coding theory at large. This monograph discusses recent advances in coding for NVMs, covering topics such as error correction coding based on novel algebraic and graph-based methods, rank modulation, rewriting codes, and constrained coding. Our goal for this work is multifold: to illuminate the advantages - as well as challenges - associated with modern NVMs, to present a succinct overview of several exciting recent developments in coding for memories, and, by presenting numerous potential research directions, to inspire other researchers to contribute to this timely and thriving discipline.","PeriodicalId":45236,"journal":{"name":"Foundations and Trends in Communications and Information Theory","volume":"11 1","pages":"1-128"},"PeriodicalIF":2.4,"publicationDate":"2016-01-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74916956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Multi-way Communications: An Information Theoretic Perspective 多向通信:信息论视角
IF 2.4 Q3 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2015-09-30 DOI: 10.1561/0100000081
A. Chaaban, A. Sezgin
Multi-way communication is a means to significantly improve the spectralefficiency of wireless networks. For instance, in a bi-directional ortwo-way communication channel, two users can simultaneously usethe transmission medium to exchange information, thus achieving upto twice the rate that would be achieved had each user transmittedseparately. Multi-way communications provides an overview on the developmentsin this research area since it has been initiated by Shannon.The basic two-way communication channel is considered first, followedby the two-way relay channel obtained by the deployment of an additionalcooperative relay node to improve the overall communicationperformance. This basic setup is then extended to multi-user systems.For all these setups, fundamental limits on the achievable rates are reviewed,thereby making use of a linear high-SNR deterministic channelmodel to provide valuable insights which are helpful when discussingthe coding schemes for Gaussian channel models in detail. Several toolsand communication strategies are used in the process, including butnot limited to computation, signal-space alignment, and nested-latticecodes. Finally, extensions of multi-way communication channels to multipleantenna settings are discussed.
多路通信是显著提高无线网络频谱利用率的一种手段。例如,在双向或双向通信信道中,两个用户可以同时使用传输介质交换信息,从而达到每个用户单独传输所能达到的速率的两倍。本文概述了多路通信自香农提出以来在这一研究领域的发展。首先考虑基本双向通信信道,然后通过部署额外的协同中继节点来获得双向中继信道,以提高整体通信性能。然后将这个基本设置扩展到多用户系统。对于所有这些设置,对可实现速率的基本限制进行了审查,从而利用线性高信噪比确定性信道模型来提供有价值的见解,这些见解有助于详细讨论高斯信道模型的编码方案。在此过程中使用了几种工具和通信策略,包括但不限于计算、信号空间对齐和嵌套格码。最后,讨论了多路通信信道对多天线设置的扩展。
{"title":"Multi-way Communications: An Information Theoretic Perspective","authors":"A. Chaaban, A. Sezgin","doi":"10.1561/0100000081","DOIUrl":"https://doi.org/10.1561/0100000081","url":null,"abstract":"Multi-way communication is a means to significantly improve the spectralefficiency of wireless networks. For instance, in a bi-directional ortwo-way communication channel, two users can simultaneously usethe transmission medium to exchange information, thus achieving upto twice the rate that would be achieved had each user transmittedseparately. Multi-way communications provides an overview on the developmentsin this research area since it has been initiated by Shannon.The basic two-way communication channel is considered first, followedby the two-way relay channel obtained by the deployment of an additionalcooperative relay node to improve the overall communicationperformance. This basic setup is then extended to multi-user systems.For all these setups, fundamental limits on the achievable rates are reviewed,thereby making use of a linear high-SNR deterministic channelmodel to provide valuable insights which are helpful when discussingthe coding schemes for Gaussian channel models in detail. Several toolsand communication strategies are used in the process, including butnot limited to computation, signal-space alignment, and nested-latticecodes. Finally, extensions of multi-way communication channels to multipleantenna settings are discussed.","PeriodicalId":45236,"journal":{"name":"Foundations and Trends in Communications and Information Theory","volume":"48 1","pages":"185-371"},"PeriodicalIF":2.4,"publicationDate":"2015-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80926387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 49
An Approximation Approach to Network Information Theory 网络信息理论的近似方法
IF 2.4 Q3 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2015-08-28 DOI: 10.1561/0100000042
A. Avestimehr, S. Diggavi, C. Tian, David Tse
This monograph illustrates a novel approach, which is based on changing the focus to seek approximate solutions accompanied by universal guarantees on the gap to optimality, in order to enable progress on several key open problems in network information theory. We seek universal guarantees that are independent of problem parameters, but perhaps dependent on the problem structure. At the heart of this approach is the development of simple, deterministic models that capture the main features of information sources and communication channels, and are utilized to approximate more complex models. The program advocated in this monograph is to use first seek solutions for the simplified deterministic model and use the insights and the solution of the simplified model to connect it to the original problem. The goal of this deterministic-approximation approach is to obtain universal approximate characterizations of the original channel capacity region and source coding rate regions. The translation of the insights from the deterministic framework to the original problem might need non-trivial steps either in the coding scheme or in the outer bounds. The applications of this deterministic approximation approach are demonstrated in four central problems, namely unicast/multicast relay networks, interference channels, multiple descriptions source coding, and joint source-channel coding over networks. For each of these problems, it is illustrated how the proposed approach can be utilized to approximate the solution and draw engineering insights. Throughout the monograph, many extensions and future directions are addressed, and several open problems are presented in each chapter. The monograph is concluded by illustrating other deterministic models that can be utilized to obtain tighter approximation results, and discussing some recent developments on utilization of deterministic models in multi-flow multi-hop wireless networks.
