scispace - formally typeset
Search or ask a question
Journal ArticleDOI

国際会議参加報告:2014 IEEE International Symposium on Information Theory

01 Jan 2014-IEICE ESS Fundamentals Review (The Institute of Electronics, Information and Communication Engineers)-Vol. 8, Iss: 2, pp 122-122
About: This article is published in IEICE ESS Fundamentals Review.The article was published on 2014-01-01 and is currently open access. It has received 255 citations till now.
Citations
More filters
Proceedings ArticleDOI
01 Jun 2014
TL;DR: The average of a new metric, called peak age, is investigated, which provides information about the maximum value of the Age, achieved immediately before receiving an update, which is modeled as an exponentially distributed service time.
Abstract: We consider a system in which random status updates arrive at a source node, and should be transmitted through a wireless network to the intended destination node. The status updates are samples of a random process, transmitted as packets, containing the time stamp to identify the moment the sample was generated. The time it takes to successfully transmit a packet to the destination is modeled as an exponentially distributed service time. The status update age at the receiver is the time elapsed since the last received update was generated. In this paper, we analyze the age in the case that the source node has the capability to manage the arriving samples and decide which packets will be transmitted to the destination. In addition to the average age, we investigate the average of a new metric, called peak age, which provides information about the maximum value of the Age, achieved immediately before receiving an update.

377 citations

Journal ArticleDOI
TL;DR: It is shown that, with sufficient damping, the algorithm is guaranteed to converge, although the amount of damping grows with peak-to-average ratio of the squared singular values of the transforms A, which explains the good performance of AMP on i.i.d. Gaussian transforms A.
Abstract: Approximate message passing (AMP) methods and their variants have attracted considerable recent attention for the problem of estimating a random vector x observed through a linear transform A. In the case of large i.i.d. zero-mean Gaussian A, the methods exhibit fast convergence with precise analytic characterizations on the algorithm behavior. However, the convergence of AMP under general transforms A is not fully understood. In this paper, we provide sufficient conditions for the convergence of a damped version of the generalized AMP (GAMP) algorithm in the case of quadratic cost functions (i.e., Gaussian likelihood and prior). It is shown that, with sufficient damping, the algorithm is guaranteed to converge, although the amount of damping grows with peak-to-average ratio of the squared singular values of the transforms A. This result explains the good performance of AMP on i.i.d. Gaussian transforms A, but also their difficulties with ill-conditioned or non-zero-mean transforms A. A related sufficient condition is then derived for the local stability of the damped GAMP method under general cost functions, assuming certain strict convexity conditions.

97 citations

Posted Content
TL;DR: This paper derives upper bounds on the minimum distance of locally 2-reconstructible codes and provides constructions for a family of codes based on Turán graphs, that are optimal with respect to this bound.
Abstract: In this paper, we study codes with locality that can recover from two erasures via a sequence of two local, parity-check computations. By a local parity-check computation, we mean recovery via a single parity-check equation associated to small Hamming weight. Earlier approaches considered recovery in parallel; the sequential approach allows us to potentially construct codes with improved minimum distance. These codes, which we refer to as locally 2-reconstructible codes, are a natural generalization along one direction, of codes with all-symbol locality introduced by Gopalan \textit{et al}, in which recovery from a single erasure is considered. By studying the Generalized Hamming Weights of the dual code, we derive upper bounds on the minimum distance of locally 2-reconstructible codes and provide constructions for a family of codes based on Turan graphs, that are optimal with respect to this bound. The minimum distance bound derived here is universal in the sense that no code which permits all-symbol local recovery from $2$ erasures can have larger minimum distance regardless of approach adopted. Our approach also leads to a new bound on the minimum distance of codes with all-symbol locality for the single-erasure case.

97 citations


Cites methods from "国際会議参加報告:2014 IEEE International Sy..."

  • ...To derive an upper bound on the GHWs of the dual C⊥ of an (n, k, r, 2)seq code C, we use the fact that the local dual subcode C⊥ of C⊥ is generated by a basis of vectors having Hamming weight ≤ (r + 1)....

    [...]

Proceedings ArticleDOI
11 Aug 2014
TL;DR: This work shows that a ball shaped input constellation may significantly reduce the nonlinear effects of fiber's nonlinearity and study the shaping gains in the fiber-optic channel to show that in certain scenarios the maximum gains may be higher than the 1.53dB ultimate shaping gain in linear additive white Gaussian noise channels.
Abstract: Fiber's nonlinearity fundamentally bounds the achievable information rates in fiber-optic communication systems. In a wavelength-division multiplexed system it induces a nonlinear interference between adjacent channels, an interference that was recently shown to have a strong dependance on the input distribution. In this work we show that a ball shaped input constellation may significantly reduce the nonlinear effects. We study the shaping gains in the fiber-optic channel and show that in certain scenarios the maximum gains may be higher than the 1.53dB ultimate shaping gain in linear additive white Gaussian noise channels. Furthermore, the maximum gain is achieved with a finite-dimensional ball shaping region.

