首页 > 最新文献

IEEE journal on selected areas in information theory最新文献

英文 中文
Spatio-Temporal Wildfire Prediction Using Multi-Modal Data 基于多模态数据的野火时空预测
Pub Date : 2023-03-22 DOI: 10.1109/JSAIT.2023.3276054
Chen Xu;Yao Xie;Daniel A. Zuniga Vazquez;Rui Yao;Feng Qiu
Due to severe societal and environmental impacts, wildfire prediction using multi-modal sensing data has become a highly sought-after data-analytical tool by various stakeholders (such as state governments and power utility companies) to achieve a more informed understanding of wildfire activities and plan preventive measures. A desirable algorithm should precisely predict fire risk and magnitude for a location in real time. In this paper, we develop a flexible spatio-temporal wildfire prediction framework using multi-modal time series data. We first predict the wildfire risk (the chance of a wildfire event) in real-time, considering the historical events using discrete mutually exciting point process models. Then we further develop a wildfire magnitude prediction set method based on the flexible distribution-free time-series conformal prediction (CP) approach. Theoretically, we prove a risk model parameter recovery guarantee, as well as coverage and set size guarantees for the CP sets. Through extensive real-data experiments with wildfire data in California, we demonstrate the effectiveness of our methods, as well as their flexibility and scalability in large regions.
由于严重的社会和环境影响,使用多模态传感数据进行野火预测已成为各利益相关者(如州政府和电力公司)广受欢迎的数据分析工具,以更深入地了解野火活动并制定预防措施。理想的算法应该实时准确预测一个地点的火灾风险和规模。在本文中,我们使用多模态时间序列数据开发了一个灵活的时空野火预测框架。我们首先使用离散的相互激励的点过程模型,考虑历史事件,实时预测野火风险(野火事件的可能性)。然后,我们进一步发展了一种基于灵活分布自由时间序列保角预测(CP)方法的野火震级预测集方法。理论上,我们证明了一个风险模型参数恢复保证,以及CP集的覆盖范围和集大小保证。通过对加州野火数据进行广泛的真实数据实验,我们展示了我们的方法的有效性,以及它们在大区域的灵活性和可扩展性。
{"title":"Spatio-Temporal Wildfire Prediction Using Multi-Modal Data","authors":"Chen Xu;Yao Xie;Daniel A. Zuniga Vazquez;Rui Yao;Feng Qiu","doi":"10.1109/JSAIT.2023.3276054","DOIUrl":"10.1109/JSAIT.2023.3276054","url":null,"abstract":"Due to severe societal and environmental impacts, wildfire prediction using multi-modal sensing data has become a highly sought-after data-analytical tool by various stakeholders (such as state governments and power utility companies) to achieve a more informed understanding of wildfire activities and plan preventive measures. A desirable algorithm should precisely predict fire risk and magnitude for a location in real time. In this paper, we develop a flexible spatio-temporal wildfire prediction framework using multi-modal time series data. We first predict the wildfire risk (the chance of a wildfire event) in real-time, considering the historical events using discrete mutually exciting point process models. Then we further develop a wildfire magnitude prediction set method based on the flexible distribution-free time-series conformal prediction (CP) approach. Theoretically, we prove a risk model parameter recovery guarantee, as well as coverage and set size guarantees for the CP sets. Through extensive real-data experiments with wildfire data in California, we demonstrate the effectiveness of our methods, as well as their flexibility and scalability in large regions.","PeriodicalId":73295,"journal":{"name":"IEEE journal on selected areas in information theory","volume":"4 ","pages":"302-313"},"PeriodicalIF":0.0,"publicationDate":"2023-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42615184","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Voronoi Region of the Barnes–Wall Lattice Λ16 Barnes-Wall晶格的Voronoi区域Λ16
Pub Date : 2023-03-16 DOI: 10.1109/JSAIT.2023.3276897
Daniel Pook-Kolb;Erik Agrell;Bruce Allen
We give a detailed description of the Voronoi region of the Barnes–Wall lattice $Lambda _{16}$ , including its vertices, relevant vectors, and symmetry group. The exact value of its quantizer constant is calculated, which was previously only known approximately. To verify the result, we estimate the same constant numerically and propose a new very simple method to quantify the variance of such estimates, which is far more accurate than the commonly used jackknife estimator.
