id
stringlengths
9
10
submitter
stringlengths
2
52
authors
stringlengths
4
6.51k
title
stringlengths
4
246
comments
stringlengths
1
523
journal-ref
stringlengths
4
345
doi
stringlengths
11
120
report-no
stringlengths
2
243
categories
stringlengths
5
98
license
stringclasses
9 values
abstract
stringlengths
33
3.33k
versions
list
update_date
timestamp[s]
authors_parsed
list
prediction
stringclasses
1 value
probability
float64
0.95
1
0806.4468
Rui Zhang
Rui Zhang, Shuguang Cui, and Ying-Chang Liang
On Ergodic Sum Capacity of Fading Cognitive Multiple-Access and Broadcast Channels
To appear in IEEE Transactions on Information Theory
null
10.1109/TIT.2009.2030449
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper studies the information-theoretic limits of a secondary or cognitive radio (CR) network under spectrum sharing with an existing primary radio network. In particular, the fading cognitive multiple-access channel (C-MAC) is first studied, where multiple secondary users transmit to the secondary base station (BS) under both individual transmit-power constraints and a set of interference-power constraints each applied at one of the primary receivers. This paper considers the long-term (LT) or the short-term (ST) transmit-power constraint over the fading states at each secondary transmitter, combined with the LT or ST interference-power constraint at each primary receiver. In each case, the optimal power allocation scheme is derived for the secondary users to achieve the ergodic sum capacity of the fading C-MAC, as well as the conditions for the optimality of the dynamic time-division-multiple-access (D-TDMA) scheme in the secondary network. The fading cognitive broadcast channel (C-BC) that models the downlink transmission in the secondary network is then studied under the LT/ST transmit-power constraint at the secondary BS jointly with the LT/ST interference-power constraint at each of the primary receivers. It is shown that D-TDMA is indeed optimal for achieving the ergodic sum capacity of the fading C-BC for all combinations of transmit-power and interference-power constraints.
[ { "version": "v1", "created": "Fri, 27 Jun 2008 09:32:01 GMT" }, { "version": "v2", "created": "Mon, 3 Aug 2009 05:59:45 GMT" } ]
2016-11-18T00:00:00
[ [ "Zhang", "Rui", "" ], [ "Cui", "Shuguang", "" ], [ "Liang", "Ying-Chang", "" ] ]
new_dataset
0.963066
0807.0245
Jing Liu
Jing Liu, Jian-Kang Zhang, Kon Max Wong
Full Diversity Codes for MISO Systems Equipped with Linear or ML Detectors
16 pages, 8 figures. accepted for publication in IEEE Trans. Information theory
null
10.1109/TIT.2008.928992
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, a general criterion for space time block codes (STBC) to achieve full-diversity with a linear receiver is proposed for a wireless communication system having multiple transmitter and single receiver antennas (MISO). Particularly, the STBC with Toeplitz structure satisfies this criterion and therefore, enables full-diversity. Further examination of this Toeplitz STBC reveals the following important properties: a) The symbol transmission rate can be made to approach unity. b) Applying the Toeplitz code to any signalling scheme having nonzero distance between the nearest constellation points results in a non-vanishing determinant. In addition, if QAM is used as the signalling scheme, then for independent MISO flat fading channels, the Toeplitz codes is proved to approach the optimal diversity-vs-multiplexing tradeoff with a ZF receiver when the number of channel uses is large. This is, so far, the first non-orthogonal STBC shown to achieve the optimal tradeoff for such a receiver. On the other hand, when ML detection is employed in a MISO system, the Toeplitz STBC achieves the maximum coding gain for independent channels. When the channel fading coefficients are correlated, the inherent transmission matrix in the Toeplitz STBC can be designed to minimize the average worst case pair-wise error probability.
[ { "version": "v1", "created": "Tue, 1 Jul 2008 21:49:42 GMT" } ]
2016-11-18T00:00:00
[ [ "Liu", "Jing", "" ], [ "Zhang", "Jian-Kang", "" ], [ "Wong", "Kon Max", "" ] ]
new_dataset
0.981551
0808.1495
Shamgar Gurevich
Shamgar Gurevich, Ronny Hadani, Nir Sochen
The finite harmonic oscillator and its applications to sequences, communication and radar
Accepted for publication in IEEE Transactions on Information Theory (Communicated by Guang Gong, Department of Electrical and Computer Engineering, University of Waterloo, Waterloo, Ontario, CANADA)
IEEE Transactions on Information Theory, vol. 54, no. 9, September 2008
10.1109/TIT.2008.926440
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A novel system, called the oscillator system, consisting of order of p^3 functions (signals) on the finite field F_p; with p an odd prime, is described and studied. The new functions are proved to satisfy good auto-correlation, cross-correlation and low peak-to-average power ratio properties. Moreover, the oscillator system is closed under the operation of discrete Fourier transform. Applications of the oscillator system for discrete radar and digital communication theory are explained. Finally, an explicit algorithm to construct the oscillator system is presented.
[ { "version": "v1", "created": "Mon, 11 Aug 2008 16:50:00 GMT" }, { "version": "v2", "created": "Tue, 30 Dec 2008 07:41:28 GMT" } ]
2016-11-18T00:00:00
[ [ "Gurevich", "Shamgar", "" ], [ "Hadani", "Ronny", "" ], [ "Sochen", "Nir", "" ] ]
new_dataset
0.992668
0810.2781
Jin Lu
Jin Lu, Jos\'e M. F. Moura
Linear Time Encoding of LDPC Codes
36 pages, 13 figures, submitted to IEEE Transactions on Information Theory
null
10.1109/TIT.2009.2034823
null
cs.IT math.IT
http://creativecommons.org/licenses/by-nc-sa/3.0/
In this paper, we propose a linear complexity encoding method for arbitrary LDPC codes. We start from a simple graph-based encoding method ``label-and-decide.'' We prove that the ``label-and-decide'' method is applicable to Tanner graphs with a hierarchical structure--pseudo-trees-- and that the resulting encoding complexity is linear with the code block length. Next, we define a second type of Tanner graphs--the encoding stopping set. The encoding stopping set is encoded in linear complexity by a revised label-and-decide algorithm--the ``label-decide-recompute.'' Finally, we prove that any Tanner graph can be partitioned into encoding stopping sets and pseudo-trees. By encoding each encoding stopping set or pseudo-tree sequentially, we develop a linear complexity encoding method for general LDPC codes where the encoding complexity is proved to be less than $4 \cdot M \cdot (\overline{k} - 1)$, where $M$ is the number of independent rows in the parity check matrix and $\overline{k}$ represents the mean row weight of the parity check matrix.
[ { "version": "v1", "created": "Wed, 15 Oct 2008 19:32:48 GMT" } ]
2016-11-18T00:00:00
[ [ "Lu", "Jin", "" ], [ "Moura", "José M. F.", "" ] ]
new_dataset
0.999323
0810.3869
Vikram Chandrasekhar
Vikram Chandrasekhar, Jeffrey G. Andrews, Tarik Muharemovic, Zukang Shen and Alan Gatherer
Power Control in Two-Tier Femtocell Networks
29 pages, 10 figures, Revised and resubmitted to the IEEE Transactions on Wireless Communications
null
10.1109/TWC.2009.081386
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In a two tier cellular network -- comprised of a central macrocell underlaid with shorter range femtocell hotspots -- cross-tier interference limits overall capacity with universal frequency reuse. To quantify near-far effects with universal frequency reuse, this paper derives a fundamental relation providing the largest feasible cellular Signal-to-Interference-Plus-Noise Ratio (SINR), given any set of feasible femtocell SINRs. We provide a link budget analysis which enables simple and accurate performance insights in a two-tier network. A distributed utility-based SINR adaptation at femtocells is proposed in order to alleviate cross-tier interference at the macrocell from cochannel femtocells. The Foschini-Miljanic (FM) algorithm is a special case of the adaptation. Each femtocell maximizes their individual utility consisting of a SINR based reward less an incurred cost (interference to the macrocell). Numerical results show greater than 30% improvement in mean femtocell SINRs relative to FM. In the event that cross-tier interference prevents a cellular user from obtaining its SINR target, an algorithm is proposed that reduces transmission powers of the strongest femtocell interferers. The algorithm ensures that a cellular user achieves its SINR target even with 100 femtocells/cell-site, and requires a worst case SINR reduction of only 16% at femtocells. These results motivate design of power control schemes requiring minimal network overhead in two-tier networks with shared spectrum.
[ { "version": "v1", "created": "Tue, 21 Oct 2008 16:04:16 GMT" }, { "version": "v2", "created": "Fri, 24 Oct 2008 03:26:36 GMT" }, { "version": "v3", "created": "Wed, 29 Apr 2009 16:15:18 GMT" }, { "version": "v4", "created": "Wed, 13 May 2009 19:53:07 GMT" } ]
2016-11-18T00:00:00
[ [ "Chandrasekhar", "Vikram", "" ], [ "Andrews", "Jeffrey G.", "" ], [ "Muharemovic", "Tarik", "" ], [ "Shen", "Zukang", "" ], [ "Gatherer", "Alan", "" ] ]
new_dataset
0.970779
0902.3026
Artem Chebotko
Artem Chebotko, Yu Deng, Shiyong Lu, Farshad Fotouhi, Anthony Aristar, Hennie Brugman, Alexander Klassmann, Han Sloetjes, Albert Russel, Peter Wittenburg
OntoELAN: An Ontology-based Linguistic Multimedia Annotator
Appeared in the Proceedings of the IEEE Sixth International Symposium on Multimedia Software Engineering (IEEE-MSE'04), pp. 329-336, Miami, FL, USA, December, 2004
Proceedings of the IEEE Sixth International Symposium on Multimedia Software Engineering (IEEE-MSE'04), pp. 329-336, Miami, FL, USA, December, 2004
10.1109/MMSE.2004.58
null
cs.DL cs.DB cs.MM cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Despite its scientific, political, and practical value, comprehensive information about human languages, in all their variety and complexity, is not readily obtainable and searchable. One reason is that many language data are collected as audio and video recordings which imposes a challenge to document indexing and retrieval. Annotation of multimedia data provides an opportunity for making the semantics explicit and facilitates the searching of multimedia documents. We have developed OntoELAN, an ontology-based linguistic multimedia annotator that features: (1) support for loading and displaying ontologies specified in OWL; (2) creation of a language profile, which allows a user to choose a subset of terms from an ontology and conveniently rename them if needed; (3) creation of ontological tiers, which can be annotated with profile terms and, therefore, corresponding ontological terms; and (4) saving annotations in the XML format as Multimedia Ontology class instances and, linked to them, class instances of other ontologies used in ontological tiers. To our best knowledge, OntoELAN is the first audio/video annotation tool in linguistic domain that provides support for ontology-based annotation.
[ { "version": "v1", "created": "Wed, 18 Feb 2009 00:40:37 GMT" } ]
2016-11-18T00:00:00
[ [ "Chebotko", "Artem", "" ], [ "Deng", "Yu", "" ], [ "Lu", "Shiyong", "" ], [ "Fotouhi", "Farshad", "" ], [ "Aristar", "Anthony", "" ], [ "Brugman", "Hennie", "" ], [ "Klassmann", "Alexander", "" ], [ "Sloetjes", "Han", "" ], [ "Russel", "Albert", "" ], [ "Wittenburg", "Peter", "" ] ]
new_dataset
0.996744
0904.1281
Marius Kleiner
Marius Kleiner, Bixio Rimoldi
Asymptotically Optimal Joint Source-Channel Coding with Minimal Delay
5 pages, 1 figure, final version accepted at IEEE Globecom 2009 (Communication Theory Symposium)
null
10.1109/GLOCOM.2009.5425427
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present and analyze a joint source-channel coding strategy for the transmission of a Gaussian source across a Gaussian channel in n channel uses per source symbol. Among all such strategies, our scheme has the following properties: i) the resulting mean-squared error scales optimally with the signal-to-noise ratio, and ii) the scheme is easy to implement and the incurred delay is minimal, in the sense that a single source symbol is encoded at a time.
[ { "version": "v1", "created": "Wed, 8 Apr 2009 08:34:12 GMT" }, { "version": "v2", "created": "Thu, 24 Sep 2009 11:22:30 GMT" } ]
2016-11-18T00:00:00
[ [ "Kleiner", "Marius", "" ], [ "Rimoldi", "Bixio", "" ] ]
new_dataset
0.997489
0906.0037
Nadia Fawaz
Nadia Fawaz, Keyvan Zarifi, Merouane Debbah, David Gesbert
Asymptotic Capacity and Optimal Precoding in MIMO Multi-Hop Relay Networks
45 pages, 7 figures, submitted to IEEE Transactions on Information Theory, December 2008
null
10.1109/TIT.2011.2111830
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A multi-hop relaying system is analyzed where data sent by a multi-antenna source is relayed by successive multi-antenna relays until it reaches a multi-antenna destination. Assuming correlated fading at each hop, each relay receives a faded version of the signal from the previous level, performs linear precoding and retransmits it to the next level. Using free probability theory and assuming that the noise power at relaying levels-- but not at destination-- is negligible, the closed-form expression of the asymptotic instantaneous end-to-end mutual information is derived as the number of antennas at all levels grows large. The so-obtained deterministic expression is independent from the channel realizations while depending only on channel statistics. Moreover, it also serves as the asymptotic value of the average end-to-end mutual information. The optimal singular vectors of the precoding matrices that maximize the average mutual information with finite number of antennas at all levels are also provided. It turns out that the optimal precoding singular vectors are aligned to the eigenvectors of the channel correlation matrices. Thus they can be determined using only the known channel statistics. As the optimal precoding singular vectors are independent from the system size, they are also optimal in the asymptotic regime.
[ { "version": "v1", "created": "Fri, 29 May 2009 22:44:57 GMT" } ]
2016-11-18T00:00:00
[ [ "Fawaz", "Nadia", "" ], [ "Zarifi", "Keyvan", "" ], [ "Debbah", "Merouane", "" ], [ "Gesbert", "David", "" ] ]
new_dataset
0.999596
0906.0695
Brijesh Rai Kumar
Brijesh Kumar Rai, and Bikash Kumar Dey
On network coding for sum-networks
Accepted to IEEE Transactions on Information Theory
null
10.1109/TIT.2011.2169532
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A directed acyclic network is considered where all the terminals need to recover the sum of the symbols generated at all the sources. We call such a network a sum-network. It is shown that there exists a solvably (and linear solvably) equivalent sum-network for any multiple-unicast network, and thus for any directed acyclic communication network. It is also shown that there exists a linear solvably equivalent multiple-unicast network for every sum-network. It is shown that for any set of polynomials having integer coefficients, there exists a sum-network which is scalar linear solvable over a finite field F if and only if the polynomials have a common root in F. For any finite or cofinite set of prime numbers, a network is constructed which has a vector linear solution of any length if and only if the characteristic of the alphabet field is in the given set. The insufficiency of linear network coding and unachievability of the network coding capacity are proved for sum-networks by using similar known results for communication networks. Under fractional vector linear network coding, a sum-network and its reverse network are shown to be equivalent. However, under non-linear coding, it is shown that there exists a solvable sum-network whose reverse network is not solvable.
[ { "version": "v1", "created": "Wed, 3 Jun 2009 12:22:52 GMT" }, { "version": "v2", "created": "Thu, 9 Jul 2009 23:34:13 GMT" }, { "version": "v3", "created": "Mon, 17 Aug 2009 11:52:43 GMT" }, { "version": "v4", "created": "Tue, 30 Aug 2011 08:36:18 GMT" } ]
2016-11-18T00:00:00
[ [ "Rai", "Brijesh Kumar", "" ], [ "Dey", "Bikash Kumar", "" ] ]
new_dataset
0.973006
0906.2819
Mahdi Ramezani
Mahdi Ramezani, Masoud Ardakani
Disjoint LDPC Coding for Gaussian Broadcast Channels
5 pages, 1 figure, 3 tables, To appear in Proc. IEEE International Symposium on Information Theory (ISIT 2009), Seoul, Korea, June-July 2009
null
10.1109/ISIT.2009.5205588
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Low-density parity-check (LDPC) codes have been used for communication over a two-user Gaussian broadcast channel. It has been shown in the literature that the optimal decoding of such system requires joint decoding of both user messages at each user. Also, a joint code design procedure should be performed. We propose a method which uses a novel labeling strategy and is based on the idea behind the bit-interleaved coded modulation. This method does not require joint decoding and/or joint code optimization. Thus, it reduces the overall complexity of near-capacity coding in broadcast channels. For different rate pairs on the boundary of the capacity region, pairs of LDPC codes are designed to demonstrate the success of this technique.
[ { "version": "v1", "created": "Mon, 15 Jun 2009 23:09:04 GMT" } ]
2016-11-18T00:00:00
[ [ "Ramezani", "Mahdi", "" ], [ "Ardakani", "Masoud", "" ] ]
new_dataset
0.967429
0912.3441
Georgios Rodolakis
Philippe Jacquet, Bernard Mans and Georgios Rodolakis
On Space-Time Capacity Limits in Mobile and Delay Tolerant Networks
Part of this work will be presented in "On Space-Time Capacity Limits in Mobile and Delay Tolerant Networks", P. Jacquet, B. Mans and G. Rodolakis, IEEE Infocom, 2010
null
10.1109/INFCOM.2010.5462164
null
cs.NI cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We investigate the fundamental capacity limits of space-time journeys of information in mobile and Delay Tolerant Networks (DTNs), where information is either transmitted or carried by mobile nodes, using store-carry-forward routing. We define the capacity of a journey (i.e., a path in space and time, from a source to a destination) as the maximum amount of data that can be transferred from the source to the destination in the given journey. Combining a stochastic model (conveying all possible journeys) and an analysis of the durations of the nodes' encounters, we study the properties of journeys that maximize the space-time information propagation capacity, in bit-meters per second. More specifically, we provide theoretical lower and upper bounds on the information propagation speed, as a function of the journey capacity. In the particular case of random way-point-like models (i.e., when nodes move for a distance of the order of the network domain size before changing direction), we show that, for relatively large journey capacities, the information propagation speed is of the same order as the mobile node speed. This implies that, surprisingly, in sparse but large-scale mobile DTNs, the space-time information propagation capacity in bit-meters per second remains proportional to the mobile node speed and to the size of the transported data bundles, when the bundles are relatively large. We also verify that all our analytical bounds are accurate in several simulation scenarios.
[ { "version": "v1", "created": "Thu, 17 Dec 2009 16:27:59 GMT" } ]
2016-11-18T00:00:00
[ [ "Jacquet", "Philippe", "" ], [ "Mans", "Bernard", "" ], [ "Rodolakis", "Georgios", "" ] ]
new_dataset
0.971907
1001.2195
Uwe Aickelin
Yousof Al-Hammadi, Uwe Aickelin, Julie Greensmith
DCA for Bot Detection
10pages, 5 tables, 6 figures, IEEE World Congress on Computational Intelligence (WCCI2008), Hong Kong
Proceedings of the IEEE World Congress on Computational Intelligence (WCCI2008), Hong Kong
10.1109/CEC.2008.4631034
null
cs.AI cs.CR cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Ensuring the security of computers is a non-trivial task, with many techniques used by malicious users to compromise these systems. In recent years a new threat has emerged in the form of networks of hijacked zombie machines used to perform complex distributed attacks such as denial of service and to obtain sensitive data such as password information. These zombie machines are said to be infected with a 'bot' - a malicious piece of software which is installed on a host machine and is controlled by a remote attacker, termed the 'botmaster of a botnet'. In this work, we use the biologically inspired Dendritic Cell Algorithm (DCA) to detect the existence of a single bot on a compromised host machine. The DCA is an immune-inspired algorithm based on an abstract model of the behaviour of the dendritic cells of the human body. The basis of anomaly detection performed by the DCA is facilitated using the correlation of behavioural attributes such as keylogging and packet flooding behaviour. The results of the application of the DCA to the detection of a single bot show that the algorithm is a successful technique for the detection of such malicious software without responding to normally running programs.
