首页 > 最新文献

IEEE journal on selected areas in information theory最新文献

英文 中文
Partial Homoscedasticity in Causal Discovery With Linear Models 线性模型因果发现中的部分同方差性
Pub Date : 2023-11-01 DOI: 10.1109/JSAIT.2023.3328476
Jun Wu;Mathias Drton
Recursive linear structural equation models and the associated directed acyclic graphs (DAGs) play an important role in causal discovery. The classic identifiability result for this class of models states that when only observational data is available, each DAG can be identified only up to a Markov equivalence class. In contrast, recent work has shown that the DAG can be uniquely identified if the errors in the model are homoscedastic, i.e., all have the same variance. This equal variance assumption yields methods that, if appropriate, are highly scalable and also sheds light on fundamental information-theoretic limits and optimality in causal discovery. In this paper, we fill the gap that exists between the two previously considered cases, which assume the error variances to be either arbitrary or all equal. Specifically, we formulate a framework of partial homoscedasticity, in which the variables are partitioned into blocks and each block shares the same error variance. For any such groupwise equal variances assumption, we characterize when two DAGs give rise to identical Gaussian linear structural equation models. Furthermore, we show how the resulting distributional equivalence classes may be represented using a completed partially directed acyclic graph (CPDAG), and we give an algorithm to efficiently construct this CPDAG. In a simulation study, we demonstrate that greedy search provides an effective way to learn the CPDAG and exploit partial knowledge about homoscedasticity of errors in structural equation models.
递归线性结构方程模型和相关的有向无环图(DAG)在因果发现中发挥着重要作用。这类模型的经典可识别性结果表明,当只有观测数据时,每个 DAG 只能识别到马尔可夫等价类。相反,最近的研究表明,如果模型中的误差是同方差的,即所有误差都具有相同的方差,那么 DAG 就可以唯一地识别出来。这种等方差假设产生的方法,如果合适,具有很强的可扩展性,同时也揭示了因果发现中基本的信息论极限和最优性。在本文中,我们填补了之前考虑的两种情况之间的空白,即假设误差方差要么任意,要么全部相等。具体来说,我们提出了一个部分同方差的框架,在这个框架中,变量被划分成块,每个块共享相同的误差方差。对于任何这样的分组等方差假设,我们都会描述两个 DAG 何时会产生相同的高斯线性结构方程模型。此外,我们还展示了如何用一个完整的部分有向无环图(CPDAG)来表示所产生的分布等价类,并给出了一种高效构建 CPDAG 的算法。在模拟研究中,我们证明了贪婪搜索是学习 CPDAG 和利用结构方程模型中误差同方差性部分知识的有效方法。
{"title":"Partial Homoscedasticity in Causal Discovery With Linear Models","authors":"Jun Wu;Mathias Drton","doi":"10.1109/JSAIT.2023.3328476","DOIUrl":"10.1109/JSAIT.2023.3328476","url":null,"abstract":"Recursive linear structural equation models and the associated directed acyclic graphs (DAGs) play an important role in causal discovery. The classic identifiability result for this class of models states that when only observational data is available, each DAG can be identified only up to a Markov equivalence class. In contrast, recent work has shown that the DAG can be uniquely identified if the errors in the model are homoscedastic, i.e., all have the same variance. This equal variance assumption yields methods that, if appropriate, are highly scalable and also sheds light on fundamental information-theoretic limits and optimality in causal discovery. In this paper, we fill the gap that exists between the two previously considered cases, which assume the error variances to be either arbitrary or all equal. Specifically, we formulate a framework of partial homoscedasticity, in which the variables are partitioned into blocks and each block shares the same error variance. For any such groupwise equal variances assumption, we characterize when two DAGs give rise to identical Gaussian linear structural equation models. Furthermore, we show how the resulting distributional equivalence classes may be represented using a completed partially directed acyclic graph (CPDAG), and we give an algorithm to efficiently construct this CPDAG. In a simulation study, we demonstrate that greedy search provides an effective way to learn the CPDAG and exploit partial knowledge about homoscedasticity of errors in structural equation models.","PeriodicalId":73295,"journal":{"name":"IEEE journal on selected areas in information theory","volume":"4 ","pages":"639-650"},"PeriodicalIF":0.0,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10304270","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135360763","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Online Energy Minimization Under a Peak Age of Information Constraint 信息约束峰值时代下的在线能量最小化
Pub Date : 2023-11-01 DOI: 10.1109/JSAIT.2023.3329034
Kumar Saurav;Rahul Vaze
We consider a node where packets of fixed size (inbits) are generated at arbitrary intervals. The node is required to maintain the peak age of information (AoI) at the monitor below a threshold by transmitting potentially a subset of the generated packets. At any time, depending on the packet availability and the current AoI, the node can choose which packet to transmit, and at what transmission speed (in bits per second). Power consumption is a monotonically increasing convex function of the transmission speed. In this paper, for any given time horizon, the objective is to find a causal policy that minimizes the total energy consumption while satisfying the peak AoI constraint. We consider competitive ratio as the performance metric, that is defined as the ratio of the expected cost of a causal policy, and the expected cost of an optimal offline policy that knows the input (packet generation times) in advance. We first derive a lower bound on the competitive ratio of all causal policies, in terms of the system parameters (such as power function, packet size and peak AoI threshold), and then propose a particular policy for which we show that its competitive ratio has similar order of dependence on the system parameters as the derived lower bound.
