id
stringlengths
9
10
submitter
stringlengths
2
52
authors
stringlengths
4
6.51k
title
stringlengths
4
246
comments
stringlengths
1
523
journal-ref
stringlengths
4
345
doi
stringlengths
11
120
report-no
stringlengths
2
243
categories
stringlengths
5
98
license
stringclasses
9 values
abstract
stringlengths
33
3.33k
versions
list
update_date
timestamp[s]
authors_parsed
list
prediction
stringclasses
1 value
probability
float64
0.95
1
0704.0590
Rachit Agarwal
Rachit Agarwal, Ralf Koetter and Emanuel Popovici
A Low Complexity Algorithm and Architecture for Systematic Encoding of Hermitian Codes
5 Pages, Accepted in IEEE International Symposium on Information Theory ISIT 2007
null
10.1109/ISIT.2007.4557408
null
cs.IT math.IT
null
We present an algorithm for systematic encoding of Hermitian codes. For a Hermitian code defined over GF(q^2), the proposed algorithm achieves a run time complexity of O(q^2) and is suitable for VLSI implementation. The encoder architecture uses as main blocks q varying-rate Reed-Solomon encoders and achieves a space complexity of O(q^2) in terms of finite field multipliers and memory elements.
[ { "version": "v1", "created": "Wed, 4 Apr 2007 15:06:14 GMT" }, { "version": "v2", "created": "Thu, 5 Apr 2007 11:47:23 GMT" } ]
2016-11-17T00:00:00
[ [ "Agarwal", "Rachit", "" ], [ "Koetter", "Ralf", "" ], [ "Popovici", "Emanuel", "" ] ]
new_dataset
0.987086
0704.2505
G.Susinder Rajan
G. Susinder Rajan and B. Sundar Rajan
Algebraic Distributed Space-Time Codes with Low ML Decoding Complexity
5 pages, no figures. To appear in Proceedings of IEEE ISIT 2007, Nice, France
null
10.1109/ISIT.2007.4557437
null
cs.IT cs.DM math.IT
null
"Extended Clifford algebras" are introduced as a means to obtain low ML decoding complexity space-time block codes. Using left regular matrix representations of two specific classes of extended Clifford algebras, two systematic algebraic constructions of full diversity Distributed Space-Time Codes (DSTCs) are provided for any power of two number of relays. The left regular matrix representation has been shown to naturally result in space-time codes meeting the additional constraints required for DSTCs. The DSTCs so constructed have the salient feature of reduced Maximum Likelihood (ML) decoding complexity. In particular, the ML decoding of these codes can be performed by applying the lattice decoder algorithm on a lattice of four times lesser dimension than what is required in general. Moreover these codes have a uniform distribution of power among the relays and in time, thus leading to a low Peak to Average Power Ratio at the relays.
[ { "version": "v1", "created": "Thu, 19 Apr 2007 11:05:31 GMT" } ]
2016-11-17T00:00:00
[ [ "Rajan", "G. Susinder", "" ], [ "Rajan", "B. Sundar", "" ] ]
new_dataset
0.999175
0704.2651
Lalitha Sankar
Lalitha Sankar, Yingbin Liang, H. Vincent Poor, Narayan B. Mandayam
Opportunistic Communications in an Orthogonal Multiaccess Relay Channel
To appear in the Proceedings of the 2007 IEEE International Symposium on Information Theory, Nice, France, June 24 - 29, 2007
null
10.1109/ISIT.2007.4557396
null
cs.IT math.IT
null
The problem of resource allocation is studied for a two-user fading orthogonal multiaccess relay channel (MARC) where both users (sources) communicate with a destination in the presence of a relay. A half-duplex relay is considered that transmits on a channel orthogonal to that used by the sources. The instantaneous fading state between every transmit-receive pair in this network is assumed to be known at both the transmitter and receiver. Under an average power constraint at each source and the relay, the sum-rate for the achievable strategy of decode-and-forward (DF) is maximized over all power allocations (policies) at the sources and relay. It is shown that the sum-rate maximizing policy exploits the multiuser fading diversity to reveal the optimality of opportunistic channel use by each user. A geometric interpretation of the optimal power policy is also presented.
[ { "version": "v1", "created": "Fri, 20 Apr 2007 04:02:33 GMT" } ]
2016-11-17T00:00:00
[ [ "Sankar", "Lalitha", "" ], [ "Liang", "Yingbin", "" ], [ "Poor", "H. Vincent", "" ], [ "Mandayam", "Narayan B.", "" ] ]
new_dataset
0.970451
0707.1470
Yingbin Liang
Yingbin Liang, H. Vincent Poor and Shlomo Shamai (Shitz)
Secrecy Capacity Region of Fading Broadcast Channels
Proc. of IEEE International Symposium on Information Theory (ISIT), June 2007
null
10.1109/ISIT.2007.4557401
null
cs.IT math.IT
null
The fading broadcast channel with confidential messages (BCC) is investigated, where a source node has common information for two receivers (receivers 1 and 2), and has confidential information intended only for receiver 1. The confidential information needs to be kept as secret as possible from receiver 2. The channel state information (CSI) is assumed to be known at both the transmitter and the receivers. The secrecy capacity region is first established for the parallel Gaussian BCC, and the optimal source power allocations that achieve the boundary of the secrecy capacity region are derived. In particular, the secrecy capacity region is established for the Gaussian case of the Csiszar-Korner BCC model. The secrecy capacity results are then applied to give the ergodic secrecy capacity region for the fading BCC.
[ { "version": "v1", "created": "Tue, 10 Jul 2007 15:16:13 GMT" } ]
2016-11-17T00:00:00
[ [ "Liang", "Yingbin", "", "Shitz" ], [ "Poor", "H. Vincent", "", "Shitz" ], [ "Shamai", "Shlomo", "", "Shitz" ] ]
new_dataset
0.992952
0707.2780
Aydin Sezgin
Aydin Sezgin, Mohamad Charafeddine, Arogyaswami Paulraj
On the ergodic sum-rate performance of CDD in multi-user systems
to appear in Proceedings of 2007 IEEE Information Theory Workshop (ITW) in Lake Tahoe
null
10.1109/ITW.2007.4313052
null
cs.IT math.IT
null
The main focus of space-time coding design and analysis for MIMO systems has been so far focused on single-user systems. For single-user systems, transmit diversity schemes suffer a loss in spectral efficiency if the receiver is equipped with more than one antenna, making them unsuitable for high rate transmission. One such transmit diversity scheme is the cyclic delay diversity code (CDD). The advantage of CDD over other diversity schemes such as orthogonal space-time block codes (OSTBC) is that a code rate of one and delay optimality are achieved independent of the number of transmit antennas. In this work we analyze the ergodic rate of a multi-user multiple access channel (MAC) with each user applying such a cyclic delay diversity (CDD) code. We derive closed form expressions for the ergodic sum-rate of multi-user CDD and compare it with the sum-capacity. We study the ergodic rate region and show that in contrast to what is conventionally known regarding the single-user case, transmit diversity schemes are viable candidates for high rate transmission in multi-user systems. Finally, our theoretical findings are illustrated by numerical simulation results.
[ { "version": "v1", "created": "Wed, 18 Jul 2007 18:39:23 GMT" } ]
2016-11-17T00:00:00
[ [ "Sezgin", "Aydin", "" ], [ "Charafeddine", "Mohamad", "" ], [ "Paulraj", "Arogyaswami", "" ] ]
new_dataset
0.984951
0707.3959
Dung Dao
Dung Ngoc Dao, Chau Yuen, Chintha Tellambura, Yong Liang Guan and Tjeng Thiang Tjhung
Four-Group Decodable Space-Time Block Codes
1 figure. Accepted for publication in IEEE Trans. on Signal Processing
null
10.1109/TSP.2007.906729
null
cs.IT math.IT
null
Two new rate-one full-diversity space-time block codes (STBC) are proposed. They are characterized by the \emph{lowest decoding complexity} among the known rate-one STBC, arising due to the complete separability of the transmitted symbols into four groups for maximum likelihood detection. The first and the second codes are delay-optimal if the number of transmit antennas is a power of 2 and even, respectively. The exact pair-wise error probability is derived to allow for the performance optimization of the two codes. Compared with existing low-decoding complexity STBC, the two new codes offer several advantages such as higher code rate, lower encoding/decoding delay and complexity, lower peak-to-average power ratio, and better performance.
[ { "version": "v1", "created": "Thu, 26 Jul 2007 16:14:33 GMT" } ]
2016-11-17T00:00:00
[ [ "Dao", "Dung Ngoc", "" ], [ "Yuen", "Chau", "" ], [ "Tellambura", "Chintha", "" ], [ "Guan", "Yong Liang", "" ], [ "Tjhung", "Tjeng Thiang", "" ] ]
new_dataset
0.995875
0710.1436
Wojciech Wislicki
Ryszard Gokieli, Krzysztof Nawrocki, Adam Padee, Dorota Stojda, Karol Wawrzyniak, Wojciech Wislicki
Polish grid infrastructure for science and research
Proceeedings of IEEE Eurocon 2007, Warsaw, Poland, 9-12 Sep. 2007, p.446
2007, ISBN 1-4244-0813-X
10.1109/EURCON.2007.4400477
null
cs.DC hep-ex
null
Structure, functionality, parameters and organization of the computing Grid in Poland is described, mainly from the perspective of high-energy particle physics community, currently its largest consumer and developer. It represents distributed Tier-2 in the worldwide Grid infrastructure. It also provides services and resources for data-intensive applications in other sciences.
[ { "version": "v1", "created": "Sun, 7 Oct 2007 17:45:59 GMT" } ]
2016-11-17T00:00:00
[ [ "Gokieli", "Ryszard", "" ], [ "Nawrocki", "Krzysztof", "" ], [ "Padee", "Adam", "" ], [ "Stojda", "Dorota", "" ], [ "Wawrzyniak", "Karol", "" ], [ "Wislicki", "Wojciech", "" ] ]
new_dataset
0.996102
0710.5327
Paul Gardner-Stephen
Paul Gardner-Stephen
Escalating The War On SPAM Through Practical POW Exchange
To be presented at the IEEE Conference On Networking, Adelaide, Australia, November 19-21, 2007
null
10.1109/ICON.2007.4444132
null
cs.NI cs.CR
null
Proof-of-work (POW) schemes have been proposed in the past. One prominent system is HASHCASH (Back, 2002) which uses cryptographic puzzles . However, work by Laurie and Clayton (2004) has shown that for a uniform proof-of-work scheme on email to have an impact on SPAM, it would also be onerous enough to impact on senders of "legitimate" email. I suggest that a non-uniform proof-of-work scheme on email may be a solution to this problem, and describe a framework that has the potential to limit SPAM, without unduly penalising legitimate senders, and is constructed using only current SPAM filter technology, and a small change to the SMTP (Simple Mail Transfer Protocol). Specifically, I argue that it is possible to make sending SPAM 1,000 times more expensive than sending "legitimate" email (so called HAM). Also, unlike the system proposed by Debin Liu and Jean Camp (2006), it does not require the complications of maintaining a reputation system.
[ { "version": "v1", "created": "Mon, 29 Oct 2007 02:01:09 GMT" } ]
2016-11-17T00:00:00
[ [ "Gardner-Stephen", "Paul", "" ] ]
new_dataset
0.988724
0710.5758
Behrouz Khoshnevis
Behrouz Khoshnevis, Wei Yu, and Raviraj Adve
Grassmannian Beamforming for MIMO Amplify-and-Forward Relaying
Submitted to IEEE Journal of Selected Areas in Communications, Special Issue on Exploiting Limited Feedback in Tomorrows Wireless Communication Networks
null
10.1109/JSAC.2008.081006
null
cs.IT math.IT
null
In this paper, we derive the optimal transmitter/ receiver beamforming vectors and relay weighting matrix for the multiple-input multiple-output amplify-and-forward relay channel. The analysis is accomplished in two steps. In the first step, the direct link between the transmitter (Tx) and receiver (Rx) is ignored and we show that the transmitter and the relay should map their signals to the strongest right singular vectors of the Tx-relay and relay-Rx channels. Based on the distributions of these vectors for independent identically distributed (i.i.d.) Rayleigh channels, the Grassmannian codebooks are used for quantizing and sending back the channel information to the transmitter and the relay. The simulation results show that even a few number of bits can considerably increase the link reliability in terms of bit error rate. For the second step, the direct link is considered in the problem model and we derive the optimization problem that identifies the optimal Tx beamforming vector. For the i.i.d Rayleigh channels, we show that the solution to this problem is uniformly distributed on the unit sphere and we justify the appropriateness of the Grassmannian codebook (for determining the optimal beamforming vector), both analytically and by simulation. Finally, a modified quantizing scheme is presented which introduces a negligible degradation in the system performance but significantly reduces the required number of feedback bits.
[ { "version": "v1", "created": "Tue, 30 Oct 2007 21:08:55 GMT" } ]
2016-11-17T00:00:00
[ [ "Khoshnevis", "Behrouz", "" ], [ "Yu", "Wei", "" ], [ "Adve", "Raviraj", "" ] ]
new_dataset
0.974663
0711.3545
Vasanthan Raghavan
Che Lin, Vasanthan Raghavan, Venu Veeravalli
To Code or Not to Code Across Time: Space-Time Coding with Feedback
22 pages, 4 figures, Submitted to IEEE JSAC, Nov. 2007
null
10.1109/JSAC.2008.081024
null
cs.IT math.IT
null
Space-time codes leverage the availability of multiple antennas to enhance the reliability of communication over wireless channels. While space-time codes have initially been designed with a focus on open-loop systems, recent technological advances have enabled the possibility of low-rate feedback from the receiver to the transmitter. The focus of this paper is on the implications of this feedback in a single-user multi-antenna system with a general model for spatial correlation. We assume a limited feedback model, that is, a coherent receiver and statistics along with B bits of quantized channel information at the transmitter. We study space-time coding with a family of linear dispersion (LD) codes that meet an additional orthogonality constraint so as to ensure low-complexity decoding. Our results show that, when the number of bits of feedback (B) is small, a space-time coding scheme that is equivalent to beamforming and does not code across time is optimal in a weak sense in that it maximizes the average received SNR. As B increases, this weak optimality transitions to optimality in a strong sense which is characterized by the maximization of the average mutual information. Thus, from a system designer's perspective, our work suggests that beamforming may not only be attractive from a low-complexity viewpoint, but also from an information-theoretic viewpoint.
[ { "version": "v1", "created": "Thu, 22 Nov 2007 11:10:00 GMT" } ]
2016-11-17T00:00:00
[ [ "Lin", "Che", "" ], [ "Raghavan", "Vasanthan", "" ], [ "Veeravalli", "Venu", "" ] ]
new_dataset
0.983086
0712.2872
Vignesh Sethuraman
Vignesh Sethuraman, Ligong Wang, Bruce Hajek and Amos Lapidoth
Low SNR Capacity of Noncoherent Fading Channels
submitted to IEEE IT
null
10.1109/TIT.2009.2012995
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Discrete-time Rayleigh fading single-input single-output (SISO) and multiple-input multiple-output (MIMO) channels are considered, with no channel state information at the transmitter or the receiver. The fading is assumed to be stationary and correlated in time, but independent from antenna to antenna. Peak-power and average-power constraints are imposed on the transmit antennas. For MIMO channels, these constraints are either imposed on the sum over antennas, or on each individual antenna. For SISO channels and MIMO channels with sum power constraints, the asymptotic capacity as the peak signal-to-noise ratio tends to zero is identified; for MIMO channels with individual power constraints, this asymptotic capacity is obtained for a class of channels called transmit separable channels. The results for MIMO channels with individual power constraints are carried over to SISO channels with delay spread (i.e. frequency selective fading).
[ { "version": "v1", "created": "Tue, 18 Dec 2007 04:28:36 GMT" }, { "version": "v2", "created": "Mon, 15 Dec 2008 07:42:22 GMT" } ]
2016-11-17T00:00:00
[ [ "Sethuraman", "Vignesh", "" ], [ "Wang", "Ligong", "" ], [ "Hajek", "Bruce", "" ], [ "Lapidoth", "Amos", "" ] ]
new_dataset
0.998209
0801.1282
Shashi Kiran Chilappagari
Shashi Kiran Chilappagari, Anantha Raman Krishnan, Bane Vasic
LDPC Codes Which Can Correct Three Errors Under Iterative Decoding
5 pages, 3 figures, submitted to IEEE Information Theory Workshop (ITW), 2008
null
10.1109/ITW.2008.4578696
null
cs.IT math.IT
null
In this paper, we provide necessary and sufficient conditions for a column-weight-three LDPC code to correct three errors when decoded using Gallager A algorithm. We then provide a construction technique which results in a code satisfying the above conditions. We also provide numerical assessment of code performance via simulation results.
[ { "version": "v1", "created": "Tue, 8 Jan 2008 17:12:21 GMT" } ]
2016-11-17T00:00:00
[ [ "Chilappagari", "Shashi Kiran", "" ], [ "Krishnan", "Anantha Raman", "" ], [ "Vasic", "Bane", "" ] ]
new_dataset
0.998594
0802.1754
Jay Kumar Sundararajan
Jay Kumar Sundararajan, Devavrat Shah and Muriel M\'edard
ARQ for Network Coding
Submitted to the 2008 IEEE International Symposium on Information Theory (ISIT 2008)
null
10.1109/ISIT.2008.4595268
null
cs.IT cs.NI math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A new coding and queue management algorithm is proposed for communication networks that employ linear network coding. The algorithm has the feature that the encoding process is truly online, as opposed to a block-by-block approach. The setup assumes a packet erasure broadcast channel with stochastic arrivals and full feedback, but the proposed scheme is potentially applicable to more general lossy networks with link-by-link feedback. The algorithm guarantees that the physical queue size at the sender tracks the backlog in degrees of freedom (also called the virtual queue size). The new notion of a node "seeing" a packet is introduced. In terms of this idea, our algorithm may be viewed as a natural extension of ARQ schemes to coded networks. Our approach, known as the drop-when-seen algorithm, is compared with a baseline queuing approach called drop-when-decoded. It is shown that the expected queue size for our approach is $O(\frac1{1-\rho})$ as opposed to $\Omega(\frac1{(1-\rho)^2})$ for the baseline approach, where $\rho$ is the load factor.