我们给出了Barnes-Wall晶格$Lambda _{16}$的Voronoi区域的详细描述,包括它的顶点、相关向量和对称群。它的量化常数的精确值计算,这是以前只知道大约。为了验证结果,我们对相同的常数进行了数值估计,并提出了一种新的非常简单的方法来量化这种估计的方差,该方法比常用的折刀估计要精确得多。
{"title":"The Voronoi Region of the Barnes–Wall Lattice Λ16","authors":"Daniel Pook-Kolb;Erik Agrell;Bruce Allen","doi":"10.1109/JSAIT.2023.3276897","DOIUrl":"10.1109/JSAIT.2023.3276897","url":null,"abstract":"We give a detailed description of the Voronoi region of the Barnes–Wall lattice \u0000<inline-formula> <tex-math>$Lambda _{16}$ </tex-math></inline-formula>\u0000, including its vertices, relevant vectors, and symmetry group. The exact value of its quantizer constant is calculated, which was previously only known approximately. To verify the result, we estimate the same constant numerically and propose a new very simple method to quantify the variance of such estimates, which is far more accurate than the commonly used jackknife estimator.","PeriodicalId":73295,"journal":{"name":"IEEE journal on selected areas in information theory","volume":"4 ","pages":"16-23"},"PeriodicalIF":0.0,"publicationDate":"2023-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/8700143/10153947/10126076.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42379813","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Active Sensing for Two-Sided Beam Alignment and Reflection Design Using Ping-Pong Pilots 利用乒乓球飞行员进行双侧光束对准和反射设计的主动传感
Pub Date : 2023-03-15 DOI: 10.1109/JSAIT.2023.3276296
Tao Jiang;Foad Sohrabi;Wei Yu
Beam alignment is an important task for millimeter-wave (mmWave) communication, because constructing aligned narrow beams both at the transmitter (Tx) and the receiver (Rx) is crucial in terms of compensating the significant path loss in very high-frequency bands. However, beam alignment is also a highly nontrivial task because large antenna arrays typically have a limited number of radio-frequency chains, allowing only low-dimensional measurements of the high-dimensional channel. This paper considers a two-sided beam alignment problem based on an alternating ping-pong pilot scheme between Tx and Rx over multiple rounds without explicit feedback. We propose a deep active sensing framework in which two long short-term memory (LSTM) based neural networks are employed to learn the adaptive sensing strategies (i.e., measurement vectors) and to produce the final aligned beamformers at both sides. In the proposed ping-pong protocol, the Tx and the Rx alternately send pilots so that both sides can leverage local observations to sequentially design their respective sensing and data transmission beamformers. The proposed strategy can be extended to scenarios with a reconfigurable intelligent surface (RIS) for designing, in addition, the reflection coefficients at the RIS for both sensing and communications. Numerical experiments demonstrate significant and interpretable performance improvement. The proposed strategy works well even for the challenging multipath channel environments.
波束对准是毫米波(mmWave)通信的一项重要任务,因为在发射机(Tx)和接收机(Rx)上构建对准的窄波束对于补偿高频波段的显著路径损耗至关重要。然而,波束对准也是一项非常重要的任务,因为大型天线阵列通常具有有限数量的射频链,只能对高维信道进行低维测量。本文研究了一个基于多回合无显式反馈的Tx和Rx之间的交替乒乓导频方案的双边光束对准问题。我们提出了一个深度主动传感框架,其中使用两个基于长短期记忆(LSTM)的神经网络来学习自适应传感策略(即测量向量)并在两侧产生最终对齐的波束形成器。在拟议的乒乓协议中,Tx和Rx交替派遣飞行员,以便双方可以利用当地的观测结果依次设计各自的传感和数据传输波束形成器。提出的策略可以扩展到具有可重构智能表面(RIS)的场景中,用于设计RIS上的反射系数,以及用于传感和通信的反射系数。数值实验证明了显著和可解释的性能改进。所提出的策略即使在具有挑战性的多径信道环境中也能很好地工作。
{"title":"Active Sensing for Two-Sided Beam Alignment and Reflection Design Using Ping-Pong Pilots","authors":"Tao Jiang;Foad Sohrabi;Wei Yu","doi":"10.1109/JSAIT.2023.3276296","DOIUrl":"10.1109/JSAIT.2023.3276296","url":null,"abstract":"Beam alignment is an important task for millimeter-wave (mmWave) communication, because constructing aligned narrow beams both at the transmitter (Tx) and the receiver (Rx) is crucial in terms of compensating the significant path loss in very high-frequency bands. However, beam alignment is also a highly nontrivial task because large antenna arrays typically have a limited number of radio-frequency chains, allowing only low-dimensional measurements of the high-dimensional channel. This paper considers a two-sided beam alignment problem based on an alternating ping-pong pilot scheme between Tx and Rx over multiple rounds without explicit feedback. We propose a deep active sensing framework in which two long short-term memory (LSTM) based neural networks are employed to learn the adaptive sensing strategies (i.e., measurement vectors) and to produce the final aligned beamformers at both sides. In the proposed ping-pong protocol, the Tx and the Rx alternately send pilots so that both sides can leverage local observations to sequentially design their respective sensing and data transmission beamformers. The proposed strategy can be extended to scenarios with a reconfigurable intelligent surface (RIS) for designing, in addition, the reflection coefficients at the RIS for both sensing and communications. Numerical experiments demonstrate significant and interpretable performance improvement. The proposed strategy works well even for the challenging multipath channel environments.","PeriodicalId":73295,"journal":{"name":"IEEE journal on selected areas in information theory","volume":"4 ","pages":"24-39"},"PeriodicalIF":0.0,"publicationDate":"2023-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44233552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Rate and Detection-Error Exponent Tradeoff for Joint Communication and Sensing of Fixed Channel States 固定信道状态联合通信和感知的速率和检测误差指数权衡
Pub Date : 2023-03-12 DOI: 10.1109/JSAIT.2023.3275877
Meng-Che Chang;Shi-Yuan Wang;Tuna Erdoğan;Matthieu R. Bloch
We study the information-theoretic limits of joint communication and sensing when the sensing task is modeled as the estimation of a discrete channel state fixed during the transmission of an entire codeword. This setting captures scenarios in which the time scale over which sensing happens is significantly slower than the time scale over which symbol transmission occurs. The tradeoff between communication and sensing then takes the form of a tradeoff region between the rate of reliable communication and the state detection-error exponent. We investigate such tradeoffs for both mono-static and bi-static scenarios, in which the sensing task is performed at the transmitter or receiver, respectively. In the mono-static case, we develop an exact characterization of the tradeoff in open-loop, when the sensing is not used to assist the communication. We also show the strict improvement brought by a closed-loop operation, in which the sensing informs the communication. In the bi-static case, we develop an achievable tradeoff region that highlights the fundamentally different nature of the bi-static scenario. Specifically, the rate of communication plays a key role in the characterization of the tradeoff and we show how joint strategies, which simultaneously estimate message and state, outperform successive strategies, which only estimate the state after decoding the transmitted message.
