scispace - formally typeset
Search or ask a question

Showing papers in "IEEE Transactions on Information Theory in 1999"


Journal ArticleDOI
TL;DR: A generalization of orthogonal designs is shown to provide space-time block codes for both real and complex constellations for any number of transmit antennas and it is shown that many of the codes presented here are optimal in this sense.
Abstract: We introduce space-time block coding, a new paradigm for communication over Rayleigh fading channels using multiple transmit antennas. Data is encoded using a space-time block code and the encoded data is split into n streams which are simultaneously transmitted using n transmit antennas. The received signal at each receive antenna is a linear superposition of the n transmitted signals perturbed by noise. Maximum-likelihood decoding is achieved in a simple way through decoupling of the signals transmitted from different antennas rather than joint detection. This uses the orthogonal structure of the space-time block code and gives a maximum-likelihood decoding algorithm which is based only on linear processing at the receiver. Space-time block codes are designed to achieve the maximum diversity order for a given number of transmit and receive antennas subject to the constraint of having a simple decoding algorithm. The classical mathematical framework of orthogonal designs is applied to construct space-time block codes. It is shown that space-time block codes constructed in this way only exist for few sporadic values of n. Subsequently, a generalization of orthogonal designs is shown to provide space-time block codes for both real and complex constellations for any number of transmit antennas. These codes achieve the maximum possible transmission rate for any number of transmit antennas using any arbitrary real constellation such as PAM. For an arbitrary complex constellation such as PSK and QAM, space-time block codes are designed that achieve 1/2 of the maximum possible transmission rate for any number of transmit antennas. For the specific cases of two, three, and four transmit antennas, space-time block codes are designed that achieve, respectively, all, 3/4, and 3/4 of maximum possible transmission rate using arbitrary complex constellations. The best tradeoff between the decoding delay and the number of transmit antennas is also computed and it is shown that many of the codes presented here are optimal in this sense as well.

7,348 citations


Journal ArticleDOI
TL;DR: By judicious choice of the decoding radius, it is shown that this maximum-likelihood decoding algorithm can be practically used to decode lattice codes of dimension up to 32 in a fading environment.
Abstract: We present a maximum-likelihood decoding algorithm for an arbitrary lattice code when used over an independent fading channel with perfect channel state information at the receiver. The decoder is based on a bounded distance search among the lattice points falling inside a sphere centered at the received point. By judicious choice of the decoding radius we show that this decoder can be practically used to decode lattice codes of dimension up to 32 in a fading environment.

1,760 citations


Journal ArticleDOI
TL;DR: Analysis of a mobile wireless link comprising M transmitter and N receiver antennas operating in a Rayleigh flat-fading environment concludes that, for a fixed number of antennas, the capacity approaches the capacity obtained as if the receiver knew the propagation coefficients.
Abstract: We analyze a mobile wireless link comprising M transmitter and N receiver antennas operating in a Rayleigh flat-fading environment. The propagation coefficients between pairs of transmitter and receiver antennas are statistically independent and unknown; they remain constant for a coherence interval of T symbol periods, after which they change to new independent values which they maintain for another T symbol periods, and so on. Computing the link capacity, associated with channel coding over multiple fading intervals, requires an optimization over the joint density of T/spl middot/M complex transmitted signals. We prove that there is no point in making the number of transmitter antennas greater than the length of the coherence interval: the capacity for M>T is equal to the capacity for M=T. Capacity is achieved when the T/spl times/M transmitted signal matrix is equal to the product of two statistically independent matrices: a T/spl times/T isotropically distributed unitary matrix times a certain T/spl times/M random matrix that is diagonal, real, and nonnegative. This result enables us to determine capacity for many interesting cases. We conclude that, for a fixed number of antennas, as the length of the coherence interval increases, the capacity approaches the capacity obtained as if the receiver knew the propagation coefficients.

