id
stringlengths
9
10
submitter
stringlengths
2
52
authors
stringlengths
4
6.51k
title
stringlengths
4
246
comments
stringlengths
1
523
journal-ref
stringlengths
4
345
doi
stringlengths
11
120
report-no
stringlengths
2
243
categories
stringlengths
5
98
license
stringclasses
9 values
abstract
stringlengths
33
3.33k
versions
list
update_date
timestamp[s]
authors_parsed
list
prediction
stringclasses
1 value
probability
float64
0.95
1
0708.0964
Colm \'O D\'unlaing
Colm O Dunlaing
Nodally 3-connected planar graphs and convex combination mappings
27 pages Latex, 11 postscript figures
null
null
TCDMATH 06-16
cs.CG
null
A convex combination mapping of a planar graph is a plane mapping in which the external vertices are mapped to the corners of a convex polygon and every internal vertex is a proper weighted average of its neighbours. If a planar graph is nodally 3-connected or triangulated then every such mapping is an embedding (Tutte, Floater). We give a simple characterisation of nodally 3-connected planar graphs, and generalise the above result to any planar graph which admits any convex embedding.
[ { "version": "v1", "created": "Tue, 7 Aug 2007 14:32:38 GMT" } ]
2007-08-08T00:00:00
[ [ "Dunlaing", "Colm O", "" ] ]
new_dataset
0.988245
0708.0604
L.T. Handoko
T.B. Waluyo and L.T. Handoko
Introducing OPTO : Portal for Optical Communities in Indonesia
3 pages, Proceeding of the 2nd International Conf. on Optics and Laser Applications 2007
null
null
FISIKALIPI-07006
cs.CY
null
Since January 1, 2005 we have launched "OPTO" Portal, a website dedicated to optical communities in Indonesia. The address of this portal is http://www.opto.lipi.go.id and is self-supporting managed and not for commercial purposes. Our aims in launching this portal are to benefit Internet facility in increasing the communities' scientific activity; to provide an online reference in Indonesian language for optics-based science and technology subjects; as well as to pioneer the communities' online activities with real impacts and benefits for our society. We will describe in the paper the features of this portal that can be utilized by all individuals or members of optical communities to store and share information and to build networks or partnership as well. We realized that this portal is still not popular and most of our aims are still not reached. This conference should be a good place for all of us to collaborate to properly utilize this portal for the advantages to the optical communities in Indonesia and our society at large.
[ { "version": "v1", "created": "Sat, 4 Aug 2007 05:16:10 GMT" } ]
2007-08-07T00:00:00
[ [ "Waluyo", "T. B.", "" ], [ "Handoko", "L. T.", "" ] ]
new_dataset
0.995244
0708.0624
Matthias Brust R.
Christian Hutter, Matthias R. Brust, Steffen Rothkugel
ADS-Directory Services for Mobile Ad-Hoc Networks Based on an Information Market Model
9 pages, in the 1st International Workshop on Ubiquitous Computing (IWUC-2004) held in conjunction with the 6th International Conference on Enterprise Information Systems (ICEIS 2004)
null
null
null
cs.NI cs.DC
null
Ubiquitous computing based on small mobile devices using wireless communication links is becoming very attractive. The computational power and storage capacities provided allow the execution of sophisticated applications. Due to the fact that sharing of information is a central problem for distributed applications, the development of self organizing middleware services providing high level interfaces for information managing is essential. ADS is a directory service for mobile ad-hoc networks dealing with local and nearby information as well as providing access to distant information. The approach discussed throughout this paper is based upon the concept of information markets.
[ { "version": "v1", "created": "Sat, 4 Aug 2007 13:21:55 GMT" } ]
2007-08-07T00:00:00
[ [ "Hutter", "Christian", "" ], [ "Brust", "Matthias R.", "" ], [ "Rothkugel", "Steffen", "" ] ]
new_dataset
0.981496
0707.4389
Sandrine Blazy
Andrew W. Appel (INRIA Rocquencourt), Sandrine Blazy (CEDRIC, INRIA Rocquencourt)
Separation Logic for Small-step Cminor
Version courte du rapport de recherche RR-6138
Dans 20th Int. Conference on Theorem Proving in Higher Order Logics (TPHOLs 2007) 4732 (2007) 5-21
null
null
cs.PL
null
Cminor is a mid-level imperative programming language; there are proved-correct optimizing compilers from C to Cminor and from Cminor to machine language. We have redesigned Cminor so that it is suitable for Hoare Logic reasoning and we have designed a Separation Logic for Cminor. In this paper, we give a small-step semantics (instead of the big-step of the proved-correct compiler) that is motivated by the need to support future concurrent extensions. We detail a machine-checked proof of soundness of our Separation Logic. This is the first large-scale machine-checked proof of a Separation Logic w.r.t. a small-step semantics. The work presented in this paper has been carried out in the Coq proof assistant. It is a first step towards an environment in which concurrent Cminor programs can be verified using Separation Logic and also compiled by a proved-correct compiler with formal end-to-end correctness guarantees.
[ { "version": "v1", "created": "Mon, 30 Jul 2007 12:09:16 GMT" } ]
2007-07-31T00:00:00
[ [ "Appel", "Andrew W.", "", "INRIA Rocquencourt" ], [ "Blazy", "Sandrine", "", "CEDRIC, INRIA\n Rocquencourt" ] ]
new_dataset
0.990894
0707.3717
Yann Busnel
Yann Busnel (IRISA, DIT), Marin Bertier (IRISA), Eric Fleury (INRIA Rh\^one-Alpes), Anne-Marie Kermarrec (IRISA)
GCP: Gossip-based Code Propagation for Large-scale Mobile Wireless Sensor Networks
null
null
null
null
cs.NI
null
Wireless sensor networks (WSN) have recently received an increasing interest. They are now expected to be deployed for long periods of time, thus requiring software updates. Updating the software code automatically on a huge number of sensors is a tremendous task, as ''by hand'' updates can obviously not be considered, especially when all participating sensors are embedded on mobile entities. In this paper, we investigate an approach to automatically update software in mobile sensor-based application when no localization mechanism is available. We leverage the peer-to-peer cooperation paradigm to achieve a good trade-off between reliability and scalability of code propagation. More specifically, we present the design and evaluation of GCP ({\emph Gossip-based Code Propagation}), a distributed software update algorithm for mobile wireless sensor networks. GCP relies on two different mechanisms (piggy-backing and forwarding control) to improve significantly the load balance without sacrificing on the propagation speed. We compare GCP against traditional dissemination approaches. Simulation results based on both synthetic and realistic workloads show that GCP achieves a good convergence speed while balancing the load evenly between sensors.
[ { "version": "v1", "created": "Wed, 25 Jul 2007 11:52:09 GMT" }, { "version": "v2", "created": "Mon, 30 Jul 2007 12:21:45 GMT" } ]
2007-07-30T00:00:00
[ [ "Busnel", "Yann", "", "IRISA, DIT" ], [ "Bertier", "Marin", "", "IRISA" ], [ "Fleury", "Eric", "", "INRIA\n Rhône-Alpes" ], [ "Kermarrec", "Anne-Marie", "", "IRISA" ] ]
new_dataset
0.985178
0707.3507
Damien Chablat
Daniel Kanaan (IRCCyN), Philippe Wenger (IRCCyN), Damien Chablat (IRCCyN)
Workspace and Kinematic Analysis of the VERNE machine
null
Dans International Conference on Advanced Intelligent Mechatronics - AIM, Z\"urich : Suisse (09/2007)
null
null
cs.RO
null
This paper describes the workspace and the inverse and direct kinematic analysis of the VERNE machine, a serial/parallel 5-axis machine tool designed by Fatronik for IRCCyN. This machine is composed of a three-degree-of-freedom (DOF) parallel module and a two-DOF serial tilting table. The parallel module consists of a moving platform that is connected to a fixed base by three non-identical legs. This feature involves (i) a simultaneous combination of rotation and translation for the moving platform, which is balanced by the tilting table and (ii) workspace whose shape and volume vary as a function of the tool length. This paper summarizes results obtained in the context of the European projects NEXT ("Next Generation of Productions Systems").
[ { "version": "v1", "created": "Tue, 24 Jul 2007 09:13:22 GMT" } ]
2007-07-25T00:00:00
[ [ "Kanaan", "Daniel", "", "IRCCyN" ], [ "Wenger", "Philippe", "", "IRCCyN" ], [ "Chablat", "Damien", "", "IRCCyN" ] ]
new_dataset
0.990636
0707.3550
Damien Chablat
Damien Chablat (IRCCyN), Philippe Wenger (IRCCyN)
A Six Degree-Of-Freedom Haptic Device Based On The Orthoglide And A Hybrid Agile Eye
null
Dans Proceedings of IDETC 2006: 30th Mechanisms & Robotics Conference (MR) - IDETC, Philadelphie : \'Etats-Unis d'Am\'erique (2006)
null
null
cs.RO
null
This paper is devoted to the kinematic design of a new six degree-of-freedom haptic device using two parallel mechanisms. The first one, called orthoglide, provides the translation motions and the second one, called agile eye, produces the rotational motions. These two motions are decoupled to simplify the direct and inverse kinematics, as it is needed for real-time control. To reduce the inertial load, the motors are fixed on the base and a transmission with two universal joints is used to transmit the rotational motions from the base to the end-effector. Two alternative wrists are proposed (i), the agile eye with three degrees of freedom or (ii) a hybrid wrist made by the assembly of a two-dof agile eye with a rotary motor. The last one is optimized to increase its stiffness and to decrease the number of moving parts.
[ { "version": "v1", "created": "Tue, 24 Jul 2007 13:42:08 GMT" } ]
2007-07-25T00:00:00
[ [ "Chablat", "Damien", "", "IRCCyN" ], [ "Wenger", "Philippe", "", "IRCCyN" ] ]
new_dataset
0.992688
0707.3564
Damien Chablat
Damien Chablat (IRCCyN), Philippe Wenger (IRCCyN)
A New Six Degree-of-Freedom Haptic Device based on the Orthoglide and the Agile Eye
null
Dans Proceedings of Virtual Concept 2005 - Virtual Concept, France (11/2005)
null
null
cs.RO
null
The aim of this paper is to present a new six degree-of-freedom (dof) haptic device using two parallel mechanisms. The first one, called orthoglide, provides the translation motions and the second one produces the rotational motions. These two motions are decoupled to simplify the direct and inverse kinematics, as it is needed for real-times control. To reduce the inertial load, the motors are fixed on the base and a transmission with two universal joints is used to transmit the rotational motions from the base to the end-effector. The main feature of the orthoglide and of the agile eye mechanism is the existence of an isotropic configuration. The length of the legs and the range limits of the orthoglide are optimized to have homogeneous performance throughout the Cartesian workspace, which has a nearly cubic workspace. These properties permit to have a high stiffness throughout the workspace and workspace limits that are easily understandable by the user.
[ { "version": "v1", "created": "Tue, 24 Jul 2007 14:29:41 GMT" } ]
2007-07-25T00:00:00
[ [ "Chablat", "Damien", "", "IRCCyN" ], [ "Wenger", "Philippe", "", "IRCCyN" ] ]
new_dataset
0.997159
0707.2998
Patrick Murphy
Patrick Murphy, Ashutosh Sabharwal and Behnaam Aazhang
Building a Cooperative Communications System
null
null
null
null
cs.IT math.IT
null
In this paper, we present the results from over-the-air experiments of a complete implementation of an amplify and forward cooperative communications system. Our custom OFDM-based physical layer uses a distributed version of the Alamouti block code, where the relay sends one branch of Alamouti encoded symbols. First we show analytically and experimentally that amplify and forward protocols are unaffected by carrier frequency offsets at the relay. This result allows us to use a conventional Alamouti receiver without change for the distributed relay system. Our full system implementation shows gains up to 5.5dB in peak power constrained networks. Thus, we can conclusively state that even the simplest form of relaying can lead to significant gains in practical implementations.
[ { "version": "v1", "created": "Fri, 20 Jul 2007 05:38:07 GMT" } ]
2007-07-23T00:00:00
[ [ "Murphy", "Patrick", "" ], [ "Sabharwal", "Ashutosh", "" ], [ "Aazhang", "Behnaam", "" ] ]
new_dataset
0.993226
0707.2841
Damien Chablat
Damien Chablat (IRCCyN), Philippe D\'epinc\'e, Eric No\"el, Peer-Oliver Woelk (IFW)
The Virtual Manufacturing concept: Scope, Socio-Economic Aspects and Future Trends
null
Design Engineering Technical Conferences (09/2004) 1-6
null
null
cs.RO
null
The research area "Virtual Manufacturing (VM)'' is the use of information technology and computer simulation to model real world manufacturing processes for the purpose of analysing and understanding them. As automation technologies such as CAD/CAM have substantially shortened the time required to design products, Virtual Manufacturing will have a similar effect on the manufacturing phase thanks to the modelling, simulation and optimisation of the product and the processes involved in its fabrication. After a description of Virtual Manufacturing (definitions and scope), we present some socio-economic factors of VM and finaly some "hot topics'' for the future are proposed.
[ { "version": "v1", "created": "Thu, 19 Jul 2007 07:15:53 GMT" } ]
2007-07-20T00:00:00
[ [ "Chablat", "Damien", "", "IRCCyN" ], [ "Dépincé", "Philippe", "", "IFW" ], [ "Noël", "Eric", "", "IFW" ], [ "Woelk", "Peer-Oliver", "", "IFW" ] ]
new_dataset
0.974576
0707.2886
Laurent Romary
Laurent Romary (MPDL)
OA@MPS - a colourful view
null
Zeitschrift f\"ur Bibliothekswesen und Bibliographie (15/08/2007) 7 pages
null
null
cs.DL
null
The open access agenda of the Max Planck Society, initiator of the Berlin Declaration, envisions the support of both the green way and the golden way to open access. For the implementation of the green way the Max Planck Society through its newly established unit (Max Planck Digital Library) follows the idea of providing a centralized technical platform for publications and a local support for editorial issues. With regard to the golden way, the Max Planck Society fosters the development of open access publication models and experiments new publishing concepts like the Living Reviews journals.
[ { "version": "v1", "created": "Thu, 19 Jul 2007 12:30:42 GMT" } ]
2007-07-20T00:00:00
[ [ "Romary", "Laurent", "", "MPDL" ] ]
new_dataset
0.981942
0707.2921
Andrea Pacifici
Alessandro Agnetis, Enrico Grande, Pitu B. Mirchandani, Andrea Pacifici
Covering a line segment with variable radius discs
21 pages, 2 figures
null
null
null
cs.DM cs.NA
null
The paper addresses the problem of locating sensors with a circular field of view so that a given line segment is under full surveillance, which is termed as the Disc Covering Problem on a Line. The cost of each sensor includes a fixed component, and a variable component that is proportional to the field-of-view area. When only one type of sensor or, in general, one type of disc, is available, then a simple polynomial algorithm solves the problem. When there are different types of sensors in terms of fixed and variable costs, the problem becomes NP-hard. A branch-and-bound algorithm as well as an efficient heuristic are developed. The heuristic very often obtains the optimal solution as shown in extensive computational testing.