我们考虑一个节点,其中以任意间隔生成固定大小(inbits)的数据包。节点需要通过传输可能生成的数据包的子集来保持监视器上的峰值信息年龄(AoI)低于阈值。在任何时候,根据数据包的可用性和当前AoI,节点可以选择传输哪个数据包,以及以什么传输速度(以每秒位数为单位)。功耗是传输速度单调递增的凸函数。在本文中,对于任何给定的时间范围,目标是找到一个在满足峰值AoI约束的情况下最小化总能耗的因果策略。我们将竞争率作为性能指标,它被定义为因果策略的预期成本与预先知道输入(数据包生成时间)的最优离线策略的预期成本之比。我们首先根据系统参数(如幂函数、数据包大小和峰值AoI阈值)推导出所有因果策略竞争率的下界,然后提出一个特定的策略,我们表明其竞争率对系统参数的依赖程度与推导出的下界相似。
{"title":"Online Energy Minimization Under a Peak Age of Information Constraint","authors":"Kumar Saurav;Rahul Vaze","doi":"10.1109/JSAIT.2023.3329034","DOIUrl":"https://doi.org/10.1109/JSAIT.2023.3329034","url":null,"abstract":"We consider a node where packets of fixed size (inbits) are generated at arbitrary intervals. The node is required to maintain the peak age of information (AoI) at the monitor below a threshold by transmitting potentially a subset of the generated packets. At any time, depending on the packet availability and the current AoI, the node can choose which packet to transmit, and at what transmission speed (in bits per second). Power consumption is a monotonically increasing convex function of the transmission speed. In this paper, for any given time horizon, the objective is to find a causal policy that minimizes the total energy consumption while satisfying the peak AoI constraint. We consider competitive ratio as the performance metric, that is defined as the ratio of the expected cost of a causal policy, and the expected cost of an optimal offline policy that knows the input (packet generation times) in advance. We first derive a lower bound on the competitive ratio of all causal policies, in terms of the system parameters (such as power function, packet size and peak AoI threshold), and then propose a particular policy for which we show that its competitive ratio has similar order of dependence on the system parameters as the derived lower bound.","PeriodicalId":73295,"journal":{"name":"IEEE journal on selected areas in information theory","volume":"4 ","pages":"579-590"},"PeriodicalIF":0.0,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138431090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Statistical Age-of-Information Bounds for Parallel Systems: When Do Independent Channels Make a Difference? 并行系统的统计信息年龄界限:独立通道何时起作用?
Pub Date : 2023-10-31 DOI: 10.1109/JSAIT.2023.3328766
Markus Fidler;Jaya Prakash Champati;Joerg Widmer;Mahsa Noroozi
This paper contributes tail bounds of the age-of-information of a general class of parallel systems and explores their potential. Parallel systems arise in relevant cases, such as in multi-band mobile networks, multi-technology wireless access, or multi-path protocols, just to name a few. Typically, control over each communication channel is limited and random service outages and congestion cause buffering that impairs the age-of-information. The parallel use of independent channels promises a remedy, since outages on one channel may be compensated for by another. Surprisingly, for the well-known case of $text{M}mid text{M}mid 1$ queues we find the opposite: pooling capacity in one channel performs better than a parallel system with the same total capacity. A generalization is not possible since there are no solutions for other types of parallel queues at hand. In this work, we prove a dual representation of age-of-information in min-plus algebra that connects to queueing models known from the theory of effective bandwidth/capacity and the stochastic network calculus. Exploiting these methods, we derive tail bounds of the age-of-information of $text{G}mid text{G}mid 1$ queues. Tail bounds of the age-of-information of independent parallel queues follow readily. In addition to parallel classical queues, we investigate Markov channels where, depending on the memory of the channel, we show the true advantage of parallel systems. We continue to investigate this new finding and provide insight into when capacity should be pooled in one channel or when independent parallel channels perform better. We complement our analysis with simulation results and evaluate different update policies, scheduling policies, and the use of heterogeneous channels that is most relevant for latest multi-band networks.