当感测任务被建模为在整个码字的传输期间固定的离散信道状态的估计时,我们研究了联合通信和感测的信息论限制。此设置捕获感测发生的时间尺度明显慢于符号传输发生的时间标尺的场景。通信和感测之间的折衷采用可靠通信速率和状态检测误差指数之间的折衷区域的形式。我们研究了单静态和双静态场景的这种权衡,其中感测任务分别在发射机或接收机处执行。在单稳态情况下,当传感不用于辅助通信时,我们对开环中的折衷进行了精确的表征。我们还展示了闭环操作带来的严格改进,其中传感通知通信。在双静态的情况下,我们开发了一个可实现的权衡区域,突出了双静态场景的根本不同性质。具体而言,通信速率在权衡的表征中起着关键作用,我们展示了同时估计消息和状态的联合策略如何优于仅在解码传输消息后估计状态的连续策略。
{"title":"Rate and Detection-Error Exponent Tradeoff for Joint Communication and Sensing of Fixed Channel States","authors":"Meng-Che Chang;Shi-Yuan Wang;Tuna Erdoğan;Matthieu R. Bloch","doi":"10.1109/JSAIT.2023.3275877","DOIUrl":"10.1109/JSAIT.2023.3275877","url":null,"abstract":"We study the information-theoretic limits of joint communication and sensing when the sensing task is modeled as the estimation of a discrete channel state fixed during the transmission of an entire codeword. This setting captures scenarios in which the time scale over which sensing happens is significantly slower than the time scale over which symbol transmission occurs. The tradeoff between communication and sensing then takes the form of a tradeoff region between the rate of reliable communication and the state detection-error exponent. We investigate such tradeoffs for both mono-static and bi-static scenarios, in which the sensing task is performed at the transmitter or receiver, respectively. In the mono-static case, we develop an exact characterization of the tradeoff in open-loop, when the sensing is not used to assist the communication. We also show the strict improvement brought by a closed-loop operation, in which the sensing informs the communication. In the bi-static case, we develop an achievable tradeoff region that highlights the fundamentally different nature of the bi-static scenario. Specifically, the rate of communication plays a key role in the characterization of the tradeoff and we show how joint strategies, which simultaneously estimate message and state, outperform successive strategies, which only estimate the state after decoding the transmitted message.","PeriodicalId":73295,"journal":{"name":"IEEE journal on selected areas in information theory","volume":"4 ","pages":"245-259"},"PeriodicalIF":0.0,"publicationDate":"2023-03-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48253199","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Secure Integrated Sensing and Communication 安全集成传感和通信
Pub Date : 2023-03-10 DOI: 10.1109/JSAIT.2023.3275048
Onur Günlü;Matthieu R. Bloch;Rafael F. Schaefer;Aylin Yener
This work considers the problem of mitigating information leakage between communication and sensing in systems jointly performing both operations. Specifically, a discrete memoryless state-dependent broadcast channel model is studied in which (i) the presence of feedback enables a transmitter to convey information, while simultaneously performing channel state estimation; (ii) one of the receivers is treated as an eavesdropper whose state should be estimated but which should remain oblivious to part of the transmitted information. The model abstracts the challenges behind security for joint communication and sensing if one views the channel state as a key attribute, e.g., location. For independent and identically distributed states, perfect output feedback, and when part of the transmitted message should be kept secret, a partial characterization of the secrecy-distortion region is developed. The characterization is exact when the broadcast channel is either physically-degraded or reversely-physically-degraded. The partial characterization is also extended to the situation in which the entire transmitted message should be kept secret. The benefits of a joint approach compared to separation-based secure communication and state-sensing methods are illustrated with binary joint communication and sensing models.