[ { "version": "v1", "created": "Thu, 19 Jul 2007 14:59:47 GMT" } ]
2007-07-20T00:00:00
[ [ "Agnetis", "Alessandro", "" ], [ "Grande", "Enrico", "" ], [ "Mirchandani", "Pitu B.", "" ], [ "Pacifici", "Andrea", "" ] ]
new_dataset
0.997914
0707.0562
Stefan G\"oller
Stefan G\"oller and Dirk Nowotka
On a Non-Context-Free Extension of PDL
null
null
null
null
cs.LO
null
Over the last 25 years, a lot of work has been done on seeking for decidable non-regular extensions of Propositional Dynamic Logic (PDL). Only recently, an expressive extension of PDL, allowing visibly pushdown automata (VPAs) as a formalism to describe programs, was introduced and proven to have a satisfiability problem complete for deterministic double exponential time. Lately, the VPA formalism was extended to so called k-phase multi-stack visibly pushdown automata (k-MVPAs). Similarly to VPAs, it has been shown that the language of k-MVPAs have desirable effective closure properties and that the emptiness problem is decidable. On the occasion of introducing k-MVPAs, it has been asked whether the extension of PDL with k-MVPAs still leads to a decidable logic. This question is answered negatively here. We prove that already for the extension of PDL with 2-phase MVPAs with two stacks satisfiability becomes \Sigma_1^1-complete.
[ { "version": "v1", "created": "Wed, 4 Jul 2007 09:33:21 GMT" }, { "version": "v2", "created": "Wed, 18 Jul 2007 10:11:01 GMT" } ]
2007-07-18T00:00:00
[ [ "Göller", "Stefan", "" ], [ "Nowotka", "Dirk", "" ] ]
new_dataset
0.959141
0707.2160
Seth Pettie
Seth Pettie
Splay Trees, Davenport-Schinzel Sequences, and the Deque Conjecture
null
null
null
null
cs.DS
null
We introduce a new technique to bound the asymptotic performance of splay trees. The basic idea is to transcribe, in an indirect fashion, the rotations performed by the splay tree as a Davenport-Schinzel sequence S, none of whose subsequences are isomorphic to fixed forbidden subsequence. We direct this technique towards Tarjan's deque conjecture and prove that n deque operations require O(n alpha^*(n)) time, where alpha^*(n) is the minimum number of applications of the inverse-Ackermann function mapping n to a constant. We are optimistic that this approach could be directed towards other open conjectures on splay trees such as the traversal and split conjectures.
[ { "version": "v1", "created": "Sat, 14 Jul 2007 16:38:08 GMT" } ]
2007-07-17T00:00:00
[ [ "Pettie", "Seth", "" ] ]
new_dataset
0.99779
0707.2270
Damien Chablat
Damien Chablat (IRCCyN), Philippe Wenger (IRCCyN)
Design of a Spherical Wrist with Parallel Architecture: Application to Vertebrae of an Eel Robot
null
Proc. IEEE Int. Conf. Rob. and Automation (04/2005) 1-6
null
null
cs.RO
null
The design of a spherical wrist with parallel architecture is the object of this article. This study is part of a larger project, which aims to design and to build an eel robot for inspection of immersed piping. The kinematic analysis of the mechanism is presented first to characterize the singular configurations as well as the isotropic configurations. We add the design constraints related to the application, such as (i) the compactness of the mechanism, (ii) the symmetry of the elements in order to ensure static and dynamic balance and (iii) the possibility of the mechanism to fill the elliptic form of the ell sections.
[ { "version": "v1", "created": "Mon, 16 Jul 2007 07:41:16 GMT" } ]
2007-07-17T00:00:00
[ [ "Chablat", "Damien", "", "IRCCyN" ], [ "Wenger", "Philippe", "", "IRCCyN" ] ]
new_dataset
0.995075
0707.2027
Damien Chablat
Philippe Wenger (IRCCyN), Damien Chablat (IRCCyN)
Workspace and Assembly modes in Fully-Parallel Manipulators : A Descriptive Study
null
Advances in Robot Kinematics and Computational Geometry (1998) 117-126
null
null
cs.RO
null
The goal of this paper is to explain, using a typical example, the distribution of the different assembly modes in the workspace and their effective role in the execution of trajectories. The singular and non-singular changes of assembly mode are described and compared to each other. The non-singular change of assembly mode is more deeply analysed and discussed in the context of trajectory planning. In particular, it is shown that, according to the location of the initial and final configurations with respect to the uniqueness domains in the workspace, there are three different cases to consider before planning a linking trajectory.
[ { "version": "v1", "created": "Fri, 13 Jul 2007 15:04:13 GMT" } ]
2007-07-16T00:00:00
[ [ "Wenger", "Philippe", "", "IRCCyN" ], [ "Chablat", "Damien", "", "IRCCyN" ] ]
new_dataset
0.996538
cs/0406001
Kim-Chi Nguyen
Kim-Chi Nguyen, Gilles Van Assche and Nicolas J. Cerf
Side-Information Coding with Turbo Codes and its Application to Quantum Key Distribution
3 pages, submitted to ISITA 2004
null
null
null
cs.IT cs.CR math.IT quant-ph
null
Turbo coding is a powerful class of forward error correcting codes, which can achieve performances close to the Shannon limit. The turbo principle can be applied to the problem of side-information source coding, and we investigate here its application to the reconciliation problem occurring in a continuous-variable quantum key distribution protocol.
[ { "version": "v1", "created": "Tue, 1 Jun 2004 09:26:00 GMT" } ]
2007-07-16T00:00:00
[ [ "Nguyen", "Kim-Chi", "" ], [ "Van Assche", "Gilles", "" ], [ "Cerf", "Nicolas J.", "" ] ]
new_dataset
0.9978
cs/0408038
G. David Forney
G. David Forney Jr. and Mitchell D. Trott
The Dynamics of Group Codes: Dual Abelian Group Codes and Systems
30 pages, 11 figures. To appear in IEEE Trans. Inform. Theory, 2004
IEEE Trans. Inform. Theory, vol. 50, pp. 2935-2965, Dec. 2004.
10.1109/TIT.2004.838340
null
cs.IT math.IT
null
Fundamental results concerning the dynamics of abelian group codes (behaviors) and their duals are developed. Duals of sequence spaces over locally compact abelian groups may be defined via Pontryagin duality; dual group codes are orthogonal subgroups of dual sequence spaces. The dual of a complete code or system is finite, and the dual of a Laurent code or system is (anti-)Laurent. If C and C^\perp are dual codes, then the state spaces of C act as the character groups of the state spaces of C^\perp. The controllability properties of C are the observability properties of C^\perp. In particular, C is (strongly) controllable if and only if C^\perp is (strongly) observable, and the controller memory of C is the observer memory of C^\perp. The controller granules of C act as the character groups of the observer granules of C^\perp. Examples of minimal observer-form encoder and syndrome-former constructions are given. Finally, every observer granule of C is an "end-around" controller granule of C.
[ { "version": "v1", "created": "Mon, 16 Aug 2004 16:05:06 GMT" } ]
2007-07-16T00:00:00
[ [ "Forney", "G. David", "Jr." ], [ "Trott", "Mitchell D.", "" ] ]
new_dataset
0.999156
cs/0408066
Madhu Sudan
Eli Ben-Sasson and Madhu Sudan
Robust Locally Testable Codes and Products of Codes
null
null
null
null
cs.IT cs.CC math.IT
null
We continue the investigation of locally testable codes, i.e., error-correcting codes for whom membership of a given word in the code can be tested probabilistically by examining it in very few locations. We give two general results on local testability: First, motivated by the recently proposed notion of {\em robust} probabilistically checkable proofs, we introduce the notion of {\em robust} local testability of codes. We relate this notion to a product of codes introduced by Tanner, and show a very simple composition lemma for this notion. Next, we show that codes built by tensor products can be tested robustly and somewhat locally, by applying a variant of a test and proof technique introduced by Raz and Safra in the context of testing low-degree multivariate polynomials (which are a special case of tensor codes). Combining these two results gives us a generic construction of codes of inverse polynomial rate, that are testable with poly-logarithmically many queries. We note these locally testable tensor codes can be obtained from {\em any} linear error correcting code with good distance. Previous results on local testability, albeit much stronger quantitatively, rely heavily on algebraic properties of the underlying codes.
[ { "version": "v1", "created": "Mon, 30 Aug 2004 16:36:38 GMT" } ]
2007-07-16T00:00:00
[ [ "Ben-Sasson", "Eli", "" ], [ "Sudan", "Madhu", "" ] ]
new_dataset
0.999597
cs/0502024
Robin Horan
R.Horan, C.Tjhai, M.Tomlinson, M.Ambroze, M.Ahmed
Idempotents, Mattson-Solomon Polynomials and Binary LDPC codes
9 pages, 3 figures
null
null
null
cs.IT math.IT
null
We show how to construct an algorithm to search for binary idempotents which may be used to construct binary LDPC codes. The algorithm, which allows control of the key properties of sparseness, code rate and minimum distance, is constructed in the Mattson-Solomon domain. Some of the new codes, found by using this technique, are displayed.
[ { "version": "v1", "created": "Fri, 4 Feb 2005 10:08:07 GMT" } ]
2007-07-16T00:00:00
[ [ "Horan", "R.", "" ], [ "Tjhai", "C.", "" ], [ "Tomlinson", "M.", "" ], [ "Ambroze", "M.", "" ], [ "Ahmed", "M.", "" ] ]
new_dataset
0.996426
cs/0502033
Ralf Koetter
Ralf Koetter, Wen-Ching W. Li, Pascal O. Vontobel, Judy L. Walker
Pseudo-Codewords of Cycle Codes via Zeta Functions
Presented at Information Theory Workshop (ITW), San Antonio, TX, 2004
null
null
null
cs.IT math.IT
null
Cycle codes are a special case of low-density parity-check (LDPC) codes and as such can be decoded using an iterative message-passing decoding algorithm on the associated Tanner graph. The existence of pseudo-codewords is known to cause the decoding algorithm to fail in certain instances. In this paper, we draw a connection between pseudo-codewords of cycle codes and the so-called edge zeta function of the associated normal graph and show how the Newton polyhedron of the zeta function equals the fundamental cone of the code, which plays a crucial role in characterizing the performance of iterative decoding algorithms.
[ { "version": "v1", "created": "Sun, 6 Feb 2005 03:26:37 GMT" } ]
2007-07-16T00:00:00
[ [ "Koetter", "Ralf", "" ], [ "Li", "Wen-Ching W.", "" ], [ "Vontobel", "Pascal O.", "" ], [ "Walker", "Judy L.", "" ] ]
new_dataset
0.99649
cs/0503085
Travis Gagie
Travis Gagie
Dynamic Shannon Coding
6 pages; conference version presented at ESA 2004; journal version submitted to IEEE Transactions on Information Theory
null
null
null
cs.IT math.IT
null
We present a new algorithm for dynamic prefix-free coding, based on Shannon coding. We give a simple analysis and prove a better upper bound on the length of the encoding produced than the corresponding bound for dynamic Huffman coding. We show how our algorithm can be modified for efficient length-restricted coding, alphabetic coding and coding with unequal letter costs.
[ { "version": "v1", "created": "Wed, 30 Mar 2005 13:51:46 GMT" } ]
2007-07-16T00:00:00
[ [ "Gagie", "Travis", "" ] ]
new_dataset
0.998744
cs/0504085
Vignesh Sethuraman
Vignesh Sethuraman and Bruce Hajek
Capacity per Unit Energy of Fading Channels with a Peak Constraint
Journal version of paper presented in ISIT 2003 - now accepted for publication in IEEE Transactions on Information Theory
null
10.1109/TIT.2005.853329
null
cs.IT math.IT
null
A discrete-time single-user scalar channel with temporally correlated Rayleigh fading is analyzed. There is no side information at the transmitter or the receiver. A simple expression is given for the capacity per unit energy, in the presence of a peak constraint. The simple formula of Verdu for capacity per unit cost is adapted to a channel with memory, and is used in the proof. In addition to bounding the capacity of a channel with correlated fading, the result gives some insight into the relationship between the correlation in the fading process and the channel capacity. The results are extended to a channel with side information, showing that the capacity per unit energy is one nat per Joule, independently of the peak power constraint. A continuous-time version of the model is also considered. The capacity per unit energy subject to a peak constraint (but no bandwidth constraint) is given by an expression similar to that for discrete time, and is evaluated for Gauss-Markov and Clarke fading channels.
[ { "version": "v1", "created": "Mon, 18 Apr 2005 16:29:14 GMT" }, { "version": "v2", "created": "Sat, 11 Jun 2005 01:36:55 GMT" } ]
2007-07-16T00:00:00
[ [ "Sethuraman", "Vignesh", "" ], [ "Hajek", "Bruce", "" ] ]
new_dataset
0.975311
cs/0504102
Lars Eirik Danielsen
Lars Eirik Danielsen (1), Matthew G. Parker (1) ((1) University of Bergen)
Spectral Orbits and Peak-to-Average Power Ratio of Boolean Functions with respect to the {I,H,N}^n Transform
Presented at Sequences and Their Applications, SETA'04, Seoul, South Korea, October 2004. 17 pages, 10 figures
In Sequences and Their Applications -- SETA 2004, edited by T. Helleseth, D. Sarwate, H.-Y. Song, and K. Yang, Lecture Notes in Comput. Sci., volume 3486, pp. 373--388, Springer-Verlag, Berlin, May 2005.
10.1007/11423461_28
null
cs.IT math.IT
null
We enumerate the inequivalent self-dual additive codes over GF(4) of blocklength n, thereby extending the sequence A090899 in The On-Line Encyclopedia of Integer Sequences from n = 9 to n = 12. These codes have a well-known interpretation as quantum codes. They can also be represented by graphs, where a simple graph operation generates the orbits of equivalent codes. We highlight the regularity and structure of some graphs that correspond to codes with high distance. The codes can also be interpreted as quadratic Boolean functions, where inequivalence takes on a spectral meaning. In this context we define PAR_IHN, peak-to-average power ratio with respect to the {I,H,N}^n transform set. We prove that PAR_IHN of a Boolean function is equivalent to the the size of the maximum independent set over the associated orbit of graphs. Finally we propose a construction technique to generate Boolean functions with low PAR_IHN and algebraic degree higher than 2.
[ { "version": "v1", "created": "Mon, 25 Apr 2005 11:32:25 GMT" } ]
2007-07-16T00:00:00
[ [ "Danielsen", "Lars Eirik", "" ], [ "Parker", "Matthew G.", "" ] ]
new_dataset
0.99315
cs/0505054
Mostafa El-Khamy
Mostafa El-Khamy and Robert J. McEliece
The Partition Weight Enumerator of MDS Codes and its Applications
This is a five page conference version of the paper which was accepted by ISIT 2005. For more information, please contact the authors
null
null
null
cs.IT math.IT
null
A closed form formula of the partition weight enumerator of maximum distance separable (MDS) codes is derived for an arbitrary number of partitions. Using this result, some properties of MDS codes are discussed. The results are extended for the average binary image of MDS codes in finite fields of characteristic two. As an application, we study the multiuser error probability of Reed Solomon codes.
[ { "version": "v1", "created": "Sat, 21 May 2005 01:21:27 GMT" } ]
2007-07-16T00:00:00
[ [ "El-Khamy", "Mostafa", "" ], [ "McEliece", "Robert J.", "" ] ]
new_dataset
0.999168
cs/0508035
Irina Naydenova
Irina Naydenova, Torleiv Klove
Codes for error detection, good or not good
To appear in the proceedings of the 2005 IEEE International Symposium on Information Theory, Adelaide, Australia, September 4-9, 2005
null
null
null
cs.IT math.IT
null
Linear codes for error detection on a q-ary symmetric channel are studied. It is shown that for given dimension k and minimum distance d, there exists a value \mu(d,k) such that if C is a code of length n >= \mu(d,k), then neither C nor its dual are good for error detection. For d >> k or k << d good approximations for \mu(d,k) are given. A generalization to non-linear codes is also given.
