首页 > 最新文献

International Symposium on Information Theory and its Applications. International Symposium on Information Theory and its Applications最新文献

英文 中文
Message encoding for spread and orbit codes 信息编码的传播和轨道代码
Anna-Lena Trautmann
Spread codes and orbit codes are special families of constant dimension subspace codes. These codes have been well-studied for their error correction capability and transmission rate, but the question of how to encode messages has not been investigated. In this work we show how the message space can be chosen for a given code and how message en- and decoding can be done.
扩展码和轨道码是一类特殊的常维子空间码。这些码的纠错能力和传输速率已经得到了很好的研究,但是如何对消息进行编码的问题还没有研究。在这项工作中,我们展示了如何为给定的代码选择消息空间,以及如何完成消息输入和解码。
{"title":"Message encoding for spread and orbit codes","authors":"Anna-Lena Trautmann","doi":"10.1109/ISIT.2014.6875303","DOIUrl":"https://doi.org/10.1109/ISIT.2014.6875303","url":null,"abstract":"Spread codes and orbit codes are special families of constant dimension subspace codes. These codes have been well-studied for their error correction capability and transmission rate, but the question of how to encode messages has not been investigated. In this work we show how the message space can be chosen for a given code and how message en- and decoding can be done.","PeriodicalId":92224,"journal":{"name":"International Symposium on Information Theory and its Applications. International Symposium on Information Theory and its Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84395476","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Network compression: Worst-case analysis 网络压缩:最坏情况分析
Himanshu Asnani, Ilan Shomorony, A. Avestimehr, T. Weissman
We consider the problem of communicating a distributed correlated memoryless source over a memoryless network, from source nodes to destination nodes, under quadratic distortion constraints. We show the following two complementary results: (a) for an arbitrary memoryless network, among all distributed memoryless sources with a particular correlation, Gaussian sources are the worst compressible, that is, they admit the smallest set of achievable distortion tuples, and (b) for any arbitrarily distributed memoryless source to be communicated over a memoryless additive noise network, among all noise processes with a fixed correlation, Gaussian noise admits the smallest achievable set of distortion tuples. In each case, given a coding scheme for the corresponding Gaussian problem, we provide a technique for the construction of a new coding scheme that achieves the same distortion at the destination nodes in a non-Gaussian scenario with the same correlation structure.
考虑在二次失真约束下,在无记忆网络上从源节点到目标节点的分布式相关无记忆源通信问题。我们展示了以下两个互补的结果:(a)对于任意无记忆网络,在所有具有特定相关性的分布式无记忆源中,高斯源的可压缩性最差,即承认可实现的最小畸变元组集;(b)对于通过无记忆加性噪声网络通信的任意分布无记忆源,在所有具有固定相关性的噪声过程中,高斯噪声承认可实现的最小畸变元组集。在每种情况下,给定相应高斯问题的编码方案,我们提供了一种构建新编码方案的技术,该编码方案在具有相同相关结构的非高斯场景中在目标节点处实现相同的失真。
{"title":"Network compression: Worst-case analysis","authors":"Himanshu Asnani, Ilan Shomorony, A. Avestimehr, T. Weissman","doi":"10.1109/ISIT.2013.6620215","DOIUrl":"https://doi.org/10.1109/ISIT.2013.6620215","url":null,"abstract":"We consider the problem of communicating a distributed correlated memoryless source over a memoryless network, from source nodes to destination nodes, under quadratic distortion constraints. We show the following two complementary results: (a) for an arbitrary memoryless network, among all distributed memoryless sources with a particular correlation, Gaussian sources are the worst compressible, that is, they admit the smallest set of achievable distortion tuples, and (b) for any arbitrarily distributed memoryless source to be communicated over a memoryless additive noise network, among all noise processes with a fixed correlation, Gaussian noise admits the smallest achievable set of distortion tuples. In each case, given a coding scheme for the corresponding Gaussian problem, we provide a technique for the construction of a new coding scheme that achieves the same distortion at the destination nodes in a non-Gaussian scenario with the same correlation structure.","PeriodicalId":92224,"journal":{"name":"International Symposium on Information Theory and its Applications. International Symposium on Information Theory and its Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2013-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79937709","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Distributed sensing and transmission of sporadic random samples 零星随机样本的分布式感知与传输
Ayşe Ünsal, R. Knopp
This work considers distributed sensing and transmission of sporadic random samples. Lower bounds are derived for the reconstruction error of a single normally or uniformly-distributed vector imperfectly measured by a network of sensors and transmitted with finite energy to a common receiver via an additive white Gaussian noise asynchronous multiple-access channel. Transmission makes use of a perfect causal feedback link to the encoder connected to each sensor. A retransmission protocol inspired by the classical scheme in [1] applied to the transmission of single and bi-variate analog samples analyzed in [2] and [3] is extended to the more general network scenario, for which asymptotic upper-bounds on the reconstruction error are provided. Both the upper and lower-bounds show that collaboration can be achieved through energy accumulation under certain circumstances.