本专著阐述了一种新颖的方法,该方法基于改变焦点以寻求近似解并伴有对最优性差距的普遍保证,以便在网络信息理论的几个关键开放问题上取得进展。我们寻求独立于问题参数,但可能依赖于问题结构的普遍保证。该方法的核心是开发简单的确定性模型,这些模型捕获信息源和通信通道的主要特征,并用于近似更复杂的模型。本专著所提倡的方案是先对简化的确定性模型寻求解,然后利用简化模型的洞见和解将其与原问题联系起来。这种确定性逼近方法的目标是获得原始信道容量区域和源编码速率区域的通用近似特征。将见解从确定性框架转换为原始问题可能需要在编码方案或外部边界中采取重要步骤。这种确定性逼近方法在四个核心问题中得到了应用,即单播/多播中继网络、干扰信道、多描述源编码和网络上的联合源信道编码。对于这些问题中的每一个,它都说明了如何利用所提出的方法来近似解决方案并绘制工程见解。在整个专著中,讨论了许多扩展和未来的方向,并在每章中提出了几个开放的问题。本专著最后举例说明了其他可用于获得更严格近似结果的确定性模型,并讨论了在多流多跳无线网络中使用确定性模型的一些最新进展。
{"title":"An Approximation Approach to Network Information Theory","authors":"A. Avestimehr, S. Diggavi, C. Tian, David Tse","doi":"10.1561/0100000042","DOIUrl":"https://doi.org/10.1561/0100000042","url":null,"abstract":"This monograph illustrates a novel approach, which is based on changing the focus to seek approximate solutions accompanied by universal guarantees on the gap to optimality, in order to enable progress on several key open problems in network information theory. We seek universal guarantees that are independent of problem parameters, but perhaps dependent on the problem structure. At the heart of this approach is the development of simple, deterministic models that capture the main features of information sources and communication channels, and are utilized to approximate more complex models. The program advocated in this monograph is to use first seek solutions for the simplified deterministic model and use the insights and the solution of the simplified model to connect it to the original problem. The goal of this deterministic-approximation approach is to obtain universal approximate characterizations of the original channel capacity region and source coding rate regions. The translation of the insights from the deterministic framework to the original problem might need non-trivial steps either in the coding scheme or in the outer bounds. The applications of this deterministic approximation approach are demonstrated in four central problems, namely unicast/multicast relay networks, interference channels, multiple descriptions source coding, and joint source-channel coding over networks. For each of these problems, it is illustrated how the proposed approach can be utilized to approximate the solution and draw engineering insights. Throughout the monograph, many extensions and future directions are addressed, and several open problems are presented in each chapter. The monograph is concluded by illustrating other deterministic models that can be utilized to obtain tighter approximation results, and discussing some recent developments on utilization of deterministic models in multi-flow multi-hop wireless networks.","PeriodicalId":45236,"journal":{"name":"Foundations and Trends in Communications and Information Theory","volume":"35 1","pages":"1-183"},"PeriodicalIF":2.4,"publicationDate":"2015-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90040903","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Energy Efficiency in Wireless Networks via Fractional Programming Theory 基于分式规划理论的无线网络能源效率研究
IF 2.4 Q3 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2015-06-05 DOI: 10.1561/0100000088
A. Zappone, Eduard Axel Jorswieck
This monograph presents a unified framework for energy efficiency maximization in wireless networks via fractional programming theory. The definition of energy efficiency is introduced, with reference to single-user and multi-user wireless networks, and it is observed how the problem of resource allocation for energy efficiency optimization is naturally cast as a fractional program. An extensive review of the state-of-the-art in energy efficiency optimization by fractional programming is provided, with reference to centralized and distributed resource allocation schemes. A solid background on fractional programming theory is provided. The key-notion of generalized concavity is presented and its strong connection with fractional functions described. A taxonomy of fractional problems is introduced, and for each class of fractional problem, general solution algorithms are described, discussing their complexity and convergence properties. The described theoretical and algorithmic framework is applied to solve energy efficiency maximization problems in practical wireless networks. A general system and signal model is developed which encompasses many relevant special cases, such as one-hop and two-hop heterogeneous networks, multi-cell networks, small-cell networks, device-to-device systems, cognitive radio systems, and hardware-impaired networks, wherein multiple-antennas and multiple subcarriers are possibly employed. Energy-efficient resource allocation algorithms are developed, considering both centralized, cooperative schemes, as well as distributed approaches for self-organizing networks. Finally, some remarks on future lines of research are given, stating some open problems that remain to be studied. It is shown how the described framework is general enough to be extended in these directions, proving useful in tackling future challenges that may arise in the design of energy-efficient future wireless networks.