[ { "version": "v1", "created": "Thu, 4 Aug 2005 12:48:03 GMT" } ]
2007-07-16T00:00:00
[ [ "Naydenova", "Irina", "" ], [ "Klove", "Torleiv", "" ] ]
new_dataset
0.953854
cs/0509006
Jean-Claude Belfiore
Sheng Yang and Jean-Claude Belfiore
Optimal space-time codes for the MIMO amplify-and-forward cooperative channel
submitted to IEEE Transactions on Information Theory, revised version
null
null
null
cs.IT math.IT
null
In this work, we extend the non-orthogonal amplify-and-forward (NAF) cooperative diversity scheme to the MIMO channel. A family of space-time block codes for a half-duplex MIMO NAF fading cooperative channel with N relays is constructed. The code construction is based on the non-vanishing determinant criterion (NVD) and is shown to achieve the optimal diversity-multiplexing tradeoff (DMT) of the channel. We provide a general explicit algebraic construction, followed by some examples. In particular, in the single relay case, it is proved that the Golden code and the 4x4 Perfect code are optimal for the single-antenna and two-antenna case, respectively. Simulation results reveal that a significant gain (up to 10dB) can be obtained with the proposed codes, especially in the single-antenna case.
[ { "version": "v1", "created": "Fri, 2 Sep 2005 17:38:59 GMT" }, { "version": "v2", "created": "Thu, 4 May 2006 07:54:33 GMT" } ]
2007-07-16T00:00:00
[ [ "Yang", "Sheng", "" ], [ "Belfiore", "Jean-Claude", "" ] ]
new_dataset
0.987906
cs/0510043
Pascal Vontobel
Pascal O. Vontobel, Roxana Smarandache
On Minimal Pseudo-Codewords of Tanner Graphs from Projective Planes
This paper is a slightly reformulated version of the paper that appeared in the proceedings of the 43rd Allerton Conference on Communications, Control, and Computing, Allerton House, Monticello, Illinois, USA, Sept. 28-30, 2005
Proc. 43rd Allerton Conference on Communications, Control, and Computing, Allerton House, Monticello, Illinois, USA, Sept. 28-30, 2005
null
null
cs.IT cs.DM math.IT
null
We would like to better understand the fundamental cone of Tanner graphs derived from finite projective planes. Towards this goal, we discuss bounds on the AWGNC and BSC pseudo-weight of minimal pseudo-codewords of such Tanner graphs, on one hand, and study the structure of minimal pseudo-codewords, on the other.
[ { "version": "v1", "created": "Sat, 15 Oct 2005 23:51:52 GMT" } ]
2007-07-16T00:00:00
[ [ "Vontobel", "Pascal O.", "" ], [ "Smarandache", "Roxana", "" ] ]
new_dataset
0.996915
cs/0601095
Mostafa El-Khamy
Mostafa El-Khamy and Roberto Garello
On the Weight Enumerator and the Maximum Likelihood Performance of Linear Product Codes
26 pages, 10 figures, submitted to IEEE transactions in December 2005
null
null
null
cs.IT math.IT
null
Product codes are widely used in data-storage, optical and wireless applications. Their analytical performance evaluation usually relies on the truncated union bound, which provides a low error rate approximation based on the minimum distance term only. In fact, the complete weight enumerator of most product codes remains unknown. In this paper, concatenated representations are introduced and applied to compute the complete average enumerators of arbitrary product codes over a field Fq. The split weight enumerators of some important constituent codes (Hamming, Reed-Solomon) are studied and used in the analysis. The average binary weight enumerators of Reed Solomon product codes are also derived. Numerical results showing the enumerator behavior are presented. By using the complete enumerators, Poltyrev bounds on the maximum likelihood performance, holding at both high and low error rates, are finally shown and compared against truncated union bounds and simulation results.
[ { "version": "v1", "created": "Mon, 23 Jan 2006 05:43:12 GMT" } ]
2007-07-16T00:00:00
[ [ "El-Khamy", "Mostafa", "" ], [ "Garello", "Roberto", "" ] ]
new_dataset
0.997604
cs/0602067
Michael Baer
Michael B. Baer
Renyi to Renyi -- Source Coding under Siege
5 pages, 1 figure, accepted to ISIT 2006
null
null
null
cs.IT cs.DS math.IT
null
A novel lossless source coding paradigm applies to problems of unreliable lossless channels with low bit rates, in which a vital message needs to be transmitted prior to termination of communications. This paradigm can be applied to Alfred Renyi's secondhand account of an ancient siege in which a spy was sent to scout the enemy but was captured. After escaping, the spy returned to his base in no condition to speak and unable to write. His commander asked him questions that he could answer by nodding or shaking his head, and the fortress was defended with this information. Renyi told this story with reference to prefix coding, but maximizing probability of survival in the siege scenario is distinct from yet related to the traditional source coding objective of minimizing expected codeword length. Rather than finding a code minimizing expected codeword length $\sum_{i=1}^n p(i) l(i)$, the siege problem involves maximizing $\sum_{i=1}^n p(i) \theta^{l(i)}$ for a known $\theta \in (0,1)$. When there are no restrictions on codewords, this problem can be solve using a known generalization of Huffman coding. The optimal solution has coding bounds which are functions of Renyi entropy; in addition to known bounds, new bounds are derived here. The alphabetically constrained version of this problem has applications in search trees and diagnostic testing. A novel dynamic programming algorithm -- based upon the oldest known algorithm for the traditional alphabetic problem -- optimizes this problem in $O(n^3)$ time and $O(n^2)$ space, whereas two novel approximation algorithms can find a suboptimal solution faster: one in linear time, the other in $O(n \log n)$. Coding bounds for the alphabetic version of this problem are also presented.
[ { "version": "v1", "created": "Fri, 17 Feb 2006 23:40:26 GMT" }, { "version": "v2", "created": "Mon, 22 May 2006 20:32:04 GMT" } ]
2007-07-16T00:00:00
[ [ "Baer", "Michael B.", "" ] ]
new_dataset
0.990746
cs/0603124
Sheng Yang
Sheng Yang and Jean-Claude Belfiore
Diversity-Multiplexing Tradeoff of Double Scattering MIMO Channels
17 pages, 1 figure, submitted to IEEE trans. IT
null
null
null
cs.IT math.IT
null
It is well known that the presence of double scattering degrades the performance of a MIMO channel, in terms of both the multiplexing gain and the diversity gain. In this paper, a closed-form expression of the diversity-multiplexing tradeoff (DMT) of double scattering MIMO channels is obtained. It is shown that, for a channel with nT transmit antennas, nR receive antennas and nS scatterers, the DMT only depends on the ordered version of the triple (nT,nS,nR), for arbitrary nT, nS and nR. The condition under which the double scattering channel has the same DMT as the single scattering channel is also established.
[ { "version": "v1", "created": "Thu, 30 Mar 2006 17:45:59 GMT" }, { "version": "v2", "created": "Fri, 31 Mar 2006 12:40:33 GMT" } ]
2007-07-16T00:00:00
[ [ "Yang", "Sheng", "" ], [ "Belfiore", "Jean-Claude", "" ] ]
new_dataset
0.996301
cs/0604093
Jean-Claude Belfiore
F. Oggier, G. Rekaya-Ben Othman, J.-C. Belfiore and E. Viterbo
Perfect Space Time Block Codes
39 pages, 7 figures, submitted to IEEE Trans. on Inform. Theory Sep. 2004, revised version
null
null
null
cs.IT math.IT
null
In this paper, we introduce the notion of perfect space-time block codes (STBC). These codes have full rate, full diversity, non-vanishing constant minimum determinant for increasing spectral efficiency, uniform average transmitted energy per antenna and good shaping. We present algebraic constructions of perfect STBCs for 2, 3, 4 and 6 antennas.
[ { "version": "v1", "created": "Mon, 24 Apr 2006 13:07:32 GMT" } ]
2007-07-16T00:00:00
[ [ "Oggier", "F.", "" ], [ "Othman", "G. Rekaya-Ben", "" ], [ "Belfiore", "J. -C.", "" ], [ "Viterbo", "E.", "" ] ]
new_dataset
0.997171
cs/0609006
Eric Chen
Eric Zhi Chen
New Quasi-Cyclic Codes from Simplex Codes
3 pages
null
null
null
cs.IT math.IT
null
As a generalization of cyclic codes, quasi-cyclic (QC) codes contain many good linear codes. But quasi-cyclic codes studied so far are mainly limited to one generator (1-generator) QC codes. In this correspondence, 2-generator and 3-generator QC codes are studied, and many good, new QC codes are constructed from simplex codes. Some new binary QC codes or related codes, that improve the bounds on maximum minimum distance for binary linear codes are constructed. They are 5-generator QC [93, 17, 34] and [254, 23, 102] codes, and related [96, 17, 36], [256, 23, 104] codes.
[ { "version": "v1", "created": "Sat, 2 Sep 2006 11:08:15 GMT" }, { "version": "v2", "created": "Mon, 20 Nov 2006 15:22:14 GMT" } ]
2007-07-16T00:00:00
[ [ "Chen", "Eric Zhi", "" ] ]
new_dataset
0.999743
cs/0610100
Henry Jerez
Henry N Jerez, Joud Khoury, Chaouki Abdallah
A Mobile Transient Internet Architecture
null
null
null
null
cs.NI cs.IT math.IT
null
This paper describes a new architecture for transient mobile networks destined to merge existing and future network architectures, communication implementations and protocol operations by introducing a new paradigm to data delivery and identification. The main goal of our research is to enable seamless end-to-end communication between mobile and stationary devices across multiple networks and through multiple communication environments. The architecture establishes a set of infrastructure components and protocols that set the ground for a Persistent Identification Network (PIN). The basis for the operation of PIN is an identification space consisting of unique location independent identifiers similar to the ones implemented in the Handle system. Persistent Identifiers are used to identify and locate Digital Entities which can include devices, services, users and even traffic. The architecture establishes a primary connection independent logical structure that can operate over conventional networks or more advanced peer-to-peer aggregation networks. Communication is based on routing pools and novel protocols for routing data across several abstraction levels of the network, regardless of the end-points' current association and state...
[ { "version": "v1", "created": "Tue, 17 Oct 2006 04:47:06 GMT" } ]
2007-07-16T00:00:00
[ [ "Jerez", "Henry N", "" ], [ "Khoury", "Joud", "" ], [ "Abdallah", "Chaouki", "" ] ]
new_dataset
0.985217
cs/0610160
G.Susinder Rajan
G. Susinder Rajan, B. Sundar Rajan
A Non-Orthogonal Distributed Space-Time Coded Protocol Part II-Code Construction and DM-G Tradeoff
Proceedings 2006 IEEE Information Theory Workshop, Chengdu, China (5 pages, No figures)
Proceedings of IEEE ITW'06, Chengdu, China, October 22-26, 2006, pp. 488-492
null
null
cs.IT math.IT
null
This is the second part of a two-part series of papers. In this paper, for the generalized non-orthogonal amplify and forward (GNAF) protocol presented in Part-I, a construction of a new family of distributed space-time codes based on Co-ordinate Interleaved Orthogonal Designs (CIOD) which result in reduced Maximum Likelihood (ML) decoding complexity at the destination is proposed. Further, it is established that the recently proposed Toeplitz space-time codes as well as space-time block codes (STBCs) from cyclic division algebras can be used in GNAF protocol. Finally, a lower bound on the optimal Diversity-Multiplexing Gain (DM-G) tradeoff for the GNAF protocol is established and it is shown that this bound approaches the transmit diversity bound asymptotically as the number of relays and the number of channels uses increases.
[ { "version": "v1", "created": "Sun, 29 Oct 2006 12:49:49 GMT" } ]
2007-07-16T00:00:00
[ [ "Rajan", "G. Susinder", "" ], [ "Rajan", "B. Sundar", "" ] ]
new_dataset
0.99321
cs/0610161
B.Sundar Rajan
G. Susinder Rajan, B. Sundar Rajan
A Non-Orthogonal Distributed Space-Time Coded Protocol Part I: Signal Model and Design Criteria
5 pages, 2 figures, Proceedings of 2006 IEEE Information Theory Workshop (ITW'06), (A typo in equation (1) in the proceedings has been corrected.)
Proceedings of 2006 IEEE Information Theory Workshop (ITW'06), Oct. 22-26, 2006, Chengdu, China, pp.385-389
null
null
cs.IT math.IT
null
In this two-part series of papers, a generalized non-orthogonal amplify and forward (GNAF) protocol which generalizes several known cooperative diversity protocols is proposed. Transmission in the GNAF protocol comprises of two phases - the broadcast phase and the cooperation phase. In the broadcast phase, the source broadcasts its information to the relays as well as the destination. In the cooperation phase, the source and the relays together transmit a space-time code in a distributed fashion. The GNAF protocol relaxes the constraints imposed by the protocol of Jing and Hassibi on the code structure. In Part-I of this paper, a code design criteria is obtained and it is shown that the GNAF protocol is delay efficient and coding gain efficient as well. Moreover GNAF protocol enables the use of sphere decoders at the destination with a non-exponential Maximum likelihood (ML) decoding complexity. In Part-II, several low decoding complexity code constructions are studied and a lower bound on the Diversity-Multiplexing Gain tradeoff of the GNAF protocol is obtained.
[ { "version": "v1", "created": "Sun, 29 Oct 2006 13:43:39 GMT" } ]
2007-07-16T00:00:00
[ [ "Rajan", "G. Susinder", "" ], [ "Rajan", "B. Sundar", "" ] ]
new_dataset
0.983088
cs/0612032
Marat Burnashev V.
Marat V. Burnashev
Code Spectrum and Reliability Function: Binary Symmetric Channel
23 pages, to be published in Problems of Information Transmission
Problems of Information Transmission, vol. 42, no. 4, pp. 3-22, 2006
null
null
cs.IT math.IT
null
A new approach for upper bounding the channel reliability function using the code spectrum is described. It allows to treat in a unified way both a low and a high rate cases. In particular, the earlier known upper bounds are improved, and a new derivation of the sphere-packing bound is presented.
[ { "version": "v1", "created": "Wed, 6 Dec 2006 02:14:08 GMT" } ]
2007-07-16T00:00:00
[ [ "Burnashev", "Marat V.", "" ] ]
new_dataset
0.999125
cs/0701112
Axel Kohnert
Axel Kohnert
(l,s)-Extension of Linear Codes
8 pages
null
null
null
cs.IT math.CO math.IT
null
We construct new linear codes with high minimum distance d. In at least 12 cases these codes improve the minimum distance of the previously known best linear codes for fixed parameters n,k. Among these new codes there is an optimal ternary [88,8,54] code. We develop an algorithm, which starts with already good codes C, i.e. codes with high minimum distance d for given length n and dimension k over the field GF(q). The algorithm is based on the newly defined (l,s)-extension. This is a generalization of the well-known method of adding a parity bit in the case of a binary linear code of odd minimum weight. (l,s)-extension tries to extend the generator matrix of C by adding l columns with the property that at least s of the l letters added to each of the codewords of minimum weight in C are different from 0. If one finds such columns the minimum distance of the extended code is d+s provided that the second smallest weight in C was at least d+s. The question whether such columns exist can be settled using a Diophantine system of equations.