这项工作考虑了在联合执行通信和传感两种操作的系统中减轻信息泄漏的问题。具体来说,研究了一个离散无记忆状态相关的广播信道模型,其中(i)反馈的存在使发射机能够在传输信息的同时进行信道状态估计;(ii)将其中一个接收者视为窃听者,其状态应被估计,但应对传输的部分信息保持不知情。如果将信道状态视为关键属性(例如位置),则该模型抽象了联合通信和传感安全背后的挑战。在独立同分布状态下,在输出反馈完美的情况下,在需要对部分传输信息保密的情况下,给出了保密失真区域的部分表征。当广播信道是物理降级或反向物理降级时,该特性是准确的。部分表征也扩展到整个传输消息应保密的情况。与基于分离的安全通信和状态感知方法相比,联合方法的优点用二进制联合通信和感知模型来说明。
{"title":"Secure Integrated Sensing and Communication","authors":"Onur Günlü;Matthieu R. Bloch;Rafael F. Schaefer;Aylin Yener","doi":"10.1109/JSAIT.2023.3275048","DOIUrl":"10.1109/JSAIT.2023.3275048","url":null,"abstract":"This work considers the problem of mitigating information leakage between communication and sensing in systems jointly performing both operations. Specifically, a discrete memoryless state-dependent broadcast channel model is studied in which (i) the presence of feedback enables a transmitter to convey information, while simultaneously performing channel state estimation; (ii) one of the receivers is treated as an eavesdropper whose state should be estimated but which should remain oblivious to part of the transmitted information. The model abstracts the challenges behind security for joint communication and sensing if one views the channel state as a key attribute, e.g., location. For independent and identically distributed states, perfect output feedback, and when part of the transmitted message should be kept secret, a partial characterization of the secrecy-distortion region is developed. The characterization is exact when the broadcast channel is either physically-degraded or reversely-physically-degraded. The partial characterization is also extended to the situation in which the entire transmitted message should be kept secret. The benefits of a joint approach compared to separation-based secure communication and state-sensing methods are illustrated with binary joint communication and sensing models.","PeriodicalId":73295,"journal":{"name":"IEEE journal on selected areas in information theory","volume":"4 ","pages":"40-53"},"PeriodicalIF":0.0,"publicationDate":"2023-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48623002","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Analysis of Large Market Data Using Neural Networks: A Causal Approach 使用神经网络分析大型市场数据:因果分析法
Pub Date : 2023-01-01 DOI: 10.1109/JSAIT.2024.3351549
Marc-Aurèle Divernois;Jalal Etesami;Damir Filipovic;Negar Kiyavash
We develop a data-driven framework to identify the interconnections between firms using an information-theoretic measure. This measure generalizes Granger causality and is capable of detecting nonlinear relationships within a network. Moreover, we develop an algorithm using recurrent neural networks and the aforementioned measure to identify the interconnections of high-dimensional nonlinear systems. The outcome of this algorithm is the causal graph encoding the interconnections among the firms. These causal graphs can be used as preliminary feature selection for another predictive model or for policy design. We evaluate the performance of our algorithm using both synthetic linear and nonlinear experiments and apply it to the daily stock returns of U.S. listed firms and infer their interconnections.
我们建立了一个数据驱动的框架,利用信息论的方法来识别企业之间的相互联系。这种度量方法概括了格兰杰因果关系,能够检测网络中的非线性关系。此外,我们还开发了一种算法,利用递归神经网络和上述措施来识别高维非线性系统的相互联系。该算法的结果是编码企业间相互联系的因果图。这些因果图可以作为另一个预测模型或政策设计的初步特征选择。我们使用合成线性和非线性实验来评估我们算法的性能,并将其应用于美国上市公司的每日股票回报率,推断它们之间的相互联系。
{"title":"Analysis of Large Market Data Using Neural Networks: A Causal Approach","authors":"Marc-Aurèle Divernois;Jalal Etesami;Damir Filipovic;Negar Kiyavash","doi":"10.1109/JSAIT.2024.3351549","DOIUrl":"https://doi.org/10.1109/JSAIT.2024.3351549","url":null,"abstract":"We develop a data-driven framework to identify the interconnections between firms using an information-theoretic measure. This measure generalizes Granger causality and is capable of detecting nonlinear relationships within a network. Moreover, we develop an algorithm using recurrent neural networks and the aforementioned measure to identify the interconnections of high-dimensional nonlinear systems. The outcome of this algorithm is the causal graph encoding the interconnections among the firms. These causal graphs can be used as preliminary feature selection for another predictive model or for policy design. We evaluate the performance of our algorithm using both synthetic linear and nonlinear experiments and apply it to the daily stock returns of U.S. listed firms and infer their interconnections.","PeriodicalId":73295,"journal":{"name":"IEEE journal on selected areas in information theory","volume":"4 ","pages":"833-847"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139715152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Private Information Retrieval Without Storage Overhead: Coding Instead of Replication 没有存储开销的私有信息检索:编码而不是复制
Pub Date : 2023-01-01 DOI: 10.1109/JSAIT.2023.3285665