1,480 citations


Journal ArticleDOI
TL;DR: An improved list decoding algorithm for decoding Reed-Solomon codes and alternant codes and algebraic-geometry codes is presented and a solution to a weighted curve-fitting problem is presented, which may be of use in soft-decision decoding algorithms for Reed- Solomon codes.
Abstract: Given an error-correcting code over strings of length n and an arbitrary input string also of length n, the list decoding problem is that of finding all codewords within a specified Hamming distance from the input string. We present an improved list decoding algorithm for decoding Reed-Solomon codes. The list decoding problem for Reed-Solomon codes reduces to the following "curve-fitting" problem over a field F: given n points ((x/sub i//spl middot/y/sub i/))/sub i=1//sup n/, x/sub i/, y/sub i//spl isin/F, and a degree parameter k and error parameter e, find all univariate polynomials p of degree at most k such that y/sub i/=p(x/sub i/) for all but at most e values of i/spl isin/(1,...,n). We give an algorithm that solves this problem for e 1/3, where the result yields the first asymptotic improvement in four decades. The algorithm generalizes to solve the list decoding problem for other algebraic codes, specifically alternant codes (a class of codes including BCH codes) and algebraic-geometry codes. In both cases, we obtain a list decoding algorithm that corrects up to n-/spl radic/(n(n-d')) errors, where n is the block length and d' is the designed distance of the code. The improvement for the case of algebraic-geometry codes extends the methods of Shokrollahi and Wasserman (see in Proc. 29th Annu. ACM Symp. Theory of Computing, p.241-48, 1998) and improves upon their bound for every choice of n and d'. We also present some other consequences of our algorithm including a solution to a weighted curve-fitting problem, which may be of use in soft-decision decoding algorithms for Reed-Solomon codes.

1,108 citations


Journal ArticleDOI
TL;DR: This paper deals with 2/sup l/-ary transmission using multilevel coding (MLC) and multistage decoding (MSD) and shows that capacity can in fact be closely approached at high bandwidth efficiencies.
Abstract: This paper deals with 2/sup l/-ary transmission using multilevel coding (MLC) and multistage decoding (MSD). The known result that MLC and MSD suffice to approach capacity if the rates at each level are appropriately chosen is reviewed. Using multiuser information theory, it is shown that there is a large space of rate combinations such that MLC and full maximum-likelihood decoding (MLD) can approach capacity. It is noted that multilevel codes designed according to the traditional balanced distance rule tend to fall in the latter category and, therefore, require the huge complexity of MLD. The capacity rule, the balanced distances rules, and two other rules based on the random coding exponent and cutoff rate are compared and contrasted for practical design. Simulation results using multilevel binary turbo codes show that capacity can in fact be closely approached at high bandwidth efficiencies. Moreover, topics relevant in practical applications such as signal set labeling, dimensionality of the constituent constellation, and hard-decision decoding are emphasized. Bit interleaved coded modulation, proposed by Caire et al. (see ibid., vol.44, p.927-46, 1998), is reviewed in the context of MLC. Finally, the combination of signal shaping and coding is discussed. Significant shaping gains are achievable in practice only if these design rules are taken into account.

1,030 citations


Journal ArticleDOI
TL;DR: The CDMA channel with randomly and independently chosen spreading sequences accurately models the situation where pseudonoise sequences span many symbol periods and provides a comparison baseline for CDMA channels with deterministic signature waveforms spanning one symbol period.
Abstract: The CDMA channel with randomly and independently chosen spreading sequences accurately models the situation where pseudonoise sequences span many symbol periods. Furthermore, its analysis provides a comparison baseline for CDMA channels with deterministic signature waveforms spanning one symbol period. We analyze the spectral efficiency (total capacity per chip) as a function of the number of users, spreading gain, and signal-to-noise ratio, and we quantify the loss in efficiency relative to an optimally chosen set of signature sequences and relative to multiaccess with no spreading. White Gaussian background noise and equal-power synchronous users are assumed. The following receivers are analyzed: (a) optimal joint processing, (b) single-user matched filtering, (c) decorrelation, and (d) MMSE linear processing.

1,015 citations


Journal ArticleDOI
TL;DR: It is shown that in a large system with each user using random spreading sequences, the limiting interference effects under several linear multiuser receivers can be decoupled, such that each interferer can be ascribed a level of effective interference that it provides to the user to be demodulated.
Abstract: Multiuser receivers improve the performance of spread-spectrum and antenna-array systems by exploiting the structure of the multiaccess interference when demodulating the signal of a user. Much of the previous work on the performance analysis of multiuser receivers has focused on their ability to reject worst case interference. Their performance in a power-controlled network and the resulting user capacity are less well-understood. We show that in a large system with each user using random spreading sequences, the limiting interference effects under several linear multiuser receivers can be decoupled, such that each interferer can be ascribed a level of effective interference that it provides to the user to be demodulated. Applying these results to the uplink of a single power-controlled cell, we derive an effective bandwidth characterization of the user capacity: the signal-to-interference requirements of all the users can be met if and only if the sum of the effective bandwidths of the users is less than the total number of degrees of freedom in the system. The effective bandwidth of a user depends only on its own SIR requirement, and simple expressions are derived for three linear receivers: the conventional matched filter, the decorrelator, and the MMSE receiver. The effective bandwidths under the three receivers serve as a basis for performance comparison.