[ { "version": "v1", "created": "Wed, 13 Feb 2008 02:01:54 GMT" } ]
2016-11-17T00:00:00
[ [ "Sundararajan", "Jay Kumar", "" ], [ "Shah", "Devavrat", "" ], [ "Médard", "Muriel", "" ] ]
new_dataset
0.997216
0802.4282
Man-On Pun
Dong Zheng, Man-On Pun, Weiyan Ge, Junshan Zhang and H. Vincent Poor
Distributed Opportunistic Scheduling For Ad-Hoc Communications Under Noisy Channel Estimation
Proceedings of the 2008 IEEE International Conference on Communications, Beijing, May 19-23, 2008
null
10.1109/ICC.2008.698
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Distributed opportunistic scheduling is studied for wireless ad-hoc networks, where many links contend for one channel using random access. In such networks, distributed opportunistic scheduling (DOS) involves a process of joint channel probing and distributed scheduling. It has been shown that under perfect channel estimation, the optimal DOS for maximizing the network throughput is a pure threshold policy. In this paper, this formalism is generalized to explore DOS under noisy channel estimation, where the transmission rate needs to be backed off from the estimated rate to reduce the outage. It is shown that the optimal scheduling policy remains to be threshold-based, and that the rate threshold turns out to be a function of the variance of the estimation error and be a functional of the backoff rate function. Since the optimal backoff rate is intractable, a suboptimal linear backoff scheme that backs off the estimated signal-to-noise ratio (SNR) and hence the rate is proposed. The corresponding optimal backoff ratio and rate threshold can be obtained via an iterative algorithm. Finally, simulation results are provided to illustrate the tradeoff caused by increasing training time to improve channel estimation at the cost of probing efficiency.
[ { "version": "v1", "created": "Thu, 28 Feb 2008 20:36:43 GMT" } ]
2016-11-17T00:00:00
[ [ "Zheng", "Dong", "" ], [ "Pun", "Man-On", "" ], [ "Ge", "Weiyan", "" ], [ "Zhang", "Junshan", "" ], [ "Poor", "H. Vincent", "" ] ]
new_dataset
0.966784
0803.1144
Nadia Fawaz
Nadia Fawaz, Keyvan Zarifi, Merouane Debbah, David Gesbert
Asymptotic Capacity and Optimal Precoding Strategy of Multi-Level Precode & Forward in Correlated Channels
5 pages, 3 figures, to be published in proceedings of IEEE Information Theory Workshop 2008
null
10.1109/ITW.2008.4578651
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We analyze a multi-level MIMO relaying system where a multiple-antenna transmitter sends data to a multipleantenna receiver through several relay levels, also equipped with multiple antennas. Assuming correlated fading in each hop, each relay receives a faded version of the signal transmitted by the previous level, performs precoding on the received signal and retransmits it to the next level. Using free probability theory and assuming that the noise power at the relay levels - but not at the receiver - is negligible, a closed-form expression of the end-to-end asymptotic instantaneous mutual information is derived as the number of antennas in all levels grow large with the same rate. This asymptotic expression is shown to be independent from the channel realizations, to only depend on the channel statistics and to also serve as the asymptotic value of the end-to-end average mutual information. We also provide the optimal singular vectors of the precoding matrices that maximize the asymptotic mutual information : the optimal transmit directions represented by the singular vectors of the precoding matrices are aligned on the eigenvectors of the channel correlation matrices, therefore they can be determined only using the known statistics of the channel matrices and do not depend on a particular channel realization.
[ { "version": "v1", "created": "Fri, 7 Mar 2008 17:56:36 GMT" } ]
2016-11-17T00:00:00
[ [ "Fawaz", "Nadia", "" ], [ "Zarifi", "Keyvan", "" ], [ "Debbah", "Merouane", "" ], [ "Gesbert", "David", "" ] ]
new_dataset
0.998689
0803.4025
Ganesh M. Narayan
Ganesh M. Narayan, K. Gopinath, V. Sridhar
Structure and Interpretation of Computer Programs
9 pages, 10pt, double column, 15 figures
2nd IEEE International Symposium on Theoretical Aspects of Software Engineering, 2008, Nanjing, China
10.1109/TASE.2008.40
null
cs.SE cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Call graphs depict the static, caller-callee relation between "functions" in a program. With most source/target languages supporting functions as the primitive unit of composition, call graphs naturally form the fundamental control flow representation available to understand/develop software. They are also the substrate on which various interprocedural analyses are performed and are integral part of program comprehension/testing. Given their universality and usefulness, it is imperative to ask if call graphs exhibit any intrinsic graph theoretic features -- across versions, program domains and source languages. This work is an attempt to answer these questions: we present and investigate a set of meaningful graph measures that help us understand call graphs better; we establish how these measures correlate, if any, across different languages and program domains; we also assess the overall, language independent software quality by suitably interpreting these measures.
[ { "version": "v1", "created": "Thu, 27 Mar 2008 22:58:43 GMT" } ]
2016-11-17T00:00:00
[ [ "Narayan", "Ganesh M.", "" ], [ "Gopinath", "K.", "" ], [ "Sridhar", "V.", "" ] ]
new_dataset
0.963235
0805.0092
Oren Somekh
Oren Somekh, Osvaldo Simeone, H. Vincent Poor, and Shlomo Shamai (Shitz)
Cellular Systems with Full-Duplex Compress-and-Forward Relaying and Cooperative Base Stations
Proceedings of the 2008 IEEE International Symposium on Information Theory, Toronto, ON, Canada, July 6 - 11, 2008
null
10.1109/ISIT.2008.4595357
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper the advantages provided by multicell processing of signals transmitted by mobile terminals (MTs) which are received via dedicated relay terminals (RTs) are studied. It is assumed that each RT is capable of full-duplex operation and receives the transmission of adjacent relay terminals. Focusing on intra-cell TDMA and non-fading channels, a simplified relay-aided uplink cellular model based on a model introduced by Wyner is considered. Assuming a nomadic application in which the RTs are oblivious to the MTs' codebooks, a form of distributed compress-and-forward (CF) scheme with decoder side information is employed. The per-cell sum-rate of the CF scheme is derived and is given as a solution of a simple fixed point equation. This achievable rate reveals that the CF scheme is able to completely eliminate the inter-relay interference, and it approaches a ``cut-set-like'' upper bound for strong RTs transmission power. The CF rate is also shown to surpass the rate of an amplify-and-forward scheme via numerical calculations for a wide range of the system parameters.
[ { "version": "v1", "created": "Thu, 1 May 2008 13:22:35 GMT" } ]
2016-11-17T00:00:00
[ [ "Somekh", "Oren", "", "Shitz" ], [ "Simeone", "Osvaldo", "", "Shitz" ], [ "Poor", "H. Vincent", "", "Shitz" ], [ "Shamai", "Shlomo", "", "Shitz" ] ]
new_dataset
0.996741
0805.1485
Oren Somekh
Osvaldo Simeone, Oren Somekh, H. Vincent Poor, and Shlomo Shamai (Shitz)
Distributed MIMO Systems with Oblivious Antennas
In Proc. of the 2008 IEEE International Symposium on Information Theory (ISIT 2008), Toronto, Ontario, Canada
null
10.1109/ISIT.2008.4595119
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A scenario in which a single source communicates with a single destination via a distributed MIMO transceiver is considered. The source operates each of the transmit antennas via finite-capacity links, and likewise the destination is connected to the receiving antennas through capacity-constrained channels. Targeting a nomadic communication scenario, in which the distributed MIMO transceiver is designed to serve different standards or services, transmitters and receivers are assumed to be oblivious to the encoding functions shared by source and destination. Adopting a Gaussian symmetric interference network as the channel model (as for regularly placed transmitters and receivers), achievable rates are investigated and compared with an upper bound. It is concluded that in certain asymptotic and non-asymptotic regimes obliviousness of transmitters and receivers does not cause any loss of optimality.
[ { "version": "v1", "created": "Sat, 10 May 2008 16:53:54 GMT" } ]
2016-11-17T00:00:00
[ [ "Simeone", "Osvaldo", "", "Shitz" ], [ "Somekh", "Oren", "", "Shitz" ], [ "Poor", "H. Vincent", "", "Shitz" ], [ "Shamai", "Shlomo", "", "Shitz" ] ]
new_dataset
0.998589
0805.2996
Deniz Gunduz
Deniz Gunduz, Elza Erkip, Andrea J. Goldsmith, H. Vincent Poor
Lossy Source Transmission over the Relay Channel
Proceedings of the 2008 IEEE International Symposium on Information Theory, Toronto, ON, Canada, July 6 - 11, 2008
null
10.1109/ISIT.2008.4595359
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Lossy transmission over a relay channel in which the relay has access to correlated side information is considered. First, a joint source-channel decode-and-forward scheme is proposed for general discrete memoryless sources and channels. Then the Gaussian relay channel where the source and the side information are jointly Gaussian is analyzed. For this Gaussian model, several new source-channel cooperation schemes are introduced and analyzed in terms of the squared-error distortion at the destination. A comparison of the proposed upper bounds with the cut-set lower bound is given, and it is seen that joint source-channel cooperation improves the reconstruction quality significantly. Moreover, the performance of the joint code is close to the lower bound on distortion for a wide range of source and channel parameters.
[ { "version": "v1", "created": "Tue, 20 May 2008 02:45:47 GMT" } ]
2016-11-17T00:00:00
[ [ "Gunduz", "Deniz", "" ], [ "Erkip", "Elza", "" ], [ "Goldsmith", "Andrea J.", "" ], [ "Poor", "H. Vincent", "" ] ]
new_dataset
0.991969
0806.0036
Mahdi Ramezani
Ali Sanaei, Mahdi Ramezani, and Masoud Ardakani
On the Design of Universal LDPC Codes
5 pages, 2 figures, To appear in Proc. IEEE International Symposium on Information Theory (ISIT 2008), Toronto, Canada, July 2008
null
10.1109/ISIT.2008.4595097
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Low-density parity-check (LDPC) coding for a multitude of equal-capacity channels is studied. First, based on numerous observations, a conjecture is stated that when the belief propagation decoder converges on a set of equal-capacity channels, it would also converge on any convex combination of those channels. Then, it is proved that when the stability condition is satisfied for a number of channels, it is also satisfied for any channel in their convex hull. For the purpose of code design, a method is proposed which can decompose every symmetric channel with capacity C into a set of identical-capacity basis channels. We expect codes that work on the basis channels to be suitable for any channel with capacity C. Such codes are found and in comparison with existing LDPC codes that are designed for specific channels, our codes obtain considerable coding gains when used across a multitude of channels.
[ { "version": "v1", "created": "Fri, 30 May 2008 22:03:00 GMT" } ]
2016-11-17T00:00:00
[ [ "Sanaei", "Ali", "" ], [ "Ramezani", "Mahdi", "" ], [ "Ardakani", "Masoud", "" ] ]
new_dataset
0.996799
0806.1577
Harshan Jagadeesh
J. Harshan, B. Sundar Rajan
Co-ordinate Interleaved Distributed Space-Time Coding for Two-Antenna-Relays Networks
To appear in IEEE Transactions on Wireless Communications. 09 pages, 06 figures
null
10.1109/TWC.2009.071303
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Distributed space time coding for wireless relay networks when the source, the destination and the relays have multiple antennas have been studied by Jing and Hassibi. In this set-up, the transmit and the receive signals at different antennas of the same relay are processed and designed independently, even though the antennas are colocated. In this paper, a wireless relay network with single antenna at the source and the destination and two antennas at each of the R relays is considered. A new class of distributed space time block codes called Co-ordinate Interleaved Distributed Space-Time Codes (CIDSTC) are introduced where, in the first phase, the source transmits a T-length complex vector to all the relays and in the second phase, at each relay, the in-phase and quadrature component vectors of the received complex vectors at the two antennas are interleaved and processed before forwarding them to the destination. Compared to the scheme proposed by Jing-Hassibi, for $T \geq 4R$, while providing the same asymptotic diversity order of 2R, CIDSTC scheme is shown to provide asymptotic coding gain with the cost of negligible increase in the processing complexity at the relays. However, for moderate and large values of P, CIDSTC scheme is shown to provide more diversity than that of the scheme proposed by Jing-Hassibi. CIDSTCs are shown to be fully diverse provided the information symbols take value from an appropriate multi-dimensional signal set.
[ { "version": "v1", "created": "Tue, 10 Jun 2008 05:45:23 GMT" }, { "version": "v2", "created": "Tue, 5 Aug 2008 11:29:09 GMT" } ]
2016-11-17T00:00:00
[ [ "Harshan", "J.", "" ], [ "Rajan", "B. Sundar", "" ] ]
new_dataset
0.99857
0808.0272
Ki-Moon Lee
Ki-Moon Lee, Hayder Radha, and Beom-Jin Kim
Kovalenko's Full-Rank Limit and Overhead as Lower Bounds for Error-Performances of LDPC and LT Codes over Binary Erasure Channels
A short version of this paper was presented at ISITA 2008, Auckland NZ. The first draft was submitted to IEEE Transactions on Information Theory, 2008/06
null
10.1109/ISITA.2008.4895488
null
cs.IT cs.DM math.CO math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present Kovalenko's full-rank limit as a tight lower bound for decoding error probability of LDPC codes and LT codes over BEC. From the limit, we derive a full-rank overhead as a lower bound for stable overheads for successful maximum-likelihood decoding of the codes.
[ { "version": "v1", "created": "Sat, 2 Aug 2008 18:03:31 GMT" }, { "version": "v2", "created": "Tue, 13 Jan 2009 08:02:00 GMT" } ]
2016-11-17T00:00:00
[ [ "Lee", "Ki-Moon", "" ], [ "Radha", "Hayder", "" ], [ "Kim", "Beom-Jin", "" ] ]
new_dataset
0.995748
0808.0745
Caleb Lo
Caleb K. Lo, John J. Hasenbein, Sriram Vishwanath and Robert W. Heath Jr
Relay-Assisted User Scheduling in Wireless Networks with Hybrid-ARQ
14 pages, 5 figures, submitted to the IEEE Transactions on Vehicular Technology in October 2008, revised in March 2009 and May 2009
null
10.1109/TVT.2009.2027711
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper studies the problem of relay-assisted user scheduling for downlink wireless transmission. The base station or access point employs hybrid automatic-repeat-request (HARQ) with the assistance of a set of fixed relays to serve a set of mobile users. By minimizing a cost function of the queue lengths at the base station and the number of retransmissions of the head-of-line packet for each user, the base station can schedule an appropriate user in each time slot and an appropriate transmitter to serve it. It is shown that a priority-index policy is optimal for a linear cost function with packets arriving according to a Poisson process and for an increasing convex cost function where packets must be drained from the queues at the base station.
[ { "version": "v1", "created": "Tue, 5 Aug 2008 23:53:26 GMT" }, { "version": "v2", "created": "Tue, 7 Oct 2008 00:03:40 GMT" }, { "version": "v3", "created": "Thu, 9 Oct 2008 18:07:18 GMT" }, { "version": "v4", "created": "Thu, 19 Mar 2009 00:14:59 GMT" }, { "version": "v5", "created": "Sat, 16 May 2009 23:30:33 GMT" } ]
2016-11-17T00:00:00
[ [ "Lo", "Caleb K.", "" ], [ "Hasenbein", "John J.", "" ], [ "Vishwanath", "Sriram", "" ], [ "Heath", "Robert W.", "Jr" ] ]
new_dataset
0.982235
0808.2591
Panos Papadimitratos
Jun Luo, Panos Papadimitratos and Jean-Pierre Hubaux
GossiCrypt: Wireless Sensor Network Data Confidentiality Against Parasitic Adversaries
null
Proceedings of the Fifth IEEE-CS Conference on Sensor, Mesh and Ad Hoc Communi- cations and Networks (IEEE SECON), pages 441{450, San Francisco, CA, USA, June 2008
10.1109/SAHCN.2008.60
null
cs.CR cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Resource and cost constraints remain a challenge for wireless sensor network security. In this paper, we propose a new approach to protect confidentiality against a parasitic adversary, which seeks to exploit sensor networks by obtaining measurements in an unauthorized way. Our low-complexity solution, GossiCrypt, leverages on the large scale of sensor networks to protect confidentiality efficiently and effectively. GossiCrypt protects data by symmetric key encryption at their source nodes and re-encryption at a randomly chosen subset of nodes en route to the sink. Furthermore, it employs key refreshing to mitigate the physical compromise of cryptographic keys. We validate GossiCrypt analytically and with simulations, showing it protects data confidentiality with probability almost one. Moreover, compared with a system that uses public-key data encryption, the energy consumption of GossiCrypt is one to three orders of magnitude lower.
[ { "version": "v1", "created": "Tue, 19 Aug 2008 13:23:21 GMT" } ]
2016-11-17T00:00:00
[ [ "Luo", "Jun", "" ], [ "Papadimitratos", "Panos", "" ], [ "Hubaux", "Jean-Pierre", "" ] ]
new_dataset
0.98044
0809.5022
Jay Kumar Sundararajan
Jay Kumar Sundararajan, Devavrat Shah, Muriel Medard, Michael Mitzenmacher, Joao Barros
Network coding meets TCP
9 pages, 9 figures, submitted to IEEE INFOCOM 2009
null
10.1109/INFCOM.2009.5061931
null
cs.NI cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose a mechanism that incorporates network coding into TCP with only minor changes to the protocol stack, thereby allowing incremental deployment. In our scheme, the source transmits random linear combinations of packets currently in the congestion window. At the heart of our scheme is a new interpretation of ACKs - the sink acknowledges every degree of freedom (i.e., a linear combination that reveals one unit of new information) even if it does not reveal an original packet immediately. Such ACKs enable a TCP-like sliding-window approach to network coding. Our scheme has the nice property that packet losses are essentially masked from the congestion control algorithm. Our algorithm therefore reacts to packet drops in a smooth manner, resulting in a novel and effective approach for congestion control over networks involving lossy links such as wireless links. Our experiments show that our algorithm achieves higher throughput compared to TCP in the presence of lossy wireless links. We also establish the soundness and fairness properties of our algorithm.
[ { "version": "v1", "created": "Mon, 29 Sep 2008 19:51:21 GMT" } ]
2016-11-17T00:00:00
[ [ "Sundararajan", "Jay Kumar", "" ], [ "Shah", "Devavrat", "" ], [ "Medard", "Muriel", "" ], [ "Mitzenmacher", "Michael", "" ], [ "Barros", "Joao", "" ] ]
new_dataset
0.996729
0903.1388
Rajkumar Buyya
Chao Jin, Jayavardhana Gubbi, Rajkumar Buyya, and Marimuthu Palaniswami
Jeeva: Enterprise Grid-enabled Web Portal for Protein Secondary Structure Prediction
7 pages
Proceedings of the 16th International Conference on Advanced Computing and Communication (ADCOM 2008, IEEE Press, New York, USA), Dec. 14-17, 2008, Chennai, India
10.1109/ADCOM.2008.4760440
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents a Grid portal for protein secondary structure prediction developed by using services of Aneka, a .NET-based enterprise Grid technology. The portal is used by research scientists to discover new prediction structures in a parallel manner. An SVM (Support Vector Machine)-based prediction algorithm is used with 64 sample protein sequences as a case study to demonstrate the potential of enterprise Grids.