本文给出了一类一般并行系统的信息年龄的尾界,并探讨了它们的潜力。并行系统出现在相关情况下,例如在多频段移动网络、多技术无线接入或多路径协议中,仅举几例。通常,对每个通信通道的控制是有限的,随机的服务中断和拥塞会导致缓冲,从而损害信息的年龄。独立通道的并行使用提供了一种补救措施,因为一个通道的中断可以由另一个通道补偿。令人惊讶的是,对于众所周知的M|M|1队列,我们发现了相反的情况:一个通道中的池化容量比具有相同总容量的并行系统表现得更好。泛化是不可能的,因为手头没有其他类型的并行队列的解决方案。在这项工作中,我们证明了最小加代数中信息年龄的对偶表示,该表示连接到从有效带宽/容量理论和随机网络演算中已知的排队模型。利用这些方法,我们得到了G|G|1队列信息年龄的尾界。独立并行队列的信息年龄的尾界很容易出现。除了并行的经典队列,我们还研究了马尔可夫通道,根据通道的内存,我们展示了并行系统的真正优势。我们将继续研究这一新发现,并深入了解何时应该将容量集中在一个通道中,或者何时独立的并行通道性能更好。我们用仿真结果补充了我们的分析,并评估了与最新多频段网络最相关的不同更新策略、调度策略和异构信道的使用。
{"title":"Statistical Age-of-Information Bounds for Parallel Systems: When Do Independent Channels Make a Difference?","authors":"Markus Fidler;Jaya Prakash Champati;Joerg Widmer;Mahsa Noroozi","doi":"10.1109/JSAIT.2023.3328766","DOIUrl":"10.1109/JSAIT.2023.3328766","url":null,"abstract":"This paper contributes tail bounds of the age-of-information of a general class of parallel systems and explores their potential. Parallel systems arise in relevant cases, such as in multi-band mobile networks, multi-technology wireless access, or multi-path protocols, just to name a few. Typically, control over each communication channel is limited and random service outages and congestion cause buffering that impairs the age-of-information. The parallel use of independent channels promises a remedy, since outages on one channel may be compensated for by another. Surprisingly, for the well-known case of \u0000<inline-formula> <tex-math>$text{M}mid text{M}mid 1$ </tex-math></inline-formula>\u0000 queues we find the opposite: pooling capacity in one channel performs better than a parallel system with the same total capacity. A generalization is not possible since there are no solutions for other types of parallel queues at hand. In this work, we prove a dual representation of age-of-information in min-plus algebra that connects to queueing models known from the theory of effective bandwidth/capacity and the stochastic network calculus. Exploiting these methods, we derive tail bounds of the age-of-information of \u0000<inline-formula> <tex-math>$text{G}mid text{G}mid 1$ </tex-math></inline-formula>\u0000 queues. Tail bounds of the age-of-information of independent parallel queues follow readily. In addition to parallel classical queues, we investigate Markov channels where, depending on the memory of the channel, we show the true advantage of parallel systems. We continue to investigate this new finding and provide insight into when capacity should be pooled in one channel or when independent parallel channels perform better. We complement our analysis with simulation results and evaluate different update policies, scheduling policies, and the use of heterogeneous channels that is most relevant for latest multi-band networks.","PeriodicalId":73295,"journal":{"name":"IEEE journal on selected areas in information theory","volume":"4 ","pages":"591-606"},"PeriodicalIF":0.0,"publicationDate":"2023-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10302220","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135262828","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Learning Linear Gaussian Polytree Models With Interventions 学习线性高斯多树模型与干预
Pub Date : 2023-10-30 DOI: 10.1109/JSAIT.2023.3328429
Daniele Tramontano;L. Waldmann;M. Drton;Eliana Duarte
We present a consistent and highly scalable local approach to learn the causal structure of a linear Gaussian polytree using data from interventional experiments with known intervention targets. Our methods first learn the skeleton of the polytree and then orient its edges. The output is a CPDAG representing the interventional equivalence class of the polytree of the true underlying distribution. The skeleton and orientation recovery procedures we use rely on second order statistics and low-dimensional marginal distributions. We assess the performance of our methods under different scenarios in synthetic data sets and apply our algorithm to learn a polytree in a gene expression interventional data set. Our simulation studies demonstrate that our approach is fast, has good accuracy in terms of structural Hamming distance, and handles problems with thousands of nodes.
我们提出了一个一致的和高度可扩展的局部方法来学习线性高斯多树的因果结构,使用来自已知干预目标的干预实验的数据。我们的方法首先学习多树的骨架,然后定位它的边缘。输出是一个CPDAG,表示真实底层分布的多树的介入等价类。我们使用的骨架和方向恢复程序依赖于二阶统计量和低维边际分布。我们在合成数据集的不同场景下评估了我们的方法的性能,并将我们的算法应用于基因表达干预数据集中的多树学习。我们的仿真研究表明,我们的方法速度快,在结构汉明距离方面具有良好的精度,并且可以处理数千个节点的问题。
{"title":"Learning Linear Gaussian Polytree Models With Interventions","authors":"Daniele Tramontano;L. Waldmann;M. Drton;Eliana Duarte","doi":"10.1109/JSAIT.2023.3328429","DOIUrl":"https://doi.org/10.1109/JSAIT.2023.3328429","url":null,"abstract":"We present a consistent and highly scalable local approach to learn the causal structure of a linear Gaussian polytree using data from interventional experiments with known intervention targets. Our methods first learn the skeleton of the polytree and then orient its edges. The output is a CPDAG representing the interventional equivalence class of the polytree of the true underlying distribution. The skeleton and orientation recovery procedures we use rely on second order statistics and low-dimensional marginal distributions. We assess the performance of our methods under different scenarios in synthetic data sets and apply our algorithm to learn a polytree in a gene expression interventional data set. Our simulation studies demonstrate that our approach is fast, has good accuracy in terms of structural Hamming distance, and handles problems with thousands of nodes.","PeriodicalId":73295,"journal":{"name":"IEEE journal on selected areas in information theory","volume":"4 ","pages":"569-578"},"PeriodicalIF":0.0,"publicationDate":"2023-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134795150","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Scheduling to Minimize Age of Information With Multiple Sources 调度以最小化多源信息的年龄
Pub Date : 2023-10-12 DOI: 10.1109/JSAIT.2023.3322077
Kumar Saurav;Rahul Vaze
Finding an optimal/near-optimal scheduling algorithm to minimize the age of information (AoI) in a multi-source G/G/1 system is well-known to be a hard problem, more so if there is a transmission (energy) cost. In this paper, we consider a multi-source G/G/1 system and the goal is to minimize a weighted sum of the AoI of all sources, subject to an energy cost constraint. We propose a novel doubly randomized non-preemptive scheduling algorithm and show that in the non-preemptive setting, where an update under transmission cannot be preempted, the competitive ratio of the proposed algorithm is at most 3 plus the maximum of the ratio of the variance and the mean of the update inter-generation time distribution of sources. Notably, the competitive ratio is independent of the number of sources, or their service time distributions, and is at most 4 for several common update inter-generation time distributions such as exponential, uniform and Rayleigh. For preemptive setting, where an update under transmission can be preempted, we consider a multi-source G/M/1 system and show that the proposed non-preemptive algorithm has competitive ratio at most 5 plus the maximum of the ratio of the variance and the mean of the update inter-generation time distribution of sources.