996 citations


Journal ArticleDOI
TL;DR: A class of convolutional codes defined by a low-density parity-check matrix and an iterative algorithm for decoding these codes is presented, showing that for the rate R=1/2 binary codes, the performance is substantially better than for ordinary convolutionian codes with the same decoding complexity per information bit.
Abstract: We present a class of convolutional codes defined by a low-density parity-check matrix and an iterative algorithm for decoding these codes The performance of this decoding is close to the performance of turbo decoding Our simulation shows that for the rate R=1/2 binary codes, the performance is substantially better than for ordinary convolutional codes with the same decoding complexity per information bit As an example, we constructed convolutional codes with memory M=1025, 2049, and 4097 showing that we are about 1 dB from the capacity limit at a bit-error rate (BER) of 10/sup -5/ and a decoding complexity of the same magnitude as a Viterbi decoder for codes having memory M=10

902 citations


Journal ArticleDOI
TL;DR: From the single-user point of view considered in this paper, there exists an optimal repetition diversity order (or spreading factor) that minimizes the information outage probability for given rate, power, and fading statistics.
Abstract: We study optimal constant-rate coding schemes for a block-fading channel with strict transmission delay constraint, under the assumption that both the transmitter and the receiver have perfect channel-state information. We show that the information outage probability is minimized by concatenating a standard "Gaussian" code with an optimal power controller, which allocates the transmitted power dynamically to the transmitted symbols. We solve the minimum outage probability problem under different constraints on the transmitted power and we derive the corresponding power-allocation strategies. In addition, we propose an algorithm that approaches the optimal power allocation when the fading statistics are not known. Numerical examples for different fading channels are provided, and some applications discussed. In particular, we show that minimum outage probability and delay-limited capacity are closely related quantities, and we find a closed-form expression for the delay-limited capacity of the Rayleigh block-fading channel with transmission over two independent blocks. We also discuss repetition diversity and its relation with direct-sequence or multicarrier spread-spectrum transmission. The optimal power-allocation strategy in this case corresponds to selection diversity at the transmitter. From the single-user point of view considered in this paper, there exists an optimal repetition diversity order (or spreading factor) that minimizes the information outage probability for given rate, power, and fading statistics.

822 citations


Journal ArticleDOI
TL;DR: In this paper, four measures of distinguishability for quantum-mechanical states are surveyed from the point of view of the cryptographer with a particular eye on applications in quantum cryptography.
Abstract: This paper, mostly expository in nature, surveys four measures of distinguishability for quantum-mechanical states. This is done from the point of view of the cryptographer with a particular eye on applications in quantum cryptography. Each of the measures considered is rooted in an analogous classical measure of distinguishability for probability distributions: namely, the probability of an identification error, the Kolmogorov distance, the Bhattacharyya coefficient, and the Shannon (1948) distinguishability (as defined through mutual information). These measures have a long history of use in statistical pattern recognition and classical cryptography. We obtain several inequalities that relate the quantum distinguishability measures to each other, one of which may be crucial for proving the security of quantum cryptographic key distribution. In another vein, these measures and their connecting inequalities are used to define a single notion of cryptographic exponential indistinguishability for two families of quantum states. This is a tool that may prove useful in the analysis of various quantum-cryptographic protocols.

