SwePub
Sök i SwePub databas

  Extended search

Träfflista för sökning "L773:2157 8095 OR L773:9781467325806 "

Search: L773:2157 8095 OR L773:9781467325806

  • Result 1-10 of 65
Sort/group result
   
EnumerationReferenceCoverFind
1.
  • Sen, Nevroz, et al. (author)
  • Multiple access channel with various degrees of asymmetric state Information
  • 2012
  • In: IEEE International Symposium on Information Theory Proceedings (ISIT), 2012. - 2157-8095 .- 2157-8117. - 9781467325806 ; , s. 1697-1701
  • Conference paper (peer-reviewed)abstract
    • We consider the problem of reliable communication over multiple-access channels (MAC) where the channel is driven by an independent and identically distributed state process and the encoders and the decoder are provided with various degrees of asymmetric (noisy or partial) channel state information (CSI). Namely, we provide a single letter characterization for the capacity region when the encoders have access to non-causal asymmetric partial CSI and the decoder has complete CSI. When the encoders observe asymmetric noisy CSI with asymmetric delays and the decoder observes complete CSI, we provide a single letter characterization for the capacity region. Finally, we consider a cooperative scenario with common and private messages, with noisy CSIT and complete CSIR and provide a single letter expression for the capacity region. For the cooperative scenario, we also note that as soon as the common message encoder does not have access to CSI, then for any noisy CSIT and CSIR setup it is possible to obtain a single letter characterization for the capacity region.
  •  
2.
  • Stankovski, Paul, et al. (author)
  • An Optimal Sampling Technique for Distinguishing Random S-boxes
  • 2012
  • In: Information Theory Proceedings (ISIT), 2012 IEEE International Symposium on. - 2157-8095 .- 2157-8117. - 9781467325806 - 9781467325783 ; , s. 846-850
  • Conference paper (peer-reviewed)abstract
    • The nonrandom behavior of the outputs of a random S-box can be exploited when constructing distinguishers for cryptographic primitives. Different methods of constructing samples from the outputs have been used in the literature. However, it has been unclear exactly how these methods differ and which method is optimal. We analyze four different sampling techniques. We prove that two of these sampling techniques result in dependent samples. We further show one sampling technique that is optimal in terms of error probabilities in the resulting distinguisher. However, this sampling technique is quite impractical as it requires very large storage. We further show a fourth sampling technique that is much more practical, and we prove that it is equivalent to the optimal one. We also show an improved algorithm for calculating the associated probability distributions that are required for the attack.
  •  
3.
  • Agrell, Erik, 1965, et al. (author)
  • Achieving the Shannon Limit with Probabilistically Shaped BICM
  • 2012
  • In: IEEE International Symposium on Information Theory - Proceedings. - 2157-8095. - 9781467325806 ; , s. 2421-2425
  • Conference paper (peer-reviewed)abstract
    • Probabilistic shaping for bit-interleaved coded modulation (BICM) systems at low signal-to-noise ratio (SNR) is investigated. Using known results for BICM systems with a uniform input distribution, the combinations of input alphabet, input distribution, and binary labeling that achieve the Shannon limit -1.59 dB are fully characterized. It is found that a BICM system achieves the Shannon limit at low SNR if and only if it can be represented as a zero-mean linear projection of a hypercube, which is the same condition as for uniform input distributions. Hence, probabilistic shaping offers no extra degrees of freedom to optimize the low-SNR mutual information of BICM systems, in addition to what is provided by geometrical shaping.
  •  
4.
  • Bocharova, Irina, et al. (author)
  • Combinatorial Optimization for Improving QC LDPC codes performance
  • 2013
  • In: IEEE International Symposium on Information Theory (ISIT). - 2157-8095 .- 2157-8117. ; , s. 2651-2655
  • Conference paper (peer-reviewed)abstract