在多源G/G/1系统中找到最小化信息年龄(AoI)的最优/接近最优调度算法是一个众所周知的难题,如果存在传输(能量)成本,则更是如此。在本文中,我们考虑了一个多源G/G/1系统,其目标是在能源成本约束下最小化所有源AoI的加权总和。提出了一种新的双随机非抢占调度算法,并证明了在传输更新不能被抢占的情况下,该算法的竞争比不超过3加上源更新代际时间分布方差与均值之比的最大值。值得注意的是,竞争比与源的数量或它们的服务时间分布无关,对于指数、均匀和瑞利等几种常见的更新代际时间分布,竞争比最多为4。考虑多源G/M/1系统,在传输更新可以被抢占的情况下,本文提出的非抢占算法的竞争比不超过5加上源更新代际时间分布方差与均值之比的最大值。
{"title":"Scheduling to Minimize Age of Information With Multiple Sources","authors":"Kumar Saurav;Rahul Vaze","doi":"10.1109/JSAIT.2023.3322077","DOIUrl":"https://doi.org/10.1109/JSAIT.2023.3322077","url":null,"abstract":"Finding an optimal/near-optimal scheduling algorithm to minimize the age of information (AoI) in a multi-source G/G/1 system is well-known to be a hard problem, more so if there is a transmission (energy) cost. In this paper, we consider a multi-source G/G/1 system and the goal is to minimize a weighted sum of the AoI of all sources, subject to an energy cost constraint. We propose a novel doubly randomized non-preemptive scheduling algorithm and show that in the non-preemptive setting, where an update under transmission cannot be preempted, the competitive ratio of the proposed algorithm is at most 3 plus the maximum of the ratio of the variance and the mean of the update inter-generation time distribution of sources. Notably, the competitive ratio is independent of the number of sources, or their service time distributions, and is at most 4 for several common update inter-generation time distributions such as exponential, uniform and Rayleigh. For preemptive setting, where an update under transmission can be preempted, we consider a multi-source G/M/1 system and show that the proposed non-preemptive algorithm has competitive ratio at most 5 plus the maximum of the ratio of the variance and the mean of the update inter-generation time distribution of sources.","PeriodicalId":73295,"journal":{"name":"IEEE journal on selected areas in information theory","volume":"4 ","pages":"539-550"},"PeriodicalIF":0.0,"publicationDate":"2023-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"109157409","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Learning and Communications Co-Design for Remote Inference Systems: Feature Length Selection and Transmission Scheduling 远程推理系统的学习和通信协同设计:特征长度选择和传输调度
Pub Date : 2023-10-06 DOI: 10.1109/JSAIT.2023.3322620
Md Kamran Chowdhury Shisher;Bo Ji;I-Hong Hou;Yin Sun
In this paper, we consider a remote inference system, where a neural network is used to infer a time-varying target (e.g., robot movement), based on features (e.g., video clips) that are progressively received from a sensing node (e.g., a camera). Each feature is a temporal sequence of sensory data. The inference error is determined by (i) the timeliness and (ii) the sequence length of the feature, where we use Age of Information (AoI) as a metric for timeliness. While a longer feature can typically provide better inference performance, it often requires more channel resources for sending the feature. To minimize the time-averaged inference error, we study a learning and communication co-design problem that jointly optimizes feature length selection and transmission scheduling. When there is a single sensor-predictor pair and a single channel, we develop low-complexity optimal co-designs for both the cases of time-invariant and time-variant feature length. When there are multiple sensor-predictor pairs and multiple channels, the co-design problem becomes a restless multi-arm multi-action bandit problem that is PSPACE-hard. For this setting, we design a low-complexity algorithm to solve the problem. Trace-driven evaluations demonstrate the potential of these co-designs to reduce inference error by up to 10000 times.