这项工作考虑了零星随机样本的分布式传感和传输。推导了一个正态分布或均匀分布的矢量的重构误差下界,该矢量由传感器网络不完全测量,并通过加性高斯白噪声异步多址信道以有限能量传输到普通接收机。传输利用一个完美的因果反馈链接到连接到每个传感器的编码器。受[1]中的经典方案启发,将一种重传协议应用于[2]和[3]中分析的单变量和双变量模拟样本的传输,并将其扩展到更一般的网络场景,给出了重构误差的渐近上界。上界和下界都表明,在一定情况下,可以通过能量积累实现协作。
{"title":"Distributed sensing and transmission of sporadic random samples","authors":"Ayşe Ünsal, R. Knopp","doi":"10.1109/ISIT.2013.6620612","DOIUrl":"https://doi.org/10.1109/ISIT.2013.6620612","url":null,"abstract":"This work considers distributed sensing and transmission of sporadic random samples. Lower bounds are derived for the reconstruction error of a single normally or uniformly-distributed vector imperfectly measured by a network of sensors and transmitted with finite energy to a common receiver via an additive white Gaussian noise asynchronous multiple-access channel. Transmission makes use of a perfect causal feedback link to the encoder connected to each sensor. A retransmission protocol inspired by the classical scheme in [1] applied to the transmission of single and bi-variate analog samples analyzed in [2] and [3] is extended to the more general network scenario, for which asymptotic upper-bounds on the reconstruction error are provided. Both the upper and lower-bounds show that collaboration can be achieved through energy accumulation under certain circumstances.","PeriodicalId":92224,"journal":{"name":"International Symposium on Information Theory and its Applications. International Symposium on Information Theory and its Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2013-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81834980","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Lattice coding for strongly secure compute-and-forward in a bidirectional relay 双向中继中强安全计算转发的点阵编码
V. Shashank, N. Kashyap
We study the problem of secure bidirectional relaying in the presence of an “honest but curious” relay. We consider the setting where all links between nodes are additive white Gaussian noise (AWGN) channels, and show that using nested lattice codes, it is possible to obtain strong secrecy. A randomized encoder based on probability mass functions obtained by sampling the Gaussian function is used, and we show that the mutual information between the secret messages and the vector received by the relay is arbitrarily small for large block lengths. We determine sufficient conditions for secure and reliable communication, and find achievable rates. We then extend the results to the case of secure relaying in a multi-hop network with K +1 hops.
