首页 > 最新文献

Foundations and Trends in Communications and Information Theory最新文献

英文 中文
Optimal Resource Allocation in Coordinated Multi-Cell Systems 协调多小区系统的最优资源分配
IF 2.4 Q3 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2013-01-31 DOI: 10.1561/0100000069
Emil Björnson, Eduard Axel Jorswieck
The use of multiple antennas at base stations is a key component in the design of cellular communication systems that can meet high-capacity demands in the downlink. Under ideal conditions, the gai ...
在基站中使用多天线是蜂窝通信系统设计的关键组成部分,可以满足下行链路的高容量需求。在理想条件下,gai…
{"title":"Optimal Resource Allocation in Coordinated Multi-Cell Systems","authors":"Emil Björnson, Eduard Axel Jorswieck","doi":"10.1561/0100000069","DOIUrl":"https://doi.org/10.1561/0100000069","url":null,"abstract":"The use of multiple antennas at base stations is a key component in the design of cellular communication systems that can meet high-capacity demands in the downlink. Under ideal conditions, the gai ...","PeriodicalId":45236,"journal":{"name":"Foundations and Trends in Communications and Information Theory","volume":"52 1","pages":"113-381"},"PeriodicalIF":2.4,"publicationDate":"2013-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90861850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 443
Gaussian Interference Channels: An Information Theoretic Point of View 高斯干涉信道:一个信息论的观点
IF 2.4 Q3 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2013-01-01 DOI: 10.1561/0100000071
Xiaohu Shang, Biao Chen
{"title":"Gaussian Interference Channels: An Information Theoretic Point of View","authors":"Xiaohu Shang, Biao Chen","doi":"10.1561/0100000071","DOIUrl":"https://doi.org/10.1561/0100000071","url":null,"abstract":"","PeriodicalId":45236,"journal":{"name":"Foundations and Trends in Communications and Information Theory","volume":"27 1","pages":"247-378"},"PeriodicalIF":2.4,"publicationDate":"2013-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83403106","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Concentration of Measure Inequalities in Information Theory, Communications, and Coding 信息论、通信和编码中度量不等式的集中
IF 2.4 Q3 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2012-12-19 DOI: 10.1561/0100000064
M. Raginsky, I. Sason
Concentration inequalities have been the subject of exciting developments during the last two decades, and have been intensively studied and used as a powerful tool in various areas. These include convex geometry, functional analysis, statistical physics, mathematical statistics, pure and applied probability theory, information theory, theoretical computer science, learning theory, and dynamical systems. Concentration of Measure Inequalities in Information Theory, Communications, and Coding focuses on some of the key modern mathematical tools that are used for the derivation of concentration inequalities, on their links to information theory, and on their various applications to communications and coding. In addition to being a survey, this monograph also includes various new recent results derived by the authors. This third edition of the bestselling book introduces the reader to the martingale method and the Efron-Stein-Steele inequalities in completely new sections. A new application of lossless source coding with side information is described in detail. Finally, the references have been updated and ones included that have been published since the original publication. Concentration of Measure Inequalities in Information Theory, Communications, and Coding is essential reading for all researchers and scientists in information theory and coding.
在过去的二十年中,集中度不平等一直是令人兴奋的发展主题,并已被广泛研究,并作为一个强大的工具在各个领域使用。这些学科包括凸几何、泛函分析、统计物理、数理统计、纯概率论和应用概率论、信息论、理论计算机科学、学习理论和动力系统。《信息论、通信和编码中的度量不等式集中》一书重点介绍了一些用于推导集中不等式的关键现代数学工具,以及它们与信息论的联系,以及它们在通信和编码中的各种应用。除了作为一项调查,这本专著还包括作者最近得出的各种新的结果。这本畅销书的第三版以全新的章节向读者介绍了鞅方法和Efron-Stein-Steele不等式。详细介绍了带侧信息的无损源编码的一种新应用。最后,已经更新了参考文献,并包括了自原始出版以来已发表的参考文献。信息理论、通信和编码中的测量不平等集中是所有信息理论和编码研究人员和科学家的必读书籍。