93 citations

Proceedings ArticleDOI
Liang Zhang1, Zhaoyang Zhang1, Xianbin Wang1, Qilian Yu1, Chen Yan2 
11 Aug 2014
TL;DR: A search algorithm is proposed to design good punctured polar codes, and it is proved that designing the optimal puncturing pattern for output bits is equivalent to finding the optimal rhythm for frozen bits.
Abstract: Puncturing is widely used to generate rate-compatible codes. However, for punctured polar codes, some puncturing patterns may greatly affect the split bit channels and cause considerable performance loss. In this paper, we aim to investigate how the split bit channels are affected by various puncturing patterns, and then evaluate the performances of these patterns. We propose a search algorithm to design good punctured polar codes, and prove that designing the optimal puncturing pattern for output bits is equivalent to finding the optimal puncturing pattern for frozen bits. We also propose a heuristic approach based on the idea of polarization to select the position of each punctured output bit, and simulations show that the puncturing pattern designed this way almost achieves the same performance as the optimal one selected by exhaustive search.

88 citations

References
More filters
Proceedings ArticleDOI
01 Jun 2014
TL;DR: The average of a new metric, called peak age, is investigated, which provides information about the maximum value of the Age, achieved immediately before receiving an update, which is modeled as an exponentially distributed service time.
Abstract: We consider a system in which random status updates arrive at a source node, and should be transmitted through a wireless network to the intended destination node. The status updates are samples of a random process, transmitted as packets, containing the time stamp to identify the moment the sample was generated. The time it takes to successfully transmit a packet to the destination is modeled as an exponentially distributed service time. The status update age at the receiver is the time elapsed since the last received update was generated. In this paper, we analyze the age in the case that the source node has the capability to manage the arriving samples and decide which packets will be transmitted to the destination. In addition to the average age, we investigate the average of a new metric, called peak age, which provides information about the maximum value of the Age, achieved immediately before receiving an update.

377 citations

Proceedings ArticleDOI
11 Aug 2014
TL;DR: In this article, a security measure called effective security is defined that includes strong secrecy and stealth communication, which is defined as the ability of a message to be deciphered and the presence of meaningful communication is hidden.
Abstract: A security measure called effective security is defined that includes strong secrecy and stealth communication. Effective secrecy ensures that a message cannot be deciphered and that the presence of meaningful communication is hidden. To measure stealth we use resolvability and relate this to binary hypothesis testing. Results are developed for wire-tap channels and broadcast channels with confidential messages.

160 citations

Proceedings ArticleDOI
11 Aug 2014
TL;DR: This work analyzes an Approximate Message Passing algorithm to estimate the underlying signal and shows, in the high dimensional limit, that the AMP estimates are information-theoretically optimal and effectively provides a single-letter characterization of the sparse PCA problem.
Abstract: Sparse Principal Component Analysis (PCA) is a dimensionality reduction technique wherein one seeks a lowrank representation of a data matrix with additional sparsity constraints on the obtained representation. We consider two probabilistic formulations of sparse PCA: a spiked Wigner and spiked Wishart (or spiked covariance) model. We analyze an Approximate Message Passing (AMP) algorithm to estimate the underlying signal and show, in the high dimensional limit, that the AMP estimates are information-theoretically optimal. As an immediate corollary, our results demonstrate that the posterior expectation of the underlying signal, which is often intractable to compute, can be obtained using a polynomial-time scheme. Our results also effectively provide a single-letter characterization of the sparse PCA problem.

100 citations

Journal ArticleDOI
TL;DR: It is shown that, with sufficient damping, the algorithm is guaranteed to converge, although the amount of damping grows with peak-to-average ratio of the squared singular values of the transforms A, which explains the good performance of AMP on i.i.d. Gaussian transforms A.
Abstract: Approximate message passing (AMP) methods and their variants have attracted considerable recent attention for the problem of estimating a random vector x observed through a linear transform A. In the case of large i.i.d. zero-mean Gaussian A, the methods exhibit fast convergence with precise analytic characterizations on the algorithm behavior. However, the convergence of AMP under general transforms A is not fully understood. In this paper, we provide sufficient conditions for the convergence of a damped version of the generalized AMP (GAMP) algorithm in the case of quadratic cost functions (i.e., Gaussian likelihood and prior). It is shown that, with sufficient damping, the algorithm is guaranteed to converge, although the amount of damping grows with peak-to-average ratio of the squared singular values of the transforms A. This result explains the good performance of AMP on i.i.d. Gaussian transforms A, but also their difficulties with ill-conditioned or non-zero-mean transforms A. A related sufficient condition is then derived for the local stability of the damped GAMP method under general cost functions, assuming certain strict convexity conditions.

97 citations

Posted Content
TL;DR: This paper derives upper bounds on the minimum distance of locally 2-reconstructible codes and provides constructions for a family of codes based on Turán graphs, that are optimal with respect to this bound.
Abstract: In this paper, we study codes with locality that can recover from two erasures via a sequence of two local, parity-check computations. By a local parity-check computation, we mean recovery via a single parity-check equation associated to small Hamming weight. Earlier approaches considered recovery in parallel; the sequential approach allows us to potentially construct codes with improved minimum distance. These codes, which we refer to as locally 2-reconstructible codes, are a natural generalization along one direction, of codes with all-symbol locality introduced by Gopalan \textit{et al}, in which recovery from a single erasure is considered. By studying the Generalized Hamming Weights of the dual code, we derive upper bounds on the minimum distance of locally 2-reconstructible codes and provide constructions for a family of codes based on Turan graphs, that are optimal with respect to this bound. The minimum distance bound derived here is universal in the sense that no code which permits all-symbol local recovery from $2$ erasures can have larger minimum distance regardless of approach adopted. Our approach also leads to a new bound on the minimum distance of codes with all-symbol locality for the single-erasure case.

97 citations