[ { "version": "v1", "created": "Sun, 8 Mar 2009 04:50:53 GMT" } ]
2016-11-17T00:00:00
[ [ "Jin", "Chao", "" ], [ "Gubbi", "Jayavardhana", "" ], [ "Buyya", "Rajkumar", "" ], [ "Palaniswami", "Marimuthu", "" ] ]
new_dataset
0.964167
0906.1599
Tobias Lutz
Tobias Lutz, Christoph Hausl, Ralf K\"otter
Bits Through Deterministic Relay Cascades with Half-Duplex Constraint
accepted for publication in IEEE Transactions on Information Theory
null
10.1109/TIT.2011.2169542
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Consider a relay cascade, i.e. a network where a source node, a sink node and a certain number of intermediate source/relay nodes are arranged on a line and where adjacent node pairs are connected by error-free (q+1)-ary pipes. Suppose the source and a subset of the relays wish to communicate independent information to the sink under the condition that each relay in the cascade is half-duplex constrained. A coding scheme is developed which transfers information by an information-dependent allocation of the transmission and reception slots of the relays. The coding scheme requires synchronization on the symbol level through a shared clock. The coding strategy achieves capacity for a single source. Numerical values for the capacity of cascades of various lengths are provided, and the capacities are significantly higher than the rates which are achievable with a predetermined time-sharing approach. If the cascade includes a source and a certain number of relays with their own information, the strategy achieves the cut-set bound when the rates of the relay sources fall below certain thresholds. For cascades composed of an infinite number of half-duplex constrained relays and a single source, we derive an explicit capacity expression. Remarkably, the capacity in bits/use for q=1 is equal to the logarithm of the golden ratio, and the capacity for q=2 is 1 bit/use.
[ { "version": "v1", "created": "Mon, 8 Jun 2009 21:39:44 GMT" }, { "version": "v2", "created": "Tue, 14 Jul 2009 13:15:18 GMT" }, { "version": "v3", "created": "Mon, 22 Aug 2011 18:39:51 GMT" } ]
2016-11-17T00:00:00
[ [ "Lutz", "Tobias", "" ], [ "Hausl", "Christoph", "" ], [ "Kötter", "Ralf", "" ] ]
new_dataset
0.971326
0907.2252
Dilip Krishnaswamy
Dilip Krishnaswamy
AWiMA: An architecture for Adhoc Wireless Mobile internet Access
5 pages, 3 figures, submitted to IEEE Globecom 2008
null
10.1109/GLOCOM.2008.ECP.1083
null
cs.NI
http://creativecommons.org/licenses/by/3.0/
This paper suggests a system architecture for wireless widearea- networking access using adhoc networking between a mobile Client node without direct connectivity to a wirelesswide- area-network and a mobile Service Provider node with connectivity to a wireless-wide-area-network. It provides a means for securely providing such adhoc wireless networking services using a Server for tunneling and routing, registration and authentication. The architecture also provides support for handoff of a Client node from one Service Provider to another with persistence of a tunnel between the Client and the Server enabling a soft-handoff. Different wireless protocols may be used for adhoc networking, with filtered interconnection of authenticated Clients implemented at a Service Provider node. The architecture is applicable across different wide-areanetwork protocols, and provides simultaneous support for multiple wide-area-network protocols.
[ { "version": "v1", "created": "Mon, 13 Jul 2009 20:10:29 GMT" } ]
2016-11-17T00:00:00
[ [ "Krishnaswamy", "Dilip", "" ] ]
new_dataset
0.998469
0908.3929
Stephen Smith
Stephen L. Smith, Shaunak D. Bopardikar, and Francesco Bullo
A Dynamic Boundary Guarding Problem with Translating Targets
Extended version of paper for the joint 48th IEEE Conference on Decision and Control and 28th Chinese Control Conference
null
10.1109/CDC.2009.5400538
null
cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce a problem in which a service vehicle seeks to guard a deadline (boundary) from dynamically arriving mobile targets. The environment is a rectangle and the deadline is one of its edges. Targets arrive continuously over time on the edge opposite the deadline, and move towards the deadline at a fixed speed. The goal for the vehicle is to maximize the fraction of targets that are captured before reaching the deadline. We consider two cases; when the service vehicle is faster than the targets, and; when the service vehicle is slower than the targets. In the first case we develop a novel vehicle policy based on computing longest paths in a directed acyclic graph. We give a lower bound on the capture fraction of the policy and show that the policy is optimal when the distance between the target arrival edge and deadline becomes very large. We present numerical results which suggest near optimal performance away from this limiting regime. In the second case, when the targets are slower than the vehicle, we propose a policy based on servicing fractions of the translational minimum Hamiltonian path. In the limit of low target speed and high arrival rate, the capture fraction of this policy is within a small constant factor of the optimal.
[ { "version": "v1", "created": "Thu, 27 Aug 2009 02:26:40 GMT" } ]
2016-11-17T00:00:00
[ [ "Smith", "Stephen L.", "" ], [ "Bopardikar", "Shaunak D.", "" ], [ "Bullo", "Francesco", "" ] ]
new_dataset
0.999761
0909.1623
Sudarshan Shinde
Sudarshan Shinde
Two channel paraunitary filter banks based on linear canonical transform
10 pages, IEEE format
null
10.1109/TSP.2010.2089681
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper a two channel paraunitary filter bank is proposed, which is based on linear canonical transform, instead of discrete Fourier transform. Input-output relation for such a filter bank are derived in terms of polyphase matrices and modulation matrices. It is shown that like conventional filter banks, the LCT based paraunitary filter banks need only one filter to be designed and rest of the filters can be obtained from it. It is also shown that LCT based paraunitary filter banks can be designed by using conventional power-symmetric filter design in Fourier domain.
[ { "version": "v1", "created": "Wed, 9 Sep 2009 06:57:41 GMT" } ]
2016-11-17T00:00:00
[ [ "Shinde", "Sudarshan", "" ] ]
new_dataset
0.99166
0910.2486
Yunnan Wu
Yunnan Wu
A Construction of Systematic MDS Codes with Minimum Repair Bandwidth
Submitted to IEEE Transactions on Information Theory on August 14, 2009
null
10.1109/TIT.2011.2134170
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In a distributed storage system based on erasure coding, an important problem is the \emph{repair problem}: If a node storing a coded piece fails, in order to maintain the same level of reliability, we need to create a new encoded piece and store it at a new node. This paper presents a construction of systematic $(n,k)$-MDS codes for $2k\le n$ that achieves the minimum repair bandwidth when repairing from $k+1$ nodes.
[ { "version": "v1", "created": "Tue, 13 Oct 2009 22:22:58 GMT" } ]
2016-11-17T00:00:00
[ [ "Wu", "Yunnan", "" ] ]
new_dataset
0.967681
0911.1426
Hossein Bagheri
Hossein Bagheri, Abolfazl S. Motahari, and Amir K. Khandani
On the Capacity of the Half-Duplex Diamond Channel
25 pages, 2 figures, submitted to IEEE Transactions on Information Theory
null
10.1109/ISIT.2010.5513566
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, a dual-hop communication system composed of a source S and a destination D connected through two non-interfering half-duplex relays, R1 and R2, is considered. In the literature of Information Theory, this configuration is known as the diamond channel. In this setup, four transmission modes are present, namely: 1) S transmits, and R1 and R2 listen (broadcast mode), 2) S transmits, R1 listens, and simultaneously, R2 transmits and D listens. 3) S transmits, R2 listens, and simultaneously, R1 transmits and D listens. 4) R1, R2 transmit, and D listens (multiple-access mode). Assuming a constant power constraint for all transmitters, a parameter $\Delta$ is defined, which captures some important features of the channel. It is proven that for $\Delta$=0 the capacity of the channel can be attained by successive relaying, i.e, using modes 2 and 3 defined above in a successive manner. This strategy may have an infinite gap from the capacity of the channel when $\Delta\neq$0. To achieve rates as close as 0.71 bits to the capacity, it is shown that the cases of $\Delta$>0 and $\Delta$<0 should be treated differently. Using new upper bounds based on the dual problem of the linear program associated with the cut-set bounds, it is proven that the successive relaying strategy needs to be enhanced by an additional broadcast mode (mode 1), or multiple access mode (mode 4), for the cases of $\Delta$<0 and $\Delta$>0, respectively. Furthermore, it is established that under average power constraints the aforementioned strategies achieve rates as close as 3.6 bits to the capacity of the channel.
[ { "version": "v1", "created": "Mon, 9 Nov 2009 20:58:23 GMT" } ]
2016-11-17T00:00:00
[ [ "Bagheri", "Hossein", "" ], [ "Motahari", "Abolfazl S.", "" ], [ "Khandani", "Amir K.", "" ] ]
new_dataset
0.999159
0911.5462
Mahdi S. Hosseini
Mahdi S. Hosseini, Babak N. Araabi, and Hamid Soltanian-Zadeh
Pigment Melanin: Pattern for Iris Recognition
To be Published on Special Issue on Biometrics, IEEE Transaction on Instruments and Measurements, Volume 59, Issue number 4, April 2010
null
10.1109/TIM.2009.2037996
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recognition of iris based on Visible Light (VL) imaging is a difficult problem because of the light reflection from the cornea. Nonetheless, pigment melanin provides a rich feature source in VL, unavailable in Near-Infrared (NIR) imaging. This is due to biological spectroscopy of eumelanin, a chemical not stimulated in NIR. In this case, a plausible solution to observe such patterns may be provided by an adaptive procedure using a variational technique on the image histogram. To describe the patterns, a shape analysis method is used to derive feature-code for each subject. An important question is how much the melanin patterns, extracted from VL, are independent of iris texture in NIR. With this question in mind, the present investigation proposes fusion of features extracted from NIR and VL to boost the recognition performance. We have collected our own database (UTIRIS) consisting of both NIR and VL images of 158 eyes of 79 individuals. This investigation demonstrates that the proposed algorithm is highly sensitive to the patterns of cromophores and improves the iris recognition rate.
[ { "version": "v1", "created": "Sun, 29 Nov 2009 07:07:54 GMT" } ]
2016-11-17T00:00:00
[ [ "Hosseini", "Mahdi S.", "" ], [ "Araabi", "Babak N.", "" ], [ "Soltanian-Zadeh", "Hamid", "" ] ]
new_dataset
0.999337
1001.2411
Uwe Aickelin
Julie Greensmith, Jamie Twycross, Uwe Aickelin
Dendritic Cells for Anomaly Detection
8 pages, 10 tables, 4 figures, IEEE Congress on Evolutionary Computation (CEC2006), Vancouver, Canada
Proceedings of the IEEE Congress on Evolutionary Computation (CEC2006), Vancouver, Canada
10.1109/CEC.2006.1688374
null
cs.AI cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Artificial immune systems, more specifically the negative selection algorithm, have previously been applied to intrusion detection. The aim of this research is to develop an intrusion detection system based on a novel concept in immunology, the Danger Theory. Dendritic Cells (DCs) are antigen presenting cells and key to the activation of the human signals from the host tissue and correlate these signals with proteins know as antigens. In algorithmic terms, individual DCs perform multi-sensor data fusion based on time-windows. The whole population of DCs asynchronously correlates the fused signals with a secondary data stream. The behaviour of human DCs is abstracted to form the DC Algorithm (DCA), which is implemented using an immune inspired framework, libtissue. This system is used to detect context switching for a basic machine learning dataset and to detect outgoing portscans in real-time. Experimental results show a significant difference between an outgoing portscan and normal traffic.
[ { "version": "v1", "created": "Thu, 14 Jan 2010 10:51:41 GMT" } ]
2016-11-17T00:00:00
[ [ "Greensmith", "Julie", "" ], [ "Twycross", "Jamie", "" ], [ "Aickelin", "Uwe", "" ] ]
new_dataset
0.999274
1001.2806
Ruoheng Liu
Ruoheng Liu, Tie Liu, H. Vincent Poor, and Shlomo Shamai (Shitz)
MIMO Gaussian Broadcast Channels with Confidential and Common Messages
Submitted to 2010 IEEE International Symposium on Information Theory, Austin, Texas
null
10.1109/ISIT.2010.5513775
null
cs.IT cs.CR math.IT
http://creativecommons.org/licenses/by/3.0/
This paper considers the problem of secret communication over a two-receiver multiple-input multiple-output (MIMO) Gaussian broadcast channel. The transmitter has two independent, confidential messages and a common message. Each of the confidential messages is intended for one of the receivers but needs to be kept perfectly secret from the other, and the common message is intended for both receivers. It is shown that a natural scheme that combines secret dirty-paper coding with Gaussian superposition coding achieves the secrecy capacity region. To prove this result, a channel-enhancement approach and an extremal entropy inequality of Weingarten et al. are used.
[ { "version": "v1", "created": "Mon, 18 Jan 2010 05:44:14 GMT" } ]
2016-11-17T00:00:00
[ [ "Liu", "Ruoheng", "", "Shitz" ], [ "Liu", "Tie", "", "Shitz" ], [ "Poor", "H. Vincent", "", "Shitz" ], [ "Shamai", "Shlomo", "", "Shitz" ] ]
new_dataset
0.999364
1001.3765
Silvija Kokalj-Filipovic
Silvija Kokalj-Filipovic, Predrag Spasojevic, Emina Soljanin
Doped Fountain Coding for Minimum Delay Data Collection in Circular Networks
null
IEEE Journal on Selected Areas in Communications (JSAC), Special issue on Network Coding for Wireless Communication Networks, Vol. 27, Nr. 5 (2009), p. 673-684
10.1109/JSAC.2009.090609
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper studies decentralized, Fountain and network-coding based strategies for facilitating data collection in circular wireless sensor networks, which rely on the stochastic diversity of data storage. The goal is to allow for a reduced delay collection by a data collector who accesses the network at a random position and random time. Data dissemination is performed by a set of relays which form a circular route to exchange source packets. The storage nodes within the transmission range of the route's relays linearly combine and store overheard relay transmissions using random decentralized strategies. An intelligent data collector first collects a minimum set of coded packets from a subset of storage nodes in its proximity, which might be sufficient for recovering the original packets and, by using a message-passing decoder, attempts recovering all original source packets from this set. Whenever the decoder stalls, the source packet which restarts decoding is polled/doped from its original source node. The random-walk-based analysis of the decoding/doping process furnishes the collection delay analysis with a prediction on the number of required doped packets. The number of doped packets can be surprisingly small when employed with an Ideal Soliton code degree distribution and, hence, the doping strategy may have the least collection delay when the density of source nodes is sufficiently large. Furthermore, we demonstrate that network coding makes dissemination more efficient at the expense of a larger collection delay. Not surprisingly, a circular network allows for a significantly more (analytically and otherwise) tractable strategies relative to a network whose model is a random geometric graph.
[ { "version": "v1", "created": "Thu, 21 Jan 2010 10:40:33 GMT" } ]
2016-11-17T00:00:00
[ [ "Kokalj-Filipovic", "Silvija", "" ], [ "Spasojevic", "Predrag", "" ], [ "Soljanin", "Emina", "" ] ]
new_dataset
0.998265
1001.5336
Chuan Huang
Chuan Huang, Jinhua Jiang, Shuguang Cui
Asymptotic Capacity of Large Fading Relay Networks with Random Node Failures
24 pages, 5 figures, submitted to IEEE Transactions on Communications
null
10.1109/TCOMM.2011.060911.100064
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
To understand the network response to large-scale physical attacks, we investigate the asymptotic capacity of a half-duplex fading relay network with random node failures when the number of relays $N$ is infinitely large. In this paper, a simplified independent attack model is assumed where each relay node fails with a certain probability. The noncoherent relaying scheme is considered, which corresponds to the case of zero forward-link channel state information (CSI) at the relays. Accordingly, the whole relay network can be shown equivalent to a Rayleigh fading channel, where we derive the $\epsilon$-outage capacity upper bound according to the multiple access (MAC) cut-set, and the $\epsilon$-outage achievable rates for both the amplify-and-forward (AF) and decode-and-forward (DF) strategies. Furthermore, we show that the DF strategy is asymptotically optimal as the outage probability $\epsilon$ goes to zero, with the AF strategy strictly suboptimal over all signal to noise ratio (SNR) regimes. Regarding the rate loss due to random attacks, the AF strategy suffers a less portion of rate loss than the DF strategy in the high SNR regime, while the DF strategy demonstrates more robust performance in the low SNR regime.
[ { "version": "v1", "created": "Fri, 29 Jan 2010 17:28:40 GMT" } ]
2016-11-17T00:00:00
[ [ "Huang", "Chuan", "" ], [ "Jiang", "Jinhua", "" ], [ "Cui", "Shuguang", "" ] ]
new_dataset
0.998664
1002.3047
Nadia Fawaz
Nadia Fawaz, Muriel Medard
On the Non-Coherent Wideband Multipath Fading Relay Channel
8 pages, 4 figures, longer version (including proof) of the paper in Proc. of IEEE ISIT 2010
null
10.1109/ISIT.2010.5513582
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We investigate the multipath fading relay channel in the limit of a large bandwidth, and in the non-coherent setting, where the channel state is unknown to all terminals, including the relay and the destination. We propose a hypergraph model of the wideband multipath fading relay channel, and show that its min-cut is achieved by a non-coherent peaky frequency binning scheme. The so-obtained lower bound on the capacity of the wideband multipath fading relay channel turns out to coincide with the block-Markov lower bound on the capacity of the wideband frequency-division Gaussian (FD-AWGN) relay channel. In certain cases, this achievable rate also meets the cut-set upper-bound, and thus reaches the capacity of the non-coherent wideband multipath fading relay channel.
[ { "version": "v1", "created": "Tue, 16 Feb 2010 20:10:25 GMT" }, { "version": "v2", "created": "Thu, 29 Apr 2010 00:04:39 GMT" } ]
2016-11-17T00:00:00
[ [ "Fawaz", "Nadia", "" ], [ "Medard", "Muriel", "" ] ]
new_dataset
0.999683
1004.0152
Joseph Blomer
Joseph Blomer, Nihar Jindal
Opportunistic Routing in Ad Hoc Networks: How many relays should there be? What rate should nodes use?
5 pages, 8 figures, Submitted to IEEE GLOBECOM 2010
null
10.1109/GLOCOM.2010.5684338
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Opportunistic routing is a multi-hop routing scheme which allows for selection of the best immediately available relay. In blind opportunistic routing protocols, where transmitters blindly broadcast without knowledge of the surrounding nodes, two fundamental design parameters are the node transmission probability and the transmission spectral efficiency. In this paper these parameters are selected to maximize end-to-end performance, characterized by the product of transmitter density, hop distance and rate. Due to the intractability of the problem as stated, an approximation function is examined which proves reasonably accurate. Our results show how the above design parameters should be selected based on inherent system parameters such as the path loss exponent and the noise level.
[ { "version": "v1", "created": "Thu, 1 Apr 2010 15:15:09 GMT" } ]
2016-11-17T00:00:00
[ [ "Blomer", "Joseph", "" ], [ "Jindal", "Nihar", "" ] ]
new_dataset
0.956217
1005.1065
David G. M. Mitchell
David G. M. Mitchell, Michael Lentmaier, and Daniel J. Costello Jr.