[ { "version": "v1", "created": "Wed, 13 Jan 2010 15:05:02 GMT" } ]
2016-11-18T00:00:00
[ [ "Al-Hammadi", "Yousof", "" ], [ "Aickelin", "Uwe", "" ], [ "Greensmith", "Julie", "" ] ]
new_dataset
0.999048
1003.1168
Jianfeng Zhan
Lei Wang, Jianfeng Zhan, Weisong Shi, Yi Liang, Lin Yuan
In Cloud, Do MTC or HTC Service Providers Benefit from the Economies of Scale?
null
Proceedings of 2nd Workshop on Many-Task Computing on Grids and Supercomputers, Co-located with ACM/IEEE SC 2009
10.1145/1646468.1646475
null
cs.DC cs.PF
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we intend to answer one key question to the success of cloud computing: in cloud, do many task computing (MTC) or high throughput computing (HTC) service providers, which offer the corresponding computing service to end users, benefit from the economies of scale? Our research contributions are three-fold: first, we propose an innovative usage model, called dynamic service provision (DSP) model, for MTC or HTC service providers. In the DSP model, the resource provider provides the service of creating and managing runtime environments for MTC or HTC service providers, and consolidates heterogeneous MTC or HTC workloads on the cloud platform; second, according to the DSP model, we design and implement DawningCloud, which provides automatic management for heterogeneous workloads; third, a comprehensive evaluation of DawningCloud has been performed in an emulatation experiment. We found that for typical workloads, in comparison with the previous two cloud solutions, DawningCloud saves the resource consumption maximally by 46.4% (HTC) and 74.9% (MTC) for the service providers, and saves the total resource consumption maximally by 29.7% for the resource provider. At the same time, comparing with the traditional solution that provides MTC or HTC services with dedicated systems, DawningCloud is more cost-effective. To this end, we conclude that for typical MTC and HTC workloads, on the cloud platform, MTC and HTC service providers and the resource provider can benefit from the economies of scale.
[ { "version": "v1", "created": "Fri, 5 Mar 2010 00:10:19 GMT" }, { "version": "v2", "created": "Thu, 8 Apr 2010 08:09:42 GMT" }, { "version": "v3", "created": "Mon, 21 Jun 2010 05:50:25 GMT" } ]
2016-11-18T00:00:00
[ [ "Wang", "Lei", "" ], [ "Zhan", "Jianfeng", "" ], [ "Shi", "Weisong", "" ], [ "Liang", "Yi", "" ], [ "Yuan", "Lin", "" ] ]
new_dataset
0.994455
1005.3143
Jezabel Molina-Gil
P. Caballero-Gil, J. Molina-Gil, C. Hern\'andez-Goya and C. Caballero-Gil
Stimulating Cooperation in Self-Organized Vehicular Networks
null
Proceedings of APCC IEEE Asia Pacific Conference on Communications. Vol. 82 , (October 2009) pp. 346-349
10.1109/APCC.2009.5375621
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A Vehicular Ad-hoc NETwork (VANET) is a special form of Mobile Ad-hoc Network designed to provide communications among nearby vehicles and between vehicles and nearby fixed roadside equipment. Its main goal is to improve safety and comfort for passengers, but it can also be used for commercial applications. In this latter case, it will be necessary to motivate drivers to cooperate and contribute to packet forwarding in Vehicle-to-Vehicle and Vehicle-to-Roadside communications. This paper examines the problem, analyzes the drawbacks of known schemes and proposes a new secure incentive scheme to stimulate cooperation in VANETs, taking into account factors such as time and distance.
[ { "version": "v1", "created": "Tue, 18 May 2010 10:24:16 GMT" } ]
2016-11-18T00:00:00
[ [ "Caballero-Gil", "P.", "" ], [ "Molina-Gil", "J.", "" ], [ "Hernández-Goya", "C.", "" ], [ "Caballero-Gil", "C.", "" ] ]
new_dataset
0.989049
1006.0109
Erik Jakobsson
Iliya Bouyukliev, Erik Jakobsson
Results on Binary Linear Codes With Minimum Distance 8 and 10
Submitted to the IEEE Transactions on Information Theory, May 2010 To be presented at the ACCT 2010
null
10.1109/TIT.2011.2162264
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
All codes with minimum distance 8 and codimension up to 14 and all codes with minimum distance 10 and codimension up to 18 are classified. Nonexistence of codes with parameters [33,18,8] and [33,14,10] is proved. This leads to 8 new exact bounds for binary linear codes. Primarily two algorithms considering the dual codes are used, namely extension of dual codes with a proper coordinate, and a fast algorithm for finding a maximum clique in a graph, which is modified to find a maximum set of vectors with the right dependency structure.
[ { "version": "v1", "created": "Tue, 1 Jun 2010 10:57:05 GMT" } ]
2016-11-18T00:00:00
[ [ "Bouyukliev", "Iliya", "" ], [ "Jakobsson", "Erik", "" ] ]
new_dataset
0.998556
1008.3196
Amitav Mukherjee
Don Torrieri, Amitav Mukherjee, Hyuck Kwon
Coded DS-CDMA Systems with Iterative Channel Estimation and no Pilot Symbols
To appear, IEEE Transactions on Wireless Communications
null
10.1109/TWC.2010.06.090814
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we describe direct-sequence code-division multiple-access (DS-CDMA) systems with quadriphase-shift keying in which channel estimation, coherent demodulation, and decoding are iteratively performed without the use of any training or pilot symbols. An expectation-maximization channel-estimation algorithm for the fading amplitude, phase, and the interference power spectral density (PSD) due to the combined interference and thermal noise is proposed for DS-CDMA systems with irregular repeat-accumulate codes. After initial estimates of the fading amplitude, phase, and interference PSD are obtained from the received symbols, subsequent values of these parameters are iteratively updated by using the soft feedback from the channel decoder. The updated estimates are combined with the received symbols and iteratively passed to the decoder. The elimination of pilot symbols simplifies the system design and allows either an enhanced information throughput, an improved bit error rate, or greater spectral efficiency. The interference-PSD estimation enables DS-CDMA systems to significantly suppress interference.
[ { "version": "v1", "created": "Thu, 19 Aug 2010 02:07:52 GMT" } ]
2016-11-18T00:00:00
[ [ "Torrieri", "Don", "" ], [ "Mukherjee", "Amitav", "" ], [ "Kwon", "Hyuck", "" ] ]
new_dataset
0.999188
1008.4463
Laura Giarr\'e
I. Tinnirello, L. Giarr\'e, G. Neglia
MAC design for WiFi infrastructure networks: a game-theoretic approach
under review on IEEE Transaction on wireless communications
null
10.1109/TWC.2011.062011.100193
null
cs.GT math.OC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In WiFi networks, mobile nodes compete for accessing a shared channel by means of a random access protocol called Distributed Coordination Function (DCF). Although this protocol is in principle fair, since all the stations have the same probability to transmit on the channel, it has been shown that unfair behaviors may emerge in actual networking scenarios because of non-standard configurations of the nodes. Due to the proliferation of open source drivers and programmable cards, enabling an easy customization of the channel access policies, we propose a game-theoretic analysis of random access schemes. Assuming that each node is rational and implements a best response strategy, we show that efficient equilibria conditions can be reached when stations are interested in both uploading and downloading traffic. More interesting, these equilibria are reached when all the stations play the same strategy, thus guaranteeing a fair resource sharing. When stations are interested in upload traffic only, we also propose a mechanism design, based on an artificial dropping of layer-2 acknowledgments, to force desired equilibria. Finally, we propose and evaluate some simple DCF extensions for practically implementing our theoretical findings.
[ { "version": "v1", "created": "Thu, 26 Aug 2010 09:41:43 GMT" } ]
2016-11-18T00:00:00
[ [ "Tinnirello", "I.", "" ], [ "Giarré", "L.", "" ], [ "Neglia", "G.", "" ] ]
new_dataset
0.954921
1009.3041
Chan Wong Wong
Chan Wong Wong, Tan F. Wong, John M.Shea
Secret Sharing LDPC Codes for the BPSK-constrained Gaussian Wiretap Channel
submitted to IEEE Trans. on Information Forensics and Security, special issues on using the physical layer for securing the next generation of communication systems
null
10.1109/TIFS.2011.2139208
null
cs.IT cs.CR math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The problem of secret sharing over the Gaussian wiretap channel is considered. A source and a destination intend to share secret information over a Gaussian channel in the presence of a wiretapper who observes the transmission through another Gaussian channel. Two constraints are imposed on the source-to-destination channel; namely, the source can transmit only binary phase shift keyed (BPSK) symbols, and symbol-by-symbol hard-decision quantization is applied to the received symbols of the destination. An error-free public channel is also available for the source and destination to exchange messages in order to help the secret sharing process. The wiretapper can perfectly observe all messages in the public channel. It is shown that a secret sharing scheme that employs a random ensemble of regular low density parity check (LDPC) codes can achieve the key capacity of the BPSK-constrained Gaussian wiretap channel asymptotically with increasing block length. To accommodate practical constraints of finite block length and limited decoding complexity, fixed irregular LDPC codes are also designed to replace the regular LDPC code ensemble in the proposed secret sharing scheme.
[ { "version": "v1", "created": "Wed, 15 Sep 2010 21:16:58 GMT" }, { "version": "v2", "created": "Sat, 9 Oct 2010 15:22:42 GMT" }, { "version": "v3", "created": "Fri, 21 Jan 2011 03:51:00 GMT" } ]
2016-11-18T00:00:00
[ [ "Wong", "Chan Wong", "" ], [ "Wong", "Tan F.", "" ], [ "Shea", "John M.", "" ] ]
new_dataset
0.997291
1011.3272
Tian Peng Ren
Tian Peng Ren, Yong Liang Guan, Chau Yuen, Erry Gunawan and Er Yang Zhang
Group-Decodable Space-Time Block Codes with Code Rate > 1
Accepted by IEEE Trans. Commun., including 25 pages, 6 figures and 2 tables
null
10.1109/TCOMM.2011.020811.090663
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
High-rate space-time block codes (STBC with code rate > 1) in multi-input multi-output (MIMO) systems are able to provide both spatial multiplexing gain and diversity gain, but have high maximum likelihood (ML) decoding complexity. Since group-decodable (quasi-orthogonal) code structure can reduce the decoding complexity, we present in this paper systematic methods to construct group-decodable high-rate STBC with full symbol-wise diversity gain for arbitrary transmit antenna number and code length. We show that the proposed group-decodable STBC can achieve high code rate that increases almost linearly with the transmit antenna number, and the slope of this near-linear dependence increases with the code length. Comparisons with existing low-rate and high-rate codes (such as orthogonal STBC and algebraic STBC) are conducted to show the decoding complexity reduction and good code performance achieved by the proposed codes.
[ { "version": "v1", "created": "Mon, 15 Nov 2010 00:34:17 GMT" }, { "version": "v2", "created": "Thu, 18 Nov 2010 12:57:45 GMT" } ]
2016-11-18T00:00:00
[ [ "Ren", "Tian Peng", "" ], [ "Guan", "Yong Liang", "" ], [ "Yuen", "Chau", "" ], [ "Gunawan", "Erry", "" ], [ "Zhang", "Er Yang", "" ] ]
new_dataset
0.989588
1102.2516
Enrico Paolini
Enrico Paolini, Gianluigi Liva, Marco Chiani
High Throughput Random Access via Codes on Graphs: Coded Slotted ALOHA
6 pages, 2 figures. To be presented at IEEE ICC 2011
null
10.1109/icc.2011.5962871
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, coded slotted ALOHA (CSA) is introduced as a powerful random access scheme to the MAC frame. In CSA, the burst a generic user wishes to transmit in the MAC frame is first split into segments, and these segments are then encoded through a local a packet-oriented code prior to transmission. On the receiver side, iterative interference cancellation combined with decoding of the local code is performed to recover from collisions. The new scheme generalizes the previously proposed irregular repetition slotted ALOHA (IRSA) technique, based on a simple repetition of the users' bursts. An interpretation of the CSA interference cancellation process as an iterative erasure decoding process over a sparse bipartite graph is identified, and the corresponding density evolution equations derived. Based on these equations, asymptotically optimal CSA schemes are designed for several rates and their performance for a finite number of users investigated through simulation and compared to IRSA competitors. Throughputs as high as 0.8 are demonstrated. The new scheme turns out to be a good candidate in contexts where power efficiency is required.
[ { "version": "v1", "created": "Sat, 12 Feb 2011 14:44:12 GMT" } ]
2016-11-18T00:00:00
[ [ "Paolini", "Enrico", "" ], [ "Liva", "Gianluigi", "" ], [ "Chiani", "Marco", "" ] ]
new_dataset
0.991047
1104.0430
Peyman Razaghi
Peyman Razaghi, Song Nam Hong. Lei Zhou, Wei Yu, and Giuseppe Caire
Two Birds and One Stone: Gaussian Interference Channel with a Shared Out-of-Band Relay of Limited Rate
Submitted to IEEE Transactions on Information Theory
null
10.1109/TIT.2013.2251413
null
cs.IT math.IT
http://creativecommons.org/licenses/by-nc-sa/3.0/
The two-user Gaussian interference channel with a shared out-of-band relay is considered. The relay observes a linear combination of the source signals and broadcasts a common message to the two destinations, through a perfect link of fixed limited rate $R_0$ bits per channel use. The out-of-band nature of the relay is reflected by the fact that the common relay message does not interfere with the received signal at the two destinations. A general achievable rate is established, along with upper bounds on the capacity region for the Gaussian case. For $R_0$ values below a certain threshold, which depends on channel parameters, the capacity region of this channel is determined in this paper to within a constant gap of $\Delta=1.95$ bits. We identify interference regimes where a two-for-one gain in achievable rates is possible for every bit relayed, up to a constant approximation error. Instrumental to these results is a carefully-designed quantize-and-forward type of relay strategy along with a joint decoding scheme employed at destination ends. Further, we also study successive decoding strategies with optimal decoding order (corresponding to the order at which common, private, and relay messages are decoded), and show that successive decoding also achieves two-for-one gains asymptotically in regimes where a two-for-one gain is achievable by joint decoding; yet, successive decoding produces unbounded loss asymptotically when compared to joint decoding, in general.
[ { "version": "v1", "created": "Sun, 3 Apr 2011 22:01:30 GMT" }, { "version": "v2", "created": "Thu, 15 Nov 2012 10:40:58 GMT" } ]
2016-11-18T00:00:00
[ [ "Razaghi", "Peyman", "" ], [ "Zhou", "Song Nam Hong. Lei", "" ], [ "Yu", "Wei", "" ], [ "Caire", "Giuseppe", "" ] ]
new_dataset
0.995244
1107.4922
Marco Di Renzo
Marco Di Renzo, Dario De Leonardis, Fabio Graziosi, Harald Haas
On the Performance of Space Shift Keying (SSK) Modulation with Imperfect Channel Knowledge
IEEE GLOBECOM 2011 (to appear)
null
10.1109/GLOCOM.2011.6133562
null
cs.PF
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we study the sensitivity and robustness of Space Shift Keying (SSK) modulation to imperfect channel knowledge at the receiver. Unlike the common widespread belief, we show that SSK modulation is more robust to imperfect channel knowledge than other state-of-the-art transmission technologies, and only few training pilots are needed to get reliable enough channel estimates for data detection. More precisely, we focus our attention on the so-called Time-Orthogonal-Signal-Design (TOSD-) SSK modulation scheme, which is an improved version of SSK modulation offering transmit-diversity gains, and provide the following contributions: i) we develop a closed-form analytical framework to compute the Average Bit Error Probability (ABEP) of a mismatched detector for TOSD-SSK modulation, which can be used for arbitrary transmit-antenna, receive-antenna, channel fading, and training pilots; ii) we perform a comparative study of the performance of TOSD-SSK modulation and the Alamouti code under the same imperfect channel knowledge, and show that TOSD-SSK modulation is more robust to channel estimation errors; iii) we point out that only few pilot pulses are required to get performance very close to the perfect channel knowledge lower-bound; and iv) we verify that transmit- and receive-diversity gains of TOSD-SSK modulation are preserved even for a mismatched receiver.
[ { "version": "v1", "created": "Mon, 25 Jul 2011 12:33:25 GMT" } ]
2016-11-18T00:00:00
[ [ "Di Renzo", "Marco", "" ], [ "De Leonardis", "Dario", "" ], [ "Graziosi", "Fabio", "" ], [ "Haas", "Harald", "" ] ]
new_dataset
0.978265
1202.0463
Walid Saad
Walid Saad, Zhu Han, Tamer Ba\c{s}ar, M\'erouane Debbah, and Are Hj{\o}rungnes
Network Formation Games Among Relay Stations in Next Generation Wireless Networks
IEEE Transactions on Communications, vol. 59, no. 9, pp. 2528-2542, September 2011
IEEE Transactions on Communications, vol. 59, no. 9, pp. 2528-2542, September 2011
10.1109/TCOMM.2011.062311.100046
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The introduction of relay station (RS) nodes is a key feature in next generation wireless networks such as 3GPP's long term evolution advanced (LTE-Advanced), or the forthcoming IEEE 802.16j WiMAX standard. This paper presents, using game theory, a novel approach for the formation of the tree architecture that connects the RSs and their serving base station in the \emph{uplink} of the next generation wireless multi-hop systems. Unlike existing literature which mainly focused on performance analysis, we propose a distributed algorithm for studying the \emph{structure} and \emph{dynamics} of the network. We formulate a network formation game among the RSs whereby each RS aims to maximize a cross-layer utility function that takes into account the benefit from cooperative transmission, in terms of reduced bit error rate, and the costs in terms of the delay due to multi-hop transmission. For forming the tree structure, a distributed myopic algorithm is devised. Using the proposed algorithm, each RS can individually select the path that connects it to the BS through other RSs while optimizing its utility. We show the convergence of the algorithm into a Nash tree network, and we study how the RSs can adapt the network's topology to environmental changes such as mobility or the deployment of new mobile stations. Simulation results show that the proposed algorithm presents significant gains in terms of average utility per mobile station which is at least 17.1% better relatively to the case with no RSs and reaches up to 40.3% improvement compared to a nearest neighbor algorithm (for a network with 10 RSs). The results also show that the average number of hops does not exceed 3 even for a network with up to 25 RSs.
[ { "version": "v1", "created": "Thu, 2 Feb 2012 15:32:46 GMT" } ]
2016-11-18T00:00:00
[ [ "Saad", "Walid", "" ], [ "Han", "Zhu", "" ], [ "Başar", "Tamer", "" ], [ "Debbah", "Mérouane", "" ], [ "Hjørungnes", "Are", "" ] ]
new_dataset
0.98865
1204.0034
MinJi Kim
Giuliano Giacaglia, Xiaomeng Shi, MinJi Kim, Daniel E. Lucani, and Muriel Medard
Systematic Network Coding with the Aid of a Full-Duplex Relay
6 pages, 5 figures, submitted to IEEE Globecom
null
10.1109/ICC.2013.6655057
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A characterization of systematic network coding over multi-hop wireless networks is key towards understanding the trade-off between complexity and delay performance of networks that preserve the systematic structure. This paper studies the case of a relay channel, where the source's objective is to deliver a given number of data packets to a receiver with the aid of a relay. The source broadcasts to both the receiver and the relay using one frequency, while the relay uses another frequency for transmissions to the receiver, allowing for a full-duplex operation of the relay. We analyze the decoding complexity and delay performance of two types of relays: one that preserves the systematic structure of the code from the source; another that does not. A systematic relay forwards uncoded packets upon reception, but transmits coded packets to the receiver after receiving the first coded packet from the source. On the other hand, a non-systematic relay always transmits linear combinations of previously received packets. We compare the performance of these two alternatives by analytically characterizing the expected transmission completion time as well as the number of uncoded packets forwarded by the relay. Our numerical results show that, for a poor channel between the source and the receiver, preserving the systematic structure at the relay (i) allows a significant increase in the number of uncoded packets received by the receiver, thus reducing the decoding complexity, and (ii) preserves close to optimal delay performance.
[ { "version": "v1", "created": "Fri, 30 Mar 2012 21:41:32 GMT" } ]
2016-11-18T00:00:00
[ [ "Giacaglia", "Giuliano", "" ], [ "Shi", "Xiaomeng", "" ], [ "Kim", "MinJi", "" ], [ "Lucani", "Daniel E.", "" ], [ "Medard", "Muriel", "" ] ]
new_dataset
0.998972
1204.2435
Mark Flanagan
Mark F. Flanagan, Enrico Paolini, Marco Chiani and Marc P. C. Fossorier
Spectral Shape of Doubly-Generalized LDPC Codes: Efficient and Exact Evaluation
17 pages, 6 figures. To appear in IEEE Transactions on Information Theory
null
10.1109/TIT.2013.2262494
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper analyzes the asymptotic exponent of the weight spectrum for irregular doubly-generalized LDPC (D-GLDPC) codes. In the process, an efficient numerical technique for its evaluation is presented, involving the solution of a 4 x 4 system of polynomial equations. The expression is consistent with previous results, including the case where the normalized weight or stopping set size tends to zero. The spectral shape is shown to admit a particularly simple form in the special case where all variable nodes are repetition codes of the same degree, a case which includes Tanner codes; for this case it is also shown how certain symmetry properties of the local weight distribution at the CNs induce a symmetry in the overall weight spectral shape function. Finally, using these new results, weight and stopping set size spectral shapes are evaluated for some example generalized and doubly-generalized LDPC code ensembles.