[ { "version": "v1", "created": "Wed, 17 Jan 2007 15:50:15 GMT" } ]
2007-07-16T00:00:00
[ [ "Kohnert", "Axel", "" ] ]
new_dataset
0.996026
cs/9901001
Lex Weaver
Jonathan Baxter, Andrew Tridgell, and Lex Weaver
TDLeaf(lambda): Combining Temporal Difference Learning with Game-Tree Search
5 pages. Also in Proceedings of the Ninth Australian Conference on Neural Networks (ACNN'98), Brisbane QLD, February 1998, pages 168-172
Australian Journal of Intelligent Information Processing Systems, ISSN 1321-2133, Vol. 5 No. 1, Autumn 1998, pages 39-43
null
null
cs.LG cs.AI
null
In this paper we present TDLeaf(lambda), a variation on the TD(lambda) algorithm that enables it to be used in conjunction with minimax search. We present some experiments in both chess and backgammon which demonstrate its utility and provide comparisons with TD(lambda) and another less radical variant, TD-directed(lambda). In particular, our chess program, ``KnightCap,'' used TDLeaf(lambda) to learn its evaluation function while playing on the Free Internet Chess Server (FICS, fics.onenet.net). It improved from a 1650 rating to a 2100 rating in just 308 games. We discuss some of the reasons for this success and the relationship between our results and Tesauro's results in backgammon.
[ { "version": "v1", "created": "Tue, 5 Jan 1999 00:56:54 GMT" } ]
2007-07-16T00:00:00
[ [ "Baxter", "Jonathan", "" ], [ "Tridgell", "Andrew", "" ], [ "Weaver", "Lex", "" ] ]
new_dataset
0.97991
0704.0831
Brooke Shrader
Brooke Shrader and Anthony Ephremides
On packet lengths and overhead for random linear coding over the erasure channel
5 pages, 5 figures, submitted to the 2007 International Wireless Communications and Mobile Computing Conference
null
null
null
cs.IT math.IT
null
We assess the practicality of random network coding by illuminating the issue of overhead and considering it in conjunction with increasingly long packets sent over the erasure channel. We show that the transmission of increasingly long packets, consisting of either of an increasing number of symbols per packet or an increasing symbol alphabet size, results in a data rate approaching zero over the erasure channel. This result is due to an erasure probability that increases with packet length. Numerical results for a particular modulation scheme demonstrate a data rate of approximately zero for a large, but finite-length packet. Our results suggest a reduction in the performance gains offered by random network coding.
[ { "version": "v1", "created": "Fri, 6 Apr 2007 02:25:40 GMT" } ]
2007-07-13T00:00:00
[ [ "Shrader", "Brooke", "" ], [ "Ephremides", "Anthony", "" ] ]
new_dataset
0.974226
0704.1317
Naftali Sommer
Naftali Sommer, Meir Feder and Ofir Shalvi
Low Density Lattice Codes
24 pages, 4 figures. Submitted for publication in IEEE transactions on Information Theory
null
null
null
cs.IT math.IT
null
Low density lattice codes (LDLC) are novel lattice codes that can be decoded efficiently and approach the capacity of the additive white Gaussian noise (AWGN) channel. In LDLC a codeword x is generated directly at the n-dimensional Euclidean space as a linear transformation of a corresponding integer message vector b, i.e., x = Gb, where H, the inverse of G, is restricted to be sparse. The fact that H is sparse is utilized to develop a linear-time iterative decoding scheme which attains, as demonstrated by simulations, good error performance within ~0.5dB from capacity at block length of n = 100,000 symbols. The paper also discusses convergence results and implementation considerations.
[ { "version": "v1", "created": "Wed, 11 Apr 2007 16:07:34 GMT" } ]
2007-07-13T00:00:00
[ [ "Sommer", "Naftali", "" ], [ "Feder", "Meir", "" ], [ "Shalvi", "Ofir", "" ] ]
new_dataset
0.964725
0704.2857
Andrea Montanari
Andrea Montanari and Rudiger Urbanke
Modern Coding Theory: The Statistical Mechanics and Computer Science Point of View
Lectures at Les Houches Summer School on `Complex Systems', July 2006, 44 pages, 25 ps figures
null
null
null
cs.IT cond-mat.stat-mech math.IT
null
These are the notes for a set of lectures delivered by the two authors at the Les Houches Summer School on `Complex Systems' in July 2006. They provide an introduction to the basic concepts in modern (probabilistic) coding theory, highlighting connections with statistical mechanics. We also stress common concepts with other disciplines dealing with similar problems that can be generically referred to as `large graphical models'. While most of the lectures are devoted to the classical channel coding problem over simple memoryless channels, we present a discussion of more complex channel models. We conclude with an overview of the main open challenges in the field.
[ { "version": "v1", "created": "Sun, 22 Apr 2007 01:57:03 GMT" } ]
2007-07-13T00:00:00
[ [ "Montanari", "Andrea", "" ], [ "Urbanke", "Rudiger", "" ] ]
new_dataset
0.964397
0704.3120
Oliver Henkel
Oliver Henkel
Space Time Codes from Permutation Codes
null
Proc. IEEE GlobeCom, San Francisco, California, Nov. 2006
null
null
cs.IT math.IT
null
A new class of space time codes with high performance is presented. The code design utilizes tailor-made permutation codes, which are known to have large minimal distances as spherical codes. A geometric connection between spherical and space time codes has been used to translate them into the final space time codes. Simulations demonstrate that the performance increases with the block lengths, a result that has been conjectured already in previous work. Further, the connection to permutation codes allows for moderate complex en-/decoding algorithms.
[ { "version": "v1", "created": "Tue, 24 Apr 2007 05:45:30 GMT" } ]
2007-07-13T00:00:00
[ [ "Henkel", "Oliver", "" ] ]
new_dataset
0.99962
0705.0081
Yeow Meng Chee
Yeow Meng Chee, San Ling
Constructions of q-Ary Constant-Weight Codes
12 pages
IEEE Transactions on Information Theory, Vol. 53, No. 1, January 2007, pp. 135-146
10.1109/TIT.2006.887499
null
cs.IT math.IT
null
This paper introduces a new combinatorial construction for q-ary constant-weight codes which yields several families of optimal codes and asymptotically optimal codes. The construction reveals intimate connection between q-ary constant-weight codes and sets of pairwise disjoint combinatorial designs of various types.
[ { "version": "v1", "created": "Tue, 1 May 2007 07:16:43 GMT" } ]
2007-07-13T00:00:00
[ [ "Chee", "Yeow Meng", "" ], [ "Ling", "San", "" ] ]
new_dataset
0.961867
0705.1183
Ruoheng Liu
Ruoheng Liu and H. Vincent Poor
Multiple Antenna Secure Broadcast over Wireless Networks
14 pages, 3 figures, to appear in the Proceedings of the First International Workshop on Information Theory for Sensor Networks, Santa Fe, NM, June 18 - 20, 2007
null
null
null
cs.IT math.IT
null
In wireless data networks, communication is particularly susceptible to eavesdropping due to its broadcast nature. Security and privacy systems have become critical for wireless providers and enterprise networks. This paper considers the problem of secret communication over the Gaussian broadcast channel, where a multi-antenna transmitter sends independent confidential messages to two users with perfect secrecy. That is, each user would like to obtain its own message reliably and confidentially. First, a computable Sato-type outer bound on the secrecy capacity region is provided for a multi-antenna broadcast channel with confidential messages. Next, a dirty-paper secure coding scheme and its simplified version are described. For each case, the corresponding achievable rate region is derived under the perfect secrecy requirement. Finally, two numerical examples demonstrate that the Sato-type outer bound is consistent with the boundary of the simplified dirty-paper coding secrecy rate region.
[ { "version": "v1", "created": "Tue, 8 May 2007 21:50:24 GMT" } ]
2007-07-13T00:00:00
[ [ "Liu", "Ruoheng", "" ], [ "Poor", "H. Vincent", "" ] ]
new_dataset
0.99654
0705.1384
Navin Kashyap
Navin Kashyap
Matroid Pathwidth and Code Trellis Complexity
Submitted to SIAM Journal on Discrete Mathematics; 18 pages, 6 figures
null
null
null
cs.DM cs.IT math.IT
null
We relate the notion of matroid pathwidth to the minimum trellis state-complexity (which we term trellis-width) of a linear code, and to the pathwidth of a graph. By reducing from the problem of computing the pathwidth of a graph, we show that the problem of determining the pathwidth of a representable matroid is NP-hard. Consequently, the problem of computing the trellis-width of a linear code is also NP-hard. For a finite field $\F$, we also consider the class of $\F$-representable matroids of pathwidth at most $w$, and correspondingly, the family of linear codes over $\F$ with trellis-width at most $w$. These are easily seen to be minor-closed. Since these matroids (and codes) have branchwidth at most $w$, a result of Geelen and Whittle shows that such matroids (and the corresponding codes) are characterized by finitely many excluded minors. We provide the complete list of excluded minors for $w=1$, and give a partial list for $w=2$.
[ { "version": "v1", "created": "Thu, 10 May 2007 03:00:54 GMT" } ]
2007-07-13T00:00:00
[ [ "Kashyap", "Navin", "" ] ]
new_dataset
0.999272
0706.0682
Marat Burnashev V.
Marat V. Burnashev
Code spectrum and reliability function: Gaussian channel
24 pages, 1 figure
Problems of Information Transmission, vol. 43, no. 2, pp. 3-24, 2007
null
null
cs.IT math.IT
null
A new approach for upper bounding the channel reliability function using the code spectrum is described. It allows to treat both low and high rate cases in a unified way. In particular, the earlier known upper bounds are improved, and a new derivation of the sphere-packing bound is presented.
[ { "version": "v1", "created": "Tue, 5 Jun 2007 19:08:59 GMT" } ]
2007-07-13T00:00:00
[ [ "Burnashev", "Marat V.", "" ] ]
new_dataset
0.993024
0706.0869
Edward Aboufadel
Edward Aboufadel, Timothy Armstrong, Elizabeth Smietana
Position Coding
14 pages, 7 figures
null
null
null
cs.IT math.CO math.IT
null
A position coding pattern is an array of symbols in which subarrays of a certain fixed size appear at most once. So, each subarray uniquely identifies a location in the larger array, which means there is a bijection of some sort from this set of subarrays to a set of coordinates. The key to Fly Pentop Computer paper and other examples of position codes is a method to read the subarray and then convert it to coordinates. Position coding makes use of ideas from discrete mathematics and number theory. In this paper, we will describe the underlying mathematics of two position codes, one being the Anoto code that is the basis of "Fly paper". Then, we will present two new codes, one which uses binary wavelets as part of the bijection.
[ { "version": "v1", "created": "Wed, 6 Jun 2007 17:09:21 GMT" } ]
2007-07-13T00:00:00
[ [ "Aboufadel", "Edward", "" ], [ "Armstrong", "Timothy", "" ], [ "Smietana", "Elizabeth", "" ] ]
new_dataset
0.98673
0706.3502
P Vijay Kumar
Petros Elia and P. Vijay Kumar
Approximately-Universal Space-Time Codes for the Parallel, Multi-Block and Cooperative-Dynamic-Decode-and-Forward Channels
null
null
null
null
cs.IT cs.DM cs.NI math.IT
null
Explicit codes are constructed that achieve the diversity-multiplexing gain tradeoff of the cooperative-relay channel under the dynamic decode-and-forward protocol for any network size and for all numbers of transmit and receive antennas at the relays. A particularly simple code construction that makes use of the Alamouti code as a basic building block is provided for the single relay case. Along the way, we prove that space-time codes previously constructed in the literature for the block-fading and parallel channels are approximately universal, i.e., they achieve the DMT for any fading distribution. It is shown how approximate universality of these codes leads to the first DMT-optimum code construction for the general, MIMO-OFDM channel.
[ { "version": "v1", "created": "Sun, 24 Jun 2007 07:47:57 GMT" }, { "version": "v2", "created": "Fri, 13 Jul 2007 12:43:51 GMT" } ]
2007-07-13T00:00:00
[ [ "Elia", "Petros", "" ], [ "Kumar", "P. Vijay", "" ] ]
new_dataset
0.999758
0707.0459
Petar Popovski
Petar Popovski and Hiroyuki Yomo
Physical Network Coding in Two-Way Wireless Relay Channels
null
Proc. of IEEE International Conference on Communications (ICC), Glasgow, Scotland, 2007
null
null
cs.IT cs.NI math.IT
null
It has recently been recognized that the wireless networks represent a fertile ground for devising communication modes based on network coding. A particularly suitable application of the network coding arises for the two--way relay channels, where two nodes communicate with each other assisted by using a third, relay node. Such a scenario enables application of \emph{physical network coding}, where the network coding is either done (a) jointly with the channel coding or (b) through physical combining of the communication flows over the multiple access channel. In this paper we first group the existing schemes for physical network coding into two generic schemes, termed 3--step and 2--step scheme, respectively. We investigate the conditions for maximization of the two--way rate for each individual scheme: (1) the Decode--and--Forward (DF) 3--step schemes (2) three different schemes with two steps: Amplify--and--Forward (AF), JDF and Denoise--and--Forward (DNF). While the DNF scheme has a potential to offer the best two--way rate, the most interesting result of the paper is that, for some SNR configurations of the source--relay links, JDF yields identical maximal two--way rate as the upper bound on the rate for DNF.
[ { "version": "v1", "created": "Tue, 3 Jul 2007 16:40:41 GMT" } ]
2007-07-13T00:00:00
[ [ "Popovski", "Petar", "" ], [ "Yomo", "Hiroyuki", "" ] ]
new_dataset
0.999362
0707.0860
Mohammad Asad Rehman Chaudhry
Salim Y. El Rouayheb, Mohammad Asad R. Chaudhry, and Alex Sprintson
On the Minimum Number of Transmissions in Single-Hop Wireless Coding Networks
6 pages
null
null
null
cs.IT cs.NI math.IT
null
The advent of network coding presents promising opportunities in many areas of communication and networking. It has been recently shown that network coding technique can significantly increase the overall throughput of wireless networks by taking advantage of their broadcast nature. In wireless networks, each transmitted packet is broadcasted within a certain area and can be overheard by the neighboring nodes. When a node needs to transmit packets, it employs the opportunistic coding approach that uses the knowledge of what the node's neighbors have heard in order to reduce the number of transmissions. With this approach, each transmitted packet is a linear combination of the original packets over a certain finite field. In this paper, we focus on the fundamental problem of finding the optimal encoding for the broadcasted packets that minimizes the overall number of transmissions. We show that this problem is NP-complete over GF(2) and establish several fundamental properties of the optimal solution. We also propose a simple heuristic solution for the problem based on graph coloring and present some empirical results for random settings.