759 citations


Journal ArticleDOI
TL;DR: In this article, the first-order probability density functions (PDFs) of the class A and class B noise models were derived and the authors showed that these PDFs can be approximated by a symmetric Gaussian /spl alpha/stable model in the case of narrowband reception, or when the PDF /spl omega/sub 1/(/spl alpha/) of the amplitude is symmetric.
Abstract: The subject here is generalized (i.e., non-Gaussian) noise models, and specifically their first-order probability density functions (PDFs). Attention is focused primarily on the author's canonical statistical-physical Class A and Class B models. In particular, Class A noise describes the type of electromagnetic interference (EMI) often encountered in telecommunication applications, where this ambient noise is largely due to other, "intelligent" telecommunication operations. On the other hand, ambient Class B noise usually represents man-made or natural "nonintelligent"-i.e., nonmessage-bearing noise-and is highly impulsive. Class A noise is not an /spl alpha/-stable process, nor is it reducible to such, except in the limiting Gaussian cases of high-density noise (by the central limit theorem). Class B noise is also asymptotically normal (before model approximation). Under rather broad conditions, principally governed by the source propagation and distribution scenarios, the PDF of Class B noise alone (no Gaussian component) can usually be approximated by (1) a symmetric Gaussian /spl alpha/-stable (S/spl alpha/S) model in the case of narrowband reception, or when the PDF /spl omega//sub 1/(/spl alpha/) of the amplitude is symmetric; and (2) a nonsymmetric /spl alpha/-stable (NS/spl alpha/S) model (no Gaussian component) can be constructed in broadband regimes. New results here include: (i) counting functional methods for constructing the general qth-order characteristic functions (CFs) of Class A and Class B noise, from which (all) moments and (in principle), the PDFs follow; (ii) the first-order CFs, PDFs, and cumulative probabilities (APDs) of nonsymmetric broadband Class B noise, extended to include additive Gauss noise (AGN); (iii) proof of the existence of all moments in the basic Class A and Class B models; (iv) the key physical role of AGN and the fact that AGN removes /spl alpha/-stability; (v) the explicit roles of the propagation and distribution scenarios; and (vi) extension to noise fields. Although telecommunication applications are emphasized, Class A and Class B noise models apply selectively, but equally well, to other physical regimes, e.g., underwater acoustics and EM (radar, optics, etc.). Supportive empirical data are included.

Journal ArticleDOI
TL;DR: A new multiscale modeling framework for characterizing positive-valued data with long-range-dependent correlations (1/f noise) using the Haar wavelet transform and a special multiplicative structure on the wavelet and scaling coefficients to ensure positive results, which provides a rapid O(N) cascade algorithm for synthesizing N-point data sets.
Abstract: We develop a new multiscale modeling framework for characterizing positive-valued data with long-range-dependent correlations (1/f noise). Using the Haar wavelet transform and a special multiplicative structure on the wavelet and scaling coefficients to ensure positive results, the model provides a rapid O(N) cascade algorithm for synthesizing N-point data sets. We study both the second-order and multifractal properties of the model, the latter after a tutorial overview of multifractal analysis. We derive a scheme for matching the model to real data observations and, to demonstrate its effectiveness, apply the model to network traffic synthesis. The flexibility and accuracy of the model and fitting procedure result in a close fit to the real data statistics (variance-time plots and moment scaling) and queuing behavior. Although for illustrative purposes we focus on applications in network traffic modeling, the multifractal wavelet model could be useful in a number of other areas involving positive data, including image processing, finance, and geophysics.

Journal ArticleDOI
TL;DR: This paper dramatically reduces encoding and decoding complexity by partitioning antennas at the transmitter into small groups, and using individual space-time codes, called the component codes, to transmit information from each group of antennas.
Abstract: The information capacity of wireless communication systems may be increased dramatically by employing multiple transmit and receive antennas. The goal of system design is to exploit this capacity in a practical way. An effective approach to increasing data rate over wireless channels is to employ space-time coding techniques appropriate to multiple transmit antennas. These space-time codes introduce temporal and spatial correlation into signals transmitted from different antennas, so as to provide diversity at the receiver, and coding gain over an uncoded system. For large number of transmit antennas and at high bandwidth efficiencies, the receiver may become too complex whenever correlation across transmit antennas is introduced. This paper dramatically reduces encoding and decoding complexity by partitioning antennas at the transmitter into small groups, and using individual space-time codes, called the component codes, to transmit information from each group of antennas. At the receiver, an individual space-time code is decoded by a novel linear processing technique that suppresses signals transmitted by other groups of antennas by treating them as interference. A simple receiver structure is derived that provides diversity and coding gain over uncoded systems. This combination of array processing at the receiver and coding techniques for multiple transmit antennas can provide reliable and very high data rate communication over narrowband wireless channels. A refinement of this basic structure gives rise to a multilayered space-time architecture that both generalizes and improves upon the layered space-time architecture proposed by Foschini (see Bell Labs Tech. J., vol.1, no.2, 1996).