New Families of LDPC Block Codes Formed by Terminating Irregular Protograph-Based LDPC Convolutional Codes
To be presented at the 2010 IEEE International Symposium on Information Theory
null
10.1109/ISIT.2010.5513633
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we present a method of constructing new families of LDPC block code ensembles formed by terminating irregular protograph-based LDPC convolutional codes. Using the accumulate-repeat-by-4-jagged-accumulate (AR4JA) protograph as an example, a density evolution analysis for the binary erasure channel shows that this flexible design technique gives rise to a large selection of LDPC block code ensembles with varying code rates and thresholds close to capacity. Further, by means of an asymptotic weight enumerator analysis, we show that all the ensembles in this family also have minimum distance that grows linearly with block length, i.e., they are asymptotically good.
[ { "version": "v1", "created": "Thu, 6 May 2010 19:56:11 GMT" } ]
2016-11-17T00:00:00
[ [ "Mitchell", "David G. M.", "" ], [ "Lentmaier", "Michael", "" ], [ "Costello", "Daniel J.", "Jr." ] ]
new_dataset
0.995807
1005.1871
Fernando Hernando
Fernando Hernando, Michael E. O'Sullivan, Emanuel Popovici and Shraddha Srivastava
Subfield-Subcodes of Generalized Toric codes
Submitted to 2010 IEEE International Symposium on Information Theory (ISIT 2010)
null
10.1109/ISIT.2010.5513688
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study subfield-subcodes of Generalized Toric (GT) codes over $\mathbb{F}_{p^s}$. These are the multidimensional analogues of BCH codes, which may be seen as subfield-subcodes of generalized Reed-Solomon codes. We identify polynomial generators for subfield-subcodes of GT codes which allows us to determine the dimensions and obtain bounds for the minimum distance. We give several examples of binary and ternary subfield-subcodes of GT codes that are the best known codes of a given dimension and length.
[ { "version": "v1", "created": "Tue, 11 May 2010 15:56:31 GMT" } ]
2016-11-17T00:00:00
[ [ "Hernando", "Fernando", "" ], [ "O'Sullivan", "Michael E.", "" ], [ "Popovici", "Emanuel", "" ], [ "Srivastava", "Shraddha", "" ] ]
new_dataset
0.999505
1005.2251
Onur Sahin
Onur Sahin, Osvaldo Simeone, and Elza Erkip
Interference Channel with a Half-Duplex Out-of-Band Relay
5 pages, 5 figures, to appear in Proceedings of IEEE ISIT 2010
null
10.1109/ISIT.2010.5513378
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A Gaussian interference channel (IC) aided by a half-duplex relay is considered, in which the relay receives and transmits in an orthogonal band with respect to the IC. The system thus consists of two parallel channels, the IC and the channel over which the relay is active, which is referred to as Out-of-Band Relay Channel (OBRC). The OBRC is operated by separating a multiple access phase from the sources to the relay and a broadcast phase from the relay to the destinations. Conditions under which the optimal operation, in terms of the sum-capacity, entails either signal relaying and/or interference forwarding by the relay are identified. These conditions also assess the optimality of either separable or non-separable transmission over the IC and OBRC. Specifically, the optimality of signal relaying and separable coding is established for scenarios where the relay-to-destination channels set the performance bottleneck with respect to the source-to-relay channels on the OBRC. Optimality of interference forwarding and non-separable operation is also established in special cases.
[ { "version": "v1", "created": "Thu, 13 May 2010 02:54:49 GMT" } ]
2016-11-17T00:00:00
[ [ "Sahin", "Onur", "" ], [ "Simeone", "Osvaldo", "" ], [ "Erkip", "Elza", "" ] ]
new_dataset
0.999766
1006.0646
Ghassan Kraidy M.
Ghassan M. Kraidy, Joseph J. Boutros, Albert Guill\'en i F\`abregas
Irregular Turbo Codes in Block-Fading Channels
to be presented at the IEEE International Symposium on Information Theory, 2010
null
10.1109/ISIT.2010.5513370
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study irregular binary turbo codes over non-ergodic block-fading channels. We first propose an extension of channel multiplexers initially designed for regular turbo codes. We then show that, using these multiplexers, irregular turbo codes that exhibit a small decoding threshold over the ergodic Gaussian-noise channel perform very close to the outage probability on block-fading channels, from both density evolution and finite-length perspectives.
[ { "version": "v1", "created": "Thu, 3 Jun 2010 13:39:37 GMT" } ]
2016-11-17T00:00:00
[ [ "Kraidy", "Ghassan M.", "" ], [ "Boutros", "Joseph J.", "" ], [ "Fàbregas", "Albert Guillén i", "" ] ]
new_dataset
0.998419
1006.2565
Bahareh Akhbari
Bahareh Akhbari, Mahtab Mirmohseni, Mohammad Reza Aref
State-Dependent Relay Channel with Private Messages with Partial Causal and Non-Causal Channel State Information
5 pages, 2 figures, to be presented at the IEEE International Symposium on Information Theory (ISIT 2010), Austin, Texas, June 2010
null
10.1109/ISIT.2010.5513560
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we introduce a discrete memoryless State-Dependent Relay Channel with Private Messages (SD-RCPM) as a generalization of the state-dependent relay channel. We investigate two main cases: SD-RCPM with non-causal Channel State Information (CSI), and SD-RCPM with causal CSI. In each case, it is assumed that partial CSI is available at the source and relay. For non-causal case, we establish an achievable rate region using Gel'fand-Pinsker type coding scheme at the nodes informed of CSI, and Compress-and-Forward (CF) scheme at the relay. Using Shannon's strategy and CF scheme, an achievable rate region for causal case is obtained. As an example, the Gaussian version of SD-RCPM is considered, and an achievable rate region for Gaussian SD-RCPM with non-causal perfect CSI only at the source, is derived. Providing numerical examples, we illustrate the comparison between achievable rate regions derived using CF and Decode-and-Forward (DF) schemes.
[ { "version": "v1", "created": "Sun, 13 Jun 2010 21:12:37 GMT" } ]
2016-11-17T00:00:00
[ [ "Akhbari", "Bahareh", "" ], [ "Mirmohseni", "Mahtab", "" ], [ "Aref", "Mohammad Reza", "" ] ]
new_dataset
0.996928
1009.2574
Ashish Shukla
Ashish Shukla, Neeraj Tyagi
A New Route Maintenance in Dynamic Source Routing Protocol
This paper has been withdrawn as it's available as part of IEEE ISWPC 2006 proceedings from IEEExplore
null
10.1109/ISWPC.2006.1613654
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Mobile ad-hoc network (MANET) is infrastructureless, self-organizable, multi hop packet switched network. A number of routing protocols for MANETs have been proposed in recent years. Dynamic Source Routing (DSR) protocol is one of the most popular routing protocol for ad hoc networks. This paper presents a novel method to enhance route maintenance part of DSR protocol. Our proposed route maintenance significantly increases the efficiency of the protocol at the time of route failures.
[ { "version": "v1", "created": "Tue, 14 Sep 2010 06:56:29 GMT" }, { "version": "v2", "created": "Thu, 21 Apr 2011 21:18:07 GMT" } ]
2016-11-17T00:00:00
[ [ "Shukla", "Ashish", "" ], [ "Tyagi", "Neeraj", "" ] ]
new_dataset
0.952606
1009.3522
Han-Shin Jo
Han-Shin Jo, Ping Xia, and Jeffrey G. Andrews
Open, Closed, and Shared Access Femtocells in the Downlink
26 pages, 8 figures, Submitted to IEEE Transactions on Wireless Communications
null
10.1186/1687-1499-2012-363
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A fundamental choice in femtocell deployments is the set of users which are allowed to access each femtocell. Closed access restricts the set to specifically registered users, while open access allows any mobile subscriber to use any femtocell. Which one is preferable depends strongly on the distance between the macrocell base station (MBS) and femtocell. The main results of the paper are lemmas which provide expressions for the SINR distribution for various zones within a cell as a function of this MBS-femto distance. The average sum throughput (or any other SINR-based metric) of home users and cellular users under open and closed access can be readily determined from these expressions. We show that unlike in the uplink, the interests of home and cellular users are in conflict, with home users preferring closed access and cellular users preferring open access. The conflict is most pronounced for femtocells near the cell edge, when there are many cellular users and fewer femtocells. To mitigate this conflict, we propose a middle way which we term shared access in which femtocells allocate an adjustable number of time-slots between home and cellular users such that a specified minimum rate for each can be achieved. The optimal such sharing fraction is derived. Analysis shows that shared access achieves at least the overall throughput of open access while also satisfying rate requirements, while closed access fails for cellular users and open access fails for the home user.
[ { "version": "v1", "created": "Fri, 17 Sep 2010 23:19:29 GMT" } ]
2016-11-17T00:00:00
[ [ "Jo", "Han-Shin", "" ], [ "Xia", "Ping", "" ], [ "Andrews", "Jeffrey G.", "" ] ]
new_dataset
0.98337
1010.4499
Walid Saad
Walid Saad, Zhu Han, Tamer Basar, Merouane Debbah, Are Hj{\o}rungnes
Hedonic Coalition Formation for Distributed Task Allocation among Wireless Agents
to appear, IEEE Transactions on Mobile Computing
IEEE Transactions on Mobile Computing, 2011
10.1109/TMC.2010.242
null
cs.IT cs.GT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Autonomous wireless agents such as unmanned aerial vehicles or mobile base stations present a great potential for deployment in next-generation wireless networks. While current literature has been mainly focused on the use of agents within robotics or software applications, we propose a novel usage model for self-organizing agents suited to wireless networks. In the proposed model, a number of agents are required to collect data from several arbitrarily located tasks. Each task represents a queue of packets that require collection and subsequent wireless transmission by the agents to a central receiver. The problem is modeled as a hedonic coalition formation game between the agents and the tasks that interact in order to form disjoint coalitions. Each formed coalition is modeled as a polling system consisting of a number of agents which move between the different tasks present in the coalition, collect and transmit the packets. Within each coalition, some agents can also take the role of a relay for improving the packet success rate of the transmission. The proposed algorithm allows the tasks and the agents to take distributed decisions to join or leave a coalition, based on the achieved benefit in terms of effective throughput, and the cost in terms of delay. As a result of these decisions, the agents and tasks structure themselves into independent disjoint coalitions which constitute a Nash-stable network partition. Moreover, the proposed algorithm allows the agents and tasks to adapt the topology to environmental changes such as the arrival/removal of tasks or the mobility of the tasks. Simulation results show how the proposed algorithm improves the performance, in terms of average player (agent or task) payoff, of at least 30.26% (for a network of 5 agents with up to 25 tasks) relatively to a scheme that allocates nearby tasks equally among agents.
[ { "version": "v1", "created": "Thu, 21 Oct 2010 15:32:03 GMT" } ]
2016-11-17T00:00:00
[ [ "Saad", "Walid", "" ], [ "Han", "Zhu", "" ], [ "Basar", "Tamer", "" ], [ "Debbah", "Merouane", "" ], [ "Hjørungnes", "Are", "" ] ]
new_dataset
0.98008
1011.3091
Feng Xia
Weifeng Sun, Rong Cong, Feng Xia, Xiao Chen, Zhenquan Qin
R-CA: A Routing-based Dynamic Channel Assignment Algorithm for Wireless Mesh Networks
International Workshop on Mobile Cyber-Physical Systems (MobiCPS 2010), in conjunction with UIC2010, IEEE, Xi'an, China, 26 - 29 October, 2010
null
10.1109/UIC-ATC.2010.5
null
cs.NI cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Even though channel assignment has been studied for years, the performance of most IEEE 802.11-based multi-hop wireless networks such as wireless sensor network (WSN), wireless mesh network (WMN), mobile ad hoc network (MANET) is limited by channel interference. Properly assigning orthogonal channels to wireless links can improve the throughput of multi-hop networks. To solve the dynamic channel assignment problem, a routing-based channel assignment algorithm called R-CA is proposed. R-CA can allocate channels for wireless nodes when needed and free channels after data transmission. Thus more channel resource can be explored by wireless nodes. Simulation results show that R-CA can effectively enhance the network throughput and packet delivery rate.
[ { "version": "v1", "created": "Sat, 13 Nov 2010 02:40:25 GMT" } ]
2016-11-17T00:00:00
[ [ "Sun", "Weifeng", "" ], [ "Cong", "Rong", "" ], [ "Xia", "Feng", "" ], [ "Chen", "Xiao", "" ], [ "Qin", "Zhenquan", "" ] ]
new_dataset
0.999702
1011.3094
Feng Xia
Longhua Ma, Tengkai Yuan, Feng Xia, Ming Xu, Jun Yao, Meng Shao
A High-confidence Cyber-Physical Alarm System: Design and Implementation
IEEE/ACM Internet of Things Symposium (IOTS), in conjunction with GreenCom 2010, IEEE, Hangzhou, China, December 18-20, 2010
null
10.1109/GreenCom-CPSCom.2010.75
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Most traditional alarm systems cannot address security threats in a satisfactory manner. To alleviate this problem, we developed a high-confidence cyber-physical alarm system (CPAS), a new kind of alarm systems. This system establishes the connection of the Internet (i.e. TCP/IP) through GPRS/CDMA/3G. It achieves mutual communication control among terminal equipments, human machine interfaces and users by using the existing mobile communication network. The CPAS will enable the transformation in alarm mode from traditional one-way alarm to two-way alarm. The system has been successfully applied in practice. The results show that the CPAS could avoid false alarms and satisfy residents' security needs.
[ { "version": "v1", "created": "Sat, 13 Nov 2010 03:23:15 GMT" } ]
2016-11-17T00:00:00
[ [ "Ma", "Longhua", "" ], [ "Yuan", "Tengkai", "" ], [ "Xia", "Feng", "" ], [ "Xu", "Ming", "" ], [ "Yao", "Jun", "" ], [ "Shao", "Meng", "" ] ]
new_dataset
0.998756
1011.3099
Feng Xia
Rui Cheng, Zhuo Yang, Feng Xia
iZone: A Location-Based Mobile Social Networking System
Third International Symposium on Parallel Architectures, Algorithms and Programming (PAAP), IEEE, December 18-20, 2010, Dalian, China
null
10.1109/PAAP.2010.67
null
cs.HC cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The rapid development of wireless technology, the extensive use of mobile phones and the availability of location information are facilitating personalized location-based applications. Easy to carry, easy to use and easy to buy, smart phones with certain software are of great advantage. Consequently, mobile social networking (MSN) systems have emerged rapidly, being a revolution for our everyday life. Based on the analysis of general requirements of MSN and location-based services (LBS), this paper presents the design of iZone, a mobile social networking system, as well as a prototype implementation. This platform exploits mobile GIS (Geographic Information Systems), LBS and J2ME technologies, combining geographical data to display map on mobile phones. It can provide a number of social networking services via smartphones.
[ { "version": "v1", "created": "Sat, 13 Nov 2010 04:20:11 GMT" } ]
2016-11-17T00:00:00
[ [ "Cheng", "Rui", "" ], [ "Yang", "Zhuo", "" ], [ "Xia", "Feng", "" ] ]
new_dataset
0.999666
1011.3852
Feng Xia
Ziyu Lv, Feng Xia, Guowei Wu, Lin Yao, Zhikui Chen
iCare: A Mobile Health Monitoring System for the Elderly
The 3rd IEEE/ACM Int Conf on Cyber, Physical and Social Computing (CPSCom), IEEE, Hangzhou, China, December 18-20, 2010
null
10.1109/GreenCom-CPSCom.2010.84
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper describes a mobile health monitoring system called iCare for the elderly. We use wireless body sensors and smart phones to monitor the wellbeing of the elderly. It can offer remote monitoring for the elderly anytime anywhere and provide tailored services for each person based on their personal health condition. When detecting an emergency, the smart phone will automatically alert pre-assigned people who could be the old people's family and friends, and call the ambulance of the emergency centre. It also acts as the personal health information system and the medical guidance which offers one communication platform and the medical knowledge database so that the family and friends of the served people can cooperate with doctors to take care of him/her. The system also features some unique functions that cater to the living demands of the elderly, including regular reminder, quick alarm, medical guidance, etc. iCare is not only a real-time health monitoring system for the elderly, but also a living assistant which can make their lives more convenient and comfortable.
[ { "version": "v1", "created": "Sat, 13 Nov 2010 04:26:44 GMT" } ]
2016-11-17T00:00:00
[ [ "Lv", "Ziyu", "" ], [ "Xia", "Feng", "" ], [ "Wu", "Guowei", "" ], [ "Yao", "Lin", "" ], [ "Chen", "Zhikui", "" ] ]
new_dataset
0.99955
1012.0602
Pascal Vontobel
Alexandros G. Dimakis, Roxana Smarandache, and Pascal O. Vontobel
LDPC Codes for Compressed Sensing
To appear, IEEE Transactions on Information Theory, 2012
null
10.1109/TIT.2011.2181819
null
cs.IT math.IT math.NA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a mathematical connection between channel coding and compressed sensing. In particular, we link, on the one hand, \emph{channel coding linear programming decoding (CC-LPD)}, which is a well-known relaxation o maximum-likelihood channel decoding for binary linear codes, and, on the other hand, \emph{compressed sensing linear programming decoding (CS-LPD)}, also known as basis pursuit, which is a widely used linear programming relaxation for the problem of finding the sparsest solution of an under-determined system of linear equations. More specifically, we establis a tight connection between CS-LPD based on a zero-one measurement matrix over the reals and CC-LPD of the binary linear channel code that is obtained by viewing this measurement matrix as a binary parity-check matrix. This connection allows the translation of performance guarantees from one setup to the other. The main message of this paper is that parity-check matrices of "good" channel codes can be used as provably "good" measurement matrices under basis pursuit. In particular, we provide the first deterministic construction of compressed sensing measurement matrices with an order-optimal number of rows using high-girth low-density parity-check (LDPC) codes constructed by Gallager.
[ { "version": "v1", "created": "Thu, 2 Dec 2010 22:56:59 GMT" }, { "version": "v2", "created": "Mon, 12 Dec 2011 03:47:49 GMT" } ]
2016-11-17T00:00:00
[ [ "Dimakis", "Alexandros G.", "" ], [ "Smarandache", "Roxana", "" ], [ "Vontobel", "Pascal O.", "" ] ]
new_dataset
0.9991
1101.0133
Nihar Shah
K. V. Rashmi, Nihar B. Shah, P. Vijay Kumar
Enabling Node Repair in Any Erasure Code for Distributed Storage
IEEE International Symposium on Information Theory (ISIT) 2011 (to be presented)
null
10.1109/ISIT.2011.6033732
null
cs.IT cs.DC cs.NI math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Erasure codes are an efficient means of storing data across a network in comparison to data replication, as they tend to reduce the amount of data stored in the network and offer increased resilience in the presence of node failures. The codes perform poorly though, when repair of a failed node is called for, as they typically require the entire file to be downloaded to repair a failed node. A new class of erasure codes, termed as regenerating codes were recently introduced, that do much better in this respect. However, given the variety of efficient erasure codes available in the literature, there is considerable interest in the construction of coding schemes that would enable traditional erasure codes to be used, while retaining the feature that only a fraction of the data need be downloaded for node repair. In this paper, we present a simple, yet powerful, framework that does precisely this. Under this framework, the nodes are partitioned into two 'types' and encoded using two codes in a manner that reduces the problem of node-repair to that of erasure-decoding of the constituent codes. Depending upon the choice of the two codes, the framework can be used to avail one or more of the following advantages: simultaneous minimization of storage space and repair-bandwidth, low complexity of operation, fewer disk reads at helper nodes during repair, and error detection and correction.