Alexander Vardy;Eitan Yaakobi
Private information retrieval (PIR) protocols allow a user to retrieve a data item from a database without revealing any information about the identity of the item being retrieved. Specifically, in information-theoretic $k$ -server PIR, the database is replicated among $k$ non-communicating servers, and each server learns nothing about the item retrieved by the user. The effectiveness of PIR protocols is usually measured in terms of their communication complexity, which is the total number of bits exchanged between the user and the servers. However, another important cost parameter is storage overhead, which is the ratio between the total number of bits stored on all the servers and the number of bits in the database. Since single-server information-theoretic PIR is impossible, the storage overhead of all existing PIR protocols is at least 2 (or $k$ , in the case of $k$ -server PIR). In this work, we show that information-theoretic PIR can be achieved with storage overhead arbitrarily close to the optimal value of 1, without sacrificing the communication complexity asymptotically. Specifically, we prove that all known linear $k$ -server PIR protocols can be efficiently emulated, while preserving both privacy and communication complexity but significantly reducing the storage overhead. To this end, we distribute the $n$ bits of the database among $s+r$ servers, each storing $n/s$ coded bits (rather than replicas). Notably, our coding scheme remains the same, regardless of the specific $k$ -server PIR protocol being emulated. For every fixed $k$ , the resulting storage overhead $(s+r)/s$ approaches 1 as $s$ grows; explicitly we have $r le k sqrt {s}(1 + o(1))$ . Moreover, in the special case $k = 2$ , the storage overhead is only $1 + {}frac {1}{s}$ . In order to achieve these results, we introduce and study a new kind of binary linear codes, called here
专用信息检索(PIR)协议允许用户从数据库中检索数据项,而不透露任何关于所检索项的身份的信息。具体地说,在信息论的$k$服务器PIR中,数据库在$k$非通信服务器之间复制,并且每个服务器对用户检索的项目一无所知。PIR协议的有效性通常根据其通信复杂性来衡量,通信复杂性是用户和服务器之间交换的比特总数。然而,另一个重要的成本参数是存储开销,它是存储在所有服务器上的总位数与数据库中的位数之间的比率。由于单服务器信息论PIR是不可能的,因此所有现有PIR协议的存储开销至少为2(在$k$-server PIR的情况下为$k$)。在这项工作中,我们证明了信息论PIR可以在存储开销任意接近最优值1的情况下实现,而不会渐近地牺牲通信复杂性。具体来说,我们证明了所有已知的线性$k$-server PIR协议都可以有效地仿真,同时保留了隐私和通信复杂性,但显著降低了存储开销。为此,我们将数据库的$n$位分布在$s+r$服务器之间,每个服务器存储$n/s$编码位(而不是副本)。值得注意的是,我们的编码方案保持不变,无论模拟的是特定的$k$-server PIR协议。对于每个固定的$k$,随着$s$的增长,由此产生的存储开销$(s+r)/s$接近1;明确地说,我们有$rle ksqrt{s}(1+o(1))$。此外,在特殊情况$k=2$中,存储开销仅为$1+{}frac{1}{s}$。为了实现这些结果,我们引入并研究了一种新的二进制线性码,这里称为$k$-server PIR码。然后,我们展示了如何从一步多数逻辑可解码代码、Steiner系统、常重代码和某些局部可恢复代码中构建此类代码。我们还建立了$k$-server PIR代码的参数的几个边界,并最终扩展到数组代码。
{"title":"Private Information Retrieval Without Storage Overhead: Coding Instead of Replication","authors":"Alexander Vardy;Eitan Yaakobi","doi":"10.1109/JSAIT.2023.3285665","DOIUrl":"https://doi.org/10.1109/JSAIT.2023.3285665","url":null,"abstract":"Private information retrieval (PIR) protocols allow a user to retrieve a data item from a database without revealing any information about the identity of the item being retrieved. Specifically, in information-theoretic <inline-formula> <tex-math notation=\"LaTeX\">$k$ </tex-math></inline-formula>-server PIR, the database is replicated among <inline-formula> <tex-math notation=\"LaTeX\">$k$ </tex-math></inline-formula> non-communicating servers, and each server learns nothing about the item retrieved by the user. The effectiveness of PIR protocols is usually measured in terms of their communication complexity, which is the total number of bits exchanged between the user and the servers. However, another important cost parameter is storage overhead, which is the ratio between the total number of bits stored on all the servers and the number of bits in the database. Since single-server information-theoretic PIR is impossible, the storage overhead of all existing PIR protocols is at least 2 (or <inline-formula> <tex-math notation=\"LaTeX\">$k$ </tex-math></inline-formula>, in the case of <inline-formula> <tex-math notation=\"LaTeX\">$k$ </tex-math></inline-formula>-server PIR). In this work, we show that information-theoretic PIR can be achieved with storage overhead arbitrarily close to the optimal value of 1, without sacrificing the communication complexity asymptotically. Specifically, we prove that all known linear <inline-formula> <tex-math notation=\"LaTeX\">$k$ </tex-math></inline-formula>-server PIR protocols can be efficiently emulated, while preserving both privacy and communication complexity but significantly reducing the storage overhead. To this end, we distribute the <inline-formula> <tex-math notation=\"LaTeX\">$n$ </tex-math></inline-formula> bits of the database among <inline-formula> <tex-math notation=\"LaTeX\">$s+r$ </tex-math></inline-formula> servers, each storing <inline-formula> <tex-math notation=\"LaTeX\">$n/s$ </tex-math></inline-formula> coded bits (rather than