Journal ArticleDOI
TL;DR: A joint estimator is presented for the two parameters that define the long-range dependence phenomenon in the simplest case and is found to be unbiased and of minimum or close to minimum variance for the scale parameter, and asymptotically unbiased and efficient for the second parameter.
Abstract: A joint estimator is presented for the two parameters that define the long-range dependence phenomenon in the simplest case. The estimator is based on the coefficients of a discrete wavelet decomposition, improving a wavelet-based estimator of the scaling parameter (Abry and Veitch 1998), as well as extending it to include the associated power parameter. An important feature is its conceptual and practical simplicity, consisting essentially in measuring the slope and the intercept of a linear fit after a discrete wavelet transform is performed, a very fast (O(n)) operation. Under well-justified technical idealizations the estimator is shown to be unbiased and of minimum or close to minimum variance for the scale parameter, and asymptotically unbiased and efficient for the second parameter. Through theoretical arguments and numerical simulations it is shown that in practice, even for small data sets, the bias is very small and the variance close to optimal for both parameters. Closed-form expressions are given for the covariance matrix of the estimator as a function of data length, and are shown by simulation to be very accurate even when the technical idealizations are not satisfied. Comparisons are made against two maximum-likelihood estimators. In terms of robustness and computational cost the wavelet estimator is found to be clearly superior and statistically its performance is comparable. We apply the tool to the analysis of Ethernet teletraffic data, completing an earlier study on the scaling parameter alone.

Journal ArticleDOI
TL;DR: This paper investigates various connections between shrinkage methods and maximum a posteriori (MAP) estimation using such priors, and introduces a new family of complexity priors based upon Rissanen's universal prior on integers.
Abstract: Research on universal and minimax wavelet shrinkage and thresholding methods has demonstrated near-ideal estimation performance in various asymptotic frameworks. However, image processing practice has shown that universal thresholding methods are outperformed by simple Bayesian estimators assuming independent wavelet coefficients and heavy-tailed priors such as generalized Gaussian distributions (GGDs). In this paper, we investigate various connections between shrinkage methods and maximum a posteriori (MAP) estimation using such priors. In particular, we state a simple condition under which MAP estimates are sparse. We also introduce a new family of complexity priors based upon Rissanen's universal prior on integers. One particular estimator in this class outperforms conventional estimators based on earlier applications of the minimum description length (MDL) principle. We develop analytical expressions for the shrinkage rules implied by GGD and complexity priors. This allows us to show the equivalence between universal hard thresholding, MAP estimation using a very heavy-tailed GGD, and MDL estimation using one of the new complexity priors. Theoretical analysis supported by numerous practical experiments shows the robustness of some of these estimates against mis-specifications of the prior-a basic concern in image processing applications.

Journal ArticleDOI
TL;DR: A new proof of Holevo's (1973, 1977) coding theorem for transmitting classical information through quantum channels, and its strong converse is presented, largely inspired by Wolfwitz's combinatorial approach using types of sequences.
Abstract: We present a new proof of Holevo's (1973, 1977) coding theorem for transmitting classical information through quantum channels, and its strong converse. The technique is largely inspired by Wolfwitz's (1964) combinatorial approach using types of sequences. As a byproduct of our approach which is independent of previous ones, both in the coding theorem and the converse, we can give a new proof of Holevo's information bound.

Journal ArticleDOI
TL;DR: It is demonstrated that it is possible to approximate the mutual information arbitrarily closely in probability by calculating the relative frequencies on appropriate partitions and achieving conditional independence on the rectangles of which the partitions are made.
Abstract: We demonstrate that it is possible to approximate the mutual information arbitrarily closely in probability by calculating the relative frequencies on appropriate partitions and achieving conditional independence on the rectangles of which the partitions are made. Empirical results, including a comparison with maximum-likelihood estimators, are presented.

Journal ArticleDOI
TL;DR: The robustness of this communication scheme with respect to errors in the estimation of the fading process is studied, and the degradation in performance that results from such estimation errors is quantified.
Abstract: The analysis of flat-fading channels is often performed under the assumption that the additive noise is white and Gaussian, and that the receiver has precise knowledge of the realization of the fading process. These assumptions imply the optimality of Gaussian codebooks and of scaled nearest-neighbor decoding. Here we study the robustness of this communication scheme with respect to errors in the estimation of the fading process. We quantify the degradation in performance that results from such estimation errors, and demonstrate the lack of robustness of this scheme. For some situations we suggest the rule of thumb that, in order to avoid degradation, the estimation error should be negligible compared to the reciprocal of the signal-to-noise ratio (SNR).