{"title":"Concentration of Measure Inequalities in Information Theory, Communications, and Coding","authors":"M. Raginsky, I. Sason","doi":"10.1561/0100000064","DOIUrl":"https://doi.org/10.1561/0100000064","url":null,"abstract":"Concentration inequalities have been the subject of exciting developments during the last two decades, and have been intensively studied and used as a powerful tool in various areas. These include convex geometry, functional analysis, statistical physics, mathematical statistics, pure and applied probability theory, information theory, theoretical computer science, learning theory, and dynamical systems. Concentration of Measure Inequalities in Information Theory, Communications, and Coding focuses on some of the key modern mathematical tools that are used for the derivation of concentration inequalities, on their links to information theory, and on their various applications to communications and coding. In addition to being a survey, this monograph also includes various new recent results derived by the authors. This third edition of the bestselling book introduces the reader to the martingale method and the Efron-Stein-Steele inequalities in completely new sections. A new application of lossless source coding with side information is described in detail. Finally, the references have been updated and ones included that have been published since the original publication. Concentration of Measure Inequalities in Information Theory, Communications, and Coding is essential reading for all researchers and scientists in information theory and coding.","PeriodicalId":45236,"journal":{"name":"Foundations and Trends in Communications and Information Theory","volume":"23 1","pages":"1-246"},"PeriodicalIF":2.4,"publicationDate":"2012-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84835957","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 227
Fundamental Performance Limits in Cross-layer Wireless Optimization: Throughput, Delay, and Energy 跨层无线优化的基本性能限制:吞吐量、延迟和能量
IF 2.4 Q3 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2012-12-06 DOI: 10.1561/0100000014
E. Yeh
Fundamental Performance Limits in Cross-layer Wireless Optimization: Throughput, Delay, and Energy
跨层无线优化的基本性能限制:吞吐量、延迟和能量
{"title":"Fundamental Performance Limits in Cross-layer Wireless Optimization: Throughput, Delay, and Energy","authors":"E. Yeh","doi":"10.1561/0100000014","DOIUrl":"https://doi.org/10.1561/0100000014","url":null,"abstract":"Fundamental Performance Limits in Cross-layer Wireless Optimization: Throughput, Delay, and Energy","PeriodicalId":45236,"journal":{"name":"Foundations and Trends in Communications and Information Theory","volume":"1 1","pages":"1-112"},"PeriodicalIF":2.4,"publicationDate":"2012-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76142351","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Polarization and Polar Codes 极化码和极码
IF 2.4 Q3 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2012-10-03 DOI: 10.1561/0100000041
Eren Sasoglu
1. Introduction 2. Polarization and Polar Coding 3. Complexity 4. Processes with Arbitrary Alphabets 5. Generalized Constructions 6. Joint Polarization of Multiple Processes 7. Conclusion and Related Work. References.
1. 介绍2。极化与极性编码复杂性4。任意字母的进程广义结构多过程联合极化结论及相关工作。参考文献
{"title":"Polarization and Polar Codes","authors":"Eren Sasoglu","doi":"10.1561/0100000041","DOIUrl":"https://doi.org/10.1561/0100000041","url":null,"abstract":"1. Introduction 2. Polarization and Polar Coding 3. Complexity 4. Processes with Arbitrary Alphabets 5. Generalized Constructions 6. Joint Polarization of Multiple Processes 7. Conclusion and Related Work. References.","PeriodicalId":45236,"journal":{"name":"Foundations and Trends in Communications and Information Theory","volume":"84 1","pages":"259-381"},"PeriodicalIF":2.4,"publicationDate":"2012-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80934545","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 80
Block Toeplitz Matrices: Asymptotic Results and Applications 块Toeplitz矩阵:渐近结果及其应用
IF 2.4 Q3 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2012-09-10 DOI: 10.1561/0100000066
Jesús Gutiérrez-Gutiérrez, P. Crespo
The present monograph studies the asymptotic behaviour of eigenvalues, products and functions of block Toeplitz matrices generated by the Fourier coefficients of a continuous matrix-valued function. This study is based on the concept of asymptotically equivalent sequences of non-square matrices. The asymptotic results on block Toeplitz matrices obtained are applied to vector asymptotically wide sense stationary processes. Therefore, this monograph is a generalization to block Toeplitz matrices of the Gray monograph entitled “Toeplitz and circulant matrices: A review”, which was published in the second volume of Foundations and Trends in Communications and Information Theory, and which is the simplest and most famous introduction to the asymptotic theory on Toeplitz matrices.