replicas). Notably, our coding scheme remains the same, regardless of the specific <inline-formula> <tex-math notation=\"LaTeX\">$k$ </tex-math></inline-formula>-server PIR protocol being emulated. For every fixed <inline-formula> <tex-math notation=\"LaTeX\">$k$ </tex-math></inline-formula>, the resulting storage overhead <inline-formula> <tex-math notation=\"LaTeX\">$(s+r)/s$ </tex-math></inline-formula> approaches 1 as <inline-formula> <tex-math notation=\"LaTeX\">$s$ </tex-math></inline-formula> grows; explicitly we have <inline-formula> <tex-math notation=\"LaTeX\">$r le k sqrt {s}(1 + o(1))$ </tex-math></inline-formula>. Moreover, in the special case <inline-formula> <tex-math notation=\"LaTeX\">$k = 2$ </tex-math></inline-formula>, the storage overhead is only <inline-formula> <tex-math notation=\"LaTeX\">$1 + {}frac {1}{s}$ </tex-math></inline-formula>. In order to achieve these results, we introduce and study a new kind of binary linear codes, called here <inline-formula> <tex-math no","PeriodicalId":73295,"journal":{"name":"IEEE journal on selected areas in information theory","volume":"4 ","pages":"286-301"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50354281","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Capacity of Locally Recoverable Codes 本地可恢复代码的容量
Pub Date : 2023-01-01 DOI: 10.1109/JSAIT.2023.3300901
Arya Mazumdar
Motivated by applications in distributed storage, the notion of a locally recoverable code (LRC) was introduced a few years back. In an LRC, any coordinate of a codeword is recoverable by accessing only a small number of other coordinates. While different properties of LRCs have been well-studied, their performance on channels with random erasures or errors has been mostly unexplored. In this paper, we analyze the performance of LRCs over such stochastic channels. In particular, for input-symmetric discrete memoryless channels, we give a tight characterization of the gap to Shannon capacity when LRCs are used over the channel. Our results hold for a general notion of LRCs that correct multiple local erasures.
受分布式存储应用程序的启发,本地可恢复代码(LRC)的概念在几年前就被引入。在LRC中,码字的任何坐标都可以通过只访问少量其他坐标来恢复。虽然LRC的不同性质已经得到了很好的研究,但它们在具有随机擦除或错误的信道上的性能大多尚未被探索。在本文中,我们分析了LRC在这种随机信道上的性能。特别是,对于输入对称离散无记忆信道,当在信道上使用LRC时,我们给出了间隙到Shannon容量的严格表征。我们的结果支持纠正多个局部擦除的LRC的一般概念。
{"title":"Capacity of Locally Recoverable Codes","authors":"Arya Mazumdar","doi":"10.1109/JSAIT.2023.3300901","DOIUrl":"https://doi.org/10.1109/JSAIT.2023.3300901","url":null,"abstract":"Motivated by applications in distributed storage, the notion of a locally recoverable code (LRC) was introduced a few years back. In an LRC, any coordinate of a codeword is recoverable by accessing only a small number of other coordinates. While different properties of LRCs have been well-studied, their performance on channels with random erasures or errors has been mostly unexplored. In this paper, we analyze the performance of LRCs over such stochastic channels. In particular, for input-symmetric discrete memoryless channels, we give a tight characterization of the gap to Shannon capacity when LRCs are used over the channel. Our results hold for a general notion of LRCs that correct multiple local erasures.","PeriodicalId":73295,"journal":{"name":"IEEE journal on selected areas in information theory","volume":"4 ","pages":"276-285"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50354282","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Bee Identification Problem for DNA Strands 蜜蜂DNA链的识别问题
Pub Date : 2023-01-01 DOI: 10.1109/JSAIT.2023.3294423
Johan Chrisnata;Han Mao Kiah;Alexander Vardy;Eitan Yaakobi
Motivated by DNA-based applications, we generalize the bee identification problem proposed by Tandon et al. (2019). In this setup, we transmit all $M$ codewords from a codebook over some channel and each codeword results in $N$ noisy outputs. Then our task is to identify each codeword from this unordered set of $MN$ noisy outputs. First, via a reduction to a minimum-cost flow problem on a related bipartite flow network called the input-output flow network, we show that the problem can be solved in $O(M^{3})$ time in the worst case. Next, we consider the deletion and the insertion channels individually, and in both cases, we study the expected number of edges in their respective input-output networks. Specifically, we obtain closed expressions for this quantity for certain codebooks and when the codebook comprises all binary words, we show that this quantity is sub-quadratic when the deletion or insertion probability is less than 1/2. This then implies that the expected running time to perform joint decoding for this codebook is $o(M^{3})$ . For other codebooks, we develop methods to compute the expected number of edges efficiently. Finally, we adapt classical peeling-decoding techniques to reduce the number of nodes and edges in the input-output flow network.