[ { "version": "v1", "created": "Thu, 30 Dec 2010 19:00:00 GMT" }, { "version": "v2", "created": "Thu, 30 Jun 2011 10:10:00 GMT" } ]
2016-11-17T00:00:00
[ [ "Rashmi", "K. V.", "" ], [ "Shah", "Nihar B.", "" ], [ "Kumar", "P. Vijay", "" ] ]
new_dataset
0.996505
1102.0424
Reza Asvadi
Reza Asvadi, Amir H. Banihashemi, and Mahmoud Ahmadian-Attari
Design of Finite-Length Irregular Protograph Codes with Low Error Floors over the Binary-Input AWGN Channel Using Cyclic Liftings
Submitted to IEEE Trans. Communications
null
10.1109/TCOMM.2012.030712.110086
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose a technique to design finite-length irregular low-density parity-check (LDPC) codes over the binary-input additive white Gaussian noise (AWGN) channel with good performance in both the waterfall and the error floor region. The design process starts from a protograph which embodies a desirable degree distribution. This protograph is then lifted cyclically to a certain block length of interest. The lift is designed carefully to satisfy a certain approximate cycle extrinsic message degree (ACE) spectrum. The target ACE spectrum is one with extremal properties, implying a good error floor performance for the designed code. The proposed construction results in quasi-cyclic codes which are attractive in practice due to simple encoder and decoder implementation. Simulation results are provided to demonstrate the effectiveness of the proposed construction in comparison with similar existing constructions.
[ { "version": "v1", "created": "Wed, 2 Feb 2011 13:27:30 GMT" } ]
2016-11-17T00:00:00
[ [ "Asvadi", "Reza", "" ], [ "Banihashemi", "Amir H.", "" ], [ "Ahmadian-Attari", "Mahmoud", "" ] ]
new_dataset
0.997429
1102.2593
Natalia Silberstein
Tuvi Etzion and Natalia Silberstein
Codes and Designs Related to Lifted MRD Codes
Submitted to IEEE Transactions on Information Theory. The material in this paper was presented in part in the 2011 IEEE International Symposium on Information Theory, Saint Petersburg, Russia, August 2011
null
10.1109/ISIT.2011.6033969
null
cs.IT cs.DM math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Lifted maximum rank distance (MRD) codes, which are constant dimension codes, are considered. It is shown that a lifted MRD code can be represented in such a way that it forms a block design known as a transversal design. A slightly different representation of this design makes it similar to a $q-$analog of a transversal design. The structure of these designs is used to obtain upper bounds on the sizes of constant dimension codes which contain a lifted MRD code. Codes which attain these bounds are constructed. These codes are the largest known codes for the given parameters. These transversal designs can be also used to derive a new family of linear codes in the Hamming space. Bounds on the minimum distance and the dimension of such codes are given.
[ { "version": "v1", "created": "Sun, 13 Feb 2011 14:03:25 GMT" }, { "version": "v2", "created": "Fri, 17 Jun 2011 06:33:12 GMT" }, { "version": "v3", "created": "Mon, 5 Sep 2011 06:25:42 GMT" }, { "version": "v4", "created": "Sun, 9 Oct 2011 11:09:19 GMT" }, { "version": "v5", "created": "Fri, 17 Aug 2012 02:58:46 GMT" } ]
2016-11-17T00:00:00
[ [ "Etzion", "Tuvi", "" ], [ "Silberstein", "Natalia", "" ] ]
new_dataset
0.99953
1102.4176
Lingjie Duan
Lingjie Duan, Lin Gao, Jianwei Huang
Contract-Based Cooperative Spectrum Sharing
Part of this paper has appeared in IEEE DySPAN 2011, and this version has been submitted to IEEE J-SAC
null
10.1109/DYSPAN.2011.5936229
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Providing proper economic incentives is essential for the success of dynamic spectrum sharing. Cooperative spectrum sharing is one effective way to achieve this goal. In cooperative spectrum sharing, secondary users (SUs) relay traffics for primary users (PUs), in exchange for dedicated transmission time for the SUs' own communication needs. In this paper, we study the cooperative spectrum sharing under incomplete information, where SUs' types (capturing their heterogeneity in relay channel gains and evaluations of power consumptions) are private information and not known by PUs. Inspired by the contract theory, we model the network as a labor market. The single PU is the employer who offers a contract to the SUs. The contract consists of a set of contract items representing combinations of spectrum accessing time (i.e., reward) and relaying power (i.e., contribution). The SUs are employees, and each of them selects the best contract item to maximize his payoff. We study the optimal contract design for both weak and strong incomplete information scenarios. First, we provide necessary and sufficient conditions for feasible contracts in both scenarios. In the weak incomplete information scenario, we further derive the optimal contract that achieves the same maximum PU's utility as in the complete information benchmark. In the strong incomplete information scenario, we propose a Decompose-and-Compare algorithm that achieves a close-to-optimal contract. We future show that the PU's average utility loss due to the suboptimal algorithm and the strong incomplete information are both relatively small (less than 2% and 1:3%, respectively, in our numerical results with two SU types).
[ { "version": "v1", "created": "Mon, 21 Feb 2011 10:10:00 GMT" } ]
2016-11-17T00:00:00
[ [ "Duan", "Lingjie", "" ], [ "Gao", "Lin", "" ], [ "Huang", "Jianwei", "" ] ]
new_dataset
0.979024
1102.4711
Gianluigi Liva
Gianluigi Liva, Enrico Paolini, Sandro Scalise, Marco Chiani
Turbo Codes Based on Time-Variant Memory-1 Convolutional Codes over Fq
This paper has been withdrawn by the authors. To be presented at IEEE ICC 2011, Kyoto, Japan. June 2011
null
10.1109/icc.2011.5962474
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Two classes of turbo codes over high-order finite fields are introduced. The codes are derived from a particular protograph sub-ensemble of the (dv=2,dc=3) low-density parity-check code ensemble. A first construction is derived as a parallel concatenation of two non-binary, time-variant accumulators. The second construction is based on the serial concatenation of a non-binary, time-variant differentiator and of a non-binary, time-variant accumulator, and provides a highly-structured flexible encoding scheme for (dv=2,dc=4) ensemble codes. A cycle graph representation is provided. The proposed codes can be decoded efficiently either as low-density parity-check codes (via belief propagation decoding over the codes bipartite graph) or as turbo codes (via the forward-backward algorithm applied to the component codes trellis). The forward-backward algorithm for symbol maximum a posteriori decoding of the component codes is illustrated and simplified by means of the fast Fourier transform. The proposed codes provide remarkable gains (~ 1 dB) over binary low-density parity-check and turbo codes in the moderate-short block regimes.
[ { "version": "v1", "created": "Wed, 23 Feb 2011 10:52:48 GMT" }, { "version": "v2", "created": "Tue, 22 Mar 2011 09:50:18 GMT" }, { "version": "v3", "created": "Wed, 13 Apr 2011 10:38:26 GMT" } ]
2016-11-17T00:00:00
[ [ "Liva", "Gianluigi", "" ], [ "Paolini", "Enrico", "" ], [ "Scalise", "Sandro", "" ], [ "Chiani", "Marco", "" ] ]
new_dataset
0.996979
1102.4810
Mahesh Banavar
Mahesh K. Banavar, Cihan Tepedelenlioglu and Andreas Spanias
Distributed SNR Estimation using Constant Modulus Signaling over Gaussian Multiple-Access Channels
Submitted to the IEEE Transactions on Signal Processing. 18 pages, 8 figures
null
10.1109/DSP-SPE.2011.5739181
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A sensor network is used for distributed joint mean and variance estimation, in a single time snapshot. Sensors observe a signal embedded in noise, which are phase modulated using a constant-modulus scheme and transmitted over a Gaussian multiple-access channel to a fusion center, where the mean and variance are estimated jointly, using an asymptotically minimum-variance estimator, which is shown to decouple into simple individual estimators of the mean and the variance. The constant-modulus phase modulation scheme ensures a fixed transmit power, robust estimation across several sensing noise distributions, as well as an SNR estimate that requires a single set of transmissions from the sensors to the fusion center, unlike the amplify-and-forward approach. The performance of the estimators of the mean and variance are evaluated in terms of asymptotic variance, which is used to evaluate the performance of the SNR estimator in the case of Gaussian, Laplace and Cauchy sensing noise distributions. For each sensing noise distribution, the optimal phase transmission parameters are also determined. The asymptotic relative efficiency of the mean and variance estimators is evaluated. It is shown that among the noise distributions considered, the estimators are asymptotically efficient only when the noise distribution is Gaussian. Simulation results corroborate analytical results.
[ { "version": "v1", "created": "Wed, 23 Feb 2011 18:12:27 GMT" } ]
2016-11-17T00:00:00
[ [ "Banavar", "Mahesh K.", "" ], [ "Tepedelenlioglu", "Cihan", "" ], [ "Spanias", "Andreas", "" ] ]
new_dataset
0.972776
1103.1559
Eirik Rosnes
Eirik Rosnes, Michael Helmling, and Alexandre Graell i Amat
Minimum Pseudoweight Analysis of 3-Dimensional Turbo Codes
To appear in IEEE Transactions on Communications
null
10.1109/TCOMM.2014.2329690
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this work, we consider pseudocodewords of (relaxed) linear programming (LP) decoding of 3-dimensional turbo codes (3D-TCs). We present a relaxed LP decoder for 3D-TCs, adapting the relaxed LP decoder for conventional turbo codes proposed by Feldman in his thesis. We show that the 3D-TC polytope is proper and $C$-symmetric, and make a connection to finite graph covers of the 3D-TC factor graph. This connection is used to show that the support set of any pseudocodeword is a stopping set of iterative decoding of 3D-TCs using maximum a posteriori constituent decoders on the binary erasure channel. Furthermore, we compute ensemble-average pseudoweight enumerators of 3D-TCs and perform a finite-length minimum pseudoweight analysis for small cover degrees. Also, an explicit description of the fundamental cone of the 3D-TC polytope is given. Finally, we present an extensive numerical study of small-to-medium block length 3D-TCs, which shows that 1) typically (i.e., in most cases) when the minimum distance $d_{\rm min}$ and/or the stopping distance $h_{\rm min}$ is high, the minimum pseudoweight (on the additive white Gaussian noise channel) is strictly smaller than both the $d_{\rm min}$ and the $h_{\rm min}$, and 2) the minimum pseudoweight grows with the block length, at least for small-to-medium block lengths.
[ { "version": "v1", "created": "Tue, 8 Mar 2011 15:26:21 GMT" }, { "version": "v2", "created": "Thu, 19 Sep 2013 21:22:00 GMT" }, { "version": "v3", "created": "Thu, 13 Mar 2014 12:46:06 GMT" }, { "version": "v4", "created": "Fri, 6 Jun 2014 13:30:58 GMT" } ]
2016-11-17T00:00:00
[ [ "Rosnes", "Eirik", "" ], [ "Helmling", "Michael", "" ], [ "Amat", "Alexandre Graell i", "" ] ]
new_dataset
0.991003
1103.3933
Tuvi Etzion
Tuvi Etzion
Product Constructions for Perfect Lee Codes
submitted to IEEE Transactions on Information Theory
null
10.1109/TIT.2011.2161133
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A well known conjecture of Golomb and Welch is that the only nontrivial perfect codes in the Lee and Manhattan metrics have length two or minimum distance three. This problem and related topics were subject for extensive research in the last forty years. In this paper two product constructions for perfect Lee codes and diameter perfect Lee codes are presented. These constructions yield a large number of nonlinear perfect codes and nonlinear diameter perfect codes in the Lee and Manhattan metrics. A short survey and other related problems on perfect codes in the Lee and the Manhattan metrics are also discussed.
[ { "version": "v1", "created": "Mon, 21 Mar 2011 07:53:53 GMT" }, { "version": "v2", "created": "Wed, 22 Jun 2011 09:47:33 GMT" } ]
2016-11-17T00:00:00
[ [ "Etzion", "Tuvi", "" ] ]
new_dataset
0.997641
1105.0452
Nikolaos Pappas
Nikolaos Pappas, Anthony Ephremides, Apostolos Traganitis
Relay-Assisted Multiple Access with Multi-Packet Reception Capability and Simultaneous Transmission and Reception
A shorter version accepted for publication at IEEE Information Theory Workshop 2011. This version has all the proofs omitted in the conference version due to space limitations
null
10.1109/ITW.2011.6089522
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this work we examine the operation of a node relaying packets from a number of users to a destination node. We assume multi-packet reception capabilities for the relay and the destination node. The relay node can transmit and receive at the same time, so the problem of self interference arises. The relay does not have packets of its own and the traffic at the source nodes is considered saturated. The relay node stores a source packet that it receives successfully in its queue when the transmission to the destination node has failed. We obtain analytical expressions for the characteristics of the relay's queue (such as arrival and service rate of the relay's queue), the stability condition and the average length of the queue as functions of the probabilities of transmissions, the self interference coefficient and the outage probabilities of the links. We study the impact of the relay node and the self interference coefficient on the throughput per user-source as well as the aggregate throughput.
[ { "version": "v1", "created": "Mon, 2 May 2011 23:10:19 GMT" }, { "version": "v2", "created": "Thu, 12 May 2011 00:38:37 GMT" }, { "version": "v3", "created": "Thu, 11 Aug 2011 17:58:18 GMT" } ]
2016-11-17T00:00:00
[ [ "Pappas", "Nikolaos", "" ], [ "Ephremides", "Anthony", "" ], [ "Traganitis", "Apostolos", "" ] ]
new_dataset
0.99936
1105.5975
Abdellatif Zaidi
Abdellatif Zaidi, Pablo Piantanida, Shlomo Shamai (Shitz)
Multiple Access Channel with States Known Noncausally at One Encoder and Only Strictly Causally at the Other Encoder
5 pages, to appear in the 2011 IEEE International Symposium on Information Theory
null
10.1109/ISIT.2011.6034085
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider a two-user state-dependent multiaccess channel in which the states of the channel are known non-causally to one of the encoders and only strictly causally to the other encoder. Both encoders transmit a common message and, in addition, the encoder that knows the states non-causally transmits an individual message. We study the capacity region of this communication model. In the discrete memoryless case, we establish inner and outer bounds on the capacity region. Although the encoder that sends both messages knows the states fully, we show that the strictly causal knowledge of these states at the other encoder can be beneficial for this encoder, and in general enlarges the capacity region. Furthermore, we find an explicit characterization of the capacity in the case in which the two encoders transmit only the common message. In the Gaussian case, we characterize the capacity region for the model with individual message as well. Our converse proof in this case shows that, for this model, strictly causal knowledge of the state at one of the encoders does not increase capacity if the other is informed non-causally, a result which sheds more light on the utility of conveying a compressed version of the state to the decoder in recent results by Lapidoth and Steinberg on a multiacess model with only strictly causal state at both encoders and independent messages.
[ { "version": "v1", "created": "Mon, 30 May 2011 12:57:12 GMT" } ]
2016-11-17T00:00:00
[ [ "Zaidi", "Abdellatif", "", "Shitz" ], [ "Piantanida", "Pablo", "", "Shitz" ], [ "Shamai", "Shlomo", "", "Shitz" ] ]
new_dataset
0.973373
1106.0436
Venkatesan Guruswami
Venkatesan Guruswami
Linear-algebraic list decoding of folded Reed-Solomon codes
16 pages. Extended abstract in Proc. of IEEE Conference on Computational Complexity (CCC), 2011
null
10.1109/CCC.2011.22
null
cs.IT cs.DS math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Folded Reed-Solomon codes are an explicit family of codes that achieve the optimal trade-off between rate and error-correction capability: specifically, for any $\eps > 0$, the author and Rudra (2006,08) presented an $n^{O(1/\eps)}$ time algorithm to list decode appropriate folded RS codes of rate $R$ from a fraction $1-R-\eps$ of errors. The algorithm is based on multivariate polynomial interpolation and root-finding over extension fields. It was noted by Vadhan that interpolating a linear polynomial suffices if one settles for a smaller decoding radius (but still enough for a statement of the above form). Here we give a simple linear-algebra based analysis of this variant that eliminates the need for the computationally expensive root-finding step over extension fields (and indeed any mention of extension fields). The entire list decoding algorithm is linear-algebraic, solving one linear system for the interpolation step, and another linear system to find a small subspace of candidate solutions. Except for the step of pruning this subspace, the algorithm can be implemented to run in {\em quadratic} time. The theoretical drawback of folded RS codes are that both the decoding complexity and proven worst-case list-size bound are $n^{\Omega(1/\eps)}$. By combining the above idea with a pseudorandom subset of all polynomials as messages, we get a Monte Carlo construction achieving a list size bound of $O(1/\eps^2)$ which is quite close to the existential $O(1/\eps)$ bound (however, the decoding complexity remains $n^{\Omega(1/\eps)}$). Our work highlights that constructing an explicit {\em subspace-evasive} subset that has small intersection with low-dimensional subspaces could lead to explicit codes with better list-decoding guarantees.
[ { "version": "v1", "created": "Thu, 2 Jun 2011 14:18:27 GMT" } ]
2016-11-17T00:00:00
[ [ "Guruswami", "Venkatesan", "" ] ]
new_dataset
0.990052
1107.1937
Stefano Ferretti Stefano Ferretti
Stefano Ferretti, Vittorio Ghini
Scale-Free Opportunistic Networks: is it Possible?
A revised version of the paper will appear in Proc. of the 8th International Workshop on Mobile Peer-to-Peer Computing - IEEE International Conference on Pervasive Computing and Communications (PERCOM 2012), Lugano, Switzerland, IEEE, March 2012
null
10.1109/PerComW.2012.6197590
null
cs.DC cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The coupling of scale-free networks with mobile unstructured networks is certainly unusual. In mobile networks, connections active at a given instant are constrained by the geographical distribution of mobile nodes, and by the limited signal strength of the wireless technology employed to build the ad-hoc overlay. This is in contrast with the presence of hubs, typical of scale-free nets. However, opportunistic (mobile) networks possess the distinctive feature to be delay tolerant; mobile nodes implement a store, carry and forward strategy that permits to disseminate data based on a multi-hop route, which is built in time, when nodes encounter other ones while moving. In this paper, we consider opportunistic networks as evolving graphs where links represent contacts among nodes arising during a (non-instantaneous) time interval. We discuss a strategy to control the way nodes manage contacts and build "opportunistic overlays". Based on such an approach, interesting overlays can be obtained, shaped following given desired topologies, such as scale-free ones.