[ { "version": "v1", "created": "Wed, 11 Apr 2012 13:02:27 GMT" }, { "version": "v2", "created": "Mon, 13 May 2013 13:10:19 GMT" } ]
2016-11-18T00:00:00
[ [ "Flanagan", "Mark F.", "" ], [ "Paolini", "Enrico", "" ], [ "Chiani", "Marco", "" ], [ "Fossorier", "Marc P. C.", "" ] ]
new_dataset
0.998225
1205.6361
Martin Monperrus
Markus Kimmig, Martin Monperrus (INRIA Lille - Nord Europe, LIFL), Mira Mezini
Querying Source Code with Natural Language
null
26th IEEE/ACM International Conference On Automated Software Engineering (2011) 376-379
10.1109/ASE.2011.6100076
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
One common task of developing or maintaining software is searching the source code for information like specific method calls or write accesses to certain fields. This kind of information is required to correctly implement new features and to solve bugs. This paper presents an approach for querying source code with natural language.
[ { "version": "v1", "created": "Tue, 29 May 2012 13:38:15 GMT" } ]
2016-11-18T00:00:00
[ [ "Kimmig", "Markus", "", "INRIA Lille - Nord Europe, LIFL" ], [ "Monperrus", "Martin", "", "INRIA Lille - Nord Europe, LIFL" ], [ "Mezini", "Mira", "" ] ]
new_dataset
0.965494
1206.4370
Cunsheng Ding
Cunsheng Ding
Cyclic Codes from Dickson Polynomials
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Due to their efficient encoding and decoding algorithms cyclic codes, a subclass of linear codes, have applications in consumer electronics, data storage systems, and communication systems. In this paper, Dickson polynomials of the first and second kind over finite fields are employed to construct a number of classes of cyclic codes. Lower bounds on the minimum weight of some classes of the cyclic codes are developed. The minimum weights of some other classes of the codes constructed in this paper are determined. The dimensions of the codes obtained in this paper are flexible. Most of the codes presented in this paper are optimal or almost optimal in the sense that they meet some bound on linear codes. Over ninety cyclic codes of this paper should be used to update the current database of tables of best linear codes known. Among them sixty are optimal in the sense that they meet some bound on linear codes and the rest are cyclic codes having the same parameters as the best linear code in the current database maintained at http://www.codetables.de/.
[ { "version": "v1", "created": "Wed, 20 Jun 2012 02:25:11 GMT" }, { "version": "v2", "created": "Thu, 17 Nov 2016 07:34:50 GMT" } ]
2016-11-18T00:00:00
[ [ "Ding", "Cunsheng", "" ] ]
new_dataset
0.999436
1208.1350
Yi Fang
Yi Fang, Jing Xu, Lin Wang, and Guanrong Chen
Performance of MIMO Relay DCSK-CD Systems over Nakagami Fading Channels
11 pages, 15 figures. IEEE Transactions on Circuits and System-I
null
10.1109/TCSI.2012.2215755
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A multi-access multiple-input multiple-output (MIMO) relay differential chaos shift keying cooperative diversity (DCSK-CD) system is proposed in this paper as a comprehensive cooperation scheme, in which the relay and destination both employ multiple antennas to strengthen the robustness against signal fading in a wireless network. It is shown that, with spatial diversity gains, the bit error rate (BER) performance of the proposed system is remarkably better than the conventional DCSK non-cooperation (DCSK-NC) and DCSK cooperative communication (DCSK-CC) systems. Moreover, the exact BER and close-form expressions of the proposed system are derived over Nakagami fading channels through the moment generating function (MGF), which is shown to be highly consistent with the simulation results. Meanwhile, this paper illustrates a trade-off between the performance and the complexity, and provides a threshold for the number of relay antennas keeping the user consumed energy constant. Due to the above-mentioned advantages, the proposed system stands out as a good candidate or alternative for energy-constrained wireless communications based on chaotic modulation, especially for low-power and low-cost wireless personal area networks (WPANs).
[ { "version": "v1", "created": "Tue, 7 Aug 2012 07:18:51 GMT" } ]
2016-11-18T00:00:00
[ [ "Fang", "Yi", "" ], [ "Xu", "Jing", "" ], [ "Wang", "Lin", "" ], [ "Chen", "Guanrong", "" ] ]
new_dataset
0.998486
1209.5513
Jun Zhang
Jun Zhang, Chao-Kai Wen, Shi Jin, Xiqi Gao, and Kai-Kit Wong
On Capacity of Large-Scale MIMO Multiple Access Channels with Distributed Sets of Correlated Antennas
52 pages, 6 figures. Accepted by the IEEE Journal on Selected Areas in Communications
null
10.1109/JSAC.2013.130203
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, a deterministic equivalent of ergodic sum rate and an algorithm for evaluating the capacity-achieving input covariance matrices for the uplink large-scale multiple-input multiple-output (MIMO) antenna channels are proposed. We consider a large-scale MIMO system consisting of multiple users and one base station with several distributed antenna sets. Each link between a user and an antenna set forms a two-sided spatially correlated MIMO channel with line-of-sight (LOS) components. Our derivations are based on novel techniques from large dimensional random matrix theory (RMT) under the assumption that the numbers of antennas at the terminals approach to infinity with a fixed ratio. The deterministic equivalent results (the deterministic equivalent of ergodic sum rate and the capacity-achieving input covariance matrices) are easy to compute and shown to be accurate for realistic system dimensions. In addition, they are shown to be invariant to several types of fading distribution.
[ { "version": "v1", "created": "Tue, 25 Sep 2012 06:47:02 GMT" }, { "version": "v2", "created": "Wed, 26 Sep 2012 12:38:30 GMT" } ]
2016-11-18T00:00:00
[ [ "Zhang", "Jun", "" ], [ "Wen", "Chao-Kai", "" ], [ "Jin", "Shi", "" ], [ "Gao", "Xiqi", "" ], [ "Wong", "Kai-Kit", "" ] ]
new_dataset
0.984792
1211.3828
Hosung Park
Hosung Park, Seokbeom Hong, Jong-Seon No, Dong-Joon Shin
Construction of High-Rate Regular Quasi-Cyclic LDPC Codes Based on Cyclic Difference Families
14 pages, submitted to IEEE Transactions on Communications on November 2012
null
10.1109/TCOMM.2013.070213.120879
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
For a high-rate case, it is difficult to randomly construct good low-density parity-check (LDPC) codes of short and moderate lengths because their Tanner graphs are prone to making short cycles. Also, the existing high-rate quasi-cyclic (QC) LDPC codes can be constructed only for very restricted code parameters. In this paper, a new construction method of high-rate regular QC LDPC codes with parity-check matrices consisting of a single row of circulants with the column-weight 3 or 4 is proposed based on special classes of cyclic difference families. The proposed QC LDPC codes can be constructed for various code rates and lengths including the minimum achievable length for a given design rate, which cannot be achieved by the existing high-rate QC LDPC codes. It is observed that the parity-check matrices of the proposed QC LDPC codes have full rank. It is shown that the error correcting performance of the proposed QC LDPC codes of short and moderate lengths is almost the same as that of the existing ones through numerical analysis.
[ { "version": "v1", "created": "Fri, 16 Nov 2012 08:41:11 GMT" } ]
2016-11-18T00:00:00
[ [ "Park", "Hosung", "" ], [ "Hong", "Seokbeom", "" ], [ "No", "Jong-Seon", "" ], [ "Shin", "Dong-Joon", "" ] ]
new_dataset
0.954658
1211.4940
Muhammad Nazmul Islam
Muhammad Nazmul Islam, Byoung-Jo J. Kim, Paul Henry and Eric Rozner
A Wireless Channel Sounding System for Rapid Propagation Measurements
Submitted to ICC 2013 (2012 AT\&T Intellectual Property. All rights reserved.)
IEEE International Conference on Communications 2013, page 5720-5725
10.1109/ICC.2013.6655507
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Wireless systems are getting deployed in many new environments with different antenna heights, frequency bands and multipath conditions. This has led to an increasing demand for more channel measurements to understand wireless propagation in specific environments and assist deployment engineering. We design and implement a rapid wireless channel sounding system, using the Universal Software Radio Peripheral (USRP) and GNU Radio software, to address these demands. Our design measures channel propagation characteristics simultaneously from multiple transmitter locations. The system consists of multiple battery-powered transmitters and receivers. Therefore, we can set-up the channel sounder rapidly at a field location and measure expeditiously by analyzing different transmitters signals during a single walk or drive through the environment. Our design can be used for both indoor and outdoor channel measurements in the frequency range of 1 MHz to 6 GHz. We expect that the proposed approach, with a few further refinements, can transform the task of propagation measurement as a routine part of day-to-day wireless network engineering.
[ { "version": "v1", "created": "Wed, 21 Nov 2012 05:32:18 GMT" } ]
2016-11-18T00:00:00
[ [ "Islam", "Muhammad Nazmul", "" ], [ "Kim", "Byoung-Jo J.", "" ], [ "Henry", "Paul", "" ], [ "Rozner", "Eric", "" ] ]
new_dataset
0.999602
1212.4626
Lior Dikstein
Lior Dikstein, Haim H. Permuter and Shlomo Shamai
MAC with Action-Dependent State Information at One Encoder
1. Parts of this paper appeared in the IEEE International Symposium on Information Theory (ISIT 2012),Cambridge, MA, US, July 2012 and at the IEEE 27th Convention of Electrical and Electronics Engineers in Israel (IEEEI 2012), Nov. 2012. 2. This work has been supported by the CORNET Consortium Israel Ministry for Industry and Commerce
null
10.1109/ISIT.2012.6283564
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Problems dealing with the ability to take an action that affects the states of state-dependent communication channels are of timely interest and importance. Therefore, we extend the study of action-dependent channels, which until now focused on point-to-point models, to multiple-access channels (MAC). In this paper, we consider a two-user, state-dependent MAC, in which one of the encoders, called the informed encoder, is allowed to take an action that affects the formation of the channel states. Two independent messages are to be sent through the channel: a common message known to both encoders and a private message known only to the informed encoder. In addition, the informed encoder has access to the sequence of channel states in a non-causal manner. Our framework generalizes previously evaluated settings of state dependent point-to-point channels with actions and MACs with common messages. We derive a single letter characterization of the capacity region for this setting. Using this general result, we obtain and compute the capacity region for the Gaussian action-dependent MAC. The unique methods used in solving the Gaussian case are then applied to obtain the capacity of the Gaussian action-dependent point-to-point channel; a problem was left open until this work. Finally, we establish some dualities between action-dependent channel coding and source coding problems. Specifically, we obtain a duality between the considered MAC setting and the rate distortion model known as "Successive Refinement with Actions". This is done by developing a set of simple duality principles that enable us to successfully evaluate the outcome of one problem given the other.
[ { "version": "v1", "created": "Wed, 19 Dec 2012 11:41:03 GMT" } ]
2016-11-18T00:00:00
[ [ "Dikstein", "Lior", "" ], [ "Permuter", "Haim H.", "" ], [ "Shamai", "Shlomo", "" ] ]
new_dataset
0.989907
1302.4201
Stefan Certic
Stefan Certic
The Future of Mobile Security
null
null
null
null
cs.CR
http://creativecommons.org/licenses/by/4.0/
Mobile devices are more than just phones, they are a lifeline to the outdoor world, entertainment platform, GPS system, a little black book and a shopping and banking tool. What is not well known is that these devices are also gateways. Mobile devices can be used by a hacker as an access point into many other aspects of your digital life as well the lives of others in your network, making mobile security about more than just protecting your phone. This is an overview of technologies supporting mobile data cryptography and two-step protection mechanisms that may be used to secure online transactions and user authentication.
[ { "version": "v1", "created": "Mon, 18 Feb 2013 09:48:05 GMT" }, { "version": "v2", "created": "Thu, 17 Nov 2016 01:49:39 GMT" } ]
2016-11-18T00:00:00
[ [ "Certic", "Stefan", "" ] ]
new_dataset
0.998324
1302.4516
Aria Nosratinia
Thuy Van Nguyen, Aria Nosratinia, and Dariush Divsalar
Bilayer Protograph Codes for Half-Duplex Relay Channels
Accepted in IEEE Trans. Wireless Comm
null
10.1109/ISIT.2010.5513451
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Despite encouraging advances in the design of relay codes, several important challenges remain. Many of the existing LDPC relay codes are tightly optimized for fixed channel conditions and not easily adapted without extensive re-optimization of the code. Some have high encoding complexity and some need long block lengths to approach capacity. This paper presents a high-performance protograph-based LDPC coding scheme for the half-duplex relay channel that addresses simultaneously several important issues: structured coding that permits easy design, low encoding complexity, embedded structure for convenient adaptation to various channel conditions, and performance close to capacity with a reasonable block length. The application of the coding structure to multi-relay networks is demonstrated. Finally, a simple new methodology for evaluating the end-to-end error performance of relay coding systems is developed and used to highlight the performance of the proposed codes.
[ { "version": "v1", "created": "Tue, 19 Feb 2013 04:54:35 GMT" } ]
2016-11-18T00:00:00
[ [ "Van Nguyen", "Thuy", "" ], [ "Nosratinia", "Aria", "" ], [ "Divsalar", "Dariush", "" ] ]
new_dataset
0.999792
1303.1201
Hien Ngo Quoc
Himal A. Suraweera, Hien Quoc Ngo, Trung Q. Duong, Chau Yuen, Erik G. Larsson
Multi-Pair Amplify-and-Forward Relaying with Very Large Antenna Arrays
IEEE International Conference on Communicatons (ICC), Budapest, Hungary, June 2013
null
10.1109/ICC.2013.6655302
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider a multi-pair relay channel where multiple sources simultaneously communicate with destinations using a relay. Each source or destination has only a single antenna, while the relay is equipped with a very large antenna array. We investigate the power efficiency of this system when maximum ratio combining/maximal ratio transmission (MRC/MRT) or zero-forcing (ZF) processing is used at the relay. Using a very large array, the transmit power of each source or relay (or both) can be made inversely proportional to the number of relay antennas while maintaining a given quality-of-service. At the same time, the achievable sum rate can be increased by a factor of the number of source-destination pairs. We show that when the number of antennas grows to infinity, the asymptotic achievable rates of MRC/MRT and ZF are the same if we scale the power at the sources. Depending on the large scale fading effect, MRC/MRT can outperform ZF or vice versa if we scale the power at the relay.
[ { "version": "v1", "created": "Tue, 5 Mar 2013 22:11:50 GMT" } ]
2016-11-18T00:00:00
[ [ "Suraweera", "Himal A.", "" ], [ "Ngo", "Hien Quoc", "" ], [ "Duong", "Trung Q.", "" ], [ "Yuen", "Chau", "" ], [ "Larsson", "Erik G.", "" ] ]
new_dataset
0.998486
1304.6690
Ove Edfors
Erik G. Larsson, Ove Edfors, Fredrik Tufvesson and Thomas L. Marzetta
Massive MIMO for Next Generation Wireless Systems
Final manuscript, to appear in IEEE Communications Magazine
IEEE Communications Magazine, Vol. 52, No. 2, pp. 186-195, Feb. 2014
10.1109/MCOM.2014.6736761
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Multi-user Multiple-Input Multiple-Output (MIMO) offers big advantages over conventional point-to-point MIMO: it works with cheap single-antenna terminals, a rich scattering environment is not required, and resource allocation is simplified because every active terminal utilizes all of the time-frequency bins. However, multi-user MIMO, as originally envisioned with roughly equal numbers of service-antennas and terminals and frequency division duplex operation, is not a scalable technology. Massive MIMO (also known as "Large-Scale Antenna Systems", "Very Large MIMO", "Hyper MIMO", "Full-Dimension MIMO" & "ARGOS") makes a clean break with current practice through the use of a large excess of service-antennas over active terminals and time division duplex operation. Extra antennas help by focusing energy into ever-smaller regions of space to bring huge improvements in throughput and radiated energy efficiency. Other benefits of massive MIMO include the extensive use of inexpensive low-power components, reduced latency, simplification of the media access control (MAC) layer, and robustness to intentional jamming. The anticipated throughput depend on the propagation environment providing asymptotically orthogonal channels to the terminals, but so far experiments have not disclosed any limitations in this regard. While massive MIMO renders many traditional research problems irrelevant, it uncovers entirely new problems that urgently need attention: the challenge of making many low-cost low-precision components that work effectively together, acquisition and synchronization for newly-joined terminals, the exploitation of extra degrees of freedom provided by the excess of service-antennas, reducing internal power consumption to achieve total energy efficiency reductions, and finding new deployment scenarios. This paper presents an overview of the massive MIMO concept and contemporary research.
[ { "version": "v1", "created": "Wed, 24 Apr 2013 18:25:56 GMT" }, { "version": "v2", "created": "Mon, 20 May 2013 20:22:58 GMT" }, { "version": "v3", "created": "Tue, 21 Jan 2014 21:09:46 GMT" } ]
2016-11-18T00:00:00
[ [ "Larsson", "Erik G.", "" ], [ "Edfors", "Ove", "" ], [ "Tufvesson", "Fredrik", "" ], [ "Marzetta", "Thomas L.", "" ] ]
new_dataset
0.983886
1305.0585
Changhong Zhao
Changhong Zhao, Ufuk Topcu, Na Li and Steven Low
Design and Stability of Load-Side Primary Frequency Control in Power Systems
14 pages, 13 figures. To appear in IEEE Transactions on Automatic Control
null
10.1109/TAC.2014.2298140
null
cs.SY math.OC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a systematic method to design ubiquitous continuous fast-acting distributed load control for primary frequency regulation in power networks, by formulating an optimal load control (OLC) problem where the objective is to minimize the aggregate cost of tracking an operating point subject to power balance over the network. We prove that the swing dynamics and the branch power flows, coupled with frequency-based load control, serve as a distributed primal-dual algorithm to solve OLC. We establish the global asymptotic stability of a multimachine network under such type of load-side primary frequency control. These results imply that the local frequency deviations at each bus convey exactly the right information about the global power imbalance for the loads to make individual decisions that turn out to be globally optimal. Simulations confirm that the proposed algorithm can rebalance power and resynchronize bus frequencies after a disturbance with significantly improved transient performance.
[ { "version": "v1", "created": "Thu, 2 May 2013 21:53:17 GMT" }, { "version": "v2", "created": "Mon, 2 Dec 2013 08:46:29 GMT" }, { "version": "v3", "created": "Wed, 4 Dec 2013 21:03:57 GMT" } ]
2016-11-18T00:00:00
[ [ "Zhao", "Changhong", "" ], [ "Topcu", "Ufuk", "" ], [ "Li", "Na", "" ], [ "Low", "Steven", "" ] ]
new_dataset
0.953025
1308.0037
Ryan Williams
Ryan K. Williams, Andrea Gasparri, and Bhaskar Krishnamachari
Route Swarm: Wireless Network Optimization through Mobility
9 pages, 4 figures, submitted to the IEEE International Conference on Intelligent Robots and Systems (IROS) 2014
null
10.1109/IROS.2014.6943092
null
cs.SY cs.MA cs.NI cs.RO math.OC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we demonstrate a novel hybrid architecture for coordinating networked robots in sensing and information routing applications. The proposed INformation and Sensing driven PhysIcally REconfigurable robotic network (INSPIRE), consists of a Physical Control Plane (PCP) which commands agent position, and an Information Control Plane (ICP) which regulates information flow towards communication/sensing objectives. We describe an instantiation where a mobile robotic network is dynamically reconfigured to ensure high quality routes between static wireless nodes, which act as source/destination pairs for information flow. The ICP commands the robots towards evenly distributed inter-flow allocations, with intra-flow configurations that maximize route quality. The PCP then guides the robots via potential-based control to reconfigure according to ICP commands. This formulation, deemed Route Swarm, decouples information flow and physical control, generating a feedback between routing and sensing needs and robotic configuration. We demonstrate our propositions through simulation under a realistic wireless network regime.
[ { "version": "v1", "created": "Wed, 31 Jul 2013 20:47:14 GMT" }, { "version": "v2", "created": "Tue, 3 Sep 2013 21:16:47 GMT" }, { "version": "v3", "created": "Fri, 7 Feb 2014 02:24:13 GMT" } ]
2016-11-18T00:00:00
[ [ "Williams", "Ryan K.", "" ], [ "Gasparri", "Andrea", "" ], [ "Krishnamachari", "Bhaskar", "" ] ]
new_dataset
0.999064
1309.3841
Srinjoy Ganguly Mr.