[ { "version": "v1", "created": "Thu, 5 Jul 2007 19:58:23 GMT" } ]
2007-07-13T00:00:00
[ [ "Rouayheb", "Salim Y. El", "" ], [ "Chaudhry", "Mohammad Asad R.", "" ], [ "Sprintson", "Alex", "" ] ]
new_dataset
0.9933
cs/0411003
Andrew Thangaraj
Andrew Thangaraj, Souvik Dihidar, A. R. Calderbank, Steven McLaughlin, Jean-Marc Merolla
Applications of LDPC Codes to the Wiretap Channel
30 pages, revised version
null
null
null
cs.IT cs.CR math.IT
null
With the advent of quantum key distribution (QKD) systems, perfect (i.e. information-theoretic) security can now be achieved for distribution of a cryptographic key. QKD systems and similar protocols use classical error-correcting codes for both error correction (for the honest parties to correct errors) and privacy amplification (to make an eavesdropper fully ignorant). From a coding perspective, a good model that corresponds to such a setting is the wire tap channel introduced by Wyner in 1975. In this paper, we study fundamental limits and coding methods for wire tap channels. We provide an alternative view of the proof for secrecy capacity of wire tap channels and show how capacity achieving codes can be used to achieve the secrecy capacity for any wiretap channel. We also consider binary erasure channel and binary symmetric channel special cases for the wiretap channel and propose specific practical codes. In some cases our designs achieve the secrecy capacity and in others the codes provide security at rates below secrecy capacity. For the special case of a noiseless main channel and binary erasure channel, we consider encoder and decoder design for codes achieving secrecy on the wiretap channel; we show that it is possible to construct linear-time decodable secrecy codes based on LDPC codes that achieve secrecy.
[ { "version": "v1", "created": "Tue, 2 Nov 2004 10:21:59 GMT" }, { "version": "v2", "created": "Mon, 24 Oct 2005 12:18:05 GMT" }, { "version": "v3", "created": "Mon, 29 Jan 2007 08:24:04 GMT" } ]
2007-07-13T00:00:00
[ [ "Thangaraj", "Andrew", "" ], [ "Dihidar", "Souvik", "" ], [ "Calderbank", "A. R.", "" ], [ "McLaughlin", "Steven", "" ], [ "Merolla", "Jean-Marc", "" ] ]
new_dataset
0.99856
cs/0412111
Alexander Barg
Alexander Barg
On the asymptotic accuracy of the union bound
10 pages, 3 figures. Presented at the 42nd Annual Allerton Conference on Communication, Control and Computing (Sept. 29 - Oct. 1, 2004). The paper will appear in the conference proceedings. Version 2 differs slightly from the published version and is the latest version of this paper
null
null
null
cs.IT math.IT
null
A new lower bound on the error probability of maximum likelihood decoding of a binary code on a binary symmetric channel was proved in Barg and McGregor (2004, cs.IT/0407011). It was observed in that paper that this bound leads to a new region of code rates in which the random coding exponent is asymptotically tight, giving a new region in which the reliability of the BSC is known exactly. The present paper explains the relation of these results to the union bound on the error probability.
[ { "version": "v1", "created": "Fri, 24 Dec 2004 19:43:26 GMT" }, { "version": "v2", "created": "Mon, 25 Apr 2005 18:38:53 GMT" } ]
2007-07-13T00:00:00
[ [ "Barg", "Alexander", "" ] ]
new_dataset
0.975513
cs/0501016
Heide Gluesing-Luerssen
Heide Gluesing-Luerssen
On the weight distribution of convolutional codes
null
null
null
null
cs.IT math.IT math.OC
null
Detailed information about the weight distribution of a convolutional code is given by the adjacency matrix of the state diagram associated with a controller canonical form of the code. We will show that this matrix is an invariant of the code. Moreover, it will be proven that codes with the same adjacency matrix have the same dimension and the same Forney indices and finally that for one-dimensional binary convolutional codes the adjacency matrix determines the code uniquely up to monomial equivalence.
[ { "version": "v1", "created": "Mon, 10 Jan 2005 14:08:27 GMT" } ]
2007-07-13T00:00:00
[ [ "Gluesing-Luerssen", "Heide", "" ] ]
new_dataset
0.974646
cs/0502037
Cen Jung Tjhai
C. Tjhai, M. Tomlinson, R. Horan, M. Ambroze and M. Ahmed
GF(2^m) Low-Density Parity-Check Codes Derived from Cyclotomic Cosets
Coding
null
null
null
cs.IT math.IT
null
Based on the ideas of cyclotomic cosets, idempotents and Mattson-Solomon polynomials, we present a new method to construct GF(2^m), where m>0 cyclic low-density parity-check codes. The construction method produces the dual code idempotent which is used to define the parity-check matrix of the low-density parity-check code. An interesting feature of this construction method is the ability to increment the code dimension by adding more idempotents and so steadily decrease the sparseness of the parity-check matrix. We show that the constructed codes can achieve performance very close to the sphere-packing-bound constrained for binary transmission.
[ { "version": "v1", "created": "Mon, 7 Feb 2005 11:37:56 GMT" }, { "version": "v2", "created": "Sat, 23 Jul 2005 12:22:12 GMT" } ]
2007-07-13T00:00:00
[ [ "Tjhai", "C.", "" ], [ "Tomlinson", "M.", "" ], [ "Horan", "R.", "" ], [ "Ambroze", "M.", "" ], [ "Ahmed", "M.", "" ] ]
new_dataset
0.999077
cs/0504020
G David Forney Jr.
G. David Forney Jr
The Viterbi Algorithm: A Personal History
8 pages; presented at Viterbi Conference, University of Southern California, Los Angeles, March 8, 2005
null
null
null
cs.IT math.IT
null
The story of the Viterbi algorithm (VA) is told from a personal perspective. Applications both within and beyond communications are discussed. In brief summary, the VA has proved to be an extremely important algorithm in a surprising variety of fields.
[ { "version": "v1", "created": "Wed, 6 Apr 2005 15:59:31 GMT" }, { "version": "v2", "created": "Fri, 29 Apr 2005 15:06:00 GMT" } ]
2007-07-13T00:00:00
[ [ "Forney", "G. David", "Jr" ] ]
new_dataset
0.969003
cs/0504028
Michael Peleg
Michael Peleg, Amichai Sanderovich and Shlomo Shamai
On Extrinsic Information of Good Codes Operating Over Discrete Memoryless Channels
null
null
null
CCIT-525
cs.IT math.IT
null
We show that the Extrinsic Information about the coded bits of any good (capacity achieving) code operating over a wide class of discrete memoryless channels (DMC) is zero when channel capacity is below the code rate and positive constant otherwise, that is, the Extrinsic Information Transfer (EXIT) chart is a step function of channel quality, for any capacity achieving code. It follows that, for a common class of iterative receivers where the error correcting decoder must operate at first iteration at rate above capacity (such as in turbo equalization, turbo channel estimation, parallel and serial concatenated coding and the like), classical good codes which achieve capacity over the DMC are not effective and should be replaced by different new ones. Another meaning of the results is that a good code operating at rate above channel capacity falls apart into its individual transmitted symbols in the sense that all the information about a coded transmitted symbol is contained in the corresponding received symbol and no information about it can be inferred from the other received symbols. The binary input additive white Gaussian noise channel is treated in part 1 of this report. Part 2 extends the results to the symmetric binary channel and to the binary erasure channel and provides an heuristic extension to wider class of channel models.
[ { "version": "v1", "created": "Thu, 7 Apr 2005 17:35:05 GMT" }, { "version": "v2", "created": "Thu, 14 Apr 2005 06:58:36 GMT" } ]
2007-07-13T00:00:00
[ [ "Peleg", "Michael", "" ], [ "Sanderovich", "Amichai", "" ], [ "Shamai", "Shlomo", "" ] ]
new_dataset
0.975992
cs/0504047
David Doty
David Doty, Jared Nichols
Pushdown dimension
10 page main body; 12 page appendix of proofs
null
null
null
cs.IT cs.CC math.IT
null
This paper develops the theory of pushdown dimension and explores its relationship with finite-state dimension. Pushdown dimension is trivially bounded above by finite-state dimension for all sequences, since a pushdown gambler can simulate any finite-state gambler. We show that for every rational 0 < d < 1, there exists a sequence with finite-state dimension d whose pushdown dimension is at most d/2. This establishes a quantitative analogue of the well-known fact that pushdown automata decide strictly more languages than finite automata.
[ { "version": "v1", "created": "Tue, 12 Apr 2005 22:13:12 GMT" }, { "version": "v2", "created": "Wed, 13 Apr 2005 23:12:11 GMT" }, { "version": "v3", "created": "Fri, 22 Apr 2005 05:09:08 GMT" }, { "version": "v4", "created": "Fri, 27 May 2005 02:46:26 GMT" } ]
2007-07-13T00:00:00
[ [ "Doty", "David", "" ], [ "Nichols", "Jared", "" ] ]
new_dataset
0.985875
cs/0506091
Oscar Takeshita
Oscar Y. Takeshita
A New Construction for LDPC Codes using Permutation Polynomials over Integer Rings
12 pages, 4 figures, submitted to IEEE Transactions on Information Theory
null
null
null
cs.IT math.IT
null
A new construction is proposed for low density parity check (LDPC) codes using quadratic permutation polynomials over finite integer rings. The associated graphs for the new codes have both algebraic and pseudo-random nature, and the new codes are quasi-cyclic. Graph isomorphisms and automorphisms are identified and used in an efficient search for good codes. Graphs with girth as large as 12 were found. Upper bounds on the minimum Hamming distance are found both analytically and algorithmically. The bounds indicate that the minimum distance grows with block length. Near-codewords are one of the causes for error floors in LDPC codes; the new construction provides a good framework for studying near-codewords in LDPC codes. Nine example codes are given, and computer simulation results show the excellent error performance of these codes. Finally, connections are made between this new LDPC construction and turbo codes using interleavers generated by quadratic permutation polynomials.
[ { "version": "v1", "created": "Fri, 24 Jun 2005 15:37:04 GMT" } ]
2007-07-13T00:00:00
[ [ "Takeshita", "Oscar Y.", "" ] ]
new_dataset
0.999485
cs/0506102
John B. Little
John Little, Ryan Schwarz
On $m$-dimensional toric codes
17 pages, 4 figures; typos corrected
null
null
null
cs.IT math.AC math.AG math.IT
null
Toric codes are a class of $m$-dimensional cyclic codes introduced recently by J. Hansen. They may be defined as evaluation codes obtained from monomials corresponding to integer lattice points in an integral convex polytope $P \subseteq \R^m$. As such, they are in a sense a natural extension of Reed-Solomon codes. Several authors have used intersection theory on toric surfaces to derive bounds on the minimum distance of some toric codes with $m = 2$. In this paper, we will provide a more elementary approach that applies equally well to many toric codes for all $m \ge 2$. Our methods are based on a sort of multivariate generalization of Vandermonde determinants that has also been used in the study of multivariate polynomial interpolation. We use these Vandermonde determinants to determine the minimum distance of toric codes from rectangular polytopes and simplices. We also prove a general result showing that if there is a unimodular integer affine transformation taking one polytope $P_1$ to a second polytope $P_2$, then the corresponding toric codes are monomially equivalent (hence have the same parameters). We use this to begin a classification of two-dimensional toric codes with small dimension.
[ { "version": "v1", "created": "Wed, 29 Jun 2005 21:09:37 GMT" }, { "version": "v2", "created": "Mon, 25 Jul 2005 14:15:38 GMT" } ]
2007-07-13T00:00:00
[ [ "Little", "John", "" ], [ "Schwarz", "Ryan", "" ] ]
new_dataset
0.999401
cs/0507031
Misha Stepanov
M. G. Stepanov, M. Chertkov
The error-floor of LDPC codes in the Laplacian channel
43rd Allerton Conference (September 28-30, 2005, Allerton, IL)
null
null
LA-UR-05-5131
cs.IT cond-mat.dis-nn math.IT
null
We analyze the performance of Low-Density-Parity-Check codes in the error-floor domain where the Signal-to-Noise-Ratio, s, is large, s >> 1. We describe how the instanton method of theoretical physics, recently adapted to coding theory, solves the problem of characterizing the error-floor domain in the Laplacian channel. An example of the (155,64,20) LDPC code with four iterations (each iteration consisting of two semi-steps: from bits-to-checks and from checks-to-bits) of the min-sum decoding is discussed. A generalized computational tree analysis is devised to explain the rational structure of the leading instantons. The asymptotic for the symbol Bit-Error-Rate in the error-floor domain is comprised of individual instanton contributions, each estimated as ~ \exp(-l_{inst;L} s), where the effective distances, l_{inst;L}, of the the leading instantons are 7.6, 8.0 and 8.0 respectively. (The Hamming distance of the code is 20.) The analysis shows that the instantons are distinctly different from the ones found for the same coding/decoding scheme performing over the Gaussian channel. We validate instanton results against direct simulations and offer an explanation for remarkable performance of the instanton approximation not only in the extremal, s -> \infty, limit but also at the moderate s values of practical interest.
[ { "version": "v1", "created": "Tue, 12 Jul 2005 02:02:23 GMT" }, { "version": "v2", "created": "Mon, 3 Oct 2005 17:33:02 GMT" } ]
2007-07-13T00:00:00
[ [ "Stepanov", "M. G.", "" ], [ "Chertkov", "M.", "" ] ]
new_dataset
0.999559
cs/0508001
Xiaoyang Gu
Xiaoyang Gu, Jack H. Lutz, Philippe Moser
Dimensions of Copeland-Erdos Sequences
19 pages
null
null
null
cs.CC cs.IT math.IT
null
The base-$k$ {\em Copeland-Erd\"os sequence} given by an infinite set $A$ of positive integers is the infinite sequence $\CE_k(A)$ formed by concatenating the base-$k$ representations of the elements of $A$ in numerical order. This paper concerns the following four quantities. The {\em finite-state dimension} $\dimfs (\CE_k(A))$, a finite-state version of classical Hausdorff dimension introduced in 2001. The {\em finite-state strong dimension} $\Dimfs(\CE_k(A))$, a finite-state version of classical packing dimension introduced in 2004. This is a dual of $\dimfs(\CE_k(A))$ satisfying $\Dimfs(\CE_k(A))$ $\geq \dimfs(\CE_k(A))$. The {\em zeta-dimension} $\Dimzeta(A)$, a kind of discrete fractal dimension discovered many times over the past few decades. The {\em lower zeta-dimension} $\dimzeta(A)$, a dual of $\Dimzeta(A)$ satisfying $\dimzeta(A)\leq \Dimzeta(A)$. We prove the following. $\dimfs(\CE_k(A))\geq \dimzeta(A)$. This extends the 1946 proof by Copeland and Erd\"os that the sequence $\CE_k(\mathrm{PRIMES})$ is Borel normal. $\Dimfs(\CE_k(A))\geq \Dimzeta(A)$. These bounds are tight in the strong sense that these four quantities can have (simultaneously) any four values in $[0,1]$ satisfying the four above-mentioned inequalities.
[ { "version": "v1", "created": "Sat, 30 Jul 2005 04:30:05 GMT" } ]
2007-07-13T00:00:00
[ [ "Gu", "Xiaoyang", "" ], [ "Lutz", "Jack H.", "" ], [ "Moser", "Philippe", "" ] ]
new_dataset
0.98488
cs/0508015
Stanislav Bulygin V.
Stanislav Bulygin
Chosen-ciphertext attack on noncommutative Polly Cracker
null
null
null
null
cs.IT cs.CR math.IT
null
We propose a chosen-ciphertext attack on recently presented noncommutative variant of the well-known Polly Cracker cryptosystem. We show that if one chooses parameters for this noncommutative Polly Cracker as initially proposed, than the system should be claimed as insecure.