Journal ArticleDOI
TL;DR: It turns out that with this optimal allocation of signature sequences and powers, the linear MMSE receiver is just the corresponding matched filter for each user, and the effect of transmit power constraints on the user capacity is characterized.
Abstract: There has been intense effort in the past decade to develop multiuser receiver structures which mitigate interference between users in spread-spectrum systems. While much of this research is performed at the physical layer, the appropriate power control and choice of signature sequences in conjunction with multiuser receivers and the resulting network user capacity is not well understood. In this paper we will focus on a single cell and consider both the uplink and downlink scenarios and assume a synchronous CDMA (S-CDMA) system. We characterize the user capacity of a single cell with the optimal linear receiver (MMSE receiver). The user capacity of the system is the maximum number of users per unit processing gain admissible in the system such that each user has its quality-of-service (QoS) requirement (expressed in terms of its desired signal-to-interference ratio) met. This characterization allows one to describe the user capacity through a simple effective bandwidth characterization: users are allowed in the system if and only if the sum of their effective bandwidths is less than the processing gain of the system. The effective bandwidth of each user is a simple monotonic function of its QoS requirement. We identify the optimal signature sequences and power control strategies so that the users meet their QoS requirement. The optimality is in the sense of minimizing the sum of allocated powers. It turns out that with this optimal allocation of signature sequences and powers, the linear MMSE receiver is just the corresponding matched filter for each user. We also characterize the effect of transmit power constraints on the user capacity.

Journal ArticleDOI
TL;DR: In this paper, the authors introduce the use of end-to-end measurements of multicast traffic to infer network-internal characteristics and develop a maximum-likelihood estimator for loss rates on internal links based on losses observed by multicast receivers.
Abstract: Robust measurements of network dynamics are increasingly important to the design and operation of large internetworks like the Internet. However, administrative diversity makes it impractical to monitor every link on an end-to-end path. At the same time, it is difficult to determine the performance characteristics of individual links from end-to-end measurements of unicast traffic. In this paper, we introduce the use of end-to-end measurements of multicast traffic to infer network-internal characteristics. The bandwidth efficiency of multicast traffic makes it suitable for large-scale measurements of both end-to-end and internal network dynamics. We develop a maximum-likelihood estimator for loss rates on internal links based on losses observed by multicast receivers. It exploits the inherent correlation between such observations to infer the performance of paths between branch points in the tree spanning a multicast source and its receivers. We derive its rate of convergence as the number of measurements increases, and we establish robustness with respect to certain generalizations of the underlying model. We validate these techniques through simulation and discuss possible extensions and applications of this work

Journal ArticleDOI
TL;DR: A new class of MDS (maximum distance separable) array codes of size n/spl times/n (n a prime number) called X-code, which has a simple geometrical construction which achieves encoding/update optimal complexity.
Abstract: We present a new class of MDS (maximum distance separable) array codes of size n/spl times/n (n a prime number) called X-code. The X-codes are of minimum column distance 3, namely, they can correct either one column error or two column erasures. The key novelty in X-code is that it has a simple geometrical construction which achieves encoding/update optimal complexity, i.e., a change of any single information bit affects exactly two parity bits. The key idea in our constructions is that all parity symbols are placed in rows rather than columns.

Journal ArticleDOI
TL;DR: The sum capacity of a multiuser synchronous CDMA system is completely characterized in the general case of asymmetric user power constraints-this solves the open problem posed by Rupf and Massey.
Abstract: The sum capacity of a multiuser synchronous CDMA system is completely characterized in the general case of asymmetric user power constraints-this solves the open problem posed by Rupf and Massey (see ibid., vol.40, p.1261-6, 1994) which had solved the equal power constraint case. We identify the signature sequences with real components that achieve sum capacity and indicate a simple recursive algorithm to construct them.

Journal ArticleDOI
Eric M. Rains1
TL;DR: In this article, it was shown that the Calderbank-Shor-Steane codes and GF(4)-linear codes are special cases of the same construction, and that they can be used to construct families of quantum codes from certain codes over number fields.
Abstract: We present several results on quantum codes over general alphabets (that is, in which the fundamental units may have more than two states). In particular, we consider codes derived from finite symplectic geometry assumed to have additional global symmetries. From this standpoint, the analogs of Calderbank-Shor-Steane codes and of GF(4)-linear codes turn out to be special cases of the same construction. This allows us to construct families of quantum codes from certain codes over number fields; in particular, we get analogs of quadratic residue codes, including a single-error-correcting code encoding one letter in five, for any alphabet size. We also consider the problem of fault-tolerant computation through such codes, generalizing ideas of Gottesman (see Phys. Rev. A, vol.57, no.1, p127-37, 1998).