在本文中,我们考虑了一个远程推理系统,其中神经网络用于根据从感测节点(例如相机)逐渐接收到的特征(例如视频剪辑)来推断时变目标(例如机器人运动)。每个特征都是感官数据的时间序列。推断误差由(i)特征的及时性和(ii)序列长度决定,其中我们使用信息年龄(AoI)作为及时性的度量。虽然较长的特征通常可以提供更好的推理性能,但发送该特征通常需要更多的信道资源。为了最小化时间平均推断误差,我们研究了一个学习和通信协同设计问题,该问题联合优化了特征长度选择和传输调度。当存在单个传感器预测器对和单个通道时,我们针对时不变和时变特征长度的情况开发了低复杂度的最优联合设计。当存在多个传感器预测器对和多个通道时,协同设计问题变成了PSPACE难以解决的多臂多动作土匪问题。对于这种设置,我们设计了一个低复杂度的算法来解决这个问题。跟踪驱动的评估证明了这些协同设计可以将推理误差减少10000倍的潜力。
{"title":"Learning and Communications Co-Design for Remote Inference Systems: Feature Length Selection and Transmission Scheduling","authors":"Md Kamran Chowdhury Shisher;Bo Ji;I-Hong Hou;Yin Sun","doi":"10.1109/JSAIT.2023.3322620","DOIUrl":"https://doi.org/10.1109/JSAIT.2023.3322620","url":null,"abstract":"In this paper, we consider a remote inference system, where a neural network is used to infer a time-varying target (e.g., robot movement), based on features (e.g., video clips) that are progressively received from a sensing node (e.g., a camera). Each feature is a temporal sequence of sensory data. The inference error is determined by (i) the timeliness and (ii) the sequence length of the feature, where we use Age of Information (AoI) as a metric for timeliness. While a longer feature can typically provide better inference performance, it often requires more channel resources for sending the feature. To minimize the time-averaged inference error, we study a learning and communication co-design problem that jointly optimizes feature length selection and transmission scheduling. When there is a single sensor-predictor pair and a single channel, we develop low-complexity optimal co-designs for both the cases of time-invariant and time-variant feature length. When there are multiple sensor-predictor pairs and multiple channels, the co-design problem becomes a restless multi-arm multi-action bandit problem that is PSPACE-hard. For this setting, we design a low-complexity algorithm to solve the problem. Trace-driven evaluations demonstrate the potential of these co-designs to reduce inference error by up to 10000 times.","PeriodicalId":73295,"journal":{"name":"IEEE journal on selected areas in information theory","volume":"4 ","pages":"524-538"},"PeriodicalIF":0.0,"publicationDate":"2023-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50354744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Cache-Aided Communication Schemes via Combinatorial Designs and Their q-Analogs 基于组合设计的缓存辅助通信方案及其q-类比
Pub Date : 2023-09-29 DOI: 10.1109/JSAIT.2023.3320068
Shailja Agrawal;K. V. Sushena Sree;Prasad Krishnan;Abhinav Vaishya;Srikar Kale
We consider the standard broadcast setup with a single server broadcasting information to a number of clients, each of which contains local storage (called cache) of some size, which can store some parts of the available files at the server. The centralized coded caching framework, consists of a caching phase and a delivery phase, both of which are carefully designed in order to use the cache and the channel together optimally. In prior literature, various combinatorial structures have been used to construct coded caching schemes. One of the chief drawbacks of many of these existing constructions is the large subpacketization level, which denotes the number of times a file should be split for the schemes to provide coding gain. In this work, using a new binary matrix model, we present several novel constructions for coded caching based on the various types of combinatorial designs and their $q$ -analogs, which are also called subspace designs. While most of the schemes constructed in this work (based on existing designs) have a high cache requirement, they provide a rate that is either constant or decreasing, and moreover require competitively small levels of subpacketization, which is an extremely important feature in practical applications of coded caching. We also apply our constructions to the distributed computing framework of MapReduce, which consists of three phases, the Map phase, the Shuffle phase and the Reduce phase. Using our binary matrix framework, we present a new simple generic coded data shuffling scheme. Employing our designs-based constructions in conjunction with this new shuffling scheme, we obtain new coded computing schemes which have low file complexity, with marginally higher communication load compared to the optimal scheme for equivalent parameters. We show that our schemes can neatly extend to the scenario with full and partial stragglers also.
我们考虑的标准广播设置是,单个服务器向多个客户机广播信息,每个客户机都包含一定大小的本地存储(称为缓存),可以在服务器上存储可用文件的某些部分。集中式编码缓存框架由缓存阶段和交付阶段组成,这两个阶段都经过精心设计,以便以最佳方式同时使用缓存和通道。在先前的文献中,已经使用各种组合结构来构建编码缓存方案。许多现有结构的主要缺点之一是大的子分组级别,这表示为了提供编码增益,方案应该分割文件的次数。在这项工作中,我们使用一个新的二进制矩阵模型,基于不同类型的组合设计和它们的$q$类似物,提出了几种新的编码缓存结构,这些结构也被称为子空间设计。虽然在这项工作中构建的大多数方案(基于现有设计)都有很高的缓存要求,但它们提供的速率要么是恒定的,要么是递减的,而且需要具有竞争力的小级别的子分组,这是编码缓存实际应用中的一个极其重要的特征。我们还将我们的结构应用于MapReduce的分布式计算框架,该框架由三个阶段组成,Map阶段,Shuffle阶段和Reduce阶段。利用二元矩阵框架,提出了一种新的简单的通用编码数据变换方案。采用基于设计的结构与这种新的变换方案相结合,我们获得了新的编码计算方案,该方案具有较低的文件复杂度,与等效参数的最优方案相比,通信负载略高。我们还证明了我们的方案可以很好地扩展到具有完全和部分离散体的情况。
{"title":"Cache-Aided Communication Schemes via Combinatorial Designs and Their q-Analogs","authors":"Shailja Agrawal;K. V. Sushena Sree;Prasad Krishnan;Abhinav Vaishya;Srikar Kale","doi":"10.1109/JSAIT.2023.3320068","DOIUrl":"https://doi.org/10.1109/JSAIT.2023.3320068","url":null,"abstract":"We consider the standard broadcast setup with a single server broadcasting information to a number of clients, each of which contains local storage (called \u0000<italic>cache</i>\u0000) of some size, which can store some parts of the available files at the server. The centralized coded caching framework, consists of a caching phase and a delivery phase, both of which are carefully designed in order to use the cache and the channel together optimally. In prior literature, various combinatorial structures have been used to construct coded caching schemes. One of the chief drawbacks of many of these existing constructions is the large subpacketization level, which denotes the number of times a file should be split for the schemes to provide coding gain. In this work, using a new binary matrix model, we present several novel constructions for coded caching based on the various types of combinatorial designs and their \u0000<inline-formula> <tex-math>$q$ </tex-math></inline-formula>\u0000-analogs, which are also called subspace designs. While most of the schemes constructed in this work (based on existing designs) have a high cache requirement, they