[ { "version": "v1", "created": "Tue, 2 Aug 2005 09:48:43 GMT" }, { "version": "v2", "created": "Tue, 8 Nov 2005 19:11:32 GMT" } ]
2007-07-13T00:00:00
[ [ "Bulygin", "Stanislav", "" ] ]
new_dataset
0.995372
cs/0508020
Chris Ng
Chris T. K. Ng and Andrea J. Goldsmith
Capacity Gain from Transmitter and Receiver Cooperation
To appear in the proceedings of the 2005 IEEE International Symposium on Information Theory, Adelaide, Australia, September 4-9, 2005
null
null
null
cs.IT math.IT
null
Capacity gain from transmitter and receiver cooperation are compared in a relay network where the cooperating nodes are close together. When all nodes have equal average transmit power along with full channel state information (CSI), it is proved that transmitter cooperation outperforms receiver cooperation, whereas the opposite is true when power is optimally allocated among the nodes but only receiver phase CSI is available. In addition, when the nodes have equal average power with receiver phase CSI only, cooperation is shown to offer no capacity improvement over a non-cooperative scheme with the same average network power. When the system is under optimal power allocation with full CSI, the decode-and-forward transmitter cooperation rate is close to its cut-set capacity upper bound, and outperforms compress-and-forward receiver cooperation. Moreover, it is shown that full CSI is essential in transmitter cooperation, while optimal power allocation is essential in receiver cooperation.
[ { "version": "v1", "created": "Tue, 2 Aug 2005 18:03:14 GMT" } ]
2007-07-13T00:00:00
[ [ "Ng", "Chris T. K.", "" ], [ "Goldsmith", "Andrea J.", "" ] ]
new_dataset
0.963679
cs/0508024
Kai-Uwe Schmidt
Kai-Uwe Schmidt and Adolf Finger
New Codes for OFDM with Low PMEPR
To appear in the Proceedings of IEEE International Symposium on Information Theory, Sept. 4-9, 2005, Adelaide, Australia
null
null
null
cs.IT math.IT
null
In this paper new codes for orthogonal frequency-division multiplexing (OFDM) with tightly controlled peak-to-mean envelope power ratio (PMEPR) are proposed. We identify a new family of sequences occuring in complementary sets and show that such sequences form subsets of a new generalization of the Reed--Muller codes. Contrarily to previous constructions we present a compact description of such codes, which makes them suitable even for larger block lengths. We also show that some previous constructions just occur as special cases in our construction.
[ { "version": "v1", "created": "Wed, 3 Aug 2005 07:22:41 GMT" } ]
2007-07-13T00:00:00
[ [ "Schmidt", "Kai-Uwe", "" ], [ "Finger", "Adolf", "" ] ]
new_dataset
0.999779
cs/0508025
S\'andor Gy\H{o}ri
S\'andor Gy\H{o}ri
Signature coding for OR channel with asynchronous access
To appear in the proceedings of the 2005 IEEE International Symposium on Information Theory, Adelaide, Australia, September 4-9, 2005
null
null
null
cs.IT math.IT
null
Signature coding for multiple access OR channel is considered. We prove that in block asynchronous case the upper bound on the minimum code length asymptotically is the same as in the case of synchronous access.
[ { "version": "v1", "created": "Wed, 3 Aug 2005 10:47:00 GMT" } ]
2007-07-13T00:00:00
[ [ "Győri", "Sándor", "" ] ]
new_dataset
0.997605
cs/0508107
Beniamin Mounits Mr
Beniamin Mounits (1), Tuvi Etzion (1) and Simon Litsyn (2) ((1) Technion - Israel Institute of Technology, (2) Tel Aviv University)
New Upper Bounds on A(n,d)
To appear in the proceedings of the 2005 IEEE International Symposium on Information Theory, Adelaide, Australia, September 4-9, 2005
null
null
null
cs.IT cs.DM math.IT
null
Upper bounds on the maximum number of codewords in a binary code of a given length and minimum Hamming distance are considered. New bounds are derived by a combination of linear programming and counting arguments. Some of these bounds improve on the best known analytic bounds. Several new record bounds are obtained for codes with small lengths.
[ { "version": "v1", "created": "Wed, 24 Aug 2005 12:27:00 GMT" } ]
2007-07-13T00:00:00
[ [ "Mounits", "Beniamin", "" ], [ "Etzion", "Tuvi", "" ], [ "Litsyn", "Simon", "" ] ]
new_dataset
0.970114
cs/0509044
Igal Sason
Henry D. Pfister and Igal Sason
Accumulate-Repeat-Accumulate Codes: Systematic Codes Achieving the Binary Erasure Channel Capacity with Bounded Complexity
15 pages, 3 figures (please ignore the 16th page in the PDF file, which appears as a result of a temporary problem in the compilation of the PDF; however, the PS file is indeed 15 pages). The paper will be presented in the Forty-Third Annual Allerton Conference on Communication, Control and Computing, Monticello, IL, USA, Sept. 28-30, 2005
null
null
null
cs.IT math.IT
null
The paper introduces ensembles of accumulate-repeat-accumulate (ARA) codes which asymptotically achieve capacity on the binary erasure channel (BEC) with {\em bounded complexity} per information bit. It also introduces symmetry properties which play a central role in the construction of capacity-achieving ensembles for the BEC. The results here improve on the tradeoff between performance and complexity provided by the first capacity-achieving ensembles of irregular repeat-accumulate (IRA) codes with bounded complexity per information bit; these IRA ensembles were previously constructed by Pfister, Sason and Urbanke. The superiority of ARA codes with moderate to large block length is exemplified by computer simulations which compare their performance with those of previously reported capacity-achieving ensembles of LDPC and IRA codes. The ARA codes also have the advantage of being systematic.
[ { "version": "v1", "created": "Thu, 15 Sep 2005 16:15:27 GMT" } ]
2007-07-13T00:00:00
[ [ "Pfister", "Henry D.", "" ], [ "Sason", "Igal", "" ] ]
new_dataset
0.995917
cs/0510003
Giuseppe Abreu
Giuseppe Thadeu Freitas de Abreu
Generalized ABBA Space-Time Block Codes
47 pages, 6 figures, Matlab codes included
null
null
null
cs.IT math.IT
null
Linear space-time block codes (STBCs) of unitary rate and full diversity, systematically constructed over arbitrary constellations for any number of transmit antennas are introduced. The codes are obtained by generalizing the existing ABBA STBCs, a.k.a quasi-orthogonal STBCs (QO-STBCs). Furthermore, a fully orthogonal (symbol-by-symbol) decoder for the new generalized ABBA (GABBA) codes is provided. This remarkably low-complexity decoder relies on partition orthogonality properties of the code structure to decompose the received signal vector into lower-dimension tuples, each dependent only on certain subsets of the transmitted symbols. Orthogonal decodability results from the nested application of this technique, with no matrix inversion or iterative signal processing required. The exact bit-error-rate probability of GABBA codes over generalized fading channels with maximum likelihood (ML) decoding is evaluated analytically and compared against simulation results obtained with the proposed orthogonal decoder. The comparison reveals that the proposed GABBA solution, despite its very low complexity, achieves nearly the same performance of the bound corresponding to the ML-decoded system, especially in systems with large numbers of antennas.
[ { "version": "v1", "created": "Sun, 2 Oct 2005 14:10:11 GMT" } ]
2007-07-13T00:00:00
[ [ "de Abreu", "Giuseppe Thadeu Freitas", "" ] ]
new_dataset
0.99531
cs/0510049
Roxana Smarandache
Roxana Smarandache and Marcel Wauer
Bounds on the Pseudo-Weight of Minimal Pseudo-Codewords of Projective Geometry Codes
12 pages 1 figure, submitted
null
null
null
cs.IT cs.DM math.IT
null
In this paper we focus our attention on a family of finite geometry codes, called type-I projective geometry low-density parity-check (PG-LDPC) codes, that are constructed based on the projective planes PG{2,q). In particular, we study their minimal codewords and pseudo-codewords, as it is known that these vectors characterize completely the code performance under maximum-likelihood decoding and linear programming decoding, respectively. The main results of this paper consist of upper and lower bounds on the pseudo-weight of the minimal pseudo-codewords of type-I PG-LDPC codes.
[ { "version": "v1", "created": "Mon, 17 Oct 2005 15:46:52 GMT" } ]
2007-07-13T00:00:00
[ [ "Smarandache", "Roxana", "" ], [ "Wauer", "Marcel", "" ] ]
new_dataset
0.980047
cs/0511001
Syed Jafar
Syed A. Jafar
Capacity with Causal and Non-Causal Side Information - A Unified View
This work was presented in part at the IEEE Communication Theory Workshop, June 12-15, 2005 and at the Forty-third Annual Allerton Conference on Communication, Control, and Computing, Sept. 28-30, 2005
null
null
null
cs.IT math.IT
null
We identify the common underlying form of the capacity expression that is applicable to both cases where causal or non-causal side information is made available to the transmitter. Using this common form we find that for the single user channel, the multiple access channel, the degraded broadcast channel, and the degraded relay channel, the sum capacity with causal and non-causal side information are identical when all the transmitter side information is also made available to all the receivers. A genie-aided outerbound is developed that states that when a genie provides $n$ bits of side information to a receiver the resulting capacity improvement can not be more than $n$ bits. Combining these two results we are able to bound the relative capacity advantage of non-causal side information over causal side information for both single user as well as various multiple user communication scenarios. Applications of these capacity bounds are demonstrated through examples of random access channels. Interestingly, the capacity results indicate that the excessive MAC layer overheads common in present wireless systems may be avoided through coding across multiple access blocks. It is also shown that even one bit of side information at the transmitter can result in unbounded capacity improvement. As a side, we obtain the sum capacity for a multiple access channel when the side information available to the transmitter is causal and possibly correlated to the side information available to the receiver.
[ { "version": "v1", "created": "Mon, 31 Oct 2005 22:30:54 GMT" }, { "version": "v2", "created": "Thu, 22 Jun 2006 03:13:10 GMT" } ]
2007-07-13T00:00:00
[ [ "Jafar", "Syed A.", "" ] ]
new_dataset
0.996632
cs/0511029
Rasika Perera Mr
Rasika R Perera, Tony S Pollock, Thushara D Abhayapala
Non-coherent Rayleigh fading MIMO channels: Capacity Supremum
08 pages, 5 figures, IEEE Transactions on Information Theory
null
null
null
cs.IT math.IT
null
This paper investigates the limits of information transfer over a fast Rayleigh fading MIMO channel, where neither the transmitter nor the receiver has the knowledge of the channel state information (CSI) except the fading statistics. We develop a scalar channel model due to absence of the phase information in non-coherent Rayleigh fading and derive a capacity supremum with the number of receive antennas at any signal to noise ratio (SNR) using Lagrange optimisation. Also, we conceptualise the discrete nature of the optimal input distribution by posing the optimisation on the channel mutual information for $N$ discrete inputs. Furthermore, we derive an expression for the asymptotic capacity when the input power is large, and compare with the existing capacity results when the receiver is equipped with a large number of antennas.
[ { "version": "v1", "created": "Mon, 7 Nov 2005 03:42:12 GMT" } ]
2007-07-13T00:00:00
[ [ "Perera", "Rasika R", "" ], [ "Pollock", "Tony S", "" ], [ "Abhayapala", "Thushara D", "" ] ]
new_dataset
0.992085
cs/0511081
Shashibhushan Borade
Shashi Borade and Lizhong Zheng
Writing on Fading Paper and Causal Transmitter CSI
null
null
null
null
cs.IT math.IT
null
A wideband fading channel is considered with causal channel state information (CSI) at the transmitter and no receiver CSI. A simple orthogonal code with energy detection rule at the receiver (similar to [6]) is shown to achieve the capacity of this channel in the limit of large bandwidth. This code transmits energy only when the channel gain is large enough. In this limit, this capacity without any receiver CSI is the same as the capacity with full receiver CSI--a phenomenon also true for dirty paper coding. For Rayleigh fading, this capacity (per unit time) is proportional to the logarithm of the bandwidth. Our coding scheme is motivated from the Gel'fand-Pinsker [2,3] coding and dirty paper coding [4]. Nonetheless, for our case, only causal CSI is required at the transmitter in contrast with dirty-paper coding and Gel'fand-Pinsker coding, where non-causal CSI is required. Then we consider a general discrete channel with i.i.d. states. Each input has an associated cost and a zero cost input "0" exists. The channel state is assumed be to be known at the transmitter in a causal manner. Capacity per unit cost is found for this channel and a simple orthogonal code is shown to achieve this capacity. Later, a novel orthogonal coding scheme is proposed for the case of causal transmitter CSI and a condition for equivalence of capacity per unit cost for causal and non-causal transmitter CSI is derived. Finally, some connections are made to the case of non-causal transmitter CSI in [8].
[ { "version": "v1", "created": "Tue, 22 Nov 2005 22:11:46 GMT" }, { "version": "v2", "created": "Tue, 29 Nov 2005 01:41:01 GMT" } ]
2007-07-13T00:00:00
[ [ "Borade", "Shashi", "" ], [ "Zheng", "Lizhong", "" ] ]
new_dataset
0.99789
cs/0512023
Petros Elia
Petros Elia, B. A. Sethuraman and P. Vijay Kumar
Perfect Space-Time Codes with Minimum and Non-Minimum Delay for Any Number of Antennas
null
null
null
null
cs.IT math.IT
null
Perfect space-time codes were first introduced by Oggier et. al. to be the space-time codes that have full rate, full diversity-gain, non-vanishing determinant for increasing spectral efficiency, uniform average transmitted energy per antenna and good shaping of the constellation. These defining conditions jointly correspond to optimality with respect to the Zheng-Tse D-MG tradeoff, independent of channel statistics, as well as to near optimality in maximizing mutual information. All the above traits endow the code with error performance that is currently unmatched. Yet perfect space-time codes have been constructed only for 2,3,4 and 6 transmit antennas. We construct minimum and non-minimum delay perfect codes for all channel dimensions.
[ { "version": "v1", "created": "Tue, 6 Dec 2005 02:03:25 GMT" } ]
2007-07-13T00:00:00
[ [ "Elia", "Petros", "" ], [ "Sethuraman", "B. A.", "" ], [ "Kumar", "P. Vijay", "" ] ]
new_dataset
0.983748
cs/0512027
Jing Chen
Jing Chen
The Physical Foundation of Human Mind and a New Theory of Investment
null
null
null
null
cs.IT math.IT
null
This paper consists of two parts. In the first part, we develop a new information theory, in which it is not a coincidence that information and physical entropy share the same mathematical formula. It is an adaptation of mind to help search for resources. We then show that psychological patterns either reflect the constraints of physical laws or are evolutionary adaptations to efficiently process information and to increase the chance of survival in the environment of our evolutionary past. In the second part, we demonstrate that the new information theory provides the foundation to understand market behavior. One fundamental result from the information theory is that information is costly. In general, information with higher value is more costly. Another fundamental result from the information theory is that the amount of information one can receive is the amount of information generated minus equivocation. The level of equivocation, which is the measure of information asymmetry, is determined by the correlation between the source of information and the receiver of information. In general, how much information one can receive depends on the background knowledge of the receiver. The difference in cost different investors are willing to pay for information and the difference in background knowledge about a particular information causes the heterogeneity in information processing by the investment public, which is the main reason of the price and volume patterns observed in the market. Many assumptions in some of the recent models on behavioral finance can be derived naturally from this theory.