Journal ArticleDOI
TL;DR: It is proved that, for the fairly general class of regular fading channels, the asymptotic delay-limited capacity slope, expressed in bits per second per hertz (b/s/Hz) per decibel of transmit signal-to-noise ratio (SNR), is proportional to min and independent of the number of fading blocks M.
Abstract: We derive the performance limits of a radio system consisting of a transmitter with t antennas and a receiver with r antennas, a block-fading channel with additive white Gaussian noise (AWGN), delay and transmit-power constraints, and perfect channel-state information available at both the transmitter and the receiver. Because of a delay constraint, the transmission of a codeword is assumed to span a finite (and typically small) number M of independent channel realizations; therefore, the relevant performance limits are the information outage probability and the "delay-limited" (or "nonergodic") capacity. We derive the coding scheme that minimizes the information outage probability. This scheme can be interpreted as the concatenation of an optimal code for the AWGN channel without fading to an optimal beamformer. For this optimal scheme, we evaluate minimum-outage probability and delay-limited capacity. Among other results, we prove that, for the fairly general class of regular fading channels, the asymptotic delay-limited capacity slope, expressed in bits per second per hertz (b/s/Hz) per decibel of transmit signal-to-noise ratio (SNR), is proportional to min (t,r) and independent of the number of fading blocks M. Since M is a measure of the time diversity (induced by interleaving) or of the frequency diversity of the system, this result shows that, if channel-state information is available also to the transmitter, very high rates with asymptotically small error probabilities are achievable without the need of deep interleaving or high-frequency diversity. Moreover, for a large number of antennas, delay-limited capacity approaches ergodic capacity.

Journal ArticleDOI
TL;DR: These results provide a complete generalization of the results given by Veeravalli and Baum, where it was shown that the quasi-Bayesian MSPRT is asymptotically efficient with respect to the expected sample size for i.i.d. observations.
Abstract: The problem of sequential testing of multiple hypotheses is considered, and two candidate sequential test procedures are studied. Both tests are multihypothesis versions of the binary sequential probability ratio test (SPRT), and are referred to as MSPRTs. The first test is motivated by Bayesian optimality arguments, while the second corresponds to a generalized likelihood ratio test. It is shown that both MSPRTs are asymptotically optimal relative not only to the expected sample size but also to any positive moment of the stopping time distribution, when the error probabilities or, more generally, risks associated with incorrect decisions are small. The results are first derived for the discrete-time case of independent and identically distributed (i.i.d.) observations and simple hypotheses. They are then extended to general, possibly continuous-time, statistical models that may include correlated and nonhomogeneous observation processes. It also demonstrated that the results can be extended to hypothesis testing problems with nuisance parameters, where the composite hypotheses, due to nuisance parameters, can be reduced to simple ones by using the principle of invariance. These results provide a complete generalization of the results given by Veeravalli and Baum (see ibid., vol.41, p.1994-97, 1995), where it was shown that the quasi-Bayesian MSPRT is asymptotically efficient with respect to the expected sample size for i.i.d. observations.

Journal ArticleDOI
TL;DR: The first case supports a well-known conjecture of Welch stating that for odd n=2m+1, the power function x/sup 2m+3/ is even maximally nonlinear or, in other terms, that the crosscorrelation function between a binary maximum-length linear shift register sequence and a decimation of that sequence by 2/sup m/+3 takes on precisely the three values -1, -1/spl plusmn/2/Sup m+1/.
Abstract: We summarize the state of the classification of almost perfect nonlinear (APN) power functions x/sup d/ on GF(2/sup n/) and contribute two new cases. To prove these cases we derive new permutation polynomials. The first case supports a well-known conjecture of Welch stating that for odd n=2m+1, the power function x/sup 2m+3/ is even maximally nonlinear or, in other terms, that the crosscorrelation function between a binary maximum-length linear shift register sequence of degree n and a decimation of that sequence by 2/sup m/+3 takes on precisely the three values -1, -1/spl plusmn/2/sup m+1/.