本文研究了由连续矩阵值函数的傅里叶系数生成的块Toeplitz矩阵的特征值、乘积和函数的渐近性。本研究基于非方阵渐近等价序列的概念。将得到的块Toeplitz矩阵的渐近结果应用于向量渐近广义平稳过程。因此,本专著是对发表在《通信与信息论的基础与趋势》第二卷的Gray专著《Toeplitz与循环矩阵:综述》的块Toeplitz矩阵的推广,是对Toeplitz矩阵渐近理论最简单、最著名的介绍。
{"title":"Block Toeplitz Matrices: Asymptotic Results and Applications","authors":"Jesús Gutiérrez-Gutiérrez, P. Crespo","doi":"10.1561/0100000066","DOIUrl":"https://doi.org/10.1561/0100000066","url":null,"abstract":"The present monograph studies the asymptotic behaviour of eigenvalues, products and functions of block Toeplitz matrices generated by the Fourier coefficients of a continuous matrix-valued function. This study is based on the concept of asymptotically equivalent sequences of non-square matrices. The asymptotic results on block Toeplitz matrices obtained are applied to vector asymptotically wide sense stationary processes. Therefore, this monograph is a generalization to block Toeplitz matrices of the Gray monograph entitled “Toeplitz and circulant matrices: A review”, which was published in the second volume of Foundations and Trends in Communications and Information Theory, and which is the simplest and most famous introduction to the asymptotic theory on Toeplitz matrices.","PeriodicalId":45236,"journal":{"name":"Foundations and Trends in Communications and Information Theory","volume":"29 1","pages":"179-257"},"PeriodicalIF":2.4,"publicationDate":"2012-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90613870","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 55
Random-Set Theory and Wireless Communications 随机集理论与无线通信
IF 2.4 Q3 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2012-08-24 DOI: 10.1561/0100000054
E. Biglieri, E. Grossi, M. Lops
This monograph is devoted to random-set theory, which allows unordered collections of random elements, drawn from an arbitrary space, to be handled. After illustrating its foundations, we focus on Random Finite Sets, i.e., unordered collections of random cardinality of points from an arbitrary space, and show how this theory can be applied to a number of problems arising in wireless communication systems. Three of these problems are: (1) neighbor discovery in wireless networks, (2) multiuser detection in which the number of active users is unknown and time-varying, and (3) estimation of multipath channels where the number of paths is not known a priori and which are possibly time-varying. Standard solutions to these problems are intrinsically suboptimum as they proceed either by assuming a fixed number of vector components, or by first estimating this number and then the values taken on by the components. It is shown how random-set theory provides optimum solutions to all these problems. The complexity issue is also examined, and suboptimum solutions are presented and discussed.
这本专著致力于随机集理论,它允许从任意空间绘制的随机元素的无序集合进行处理。在说明了它的基础之后,我们将重点放在随机有限集上,即来自任意空间的点的随机基数的无序集合,并展示如何将该理论应用于无线通信系统中出现的一些问题。其中三个问题是:(1)无线网络中的邻居发现;(2)活动用户数量未知且时变的多用户检测;(3)路径数量未知且可能时变的多径信道估计。这些问题的标准解决方案本质上是次优的,因为它们要么是假设一个固定数量的矢量组件,要么是先估计这个数量,然后再计算组件的值。本文展示了随机集理论如何为所有这些问题提供最优解。复杂性问题也进行了研究,并提出和讨论了次优解。
{"title":"Random-Set Theory and Wireless Communications","authors":"E. Biglieri, E. Grossi, M. Lops","doi":"10.1561/0100000054","DOIUrl":"https://doi.org/10.1561/0100000054","url":null,"abstract":"This monograph is devoted to random-set theory, which allows unordered collections of random elements, drawn from an arbitrary space, to be handled. After illustrating its foundations, we focus on Random Finite Sets, i.e., unordered collections of random cardinality of points from an arbitrary space, and show how this theory can be applied to a number of problems arising in wireless communication systems. Three of these problems are: (1) neighbor discovery in wireless networks, (2) multiuser detection in which the number of active users is unknown and time-varying, and (3) estimation of multipath channels where the number of paths is not known a priori and which are possibly time-varying. Standard solutions to these problems are intrinsically suboptimum as they proceed either by assuming a fixed number of vector components, or by first estimating this number and then the values taken on by the components. It is shown how random-set theory provides optimum solutions to all these problems. The complexity issue is also examined, and suboptimum solutions are presented and discussed.","PeriodicalId":45236,"journal":{"name":"Foundations and Trends in Communications and Information Theory","volume":"24 1","pages":"317-462"},"PeriodicalIF":2.4,"publicationDate":"2012-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84214247","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Cooperative Wireless Cellular Systems: An Information-Theoretic View 协同无线蜂窝系统:信息论观点