本专著通过分数规划理论提出了无线网络能源效率最大化的统一框架。结合单用户和多用户无线网络,介绍了能源效率的定义,并观察到能源效率优化的资源分配问题是如何自然地转化为一个分数程序的。通过分数规划对能源效率优化的最新技术进行了广泛的回顾,并参考了集中和分布式的资源分配方案。提供了分数规划理论的坚实背景。给出了广义凹性的关键概念,并描述了它与分数函数的强联系。介绍了分数阶问题的分类,并对每一类分数阶问题的一般解算法进行了描述,讨论了它们的复杂度和收敛性。所描述的理论和算法框架被应用于解决实际无线网络中的能效最大化问题。开发了一种通用系统和信号模型,该模型包含许多相关的特殊情况,例如一跳和两跳异构网络、多小区网络、小小区网络、设备对设备系统、认知无线电系统和硬件受损网络,其中可能采用多天线和多子载波。考虑到自组织网络的集中式、协作式和分布式方法,开发了节能的资源分配算法。最后,对未来的研究方向作了一些评论,指出了一些有待研究的开放性问题。它显示了所描述的框架如何足够通用,可以在这些方向上扩展,证明在解决未来节能无线网络设计中可能出现的挑战方面是有用的。
{"title":"Energy Efficiency in Wireless Networks via Fractional Programming Theory","authors":"A. Zappone, Eduard Axel Jorswieck","doi":"10.1561/0100000088","DOIUrl":"https://doi.org/10.1561/0100000088","url":null,"abstract":"This monograph presents a unified framework for energy efficiency maximization in wireless networks via fractional programming theory. The definition of energy efficiency is introduced, with reference to single-user and multi-user wireless networks, and it is observed how the problem of resource allocation for energy efficiency optimization is naturally cast as a fractional program. An extensive review of the state-of-the-art in energy efficiency optimization by fractional programming is provided, with reference to centralized and distributed resource allocation schemes. A solid background on fractional programming theory is provided. The key-notion of generalized concavity is presented and its strong connection with fractional functions described. A taxonomy of fractional problems is introduced, and for each class of fractional problem, general solution algorithms are described, discussing their complexity and convergence properties. The described theoretical and algorithmic framework is applied to solve energy efficiency maximization problems in practical wireless networks. A general system and signal model is developed which encompasses many relevant special cases, such as one-hop and two-hop heterogeneous networks, multi-cell networks, small-cell networks, device-to-device systems, cognitive radio systems, and hardware-impaired networks, wherein multiple-antennas and multiple subcarriers are possibly employed. Energy-efficient resource allocation algorithms are developed, considering both centralized, cooperative schemes, as well as distributed approaches for self-organizing networks. Finally, some remarks on future lines of research are given, stating some open problems that remain to be studied. It is shown how the described framework is general enough to be extended in these directions, proving useful in tackling future challenges that may arise in the design of energy-efficient future wireless networks.","PeriodicalId":45236,"journal":{"name":"Foundations and Trends in Communications and Information Theory","volume":"108 1","pages":"185-396"},"PeriodicalIF":2.4,"publicationDate":"2015-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86709771","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 508
Asymptotic Estimates in Information Theory with Non-Vanishing Error Probabilities 误差概率不消失的信息论渐近估计
IF 2.4 Q3 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2014-09-04 DOI: 10.1561/0100000086
V. Tan
This monograph presents a unified treatment of single- and multi-user problems in Shannon's information theory where we depart from the requirement that the error probability decays asymptotically in the blocklength. Instead, the error probabilities for various problems are bounded above by a non-vanishing constant and the spotlight is shone on achievable coding rates as functions of the growing blocklengths. This represents the study of asymptotic estimates with non-vanishing error probabilities.In Part I, after reviewing the fundamentals of information theory, we discuss Strassen's seminal result for binary hypothesis testing where the type-I error probability is non-vanishing and the rate of decay of the type-II error probability with growing number of independent observations is characterized. In Part II, we use this basic hypothesis testing result to develop second- and sometimes, even third-order asymptotic expansions for point-to-point communication. Finally in Part III, we consider network information theory problems for which the second order asymptotics are known. These problems include some classes of channels with random state, the multiple-encoder distributed lossless source coding (Slepian-Wolf) problem and special cases of the Gaussian interference and multiple-access channels. Finally, we discuss avenues for further research.