Arpita Chakraborty, Srinjoy Ganguly, Mrinal Kanti Naskar and Anupam Karmakar
A Trust Based Fuzzy Algorithm for Congestion Control in Wireless Multimedia Sensor Networks (TFCC)
6 pages, 5 figures, conference paper
Procs. of the IEEE 2013 International Conference on Informatics, Electronics and Vision (ICIEV 2013), pp.XX-XX, Dhaka, Bangladesh, May 17-18, (2013)
10.1109/ICIEV.2013.6572553
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Network congestion has become a critical issue for resource constrained Wireless Sensor Networks (WSNs), especially for Wireless Multimedia Sensor Networks (WMSNs)where large volume of multimedia data is transmitted through the network. If the traffic load is greater than the available capacity of the sensor network, congestion occurs and it causes buffer overflow, packet drop, deterioration of network throughput and quality of service (QoS). Again, the faulty nodes of the network also aggravate congestion by diffusing useless packets or retransmitting the same packet several times. This results in the wastage of energy and decrease in network lifetime. To address this challenge, a new congestion control algorithm is proposed in which the faulty nodes are identified and blocked from data communication by using the concept of trust. The trust metric of all the nodes in the WMSN is derived by using a two-stage Fuzzy inferencing scheme. The traffic flow from source to sink is optimized by implementing the Link State Routing Protocol. The congestion of the sensor nodes is controlled by regulating the rate of traffic flow on the basis of the priority of the traffic. Finally we compare our protocol with other existing congestion control protocols to show the merit of the work.
[ { "version": "v1", "created": "Mon, 16 Sep 2013 07:42:02 GMT" }, { "version": "v2", "created": "Fri, 15 Nov 2013 23:12:25 GMT" } ]
2016-11-18T00:00:00
[ [ "Chakraborty", "Arpita", "" ], [ "Ganguly", "Srinjoy", "" ], [ "Naskar", "Mrinal Kanti", "" ], [ "Karmakar", "Anupam", "" ] ]
new_dataset
0.96547
1309.4026
Zohaib Awan Mr
Abdellatif Zaidi, Zohaib Hassan Awan, Shlomo Shamai (Shitz), and Luc Vandendorpe
Secure Degrees of Freedom of MIMO X-Channels with Output Feedback and Delayed CSIT
To Appear in IEEE Transactions on Information Forensics and Security
null
10.1109/TIFS.2013.2278936
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We investigate the problem of secure transmission over a two-user multi-input multi-output (MIMO) X-channel in which channel state information is provided with one-unit delay to both transmitters (CSIT), and each receiver feeds back its channel output to a different transmitter. We refer to this model as MIMO X-channel with asymmetric output feedback and delayed CSIT. The transmitters are equipped with M-antennas each, and the receivers are equipped with N-antennas each. For this model, accounting for both messages at each receiver, we characterize the optimal sum secure degrees of freedom (SDoF) region. We show that, in presence of asymmetric output feedback and delayed CSIT, the sum SDoF region of the MIMO X-channel is same as the SDoF region of a two-user MIMO BC with 2M-antennas at the transmitter, N-antennas at each receiver and delayed CSIT. This result shows that, upon availability of asymmetric output feedback and delayed CSIT, there is no performance loss in terms of sum SDoF due to the distributed nature of the transmitters. Next, we show that this result also holds if only output feedback is conveyed to the transmitters, but in a symmetric manner, i.e., each receiver feeds back its output to both transmitters and no CSIT. We also study the case in which only asymmetric output feedback is provided to the transmitters, i.e., without CSIT, and derive a lower bound on the sum SDoF for this model. Furthermore, we specialize our results to the case in which there are no security constraints. In particular, similar to the setting with security constraints, we show that the optimal sum DoF region of the (M,M,N,N)--MIMO X-channel with asymmetric output feedback and delayed CSIT is same as the DoF region of a two-user MIMO BC with 2M-antennas at the transmitter, N-antennas at each receiver, and delayed CSIT. We illustrate our results with some numerical examples.
[ { "version": "v1", "created": "Mon, 16 Sep 2013 16:37:25 GMT" } ]
2016-11-18T00:00:00
[ [ "Zaidi", "Abdellatif", "", "Shitz" ], [ "Awan", "Zohaib Hassan", "", "Shitz" ], [ "Shamai", "Shlomo", "", "Shitz" ], [ "Vandendorpe", "Luc", "" ] ]
new_dataset
0.986475
1309.7163
Dipankar Saha
Dipankar Saha, Subhramita Basak, Sagar Mukherjee, C. K. Sarkar
A Low-Voltage, Low-Power 4-bit BCD Adder, designed using the Clock Gated Power Gating, and the DVT Scheme
To appear in the proceedings of 2013 IEEE International Conference on Signal Processing, Computing and Control (ISPCC,13)
null
10.1109/ISPCC.2013.6663444
null
cs.AR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper proposes a Low-Power, Energy Efficient 4-bit Binary Coded Decimal (BCD) adder design where the conventional 4-bit BCD adder has been modified with the Clock Gated Power Gating Technique. Moreover, the concept of DVT (Dual-vth) scheme has been introduced while designing the full adder blocks to reduce the Leakage Power, as well as, to maintain the overall performance of the entire circuit. The reported architecture of 4-bit BCD adder is designed using 45 nm technology and it consumes 1.384 {\mu}Watt of Average Power while operating with a frequency of 200 MHz, and a Supply Voltage (Vdd) of 1 Volt. The results obtained from different simulation runs on SPICE, indicate the superiority of the proposed design compared to the conventional 4-bit BCD adder. Considering the product of Average Power and Delay, for the operating frequency of 200 MHz, a fair 47.41 % reduction compared to the conventional design has been achieved with this proposed scheme.
[ { "version": "v1", "created": "Fri, 27 Sep 2013 09:09:37 GMT" } ]
2016-11-18T00:00:00
[ [ "Saha", "Dipankar", "" ], [ "Basak", "Subhramita", "" ], [ "Mukherjee", "Sagar", "" ], [ "Sarkar", "C. K.", "" ] ]
new_dataset
0.986289
1401.2952
Dawei Ying
Dawei Ying, Frederick W. Vook, Timothy A. Thomas, David J. Love and Amitava Ghosh
Kronecker Product Correlation Model and Limited Feedback Codebook Design in a 3D Channel Model
6 pages, 5 figures, to appear at IEEE ICC 2014
null
10.1109/ICC.2014.6884258
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A 2D antenna array introduces a new level of control and additional degrees of freedom in multiple-input-multiple-output (MIMO) systems particularly for the so-called "massive MIMO" systems. To accurately assess the performance gains of these large arrays, existing azimuth-only channel models have been extended to handle 3D channels by modeling both the elevation and azimuth dimensions. In this paper, we study the channel correlation matrix of a generic ray-based 3D channel model, and our analysis and simulation results demonstrate that the 3D correlation matrix can be well approximated by a Kronecker production of azimuth and elevation correlations. This finding lays the theoretical support for the usage of a product codebook for reduced complexity feedback from the receiver to the transmitter. We also present the design of a product codebook based on Grassmannian line packing.
[ { "version": "v1", "created": "Mon, 13 Jan 2014 19:02:23 GMT" } ]
2016-11-18T00:00:00
[ [ "Ying", "Dawei", "" ], [ "Vook", "Frederick W.", "" ], [ "Thomas", "Timothy A.", "" ], [ "Love", "David J.", "" ], [ "Ghosh", "Amitava", "" ] ]
new_dataset
0.992909
1401.3674
Zhili Guo
Zhili Guo, Yao Wang, Elza Erkip, Shivendra Panwar
Wireless Video Multicast with Cooperative and Incremental Transmission of Parity Packets
11 pages in double-column IEEE journal style. Submitted to IEEE JOURNAL OF SELECTED TOPICS IN SIGNAL PROCESSING
null
10.1109/TMM.2015.2438718
null
cs.MM cs.IT cs.NI math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, a cooperative multicast scheme that uses Randomized Distributed Space Time Codes (R-DSTC), along with packet level Forward Error Correction (FEC), is studied. Instead of sending source packets and/or parity packets through two hops using R-DSTC as proposed in our prior work, the new scheme delivers both source packets and parity packets using only one hop. After the source station (access point, AP) first sends all the source packets, the AP as well as all nodes that have received all source packets together send the parity packets using R-DSTC. As more parity packets are transmitted, more nodes can recover all source packets and join the parity packet transmission. The process continues until all nodes acknowledge the receipt of enough packets for recovering the source packets. For each given node distribution, the optimum transmission rates for source and parity packets are determined such that the video rate that can be sustained at all nodes is maximized. This new scheme can support significantly higher video rates, and correspondingly higher PSNR of decoded video, than the prior approaches. Three suboptimal approaches, which do not require full information about user distribution or the feedback, and hence are more feasible in practice are also presented. The proposed suboptimal scheme with only the node count information and without feedback still outperforms our prior approach that assumes full channel information and no feedback.
[ { "version": "v1", "created": "Wed, 15 Jan 2014 17:08:41 GMT" } ]
2016-11-18T00:00:00
[ [ "Guo", "Zhili", "" ], [ "Wang", "Yao", "" ], [ "Erkip", "Elza", "" ], [ "Panwar", "Shivendra", "" ] ]
new_dataset
0.994843
1402.7292
Mohammed ElBamby
Mohammed S. ElBamby, Mehdi Bennis, Walid Saad, Matti Latva-aho
Dynamic Uplink-Downlink Optimization in TDD-based Small Cell Networks
In the IEEE 11th International Symposium on Wireless Communication Systems (ISWCS) 2014
null
10.1109/ISWCS.2014.6933488
null
cs.NI cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Dynamic Time-division duplex (TDD) can provide efficient and flexible splitting of the common wireless cellular resources between uplink (UL) and downlink (DL) users. In this paper, the UL/DL optimization problem is formulated as a noncooperative game among the small cell base stations (SCBSs) in which each base station aims at minimizing its total UL and DL flow delays. To solve this game, a self-organizing UL/DL resource configuration scheme for TDD-based small cell networks is proposed. Using the proposed scheme, an SCBS is able to estimate and learn the UL and DL loads autonomously while optimizing its UL/DL configuration accordingly. Simulations results show that the proposed algorithm achieves significant gains in terms of packet throughput in case of asymmetric UL and DL traffic loads. This gain increases as the traffic asymmetry increases, reaching up to 97% and 200% gains relative to random and fixed duplexing schemes respectively. Our results also show that the proposed algorithm is well- adapted to dynamic traffic conditions and different network sizes, and operates efficiently in case of severe cross-link interference in which neighboring cells transmit in opposite directions.
[ { "version": "v1", "created": "Fri, 28 Feb 2014 16:02:12 GMT" }, { "version": "v2", "created": "Thu, 11 Sep 2014 12:05:05 GMT" } ]
2016-11-18T00:00:00
[ [ "ElBamby", "Mohammed S.", "" ], [ "Bennis", "Mehdi", "" ], [ "Saad", "Walid", "" ], [ "Latva-aho", "Matti", "" ] ]
new_dataset
0.968302
1404.1622
Ruizhi Liao
Ruizhi Liao, Boris Bellalta, Miquel Oliver, Zhisheng Niu
MU-MIMO MAC Protocols for Wireless Local Area Networks: A Survey
Accepted by IEEE Communications Surveys and Tutorials, 40 pages, 12 figures
null
10.1109/COMST.2014.2377373
null
cs.NI
http://creativecommons.org/licenses/by/3.0/
As wireless devices boom, and bandwidth-hungry applications (e.g., video and cloud uploading) get popular, today's Wireless Local Area Networks (WLANs) become not only crowded but also stressed at throughput. Multi-user Multiple-Input and Multiple-Output (MU-MIMO), an advanced form of MIMO, has gained attention due to its huge potential in improving the performance of WLANs. This paper surveys random access based MAC protocols for MU-MIMO enabled WLANs. It first provides background information about the evolution and the fundamental MAC schemes of IEEE 802.11 Standards and Amendments, and then identifies the key requirements of designing MU-MIMO MAC protocols for WLANs. After that, the most representative MU-MIMO MAC proposals in the literature are overviewed by benchmarking their MAC procedures and examining the key components, such as the channel state information acquisition, de/pre-coding and scheduling schemes. Classifications and discussions on important findings of the surveyed MAC protocols are provided, based on which, the research challenges for designing effective MU-MIMO MAC protocols, as well as the envisaged MAC's role in the future heterogeneous networks, are highlighted.
[ { "version": "v1", "created": "Sun, 6 Apr 2014 21:06:07 GMT" }, { "version": "v2", "created": "Fri, 28 Nov 2014 15:59:05 GMT" } ]
2016-11-18T00:00:00
[ [ "Liao", "Ruizhi", "" ], [ "Bellalta", "Boris", "" ], [ "Oliver", "Miquel", "" ], [ "Niu", "Zhisheng", "" ] ]
new_dataset
0.973993
1404.5605
Hosein Nikopour
Hosein Nikopour, Eric Yi, Alireza Bayesteh, Kelvin Au, Mark Hawryluck, Hadi Baligh, Jianglei Ma
SCMA for Downlink Multiple Access of 5G Wireless Networks
Submitted to IEEE Globecom 2014
null
10.1109/GLOCOM.2014.7037423
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Sparse code multiple access (SCMA) is a new frequency domain non-orthogonal multiple-access technique which can improve spectral efficiency of wireless radio access. With SCMA, different incoming data streams are directly mapped to codewords of different multi-dimensional cookbooks, where each codeword represents a spread transmission layer. Multiple SCMA layers share the same time-frequency resources of OFDMA. The sparsity of codewords makes the near-optimal detection feasible through iterative message passing algorithm (MPA). Such low complexity of multi-layer detection allows excessive codeword overloading in which the dimension of multiplexed layers exceeds the dimension of codewords. Optimization of overloading factor along with modulation-coding levels of layers provides a more flexible and efficient link-adaptation mechanism. On the other hand, the signal spreading feature of SCMA can improve link-adaptation as a result of less colored interference. In this paper a technique is developed to enable multi-user SCMA (MU-SCMA) for downlink wireless access. User pairing, power sharing, rate adjustment, and scheduling algorithms are designed to improve the downlink throughput of a heavily loaded network. The advantage of SCMA spreading for lightly loaded networks is also evaluated.
[ { "version": "v1", "created": "Tue, 22 Apr 2014 19:43:27 GMT" } ]
2016-11-18T00:00:00
[ [ "Nikopour", "Hosein", "" ], [ "Yi", "Eric", "" ], [ "Bayesteh", "Alireza", "" ], [ "Au", "Kelvin", "" ], [ "Hawryluck", "Mark", "" ], [ "Baligh", "Hadi", "" ], [ "Ma", "Jianglei", "" ] ]
new_dataset
0.971068
1405.4819
Jun Lin
Jun Lin, Chenrong Xiong and Zhiyuan Yan
A Reduced Latency List Decoding Algorithm for Polar Codes
7 pages, accepted by 2014 IEEE International Workshop on Signal Processing Systems (SiPS)
null
10.1109/SiPS.2014.6986062
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Long polar codes can achieve the capacity of arbitrary binary-input discrete memoryless channels under a low complexity successive cancelation (SC) decoding algorithm. But for polar codes with short and moderate code length, the decoding performance of the SC decoding algorithm is inferior. The cyclic redundancy check (CRC) aided successive cancelation list (SCL) decoding algorithm has better error performance than the SC decoding algorithm for short or moderate polar codes. However, the CRC aided SCL (CA-SCL) decoding algorithm still suffer from long decoding latency. In this paper, a reduced latency list decoding (RLLD) algorithm for polar codes is proposed. For the proposed RLLD algorithm, all rate-0 nodes and part of rate-1 nodes are decoded instantly without traversing the corresponding subtree. A list maximum-likelihood decoding (LMLD) algorithm is proposed to decode the maximum likelihood (ML) nodes and the remaining rate-1 nodes. Moreover, a simplified LMLD (SLMLD) algorithm is also proposed to reduce the computational complexity of the LMLD algorithm. Suppose a partial parallel list decoder architecture with list size $L=4$ is used, for an (8192, 4096) polar code, the proposed RLLD algorithm can reduce the number of decoding clock cycles and decoding latency by 6.97 and 6.77 times, respectively.
[ { "version": "v1", "created": "Mon, 19 May 2014 17:59:20 GMT" }, { "version": "v2", "created": "Mon, 13 Oct 2014 14:34:18 GMT" } ]
2016-11-18T00:00:00
[ [ "Lin", "Jun", "" ], [ "Xiong", "Chenrong", "" ], [ "Yan", "Zhiyuan", "" ] ]
new_dataset
0.984696
1406.4399
Stefano Rosati
S. Rosati, K. Kruzelecki, G. Heitz, D. Floreano, and B. Rimoldi
Dynamic Routing for Flying Ad Hoc Networks
Submitted to the IEEE Transactions on Vehicular Technology
null
10.1109/TVT.2015.2414819
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper reports experimental results on self-organizing wireless networks carried by small flying robots. Flying ad hoc networks (FANETs) composed of small unmanned aerial vehicles (UAVs) are flexible, inexpensive and fast to deploy. This makes them a very attractive technology for many civilian and military applications. Due to the high mobility of the nodes, maintaining a communication link between the UAVs is a challenging task. The topology of these networks is more dynamic than that of typical mobile ad hoc networks (MANETs) and of typical vehicle ad hoc networks (VANETs). As a consequence, the existing routing protocols designed for MANETs partly fail in tracking network topology changes. In this work, we compare two different routing algorithms for ad hoc networks: optimized link-state routing (OLSR), and predictive-OLSR (P-OLSR). The latter is an OLSR extension that we designed for FANETs; it takes advantage of the GPS information available on board. To the best of our knowledge, P-OLSR is currently the only FANET-specific routing technique that has an available Linux implementation. We present results obtained by both Media Access Control (MAC) layer emulations and real-world experiments. In the experiments, we used a testbed composed of two autonomous fixed-wing UAVs and a node on the ground. Our experiments evaluate the link performance and the communication range, as well as the routing performance. Our emulation and experimental results show that P-OLSR significantly outperforms OLSR in routing in the presence of frequent network topology changes.
[ { "version": "v1", "created": "Tue, 17 Jun 2014 15:15:18 GMT" }, { "version": "v2", "created": "Tue, 4 Nov 2014 10:53:48 GMT" }, { "version": "v3", "created": "Wed, 18 Mar 2015 13:40:03 GMT" } ]
2016-11-18T00:00:00
[ [ "Rosati", "S.", "" ], [ "Kruzelecki", "K.", "" ], [ "Heitz", "G.", "" ], [ "Floreano", "D.", "" ], [ "Rimoldi", "B.", "" ] ]
new_dataset
0.994594
1407.3435
Yun Liao
Yun Liao, Tianyu Wang, Lingyang Song, and Zhu Han
Listen-and-Talk: Full-duplex Cognitive Radio Networks
in proceeding of IEEE Globecom 2014
null
10.1109/GLOCOM.2014.7037276
null
cs.NI cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In traditional cognitive radio networks, secondary users (SUs) typically access the spectrum of primary users (PUs) by a two-stage "listen-before-talk" (LBT) protocol, i.e., SUs sense the spectrum holes in the first stage before transmit in the second stage. In this paper, we propose a novel "listen-and-talk" (LAT) protocol with the help of the full-duplex (FD) technique that allows SUs to simultaneously sense and access the vacant spectrum. Analysis of sensing performance and SU's throughput are given for the proposed LAT protocol. And we find that due to self-interference caused by FD, increasing transmitting power of SUs does not always benefit to SU's throughput, which implies the existence of a power-throughput tradeoff. Besides, though the LAT protocol suffers from self-interference, it allows longer transmission time, while the performance of the traditional LBT protocol is limited by channel spatial correction and relatively shorter transmission period. To this end, we also present an adaptive scheme to improve SUs' throughput by switching between the LAT and LBT protocols. Numerical results are provided to verify the proposed methods and the theoretical results.
[ { "version": "v1", "created": "Sun, 13 Jul 2014 06:00:36 GMT" } ]
2016-11-18T00:00:00
[ [ "Liao", "Yun", "" ], [ "Wang", "Tianyu", "" ], [ "Song", "Lingyang", "" ], [ "Han", "Zhu", "" ] ]
new_dataset
0.960931
1407.4515
M. Reza Khanzadi
M. Reza Khanzadi, Rajet Krishnan, Dan Kuylenstierna, and Thomas Eriksson
Oscillator Phase Noise and Small-Scale Channel Fading in Higher Frequency Bands
IEEE Global Telecommun. Conf. (GLOBECOM), Austin, TX, Dec. 2014
null
10.1109/GLOCOMW.2014.7063466
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper investigates the effect of oscillator phase noise and channel variations due to fading on the performance of communication systems at frequency bands higher than 10GHz. Phase noise and channel models are reviewed and technology-dependent bounds on the phase noise quality of radio oscillators are presented. Our study shows that, in general, both channel variations and phase noise can have severe effects on the system performance at high frequencies. Importantly, their relative severity depends on the application scenario and system parameters such as center frequency and bandwidth. Channel variations are seen to be more severe than phase noise when the relative velocity between the transmitter and receiver is high. On the other hand, performance degradation due to phase noise can be more severe when the center frequency is increased and the bandwidth is kept a constant, or when oscillators based on low power CMOS technology are used, as opposed to high power GaN HEMT based oscillators.