[ { "version": "v1", "created": "Wed, 7 Dec 2005 17:33:51 GMT" }, { "version": "v2", "created": "Thu, 22 Dec 2005 18:59:59 GMT" } ]
2007-07-13T00:00:00
[ [ "Chen", "Jing", "" ] ]
new_dataset
0.995496
cs/0601006
Fady Alajaji
Y. Zhong, F. Alajaji and L. L. Campbell
On the Joint Source-Channel Coding Error Exponent for Discrete Memoryless Systems: Computation and Comparison with Separate Coding
Technical Report, December 2005
null
null
null
cs.IT math.IT
null
We investigate the computation of Csiszar's bounds for the joint source-channel coding (JSCC) error exponent, E_J, of a communication system consisting of a discrete memoryless source and a discrete memoryless channel. We provide equivalent expressions for these bounds and derive explicit formulas for the rates where the bounds are attained. These equivalent representations can be readily computed for arbitrary source-channel pairs via Arimoto's algorithm. When the channel's distribution satisfies a symmetry property, the bounds admit closed-form parametric expressions. We then use our results to provide a systematic comparison between the JSCC error exponent E_J and the tandem coding error exponent E_T, which applies if the source and channel are separately coded. It is shown that E_T <= E_J <= 2E_T. We establish conditions for which E_J > E_T and for which E_J = 2E_T. Numerical examples indicate that E_J is close to 2E_T for many source-channel pairs. This gain translates into a power saving larger than 2 dB for a binary source transmitted over additive white Gaussian noise channels and Rayleigh fading channels with finite output quantization. Finally, we study the computation of the lossy JSCC error exponent under the Hamming distortion measure.
[ { "version": "v1", "created": "Wed, 4 Jan 2006 19:26:57 GMT" } ]
2007-07-13T00:00:00
[ [ "Zhong", "Y.", "" ], [ "Alajaji", "F.", "" ], [ "Campbell", "L. L.", "" ] ]
new_dataset
0.95058
cs/0601070
Misha Stepanov
M.G. Stepanov, M. Chertkov
Instanton analysis of Low-Density-Parity-Check codes in the error-floor regime
5 pages, 5 figures
null
null
LA-UR-06-0126
cs.IT cond-mat.dis-nn math.IT
null
In this paper we develop instanton method introduced in [1], [2], [3] to analyze quantitatively performance of Low-Density-Parity-Check (LDPC) codes decoded iteratively in the so-called error-floor regime. We discuss statistical properties of the numerical instanton-amoeba scheme focusing on detailed analysis and comparison of two regular LDPC codes: Tanner's (155, 64, 20) and Margulis' (672, 336, 16) codes. In the regime of moderate values of the signal-to-noise ratio we critically compare results of the instanton-amoeba evaluations against the standard Monte-Carlo calculations of the Frame-Error-Rate.
[ { "version": "v1", "created": "Mon, 16 Jan 2006 08:08:45 GMT" } ]
2007-07-13T00:00:00
[ [ "Stepanov", "M. G.", "" ], [ "Chertkov", "M.", "" ] ]
new_dataset
0.991151
cs/0602015
Ahmad Khoshnevis
Ahmad Khoshnevis and Ashutosh Sabharwal
On the Asymptotic Performance of Multiple Antenna Channels with Fast Channel Feedback
Submitted to IEEE Transactions on Information Theory
null
null
null
cs.IT math.IT
null
In this paper, we analyze the asymptotic performance of multiple antenna channels where the transmitter has either perfect or finite bit channel state information. Using the diversity-multiplexing tradeoff to characterize the system performance, we demonstrate that channel feedback can fundamentally change the system behavior. Even one-bit of information can increase the diversity order of the system compared to the system with no transmitter information. In addition, as the amount of channel information at the transmitter increases, the diversity order for each multiplexing gain increases and goes to infinity for perfect transmitter information. The major reason for diversity order gain is a "location-dependent" temporal power control, which adapts the power control strategy based on the average channel conditions of the channel.
[ { "version": "v1", "created": "Mon, 6 Feb 2006 07:29:17 GMT" } ]
2007-07-13T00:00:00
[ [ "Khoshnevis", "Ahmad", "" ], [ "Sabharwal", "Ashutosh", "" ] ]
new_dataset
0.992155
cs/0602032
David Doty
David Doty, Jack H. Lutz, Satyadev Nandakumar
Finite-State Dimension and Real Arithmetic
15 pages
null
null
null
cs.CC cs.IT math.IT
null
We use entropy rates and Schur concavity to prove that, for every integer k >= 2, every nonzero rational number q, and every real number alpha, the base-k expansions of alpha, q+alpha, and q*alpha all have the same finite-state dimension and the same finite-state strong dimension. This extends, and gives a new proof of, Wall's 1949 theorem stating that the sum or product of a nonzero rational number and a Borel normal number is always Borel normal.
[ { "version": "v1", "created": "Thu, 9 Feb 2006 00:20:30 GMT" } ]
2007-07-13T00:00:00
[ [ "Doty", "David", "" ], [ "Lutz", "Jack H.", "" ], [ "Nandakumar", "Satyadev", "" ] ]
new_dataset
0.990569
cs/0602046
Martin Wainwright
Emin Martinian, Martin J. Wainwright
Analysis of LDGM and compound codes for lossy compression and binning
5 pages; to appear in Workshop on Information Theory and its Applications, February 2006, San Diego
null
null
null
cs.IT math.IT
null
Recent work has suggested that low-density generator matrix (LDGM) codes are likely to be effective for lossy source coding problems. We derive rigorous upper bounds on the effective rate-distortion function of LDGM codes for the binary symmetric source, showing that they quickly approach the rate-distortion function as the degree increases. We also compare and contrast the standard LDGM construction with a compound LDPC/LDGM construction introduced in our previous work, which provably saturates the rate-distortion bound with finite degrees. Moreover, this compound construction can be used to generate nested codes that are simultaneously good as source and channel codes, and are hence well-suited to source/channel coding with side information. The sparse and high-girth graphical structure of our constructions render them well-suited to message-passing encoding.
[ { "version": "v1", "created": "Mon, 13 Feb 2006 03:07:28 GMT" } ]
2007-07-13T00:00:00
[ [ "Martinian", "Emin", "" ], [ "Wainwright", "Martin J.", "" ] ]
new_dataset
0.952635
cs/0602085
Michael Baer
Michael B. Baer
Twenty (or so) Questions: $D$-ary Length-Bounded Prefix Coding
12 pages, 4 figures, extended version of cs/0701012 (accepted to ISIT 2007), formerly "Twenty (or so) Questions: $D$-ary Bounded-Length Huffman Coding"
null
null
null
cs.IT cs.DS math.IT
null
Efficient optimal prefix coding has long been accomplished via the Huffman algorithm. However, there is still room for improvement and exploration regarding variants of the Huffman problem. Length-limited Huffman coding, useful for many practical applications, is one such variant, for which codes are restricted to the set of codes in which none of the $n$ codewords is longer than a given length, $l_{\max}$. Binary length-limited coding can be done in $O(n l_{\max})$ time and O(n) space via the widely used Package-Merge algorithm and with even smaller asymptotic complexity using a lesser-known algorithm. In this paper these algorithms are generalized without increasing complexity in order to introduce a minimum codeword length constraint $l_{\min}$, to allow for objective functions other than the minimization of expected codeword length, and to be applicable to both binary and nonbinary codes; nonbinary codes were previously addressed using a slower dynamic programming approach. These extensions have various applications -- including fast decompression and a modified version of the game ``Twenty Questions'' -- and can be used to solve the problem of finding an optimal code with limited fringe, that is, finding the best code among codes with a maximum difference between the longest and shortest codewords. The previously proposed method for solving this problem was nonpolynomial time, whereas solving this using the novel linear-space algorithm requires only $O(n (l_{\max}- l_{\min})^2)$ time, or even less if $l_{\max}- l_{\min}$ is not $O(\log n)$.
[ { "version": "v1", "created": "Sat, 25 Feb 2006 19:09:11 GMT" }, { "version": "v2", "created": "Thu, 6 Apr 2006 01:20:41 GMT" }, { "version": "v3", "created": "Wed, 12 Apr 2006 05:39:00 GMT" }, { "version": "v4", "created": "Wed, 20 Jun 2007 19:47:12 GMT" } ]
2007-07-13T00:00:00
[ [ "Baer", "Michael B.", "" ] ]
new_dataset
0.998779
cs/0603013
Heide Gluesing-Luerssen
Heide Gluesing-Luerssen, Gert Schneider
On the MacWilliams Identity for Convolutional Codes
null
null
null
null
cs.IT math.IT math.OC
null
The adjacency matrix associated with a convolutional code collects in a detailed manner information about the weight distribution of the code. A MacWilliams Identity Conjecture, stating that the adjacency matrix of a code fully determines the adjacency matrix of the dual code, will be formulated, and an explicit formula for the transformation will be stated. The formula involves the MacWilliams matrix known from complete weight enumerators of block codes. The conjecture will be proven for the class of convolutional codes where either the code itself or its dual does not have Forney indices bigger than one. For the general case the conjecture is backed up by many examples, and a weaker version will be established.
[ { "version": "v1", "created": "Thu, 2 Mar 2006 17:57:02 GMT" } ]
2007-07-13T00:00:00
[ [ "Gluesing-Luerssen", "Heide", "" ], [ "Schneider", "Gert", "" ] ]
new_dataset
0.999012
cs/0603014
Carlos Munuera
C. Carvalho, C. Munuera, E. Silva, F. Torres
Near orders and codes
15 pages
null
null
null
cs.IT math.IT
null
Hoholdt, van Lint and Pellikaan used order functions to construct codes by means of Linear Algebra and Semigroup Theory only. However, Geometric Goppa codes that can be represented by this method are mainly those based on just one point. In this paper we introduce the concept of near order function with the aim of generalize this approach in such a way that a of wider family of Geometric Goppa codes can be studied on a more elementary setting.
[ { "version": "v1", "created": "Thu, 2 Mar 2006 18:31:13 GMT" } ]
2007-07-13T00:00:00
[ [ "Carvalho", "C.", "" ], [ "Munuera", "C.", "" ], [ "Silva", "E.", "" ], [ "Torres", "F.", "" ] ]
new_dataset
0.997152
cs/0603018
Siddharth Ray
Siddharth Ray, Muriel Medard and Lizhong Zheng
On Non-coherent MIMO Channels in the Wideband Regime: Capacity and Reliability
null
null
null
null
cs.IT math.IT
null
We consider a multiple-input, multiple-output (MIMO) wideband Rayleigh block fading channel where the channel state is unknown to both the transmitter and the receiver and there is only an average power constraint on the input. We compute the capacity and analyze its dependence on coherence length, number of antennas and receive signal-to-noise ratio (SNR) per degree of freedom. We establish conditions on the coherence length and number of antennas for the non-coherent channel to have a "near coherent" performance in the wideband regime. We also propose a signaling scheme that is near-capacity achieving in this regime. We compute the error probability for this wideband non-coherent MIMO channel and study its dependence on SNR, number of transmit and receive antennas and coherence length. We show that error probability decays inversely with coherence length and exponentially with the product of the number of transmit and receive antennas. Moreover, channel outage dominates error probability in the wideband regime. We also show that the critical as well as cut-off rates are much smaller than channel capacity in this regime.
[ { "version": "v1", "created": "Fri, 3 Mar 2006 22:41:58 GMT" } ]
2007-07-13T00:00:00
[ [ "Ray", "Siddharth", "" ], [ "Medard", "Muriel", "" ], [ "Zheng", "Lizhong", "" ] ]
new_dataset
0.96102
cs/0603095
Yan-Xiu Zheng
Yan-Xiu Zheng and Yu T. Su
A Turbo Coding System for High Speed Communications
11 figures
null
null
null
cs.IT math.IT
null
Conventional turbo codes (CTCs) usually employ a block-oriented interleaving so that each block is separately encoded and decoded. As interleaving and de-interleaving are performed within a block, the message-passing process associated with an iterative decoder is limited to proceed within the corresponding range. This paper presents a new turbo coding scheme that uses a special interleaver structure and a multiple-round early termination test involving both sign check and a CRC code. The new interleaver structure is naturally suited for high speed parallel processing and the resulting coding system offers new design options and tradeoffs that are not available to CTCs. In particular, it becomes possible for the decoder to employ an efficient inter-block collaborative decoding algorithm, passing the information obtained from termination test proved blocks to other unproved blocks. It also becomes important to have a proper decoding schedule. The combined effect is improved performance and reduction in the average decoding delay (whence the required computing power). A memory (storage) management mechanism is included as a critical part of the decoder so as to provide additional design tradeoff between performance and memory size. It is shown that the latter has a modular-like effect in that additional memory units render enhanced performance due not only to less forced early terminations but to possible increases of the interleaving depth. Depending on the decoding schedule, the degree of parallelism and other decoding resources available, the proposed scheme admits a variety of decoder architectures that meet a large range of throughput and performance demands.
[ { "version": "v1", "created": "Thu, 23 Mar 2006 15:03:09 GMT" } ]
2007-07-13T00:00:00
[ [ "Zheng", "Yan-Xiu", "" ], [ "Su", "Yu T.", "" ] ]
new_dataset
0.998562
cs/0603098
Siddharth Ray
Siddharth Ray, Muriel Medard and Lizhong Zheng
A SIMO Fiber Aided Wireless Network Architecture
null
null
null
null
cs.IT math.IT
null
The concept of a fiber aided wireless network architecture (FAWNA) is introduced in [Ray et al., Allerton Conference 2005], which allows high-speed mobile connectivity by leveraging the speed of optical networks. In this paper, we consider a single-input, multiple-output (SIMO) FAWNA, which consists of a SIMO wireless channel and an optical fiber channel, connected through wireless-optical interfaces. We propose a scheme where the received wireless signal at each interface is quantized and sent over the fiber. Though our architecture is similar to that of the classical CEO problem, our problem is different from it. We show that the capacity of our scheme approaches the capacity of the architecture, exponentially with fiber capacity. We also show that for a given fiber capacity, there is an optimal operating wireless bandwidth and an optimal number of wireless-optical interfaces. The wireless-optical interfaces of our scheme have low complexity and do not require knowledge of the transmitter code book. They are also extendable to FAWNAs with large number of transmitters and interfaces and, offer adaptability to variable rates, changing channel conditions and node positions.
[ { "version": "v1", "created": "Sat, 25 Mar 2006 00:46:44 GMT" } ]
2007-07-13T00:00:00
[ [ "Ray", "Siddharth", "" ], [ "Medard", "Muriel", "" ], [ "Zheng", "Lizhong", "" ] ]
new_dataset
0.994208
cs/0604005
Sergio Servetto
Sergio D. Servetto (Cornell University)
Multiterminal Source Coding with Two Encoders--I: A Computable Outer Bound
Submitted to the IEEE Transactions on Information Theory; Revised, November 2006. Substantial revision after the first round of reviews
null
null
null
cs.IT math.IT
null
In this first part, a computable outer bound is proved for the multiterminal source coding problem, for a setup with two encoders, discrete memoryless sources, and bounded distortion measures.