受基于DNA的应用的启发,我们推广了Tandon等人提出的蜜蜂识别问题。(2019)。在这种设置中,我们在某个信道上传输来自码本的所有$M$码字,并且每个码字导致$N$噪声输出。然后,我们的任务是从这个$MN$噪声输出的无序集合中识别每个码字。首先,通过将一个相关的二分流网络(称为输入-输出流网络)上的最小成本流问题简化为一个问题,我们证明了在最坏的情况下,该问题可以在$O(M^{3})$时间内解决。接下来,我们分别考虑删除和插入通道,在这两种情况下,我们研究了它们各自输入输出网络中的预期边缘数量。具体地,我们获得了某些码本的这个量的闭合表达式,并且当码本包括所有二进制字时,我们表明当删除或插入概率小于1/2时,这个量是次二次的。这意味着对该码本执行联合解码的预期运行时间是$o(M^{3})$。对于其他码本,我们开发了有效计算期望边缘数量的方法。最后,我们采用经典的剥离解码技术来减少输入输出流网络中的节点和边的数量。
{"title":"Bee Identification Problem for DNA Strands","authors":"Johan Chrisnata;Han Mao Kiah;Alexander Vardy;Eitan Yaakobi","doi":"10.1109/JSAIT.2023.3294423","DOIUrl":"https://doi.org/10.1109/JSAIT.2023.3294423","url":null,"abstract":"Motivated by DNA-based applications, we generalize the bee identification problem proposed by Tandon et al. (2019). In this setup, we transmit all <inline-formula> <tex-math notation=\"LaTeX\">$M$ </tex-math></inline-formula> codewords from a codebook over some channel and each codeword results in <inline-formula> <tex-math notation=\"LaTeX\">$N$ </tex-math></inline-formula> noisy outputs. Then our task is to identify each codeword from this unordered set of <inline-formula> <tex-math notation=\"LaTeX\">$MN$ </tex-math></inline-formula> noisy outputs. First, via a reduction to a minimum-cost flow problem on a related bipartite flow network called the input-output flow network, we show that the problem can be solved in <inline-formula> <tex-math notation=\"LaTeX\">$O(M^{3})$ </tex-math></inline-formula> time in the worst case. Next, we consider the deletion and the insertion channels individually, and in both cases, we study the expected number of edges in their respective input-output networks. Specifically, we obtain closed expressions for this quantity for certain codebooks and when the codebook comprises all binary words, we show that this quantity is sub-quadratic when the deletion or insertion probability is less than 1/2. This then implies that the expected running time to perform joint decoding for this codebook is <inline-formula> <tex-math notation=\"LaTeX\">$o(M^{3})$ </tex-math></inline-formula>. For other codebooks, we develop methods to compute the expected number of edges efficiently. Finally, we adapt classical peeling-decoding techniques to reduce the number of nodes and edges in the input-output flow network.","PeriodicalId":73295,"journal":{"name":"IEEE journal on selected areas in information theory","volume":"4 ","pages":"190-204"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50426686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
New Bounds on the Size of Binary Codes With Large Minimum Distance 具有大最小距离的二进制码大小的新界
Pub Date : 2023-01-01 DOI: 10.1109/JSAIT.2023.3295836
James Chin-Jen Pang;Hessam Mahdavifar;S. Sandeep Pradhan
Let $A(n, d)$ denote the maximum size of a binary code of length $n$ and minimum Hamming distance $d$ . Studying $A(n, d)$ , including efforts to determine it as well to derive bounds on $A(n, d)$ for large $n$ ’s, is one of the most fundamental subjects in coding theory. In this paper, we explore new lower and upper bounds on $A(n, d)$ in the large-minimum distance regime, in particular, when $d = n/2 - Omega (sqrt {n})$ . We first provide a new construction of cyclic codes, by carefully selecting specific roots in the binary extension field for the check polynomial, with length $n= 2^{m} -1$ , distance $d geq n/2 - 2^{c-1}sqrt {n}$ , and size $n^{c+1/2}$ , for any $mgeq 4$ and any integer $c$ with $0 leq c leq m/2 - 1$ . These code parameters are slightly worse than those of the Delsarte–Goethals (DG) codes that provide the previously known best lower bound in the large-minimum distance regime. However, using a similar and extended code construction technique we show a sequence of cyclic codes that improve upon DG codes and provide the best lower bound in a narrower range of the minimum distance $d$ , in particular, when $d = n/2 - Omega (n^{2/3})$ . Furthermore, by leveraging a Fourier-analytic view of Delsarte’s linear program, upper bounds on $A(n, left lceil{ n/2 - rho sqrt {n}, }right rceil)$ with $rho in (0.5, 9.5)$ are obtained that scale polynomially in $n$ . To the best of authors’ knowledge, the upper bound due to Barg and Nogin (2006) is the only previously known upper bound that scale polynomially in $n$ in this