provide a rate that is either constant or decreasing, and moreover require competitively small levels of subpacketization, which is an extremely important feature in practical applications of coded caching. We also apply our constructions to the distributed computing framework of MapReduce, which consists of three phases, the Map phase, the Shuffle phase and the Reduce phase. Using our binary matrix framework, we present a new simple generic coded data shuffling scheme. Employing our designs-based constructions in conjunction with this new shuffling scheme, we obtain new coded computing schemes which have low file complexity, with marginally higher communication load compared to the optimal scheme for equivalent parameters. We show that our schemes can neatly extend to the scenario with full and partial stragglers also.","PeriodicalId":73295,"journal":{"name":"IEEE journal on selected areas in information theory","volume":"4 ","pages":"551-568"},"PeriodicalIF":0.0,"publicationDate":"2023-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134795149","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Revisit of Linear Network Error Correction Coding 线性网络纠错编码的再认识
Pub Date : 2023-09-22 DOI: 10.1109/JSAIT.2023.3317941
Xuan Guang;Raymond W. Yeung
We consider linear network erro correction (LNEC) coding when errors may occur on the edges of a communication network of which the topology is known. In this paper, we first present a framework of additive adversarial network for LNEC coding, and then prove the equivalence of two well-known LNEC coding approaches, which can be unified under this framework. Furthermore, by developing a graph-theoretic approach, we obtain a significantly enhanced characterization of the error correction capability of LNEC codes in terms of the minimum distances at the sink nodes. Specifically, in order to ensure that an LNEC code can correct up to $r$ errors at a sink node $t$ , it suffices to ensure that this code can correct every error vector in a reduced set of error vectors; and on the other hand, this LNEC code in fact can correct every error vector in an enlarged set of error vectors. In general, the size of this reduced set is considerably smaller than the number of error vectors with Hamming weight not larger than $r$ , and the size of this enlarged set is considerably larger than the same number. This result has the important implication that the computational complexities for decoding and for code construction can be significantly reduced.
当拓扑结构已知的通信网络的边缘可能出现错误时,我们考虑线性网络纠错(LNEC)编码。在本文中,我们首先提出了一个用于LNEC编码的加性对抗性网络框架,然后证明了两种众所周知的LNEC编码方法的等价性,它们可以在该框架下统一。此外,通过开发图论方法,我们获得了LNEC码在汇聚节点处的最小距离方面的纠错能力的显著增强的表征。具体地,为了确保LNEC代码能够在汇聚节点$t$处校正高达$r$的错误,只要确保该代码能够校正误差向量的缩减集合中的每个误差向量就足够了;而另一方面该LNEC码实际上可以校正放大的一组误差矢量中的每个误差矢量。通常,该缩减集的大小明显小于汉明权重不大于$r$的误差向量的数量,并且该放大集的大小显著大于相同数量。这一结果具有重要意义,即解码和代码构造的计算复杂性可以显著降低。
{"title":"A Revisit of Linear Network Error Correction Coding","authors":"Xuan Guang;Raymond W. Yeung","doi":"10.1109/JSAIT.2023.3317941","DOIUrl":"https://doi.org/10.1109/JSAIT.2023.3317941","url":null,"abstract":"We consider linear network erro correction (LNEC) coding when errors may occur on the edges of a communication network of which the topology is known. In this paper, we first present a framework of additive adversarial network for LNEC coding, and then prove the equivalence of two well-known LNEC coding approaches, which can be unified under this framework. Furthermore, by developing a graph-theoretic approach, we obtain a significantly enhanced characterization of the error correction capability of LNEC codes in terms of the minimum distances at the sink nodes. Specifically, in order to ensure that an LNEC code can correct up to \u0000<inline-formula> <tex-math>$r$ </tex-math></inline-formula>\u0000 errors at a sink node \u0000<inline-formula> <tex-math>$t$ </tex-math></inline-formula>\u0000, it suffices to ensure that this code can correct every error vector in a reduced set of error vectors; and on the other hand, this LNEC code in fact can correct every error vector in an enlarged set of error vectors. In general, the size of this reduced set is considerably smaller than the number of error vectors with Hamming weight not larger than \u0000<inline-formula> <tex-math>$r$ </tex-math></inline-formula>\u0000, and the size of this enlarged set is considerably larger than the same number. This result has the important implication that the computational complexities for decoding and for code construction can be significantly reduced.","PeriodicalId":73295,"journal":{"name":"IEEE journal on selected areas in information theory","volume":"4 ","pages":"514-523"},"PeriodicalIF":0.0,"publicationDate":"2023-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50354743","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Iterative Broadband Source Localization 迭代宽带源定位
Pub Date : 2023-09-19 DOI: 10.1109/JSAIT.2023.3317094
Coleman DeLude;Rakshith S. Srinivasa;Santhosh Karnik;Christopher Hood;Mark A. Davenport;Justin Romberg
In this paper we consider the problem of localizing a set of broadband sources from a finite window of measurements. In the case of narrowband sources this can be reduced to the problem of spectral line estimation, where our goal is simply to estimate the active frequencies from a weighted mixture of pure sinusoids. There exists a plethora of modern and classical methods that effectively solve this problem. However, for a wide variety of applications the underlying sources are not narrowband and can have an appreciable amount of bandwidth. In this work, we extend classical greedy algorithms for sparse recovery (e.g., orthogonal matching pursuit) to localize broadband sources. We leverage models for samples of broadband signals based on a union of Slepian subspaces, which are more aptly suited for dealing with spectral leakage and dynamic range disparities. We show that by using these models, our adapted algorithms can successfully localize broadband sources under a variety of adverse operating scenarios. Furthermore, we show that our algorithms outperform complementary methods that use more standard Fourier models. We also show that we can perform estimation from compressed measurements with little loss in fidelity as long as the number of measurements are on the order of the signal’s implicit degrees of freedom. We conclude with an in-depth application of these ideas to the problem of localization in multi-sensor arrays.