[ { "version": "v1", "created": "Wed, 16 Jul 2014 22:25:49 GMT" }, { "version": "v2", "created": "Thu, 25 Sep 2014 07:18:20 GMT" } ]
2016-11-18T00:00:00
[ [ "Khanzadi", "M. Reza", "" ], [ "Krishnan", "Rajet", "" ], [ "Kuylenstierna", "Dan", "" ], [ "Eriksson", "Thomas", "" ] ]
new_dataset
0.997551
1407.5711
Zhengdao Wang
Ronggui Xie, Huarui Yin, Zhengdao Wang, and Xiaohui Chen
A Novel Uplink Data Transmission Scheme For Small Packets In Massive MIMO System
IEEE/CIC ICCC 2014 Symposium on Signal Processing for Communications
null
10.1109/ICCChina.2014.7008305
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Intelligent terminals often produce a large number of data packets of small lengths. For these packets, it is inefficient to follow the conventional medium access control (MAC) protocols because they lead to poor utilization of service resources. We propose a novel multiple access scheme that targets massive multiple-input multiple-output (MIMO) systems based on compressive sensing (CS). We employ block precoding in the time domain to enable the simultaneous transmissions of many users, which could be even more than the number of receive antennas at the base station. We develop a block-sparse system model and adopt the block orthogonal matching pursuit (BOMP) algorithm to recover the transmitted signals. Conditions for data recovery guarantees are identified and numerical results demonstrate that our scheme is efficient for uplink small packet transmission.
[ { "version": "v1", "created": "Tue, 22 Jul 2014 02:13:37 GMT" }, { "version": "v2", "created": "Wed, 3 Sep 2014 00:10:11 GMT" } ]
2016-11-18T00:00:00
[ [ "Xie", "Ronggui", "" ], [ "Yin", "Huarui", "" ], [ "Wang", "Zhengdao", "" ], [ "Chen", "Xiaohui", "" ] ]
new_dataset
0.992215
1408.3653
Hosein Nikopour
Mahmoud Taherzadeh, Hosein Nikopour, Alireza Bayesteh, and Hadi Baligh
SCMA Codebook Design
Accepted for IEEE VTC-fall 2014
null
10.1109/VTCFall.2014.6966170
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Multicarrier CDMA is a multiple access scheme in which modulated QAM symbols are spread over OFDMA tones by using a generally complex spreading sequence. Effectively, a QAM symbol is repeated over multiple tones. Low density signature (LDS) is a version of CDMA with low density spreading sequences allowing us to take advantage of a near optimal message passing algorithm (MPA) receiver with practically feasible complexity. Sparse code multiple access (SCMA) is a multi-dimensional codebook-based non-orthogonal spreading technique. In SCMA, the procedure of bit to QAM symbol mapping and spreading are combined together and incoming bits are directly mapped to multi-dimensional codewords of SCMA codebook sets. Each layer has its dedicated codebook. Shaping gain of a multi-dimensional constellation is one of the main sources of the performance improvement in comparison to the simple repetition of QAM symbols in LDS. Meanwhile, like LDS, SCMA enjoys the low complexity reception techniques due to the sparsity of SCMA codewords. In this paper a systematic approach is proposed to design SCMA codebooks mainly based on the design principles of lattice constellations. Simulation results are presented to show the performance gain of SCMA compared to LDS and OFDMA.
[ { "version": "v1", "created": "Fri, 15 Aug 2014 21:08:47 GMT" } ]
2016-11-18T00:00:00
[ [ "Taherzadeh", "Mahmoud", "" ], [ "Nikopour", "Hosein", "" ], [ "Bayesteh", "Alireza", "" ], [ "Baligh", "Hadi", "" ] ]
new_dataset
0.999771
1409.5532
Minho Yang
Minho Yang, Sang-Woon Jeon, Dong Ku Kim
Linear Degrees of Freedom of MIMO Broadcast Channels with Reconfigurable Antennas in the Absence of CSIT
25 pages, 7 figures, submitted to IEEE Transactions on Information Theory
null
10.1109/TIT.2016.2623792
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The K-user multiple-input and multiple-output (MIMO) broadcast channel (BC) with no channel state information at the transmitter (CSIT) is considered, where each receiver is assumed to be equipped with reconfigurable antennas capable of choosing a subset of receiving modes from several preset modes. Under general antenna configurations, the sum linear degrees of freedom (LDoF) of the K-user MIMO BC with reconfigurable antennas is completely characterized, which corresponds to the maximum sum DoF achievable by linear coding strategies. The LDoF region is further characterized for a class of antenna configurations. Similar analysis is extended to the K-user MIMO interference channels with reconfigurable antennas and the sum LDoF is characterized for a class of antenna configurations.
[ { "version": "v1", "created": "Fri, 19 Sep 2014 06:58:38 GMT" } ]
2016-11-18T00:00:00
[ [ "Yang", "Minho", "" ], [ "Jeon", "Sang-Woon", "" ], [ "Kim", "Dong Ku", "" ] ]
new_dataset
0.999209
1412.4840
Constantinos Daskalakis
Constantinos Daskalakis, Qinxuan Pan
A Counter-Example to Karlin's Strong Conjecture for Fictitious Play
55th IEEE Symposium on Foundations of Computer Science
null
10.1109/FOCS.2014.10
null
cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Fictitious play is a natural dynamic for equilibrium play in zero-sum games, proposed by [Brown 1949], and shown to converge by [Robinson 1951]. Samuel Karlin conjectured in 1959 that fictitious play converges at rate $O(1/\sqrt{t})$ with the number of steps $t$. We disprove this conjecture showing that, when the payoff matrix of the row player is the $n \times n$ identity matrix, fictitious play may converge with rate as slow as $\Omega(t^{-1/n})$.
[ { "version": "v1", "created": "Tue, 16 Dec 2014 00:24:25 GMT" }, { "version": "v2", "created": "Thu, 18 Dec 2014 03:50:16 GMT" } ]
2016-11-18T00:00:00
[ [ "Daskalakis", "Constantinos", "" ], [ "Pan", "Qinxuan", "" ] ]
new_dataset
0.989755
1412.6464
Christian Napoli
Christian Napoli, Giuseppe Pappalardo, Emiliano Tramontana, Zbigniew Marsza{\l}ek, Dawid Po{\l}ap and Marcin Wo\'zniak
Simplified firefly algorithm for 2D image key-points search
Published version on: 2014 IEEE Symposium on Computational Intelligence for Human-like Intelligence
IEEE Symposium on Computational Intelligence for Human-like Intelligence, pp. 118-125, 2014
10.1109/CIHLI.2014.7013395
null
cs.NE cs.AI cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In order to identify an object, human eyes firstly search the field of view for points or areas which have particular properties. These properties are used to recognise an image or an object. Then this process could be taken as a model to develop computer algorithms for images identification. This paper proposes the idea of applying the simplified firefly algorithm to search for key-areas in 2D images. For a set of input test images the proposed version of firefly algorithm has been examined. Research results are presented and discussed to show the efficiency of this evolutionary computation method.
[ { "version": "v1", "created": "Fri, 19 Dec 2014 18:00:11 GMT" } ]
2016-11-18T00:00:00
[ [ "Napoli", "Christian", "" ], [ "Pappalardo", "Giuseppe", "" ], [ "Tramontana", "Emiliano", "" ], [ "Marszałek", "Zbigniew", "" ], [ "Połap", "Dawid", "" ], [ "Woźniak", "Marcin", "" ] ]
new_dataset
0.961843
1501.01496
Boris Bellalta Dr.
Boris Bellalta
IEEE 802.11ax: High-Efficiency WLANs
in IEEE Wireless Communications Magazine, 2015
null
10.1109/MWC.2016.7422404
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
IEEE 802.11ax-2019 will replace both IEEE 802.11n-2009 and IEEE 802.11ac-2013 as the next high-throughput Wireless Local Area Network (WLAN) amendment. In this paper, we review the expected future WLAN scenarios and use-cases that justify the push for a new PHY/MAC IEEE 802.11 amendment. After that, we overview a set of new technical features that may be included in the IEEE 802.11ax-2019 amendment and describe both their advantages and drawbacks. Finally, we discuss some of the network-level functionalities that are required to fully improve the user experience in next-generation WLANs and note their relation with other on-going IEEE 802.11 amendments.
[ { "version": "v1", "created": "Wed, 7 Jan 2015 13:58:39 GMT" }, { "version": "v2", "created": "Thu, 8 Jan 2015 08:38:00 GMT" }, { "version": "v3", "created": "Fri, 15 May 2015 17:42:19 GMT" }, { "version": "v4", "created": "Tue, 28 Jul 2015 15:48:10 GMT" } ]
2016-11-18T00:00:00
[ [ "Bellalta", "Boris", "" ] ]
new_dataset
0.998529
1502.03038
Heba Aly
Heba Aly, Anas Basalamah, Moustafa Youssef
LaneQuest: An Accurate and Energy-Efficient Lane Detection System
Accepted for publication in the 13th IEEE International Conference on Pervasive Computing and Communications (IEEE PerCom 2015)
null
10.1109/PERCOM.2015.7146523
null
cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Current outdoor localization techniques fail to provide the required accuracy for estimating the car's lane. In this paper, we present LaneQuest: a system that leverages the ubiquitous and low-energy inertial sensors available in commodity smart-phones to provide an accurate estimate of the car's current lane. LaneQuest leverages hints from the phone sensors about the surrounding environment to detect the car's lane. For example, a car making a right turn most probably will be in the right-most lane, a car passing by a pothole will be in a specific lane, and the car's angular velocity when driving through a curve reflects its lane. Our investigation shows that there are amble opportunities in the environment, i.e. lane "anchors", that provide cues about the car's lane. To handle the ambiguous location, sensors noise, and fuzzy lane anchors; LaneQuest employs a novel probabilistic lane estimation algorithm. Furthermore, it uses an unsupervised crowd-sourcing approach to learn the position and lane-span distribution of the different lane-level anchors. Our evaluation results from implementation on different android devices and 260Km driving traces by 13 drivers in different cities shows that LaneQuest can detect the different lane-level anchors with an average precision and recall of more than 90%. This leads to an accurate detection of the exact car's lane position 80% of the time, increasing to 89% of the time to within one lane. This comes with a low-energy footprint, allowing LaneQuest to be implemented on the energy-constrained mobile devices.
[ { "version": "v1", "created": "Tue, 10 Feb 2015 18:53:19 GMT" } ]
2016-11-18T00:00:00
[ [ "Aly", "Heba", "" ], [ "Basalamah", "Anas", "" ], [ "Youssef", "Moustafa", "" ] ]
new_dataset
0.991729
1503.06959
Luca Baroffio
Luca Baroffio, Matteo Cesana, Alessandro Redondi, Marco Tagliasacchi
Fast keypoint detection in video sequences
submitted to IEEE International Conference on Image Processing 2015
null
10.1109/ICASSP.2016.7471895
null
cs.CV cs.MM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A number of computer vision tasks exploit a succinct representation of the visual content in the form of sets of local features. Given an input image, feature extraction algorithms identify a set of keypoints and assign to each of them a description vector, based on the characteristics of the visual content surrounding the interest point. Several tasks might require local features to be extracted from a video sequence, on a frame-by-frame basis. Although temporal downsampling has been proven to be an effective solution for mobile augmented reality and visual search, high temporal resolution is a key requirement for time-critical applications such as object tracking, event recognition, pedestrian detection, surveillance. In recent years, more and more computationally efficient visual feature detectors and decriptors have been proposed. Nonetheless, such approaches are tailored to still images. In this paper we propose a fast keypoint detection algorithm for video sequences, that exploits the temporal coherence of the sequence of keypoints. According to the proposed method, each frame is preprocessed so as to identify the parts of the input frame for which keypoint detection and description need to be performed. Our experiments show that it is possible to achieve a reduction in computational time of up to 40%, without significantly affecting the task accuracy.
[ { "version": "v1", "created": "Tue, 24 Mar 2015 09:28:28 GMT" } ]
2016-11-18T00:00:00
[ [ "Baroffio", "Luca", "" ], [ "Cesana", "Matteo", "" ], [ "Redondi", "Alessandro", "" ], [ "Tagliasacchi", "Marco", "" ] ]
new_dataset
0.950323
1504.00082
Behzad Asadi
Behzad Asadi, Lawrence Ong, and Sarah J. Johnson
A Unified Scheme for Two-Receiver Broadcast Channels with Receiver Message Side Information
accepted and to be presented at the 2015 IEEE International Symposium on Information Theory (ISIT 2015)
null
10.1109/ISIT.2015.7282482
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper investigates the capacity regions of two-receiver broadcast channels where each receiver (i) has both common and private-message requests, and (ii) knows part of the private message requested by the other receiver as side information. We first propose a transmission scheme and derive an inner bound for the two-receiver memoryless broadcast channel. We next prove that this inner bound is tight for the deterministic channel and the more capable channel, thereby establishing their capacity regions. We show that this inner bound is also tight for all classes of two-receiver broadcast channels whose capacity regions were known prior to this work. Our proposed scheme is consequently a unified capacity-achieving scheme for these classes of broadcast channels.
[ { "version": "v1", "created": "Wed, 1 Apr 2015 01:54:06 GMT" }, { "version": "v2", "created": "Wed, 15 Apr 2015 04:16:33 GMT" } ]
2016-11-18T00:00:00
[ [ "Asadi", "Behzad", "" ], [ "Ong", "Lawrence", "" ], [ "Johnson", "Sarah J.", "" ] ]
new_dataset
0.995693
1504.01320
Mohammadreza A. Kashani
Bilal A. Ranjha, Mohammadreza A. Kashani, Mohsen Kavehrad, Peng Deng
Robust Timing Synchronization for AC-OFDM Based Optical Wireless Communications
Accepted for publication in IEEE ICNS 2015, 10 Pages, 7 figs
null
10.1109/ICNSURV.2015.7121217
null
cs.IT math.IT physics.optics
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Visible light communications (VLC) have recently attracted a growing interest and can be a potential solution to realize indoor wireless communication with high bandwidth capacity for RF-restricted environments such as airplanes and hospitals. Optical based orthogonal frequency division multiplexing (OFDM) systems have been proposed in the literature to combat multipath distortion and intersymbol interference (ISI) caused by multipath signal propagation. In this paper, we present a robust timing synchronization scheme suitable for asymmetrically clipped (AC) OFDM based optical intensity modulated direct detection (IM/DD) wireless systems. Our proposed method works perfectly for ACO-OFDM, Pulse amplitude modulated discrete multitone (PAM-DMT) and discrete Hartley transform (DHT) based optical OFDM systems. In contrast to existing OFDM timing synchronization methods which are either not suitable for AC OFDM techniques due to unipolar nature of output signal or perform poorly, our proposed method is suitable for AC OFDM schemes and outperforms all other available techniques. Both numerical and experimental results confirm the accuracy of the proposed method. Our technique is also computationally efficient as it requires very few computations as compared to conventional methods in order to achieve good accuracy.
[ { "version": "v1", "created": "Mon, 6 Apr 2015 17:07:20 GMT" } ]
2016-11-18T00:00:00
[ [ "Ranjha", "Bilal A.", "" ], [ "Kashani", "Mohammadreza A.", "" ], [ "Kavehrad", "Mohsen", "" ], [ "Deng", "Peng", "" ] ]
new_dataset
0.991764
1504.02980
Xiaoming Chen
Xiaoming Chen, Caijun Zhong, Chau Yuen, Hsiao-Hwa Chen
Multi-Antenna Relay Aided Wireless Physical Layer Security
17 pages, 4 figures, IEEE Communications Magazine, 2015
null
10.1109/MCOM.2015.7355564
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
With growing popularity of mobile Internet, providing secure wireless services has become a critical issue. Physical layer security (PHY-security) has been recognized as an effective means to enhance wireless security by exploiting wireless medium characteristics, e.g., fading, noise, and interference. A particularly interesting PHY-security technology is cooperative relay due to the fact that it helps to provide distributed diversity and shorten access distance. This article offers a tutorial on various multi-antenna relaying technologies to improve security at physical layer. The state of the art research results on multi-antenna relay aided PHY-security as well as some secrecy performance optimization schemes are presented. In particular, we focus on large-scale MIMO (LS-MIMO) relaying technology, which is effective to tackle various challenging issues for implementing wireless PHY-security, such as short-distance interception without eavesdropper channel state information (CSI) and with imperfect legitimate CSI. Moreover, the future directions are identified for further enhancement of secrecy performance.
[ { "version": "v1", "created": "Sun, 12 Apr 2015 15:15:57 GMT" } ]
2016-11-18T00:00:00
[ [ "Chen", "Xiaoming", "" ], [ "Zhong", "Caijun", "" ], [ "Yuen", "Chau", "" ], [ "Chen", "Hsiao-Hwa", "" ] ]
new_dataset
0.99943
1504.03536
Dmytro Karamshuk
Dmytro Karamshuk, Nishanth Sastry, Andrew Secker, Jigna Chandaria
ISP-friendly Peer-assisted On-demand Streaming of Long Duration Content in BBC iPlayer
In Proceedings of IEEE INFOCOM 2015
null
10.1109/INFOCOM.2015.7218393
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In search of scalable solutions, CDNs are exploring P2P support. However, the benefits of peer assistance can be limited by various obstacle factors such as ISP friendliness - requiring peers to be within the same ISP, bitrate stratification - the need to match peers with others needing similar bitrate, and partial participation - some peers choosing not to redistribute content. This work relates potential gains from peer assistance to the average number of users in a swarm, its capacity, and empirically studies the effects of these obstacle factors at scale, using a month-long trace of over 2 million users in London accessing BBC shows online. Results indicate that even when P2P swarms are localised within ISPs, up to 88% of traffic can be saved. Surprisingly, bitrate stratification results in 2 large sub-swarms and does not significantly affect savings. However, partial participation, and the need for a minimum swarm size do affect gains. We investigate improvements to gain from increasing content availability through two well-studied techniques: content bundling - combining multiple items to increase availability, and historical caching of previously watched items. Bundling proves ineffective as increased server traffic from larger bundles outweighs benefits of availability, but simple caching can considerably boost traffic gains from peer assistance.
[ { "version": "v1", "created": "Tue, 14 Apr 2015 13:23:39 GMT" } ]
2016-11-18T00:00:00
[ [ "Karamshuk", "Dmytro", "" ], [ "Sastry", "Nishanth", "" ], [ "Secker", "Andrew", "" ], [ "Chandaria", "Jigna", "" ] ]
new_dataset
0.992959
1504.03573
Marcus A. Brubaker
Marcus A. Brubaker, Ali Punjani and David J. Fleet
Building Proteins in a Day: Efficient 3D Molecular Reconstruction
To be presented at IEEE Conference on Computer Vision and Pattern Recognition (CVPR) 2015
null
10.1109/CVPR.2015.7298929
null
cs.CV q-bio.QM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Discovering the 3D atomic structure of molecules such as proteins and viruses is a fundamental research problem in biology and medicine. Electron Cryomicroscopy (Cryo-EM) is a promising vision-based technique for structure estimation which attempts to reconstruct 3D structures from 2D images. This paper addresses the challenging problem of 3D reconstruction from 2D Cryo-EM images. A new framework for estimation is introduced which relies on modern stochastic optimization techniques to scale to large datasets. We also introduce a novel technique which reduces the cost of evaluating the objective function during optimization by over five orders or magnitude. The net result is an approach capable of estimating 3D molecular structure from large scale datasets in about a day on a single workstation.