    • Techniques for searching for good quasi-cyclic (QC) LDPC block codes of short and moderate lengths which are suitable for practical purposes are studied. To facilitate implementations only codes whose parity-check matrices having bidiagonal structure of their submatrices and consequently having low encoding complexity are considered. The problem of finding QC LDPC codes with the near-optimum frame or bit error rate performance is split into two independent steps: searching for the near-optimum column degree distribution of the parity-check matrix together with the best base matrix for this degree distribution and searching for the near-optimum labeling of the chosen base matrix. Sets of parameters and criteria for both steps are introduced and discussed. They allow further reduction of the search complexity without significant loss of the search optimality. New QC LDPC block codes of various code rates are obtained and their BER and FER performances are compared with those of the LDPC block codes as well as the turbo codes defined in the IEEE 802.16 WiMAX standard.
  •  
5.
  • Bocharova, Irina, et al. (author)
  • Near maximum-likelihood decoding of Generalized LDPC and Woven graph codes
  • 2013
  • In: IEEE International Symposium on Information Theory (ISIT). - 2157-8117 .- 2157-8095. ; , s. 3005-3009
  • Conference paper (peer-reviewed)abstract
    • Relations between Generalized LDPC codes, nonbinary LDPC codes, and woven graph codes are considered. Focus is on rather short codes suitable, for example, for coding control signaling information in mobile communications. In particular, codes of lengths less than 200 bits are studied. Low-complexity near maximum-likelihood (ML) decoding for these classes of codes is introduced and analyzed. Frame error rate (FER) performance of the new decoding procedure is compared with the same performance of ML and belief propagation (BP) decoding. It is shown that unlike BP decoding whose performances are mainly governed by the girth of the Tanner graph the new decoding procedure has performances which significantly depend on the minimum distance and spectrum of the woven code. Short woven graph codes with large minimum distances are tabulated.
  •  
6.
  • Mitchell, David G.M., et al. (author)
  • On the Minimum Distance of Generalized Spatially Coupled LDPC Codes
  • 2013
  • In: IEEE International Symposium on Information Theory Proceedings (ISIT), 2013. - 2157-8117 .- 2157-8095. - 9781479904440 ; , s. 1874-1878
  • Conference paper (peer-reviewed)abstract
    • Families of generalized spatially-coupled low-density parity-check (GSC-LDPC) code ensembles can be formed by terminating protograph-based generalized LDPC convolutional (GLDPCC) codes. It has previously been shown that ensembles of GSC-LDPC codes constructed from a protograph have better iterative decoding thresholds than their block code counterparts, and that, for large termination lengths, their thresholds coincide with the maximum a-posteriori (MAP) decoding threshold of the underlying generalized LDPC block code ensemble. Here we show that, in addition to their excellent iterative decoding thresholds, ensembles of GSC-LDPC codes are asymptotically good and have large minimum distance growth rates.
  •  
7.
  • Afanassiev, Valentin, et al. (author)
  • Fast authentication codes based on random polynomial residue classes
  • 1997
  • In: Proceedings 1997 IEEE International Symposium on Information Theory. - 2157-8095. - 0780339568 - 9780780339569 ; , s. 175-175
  • Conference paper (peer-reviewed)abstract
    • The verification of the authenticity of a text document or a datafile is one of the main applications of cryptographic techniques. A common used technique for this purpose is the application of a message authentication code (MAC). Usually the MAC computation has to be done in software. Based on the relationship between error-correcting codes and so-called families of almost universal hash functions, and the error-correcting codes using polynomial residue classes we describe an efficient procedure for a MAC computation which is much faster than the standard MAC constructions using MD5 or SHA and uses much less key bits than the fast MACs based on bucket hashing.
  •  
8.
  • Alvarado, Alex, 1982, et al. (author)
  • High-SNR Asymptotics of Mutual Information for Discrete Constellations
  • 2013
  • In: IEEE International Symposium on Information Theory - Proceedings. - 2157-8095. - 9781479904464 ; , s. 2274-2278
  • Conference paper (peer-reviewed)abstract