在本文中,我们考虑从有限的测量窗口定位一组宽带源的问题。在窄带源的情况下,这可以简化为谱线估计问题,其中我们的目标只是从纯正弦曲线的加权混合物中估计有效频率。有大量的现代和古典方法可以有效地解决这个问题。然而,对于各种各样的应用,底层源不是窄带的,并且可以具有可观的带宽。在这项工作中,我们扩展了用于稀疏恢复的经典贪婪算法(例如,正交匹配追踪)来定位宽带源。我们利用基于Slepian子空间联合的宽带信号样本模型,这些模型更适合处理频谱泄漏和动态范围差异。我们表明,通过使用这些模型,我们的自适应算法可以在各种不利的操作场景下成功地定位宽带源。此外,我们还表明,我们的算法优于使用更多标准傅立叶模型的互补方法。我们还表明,只要测量次数在信号隐含自由度的数量级上,我们就可以从压缩测量中进行估计,而保真度损失很小。最后,我们将这些思想深入应用于多传感器阵列的定位问题。
{"title":"Iterative Broadband Source Localization","authors":"Coleman DeLude;Rakshith S. Srinivasa;Santhosh Karnik;Christopher Hood;Mark A. Davenport;Justin Romberg","doi":"10.1109/JSAIT.2023.3317094","DOIUrl":"https://doi.org/10.1109/JSAIT.2023.3317094","url":null,"abstract":"In this paper we consider the problem of localizing a set of broadband sources from a finite window of measurements. In the case of narrowband sources this can be reduced to the problem of spectral line estimation, where our goal is simply to estimate the active frequencies from a weighted mixture of pure sinusoids. There exists a plethora of modern and classical methods that effectively solve this problem. However, for a wide variety of applications the underlying sources are not narrowband and can have an appreciable amount of bandwidth. In this work, we extend classical greedy algorithms for sparse recovery (e.g., orthogonal matching pursuit) to localize broadband sources. We leverage models for samples of broadband signals based on a union of Slepian subspaces, which are more aptly suited for dealing with spectral leakage and dynamic range disparities. We show that by using these models, our adapted algorithms can successfully localize broadband sources under a variety of adverse operating scenarios. Furthermore, we show that our algorithms outperform complementary methods that use more standard Fourier models. We also show that we can perform estimation from compressed measurements with little loss in fidelity as long as the number of measurements are on the order of the signal’s implicit degrees of freedom. We conclude with an in-depth application of these ideas to the problem of localization in multi-sensor arrays.","PeriodicalId":73295,"journal":{"name":"IEEE journal on selected areas in information theory","volume":"4 ","pages":"453-469"},"PeriodicalIF":0.0,"publicationDate":"2023-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50354740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Efficient Strategy to Count Cycles in the Tanner Graph of Quasi-Cyclic LDPC Codes 准循环LDPC码Tanner图中一种有效的循环计数策略
Pub Date : 2023-09-14 DOI: 10.1109/JSAIT.2023.3315585
Anthony Gómez-Fonseca;Roxana Smarandache;David G. M. Mitchell
In this paper, we present an efficient strategy to enumerate the number of $k$ -cycles, $gleq k < 2g$ , in the Tanner graph of a quasi-cyclic low-density parity-check (QC-LDPC) code with girth $g$ using its polynomial parity-check matrix $H$ . This strategy works for both $(d_{v},d_{c})$ -regular and irregular QC-LDPC codes. In this approach, we note that the $m$ th power of the polynomial adjacency matrix can be used to describe walks of length $m$ in the protograph and can therefore be sufficiently described by the matrices $B_{m}(H) triangleq (HH^{mathsf {T}})^{lfloor {m/2}rfloor }H^{(mmod 2)}$ , where $mgeq 0$ . We provide formulas for the number of $k$ -cycles, $mathcal {N}_{k}$ , by just taking into account repetitions in some multisets constructed from the matrices $B_{m}(H)$ . This approach is shown to have low complexity. For example, in the case of QC-LDPC codes based on the $3times n_{v}$ fully-connected protograph, the complexity of determining $mathcal {N}_{k}$ , for $k=4,6,8,10$ and 12, is $O(n_{v}^{2}log (N))$ , $O(n_{v}^{2}log (n_{v})log (N))$ , $O(n_{v}^{4}log ^{4}(n_{v})log (N))$ , $O(n_{v}^{4}log (n_{v})log (N))$ and $O(n_{v}^{6}log ^{6}(n_{v})log (N))$ , respectively. The complexity, depending logarithmically on the lifting factor $N$ , gives our approach, to the best of our knowledge, a significant advantage over previous works on the cycle distribution of QC-LDPC codes.