IF 2.4 Q3 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2012-04-14 DOI: 10.1561/0100000048
O. Simeone, Nathan Levy, A. Sanderovich, O. Somekh, B. M. Zaidel, H. Poor, S. Shamai
In this monograph, the impact of cooperation on the performance of wireless cellular systems is studied from an information-theoretic standpoint, focusing on simple formulations typically referred to as Wynertype models. Following ongoing research and standardization efforts, the text covers two main classes of cooperation strategies. The first class is cooperation at the base station (BS) level, which is also known as Multi-Cell Processing (MCP), network Multiple-Input MultipleOutput (MIMO), or Coordinated Multi-Point transmission/reception (CoMP). With MCP, cooperative decoding, for the uplink, or encoding, for the downlink, is enabled at the BSs. MCP is made possible by the presence of an architecture of, typically wired, backhaul links connecting individual BSs to a central processor (CP) or to one another. The second class of cooperative strategies allows cooperation in the form of relaying for conveying data between Mobile Stations (MSs) and BSs in either the uplink or the downlink. Relaying can be enabled by two possible architectures. A first option is to deploy dedicated Relay Stations (RSs) that are tasked with forwarding uplink or downlink traffic. The second option is for the MSs to act as RSs for other MSs. MCP is first studied under ideal conditions on the backhaul links, namely by assuming that all BSs are connected to a CP with unlimitedcapacity links. Both Gaussian (nonfading) and flat-fading channels are analyzed, for the uplink and the downlink, and analytical insights are drawn into the performance advantages of MCP in different relevant operating regimes. Performance comparison is performed with standard Single-Cell Processing (SCP) techniques, whereby each BS decodes, in the uplink, or encodes, in the downlink, independently, as implemented with different spatial reuse factors. Then, practical constraints on the backhaul architecture enabling MCP are introduced. Specifically, three common settings are studied. In the first, all the BSs are connected to a CP via finite-capacity links. In the second, only BSs in adjacent cells are connected via (finite-capacity) backhaul links. In the third, only a subset of BSs is connected to a CP for joint encoding/decoding (clustered cooperation). Achievable rates for the three settings are studied and compared for both the uplink and the downlink. The performance advantages of relaying are analyzed for cellular systems with dedicated RSs and with cooperative MSs. Different techniques are reviewed that require varying degrees of information about system parameters at the MSs, RSs, and BSs. Performance is investigated with both MCP and SCP, revealing a profound interplay between cooperation at the BS level and relaying. Finally, various open problems are pointed out.
在这本专著中,从信息论的角度研究了合作对无线蜂窝系统性能的影响,重点是通常被称为Wynertype模型的简单公式。根据正在进行的研究和标准化工作,该文本涵盖了两类主要的合作战略。第一类是基站(BS)级的合作,也称为多单元处理(MCP)、网络多输入多输出(MIMO)或协调多点传输/接收(CoMP)。通过MCP,在BSs上对上行链路进行协同解码,对下行链路进行协同编码。MCP之所以成为可能,是因为存在一种架构,通常是有线的,将单个BSs连接到中央处理器(CP)或彼此连接的回程链路。第二类合作策略允许在上行链路或下行链路上以中继形式在移动站(MSs)和基站之间传输数据。中继可以通过两种可能的体系结构启用。第一种选择是部署专门的中继站(RSs),负责转发上行链路或下行链路流量。第二种选择是由管理人员担任其他管理人员的RSs。首先在回程链路的理想条件下,即假设所有的BSs都连接到一个具有无限容量链路的CP上,研究了MCP。对上行链路和下行链路的高斯(非衰落)和平等衰落信道进行了分析,并分析了MCP在不同相关运行体制下的性能优势。性能比较使用标准的单细胞处理(SCP)技术进行,其中每个BS在上行链路中独立解码,或在下行链路中独立编码,实现不同的空间重用因素。然后,介绍了支持MCP的回程架构的实际约束。具体来说,研究了三种常见的设置。在第一种方法中,所有的BSs通过有限容量链路连接到一个CP。在第二种情况下,只有相邻小区中的基站通过(有限容量)回程链路连接。在第三种情况下,只有一小部分BSs连接到CP进行联合编码/解码(集群合作)。研究和比较了上行链路和下行链路三种设置的可实现速率。分析了中继在蜂窝系统中具有专用RSs和合作MSs的性能优势。本文回顾了不同的技术,这些技术需要不同程度的关于ms、RSs和BSs的系统参数的信息。通过MCP和SCP对绩效进行了调查,揭示了BS层面的合作与中继之间的深刻相互作用。最后,指出了一些有待解决的问题。
{"title":"Cooperative Wireless Cellular Systems: An Information-Theoretic View","authors":"O. Simeone, Nathan Levy, A. Sanderovich, O. Somekh, B. M. Zaidel, H. Poor, S. Shamai","doi":"10.1561/0100000048","DOIUrl":"https://doi.org/10.1561/0100000048","url":null,"abstract":"In this monograph, the impact of cooperation on the performance of wireless cellular systems is studied from an information-theoretic standpoint, focusing on simple formulations typically referred to as Wynertype models. Following ongoing research and standardization efforts, the text covers two main classes of cooperation strategies. The first class is cooperation at the base station (BS) level, which is also known as Multi-Cell