[ { "version": "v1", "created": "Tue, 14 Apr 2015 14:56:17 GMT" } ]
2016-11-18T00:00:00
[ [ "Brubaker", "Marcus A.", "" ], [ "Punjani", "Ali", "" ], [ "Fleet", "David J.", "" ] ]
new_dataset
0.991936
1505.00953
Jiayi Zhang
Jiayi Zhang, Linglong Dai, Yanjun Han, Yu Zhang, and Zhaocheng Wang
On the Ergodic Capacity of MIMO Free-Space Optical Systems over Turbulence Channels
10 pages, 6 figures, This paper has been accepted by IEEE Journal on Selected Areas in Communications - Special Issue on Optical Wireless Communication
null
10.1109/JSAC.2015.2452631
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The free-space optical (FSO) communications can achieve high capacity with huge unlicensed optical spectrum and low operational costs. The corresponding performance analysis of FSO systems over turbulence channels is very limited, especially when using multiple apertures at both transmitter and receiver sides. This paper aim to provide the ergodic capacity characterization of multiple-input multiple-output (MIMO) FSO systems over atmospheric turbulence-induced fading channels. The fluctuations of the irradiance of optical channels distorted by atmospheric conditions is usually described by a gamma-gamma ($\Gamma \Gamma$) distribution, and the distribution of the sum of $\Gamma \Gamma$ random variables (RVs) is required to model the MIMO optical links. We use an $\alpha$-$\mu$ distribution to efficiently approximate the probability density function (PDF) of the sum of independent and identical distributed $\Gamma\Gamma$ RVs through moment-based estimators. Furthermore, the PDF of the sum of independent, but not necessarily identically distributed $\Gamma \Gamma$ RVs can be efficiently approximated by a finite weighted sum of PDFs of $\Gamma \Gamma$ distributions. Based on these reliable approximations, novel and precise analytical expressions for the ergodic capacity of MIMO FSO systems are derived. Additionally, we deduce the asymptotic simple expressions in high signal-to-noise ratio regimes, which provide useful insights into the impact of the system parameters on the ergodic capacity. Finally, our proposed results are validated via Monte-Carlo simulations.
[ { "version": "v1", "created": "Tue, 5 May 2015 11:06:56 GMT" } ]
2016-11-18T00:00:00
[ [ "Zhang", "Jiayi", "" ], [ "Dai", "Linglong", "" ], [ "Han", "Yanjun", "" ], [ "Zhang", "Yu", "" ], [ "Wang", "Zhaocheng", "" ] ]
new_dataset
0.998992
1505.02211
Tony Wu
Tony F. Wu, Karthik Ganesan, Yunqing Alexander Hu, H.-S. Philip Wong, Simon Wong, Subhasish Mitra
TPAD: Hardware Trojan Prevention and Detection for Trusted Integrated Circuits
17 pages, 23 figures. Extended version of paper to appear in IEEE Trans. on CAD
null
10.1109/TCAD.2015.2474373
null
cs.AR cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
There are increasing concerns about possible malicious modifications of integrated circuits (ICs) used in critical applications. Such attacks are often referred to as hardware Trojans. While many techniques focus on hardware Trojan detection during IC testing, it is still possible for attacks to go undetected. Using a combination of new design techniques and new memory technologies, we present a new approach that detects a wide variety of hardware Trojans during IC testing and also during system operation in the field. Our approach can also prevent a wide variety of attacks during synthesis, place-and-route, and fabrication of ICs. It can be applied to any digital system, and can be tuned for both traditional and split-manufacturing methods. We demonstrate its applicability for both ASICs and FPGAs. Using fabricated test chips with Trojan emulation capabilities and also using simulations, we demonstrate: 1. The area and power costs of our approach can range between 7.4-165% and 0.07-60%, respectively, depending on the design and the attacks targeted; 2. The speed impact can be minimal (close to 0%); 3. Our approach can detect 99.998% of Trojans (emulated using test chips) that do not require detailed knowledge of the design being attacked; 4. Our approach can prevent 99.98% of specific attacks (simulated) that utilize detailed knowledge of the design being attacked (e.g., through reverse-engineering). 5. Our approach never produces any false positives, i.e., it does not report attacks when the IC operates correctly.
[ { "version": "v1", "created": "Sat, 9 May 2015 00:11:31 GMT" }, { "version": "v2", "created": "Tue, 25 Aug 2015 02:19:49 GMT" } ]
2016-11-18T00:00:00
[ [ "Wu", "Tony F.", "" ], [ "Ganesan", "Karthik", "" ], [ "Hu", "Yunqing Alexander", "" ], [ "Wong", "H. -S. Philip", "" ], [ "Wong", "Simon", "" ], [ "Mitra", "Subhasish", "" ] ]
new_dataset
0.999782
1505.07283
Lakshmi Natarajan Dr
Lakshmi Natarajan, Yi Hong, and Emanuele Viterbo
Index Codes for the Gaussian Broadcast Channel using Quadrature Amplitude Modulation
Accepted for publication in IEEE Communications Letters. 4 pages, 2 figures, 1 table
null
10.1109/LCOMM.2015.2439268
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose index codes, based on multidimensional QAM constellations, for the Gaussian broadcast channel, where every receiver demands all the messages from the source. The efficiency with which an index code exploits receiver side information in this broadcast channel is characterised by a code design metric called "side information gain". The known index codes for this broadcast channel enjoy large side information gains, but do not encode all the source messages at the same rate, and do not admit message sizes that are powers of two. The index codes proposed in this letter, which are based on linear codes over integer rings, overcome both these drawbacks and yet provide large values of side information gain. With the aid of a computer search, we obtain QAM index codes for encoding up to 5 messages with message sizes 2^m, m <= 6. We also present the simulated performance of a new 16-QAM index code, concatenated with an off-the-shelf LDPC code, which is observed to operate within 4.3 dB of the broadcast channel capacity.
[ { "version": "v1", "created": "Wed, 27 May 2015 12:20:08 GMT" } ]
2016-11-18T00:00:00
[ [ "Natarajan", "Lakshmi", "" ], [ "Hong", "Yi", "" ], [ "Viterbo", "Emanuele", "" ] ]
new_dataset
0.999674
1508.01182
Ying Li
Ying Li, Katherine Guo, Xin Wang, Emina Soljanin, Thomas Woo
SEARS: Space Efficient And Reliable Storage System in the Cloud
4 pages, IEEE LCN 2015
null
10.1109/LCN.2015.7366342
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Today's cloud storage services must offer storage reliability and fast data retrieval for large amount of data without sacrificing storage cost. We present SEARS, a cloud-based storage system which integrates erasure coding and data deduplication to support efficient and reliable data storage with fast user response time. With proper association of data to storage server clusters, SEARS provides flexible mixing of different configurations, suitable for real-time and archival applications. Our prototype implementation of SEARS over Amazon EC2 shows that it outperforms existing storage systems in storage efficiency and file retrieval time. For 3 MB files, SEARS delivers retrieval time of $2.5$ s compared to $7$ s with existing systems.
[ { "version": "v1", "created": "Wed, 5 Aug 2015 19:14:24 GMT" } ]
2016-11-18T00:00:00
[ [ "Li", "Ying", "" ], [ "Guo", "Katherine", "" ], [ "Wang", "Xin", "" ], [ "Soljanin", "Emina", "" ], [ "Woo", "Thomas", "" ] ]
new_dataset
0.976934
1508.01572
Yukio Hayashi
Yukio Hayashi
Recoverable DTN Routing based on a Relay of Cyclic Message-Ferries on a MSQ Network
6 pages, 12 figures, The 3rd Workshop on the FoCAS(Fundamentals of Collective Adaptive Systems) at The 9th IEEE International Conference on SASO(Self-Adaptive and Self-Organizing systems), Boston, USA, Sept.21, 2015
null
10.1109/SASOW.2015.11
null
cs.DC cs.NI cs.SI nlin.AO physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
An interrelation between a topological design of network and efficient algorithm on it is important for its applications to communication or transportation systems. In this paper, we propose a design principle for a reliable routing in a store-carry-forward manner based on autonomously moving message-ferries on a special structure of fractal-like network, which consists of a self-similar tiling of equilateral triangles. As a collective adaptive mechanism, the routing is realized by a relay of cyclic message-ferries corresponded to a concatenation of the triangle cycles and using some good properties of the network structure. It is recoverable for local accidents in the hierarchical network structure. Moreover, the design principle is theoretically supported with a calculation method for the optimal service rates of message-ferries derived from a tandem queue model for stochastic processes on a chain of edges in the network. These results obtained from a combination of complex network science and computer science will be useful for developing a resilient network system.
[ { "version": "v1", "created": "Fri, 7 Aug 2015 00:06:30 GMT" }, { "version": "v2", "created": "Wed, 19 Aug 2015 01:54:51 GMT" }, { "version": "v3", "created": "Tue, 1 Sep 2015 02:07:01 GMT" } ]
2016-11-18T00:00:00
[ [ "Hayashi", "Yukio", "" ] ]
new_dataset
0.994996
1509.01931
Young-Han Kim
Xianglan Jin, Young-Han Kim
The Approximate Capacity of the MIMO Relay Channel
8 pages, 5 figures, submitted to the IEEE Transactions on Information Theory
null
10.1109/ISIT.2014.6875204
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Capacity bounds are studied for the multiple-antenna complex Gaussian relay channel with t1 transmitting antennas at the sender, r2 receiving and t2 transmitting antennas at the relay, and r3 receiving antennas at the receiver. It is shown that the partial decode-forward coding scheme achieves within min(t1,r2) bits from the cutset bound and at least one half of the cutset bound, establishing a good approximate expression of the capacity. A similar additive gap of min(t1 + t2, r3) + r2 bits is shown to be achieved by the compress-forward coding scheme.
[ { "version": "v1", "created": "Mon, 7 Sep 2015 07:14:20 GMT" } ]
2016-11-18T00:00:00
[ [ "Jin", "Xianglan", "" ], [ "Kim", "Young-Han", "" ] ]
new_dataset
0.99092
1509.05856
Serj Haddad
Serj Haddad, Olivier Leveque
On the Broadcast Capacity of Large Wireless Networks at Low SNR
20 pages, 5 figures, presented at ISIT 2015, submitted to the IEEE Transactions on Information Theory
null
10.1109/ISIT.2015.7282439
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The present paper focuses on the problem of broadcasting information in the most efficient manner in a large two-dimensional ad hoc wireless network at low SNR and under line-of-sight propagation. A new communication scheme is proposed, where source nodes first broadcast their data to the entire network, despite the lack of sufficient available power. The signal's power is then reinforced via successive back-and-forth beamforming transmissions between different groups of nodes in the network, so that all nodes are able to decode the transmitted information at the end. This scheme is shown to achieve asymptotically the broadcast capacity of the network, which is expressed in terms of the largest singular value of the matrix of fading coefficients between the nodes in the network. A detailed mathematical analysis is then presented to evaluate the asymptotic behavior of this largest singular value.
[ { "version": "v1", "created": "Sat, 19 Sep 2015 07:56:25 GMT" }, { "version": "v2", "created": "Sun, 24 Jan 2016 12:38:11 GMT" } ]
2016-11-18T00:00:00
[ [ "Haddad", "Serj", "" ], [ "Leveque", "Olivier", "" ] ]
new_dataset
0.953647
1510.06828
Andrew Thangaraj
Asit Kumar Pradhan, Andrew Thangaraj and Arunkumar Subramanian
Construction of Near-Capacity Protograph LDPC Code Sequences with Block-Error Thresholds
to appear in the IEEE Transactions on Communications
null
10.1109/TCOMM.2015.2500234
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Density evolution for protograph Low-Density Parity-Check (LDPC) codes is considered, and it is shown that the message-error rate falls double-exponentially with iterations whenever the degree-2 subgraph of the protograph is cycle-free and noise level is below threshold. Conditions for stability of protograph density evolution are established and related to the structure of the protograph. Using large-girth graphs, sequences of protograph LDPC codes with block-error threshold equal to bit-error threshold and block-error rate falling near-exponentially with blocklength are constructed deterministically. Small-sized protographs are optimized to obtain thresholds near capacity for binary erasure and binary-input Gaussian channels.
[ { "version": "v1", "created": "Fri, 23 Oct 2015 05:05:11 GMT" } ]
2016-11-18T00:00:00
[ [ "Pradhan", "Asit Kumar", "" ], [ "Thangaraj", "Andrew", "" ], [ "Subramanian", "Arunkumar", "" ] ]
new_dataset
0.999423
1510.07917
Corinne Touati
Nof Abuzainab, Corinne Touati
Multihop Relaying in Millimeter Wave Networks: A Proportionally Fair Cooperative Network Formation Game
IEEE. 82nd Vehicular Technology Conference: VTC2015-Fall, Sep 2015, Boston, United States
null
10.1109/VTCFall.2015.7391029
null
cs.GT cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Millimeter wave channels suffer from considerable degradation in the channel quality when the signal is Non Line of Sight (NLOS) between the source and the destination. Multihop relaying is thus anticipated to improve the communi- cation between a source and its destination. This is achieved by transmitting the signal to a sequence of relays in which a Line of Sight (LOS) signal exists between two nodes along the path, or more generally when the signal is better than the transmitted signal directly from the source to the destination. In this paper, we consider a millimeter wave network composed of multiple source- destination pairs and a set of deployed relays. We formulate the problem of multihop relaying as a cooperative network formation game in which each relay chooses which source-destination pair to assist in order to improve the end-to-end performance, that is, the multihop delay between the source and the destination. Further, we present an algorithm based on the Nash Bargaining Solution to ensure fairness among the different source-destination pairs and assess its efficiency on numerical simulations.
[ { "version": "v1", "created": "Tue, 27 Oct 2015 14:28:13 GMT" } ]
2016-11-18T00:00:00
[ [ "Abuzainab", "Nof", "" ], [ "Touati", "Corinne", "" ] ]
new_dataset
0.999243
1510.07932
Ekram Hossain
Tran Kien Thuc, Ekram Hossain, and Hina Tabassum
Downlink Power Control in Two-Tier Cellular Networks with Energy-Harvesting Small Cells as Stochastic Games
IEEE Transactions on Communications, 2015
null
10.1109/TCOMM.2015.2497239
null
cs.NI cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Energy harvesting in cellular networks is an emerging technique to enhance the sustainability of power-constrained wireless devices. This paper considers the co-channel deployment of a macrocell overlaid with small cells. The small cell base stations (SBSs) harvest energy from environmental sources whereas the macrocell base station (MBS) uses conventional power supply. Given a stochastic energy arrival process for the SBSs, we derive a power control policy for the downlink transmission of both MBS and SBSs such that they can achieve their objectives (e.g., maintain the signal-to-interference-plus-noise ratio (SINR) at an acceptable level) on a given transmission channel. We consider a centralized energy harvesting mechanism for SBSs, i.e., there is a central energy storage (CES) where energy is harvested and then distributed to the SBSs. When the number of SBSs is small, the game between the CES and the MBS is modeled as a single-controller stochastic game and the equilibrium policies are obtained as a solution of a quadratic programming problem. However, when the number of SBSs tends to infinity (i.e., a highly dense network), the centralized scheme becomes infeasible, and therefore, we use a mean field stochastic game to obtain a distributed power control policy for each SBS. By solving a system of partial differential equations, we derive the power control policy of SBSs given the knowledge of mean field distribution and the available harvested energy levels in the batteries of the SBSs.
[ { "version": "v1", "created": "Tue, 27 Oct 2015 15:14:32 GMT" } ]
2016-11-18T00:00:00
[ [ "Thuc", "Tran Kien", "" ], [ "Hossain", "Ekram", "" ], [ "Tabassum", "Hina", "" ] ]
new_dataset
0.993152
1511.04192
Tianshui Chen
Tianshui Chen, Liang Lin, Lingbo Liu, Xiaonan Luo, Xuelong Li
DISC: Deep Image Saliency Computing via Progressive Representation Learning
This manuscript is the accepted version for IEEE Transactions on Neural Networks and Learning Systems (T-NNLS), 2015
null
10.1109/TNNLS.2015.2506664
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Salient object detection increasingly receives attention as an important component or step in several pattern recognition and image processing tasks. Although a variety of powerful saliency models have been intensively proposed, they usually involve heavy feature (or model) engineering based on priors (or assumptions) about the properties of objects and backgrounds. Inspired by the effectiveness of recently developed feature learning, we provide a novel Deep Image Saliency Computing (DISC) framework for fine-grained image saliency computing. In particular, we model the image saliency from both the coarse- and fine-level observations, and utilize the deep convolutional neural network (CNN) to learn the saliency representation in a progressive manner. Specifically, our saliency model is built upon two stacked CNNs. The first CNN generates a coarse-level saliency map by taking the overall image as the input, roughly identifying saliency regions in the global context. Furthermore, we integrate superpixel-based local context information in the first CNN to refine the coarse-level saliency map. Guided by the coarse saliency map, the second CNN focuses on the local context to produce fine-grained and accurate saliency map while preserving object details. For a testing image, the two CNNs collaboratively conduct the saliency computing in one shot. Our DISC framework is capable of uniformly highlighting the objects-of-interest from complex background while preserving well object details. Extensive experiments on several standard benchmarks suggest that DISC outperforms other state-of-the-art methods and it also generalizes well across datasets without additional training. The executable version of DISC is available online: http://vision.sysu.edu.cn/projects/DISC.
[ { "version": "v1", "created": "Fri, 13 Nov 2015 07:14:13 GMT" }, { "version": "v2", "created": "Thu, 10 Dec 2015 13:11:23 GMT" } ]
2016-11-18T00:00:00
[ [ "Chen", "Tianshui", "" ], [ "Lin", "Liang", "" ], [ "Liu", "Lingbo", "" ], [ "Luo", "Xiaonan", "" ], [ "Li", "Xuelong", "" ] ]
new_dataset
0.995441
1511.06938
Mathew Samimi
Mathew K. Samimi, George R. MacCartney, Jr., Shu Sun, and Theodore S. Rappaport
28 GHz Millimeter-Wave Ultrawideband Small-Scale Fading Models in Wireless Channels
6 pages, 9 figures, to be published in the 2016 IEEE Vehicular Technology Conference (VTC2016-Spring), 15-18 May, 2016
null
10.1109/VTCSpring.2016.7503970
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents small-scale fading measurements for 28 GHz outdoor millimeter-wave ultrawideband channels using directional horn antennas at the transmitter and receiver. Power delay profiles were measured at half-wavelength spatial increments over a local area (33 wavelengths) on a linear track in two orthogonal receiver directions in a typical base-to-mobile scenario with fixed transmitter and receiver antenna beam pointing directions. The voltage path amplitudes are shown to follow a Rician distribution, with K-factor ranging from 9 - 15 dB and 5 - 8 dB in line of sight (LOS) and non-line of sight (NLOS) for a vertical-to-vertical co-polarized antenna scenario, respectively, and from 3 - 7 dB in both LOS and NLOS vertical-to-horizontal cross-polarized antenna scenario. The average spatial autocorrelation functions of individual multipath components reveal that signal amplitudes reach a correlation of 0 after 2 and 5 wavelengths in LOS and NLOS co-polarized V-V antenna scenarios. The models provided are useful for recreating path gain statistics of millimeter-wave wideband channel impulse responses over local areas, for the study of multi-element antenna simulations and channel estimation algorithms.
[ { "version": "v1", "created": "Sat, 21 Nov 2015 23:22:47 GMT" }, { "version": "v2", "created": "Mon, 22 Feb 2016 05:24:27 GMT" } ]
2016-11-18T00:00:00
[ [ "Samimi", "Mathew K.", "" ], [ "MacCartney,", "George R.", "Jr." ], [ "Sun", "Shu", "" ], [ "Rappaport", "Theodore S.", "" ] ]
new_dataset
0.999823
1601.07865
Yuyi Mao
Yuyi Mao, Jun Zhang, Khaled B. Letaief
Grid Energy Consumption and QoS Tradeoff in Hybrid Energy Supply Wireless Networks
14 pages, 7 figures, to appear in IEEE Transactions on Wireless Communications
null
10.1109/TWC.2016.2523981
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Hybrid energy supply (HES) wireless networks have recently emerged as a new paradigm to enable green networks, which are powered by both the electric grid and harvested renewable energy. In this paper, we will investigate two critical but conflicting design objectives of HES networks, i.e., the grid energy consumption and quality of service (QoS). Minimizing grid energy consumption by utilizing the harvested energy will make the network environmentally friendly, but the achievable QoS may be degraded due to the intermittent nature of energy harvesting. To investigate the tradeoff between these two aspects, we introduce the total service cost as the performance metric, which is the weighted sum of the grid energy cost and the QoS degradation cost. Base station assignment and power control is adopted as the main strategy to minimize the total service cost, while both cases with non-causal and causal side information are considered. With non-causal side information, a Greedy Assignment algorithm with low complexity and near-optimal performance is proposed. With causal side information, the design problem is formulated as a discrete Markov decision problem. Interesting solution structures are derived, which shall help to develop an efficient monotone backward induction algorithm. To further reduce complexity, a Look-Ahead policy and a Threshold-based Heuristic policy are also proposed. Simulation results shall validate the effectiveness of the proposed algorithms and demonstrate the unique grid energy consumption and QoS tradeoff in HES networks.