在本文中,我们提出了一种有效的策略来枚举$k$-循环的数量,$gleqk<;在周长为$g$的准循环低密度奇偶校验(QC-LDPC)码的Tanner图中。该策略适用于$(d_{v},d_{c})$正则和非正则QC-LDPC码。在这种方法中,我们注意到多项式邻接矩阵的$m$次方可以用来描述原图中长度为$m$的走,因此可以用矩阵$B_{m}(H)tatragleq(HH^{mathsf{T}})^{lfloor{m/2}rfloor}H^{(mmod 2)}$来充分描述,其中$mgeq 0$。我们提供了$k$-循环数的公式,$mathcal{N}_{k} 通过仅考虑由矩阵$B_{m}(H)$构造的一些多集中的重复。这种方法被证明具有较低的复杂性。例如,在基于$3times_{v}$全连通原图的QC-LDPC码的情况下,确定$mathcal{N}_{k} 对于$k=4,6,8,10$和12,$是$O(n_{v}^{2}log(n))$、$O(n-{v}^}2}log(n_{v}})log(n))$。复杂性对数依赖于提升因子$N$,据我们所知,与以前关于QC-LDPC码的周期分布的工作相比,我们的方法具有显著的优势。
{"title":"An Efficient Strategy to Count Cycles in the Tanner Graph of Quasi-Cyclic LDPC Codes","authors":"Anthony Gómez-Fonseca;Roxana Smarandache;David G. M. Mitchell","doi":"10.1109/JSAIT.2023.3315585","DOIUrl":"https://doi.org/10.1109/JSAIT.2023.3315585","url":null,"abstract":"In this paper, we present an efficient strategy to enumerate the number of \u0000<inline-formula> <tex-math>$k$ </tex-math></inline-formula>\u0000-cycles, \u0000<inline-formula> <tex-math>$gleq k &lt; 2g$ </tex-math></inline-formula>\u0000, in the Tanner graph of a quasi-cyclic low-density parity-check (QC-LDPC) code with girth \u0000<inline-formula> <tex-math>$g$ </tex-math></inline-formula>\u0000 using its polynomial parity-check matrix \u0000<inline-formula> <tex-math>$H$ </tex-math></inline-formula>\u0000. This strategy works for both \u0000<inline-formula> <tex-math>$(d_{v},d_{c})$ </tex-math></inline-formula>\u0000-regular and irregular QC-LDPC codes. In this approach, we note that the \u0000<inline-formula> <tex-math>$m$ </tex-math></inline-formula>\u0000th power of the polynomial adjacency matrix can be used to describe walks of length \u0000<inline-formula> <tex-math>$m$ </tex-math></inline-formula>\u0000 in the protograph and can therefore be sufficiently described by the matrices \u0000<inline-formula> <tex-math>$B_{m}(H) triangleq (HH^{mathsf {T}})^{lfloor {m/2}rfloor }H^{(mmod 2)}$ </tex-math></inline-formula>\u0000, where \u0000<inline-formula> <tex-math>$mgeq 0$ </tex-math></inline-formula>\u0000. We provide formulas for the number of \u0000<inline-formula> <tex-math>$k$ </tex-math></inline-formula>\u0000-cycles, \u0000<inline-formula> <tex-math>$mathcal {N}_{k}$ </tex-math></inline-formula>\u0000, by just taking into account repetitions in some multisets constructed from the matrices \u0000<inline-formula> <tex-math>$B_{m}(H)$ </tex-math></inline-formula>\u0000. This approach is shown to have low complexity. For example, in the case of QC-LDPC codes based on the \u0000<inline-formula> <tex-math>$3times n_{v}$ </tex-math></inline-formula>\u0000 fully-connected protograph, the complexity of determining \u0000<inline-formula> <tex-math>$mathcal {N}_{k}$ </tex-math></inline-formula>\u0000, for \u0000<inline-formula> <tex-math>$k=4,6,8,10$ </tex-math></inline-formula>\u0000 and 12, is \u0000<inline-formula> <tex-math>$O(n_{v}^{2}log (N))$ </tex-math></inline-formula>\u0000, \u0000<inline-formula> <tex-math>$O(n_{v}^{2}log (n_{v})log (N))$ </tex-math></inline-formula>\u0000, \u0000<inline-formula> <tex-math>$O(n_{v}^{4}log ^{4}(n_{v})log (N))$ </tex-math></inline-formula>\u0000, \u0000<inline-formula> <tex-math>$O(n_{v}^{4}log (n_{v})log (N))$ </tex-math></inline-formula>\u0000 and \u0000<inline-formula> <tex-math>$O(n_{v}^{6}log ^{6}(n_{v})log (N))$ </tex-math></inline-formula>\u0000, respectively. The complexity, depending logarithmically on the lifting factor \u0000<inline-formula> <tex-math>$N$ </tex-math></inline-formula>\u0000, gives our approach, to the best of our knowledge, a significant advantage over previous works on the cycle distribution of QC-LDPC codes.","PeriodicalId":73295,"journal":{"name":"IEEE journal on selected areas in information theory","volume":"4 ","pages":"499-513"},"PeriodicalIF":0.0,"publicationDate":"2023-09-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50354741","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IEEE journal on selected areas in information theory
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1