研究了存在“诚实但好奇”中继的安全双向中继问题。我们考虑了节点之间的所有链路都是加性高斯白噪声(AWGN)信道的设置,并证明了使用嵌套晶格码可以获得强保密性。采用基于高斯函数采样得到的概率质量函数的随机编码器,结果表明,在大块长度的情况下,中继接收到的秘密消息和向量之间的互信息是任意小的。我们确定了安全可靠通信的充分条件,并找到了可实现的速率。然后,我们将结果推广到K +1跳的多跳网络中的安全中继情况。
{"title":"Lattice coding for strongly secure compute-and-forward in a bidirectional relay","authors":"V. Shashank, N. Kashyap","doi":"10.1109/ISIT.2013.6620731","DOIUrl":"https://doi.org/10.1109/ISIT.2013.6620731","url":null,"abstract":"We study the problem of secure bidirectional relaying in the presence of an “honest but curious” relay. We consider the setting where all links between nodes are additive white Gaussian noise (AWGN) channels, and show that using nested lattice codes, it is possible to obtain strong secrecy. A randomized encoder based on probability mass functions obtained by sampling the Gaussian function is used, and we show that the mutual information between the secret messages and the vector received by the relay is arbitrarily small for large block lengths. We determine sufficient conditions for secure and reliable communication, and find achievable rates. We then extend the results to the case of secure relaying in a multi-hop network with K +1 hops.","PeriodicalId":92224,"journal":{"name":"International Symposium on Information Theory and its Applications. International Symposium on Information Theory and its Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2013-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88446147","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
The K-user interference channel: Strong interference regime k用户干扰信道:强干扰体制
R. K. Farsani
This paper presents a solution for one of the open problems in network information theory: “What is the generalization of the strong interference regime to the K-user interference channel?” A new approach is developed based on which one can obtain strong interference regimes not only for the multi-user interference channels but also for other interference networks with any arbitrary topology. To this development, some new lemmas are proved which have a central role in our derivations. As a result, this paper establishes the first non-trivial capacity result for the general multi-user classical interference channel (for both discrete and Gaussian channels).
本文针对网络信息论中的一个开放性问题:“强干扰制度对k用户干扰信道的泛化是什么?”提出了一种解决方案。在此基础上提出了一种新的方法,该方法不仅可以获得多用户干扰信道的强干扰区,而且可以获得任意拓扑的其他干扰网络的强干扰区。为了这个发展,我们证明了一些新的引理,它们在我们的推导中起着中心作用。本文建立了一般多用户经典干扰信道(离散信道和高斯信道)的第一个非平凡容量结果。
{"title":"The K-user interference channel: Strong interference regime","authors":"R. K. Farsani","doi":"10.1109/ISIT.2013.6620582","DOIUrl":"https://doi.org/10.1109/ISIT.2013.6620582","url":null,"abstract":"This paper presents a solution for one of the open problems in network information theory: “What is the generalization of the strong interference regime to the K-user interference channel?” A new approach is developed based on which one can obtain strong interference regimes not only for the multi-user interference channels but also for other interference networks with any arbitrary topology. To this development, some new lemmas are proved which have a central role in our derivations. As a result, this paper establishes the first non-trivial capacity result for the general multi-user classical interference channel (for both discrete and Gaussian channels).","PeriodicalId":92224,"journal":{"name":"International Symposium on Information Theory and its Applications. International Symposium on Information Theory and its Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2013-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80972883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
On the capacity region of the two-user Interference Channel 双用户干扰信道容量区域的研究
Reza Khosravi-Farsani
One of the key open problems in network information theory is to obtain the capacity region for the two-user Interference Channel (IC). In this paper, new results are presented for this channel. First, a novel outer bound on the capacity region is given. It is shown that this outer bound is optimal in the strong interference regime. Moreover, by using the derived outer bound, some new capacity theorems are proved. Specifically, a mixed interference regime is identified for the general IC where decoding interference at one receiver and treating interference as noise at the other one is sum-rate optimal. Also, a class of one-sided ICs with weak interference is identified for which treating interference as noise is sum-rate optimal. Our new capacity theorems include the previously obtained results for the mixed Gaussian IC and the weak Gaussian one-sided IC as special cases. Next, some results are given on the Han-Kobayashi (HK) achievable rate region. The evaluation of this rate region is in general difficult. In this paper, a simple characterization of the HK rate region is derived for a novel very weak interference regime. It is shown that for this very weak interference regime, the achievable sum-rate due to the HK region is identical to the one given by the simple treating interference as noise strategy. Finally, by using a novel genie-aided technique, a noisy interference regime is identified for the general IC (non-Gaussian) where the sum-rate capacity is achieved by treating interference as noise at the receivers. This result includes the noisy interference regime previously obtained for the Gaussian channel as a special case.