Processing (MCP), network Multiple-Input MultipleOutput (MIMO), or Coordinated Multi-Point transmission/reception (CoMP). With MCP, cooperative decoding, for the uplink, or encoding, for the downlink, is enabled at the BSs. MCP is made possible by the presence of an architecture of, typically wired, backhaul links connecting individual BSs to a central processor (CP) or to one another. The second class of cooperative strategies allows cooperation in the form of relaying for conveying data between Mobile Stations (MSs) and BSs in either the uplink or the downlink. Relaying can be enabled by two possible architectures. A first option is to deploy dedicated Relay Stations (RSs) that are tasked with forwarding uplink or downlink traffic. The second option is for the MSs to act as RSs for other MSs. MCP is first studied under ideal conditions on the backhaul links, namely by assuming that all BSs are connected to a CP with unlimitedcapacity links. Both Gaussian (nonfading) and flat-fading channels are analyzed, for the uplink and the downlink, and analytical insights are drawn into the performance advantages of MCP in different relevant operating regimes. Performance comparison is performed with standard Single-Cell Processing (SCP) techniques, whereby each BS decodes, in the uplink, or encodes, in the downlink, independently, as implemented with different spatial reuse factors. Then, practical constraints on the backhaul architecture enabling MCP are introduced. Specifically, three common settings are studied. In the first, all the BSs are connected to a CP via finite-capacity links. In the second, only BSs in adjacent cells are connected via (finite-capacity) backhaul links. In the third, only a subset of BSs is connected to a CP for joint encoding/decoding (clustered cooperation). Achievable rates for the three settings are studied and compared for both the uplink and the downlink. The performance advantages of relaying are analyzed for cellular systems with dedicated RSs and with cooperative MSs. Different techniques are reviewed that require varying degrees of information about system parameters at the MSs, RSs, and BSs. Performance is investigated with both MCP and SCP, revealing a profound interplay between cooperation at the BS level and relaying. Finally, various open problems are pointed out.","PeriodicalId":45236,"journal":{"name":"Foundations and Trends in Communications and Information Theory","volume":"8 1","pages":"1-177"},"PeriodicalIF":2.4,"publicationDate":"2012-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90808639","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 75
Biometric Security from an Information-Theoretical Perspective 信息理论视角下的生物识别安全
IF 2.4 Q3 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2012-01-30 DOI: 10.1561/0100000051
T. Ignatenko, F. Willems
The issue of biometric security has become a major research area recently. While systems based on iris-recognition, DNA analysis and fingerprinting are being deployed, there are instances where these alone cannot provide fool-proof security. Biometric Security from an Information-Theoretical Perspective provides an overview of the state-of-the-art of biometric security systems. Using information theoretic techniques it discusses some of the most promising methods to provide practical, but safe, systems. Biometric Security from an Information-Theoretical Perspective studies a number of problems related to the design of biometric secrecy systems for both authentication and identification. First, it reviews the problem of secret sharing in order to set theoretical grounds for the subsequent discussion of secret-key rates and privacy leakage in biometric secrecy systems. Biometric authentication systems are discussed in depth using discrete and Gaussian biometric sources, before describing biometric identification techniques in detail. Since biometric data are typically used for both identification and authentication purposes, the trade-off between identification, secret-key and privacy-leakage rates are determined. Finally, practical considerations are treated. The realization of binary biometric authentication systems with chosen secret keys, called fuzzy commitment, is analyzed. The monograph concludes by investigating how binary quantization of biometric sequences influences the performance of biometric secrecy systems with respect to secret-key rates and privacy leakage. Biometric Security from an Information-Theoretical Perspective is an in-depth review of the topic, which gives the reader an excellent starting point for further research.