[ { "version": "v1", "created": "Thu, 28 Jan 2016 19:05:48 GMT" } ]
2016-11-18T00:00:00
[ [ "Mao", "Yuyi", "" ], [ "Zhang", "Jun", "" ], [ "Letaief", "Khaled B.", "" ] ]
new_dataset
0.988259
1602.04493
Hamidreza Ghafghazi
Hamidreza Ghafghazi, Amr ElMougy, Hussein T. Mouftah, Carlisle Adams
Secure Data Storage Structure and Privacy-Preserving Mobile Search Scheme for Public Safety Networks
7 pages, 3 figures, This work has been accepted to be presented in Wireless Communications and Networking Conference (WCNC), 2016 IEEE
null
10.1109/WCNC.2016.7564866
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In a Public Safety (PS) situation, agents may require critical and personally identifiable information. Therefore, not only does context and location-aware information need to be available, but also the privacy of such information should be preserved. Existing solutions do not address such a problem in a PS environment. This paper proposes a framework in which anonymized Personal Information (PI) is accessible to authorized public safety agents under a PS circumstance. In particular, we propose a secure data storage structure along with privacy-preserving mobile search framework, suitable for Public Safety Networks (PSNs). As a result, availability and privacy of PI are achieved simultaneously. However, the design of such a framework encounters substantial challenges, including scalability, reliability of the data, computation and communication and storage efficiency, etc. We leverage Secure Indexing (SI) methods and modify Bloom Filters (BFs) to create a secure data storage structure to store encrypted meta-data. As a result, our construction enables secure and privacy-preserving multi-keyword search capability. In addition, our system scales very well, maintains availability of data, imposes minimum delay, and has affordable storage overhead. We provide extensive security analysis, simulation studies, and performance comparison with the state-of-the-art solutions to demonstrate the efficiency and effectiveness of the proposed approach. To the best of our knowledge, this work is the first to address such issues in the context of PSNs.
[ { "version": "v1", "created": "Sun, 14 Feb 2016 19:47:01 GMT" } ]
2016-11-18T00:00:00
[ [ "Ghafghazi", "Hamidreza", "" ], [ "ElMougy", "Amr", "" ], [ "Mouftah", "Hussein T.", "" ], [ "Adams", "Carlisle", "" ] ]
new_dataset
0.978006
1602.06888
Maria Patterson
Maria T Patterson, Nikolas Anderson, Collin Bennett, Jacob Bruggemann, Robert Grossman, Matthew Handy, Vuong Ly, Dan Mandl, Shane Pederson, Jim Pivarski, Ray Powell, Jonathan Spring and Walt Wells
The Matsu Wheel: A Cloud-based Framework for Efficient Analysis and Reanalysis of Earth Satellite Imagery
10 pages, accepted for presentation to IEEE BigDataService 2016
null
10.1109/BigDataService.2016.39
null
cs.DC astro-ph.IM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Project Matsu is a collaboration between the Open Commons Consortium and NASA focused on developing open source technology for the cloud-based processing of Earth satellite imagery. A particular focus is the development of applications for detecting fires and floods to help support natural disaster detection and relief. Project Matsu has developed an open source cloud-based infrastructure to process, analyze, and reanalyze large collections of hyperspectral satellite image data using OpenStack, Hadoop, MapReduce, Storm and related technologies. We describe a framework for efficient analysis of large amounts of data called the Matsu "Wheel." The Matsu Wheel is currently used to process incoming hyperspectral satellite data produced daily by NASA's Earth Observing-1 (EO-1) satellite. The framework is designed to be able to support scanning queries using cloud computing applications, such as Hadoop and Accumulo. A scanning query processes all, or most of the data, in a database or data repository. We also describe our preliminary Wheel analytics, including an anomaly detector for rare spectral signatures or thermal anomalies in hyperspectral data and a land cover classifier that can be used for water and flood detection. Each of these analytics can generate visual reports accessible via the web for the public and interested decision makers. The resultant products of the analytics are also made accessible through an Open Geospatial Compliant (OGC)-compliant Web Map Service (WMS) for further distribution. The Matsu Wheel allows many shared data services to be performed together to efficiently use resources for processing hyperspectral satellite image data and other, e.g., large environmental datasets that may be analyzed for many purposes.
[ { "version": "v1", "created": "Mon, 22 Feb 2016 18:51:14 GMT" } ]
2016-11-18T00:00:00
[ [ "Patterson", "Maria T", "" ], [ "Anderson", "Nikolas", "" ], [ "Bennett", "Collin", "" ], [ "Bruggemann", "Jacob", "" ], [ "Grossman", "Robert", "" ], [ "Handy", "Matthew", "" ], [ "Ly", "Vuong", "" ], [ "Mandl", "Dan", "" ], [ "Pederson", "Shane", "" ], [ "Pivarski", "Jim", "" ], [ "Powell", "Ray", "" ], [ "Spring", "Jonathan", "" ], [ "Wells", "Walt", "" ] ]
new_dataset
0.997882
1602.07024
Sailik Sengupta
Sailik Sengupta, Satya Gautam Vadlamudi, Subbarao Kambhampati, Marthony Taguinod, Adam Doup\'e, Ziming Zhao, Gail-Joon Ahn
Moving Target Defense for Web Applications using Bayesian Stackelberg Games
9 pages, 4 figures
null
null
null
cs.CR cs.AI cs.GT cs.MA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The present complexity in designing web applications makes software security a difficult goal to achieve. An attacker can explore a deployed service on the web and attack at his/her own leisure. Moving Target Defense (MTD) in web applications is an effective mechanism to nullify this advantage of their reconnaissance but the framework demands a good switching strategy when switching between multiple configurations for its web-stack. To address this issue, we propose modeling of a real-world MTD web application as a repeated Bayesian game. We then formulate an optimization problem that generates an effective switching strategy while considering the cost of switching between different web-stack configurations. To incorporate this model into a developed MTD system, we develop an automated system for generating attack sets of Common Vulnerabilities and Exposures (CVEs) for input attacker types with predefined capabilities. Our framework obtains realistic reward values for the players (defenders and attackers) in this game by using security domain expertise on CVEs obtained from the National Vulnerability Database (NVD). We also address the issue of prioritizing vulnerabilities that when fixed, improves the security of the MTD system. Lastly, we demonstrate the robustness of our proposed model by evaluating its performance when there is uncertainty about input attacker information.
[ { "version": "v1", "created": "Tue, 23 Feb 2016 03:44:16 GMT" }, { "version": "v2", "created": "Tue, 8 Nov 2016 18:20:38 GMT" }, { "version": "v3", "created": "Thu, 17 Nov 2016 01:04:59 GMT" } ]
2016-11-18T00:00:00
[ [ "Sengupta", "Sailik", "" ], [ "Vadlamudi", "Satya Gautam", "" ], [ "Kambhampati", "Subbarao", "" ], [ "Taguinod", "Marthony", "" ], [ "Doupé", "Adam", "" ], [ "Zhao", "Ziming", "" ], [ "Ahn", "Gail-Joon", "" ] ]
new_dataset
0.979942
1602.07533
George MacCartney Jr
Katsuyuki Haneda, Lei Tian, Yi Zheng, Henrik Asplund, Jian Li, Yi Wang, David Steer, Clara Li, Tommaso Balercia, Sunguk Lee, YoungSuk Kim, Amitava Ghosh, Timothy Thomas, Takehiro Nakamura, Yuichi Kakishima, Tetsuro Imai, Haralabos Papadopoulas, Theodore S. Rappaport, George R. MacCartney Jr., Mathew K. Samimi, Shu Sun, Ozge Koymen, Sooyoung Hur, Jeongho Park, Charlie Zhang, Evangelos Mellios, Andreas F. Molisch, Saeed S. Ghassamzadah, and Arun Ghosh
5G 3GPP-like Channel Models for Outdoor Urban Microcellular and Macrocellular Environments
To be published in 2016 IEEE 83rd Vehicular Technology Conference Spring (VTC 2016-Spring), Nanjing, China, May 2016
null
10.1109/VTCSpring.2016.7503971
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
For the development of new 5G systems to operate in bands up to 100 GHz, there is a need for accurate radio propagation models at these bands that currently are not addressed by existing channel models developed for bands below 6 GHz. This document presents a preliminary overview of 5G channel models for bands up to 100 GHz. These have been derived based on extensive measurement and ray tracing results across a multitude of frequencies from 6 GHz to 100 GHz, and this document describes an initial 3D channel model which includes: 1) typical deployment scenarios for urban microcells (UMi) and urban macrocells (UMa), and 2) a baseline model for incorporating path loss, shadow fading, line of sight probability, penetration and blockage models for the typical scenarios. Various processing methodologies such as clustering and antenna decoupling algorithms are also presented.
[ { "version": "v1", "created": "Wed, 24 Feb 2016 14:48:05 GMT" }, { "version": "v2", "created": "Thu, 25 Feb 2016 14:02:08 GMT" } ]
2016-11-18T00:00:00
[ [ "Haneda", "Katsuyuki", "" ], [ "Tian", "Lei", "" ], [ "Zheng", "Yi", "" ], [ "Asplund", "Henrik", "" ], [ "Li", "Jian", "" ], [ "Wang", "Yi", "" ], [ "Steer", "David", "" ], [ "Li", "Clara", "" ], [ "Balercia", "Tommaso", "" ], [ "Lee", "Sunguk", "" ], [ "Kim", "YoungSuk", "" ], [ "Ghosh", "Amitava", "" ], [ "Thomas", "Timothy", "" ], [ "Nakamura", "Takehiro", "" ], [ "Kakishima", "Yuichi", "" ], [ "Imai", "Tetsuro", "" ], [ "Papadopoulas", "Haralabos", "" ], [ "Rappaport", "Theodore S.", "" ], [ "MacCartney", "George R.", "Jr." ], [ "Samimi", "Mathew K.", "" ], [ "Sun", "Shu", "" ], [ "Koymen", "Ozge", "" ], [ "Hur", "Sooyoung", "" ], [ "Park", "Jeongho", "" ], [ "Zhang", "Charlie", "" ], [ "Mellios", "Evangelos", "" ], [ "Molisch", "Andreas F.", "" ], [ "Ghassamzadah", "Saeed S.", "" ], [ "Ghosh", "Arun", "" ] ]
new_dataset
0.999367
1602.09019
Cristina Cano
Cristina Cano, Alberto Pittolo, David Malone, Lutz Lampe, Andrea M. Tonello, Anand Dabak
State-of-the-art in Power Line Communications: from the Applications to the Medium
19 pages, 12 figures. Accepted for publication, IEEE Journal on Selected Areas in Communications. Special Issue on Power Line Communications and its Integration with the Networking Ecosystem. 2016
null
10.1109/JSAC.2016.2566018
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In recent decades, power line communication has attracted considerable attention from the research community and industry, as well as from regulatory and standardization bodies. In this article we provide an overview of both narrowband and broadband systems, covering potential applications, regulatory and standardization efforts and recent research advancements in channel characterization, physical layer performance, medium access and higher layer specifications and evaluations. We also identify areas of current and further study that will enable the continued success of power line communication technology.
[ { "version": "v1", "created": "Mon, 29 Feb 2016 16:06:02 GMT" } ]
2016-11-18T00:00:00
[ [ "Cano", "Cristina", "" ], [ "Pittolo", "Alberto", "" ], [ "Malone", "David", "" ], [ "Lampe", "Lutz", "" ], [ "Tonello", "Andrea M.", "" ], [ "Dabak", "Anand", "" ] ]
new_dataset
0.983567
1603.04574
Tamoor-Ul-Hassan Syed
Syed Tamoor-ul-Hassan, Mehdi Bennis, Pedro H. J. Nardelli, Matti Latva-Aho
Caching in Wireless Small Cell Networks: A Storage-Bandwidth Tradeoff
accepted for publication, IEEE Comm Letters 2016
null
10.1109/LCOMM.2016.2543698
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Caching contents at the network edge is an efficient mean for offloading traffic, reducing latency and improving users' quality-of-experience. In this letter, we focus on aspects of storage-bandwidth tradeoffs in which small cell base stations are distributed according to a homogeneous Poisson point process and cache contents according to a given content popularity distribution, subject to storage constraints. We provide a closed-form expression of the cache-miss probability, defined as the probability of not satisfying users' requests over a given coverage area, as a function of signal-to-interference ratio, cache size, base stations density and content popularity. In particular, it is shown that for a given minimum cache size, the popularity based caching strategy achieves lower outage probability for a given base station density compared to uniform caching. Furthermore, we show that popularity based caching attains better performance in terms of cache-miss probability for the same amount of spectrum.
[ { "version": "v1", "created": "Tue, 15 Mar 2016 07:19:06 GMT" }, { "version": "v2", "created": "Wed, 16 Mar 2016 09:07:27 GMT" }, { "version": "v3", "created": "Thu, 17 Mar 2016 13:11:18 GMT" } ]
2016-11-18T00:00:00
[ [ "Tamoor-ul-Hassan", "Syed", "" ], [ "Bennis", "Mehdi", "" ], [ "Nardelli", "Pedro H. J.", "" ], [ "Latva-Aho", "Matti", "" ] ]
new_dataset
0.999546
1603.07055
Bo Yuan
Bo Yuan, Keshab K. Parhi
LLR-based Successive-Cancellation List Decoder for Polar Codes with Multi-bit Decision
accepted by IEEE Trans. Circuits and Systems II
null
10.1109/TCSII.2016.2546904
null
cs.IT cs.AR math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Due to their capacity-achieving property, polar codes have become one of the most attractive channel codes. To date, the successive cancellation list (SCL) decoding algorithm is the primary approach that can guarantee outstanding error-correcting performance of polar codes. However, the hardware designs of the original SCL decoder have large silicon area and long decoding latency. Although some recent efforts can reduce either the area or latency of SCL decoders, these two metrics still cannot be optimized at the same time. This paper, for the first time, proposes a general log-likelihood-ratio (LLR)-based SCL decoding algorithm with multi-bit decision. This new algorithm, referred as LLR-2Kb-SCL, can determine 2K bits simultaneously for arbitrary K with the use of LLR messages. In addition, a reduced-data-width scheme is presented to reduce the critical path of the sorting block. Then, based on the proposed algorithm, a VLSI architecture of the new SCL decoder is developed. Synthesis results show that for an example (1024, 512) polar code with list size 4, the proposed LLR-2Kb-SCL decoders achieve significant reduction in both area and latency as compared to prior works. As a result, the hardware efficiency of the proposed designs with K=2 and 3 are 2.33 times and 3.32 times of that of the state-of-the-art works, respectively.
[ { "version": "v1", "created": "Wed, 23 Mar 2016 02:48:35 GMT" } ]
2016-11-18T00:00:00
[ [ "Yuan", "Bo", "" ], [ "Parhi", "Keshab K.", "" ] ]
new_dataset
0.997024
1604.02333
Sung Hoon LIm
Sung Hoon Lim, Chien-Yi Wang, and Michael Gastpar
Information Theoretic Caching: The Multi-User Case
Submitted to IEEE Trans. Inf. Theory and presented in part at ITA 2016. 43 pages, 8 figures
null
10.1109/ISIT.2016.7541354
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we consider a cache aided network in which each user is assumed to have individual caches, while upon users' requests, an update message is sent though a common link to all users. First, we formulate a general information theoretic setting that represents the database as a discrete memoryless source, and the users' requests as side information that is available everywhere except at the cache encoder. The decoders' objective is to recover a function of the source and the side information. By viewing cache aided networks in terms of a general distributed source coding problem and through information theoretic arguments, we present inner and outer bounds on the fundamental tradeoff of cache memory size and update rate. Then, we specialize our general inner and outer bounds to a specific model of content delivery networks: File selection networks, in which the database is a collection of independent equal-size files and each user requests one of the files independently. For file selection networks, we provide an outer bound and two inner bounds (for centralized and decentralized caching strategies). For the case when the user request information is uniformly distributed, we characterize the rate vs. cache size tradeoff to within a multiplicative gap of 4. By further extending our arguments to the framework of Maddah-Ali and Niesen, we also establish a new outer bound and two new inner bounds in which it is shown to recover the centralized and decentralized strategies, previously established by Maddah-Ali and Niesen. Finally, in terms of rate vs. cache size tradeoff, we improve the previous multiplicative gap of 72 to 4.7 for the average case with uniform requests.
[ { "version": "v1", "created": "Fri, 8 Apr 2016 12:38:25 GMT" } ]
2016-11-18T00:00:00
[ [ "Lim", "Sung Hoon", "" ], [ "Wang", "Chien-Yi", "" ], [ "Gastpar", "Michael", "" ] ]
new_dataset
0.970983
1606.00124
Seong Ho Chae
Seong Ho Chae and Wan Choi
Caching Placement in Stochastic Wireless Caching Helper Networks: Channel Selection Diversity via Caching
12 pages, 11 figures. To appear in IEEE Transactions on Wireless Communications
null
10.1109/TWC.2016.2586841
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Content delivery success in wireless caching helper networks depends mainly on cache-based channel selection diversity and network interference. For given channel fading and network geometry, both channel selection diversity and network interference dynamically vary according to what and how the caching helpers cache at their finite storage space. We study probabilistic content placement (or caching placement) to desirably control cache-based channel selection diversity and network interference in a stochastic wireless caching helper network, with sophisticated considerations of wireless fading channels, interactions among multiple users such as interference and loads at caching helpers, and arbitrary memory size. Using stochastic geometry, we derive optimal caching probabilities in closed form to maximize the average success probability of content delivery and propose an efficient algorithm to find the solution in a noise-limited network. In an interference-limited network, based on a lower bound of the average success probability of content delivery, we find near-optimal caching probabilities in closed form to control the channel selection diversity and the network interference. We numerically verify that the proposed content placement is superior to other comparable content placement strategies.
[ { "version": "v1", "created": "Wed, 1 Jun 2016 06:00:20 GMT" }, { "version": "v2", "created": "Wed, 29 Jun 2016 05:53:50 GMT" } ]
2016-11-18T00:00:00
[ [ "Chae", "Seong Ho", "" ], [ "Choi", "Wan", "" ] ]
new_dataset
0.989523
1606.01799
Ian Holmes
Ian Holmes
Modular non-repeating codes for DNA storage
Submitted to IEEE Transactions on Information Theory
null
10.1101/057448
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We describe a strategy for constructing codes for DNA-based information storage by serial composition of weighted finite-state transducers. The resulting state machines can integrate correction of substitution errors; synchronization by interleaving watermark and periodic marker signals; conversion from binary to ternary, quaternary or mixed-radix sequences via an efficient block code; encoding into a DNA sequence that avoids homopolymer, dinucleotide, or trinucleotide runs and other short local repeats; and detection/correction of errors (including local duplications, burst deletions, and substitutions) that are characteristic of DNA sequencing technologies. We present software implementing these codes, available at github.com/ihh/dnastore, with simulation results demonstrating that the generated DNA is free of short repeats and can be accurately decoded even in the presence of substitutions, short duplications and deletions.
[ { "version": "v1", "created": "Mon, 6 Jun 2016 15:53:57 GMT" }, { "version": "v2", "created": "Wed, 8 Jun 2016 12:52:48 GMT" } ]
2016-11-18T00:00:00
[ [ "Holmes", "Ian", "" ] ]
new_dataset
0.997946
1606.06259
Amir Zadeh
Amir Zadeh, Rowan Zellers, Eli Pincus, Louis-Philippe Morency
MOSI: Multimodal Corpus of Sentiment Intensity and Subjectivity Analysis in Online Opinion Videos
Accepted as Journal Publication in IEEE Intelligent Systems
IEEE Intelligent Systems 31.6 (2016): 82-88
null
null
cs.CL cs.MM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
People are sharing their opinions, stories and reviews through online video sharing websites every day. Studying sentiment and subjectivity in these opinion videos is experiencing a growing attention from academia and industry. While sentiment analysis has been successful for text, it is an understudied research question for videos and multimedia content. The biggest setbacks for studies in this direction are lack of a proper dataset, methodology, baselines and statistical analysis of how information from different modality sources relate to each other. This paper introduces to the scientific community the first opinion-level annotated corpus of sentiment and subjectivity analysis in online videos called Multimodal Opinion-level Sentiment Intensity dataset (MOSI). The dataset is rigorously annotated with labels for subjectivity, sentiment intensity, per-frame and per-opinion annotated visual features, and per-milliseconds annotated audio features. Furthermore, we present baselines for future studies in this direction as well as a new multimodal fusion approach that jointly models spoken words and visual gestures.