本文提出了香农信息论中单用户和多用户问题的统一处理方法,摒弃了错误概率随区块长度渐近衰减的要求。取而代之的是,各种问题的错误概率被一个不消失的常数所限制,并将焦点放在可实现的编码率上,作为块长度增长的函数。这代表了对误差概率不消失的渐近估计的研究。在第一部分中,在回顾了信息论的基本原理之后,我们讨论了Strassen关于二元假设检验的开创性结果,其中I型错误概率不消失,并且ii型错误概率随独立观测数量的增加而衰减的速率被表征。在第二部分中,我们使用这个基本假设检验结果来开发点对点通信的二阶,有时甚至是三阶渐近展开式。最后,在第三部分,我们考虑二阶渐近已知的网络信息论问题。这些问题包括几种具有随机状态的信道、多编码器分布式无损源编码(slepin - wolf)问题以及高斯干扰和多址信道的特殊情况。最后,讨论了进一步研究的方向。
{"title":"Asymptotic Estimates in Information Theory with Non-Vanishing Error Probabilities","authors":"V. Tan","doi":"10.1561/0100000086","DOIUrl":"https://doi.org/10.1561/0100000086","url":null,"abstract":"This monograph presents a unified treatment of single- and multi-user problems in Shannon's information theory where we depart from the requirement that the error probability decays asymptotically in the blocklength. Instead, the error probabilities for various problems are bounded above by a non-vanishing constant and the spotlight is shone on achievable coding rates as functions of the growing blocklengths. This represents the study of asymptotic estimates with non-vanishing error probabilities.In Part I, after reviewing the fundamentals of information theory, we discuss Strassen's seminal result for binary hypothesis testing where the type-I error probability is non-vanishing and the rate of decay of the type-II error probability with growing number of independent observations is characterized. In Part II, we use this basic hypothesis testing result to develop second- and sometimes, even third-order asymptotic expansions for point-to-point communication. Finally in Part III, we consider network information theory problems for which the second order asymptotics are known. These problems include some classes of channels with random state, the multiple-encoder distributed lossless source coding (Slepian-Wolf) problem and special cases of the Gaussian interference and multiple-access channels. Finally, we discuss avenues for further research.","PeriodicalId":45236,"journal":{"name":"Foundations and Trends in Communications and Information Theory","volume":"171 2 1","pages":"1-184"},"PeriodicalIF":2.4,"publicationDate":"2014-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77634890","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 147
Rate Distortion Bounds for Voice and Video 语音和视频的速率失真界限
IF 2.4 Q3 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2014-02-28 DOI: 10.1561/0100000061
J. Gibson, Jing Hu
Numerous voice, still image, audio, and video compression standards have been developed over the last 25 years, and significant advances in the state of the art have been achieved. However, in the more than 50 years since Shannon's seminal 1959 paper, no rate distortion bounds for voice and video have been forthcoming. In this volume, we present the first rate distortion bounds for voice and video that actually lower bound the operational rate distortion performance of the best-performing voice and video codecs. The bounds indicate that improvements in rate distortion performance of approximately 50% over the best-performing voice and video codecs are possible. Research directions to improve the new bounds are discussed.