近年来,生物识别安全问题已成为一个重要的研究领域。虽然基于虹膜识别、DNA分析和指纹识别的系统正在部署,但在某些情况下,仅凭这些系统无法提供万无一失的安全性。从信息理论的角度来看生物识别安全提供了生物识别安全系统的最新技术的概述。利用信息理论技术,讨论了一些最有前途的方法来提供实用而安全的系统。《信息理论视角下的生物特征安全》研究了与生物特征认证和身份识别保密系统设计相关的一系列问题。首先,本文回顾了秘密共享问题,为后续讨论生物识别保密系统中的秘密密钥率和隐私泄露奠定理论基础。在详细描述生物识别技术之前,将使用离散和高斯生物识别源深入讨论生物识别系统。由于生物特征数据通常用于识别和身份验证目的,因此确定了识别、秘钥和隐私泄漏率之间的权衡。最后,讨论了实际问题。分析了选择密钥的二元生物特征认证系统的实现,即模糊承诺。该专著通过研究生物特征序列的二进制量化如何影响生物特征保密系统在密钥率和隐私泄漏方面的性能来结束。从信息理论的角度对生物识别安全进行了深入的回顾,为读者进一步的研究提供了一个很好的起点。
{"title":"Biometric Security from an Information-Theoretical Perspective","authors":"T. Ignatenko, F. Willems","doi":"10.1561/0100000051","DOIUrl":"https://doi.org/10.1561/0100000051","url":null,"abstract":"The issue of biometric security has become a major research area recently. While systems based on iris-recognition, DNA analysis and fingerprinting are being deployed, there are instances where these alone cannot provide fool-proof security. Biometric Security from an Information-Theoretical Perspective provides an overview of the state-of-the-art of biometric security systems. Using information theoretic techniques it discusses some of the most promising methods to provide practical, but safe, systems. Biometric Security from an Information-Theoretical Perspective studies a number of problems related to the design of biometric secrecy systems for both authentication and identification. First, it reviews the problem of secret sharing in order to set theoretical grounds for the subsequent discussion of secret-key rates and privacy leakage in biometric secrecy systems. Biometric authentication systems are discussed in depth using discrete and Gaussian biometric sources, before describing biometric identification techniques in detail. Since biometric data are typically used for both identification and authentication purposes, the trade-off between identification, secret-key and privacy-leakage rates are determined. Finally, practical considerations are treated. The realization of binary biometric authentication systems with chosen secret keys, called fuzzy commitment, is analyzed. The monograph concludes by investigating how binary quantization of biometric sequences influences the performance of biometric secrecy systems with respect to secret-key rates and privacy leakage. Biometric Security from an Information-Theoretical Perspective is an in-depth review of the topic, which gives the reader an excellent starting point for further research.","PeriodicalId":45236,"journal":{"name":"Foundations and Trends in Communications and Information Theory","volume":"1 1","pages":"135-316"},"PeriodicalIF":2.4,"publicationDate":"2012-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82048483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 53
Interference Alignment: A New Look at Signal Dimensions in a Communication Network 干扰对准:通信网络中信号维度的新视角
IF 2.4 Q3 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2011-06-30 DOI: 10.1561/0100000047
S. Jafar
This monograph introduces to the reader the idea of interference alignment, traces its origins, reviews a variety of interference alignment schemes, summarizes the diverse settings where the idea of interference alignment is applicable and highlights the common principles that cut across these diverse applications. The focus is on theoretical aspects. Full text available at: http://dx.doi.org/10.1561/0100000047
这本专著向读者介绍了干涉对准的想法,追溯其起源,回顾了各种干涉对准方案,总结了不同的设置,其中干涉对准的想法是适用的,并强调了跨越这些不同应用的共同原则。重点是理论方面。全文可在:http://dx.doi.org/10.1561/0100000047
{"title":"Interference Alignment: A New Look at Signal Dimensions in a Communication Network","authors":"S. Jafar","doi":"10.1561/0100000047","DOIUrl":"https://doi.org/10.1561/0100000047","url":null,"abstract":"This monograph introduces to the reader the idea of interference alignment, traces its origins, reviews a variety of interference alignment schemes, summarizes the diverse settings where the idea of interference alignment is applicable and highlights the common principles that cut across these diverse applications. The focus is on theoretical aspects. Full text available at: http://dx.doi.org/10.1561/0100000047","PeriodicalId":45236,"journal":{"name":"Foundations and Trends in Communications and Information Theory","volume":"6 1","pages":"1-136"},"PeriodicalIF":2.4,"publicationDate":"2011-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75452291","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 504
期刊
Foundations and Trends in Communications and Information Theory
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1