[ { "version": "v1", "created": "Mon, 20 Jun 2016 19:23:53 GMT" }, { "version": "v2", "created": "Fri, 12 Aug 2016 02:39:40 GMT" } ]
2016-11-18T00:00:00
[ [ "Zadeh", "Amir", "" ], [ "Zellers", "Rowan", "" ], [ "Pincus", "Eli", "" ], [ "Morency", "Louis-Philippe", "" ] ]
new_dataset
0.999805
1609.04371
Alberto Camacho
Jorge A. Baier, Alberto Camacho, Christian Muise and Sheila A. McIlraith
Finite LTL Synthesis is EXPTIME-complete
We withdraw this paper because of an error in the proof
null
null
null
cs.LO cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
LTL synthesis -- the construction of a function to satisfy a logical specification formulated in Linear Temporal Logic -- is a 2EXPTIME-complete problem with relevant applications in controller synthesis and a myriad of artificial intelligence applications. In this research note we consider De Giacomo and Vardi's variant of the synthesis problem for LTL formulas interpreted over finite rather than infinite traces. Rather surprisingly, given the existing claims on complexity, we establish that LTL synthesis is EXPTIME-complete for the finite interpretation, and not 2EXPTIME-complete as previously reported. Our result coincides nicely with the planning perspective where non-deterministic planning with full observability is EXPTIME-complete and partial observability increases the complexity to 2EXPTIME-complete; a recent related result for LTL synthesis shows that in the finite case with partial observability, the problem is 2EXPTIME-complete.
[ { "version": "v1", "created": "Wed, 14 Sep 2016 18:23:25 GMT" }, { "version": "v2", "created": "Thu, 17 Nov 2016 14:12:45 GMT" } ]
2016-11-18T00:00:00
[ [ "Baier", "Jorge A.", "" ], [ "Camacho", "Alberto", "" ], [ "Muise", "Christian", "" ], [ "McIlraith", "Sheila A.", "" ] ]
new_dataset
0.999804
1610.04211
Julien Perez
Julien Perez and Fei Liu
Gated End-to-End Memory Networks
9 pages, 3 figures, 3 tables
null
null
null
cs.CL stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Machine reading using differentiable reasoning models has recently shown remarkable progress. In this context, End-to-End trainable Memory Networks, MemN2N, have demonstrated promising performance on simple natural language based reasoning tasks such as factual reasoning and basic deduction. However, other tasks, namely multi-fact question-answering, positional reasoning or dialog related tasks, remain challenging particularly due to the necessity of more complex interactions between the memory and controller modules composing this family of models. In this paper, we introduce a novel end-to-end memory access regulation mechanism inspired by the current progress on the connection short-cutting principle in the field of computer vision. Concretely, we develop a Gated End-to-End trainable Memory Network architecture, GMemN2N. From the machine learning perspective, this new capability is learned in an end-to-end fashion without the use of any additional supervision signal which is, as far as our knowledge goes, the first of its kind. Our experiments show significant improvements on the most challenging tasks in the 20 bAbI dataset, without the use of any domain knowledge. Then, we show improvements on the dialog bAbI tasks including the real human-bot conversion-based Dialog State Tracking Challenge (DSTC-2) dataset. On these two datasets, our model sets the new state of the art.
[ { "version": "v1", "created": "Thu, 13 Oct 2016 19:38:03 GMT" }, { "version": "v2", "created": "Thu, 17 Nov 2016 15:09:29 GMT" } ]
2016-11-18T00:00:00
[ [ "Perez", "Julien", "" ], [ "Liu", "Fei", "" ] ]
new_dataset
0.998988
1611.01507
Yatin Manerkar
Yatin A. Manerkar, Caroline Trippel, Daniel Lustig, Michael Pellauer, Margaret Martonosi
Counterexamples and Proof Loophole for the C/C++ to POWER and ARMv7 Trailing-Sync Compiler Mappings
null
null
null
null
cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The C and C++ high-level languages provide programmers with atomic operations for writing high-performance concurrent code. At the assembly language level, C and C++ atomics get mapped down to individual instructions or combinations of instructions by compilers, depending on the ordering guarantees and synchronization instructions provided by the underlying architecture. These compiler mappings must uphold the ordering guarantees provided by C/C++ atomics or the compiled program will not behave according to the C/C++ memory model. In this paper we discuss two counterexamples to the well-known trailing-sync compiler mappings for the Power and ARMv7 architectures that were previously thought to be proven correct. In addition to the counterexamples, we discuss the loophole in the proof of the mappings that allowed the incorrect mappings to be proven correct. We also discuss the current state of compilers and architectures in relation to the bug.
[ { "version": "v1", "created": "Fri, 4 Nov 2016 19:52:35 GMT" }, { "version": "v2", "created": "Thu, 17 Nov 2016 03:42:46 GMT" } ]
2016-11-18T00:00:00
[ [ "Manerkar", "Yatin A.", "" ], [ "Trippel", "Caroline", "" ], [ "Lustig", "Daniel", "" ], [ "Pellauer", "Michael", "" ], [ "Martonosi", "Margaret", "" ] ]
new_dataset
0.997724
1611.05376
Sven Zehl
Sven Zehl, Anatolij Zubow, Adam Wolisz
hMAC: Enabling Hybrid TDMA/CSMA on IEEE 802.11 Hardware
null
null
null
TKN-16-0004
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present our current work-in-progress on the design and implementation of a hybrid TDMA/CSMA medium access architecture, hereafter referred to as hMAC, which can be used on top of commercial IEEE 802.11 off-the-shelf hardware. The software only solution is based on the popular Linux ATH9K softMAC driver and hence can be used with standard Linux systems using Atheros based wireless network devices. The proposed hMAC exploits the standard 802.11 power saving functionality present in the ATH9K device driver to enable control of the software packet queues. This allows the assignment of TDMA time slots on wireless link and traffic class basis. While the solution is placed only in the device driver, the CSMA/CA functionality on hardware level is still active. This enables inter-working with standard unmodified 802.11 devices. We tested our prototypical hMAC implementation in a small test-bed. Therefore, we implemented a centralized interference management scheme in which pairs of links suffering from a hidden node problem are assigned to TDMA time slots on a per-link basis. To show the benefits of the proposed hMAC approach we compared the results with standard 802.11 DCF and classical, i.e. per-node, TDMA. Finally, to enable collaboration with the research community, the hMAC source code is provided as open-source.
[ { "version": "v1", "created": "Wed, 16 Nov 2016 17:29:47 GMT" }, { "version": "v2", "created": "Thu, 17 Nov 2016 10:18:21 GMT" } ]
2016-11-18T00:00:00
[ [ "Zehl", "Sven", "" ], [ "Zubow", "Anatolij", "" ], [ "Wolisz", "Adam", "" ] ]
new_dataset
0.995404
1611.05512
Mohammad Reza Saniee
Mohammad Reza Saniee
Unmatched Perturbation Accommodation for an Aerospace Launch Vehicle Autopilot Using Dynamic Sliding Manifolds
5 pages, 6 figures
International Journal on Technical and Physical Problems of Engineering (IJTPE), September 2016, Issue 28, Volume 8, Number 3, Pages 27-31
null
null
cs.SY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Sliding mode control of a launch vehicle during its atmospheric flight phase is studied in the presence of unmatched disturbances. Linear time-varying dynamics of the aerospace vehicle is converted into a systematic formula and then dynamic sliding manifold as an advanced method is used in order to overcome the limited capability of conventional sliding manifolds in minimizing the undesired effects of unmatched perturbations on the control system. At the end, simulation results are evaluated and the performance of two approaches are compared in terms of stability and robustness of the autopilot.
[ { "version": "v1", "created": "Thu, 17 Nov 2016 00:13:45 GMT" } ]
2016-11-18T00:00:00
[ [ "Saniee", "Mohammad Reza", "" ] ]
new_dataset
0.997371
1611.05740
Wacha Bounliphone
Wacha Bounliphone, Eugene Belilovsky, Arthur Tenenhaus, Ioannis Antonoglou, Arthur Gretton, Matthew B. Blashcko
Fast Non-Parametric Tests of Relative Dependency and Similarity
null
null
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce two novel non-parametric statistical hypothesis tests. The first test, called the relative test of dependency, enables us to determine whether one source variable is significantly more dependent on a first target variable or a second. Dependence is measured via the Hilbert-Schmidt Independence Criterion (HSIC). The second test, called the relative test of similarity, is use to determine which of the two samples from arbitrary distributions is significantly closer to a reference sample of interest and the relative measure of similarity is based on the Maximum Mean Discrepancy (MMD). To construct these tests, we have used as our test statistics the difference of HSIC statistics and of MMD statistics, respectively. The resulting tests are consistent and unbiased, and have favorable convergence properties. The effectiveness of the relative dependency test is demonstrated on several real-world problems: we identify languages groups from a multilingual parallel corpus, and we show that tumor location is more dependent on gene expression than chromosome imbalance. We also demonstrate the performance of the relative test of similarity over a broad selection of model comparisons problems in deep generative models.
[ { "version": "v1", "created": "Thu, 17 Nov 2016 15:36:31 GMT" } ]
2016-11-18T00:00:00
[ [ "Bounliphone", "Wacha", "" ], [ "Belilovsky", "Eugene", "" ], [ "Tenenhaus", "Arthur", "" ], [ "Antonoglou", "Ioannis", "" ], [ "Gretton", "Arthur", "" ], [ "Blashcko", "Matthew B.", "" ] ]
new_dataset
0.994828
1611.05799
Nichola Abdo
Philipp Jund, Nichola Abdo, Andreas Eitel, Wolfram Burgard
The Freiburg Groceries Dataset
Link to dataset: http://www2.informatik.uni-freiburg.de/~eitel/freiburg_groceries_dataset.html Link to code: https://github.com/PhilJd/freiburg_groceries_dataset
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
With the increasing performance of machine learning techniques in the last few years, the computer vision and robotics communities have created a large number of datasets for benchmarking object recognition tasks. These datasets cover a large spectrum of natural images and object categories, making them not only useful as a testbed for comparing machine learning approaches, but also a great resource for bootstrapping different domain-specific perception and robotic systems. One such domain is domestic environments, where an autonomous robot has to recognize a large variety of everyday objects such as groceries. This is a challenging task due to the large variety of objects and products, and where there is great need for real-world training data that goes beyond product images available online. In this paper, we address this issue and present a dataset consisting of 5,000 images covering 25 different classes of groceries, with at least 97 images per class. We collected all images from real-world settings at different stores and apartments. In contrast to existing groceries datasets, our dataset includes a large variety of perspectives, lighting conditions, and degrees of clutter. Overall, our images contain thousands of different object instances. It is our hope that machine learning and robotics researchers find this dataset of use for training, testing, and bootstrapping their approaches. As a baseline classifier to facilitate comparison, we re-trained the CaffeNet architecture (an adaptation of the well-known AlexNet) on our dataset and achieved a mean accuracy of 78.9%. We release this trained model along with the code and data splits we used in our experiments.
[ { "version": "v1", "created": "Thu, 17 Nov 2016 17:35:21 GMT" } ]
2016-11-18T00:00:00
[ [ "Jund", "Philipp", "" ], [ "Abdo", "Nichola", "" ], [ "Eitel", "Andreas", "" ], [ "Burgard", "Wolfram", "" ] ]
new_dataset
0.99985
1611.05803
Mohamed Nait Meziane
Thomas Picon, Mohamed Nait Meziane, Philippe Ravier, Guy Lamarque, Clarisse Novello, Jean-Charles Le Bunetel, Yves Raingeaud
COOLL: Controlled On/Off Loads Library, a Public Dataset of High-Sampled Electrical Signals for Appliance Identification
5 pages, 2 figures, 3 tables
null
null
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper gives a brief description of the Controlled On/Off Loads Library (COOLL) dataset. This latter is a dataset of high-sampled electrical current and voltage measurements representing individual appliances consumption. The measurements were taken in June 2016 in the PRISME laboratory of the University of Orl\'eans, France. The appliances are mainly controllable appliances (i.e. we can precisely control their turn-on/off time instants). 42 appliances of 12 types were measured at a 100 kHz sampling frequency.
[ { "version": "v1", "created": "Thu, 17 Nov 2016 18:03:05 GMT" } ]
2016-11-18T00:00:00
[ [ "Picon", "Thomas", "" ], [ "Meziane", "Mohamed Nait", "" ], [ "Ravier", "Philippe", "" ], [ "Lamarque", "Guy", "" ], [ "Novello", "Clarisse", "" ], [ "Bunetel", "Jean-Charles Le", "" ], [ "Raingeaud", "Yves", "" ] ]
new_dataset
0.999879
cs/0009021
Rajkumar Buyya
Rajkumar Buyya, David Abramson, Jon Giddy
Nimrod/G: An Architecture of a Resource Management and Scheduling System in a Global Computational Grid
null
HPC Asia 2000, IEEE Press
10.1109/HPC.2000.846563
null
cs.DC
null
The availability of powerful microprocessors and high-speed networks as commodity components has enabled high performance computing on distributed systems (wide-area cluster computing). In this environment, as the resources are usually distributed geographically at various levels (department, enterprise, or worldwide) there is a great challenge in integrating, coordinating and presenting them as a single resource to the user; thus forming a computational grid. Another challenge comes from the distributed ownership of resources with each resource having its own access policy, cost, and mechanism. The proposed Nimrod/G grid-enabled resource management and scheduling system builds on our earlier work on Nimrod and follows a modular and component-based architecture enabling extensibility, portability, ease of development, and interoperability of independently developed components. It uses the Globus toolkit services and can be easily extended to operate with any other emerging grid middleware services. It focuses on the management and scheduling of computations over dynamic resources scattered geographically across the Internet at department, enterprise, or global level with particular emphasis on developing scheduling schemes based on the concept of computational economy for a real test bed, namely, the Globus testbed (GUSTO).
[ { "version": "v1", "created": "Fri, 22 Sep 2000 10:44:16 GMT" } ]
2016-11-18T00:00:00
[ [ "Buyya", "Rajkumar", "" ], [ "Abramson", "David", "" ], [ "Giddy", "Jon", "" ] ]
new_dataset
0.998742
cs/0503040
Zhenlei Shen
Shalinee Kishore, Stuart C. Schwartz, Larry J. Greenstein, H. Vincent Poor
Uplink Throughput in a Single-Macrocell/Single-Microcell CDMA System, with Application to Data Access Points
To appear in IEEE Transactions on Wireless Communications
null
10.1109/TWC.2005.852144
null
cs.IT math.IT
null
This paper studies a two-tier CDMA system in which the microcell base is converted into a data access point (DAP), i.e., a limited-range base station that provides high-speed access to one user at a time. The microcell (or DAP) user operates on the same frequency as the macrocell users and has the same chip rate. However, it adapts its spreading factor, and thus its data rate, in accordance with interference conditions. By contrast, the macrocell serves multiple simultaneous data users, each with the same fixed rate. The achieveable throughput for individual microcell users is examined and a simple, accurate approximation for its probability distribution is presented. Computations for average throughputs, both per-user and total, are also presented. The numerical results highlight the impact of a desensitivity parameter used in the base-selection process.
[ { "version": "v1", "created": "Fri, 18 Mar 2005 16:03:45 GMT" } ]
2016-11-18T00:00:00
[ [ "Kishore", "Shalinee", "" ], [ "Schwartz", "Stuart C.", "" ], [ "Greenstein", "Larry J.", "" ], [ "Poor", "H. Vincent", "" ] ]
new_dataset
0.993683
cs/0503042
Zhenlei Shen
Shalinee Kishore, Larry J. Greenstein, H. Vincent Poor, Stuart C. Schwartz
Uplink User Capacity in a CDMA System with Hotspot Microcells: Effects of Finite Transmit Power and Dispersion
To appear in IEEE Transactions on Wireless Communications
null
10.1109/TWC.2006.1611065
null
cs.IT math.IT
null
This paper examines the uplink user capacity in a two-tier code division multiple access (CDMA) system with hotspot microcells when user terminal power is limited and the wireless channel is finitely-dispersive. A finitely-dispersive channel causes variable fading of the signal power at the output of the RAKE receiver. First, a two-cell system composed of one macrocell and one embedded microcell is studied and analytical methods are developed to estimate the user capacity as a function of a dimensionless parameter that depends on the transmit power constraint and cell radius. Next, novel analytical methods are developed to study the effect of variable fading, both with and without transmit power constraints. Finally, the analytical methods are extended to estimate uplink user capacity for multicell CDMA systems, composed of multiple macrocells and multiple embedded microcells. In all cases, the analysis-based estimates are compared with and confirmed by simulation results.
[ { "version": "v1", "created": "Fri, 18 Mar 2005 17:18:16 GMT" }, { "version": "v2", "created": "Sat, 19 Mar 2005 15:49:49 GMT" } ]
2016-11-18T00:00:00
[ [ "Kishore", "Shalinee", "" ], [ "Greenstein", "Larry J.", "" ], [ "Poor", "H. Vincent", "" ], [ "Schwartz", "Stuart C.", "" ] ]
new_dataset
0.998502
cs/0504016
Navin Kashyap
Olgica Milenkovic, Navin Kashyap, David Leyba
Shortened Array Codes of Large Girth
16 pages; 8 figures; to appear in IEEE Transactions on Information Theory, Aug 2006
null
10.1109/TIT.2006.878179
null
cs.DM cs.IT math.IT
null
One approach to designing structured low-density parity-check (LDPC) codes with large girth is to shorten codes with small girth in such a manner that the deleted columns of the parity-check matrix contain all the variables involved in short cycles. This approach is especially effective if the parity-check matrix of a code is a matrix composed of blocks of circulant permutation matrices, as is the case for the class of codes known as array codes. We show how to shorten array codes by deleting certain columns of their parity-check matrices so as to increase their girth. The shortening approach is based on the observation that for array codes, and in fact for a slightly more general class of LDPC codes, the cycles in the corresponding Tanner graph are governed by certain homogeneous linear equations with integer coefficients. Consequently, we can selectively eliminate cycles from an array code by only retaining those columns from the parity-check matrix of the original code that are indexed by integer sequences that do not contain solutions to the equations governing those cycles. We provide Ramsey-theoretic estimates for the maximum number of columns that can be retained from the original parity-check matrix with the property that the sequence of their indices avoid solutions to various types of cycle-governing equations. This translates to estimates of the rate penalty incurred in shortening a code to eliminate cycles. Simulation results show that for the codes considered, shortening them to increase the girth can lead to significant gains in signal-to-noise ratio in the case of communication over an additive white Gaussian noise channel.
[ { "version": "v1", "created": "Tue, 5 Apr 2005 22:32:25 GMT" }, { "version": "v2", "created": "Wed, 26 Apr 2006 05:57:42 GMT" } ]
2016-11-18T00:00:00
[ [ "Milenkovic", "Olgica", "" ], [ "Kashyap", "Navin", "" ], [ "Leyba", "David", "" ] ]
new_dataset
0.998914
cs/0510068
Sinan Gezici
Sinan Gezici, Zafer Sahinoglu, Hisashi Kobayashi, and H. Vincent Poor
Ultra Wideband Impulse Radio Systems with Multiple Pulse Types
To appear in the IEEE Journal on Selected Areas in Communications - Special Issue on Ultrawideband Wireless Communications: Theory and Applications
null
10.1109/JSAC.2005.863880
null
cs.IT math.IT
null
In an ultra wideband (UWB) impulse radio (IR) system, a number of pulses, each transmitted in an interval called a "frame", is employed to represent one information symbol. Conventionally, a single type of UWB pulse is used in all frames of all users. In this paper, IR systems with multiple types of UWB pulses are considered, where different types of pulses can be used in different frames by different users. Both stored-reference (SR) and transmitted-reference (TR) systems are considered. First, the spectral properties of a multi-pulse IR system with polarity randomization is investigated. It is shown that the average power spectral density is the average of the spectral contents of different pulse shapes. Then, approximate closed-form expressions for the bit error probability of a multi-pulse SR-IR system are derived for RAKE receivers in asynchronous multiuser environments. The effects of both inter-frame interference (IFI) and multiple-access interference (MAI) are analyzed. The theoretical and simulation results indicate that SR-IR systems that are more robust against IFI and MAI than a "conventional" SR-IR system can be designed with multiple types of ultra-wideband pulses. Finally, extensions to multi-pulse TR-IR systems are briefly described.
[ { "version": "v1", "created": "Sun, 23 Oct 2005 16:35:05 GMT" } ]
2016-11-18T00:00:00
[ [ "Gezici", "Sinan", "" ], [ "Sahinoglu", "Zafer", "" ], [ "Kobayashi", "Hisashi", "" ], [ "Poor", "H. Vincent", "" ] ]
new_dataset
0.995186