在过去的25年中,已经开发了许多语音,静止图像,音频和视频压缩标准,并且在艺术状态方面取得了重大进展。然而,自香农1959年发表开创性论文以来的50多年里,语音和视频的速率失真界限一直没有出现。在本卷中,我们提出了语音和视频的第一速率失真界限,它实际上降低了性能最好的语音和视频编解码器的操作速率失真性能。边界表明,与性能最好的语音和视频编解码器相比,速率失真性能的改善约为50%是可能的。讨论了改进新边界的研究方向。
{"title":"Rate Distortion Bounds for Voice and Video","authors":"J. Gibson, Jing Hu","doi":"10.1561/0100000061","DOIUrl":"https://doi.org/10.1561/0100000061","url":null,"abstract":"Numerous voice, still image, audio, and video compression standards have been developed over the last 25 years, and significant advances in the state of the art have been achieved. However, in the more than 50 years since Shannon's seminal 1959 paper, no rate distortion bounds for voice and video have been forthcoming. In this volume, we present the first rate distortion bounds for voice and video that actually lower bound the operational rate distortion performance of the best-performing voice and video codecs. The bounds indicate that improvements in rate distortion performance of approximately 50% over the best-performing voice and video codecs are possible. Research directions to improve the new bounds are discussed.","PeriodicalId":45236,"journal":{"name":"Foundations and Trends in Communications and Information Theory","volume":"111 1","pages":"379-514"},"PeriodicalIF":2.4,"publicationDate":"2014-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80602844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Coding Techniques for Repairability in Networked Distributed Storage Systems 网络分布式存储系统可修复性编码技术
IF 2.4 Q3 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2013-06-21 DOI: 10.1561/0100000068
F. Oggier, Anwitaman Datta
The most commonly deployed multi-storage device systems are RAID housed in a single computing unit. The idea of distributing data across multiple disks has been naturally extended to multiple storage nodes which are interconnected over a network and are called Networked Distributed Storage Systems (NDSS). The simplest coding techniques based on replication are often used to ensure redundancy in these systems, but given the sheer volume of data that needs to be stored and the overheads of replication, other coding techniques are being developed. Coding Techniques for Repairability in Networked Distributed Storage Systems (NDSS) surveys coding techniques for NDSS, which aim at achieving (1) fault tolerance efficiently and (2) good repairability characteristics to replenish the lost redundancy, and ensure data durability over time. This is a vibrant are of research and this book is the first overview which presents the background required to understand the problems as well as covering the most important techniques currently being developed. Coding Techniques for Repairability in Networked Distributed Storage Systems is essential reading for all researchers and engineers involved in designing and researching computer storage systems.
最常用的多存储设备系统是在单个计算单元中安装RAID。将数据分布在多个磁盘上的想法已经自然地扩展到多个存储节点,这些存储节点通过网络相互连接,称为网络分布式存储系统(NDSS)。基于复制的最简单的编码技术通常用于确保这些系统中的冗余,但考虑到需要存储的数据量和复制的开销,正在开发其他编码技术。网络分布式存储系统可修复性编码技术研究了网络分布式存储系统(NDSS)的编码技术,旨在实现(1)高效容错和(2)良好的可修复特性,以补充丢失的冗余,并保证数据的长期耐用性。这是一个充满活力的研究领域,这本书是第一个概述,它提供了理解问题所需的背景,并涵盖了目前正在开发的最重要的技术。网络分布式存储系统的可修复性编码技术是所有参与设计和研究计算机存储系统的研究人员和工程师的必读书籍。
{"title":"Coding Techniques for Repairability in Networked Distributed Storage Systems","authors":"F. Oggier, Anwitaman Datta","doi":"10.1561/0100000068","DOIUrl":"https://doi.org/10.1561/0100000068","url":null,"abstract":"The most commonly deployed multi-storage device systems are RAID housed in a single computing unit. The idea of distributing data across multiple disks has been naturally extended to multiple storage nodes which are interconnected over a network and are called Networked Distributed Storage Systems (NDSS). The simplest coding techniques based on replication are often used to ensure redundancy in these systems, but given the sheer volume of data that needs to be stored and the overheads of replication, other coding techniques are being developed. Coding Techniques for Repairability in Networked Distributed Storage Systems (NDSS) surveys coding techniques for NDSS, which aim at achieving (1) fault tolerance efficiently and (2) good repairability characteristics to replenish the lost redundancy, and ensure data durability over time. This is a vibrant are of research and this book is the first overview which presents the background required to understand the problems as well as covering the most important techniques currently being developed. Coding Techniques for Repairability in Networked Distributed Storage Systems is essential reading for all researchers and engineers involved in designing and researching computer storage systems.","PeriodicalId":45236,"journal":{"name":"Foundations and Trends in Communications and Information Theory","volume":"1 1","pages":"383-466"},"PeriodicalIF":2.4,"publicationDate":"2013-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82179047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 54
期刊
Foundations and Trends in Communications and Information Theory
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1