    • The high-signal-to-noise ratio (SNR) asymptotic behavior of the mutual information (MI) for discrete constellations over the scalar additive white Gaussian noise channel is studied. Exact asymptotic expressions for the MI for arbitrary one-dimensional constellations and input distributions are presented in the limit as the SNR tends to infinity. Using the relationship between the MI and the minimum mean-square error (MMSE), asymptotics of the MMSE are also developed. It is shown that for any input distribution, the MI and the MMSE have an asymptotic behavior proportional to a Gaussian Q-function, whose argument depends only on the minimum Euclidean distance of the constellation and the SNR. Closed-form expressions for the coefficients of these Q-functions are calculated.
  •  
9.
  • Anderson, John B, et al. (author)
  • Best Rate 1/2 Convolutional Codes for Turbo Equalization with Severe ISI
  • 2012
  • In: 2012 IEEE International Symposium on Information Theory Proceedings (ISIT). - 9781467325806 ; , s. 2366-2370
  • Conference paper (peer-reviewed)abstract
    • We give a procedure to find good convolutional codes for use with iterative decoding (turbo equalization) of the coded AWGN intersymbol interference (ISI) channel. The method is based on the input-output bit error rate characteristic of the convolutional BCJR module in the iterative decoder, in combination with the code minimum distance. Both are essential to find best codes. Best feedforward and recursive systematic codes are listed for memories 2-4, and some individual good codes at memory 5. Codes are tested over a root raised-cosine faster than Nyquist channel with severe ISI. Turbo BER performance reaches 0.8-1.6 dB from capacity with a 4-16 state codes. Feedforward codes perform better than recursive systematic.
  •  
10.
  • Angelakis, Vangelis, et al. (author)
  • On Emptying a Wireless Network in Minimum Time
  • 2012
  • In: 2012 IEEE International Symposium on Information Theory Proceedings (ISIT). - Piscataway, NJ, USA : IEEE. - 9781467325806 - 9781467325783 ; , s. 2671-2675
  • Conference paper (peer-reviewed)abstract
    • We consider N transmitter-receiver pairs that share a wireless channel and we address the problem of obtaining a schedule for activating subsets of these links so as to empty the transmitter queues in minimum time. Our aim is to provide theoretical insights for the optimality characterization of the problem, using both a cross-layer model formulation, which takes into account the effect of interference on achievable transmission rates, as well as a collision-based model, which does not incorporate the physical layer realities into the problem. We present the basic linear programming formulation of the problem and establish that the optimal schedule need not consist of more than N subset activation frames. We then prove that the problem is NP-hard for all reasonable continuous rate functions. Finally, we obtain sufficient and/or necessary conditions for optimality in a number of special cases.
  •  
Skapa referenser, mejla, bekava och länka
  • Result 1-10 of 65
Type of publication
conference paper (64)
journal article (1)
Type of content
peer-reviewed (65)
Author/Editor
Durisi, Giuseppe, 19 ... (17)
Graell i Amat, Alexa ... (15)
Rosnes, Eirik (6)
Agrell, Erik, 1965 (5)
Koch, Tobias (5)
Lentmaier, Michael (4)
show more...
Smeets, Ben (3)
Popovski, Petar (3)
Johannesson, Rolf (3)
Bocharova, Irina (3)
Alvarado, Alex, 1982 (2)
Karlsson, Magnus, 19 ... (2)
Brännström, Fredrik, ... (2)
Ozcelikkale, Ayca, 1 ... (2)
Rosnes, Eirik, 1975 (2)
He, Qing (1)
Jin, S. (1)
Zhang, Z. (1)
Gehrmann, Christian (1)
Wymeersch, Henk, 197 ... (1)
Shtarkov, Yu M. (1)
Smeets, B. J.M. (1)
Johansson, Thomas (1)
Keykhosravi, Kamran, ... (1)
Como, Giacomo (1)
Yang, Sheng (1)
Yuan, Di (1)
Afanassiev, Valentin (1)
Schmalen, Laurent (1)
Qiu, Min (1)
Åberg, Jan (1)
Rasmussen, Lars Kild ... (1)
McKelvey, Tomas, 196 ... (1)
Anderson, John B (1)
Zeinali, Mehdi (1)
Angelakis, Vangelis (1)
Ephremides, Anthony (1)
Costello Jr., Daniel ... (1)
Matthaiou, Michail, ... (1)
Savic, Vladimir (1)
Viberg, Mats, 1961 (1)
Penna, Federico (1)
Makki, Behrooz, 1980 (1)
Yuan, Jinhong (1)
Liva, Gianluigi (1)
Beygi, Lotfollah, 19 ... (1)
Kong, C (1)
Wu, Xiaowei (1)
Panahi, Ashkan, 1986 (1)
Bitouzé, Nicolas (1)
show less...
University
Chalmers University of Technology (50)
Lund University (16)
Linköping University (3)
Royal Institute of Technology (1)
Language
English (65)
Research subject (UKÄ/SCB)
Engineering and Technology (57)
Natural sciences (15)
Social Sciences (2)

Year

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Close

Copy and save the link in order to return to this view