[ { "version": "v1", "created": "Mon, 11 Jul 2011 05:03:45 GMT" }, { "version": "v2", "created": "Thu, 23 Feb 2012 10:14:44 GMT" } ]
2016-11-17T00:00:00
[ [ "Ferretti", "Stefano", "" ], [ "Ghini", "Vittorio", "" ] ]
new_dataset
0.998884
1110.2343
Kaveh Mahdaviani
Kaveh Mahdaviani, Masoud Ardakani, Chintha Tellambura
Annotated Raptor Codes
This paper has been Accepted for presentation in IEEE Information Theory Workshop (ITW) 2011, Paraty, Brazil
null
10.1109/ITW.2011.6089435
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, an extension of raptor codes is introduced which keeps all the desirable properties of raptor codes, including the linear complexity of encoding and decoding per information bit, unchanged. The new design, however, improves the performance in terms of the reception rate. Our simulations show a 10% reduction in the needed overhead at the benchmark block length of 64,520 bits and with the same complexity per information bit.
[ { "version": "v1", "created": "Tue, 11 Oct 2011 12:18:23 GMT" } ]
2016-11-17T00:00:00
[ [ "Mahdaviani", "Kaveh", "" ], [ "Ardakani", "Masoud", "" ], [ "Tellambura", "Chintha", "" ] ]
new_dataset
0.995543
1111.0711
Stark Draper
Yige Wang, Stark C. Draper and Jonathan S. Yedidia
Hierarchical and High-Girth QC LDPC Codes
Submitted to IEEE Transactions on Information THeory
null
10.1109/TIT.2013.2253512
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a general approach to designing capacity-approaching high-girth low-density parity-check (LDPC) codes that are friendly to hardware implementation. Our methodology starts by defining a new class of "hierarchical" quasi-cyclic (HQC) LDPC codes that generalizes the structure of quasi-cyclic (QC) LDPC codes. Whereas the parity check matrices of QC LDPC codes are composed of circulant sub-matrices, those of HQC LDPC codes are composed of a hierarchy of circulant sub-matrices that are in turn constructed from circulant sub-matrices, and so on, through some number of levels. We show how to map any class of codes defined using a protograph into a family of HQC LDPC codes. Next, we present a girth-maximizing algorithm that optimizes the degrees of freedom within the family of codes to yield a high-girth HQC LDPC code. Finally, we discuss how certain characteristics of a code protograph will lead to inevitable short cycles, and show that these short cycles can be eliminated using a "squashing" procedure that results in a high-girth QC LDPC code, although not a hierarchical one. We illustrate our approach with designed examples of girth-10 QC LDPC codes obtained from protographs of one-sided spatially-coupled codes.
[ { "version": "v1", "created": "Thu, 3 Nov 2011 01:54:49 GMT" } ]
2016-11-17T00:00:00
[ [ "Wang", "Yige", "" ], [ "Draper", "Stark C.", "" ], [ "Yedidia", "Jonathan S.", "" ] ]
new_dataset
0.982013
1112.0371
Zhiying Wang
Itzhak Tamo, Zhiying Wang, and Jehoshua Bruck
Zigzag Codes: MDS Array Codes with Optimal Rebuilding
23 pages, 5 figures, submitted to IEEE transactions on information theory
null
10.1109/TIT.2012.2227110
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
MDS array codes are widely used in storage systems to protect data against erasures. We address the \emph{rebuilding ratio} problem, namely, in the case of erasures, what is the fraction of the remaining information that needs to be accessed in order to rebuild \emph{exactly} the lost information? It is clear that when the number of erasures equals the maximum number of erasures that an MDS code can correct then the rebuilding ratio is 1 (access all the remaining information). However, the interesting and more practical case is when the number of erasures is smaller than the erasure correcting capability of the code. For example, consider an MDS code that can correct two erasures: What is the smallest amount of information that one needs to access in order to correct a single erasure? Previous work showed that the rebuilding ratio is bounded between 1/2 and 3/4, however, the exact value was left as an open problem. In this paper, we solve this open problem and prove that for the case of a single erasure with a 2-erasure correcting code, the rebuilding ratio is 1/2. In general, we construct a new family of $r$-erasure correcting MDS array codes that has optimal rebuilding ratio of $\frac{e}{r}$ in the case of $e$ erasures, $1 \le e \le r$. Our array codes have efficient encoding and decoding algorithms (for the case $r=2$ they use a finite field of size 3) and an optimal update property.
[ { "version": "v1", "created": "Fri, 2 Dec 2011 01:59:57 GMT" } ]
2016-11-17T00:00:00
[ [ "Tamo", "Itzhak", "" ], [ "Wang", "Zhiying", "" ], [ "Bruck", "Jehoshua", "" ] ]
new_dataset
0.997833
1201.2859
Bin Dai
Bin Dai, A. J. Han Vinck, Zhuojun Zhuang and Yuan Luo
Degraded Broadcast Channel with Side Information, Confidential Messages and Noiseless Feedback
Part of this paper has been accepted by ISIT2012, and this paper is submitted to IEEE Transactions on Information Theory
null
10.1109/ISIT.2012.6284226
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, first, we investigate the model of degraded broadcast channel with side information and confidential messages. This work is from Steinberg's work on the degraded broadcast channel with causal and noncausal side information, and Csisz$\acute{a}$r-K\"{o}rner's work on broadcast channel with confidential messages. Inner and outer bounds on the capacity-equivocation regions are provided for the noncausal and causal cases. Superposition coding and double-binning technique are used in the corresponding achievability proofs. Then, we investigate the degraded broadcast channel with side information, confidential messages and noiseless feedback. The noiseless feedback is from the non-degraded receiver to the channel encoder. Inner and outer bounds on the capacity-equivocation region are provided for the noncausal case, and the capacity-equivocation region is determined for the causal case. Compared with the model without feedback, we find that the noiseless feedback helps to enlarge the inner bounds for both causal and noncausal cases. In the achievability proof of the feedback model, the noiseless feedback is used as a secret key shared by the non-degraded receiver and the transmitter, and therefore, the code construction for the feedback model is a combination of superposition coding, Gel'fand-Pinsker's binning, block Markov coding and Ahlswede-Cai's secret key on the feedback system.
[ { "version": "v1", "created": "Fri, 13 Jan 2012 15:15:07 GMT" }, { "version": "v2", "created": "Wed, 18 Jan 2012 08:43:11 GMT" }, { "version": "v3", "created": "Fri, 27 Jan 2012 09:44:17 GMT" }, { "version": "v4", "created": "Wed, 1 Feb 2012 08:55:03 GMT" }, { "version": "v5", "created": "Sun, 13 May 2012 18:34:15 GMT" }, { "version": "v6", "created": "Wed, 31 Oct 2012 04:06:32 GMT" } ]
2016-11-17T00:00:00
[ [ "Dai", "Bin", "" ], [ "Vinck", "A. J. Han", "" ], [ "Zhuang", "Zhuojun", "" ], [ "Luo", "Yuan", "" ] ]
new_dataset
0.987459
1201.3140
Yonghui Li
Yonghui Li, Md. Shahriar Rahman, Soon Xin Ng and Branka Vucetic
Distributed Soft Coding with a Soft Input Soft Output (SISO) Relay Encoder in Parallel Relay Channels
to appear on IEEE Transactions on Communications
null
10.1109/TCOMM.2013.073013.120792
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we propose a new distributed coding structure with a soft input soft output (SISO) relay encoder for error-prone parallel relay channels. We refer to it as the distributed soft coding (DISC). In the proposed scheme, each relay first uses the received noisy signals to calculate the soft bit estimate (SBE) of the source symbols. A simple SISO encoder is developed to encode the SBEs of source symbols based on a constituent code generator matrix. The SISO encoder outputs at different relays are then forwarded to the destination and form a distributed codeword. The performance of the proposed scheme is analyzed. It is shown that its performance is determined by the generator sequence weight (GSW) of the relay constituent codes, where the GSW of a constituent code is defined as the number of ones in its generator sequence. A new coding design criterion for optimally assigning the constituent codes to all the relays is proposed based on the analysis. Results show that the proposed DISC can effectively circumvent the error propagation due to the decoding errors in the conventional detect and forward (DF) with relay re-encoding and bring considerable coding gains, compared to the conventional soft information relaying.
[ { "version": "v1", "created": "Mon, 16 Jan 2012 00:09:29 GMT" }, { "version": "v2", "created": "Mon, 22 Jul 2013 05:08:26 GMT" } ]
2016-11-17T00:00:00
[ [ "Li", "Yonghui", "" ], [ "Rahman", "Md. Shahriar", "" ], [ "Ng", "Soon Xin", "" ], [ "Vucetic", "Branka", "" ] ]
new_dataset
0.998958
1203.4040
Seokbeom Hong
Beomkyu Shin, Seokbeom Hong, Hosung Park, Jong-Seon No, and Dong-Joon Shin
New decoding scheme for LDPC codes based on simple product code structure
This work has been submitted to the IEEE for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessible
null
10.1109/JCN.2015.000066
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, a new decoding scheme for low-density parity-check (LDPC) codes using the concept of simple product code structure is proposed based on combining two independently received soft-decision data for the same codeword. LDPC codes act as horizontal codes of the product codes and simple algebraic codes are used as vertical codes to help decoding of the LDPC codes. The decoding capability of the proposed decoding scheme is defined and analyzed using the paritycheck matrices of vertical codes and especially the combined-decodability is derived for the case of single parity-check (SPC) and Hamming codes being used as vertical codes. It is also shown that the proposed decoding scheme achieves much better error-correcting capability in high signal to noise ratio (SNR) region with low additional decoding complexity, compared with a conventional decoding scheme.
[ { "version": "v1", "created": "Mon, 19 Mar 2012 06:12:19 GMT" } ]
2016-11-17T00:00:00
[ [ "Shin", "Beomkyu", "" ], [ "Hong", "Seokbeom", "" ], [ "Park", "Hosung", "" ], [ "No", "Jong-Seon", "" ], [ "Shin", "Dong-Joon", "" ] ]
new_dataset
0.999327
1204.3388
Amr Ismail Tammam
Amr Ismail, Jocelyn Fiorina, and Hikmet Sari
A Novel Construction of Multi-group Decodable Space-Time Block Codes
12 pages, and 5 tables, accepted for publication in IEEE transactions on communications
null
10.1109/TCOMM.2012.032012.100731
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Complex Orthogonal Design (COD) codes are known to have the lowest detection complexity among Space-Time Block Codes (STBCs). However, the rate of square COD codes decreases exponentially with the number of transmit antennas. The Quasi-Orthogonal Design (QOD) codes emerged to provide a compromise between rate and complexity as they offer higher rates compared to COD codes at the expense of an increase of decoding complexity through partially relaxing the orthogonality conditions. The QOD codes were then generalized with the so called g-symbol and g-group decodable STBCs where the number of orthogonal groups of symbols is no longer restricted to two as in the QOD case. However, the adopted approach for the construction of such codes is based on sufficient but not necessary conditions which may limit the achievable rates for any number of orthogonal groups. In this paper, we limit ourselves to the case of Unitary Weight (UW)-g-group decodable STBCs for 2^a transmit antennas where the weight matrices are required to be single thread matrices with non-zero entries in {1,-1,j,-j} and address the problem of finding the highest achievable rate for any number of orthogonal groups. This special type of weight matrices guarantees full symbol-wise diversity and subsumes a wide range of existing codes in the literature. We show that in this case an exhaustive search can be applied to find the maximum achievable rates for UW-g-group decodable STBCs with g>1. For this purpose, we extend our previously proposed approach for constructing UW-2-group decodable STBCs based on necessary and sufficient conditions to the case of UW-g-group decodable STBCs in a recursive manner.
[ { "version": "v1", "created": "Mon, 16 Apr 2012 07:45:53 GMT" } ]
2016-11-17T00:00:00
[ [ "Ismail", "Amr", "" ], [ "Fiorina", "Jocelyn", "" ], [ "Sari", "Hikmet", "" ] ]
new_dataset
0.995758
1204.4840
Giuseppe Caire
Eric Rebeiz, Giuseppe Caire, and Andreas F. Molisch
Energy-Delay Tradeoff and Dynamic Sleep Switching for Bluetooth-Like Body-Area Sensor Networks
Extended version (with proofs details in the Appendix) of a paper accepted for publication on the IEEE Transactions on Communications
null
10.1109/TCOMM.2012.12.110143A
null
cs.IT cs.NI math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Wireless technology enables novel approaches to healthcare, in particular the remote monitoring of vital signs and other parameters indicative of people's health. This paper considers a system scenario relevant to such applications, where a smart-phone acts as a data-collecting hub, gathering data from a number of wireless-capable body sensors, and relaying them to a healthcare provider host through standard existing cellular networks. Delay of critical data and sensors' energy efficiency are both relevant and conflicting issues. Therefore, it is important to operate the wireless body-area sensor network at some desired point close to the optimal energy-delay tradeoff curve. This tradeoff curve is a function of the employed physical-layer protocol: in particular, it depends on the multiple-access scheme and on the coding and modulation schemes available. In this work, we consider a protocol closely inspired by the widely-used Bluetooth standard. First, we consider the calculation of the minimum energy function, i.e., the minimum sum energy per symbol that guarantees the stability of all transmission queues in the network. Then, we apply the general theory developed by Neely to develop a dynamic scheduling policy that approaches the optimal energy-delay tradeoff for the network at hand. Finally, we examine the queue dynamics and propose a novel policy that adaptively switches between connected and disconnected (sleeping) modes. We demonstrate that the proposed policy can achieve significant gains in the realistic case where the control "NULL" packets necessary to maintain the connection alive, have a non-zero energy cost, and the data arrival statistics corresponding to the sensed physical process are bursty.
[ { "version": "v1", "created": "Sat, 21 Apr 2012 21:53:41 GMT" } ]
2016-11-17T00:00:00
[ [ "Rebeiz", "Eric", "" ], [ "Caire", "Giuseppe", "" ], [ "Molisch", "Andreas F.", "" ] ]
new_dataset
0.968377
1205.2590
Eirik Rosnes
Eirik Rosnes, Marcel A. Ambroze, and Martin Tomlinson
On the Minimum/Stopping Distance of Array Low-Density Parity-Check Codes
To appear in IEEE Trans. Inf. Theory. The material in this paper was presented in part at the 2014 IEEE International Symposium on Information Theory, Honolulu, HI, June/July 2014
null
10.1109/TIT.2014.2333519
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this work, we study the minimum/stopping distance of array low-density parity-check (LDPC) codes. An array LDPC code is a quasi-cyclic LDPC code specified by two integers q and m, where q is an odd prime and m <= q. In the literature, the minimum/stopping distance of these codes (denoted by d(q,m) and h(q,m), respectively) has been thoroughly studied for m <= 5. Both exact results, for small values of q and m, and general (i.e., independent of q) bounds have been established. For m=6, the best known minimum distance upper bound, derived by Mittelholzer (IEEE Int. Symp. Inf. Theory, Jun./Jul. 2002), is d(q,6) <= 32. In this work, we derive an improved upper bound of d(q,6) <= 20 and a new upper bound d(q,7) <= 24 by using the concept of a template support matrix of a codeword/stopping set. The bounds are tight with high probability in the sense that we have not been able to find codewords of strictly lower weight for several values of q using a minimum distance probabilistic algorithm. Finally, we provide new specific minimum/stopping distance results for m <= 7 and low-to-moderate values of q <= 79.
[ { "version": "v1", "created": "Fri, 11 May 2012 18:01:38 GMT" }, { "version": "v2", "created": "Mon, 15 Apr 2013 19:27:23 GMT" }, { "version": "v3", "created": "Tue, 3 Jun 2014 11:05:17 GMT" }, { "version": "v4", "created": "Tue, 8 Jul 2014 08:27:09 GMT" } ]
2016-11-17T00:00:00
[ [ "Rosnes", "Eirik", "" ], [ "Ambroze", "Marcel A.", "" ], [ "Tomlinson", "Martin", "" ] ]
new_dataset
0.99938
1205.5914
Cristiano Torezzan
Cristiano Torezzan, Sueli I. R. Costa, Vinay A. Vaishampayan
Constructive spherical codes on layers of flat tori
9 pages, 5 figures, submitted to IEEE Transactions on Information Theory
null
10.1109/TIT.2013.2272931
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A new class of spherical codes is constructed by selecting a finite subset of flat tori from a foliation of the unit sphere S^{2L-1} of R^{2L} and designing a structured codebook on each torus layer. The resulting spherical code can be the image of a lattice restricted to a specific hyperbox in R^L in each layer. Group structure and homogeneity, useful for efficient storage and decoding, are inherited from the underlying lattice codebook. A systematic method for constructing such codes are presented and, as an example, the Leech lattice is used to construct a spherical code in R^{48}. Upper and lower bounds on the performance, the asymptotic packing density and a method for decoding are derived.
[ { "version": "v1", "created": "Sat, 26 May 2012 19:49:18 GMT" } ]
2016-11-17T00:00:00
[ [ "Torezzan", "Cristiano", "" ], [ "Costa", "Sueli I. R.", "" ], [ "Vaishampayan", "Vinay A.", "" ] ]
new_dataset
0.96932
1207.1777
Nadeem Javaid
S. Kumar, N. Javaid, Z. Yousuf, H. Kumar, Z. A. Khan, A. Bibi
DSDV, DYMO, OLSR: Link Duration and Path Stability
null
Multicom2012 held in conjunction with the 11th IEEE International Conference on Ubiquitous Computing and Communications (IUCC-2012) (25 - 27 June 2012, Liverpool, UK)
10.1109/TrustCom.2012.133
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we evaluate and compare the impact of link duration and path stability of routing protocols; Destination Sequence Distance vector (DSDV), Dynamic MANET On- Demand (DYMO) and Optimized Link State Routing (OLSR) at different number of connections and node density. In order to improve the efficiency of selected protocols; we enhance DYMO and OLSR. Simulation and comparison of both default and enhanced routing protocols is carried out under the performance parameters; Packet Delivery Ratio (PDR), Average End-to End Delay (AE2ED) and Normalized Routing Overhead (NRO). From the results, we observe that DYMO performs better than DSDV, MOD-OLSR and OLSR in terms of PDR, AE2ED, link duration and path stability at the cost of high value of NRO.