设$A(n,d)$表示长度为$n$和最小汉明距离为$d$的二进制码的最大大小。研究$A(n,d)$,包括确定它的努力,以及推导大型$n$的$A(n,d)美元的边界,是编码理论中最基本的主题之一。在本文中,我们探索了大最小距离域中$A(n,d)$的新的下界和上界,特别是当$d=n/2-Omega(sqrt{n})$时。我们首先提供了一种新的循环码构造,通过在校验多项式的二进制扩展域中仔细选择特定的根,长度为$n=2^{m}-1$,距离为$dgeqn/2-2^{c-1}sqrt{n}$,大小为$n^{c+1/2}$,用于任何$mgeq4$和具有$0leqcleqm/2-1$的任何整数$c$。这些代码参数比Delsarte–Goethals(DG)代码稍差,后者在大的最小距离范围内提供了以前已知的最佳下界。然而,使用类似的扩展码构造技术,我们展示了一系列循环码,这些循环码改进了DG码,并在最小距离$d$的较窄范围内提供了最佳下界,特别是当$d=n/2-Omega(n^{2/3})$时。此外,通过利用Delsarte线性规划的傅立叶分析视图,获得了$a(n,leftlceil{n/2-rhosqrt{n},}rightlceil)$与$rhoin(0.5,9.5)$的上界,该上界以$n$为多项式标度。据作者所知,Barg和Nogin(2006)提出的上限是此前已知的唯一一个在该制度下以$n$为单位进行多项式缩放的上限。我们数值证明,在指定的高最小距离范围内,我们的上界改进了Barg-Nogin上界。
{"title":"New Bounds on the Size of Binary Codes With Large Minimum Distance","authors":"James Chin-Jen Pang;Hessam Mahdavifar;S. Sandeep Pradhan","doi":"10.1109/JSAIT.2023.3295836","DOIUrl":"https://doi.org/10.1109/JSAIT.2023.3295836","url":null,"abstract":"Let <inline-formula> <tex-math notation=\"LaTeX\">$A(n, d)$ </tex-math></inline-formula> denote the maximum size of a binary code of length <inline-formula> <tex-math notation=\"LaTeX\">$n$ </tex-math></inline-formula> and minimum Hamming distance <inline-formula> <tex-math notation=\"LaTeX\">$d$ </tex-math></inline-formula>. Studying <inline-formula> <tex-math notation=\"LaTeX\">$A(n, d)$ </tex-math></inline-formula>, including efforts to determine it as well to derive bounds on <inline-formula> <tex-math notation=\"LaTeX\">$A(n, d)$ </tex-math></inline-formula> for large <inline-formula> <tex-math notation=\"LaTeX\">$n$ </tex-math></inline-formula>’s, is one of the most fundamental subjects in coding theory. In this paper, we explore new lower and upper bounds on <inline-formula> <tex-math notation=\"LaTeX\">$A(n, d)$ </tex-math></inline-formula> in the large-minimum distance regime, in particular, when <inline-formula> <tex-math notation=\"LaTeX\">$d = n/2 - Omega (sqrt {n})$ </tex-math></inline-formula>. We first provide a new construction of cyclic codes, by carefully selecting specific roots in the binary extension field for the check polynomial, with length <inline-formula> <tex-math notation=\"LaTeX\">$n= 2^{m} -1$ </tex-math></inline-formula>, distance <inline-formula> <tex-math notation=\"LaTeX\">$d geq n/2 - 2^{c-1}sqrt {n}$ </tex-math></inline-formula>, and size <inline-formula> <tex-math notation=\"LaTeX\">$n^{c+1/2}$ </tex-math></inline-formula>, for any <inline-formula> <tex-math notation=\"LaTeX\">$mgeq 4$ </tex-math></inline-formula> and any integer <inline-formula> <tex-math notation=\"LaTeX\">$c$ </tex-math></inline-formula> with <inline-formula> <tex-math notation=\"LaTeX\">$0 leq c leq m/2 - 1$ </tex-math></inline-formula>. These code parameters are slightly worse than those of the Delsarte–Goethals (DG) codes that provide the previously known best lower bound in the large-minimum distance regime. However, using a similar and extended code construction technique we show a sequence of cyclic codes that improve upon DG codes and provide the best lower bound in a narrower range of the minimum distance <inline-formula> <tex-math notation=\"LaTeX\">$d$ </tex-math></inline-formula>, in particular, when <inline-formula> <tex-math notation=\"LaTeX\">$d = n/2 - Omega (n^{2/3})$ </tex-math></inline-formula>. Furthermore, by leveraging a Fourier-analytic view of Delsarte’s linear program, upper bounds on <inline-formula> <tex-math notation=\"LaTeX\">$A(n, left lceil{ n/2 - rho sqrt {n}, }right rceil)$ </tex-math></inline-formula> with <inline-formula> <tex-math notation=\"LaTeX\">$rho in (0.5, 9.5)$ </tex-math></inline-formula> are obtained that scale polynomially in <inline-formula> <tex-math notation=\"LaTeX\">$n$ </tex-math></inline-formula>. To the best of authors’ knowledge, the upper bound due to Barg and Nogin (2006) is the only previously known upper bound that scale polynomially in <inline-formula> <tex-math notation=\"LaTeX\">$n$ </tex-math></inline-formula> in this","PeriodicalId":73295,"journal":{"name":"IEEE journal on selected areas in information theory","volume":"4 ","pages":"219-231"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50354353","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IEEE journal on selected areas in information theory
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1