Journal ArticleDOI
Ueli Maurer, Stefan Wolf1
TL;DR: A new conditional mutual information measure is defined, the intrinsic conditional Mutual information between S and Y when given Z, denoted by I(X;Y/spl darr/Z), which is an upper bound on S(X, Y/spl par/Z).
Abstract: This paper is concerned with secret-key agreement by public discussion. Assume that two parties Alice and Bob and an adversary Eve have access to independent realizations of random variables X, Y, and Z, respectively, with joint distribution P/sub XYZ/. The secret-key rate S(X;Y/spl par/Z) has been defined as the maximal rate at which Alice and Bob can generate a secret key by communication over an insecure, but authenticated channel such that Eve's information about this key is arbitrarily small. We define a new conditional mutual information measure, the intrinsic conditional mutual information between S and Y when given Z, denoted by I(X;Y/spl darr/Z), which is an upper bound on S(X;Y/spl par/Z). The special scenarios are analyzed where X, Y, and Z are generated by sending a binary random variable R, for example a signal broadcast by a satellite, over independent channels, or two scenarios in which Z is generated by sending X and Y over erasure channels. In the first two scenarios it can be shown that the secret-key rate is strictly positive if and only if I(X;Y/spl darr/Z) is strictly positive. For the third scenario, a new protocol is presented which allows secret-key agreement even when all the previously known protocols fail.

Journal ArticleDOI
TL;DR: The inherent flexibility of the proposed transceivers is exploited to derive, as special cases, zero-forcing (ZF) and minimum mean-square error receive filterbanks for block-based data transmissions over frequency-selective additive Gaussian noise channels.
Abstract: Optimal finite impulse response (FIR) transmit and receive filterbanks are derived for block-based data transmissions over frequency-selective additive Gaussian noise (AGN) channels by maximizing mutual information subject to a fixed transmit-power constraint. Both FIR and pole-zero channels are considered. The inherent flexibility of the proposed transceivers is exploited to derive, as special cases, zero-forcing (ZF) and minimum mean-square error receive filterbanks. The transmit filterbank converts transmission over a frequency-selective fading channel, affected by additive colored noise, into a set of independent flat fading subchannels with uncorrelated noise samples. Two loading algorithms are also developed to distribute transmit power and number of bits across the usable subchannels, while adhering to an upper bound on the bit error rate (BER). Reduction of the signal-to-noise ratio (SNR) margin required to satisfy the prescribed BER is achieved by coding each subchannel's bit stream. The potential of the proposed transceivers is illustrated and compared to discrete multitone (DMT) with simulated examples.

Journal ArticleDOI
TL;DR: It is shown that a classical error correcting code C, which contains its dual, C/sup /spl perp///spl sube/C, and which can be enlarged to C'=[n,k'>k+1,d'], can be converted into a quantum code of parameters [[ n,k+k'-n,min(d,[3d'/2])]].
Abstract: It is shown that a classical error correcting code C=[n,k,d] which contains its dual, C/sup /spl perp///spl sube/C, and which can be enlarged to C'=[n,k'>k+1,d'], can be converted into a quantum code of parameters [[n,k+k'-n,min(d,[3d'/2])]] This is a generalization of a previous construction, it enables many new codes of good efficiency to be discovered Examples based on classical Bose-Chaudhuri-Hocquenghem (BCH) codes are discussed

Journal ArticleDOI
Gerhard Kramer1
TL;DR: Several techniques for improving the bounds are developed: (1) causally conditioned entropy and directed information simplify the inner bounds, (2) code trellises serve as simple code trees, (3) superposition coding and binning with code trees improves rates.
Abstract: A discrete memoryless network (DMN) is a memoryless multiterminal channel with discrete inputs and outputs. A sequence of inner bounds to the DMN capacity region is derived by using code trees. Capacity expressions are given for three classes of DMNs: (1) a single-letter expression for a class with a common output, (2) a two-letter expression for a binary-symmetric broadcast channel (BC) with partial feedback, and (3) a finite-letter expression for push-to-talk DMNs. The first result is a consequence of a new capacity outer bound for common output DMNs. The third result demonstrates that the common practice of using a time-sharing random variable does not include all time-sharing possibilities, namely, time sharing of channels. Several techniques for improving the bounds are developed: (1) causally conditioned entropy and directed information simplify the inner bounds, (2) code trellises serve as simple code trees, (3) superposition coding and binning with code trees improves rates. Numerical computations show that the last technique enlarges the best known rate regions for a multiple-access channel (MAC) and a BC, both with feedback. In addition to the rate bounds, a sequence of inner bounds to the DMN reliability function is derived. A numerical example for a two-way channel illustrates the behavior of the error exponents.