[ { "version": "v1", "created": "Sat, 7 Jul 2012 08:18:30 GMT" } ]
2016-11-17T00:00:00
[ [ "Kumar", "S.", "" ], [ "Javaid", "N.", "" ], [ "Yousuf", "Z.", "" ], [ "Kumar", "H.", "" ], [ "Khan", "Z. A.", "" ], [ "Bibi", "A.", "" ] ]
new_dataset
0.99746
1210.0510
Tayeb Lemlouma
Tayeb Lemlouma, Yoann Lefebvre, Fr\'ed\'eric Cespedes
PCNM: A New Platform for Cellular Networks Measurements and Optimization
IEEE International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM 2007)
null
10.1109/WICOM.2007.737
null
cs.NI cs.OH cs.PF
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we present PCNM, a new mobile platform for cellular networks measurements. PCNM is based on a set of techniques that tailors theoretical calculations and simulations to the real cellular network environment. It includes: (a) modules that measure different parameters of a base station (BS) such as localization, cells identification, time advance information, reception level and quality, (b) a new protocol that optimizes the task of network measurement by monitoring a set of mobile nodes and finally (c) the ability to extend an existing cellular network by adding new base stations. We evaluate our genetic algorithm used to reduce the nodes mobility and optimize the measurement extraction of N base stations using k mobile sensors (k >= 1). We show how connecting real measurements (using mobile sensors in a collaborative way) to theoretical and prediction methods is of high benefits for cellular networks maintenance, extension and performances evaluation.
[ { "version": "v1", "created": "Mon, 1 Oct 2012 19:15:19 GMT" } ]
2016-11-17T00:00:00
[ [ "Lemlouma", "Tayeb", "" ], [ "Lefebvre", "Yoann", "" ], [ "Cespedes", "Frédéric", "" ] ]
new_dataset
0.999122
1210.3906
Hosung Park
Hosung Park, Seokbeom Hong, Jong-Seon No, and Dong-Joon Shin
Design of Multiple-Edge Protographs for QC LDPC Codes Avoiding Short Inevitable Cycles
42 pages, submitted to IEEE Transactions on Information Theory on June 2011
null
10.1109/TIT.2013.2250574
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
There have been lots of efforts on the construction of quasi-cyclic (QC) low-density parity-check (LDPC) codes with large girth. However, most of them are focused on protographs with single edges and little research has been done for the construction of QC LDPC codes lifted from protographs with multiple edges. Compared to single-edge protographs, multiple-edge protographs have benefits such that QC LDPC codes lifted from them can potentially have larger minimum Hamming distance. In this paper, all subgraph patterns of multiple-edge protographs, which prevent QC LDPC codes from having large girth by inducing inevitable cycles, are fully investigated based on graph-theoretic approach. By using combinatorial designs, a systematic construction method of multiple-edge protographs is proposed for regular QC LDPC codes with girth at least 12 and also other method is proposed for regular QC LDPC codes with girth at least 14. A construction algorithm of QC LDPC codes by lifting multiple-edge protographs is proposed and it is shown that the resulting QC LDPC codes have larger upper bounds on the minimum Hamming distance than those lifted from single-edge protographs. Simulation results are provided to compare the performance of the proposed QC LDPC codes, the progressive edge-growth (PEG) LDPC codes, and the PEG QC LDPC codes.
[ { "version": "v1", "created": "Mon, 15 Oct 2012 05:57:49 GMT" } ]
2016-11-17T00:00:00
[ [ "Park", "Hosung", "" ], [ "Hong", "Seokbeom", "" ], [ "No", "Jong-Seon", "" ], [ "Shin", "Dong-Joon", "" ] ]
new_dataset
0.999198
1211.4728
Hajime Matsui
Hajime Matsui
Lemma for Linear Feedback Shift Registers and DFTs Applied to Affine Variety Codes
37 pages, 1 column, 10 figures, 2 tables, resubmitted to IEEE Transactions on Information Theory on Jan. 8, 2014
null
10.1109/TIT.2014.2311042
null
cs.IT cs.DM math.AC math.CO math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we establish a lemma in algebraic coding theory that frequently appears in the encoding and decoding of, e.g., Reed-Solomon codes, algebraic geometry codes, and affine variety codes. Our lemma corresponds to the non-systematic encoding of affine variety codes, and can be stated by giving a canonical linear map as the composition of an extension through linear feedback shift registers from a Grobner basis and a generalized inverse discrete Fourier transform. We clarify that our lemma yields the error-value estimation in the fast erasure-and-error decoding of a class of dual affine variety codes. Moreover, we show that systematic encoding corresponds to a special case of erasure-only decoding. The lemma enables us to reduce the computational complexity of error-evaluation from O(n^3) using Gaussian elimination to O(qn^2) with some mild conditions on n and q, where n is the code length and q is the finite-field size.
[ { "version": "v1", "created": "Tue, 20 Nov 2012 12:51:19 GMT" }, { "version": "v2", "created": "Mon, 20 Jan 2014 05:15:40 GMT" } ]
2016-11-17T00:00:00
[ [ "Matsui", "Hajime", "" ] ]
new_dataset
0.985807
1212.1198
Natasha Devroye
Yiwei Song, Natasha Devroye, Huai-Rong Shao, Chiu Ngo
Lattice Coding for the Two-way Two-relay Channel
submitted to IEEE Transactions on Information Theory on December 3, 2012
null
10.1109/ISIT.2013.6620439
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Lattice coding techniques may be used to derive achievable rate regions which outperform known independent, identically distributed (i.i.d.) random codes in multi-source relay networks and in particular the two-way relay channel. Gains stem from the ability to decode the sum of codewords (or messages) using lattice codes at higher rates than possible with i.i.d. random codes. Here we develop a novel lattice coding scheme for the Two-way Two-relay Channel: 1 <-> 2 <-> 3 <-> 4, where Node 1 and 4 simultaneously communicate with each other through two relay nodes 2 and 3. Each node only communicates with its neighboring nodes. The key technical contribution is the lattice-based achievability strategy, where each relay is able to remove the noise while decoding the sum of several signals in a Block Markov strategy and then re-encode the signal into another lattice codeword using the so-called "Re-distribution Transform". This allows nodes further down the line to again decode sums of lattice codewords. This transform is central to improving the achievable rates, and ensures that the messages traveling in each of the two directions fully utilize the relay's power, even under asymmetric channel conditions. All decoders are lattice decoders and only a single nested lattice codebook pair is needed. The symmetric rate achieved by the proposed lattice coding scheme is within 0.5 log 3 bit/Hz/s of the symmetric rate capacity.
[ { "version": "v1", "created": "Wed, 5 Dec 2012 22:48:39 GMT" } ]
2016-11-17T00:00:00
[ [ "Song", "Yiwei", "" ], [ "Devroye", "Natasha", "" ], [ "Shao", "Huai-Rong", "" ], [ "Ngo", "Chiu", "" ] ]
new_dataset
0.980646
1212.4092
Nadeem Javaid
A. Kashaf, N. Javaid, Z. A. Khan, I. A. Khan
TSEP: Threshold-sensitive Stable Election Protocol for WSNs
10th IEEE International Conference on Frontiers of Information Technology (FIT 12), 2012
null
10.1109/FIT.2012.37
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Wireless Sensor Networks (WSNs) are expected to find wide applicability and increasing deployment in near future. In this paper, we propose a new protocol, Threshold Sensitive Stable Election Protocol (TSEP), which is reactive protocol using three levels of heterogeneity. Reactive networks, as opposed to proactive networks, respond immediately to changes in relevant parameters of interest. We evaluate performance of our protocol for a simple temperature sensing application and compare results of protocol with some other protocols LEACH, DEEC, SEP, ESEP and TEEN. And from simulation results it is observed that protocol outperforms concerning life time of sensing nodes used.
[ { "version": "v1", "created": "Mon, 17 Dec 2012 18:24:50 GMT" } ]
2016-11-17T00:00:00
[ [ "Kashaf", "A.", "" ], [ "Javaid", "N.", "" ], [ "Khan", "Z. A.", "" ], [ "Khan", "I. A.", "" ] ]
new_dataset
0.970272
1212.4336
Dr. Nadeem Javaid
Syed Hassan Ahmed, Safdar H. Bouk, N. Javaid, Iwao Sasase
Combined Human, Antenna Orientation in Elevation Direction and Ground Effect on RSSI in Wireless Sensor Networks
10th IEEE International Conference on Frontiers of Information Technology (FIT 12), 2012
null
10.1109/FIT.2012.17
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we experimentally investigate the combined effect of human, antenna orientation in elevation direction and the ground effect on the Received Signal Strength Indicator (RSSI) parameter in the Wireless Sensor Network (WSN). In experiment, we use MICAz motes and consider different scenarios where antenna of the transmitter node is tilted in elevation direction. The motes were placed on the ground to take into account the ground effect on the RSSI. The effect of one, two and four persons on the RSSI is recorded. For one and two persons, different walking paces e.g. slow, medium and fast pace, are analysed. However, in case of four persons, random movement is carried out between the pair of motes. The experimental results show that some antenna orientation angles have drastic effect on the RSSI, even without any human activity. The fluctuation count and range of RSSI in different scenarios with same walking pace are completely different. Therefore, an efficient human activity algorithm is need that effectively takes into count the antenna elevation and other parameters to accurately detect the human activity in the WSN deployment region.
[ { "version": "v1", "created": "Tue, 18 Dec 2012 13:00:46 GMT" } ]
2016-11-17T00:00:00
[ [ "Ahmed", "Syed Hassan", "" ], [ "Bouk", "Safdar H.", "" ], [ "Javaid", "N.", "" ], [ "Sasase", "Iwao", "" ] ]
new_dataset
0.97155
1301.1084
Charith Perera
Charith Perera, Arkady Zaslavsky, Peter Christen, Dimitrios Georgakopoulos
CA4IOT Context Awareness for Internet of Things
null
Proceedings of the IEEE International Conference on Green Computing and Communications, Conference on Internet of Things, and Conference on Cyber,Physical and Social Computing (iThings/CPSCom/GreenCom), Besancon, France, November,2012
10.1109/GreenCom.2012.128
null
cs.SE cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Internet of Things (IoT) will connect billions of sensors deployed around the world together. This will create an ideal opportunity to build a sensing-as-a-service platform. Due to large number of sensor deployments, there would be number of sensors that can be used to sense and collect similar information. Further, due to advances in sensor hardware technology, new methods and measurements will be introduced continuously. In the IoT paradigm, selecting the most appropriate sensors which can provide relevant sensor data to address the problems at hand among billions of possibilities would be a challenge for both technical and non-technical users. In this paper, we propose the Context Awareness for Internet of Things (CA4IOT) architecture to help users by automating the task of selecting the sensors according to the problems/tasks at hand. We focus on automated configuration of filtering, fusion and reasoning mechanisms that can be applied to the collected sensor data streams using selected sensors. Our objective is to allow the users to submit their problems, so our proposed architecture understands them and produces more comprehensive and meaningful information than the raw sensor data streams generated by individual sensors.
[ { "version": "v1", "created": "Mon, 7 Jan 2013 00:46:47 GMT" } ]
2016-11-17T00:00:00
[ [ "Perera", "Charith", "" ], [ "Zaslavsky", "Arkady", "" ], [ "Christen", "Peter", "" ], [ "Georgakopoulos", "Dimitrios", "" ] ]
new_dataset
0.997163
1301.4397
Mathis Seidl
Mathis Seidl, Andreas Schenk, Clemens Stierstorfer, Johannes B. Huber
Multilevel Polar-Coded Modulation
submitted to IEEE ISIT 2013
null
10.1109/ISIT.2013.6620437
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A framework is proposed that allows for a joint description and optimization of both binary polar coding and the multilevel coding (MLC) approach for $2^m$-ary digital pulse-amplitude modulation (PAM). The conceptual equivalence of polar coding and multilevel coding is pointed out in detail. Based on a novel characterization of the channel polarization phenomenon, rules for the optimal choice of the bit labeling in this coded modulation scheme employing polar codes are developed. Simulation results for the AWGN channel are included.
[ { "version": "v1", "created": "Fri, 18 Jan 2013 15:02:50 GMT" } ]
2016-11-17T00:00:00
[ [ "Seidl", "Mathis", "" ], [ "Schenk", "Andreas", "" ], [ "Stierstorfer", "Clemens", "" ], [ "Huber", "Johannes B.", "" ] ]
new_dataset
0.956097
1301.7506
Yulong Zou Dr.
Yulong Zou, Jia Zhu and Baoyu Zheng
A Fully Distributed Opportunistic Network Coding Scheme for Cellular Relay Networks
in Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (IEEE WCNC 2013), Shanghai China, Apr. 2013
null
10.1109/WCNC.2013.6555028
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we propose an opportunistic network coding (ONC) scheme in cellular relay networks, which operates depending on whether the relay decodes source messages successfully or not. A fully distributed method is presented to implement the proposed opportunistic network coding scheme without the need of any feedback between two network nodes. We consider the use of proposed ONC for cellular downlink transmissions and derive its closed-form outage probability expression considering cochannel interference in a Rayleigh fading environment. Numerical results show that the proposed ONC scheme outperforms the traditional non-cooperation in terms of outage probability. We also develop the diversity-multiplexing tradeoff (DMT) of proposed ONC and show that the ONC scheme obtains the full diversity and an increased multiplexing gain as compared with the conventional cooperation protocols.
[ { "version": "v1", "created": "Thu, 31 Jan 2013 03:44:30 GMT" } ]
2016-11-17T00:00:00
[ [ "Zou", "Yulong", "" ], [ "Zhu", "Jia", "" ], [ "Zheng", "Baoyu", "" ] ]
new_dataset
0.995157
1302.4463
Hooman Jarollahi
Hooman Jarollahi, Vincent Gripon, Naoya Onizawa, Warren J. Gross
A Low-Power Content-Addressable-Memory Based on Clustered-Sparse-Networks
Submitted to IEEE ASAP 2013
null
10.1109/ASAP.2013.6567594
null
cs.AR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A low-power Content-Addressable-Memory (CAM) is introduced employing a new mechanism for associativity between the input tags and the corresponding address of the output data. The proposed architecture is based on a recently developed clustered-sparse-network using binary-weighted connections that on-average will eliminate most of the parallel comparisons performed during a search. Therefore, the dynamic energy consumption of the proposed design is significantly lower compared to that of a conventional low-power CAM design. Given an input tag, the proposed architecture computes a few possibilities for the location of the matched tag and performs the comparisons on them to locate a single valid match. A 0.13 um CMOS technology was used for simulation purposes. The energy consumption and the search delay of the proposed design are 9.5%, and 30.4% of that of the conventional NAND architecture respectively with a 3.4% higher number of transistors.
[ { "version": "v1", "created": "Mon, 18 Feb 2013 21:23:54 GMT" } ]
2016-11-17T00:00:00
[ [ "Jarollahi", "Hooman", "" ], [ "Gripon", "Vincent", "" ], [ "Onizawa", "Naoya", "" ], [ "Gross", "Warren J.", "" ] ]
new_dataset
0.980882
1303.7083
Ziv Goldfeld
Ziv Goldfeld, Haim H. Permuter and Benjamin M. Zaidel
The Finite State MAC with Cooperative Encoders and Delayed CSI
null
IEEE Transactions on Information Theory, Vol. 60, No. 10, October 2014
10.1109/TIT.2014.2346494
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we consider the finite-state multiple access channel (MAC) with partially cooperative encoders and delayed channel state information (CSI). Here partial cooperation refers to the communication between the encoders via finite-capacity links. The channel states are assumed to be governed by a Markov process. Full CSI is assumed at the receiver, while at the transmitters, only delayed CSI is available. The capacity region of this channel model is derived by first solving the case of the finite-state MAC with a common message. Achievability for the latter case is established using the notion of strategies, however, we show that optimal codes can be constructed directly over the input alphabet. This results in a single codebook construction that is then leveraged to apply simultaneous joint decoding. Simultaneous decoding is crucial here because it circumvents the need to rely on the capacity region's corner points, a task that becomes increasingly cumbersome with the growth in the number of messages to be sent. The common message result is then used to derive the capacity region for the case with partially cooperating encoders. Next, we apply this general result to the special case of the Gaussian vector MAC with diagonal channel transfer matrices, which is suitable for modeling, e.g., orthogonal frequency division multiplexing (OFDM)-based communication systems. The capacity region of the Gaussian channel is presented in terms of a convex optimization problem that can be solved efficiently using numerical tools. The region is derived by first presenting an outer bound on the general capacity region and then suggesting a specific input distribution that achieves this bound. Finally, numerical results are provided that give valuable insight into the practical implications of optimally using conferencing to maximize the transmission rates.
[ { "version": "v1", "created": "Thu, 28 Mar 2013 10:30:39 GMT" }, { "version": "v2", "created": "Mon, 20 Jan 2014 13:51:56 GMT" }, { "version": "v3", "created": "Thu, 29 Jan 2015 12:11:30 GMT" } ]
2016-11-17T00:00:00
[ [ "Goldfeld", "Ziv", "" ], [ "Permuter", "Haim H.", "" ], [ "Zaidel", "Benjamin M.", "" ] ]
new_dataset
0.979996
1304.1926
Rodrigo de Lamare
T. Peng, R. C. de Lamare and A. Schmeink
Distributed Space-Time Coding Based on Adjustable Code Matrices for Cooperative MIMO Relaying Systems
6 figures
IEEE Transactions on Communications, 2013
10.1109/TCOMM.2013.043013.120788
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
An adaptive distributed space-time coding (DSTC) scheme is proposed for two-hop cooperative MIMO networks. Linear minimum mean square error (MMSE) receive filters and adjustable code matrices are considered subject to a power constraint with an amplify-and-forward (AF) cooperation strategy. In the proposed adaptive DSTC scheme, an adjustable code matrix obtained by a feedback channel is employed to transform the space-time coded matrix at the relay node. The effects of the limited feedback and the feedback errors are assessed. Linear MMSE expressions are devised to compute the parameters of the adjustable code matrix and the linear receive filters. Stochastic gradient (SG) and least-squares (LS) algorithms are also developed with reduced computational complexity. An upper bound on the pairwise error probability analysis is derived and indicates the advantage of employing the adjustable code matrices at the relay nodes. An alternative optimization algorithm for the adaptive DSTC scheme is also derived in order to eliminate the need for the feedback. The algorithm provides a fully distributed scheme for the adaptive DSTC at the relay node based on the minimization of the error probability. Simulation results show that the proposed algorithms obtain significant performance gains as compared to existing DSTC schemes.
[ { "version": "v1", "created": "Sat, 6 Apr 2013 19:21:48 GMT" } ]
2016-11-17T00:00:00
[ [ "Peng", "T.", "" ], [ "de Lamare", "R. C.", "" ], [ "Schmeink", "A.", "" ] ]
new_dataset
0.972391
1304.3519
Lin Wang
Lin Wang, Fa Zhang, Jordi Arjona Aroca, Athanasios V. Vasilakos, Kai Zheng, Chenying Hou, Dan Li, Zhiyong Liu
GreenDCN: a General Framework for Achieving Energy Efficiency in Data Center Networks
14 pages, accepted by IEEE JSAC
null
10.1109/JSAC.2014.140102
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The popularization of cloud computing has raised concerns over the energy consumption that takes place in data centers. In addition to the energy consumed by servers, the energy consumed by large numbers of network devices emerges as a significant problem. Existing work on energy-efficient data center networking primarily focuses on traffic engineering, which is usually adapted from traditional networks. We propose a new framework to embrace the new opportunities brought by combining some special features of data centers with traffic engineering. Based on this framework, we characterize the problem of achieving energy efficiency with a time-aware model, and we prove its NP-hardness with a solution that has two steps. First, we solve the problem of assigning virtual machines (VM) to servers to reduce the amount of traffic and to generate favorable conditions for traffic engineering. The solution reached for this problem is based on three essential principles that we propose. Second, we reduce the number of active switches and balance traffic flows, depending on the relation between power consumption and routing, to achieve energy conservation. Experimental results confirm that, by using this framework, we can achieve up to 50 percent energy savings. We also provide a comprehensive discussion on the scalability and practicability of the framework.