[ { "version": "v1", "created": "Mon, 3 Apr 2006 04:44:33 GMT" }, { "version": "v2", "created": "Mon, 8 May 2006 22:12:18 GMT" }, { "version": "v3", "created": "Wed, 15 Nov 2006 05:32:28 GMT" } ]
2007-07-13T00:00:00
[ [ "Servetto", "Sergio D.", "", "Cornell University" ] ]
new_dataset
0.97277
cs/0604049
Vignesh Sethuraman
Vignesh Sethuraman, Bruce Hajek
Low SNR Capacity of Fading Channels with Peak and Average Power Constraints
13 pages, version without proofs submitted to ISIT 2006
null
null
null
cs.IT math.IT
null
Flat-fading channels that are correlated in time are considered under peak and average power constraints. For discrete-time channels, a new upper bound on the capacity per unit time is derived. A low SNR analysis of a full-scattering vector channel is used to derive a complimentary lower bound. Together, these bounds allow us to identify the exact scaling of channel capacity for a fixed peak to average ratio, as the average power converges to zero. The upper bound is also asymptotically tight as the average power converges to zero for a fixed peak power. For a continuous time infinite bandwidth channel, Viterbi identified the capacity for M-FSK modulation. Recently, Zhang and Laneman showed that the capacity can be achieved with non-bursty signaling (QPSK). An additional contribution of this paper is to obtain similar results under peak and average power constraints.
[ { "version": "v1", "created": "Tue, 11 Apr 2006 23:02:57 GMT" }, { "version": "v2", "created": "Thu, 13 Apr 2006 03:40:27 GMT" } ]
2007-07-13T00:00:00
[ [ "Sethuraman", "Vignesh", "" ], [ "Hajek", "Bruce", "" ] ]
new_dataset
0.990444
cs/0604085
Gayathre Krishnan
Gayathre Krishnan
Information in Quantum Description and Gate Implementation
4 pages
null
null
null
cs.IT math.IT
null
This note considers Kak's observer-reference model of quantum information, where it is shown that qubits carry information that is sqrt n / ln n times classical information, where n is the number of components in the measurement system, to analyze information processing in quantum gates. The obverse side of this exponential nature of quantum information is that the computational complexity of implementing unconditionally reliable quantum gates is also exponential.
[ { "version": "v1", "created": "Fri, 21 Apr 2006 16:36:45 GMT" } ]
2007-07-13T00:00:00
[ [ "Krishnan", "Gayathre", "" ] ]
new_dataset
0.983916
cs/0605005
Ruoheng Liu
Ruoheng Liu, Ivana Maric, Roy D. Yates, and Predrag Spasojevic
The Discrete Memoryless Multiple Access Channel with Confidential Messages
1 figure, accepted by ISIT 2006 conference
null
null
null
cs.IT math.IT
null
A multiple-access channel is considered in which messages from one encoder are confidential. Confidential messages are to be transmitted with perfect secrecy, as measured by equivocation at the other encoder. The upper bounds and the achievable rates for this communication situation are determined.
[ { "version": "v1", "created": "Mon, 1 May 2006 21:19:29 GMT" }, { "version": "v2", "created": "Sat, 17 Feb 2007 20:28:23 GMT" } ]
2007-07-13T00:00:00
[ [ "Liu", "Ruoheng", "" ], [ "Maric", "Ivana", "" ], [ "Yates", "Roy D.", "" ], [ "Spasojevic", "Predrag", "" ] ]
new_dataset
0.97752
cs/0605014
Yingbin Liang
Yingbin Liang and H. Vincent Poor
Generalized Multiple Access Channels with Confidential Messages
Submitted to IEEE Transactions on Information Theory, April 2006
null
null
null
cs.IT math.IT
null
A discrete memoryless generalized multiple access channel (GMAC) with confidential messages is studied, where two users attempt to transmit common information to a destination and each user also has private (confidential) information intended for the destination. The two users are allowed to receive channel outputs, and hence may obtain the confidential information sent by each other from channel outputs they receive. However, each user views the other user as a wire-tapper, and wishes to keep its confidential information as secret as possible from the other user. The level of secrecy of the confidential information is measured by the equivocation rate, i.e., the entropy rate of the confidential information conditioned on channel outputs at the wire-tapper. The performance measure of interest for the GMAC with confidential messages is the rate-equivocation tuple that includes the common rate, two private rates and two equivocation rates as components. The set that includes all these achievable rate-equivocation tuples is referred to as the capacity-equivocation region. The GMAC with one confidential message set is first studied, where only one user (user 1) has private (confidential) information for the destination. Inner and outer bounds on the capacity-equivocation region are derived, and the capacity-equivocation are established for some classes of channels including the Gaussian GMAC. Furthermore, the secrecy capacity region is established, which is the set of all achievable rates with user 2 being perfectly ignorant of confidential messages of user 1. For the GMAC with two confidential message sets, where both users have confidential messages for the destination, an inner bound on the capacity-equivocation region is obtained.
[ { "version": "v1", "created": "Thu, 4 May 2006 18:33:15 GMT" } ]
2007-07-13T00:00:00
[ [ "Liang", "Yingbin", "" ], [ "Poor", "H. Vincent", "" ] ]
new_dataset
0.997181
cs/0605044
Georg Schmidt
Georg Schmidt, and Vladimir R. Sidorenko
Linear Shift-Register Synthesis for Multiple Sequences of Varying Length
null
null
null
null
cs.IT math.IT
null
The problem of finding the shortest linear shift-register capable of generating t finite length sequences over some field F is considered. A similar problem was already addressed by Feng and Tzeng. They presented an iterative algorithm for solving this multi-sequence shift-register synthesis problem, which can be considered as generalization of the well known Berlekamp-Massey algorithm. The Feng-Tzeng algorithm works indeed, if all t sequences have the same length. This paper focuses on multi-sequence shift-register synthesis for generating sequences of varying length. It is exposed, that the Feng-Tzeng algorithm does not always give the correct solution in this case. A modified algorithm is proposed and formally proved, which overcomes this problem.
[ { "version": "v1", "created": "Tue, 9 May 2006 21:23:11 GMT" } ]
2007-07-13T00:00:00
[ [ "Schmidt", "Georg", "" ], [ "Sidorenko", "Vladimir R.", "" ] ]
new_dataset
0.983471
cs/0605079
Amos Lapidoth
Amos Lapidoth, Shlomo Shamai, Michele Wigger
On the Capacity of Fading MIMO Broadcast Channels with Imperfect Transmitter Side-Information
Extended version of a paper of the same title that appeared in the Proceedings of the 43rd Annual Allerton Conference on Communication, Control, and Computing, Sept. 28-30, 2005
null
null
null
cs.IT math.IT
null
A fading broadcast channel is considered where the transmitter employs two antennas and each of the two receivers employs a single receive antenna. It is demonstrated that even if the realization of the fading is precisely known to the receivers, the high signal-to-noise (SNR) throughput is greatly reduced if, rather than knowing the fading realization \emph{precisely}, the trasmitter only knows the fading realization \emph{approximately}. The results are general and are not limited to memoryless Gaussian fading.
[ { "version": "v1", "created": "Wed, 17 May 2006 22:29:44 GMT" } ]
2007-07-13T00:00:00
[ [ "Lapidoth", "Amos", "" ], [ "Shamai", "Shlomo", "" ], [ "Wigger", "Michele", "" ] ]
new_dataset
0.997582
cs/0605084
Yingbin Liang
Yingbin Liang and H. Vincent Poor
The Generalized Multiple Access Channel with Confidential Messages
To appear in the Proceedings of the 2006 IEEE International Symposium on Information Theory, Seattle, WA, July 9 - 14, 2006
null
null
null
cs.IT math.IT
null
A discrete memoryless generalized multiple access channel (GMAC) with confidential messages is studied, where two users attempt to transmit common information to a destination and each user also has private (confidential) information intended for the destination. This channel generalizes the multiple access channel (MAC) in that the two users also receive channel outputs. It is assumed that each user views the other user as a wire-tapper, and wishes to keep its confidential information as secret as possible from the other user. The level of secrecy of the confidential information is measured by the equivocation rate. The performance measure of interest is the rate-equivocation tuple that includes the common rate, two private rates and two equivocation rates as components. The set that includes all achievable rate-equivocation tuples is referred to as the capacity-equivocation region. For the GMAC with one confidential message set, where only one user (user 1) has private (confidential) information for the destination, inner and outer bounds on the capacity-equivocation region are derived. The secrecy capacity region is established, which is the set of all achievable rates with user 2 being perfectly ignorant of confidential messages of user 1. Furthermore, the capacity-equivocation region and the secrecy capacity region are established for the degraded GMAC with one confidential message set. For the GMAC with two confidential message sets, where both users have confidential messages for the destination, inner bounds on the capacity-equivocation region and the secrecy capacity region are obtained.
[ { "version": "v1", "created": "Fri, 19 May 2006 05:02:09 GMT" } ]
2007-07-13T00:00:00
[ [ "Liang", "Yingbin", "" ], [ "Poor", "H. Vincent", "" ] ]
new_dataset
0.995476
cs/0605105
Chandra Nair
Chandra Nair, Abbas El Gamal
An outer bound to the capacity region of the broadcast channel
12 pages, 1 figure ISIT 2006
null
null
null
cs.IT math.IT
null
An outer bound to the capacity region of the two-receiver discrete memoryless broadcast channel is given. The outer bound is tight for all cases where the capacity region is known. When specialized to the case of no common information, this outer bound is contained in the Korner-Marton outer bound. This containment is shown to be strict for the binary skew-symmetric broadcast channel. Thus, this outer bound is in general tighter than all other known outer bounds on the discrete memoryless broadcast channel.
[ { "version": "v1", "created": "Wed, 24 May 2006 14:40:45 GMT" }, { "version": "v2", "created": "Thu, 5 Oct 2006 16:58:27 GMT" } ]
2007-07-13T00:00:00
[ [ "Nair", "Chandra", "" ], [ "Gamal", "Abbas El", "" ] ]
new_dataset
0.968686
cs/0606051
Shu-Tao Xia
Shu-Tao Xia, Fang-Wei Fu
Minimum Pseudo-Weight and Minimum Pseudo-Codewords of LDPC Codes
17 pages, 1 figure
null
null
null
cs.IT math.IT
null
In this correspondence, we study the minimum pseudo-weight and minimum pseudo-codewords of low-density parity-check (LDPC) codes under linear programming (LP) decoding. First, we show that the lower bound of Kelly, Sridhara, Xu and Rosenthal on the pseudo-weight of a pseudo-codeword of an LDPC code with girth greater than 4 is tight if and only if this pseudo-codeword is a real multiple of a codeword. Then, we show that the lower bound of Kashyap and Vardy on the stopping distance of an LDPC code is also a lower bound on the pseudo-weight of a pseudo-codeword of this LDPC code with girth 4, and this lower bound is tight if and only if this pseudo-codeword is a real multiple of a codeword. Using these results we further show that for some LDPC codes, there are no other minimum pseudo-codewords except the real multiples of minimum codewords. This means that the LP decoding for these LDPC codes is asymptotically optimal in the sense that the ratio of the probabilities of decoding errors of LP decoding and maximum-likelihood decoding approaches to 1 as the signal-to-noise ratio leads to infinity. Finally, some LDPC codes are listed to illustrate these results.
[ { "version": "v1", "created": "Mon, 12 Jun 2006 05:12:10 GMT" }, { "version": "v2", "created": "Sat, 11 Nov 2006 14:07:48 GMT" } ]
2007-07-13T00:00:00
[ [ "Xia", "Shu-Tao", "" ], [ "Fu", "Fang-Wei", "" ] ]
new_dataset
0.985764
cs/0606074
Yingbin Liang
Yingbin Liang and Gerhard Kramer
Rate Regions for Relay Broadcast Channels
Submitted to the IEEE Transactions on Information Theory, June 2006
null
null
null
cs.IT math.IT
null
A partially cooperative relay broadcast channel (RBC) is a three-node network with one source node and two destination nodes (destinations 1 and 2) where destination 1 can act as a relay to assist destination 2. Inner and outer bounds on the capacity region of the discrete memoryless partially cooperative RBC are obtained. When the relay function is disabled, the inner and outer bounds reduce to new bounds on the capacity region of broadcast channels. Four classes of RBCs are studied in detail. For the partially cooperative RBC with degraded message sets, inner and outer bounds are obtained. For the semideterministic partially cooperative RBC and the orthogonal partially cooperative RBC, the capacity regions are established. For the parallel partially cooperative RBC with unmatched degraded subchannels, the capacity region is established for the case of degraded message sets. The capacity is also established when the source node has only a private message for destination 2, i.e., the channel reduces to a parallel relay channel with unmatched degraded subchannels.
[ { "version": "v1", "created": "Thu, 15 Jun 2006 14:41:12 GMT" } ]
2007-07-13T00:00:00
[ [ "Liang", "Yingbin", "" ], [ "Kramer", "Gerhard", "" ] ]
new_dataset
0.99552
cs/0607021
Jun Chen
Jun Chen, Da-ke He, and Ashish Jagmohan
Slepian-Wolf Code Design via Source-Channel Correspondence
to appear at ISIT 2006
null
null
null
cs.IT math.IT
null
We consider Slepian-Wolf code design based on LDPC (low-density parity-check) coset codes for memoryless source-side information pairs. A density evolution formula, equipped with a concentration theorem, is derived for Slepian- Wolf coding based on LDPC coset codes. As a consequence, an intimate connection between Slepian-Wolf coding and channel coding is established. Specifically we show that, under density evolution, design of binary LDPC coset codes for Slepian-Wolf coding of an arbitrary memoryless source-side information pair reduces to design of binary LDPC codes for binary-input output-symmetric channels without loss of optimality. With this connection, many classic results in channel coding can be easily translated into the Slepian-Wolf setting.
[ { "version": "v1", "created": "Thu, 6 Jul 2006 22:14:47 GMT" } ]
2007-07-13T00:00:00
[ [ "Chen", "Jun", "" ], [ "He", "Da-ke", "" ], [ "Jagmohan", "Ashish", "" ] ]
new_dataset
0.995415
cs/0607068
Felice Manganiello
Felice Manganiello
Computation of the Weight Distribution of CRC Codes
16 pages, 1 figure, submitted for publication
null
null
null
cs.IT math.AC math.IT
null
In this article, we illustrate an algorithm for the computation of the weight distribution of CRC codes. The recursive structure of CRC codes will give us an iterative way to compute the weight distribution of their dual codes starting from just some ``representative'' words. Thanks to MacWilliams Theorem, the computation of the weight distribution of dual codes can be easily brought back to that of CRC codes. This algorithm is a good alternative to the standard algorithm that involves listing every word of the code.
[ { "version": "v1", "created": "Thu, 13 Jul 2006 17:24:20 GMT" } ]
2007-07-13T00:00:00
[ [ "Manganiello", "Felice", "" ] ]
new_dataset
0.995627
cs/0607074
Xiaohong Peng
Xiao-Hong Peng and Paddy Farrell
On Construction of the (24,12,8) Golay Codes
To appear in IEEE Trans. on Information Theory Vol. 24 No. 8
null
null
null
cs.IT math.IT
null
Two product array codes are used to construct the (24, 12, 8) binary Golay code through the direct sum operation. This construction provides a systematic way to find proper (8, 4, 4) linear block component codes for generating the Golay code, and it generates and extends previously existing methods that use a similar construction framework. The code constructed is simple to decode.
[ { "version": "v1", "created": "Fri, 14 Jul 2006 18:39:36 GMT" } ]
2007-07-13T00:00:00
[ [ "Peng", "Xiao-Hong", "" ], [ "Farrell", "Paddy", "" ] ]
new_dataset
0.999603