{"title":"On the capacity region of the two-user Interference Channel","authors":"Reza Khosravi-Farsani","doi":"10.1109/ISIT.2014.6875331","DOIUrl":"https://doi.org/10.1109/ISIT.2014.6875331","url":null,"abstract":"One of the key open problems in network information theory is to obtain the capacity region for the two-user Interference Channel (IC). In this paper, new results are presented for this channel. First, a novel outer bound on the capacity region is given. It is shown that this outer bound is optimal in the strong interference regime. Moreover, by using the derived outer bound, some new capacity theorems are proved. Specifically, a mixed interference regime is identified for the general IC where decoding interference at one receiver and treating interference as noise at the other one is sum-rate optimal. Also, a class of one-sided ICs with weak interference is identified for which treating interference as noise is sum-rate optimal. Our new capacity theorems include the previously obtained results for the mixed Gaussian IC and the weak Gaussian one-sided IC as special cases. Next, some results are given on the Han-Kobayashi (HK) achievable rate region. The evaluation of this rate region is in general difficult. In this paper, a simple characterization of the HK rate region is derived for a novel very weak interference regime. It is shown that for this very weak interference regime, the achievable sum-rate due to the HK region is identical to the one given by the simple treating interference as noise strategy. Finally, by using a novel genie-aided technique, a noisy interference regime is identified for the general IC (non-Gaussian) where the sum-rate capacity is achieved by treating interference as noise at the receivers. This result includes the noisy interference regime previously obtained for the Gaussian channel as a special case.","PeriodicalId":92224,"journal":{"name":"International Symposium on Information Theory and its Applications. International Symposium on Information Theory and its Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2013-02-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75779163","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A randomized probing scheme for increasing the stability region of multicarrier systems 一种增加多载波系统稳定域的随机探测方案
Apostolos Destounis, M. Assaad, M. Debbah, B. Sayadi
{"title":"A randomized probing scheme for increasing the stability region of multicarrier systems","authors":"Apostolos Destounis, M. Assaad, M. Debbah, B. Sayadi","doi":"10.1109/ISIT.2013.6620562","DOIUrl":"https://doi.org/10.1109/ISIT.2013.6620562","url":null,"abstract":"","PeriodicalId":92224,"journal":{"name":"International Symposium on Information Theory and its Applications. International Symposium on Information Theory and its Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2013-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83412012","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The capacity region of the wireless ergodic fading Interference Channel with partial CSIT to within one bit 具有部分CSIT的无线遍历衰落干扰信道的容量区域小于1位
Reza Khosravi-Farsani
{"title":"The capacity region of the wireless ergodic fading Interference Channel with partial CSIT to within one bit","authors":"Reza Khosravi-Farsani","doi":"10.1109/ISIT.2013.6620328","DOIUrl":"https://doi.org/10.1109/ISIT.2013.6620328","url":null,"abstract":"","PeriodicalId":92224,"journal":{"name":"International Symposium on Information Theory and its Applications. International Symposium on Information Theory and its Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2013-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82510417","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
On modulo-sum computation over an erasure multiple access channel 擦除多址信道上的模和计算
A. Khisti, Brett Hern, K. Narayanan
We study computation of a modulo-sum of two binary source sequences over a two-user erasure multiple access channel. Each sender observes an independent and equiprobable binary sequence and the receiver is interested in computing the modulo-sum of these two sequences. The channel is modelled as a binary-input, erasure multiple access channel, which can be in one of three states — either the channel output is a modulo-sum of the two input symbols, or the channel output equals the input symbol on the first link and an erasure on the second link, or it equals the input symbol on the second link and an erasure on the first link. The associated state sequence is independent and identically distributed. We establish upper and lower bounds on the modulo-sum capacity. Our coding scheme uses either the compute-and-forward or the decode-and-forward techniques. The upper bound is obtained by a genie aided argument that reduces the setup to a compound multiple-access channel. It is in general is tighter than a simple upper bound obtained by revealing one of the messages to the decoders. We also briefly consider the case when a strictly causal state feedback is available to the encoders and establish that such feedback can increase the modulo-sum capacity.