[ { "version": "v1", "created": "Fri, 12 Apr 2013 01:34:47 GMT" }, { "version": "v2", "created": "Sun, 21 Jul 2013 05:17:17 GMT" } ]
2016-11-17T00:00:00
[ [ "Wang", "Lin", "" ], [ "Zhang", "Fa", "" ], [ "Aroca", "Jordi Arjona", "" ], [ "Vasilakos", "Athanasios V.", "" ], [ "Zheng", "Kai", "" ], [ "Hou", "Chenying", "" ], [ "Li", "Dan", "" ], [ "Liu", "Zhiyong", "" ] ]
new_dataset
0.98991
1304.3553
Vincent Tan
Vincent Y. F. Tan
On the Reliability Function of the Discrete Memoryless Relay Channel
To appear in the IEEE Transactions on Information Theory; Presented in part at the 2013 ISIT
null
10.1109/TIT.2015.2400999
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Bounds on the reliability function for the discrete memoryless relay channel are derived using the method of types. Two achievable error exponents are derived based on partial decode-forward and compress-forward which are well-known superposition block-Markov coding schemes. The derivations require combinations of the techniques involved in the proofs of Csisz\'ar-K\"orner-Marton's packing lemma for the error exponent of channel coding and Marton's type covering lemma for the error exponent of source coding with a fidelity criterion. The decode-forward error exponent is evaluated on Sato's relay channel. From this example, it is noted that to obtain the fastest possible decay in the error probability for a fixed effective coding rate, one ought to optimize the number of blocks in the block-Markov coding scheme assuming the blocklength within each block is large. An upper bound on the reliability function is also derived using ideas from Haroutunian's lower bound on the error probability for point-to-point channel coding with feedback.
[ { "version": "v1", "created": "Fri, 12 Apr 2013 07:01:28 GMT" }, { "version": "v2", "created": "Wed, 22 Jan 2014 07:20:11 GMT" }, { "version": "v3", "created": "Tue, 23 Dec 2014 04:53:35 GMT" } ]
2016-11-17T00:00:00
[ [ "Tan", "Vincent Y. F.", "" ] ]
new_dataset
0.993321
1304.7487
Alex Bazarsky
Alex Bazarsky, Noam Presman, Simon Litsyn
Design of Non-Binary Quasi-Cyclic LDPC Codes by ACE Optimization
Accepted to 2013 IEEE Information Theory Workshop
null
10.1109/ITW.2013.6691250
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
An algorithm for constructing Tanner graphs of non-binary irregular quasi-cyclic LDPC codes is introduced. It employs a new method for selection of edge labels allowing control over the code's non-binary ACE spectrum and resulting in low error-floor. The efficiency of the algorithm is demonstrated by generating good codes of short to moderate length over small fields, outperforming codes generated by the known methods.
[ { "version": "v1", "created": "Sun, 28 Apr 2013 17:00:56 GMT" }, { "version": "v2", "created": "Thu, 25 Jul 2013 14:37:27 GMT" } ]
2016-11-17T00:00:00
[ [ "Bazarsky", "Alex", "" ], [ "Presman", "Noam", "" ], [ "Litsyn", "Simon", "" ] ]
new_dataset
0.978866
1305.2245
Andrew Eckford
Andrew W. Eckford and Peter J. Thomas
Capacity of a Simple Intercellular Signal Transduction Channel
5 pages, 1 figure. To appear in the 2013 IEEE International Symposium on Information Theory
null
10.1109/TIT.2016.2599178
null
cs.IT math.IT q-bio.CB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We model the ligand-receptor molecular communication channel with a discrete-time Markov model, and show how to obtain the capacity of this channel. We show that the capacity-achieving input distribution is iid; further, unusually for a channel with memory, we show that feedback does not increase the capacity of this channel.
[ { "version": "v1", "created": "Fri, 10 May 2013 02:02:36 GMT" } ]
2016-11-17T00:00:00
[ [ "Eckford", "Andrew W.", "" ], [ "Thomas", "Peter J.", "" ] ]
new_dataset
0.996373
1305.5216
Mingyue Ji
Mingyue Ji, Giuseppe Caire, and Andreas F. Molisch
Wireless Device-to-Device Caching Networks: Basic Principles and System Performance
35 pages; 13 figures; Revised version of the manuscript submitted to IEEE Journal on Selected Areas in Communications, Special Issue on Device to Device Communications in Cellular Networks
null
10.1109/JSAC.2015.2452672
null
cs.IT cs.MM cs.NI math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
As wireless video transmission is the fastest-growing form of data traffic, methods for spectrally efficient video on-demand wireless streaming are essential to service providers and users alike. A key property of video on-demand is the asynchronous content reuse, such that a few dominant videos account for a large part of the traffic, but are viewed by users at different times. Caching of content on devices in conjunction with D2D communications allows to exploit this property, and provide a network throughput that is significantly in excess of both the conventional approach of unicasting from the base station and the traditional D2D networks for regular data traffic. This paper presents in a semi-tutorial concise form some recent results on the throughput scaling laws of wireless networks with caching and asynchronous content reuse, contrasting the D2D approach with a competing approach based on combinatorial cache design and network coded transmission from the base station (BS) only, referred to as coded multicasting. Interestingly, the spatial reuse gain of the former and the coded multicasting gain of the latter yield, somehow surprisingly, the same near-optimal throughput behavior in the relevant regime where the number of video files in the library is smaller than the number of streaming users. Based on our recent theoretical results, we propose a holistic D2D system design that incorporates traditional microwave (2 GHz) as well as millimeter-wave D2D links; the direct connections to the base station can be used to provide those rare video requests that cannot be found in local caches. We provide extensive simulations under a variety of system settings, and compare our scheme with other existing schemes by the BS. We show that, despite the similar behavior of the scaling laws, the proposed D2D approach offers very significant throughput gains with respect to the BS-only schemes.
[ { "version": "v1", "created": "Wed, 22 May 2013 18:03:46 GMT" }, { "version": "v2", "created": "Thu, 24 Apr 2014 23:43:27 GMT" } ]
2016-11-17T00:00:00
[ [ "Ji", "Mingyue", "" ], [ "Caire", "Giuseppe", "" ], [ "Molisch", "Andreas F.", "" ] ]
new_dataset
0.999107
1307.2800
Kai Chen
Kai Chen, Kai Niu, and Jiaru Lin
A Hybrid ARQ Scheme Based on Polar Codes
Submitted to IEEE Communications Letters
null
10.1109/LCOMM.2013.090213.131670
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A hybrid automatic repeat request (HARQ) scheme based on a novel class of rate-compatible polar (\mbox{RCP}) codes are proposed. The RCP codes are constructed by performing punctures and repetitions on the conventional polar codes. Simulation results over binary-input additive white Gaussian noise channels (BAWGNCs) show that, using a low-complexity successive cancellation (SC) decoder, the proposed HARQ scheme performs as well as the existing schemes based on turbo codes and low-density parity-check (LDPC) codes. The proposed transmission scheme is only about 1.0-1.5dB away from the channel capacity with the information block length of 1024 bits.
[ { "version": "v1", "created": "Wed, 10 Jul 2013 14:11:33 GMT" } ]
2016-11-17T00:00:00
[ [ "Chen", "Kai", "" ], [ "Niu", "Kai", "" ], [ "Lin", "Jiaru", "" ] ]
new_dataset
0.999446
1307.3156
Tinku Rasheed
Riccardo Fedrizzi, Tinku Rasheed
Cooperative Short Range Routing for Energy Savings in Multi-Interface Wireless Networks
Accepted at IEEE VTC-Spring Conference 2013, Dresden, June 2013
null
10.1109/VTCSpring.2013.6692491
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Energy efficiency in wireless networks has become an important field of research due to ever increasing energy expenditure in battery supplied mobile terminals. In this paper we present an energy efficient routing scheme for multi-standard infrastructure wireless networks based on multi-hop cooperative relaying. The aim of the proposed technique is to exploit short-range cooperation to take benefit from mobile terminals having superior links thus enable energy efficiency. Performance results show that higher data-rate yielded by cooperation can compensate the expense of higher energy due to multiple interfaces active on the same mobile terminal, making possible to observe energy efficiency gain of the system. A maximum achievable energy efficiency gain of up to 42 % was observed in our simulations when using the cooperative short range routing technique.
[ { "version": "v1", "created": "Thu, 11 Jul 2013 16:03:53 GMT" } ]
2016-11-17T00:00:00
[ [ "Fedrizzi", "Riccardo", "" ], [ "Rasheed", "Tinku", "" ] ]
new_dataset
0.991028
1307.7059
Dr. Nadeem Javaid
D. Mahmood, N. Javaid, S. Mahmood, S. Qureshi, A. M. Memon, T. Zaman
MODLEACH: A Variant of LEACH for WSNs
IEEE 8th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA'13), Compiegne, France
null
10.1109/BWCCA.2013.34
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Wireless sensor networks are appearing as an emerging need for mankind. Though, Such networks are still in research phase however, they have high potential to be applied in almost every field of life. Lots of research is done and a lot more is awaiting to be standardized. In this work, cluster based routing in wireless sensor networks is studied precisely. Further, we modify one of the most prominent wireless sensor network's routing protocol "LEACH" as modified LEACH (MODLEACH) by introducing \emph{efficient cluster head replacement scheme} and \emph{dual transmitting power levels}. Our modified LEACH, in comparison with LEACH out performs it using metrics of cluster head formation, through put and network life. Afterwards, hard and soft thresholds are implemented on modified LEACH (MODLEACH) that boast the performance even more. Finally a brief performance analysis of LEACH, Modified LEACH (MODLEACH), MODLEACH with hard threshold (MODLEACHHT) and MODLEACH with soft threshold (MODLEACHST) is undertaken considering metrics of throughput, network life and cluster head replacements.
[ { "version": "v1", "created": "Fri, 26 Jul 2013 15:05:33 GMT" } ]
2016-11-17T00:00:00
[ [ "Mahmood", "D.", "" ], [ "Javaid", "N.", "" ], [ "Mahmood", "S.", "" ], [ "Qureshi", "S.", "" ], [ "Memon", "A. M.", "" ], [ "Zaman", "T.", "" ] ]
new_dataset
0.98704
1308.1144
Hessam Mahdavifar
Hessam Mahdavifar, Mostafa El-Khamy, Jungwon Lee, Inyup Kang
Performance Limits and Practical Decoding of Interleaved Reed-Solomon Polar Concatenated Codes
Submitted to IEEE Transactions on Communications. arXiv admin note: substantial text overlap with arXiv:1301.7491
null
10.1109/TCOMM.2014.050714.130602
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A scheme for concatenating the recently invented polar codes with non-binary MDS codes, as Reed-Solomon codes, is considered. By concatenating binary polar codes with interleaved Reed-Solomon codes, we prove that the proposed concatenation scheme captures the capacity-achieving property of polar codes, while having a significantly better error-decay rate. We show that for any $\epsilon > 0$, and total frame length $N$, the parameters of the scheme can be set such that the frame error probability is less than $2^{-N^{1-\epsilon}}$, while the scheme is still capacity achieving. This improves upon $2^{-N^{0.5-\epsilon}}$, the frame error probability of Arikan's polar codes. The proposed concatenated polar codes and Arikan's polar codes are also compared for transmission over channels with erasure bursts. We provide a sufficient condition on the length of erasure burst which guarantees failure of the polar decoder. On the other hand, it is shown that the parameters of the concatenated polar code can be set in such a way that the capacity-achieving properties of polar codes are preserved. We also propose decoding algorithms for concatenated polar codes, which significantly improve the error-rate performance at finite block lengths while preserving the low decoding complexity.
[ { "version": "v1", "created": "Tue, 6 Aug 2013 00:06:21 GMT" } ]
2016-11-17T00:00:00
[ [ "Mahdavifar", "Hessam", "" ], [ "El-Khamy", "Mostafa", "" ], [ "Lee", "Jungwon", "" ], [ "Kang", "Inyup", "" ] ]
new_dataset
0.978753
1309.5262
Eirik Rosnes
\'Angela I. Barbero, Eirik Rosnes, Guang Yang, and {\O}yvind Ytrehus
Near-Field Passive RFID Communication: Channel Model and Code Design
Submitted to IEEE Transactions on Communications. Accepted March 5, 2014
null
10.1109/TCOMM.2014.032314.130723
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper discusses a new channel model and code design for the reader-to-tag channel in near-field passive radio frequency identification (RFID) systems using inductive coupling as a power transfer mechanism. If the receiver resynchronizes its internal clock each time a bit is detected, the bit-shift channel used previously in the literature to model the reader-to-tag channel needs to be modified. In particular, we propose a discretized Gaussian shift channel as a new channel model in this scenario. We introduce the concept of quantifiable error avoidance, which is much simpler than error correction. The capacity is computed numerically, and we also design some new simple codes for error avoidance on this channel model based on insights gained from the capacity calculations. Finally, some simulation results are presented to compare the proposed codes to the Manchester code and two previously proposed codes for the bit-shift channel model.
[ { "version": "v1", "created": "Fri, 20 Sep 2013 13:22:44 GMT" }, { "version": "v2", "created": "Fri, 21 Mar 2014 08:02:02 GMT" } ]
2016-11-17T00:00:00
[ [ "Barbero", "Ángela I.", "" ], [ "Rosnes", "Eirik", "" ], [ "Yang", "Guang", "" ], [ "Ytrehus", "Øyvind", "" ] ]
new_dataset
0.995755
1309.5546
Yang-Seok Choi
Yang-Seok Choi, Hooman Shirani-Mehr
Simultaneous Transmission and Reception: Algorithm, Design and System Level Performance
20 pages. This manuscript will appear in the IEEE Transactions on Wireless Communications
null
10.1109/TWC.2013.101713.121152
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Full Duplex or Simultaneous transmission and reception (STR) in the same frequency at the same time can potentially double the physical layer capacity. However, high power transmit signal will appear at receive chain as echoes with powers much higher than the desired received signal. Therefore, in order to achieve the potential gain, it is imperative to cancel these echoes. As these high power echoes can saturate low noise amplifier (LNA) and also digital domain echo cancellation requires unrealistically high resolution analog-to-digital converter (ADC), the echoes should be cancelled or suppressed sufficiently before LNA. In this paper we present a closed-loop echo cancellation technique which can be implemented purely in analogue domain. The advantages of our method are multiple-fold: it is robust to phase noise, does not require additional set of antennas, can be applied to wideband signals and the performance is irrelevant to radio frequency (RF) impairments in transmit chain. Next, we study a few protocols for STR systems in carrier sense multiple access (CSMA) network and investigate MAC level throughput with realistic assumptions in both single cell and multiple cells. We show that STR can reduce hidden node problem in CSMA network and produce gains of up to 279% in maximum throughput in such networks. Finally, we investigate the application of STR in cellular systems and study two new unique interferences introduced to the system due to STR, namely BS-BS interference and UE-UE interference. We show that these two new interferences will hugely degrade system performance if not treated appropriately. We propose novel methods to reduce both interferences and investigate the performances in system level.
[ { "version": "v1", "created": "Sun, 22 Sep 2013 00:49:14 GMT" } ]
2016-11-17T00:00:00
[ [ "Choi", "Yang-Seok", "" ], [ "Shirani-Mehr", "Hooman", "" ] ]
new_dataset
0.993453
1311.1025
Marco Miozzo
Marco Miozzo, Davide Zordan, Paolo Dini and Michele Rossi
SolarStat: Modeling Photovoltaic Sources through Stochastic Markov Processes
Submitted to IEEE EnergyCon 2014
null
10.1109/ENERGYCON.2014.6850501
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we present a methodology and a tool to derive simple but yet accurate stochastic Markov processes for the description of the energy scavenged by outdoor solar sources. In particular, we target photovoltaic panels with small form factors, as those exploited by embedded communication devices such as wireless sensor nodes or, concerning modern cellular system technology, by small-cells. Our models are especially useful for the theoretical investigation and the simulation of energetically self-sufficient communication systems including these devices. The Markov models that we derive in this paper are obtained from extensive solar radiation databases, that are widely available online. Basically, from hourly radiance patterns, we derive the corresponding amount of energy (current and voltage) that is accumulated over time, and we finally use it to represent the scavenged energy in terms of its relevant statistics. Toward this end, two clustering approaches for the raw radiance data are described and the resulting Markov models are compared against the empirical distributions. Our results indicate that Markov models with just two states provide a rough characterization of the real data traces. While these could be sufficiently accurate for certain applications, slightly increasing the number of states to, e.g., eight, allows the representation of the real energy inflow process with an excellent level of accuracy in terms of first and second order statistics. Our tool has been developed using Matlab(TM) and is available under the GPL license at[1].
[ { "version": "v1", "created": "Tue, 5 Nov 2013 12:12:30 GMT" } ]
2016-11-17T00:00:00
[ [ "Miozzo", "Marco", "" ], [ "Zordan", "Davide", "" ], [ "Dini", "Paolo", "" ], [ "Rossi", "Michele", "" ] ]
new_dataset
0.990507
1311.1240
Adel M. Elmahdy
Adel M. Elmahdy, Sameh Sorour, and Karim G. Seddik
Generalized Instantly Decodable Network Coding for Relay-Assisted Networks
5 pages, IEEE PIMRC 2013
null
10.1109/PIMRC.2013.6666427
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we investigate the problem of minimizing the frame completion delay for Instantly Decodable Network Coding (IDNC) in relay-assisted wireless multicast networks. We first propose a packet recovery algorithm in the single relay topology which employs generalized IDNC instead of strict IDNC previously proposed in the literature for the same relay-assisted topology. This use of generalized IDNC is supported by showing that it is a super-set of the strict IDNC scheme, and thus can generate coding combinations that are at least as efficient as strict IDNC in reducing the average completion delay. We then extend our study to the multiple relay topology and propose a joint generalized IDNC and relay selection algorithm. This proposed algorithm benefits from the reception diversity of the multiple relays to further reduce the average completion delay in the network. Simulation results show that our proposed solutions achieve much better performance compared to previous solutions in the literature.
[ { "version": "v1", "created": "Tue, 5 Nov 2013 22:21:06 GMT" }, { "version": "v2", "created": "Thu, 9 Oct 2014 11:00:21 GMT" } ]
2016-11-17T00:00:00
[ [ "Elmahdy", "Adel M.", "" ], [ "Sorour", "Sameh", "" ], [ "Seddik", "Karim G.", "" ] ]
new_dataset
0.993976