研究了双用户擦除多址信道上两个二进制源序列的模和计算。每个发送方观察一个独立的等概率二进制序列,接收方感兴趣的是计算这两个序列的模和。该通道被建模为二进制输入、擦除多访问通道,它可以处于三种状态之一——要么通道输出是两个输入符号的模和,要么通道输出等于第一条链路上的输入符号和第二条链路上的擦除,要么它等于第二条链路上的输入符号和第一条链路上的擦除。所关联的状态序列是独立且同分布的。建立了模和容量的上界和下界。我们的编码方案使用计算和转发或解码和转发技术。上界是通过一个精灵辅助参数得到的,该参数减少了对复合多址信道的设置。一般来说,它比通过向解码器透露其中一条消息而获得的简单上界更严格。我们还简要地考虑了当编码器有严格因果状态反馈时的情况,并确定这种反馈可以增加模和容量。
{"title":"On modulo-sum computation over an erasure multiple access channel","authors":"A. Khisti, Brett Hern, K. Narayanan","doi":"10.1109/ISIT.2012.6284114","DOIUrl":"https://doi.org/10.1109/ISIT.2012.6284114","url":null,"abstract":"We study computation of a modulo-sum of two binary source sequences over a two-user erasure multiple access channel. Each sender observes an independent and equiprobable binary sequence and the receiver is interested in computing the modulo-sum of these two sequences. The channel is modelled as a binary-input, erasure multiple access channel, which can be in one of three states — either the channel output is a modulo-sum of the two input symbols, or the channel output equals the input symbol on the first link and an erasure on the second link, or it equals the input symbol on the second link and an erasure on the first link. The associated state sequence is independent and identically distributed. We establish upper and lower bounds on the modulo-sum capacity. Our coding scheme uses either the compute-and-forward or the decode-and-forward techniques. The upper bound is obtained by a genie aided argument that reduces the setup to a compound multiple-access channel. It is in general is tighter than a simple upper bound obtained by revealing one of the messages to the decoders. We also briefly consider the case when a strictly causal state feedback is available to the encoders and establish that such feedback can increase the modulo-sum capacity.","PeriodicalId":92224,"journal":{"name":"International Symposium on Information Theory and its Applications. International Symposium on Information Theory and its Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77505599","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
2012 IEEE International Symposium on Information Theory Proceedings (ISIT) 2012 IEEE信息理论国际研讨会论文集(ISIT)
J. H. Sørensen, T. Koike-Akino, P. Orlik
This paper proposes a concept called rateless feedback coding. We redesign the existing LT and Raptor codes, by introducing new degree distributions for the case when a few feedback opportunities are available. We show that incorporating feedback to LT codes can significantly decrease both the coding overhead and the encoding/decoding complexity. Moreover, we show that, at the price of a slight increase in the coding overhead, linear complexity is achieved with Raptor feedback coding.
{"title":"2012 IEEE International Symposium on Information Theory Proceedings (ISIT)","authors":"J. H. Sørensen, T. Koike-Akino, P. Orlik","doi":"10.1109/ISIT.2012.6283582","DOIUrl":"https://doi.org/10.1109/ISIT.2012.6283582","url":null,"abstract":"This paper proposes a concept called rateless feedback coding. We redesign the existing LT and Raptor codes, by introducing new degree distributions for the case when a few feedback opportunities are available. We show that incorporating feedback to LT codes can significantly decrease both the coding overhead and the encoding/decoding complexity. Moreover, we show that, at the price of a slight increase in the coding overhead, linear complexity is achieved with Raptor feedback coding.","PeriodicalId":92224,"journal":{"name":"International Symposium on Information Theory and its Applications. International Symposium on Information Theory and its Applications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86073713","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
期刊
International Symposium on Information Theory and its Applications. International Symposium on Information Theory and its Applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1