id
stringlengths
9
10
submitter
stringlengths
2
52
authors
stringlengths
4
6.51k
title
stringlengths
4
246
comments
stringlengths
1
523
journal-ref
stringlengths
4
345
doi
stringlengths
11
120
report-no
stringlengths
2
243
categories
stringlengths
5
98
license
stringclasses
9 values
abstract
stringlengths
33
3.33k
versions
list
update_date
timestamp[s]
authors_parsed
list
prediction
stringclasses
1 value
probability
float64
0.95
1
cs/0611160
Kai-Uwe Schmidt
Kai-Uwe Schmidt
Complementary Sets, Generalized Reed-Muller Codes, and Power Control for OFDM
null
IEEE Trans. Inf. Theory, vol. 53, no. 2, pp. 808-814, 2007
10.1109/TIT.2006.889723
null
cs.IT math.IT
null
The use of error-correcting codes for tight control of the peak-to-mean envelope power ratio (PMEPR) in orthogonal frequency-division multiplexing (OFDM) transmission is considered in this correspondence. By generalizing a result by Paterson, it is shown that each q-phase (q is even) sequence of length 2^m lies in a complementary set of size 2^{k+1}, where k is a nonnegative integer that can be easily determined from the generalized Boolean function associated with the sequence. For small k this result provides a reasonably tight bound for the PMEPR of q-phase sequences of length 2^m. A new 2^h-ary generalization of the classical Reed-Muller code is then used together with the result on complementary sets to derive flexible OFDM coding schemes with low PMEPR. These codes include the codes developed by Davis and Jedwab as a special case. In certain situations the codes in the present correspondence are similar to Paterson's code constructions and often outperform them.
[ { "version": "v1", "created": "Thu, 30 Nov 2006 10:38:59 GMT" } ]
2016-11-17T00:00:00
[ [ "Schmidt", "Kai-Uwe", "" ] ]
new_dataset
0.973972
cs/0612083
Wenbing Zhao
Wenbing Zhao
A Byzantine Fault Tolerant Distributed Commit Protocol
To appear in the proceedings of the 3rd IEEE International Symposium on Dependable, Autonomic and Secure Computing, 2007
null
10.1109/DASC.2007.10
null
cs.DC cs.DB
null
In this paper, we present a Byzantine fault tolerant distributed commit protocol for transactions running over untrusted networks. The traditional two-phase commit protocol is enhanced by replicating the coordinator and by running a Byzantine agreement algorithm among the coordinator replicas. Our protocol can tolerate Byzantine faults at the coordinator replicas and a subset of malicious faults at the participants. A decision certificate, which includes a set of registration records and a set of votes from participants, is used to facilitate the coordinator replicas to reach a Byzantine agreement on the outcome of each transaction. The certificate also limits the ways a faulty replica can use towards non-atomic termination of transactions, or semantically incorrect transaction outcomes.
[ { "version": "v1", "created": "Mon, 18 Dec 2006 09:31:43 GMT" }, { "version": "v2", "created": "Tue, 30 Jan 2007 17:27:10 GMT" }, { "version": "v3", "created": "Wed, 1 Aug 2007 04:54:38 GMT" } ]
2016-11-17T00:00:00
[ [ "Zhao", "Wenbing", "" ] ]
new_dataset
0.999532
cs/0701065
Ioannis Chatzigeorgiou
I. Chatzigeorgiou, M. R. D. Rodrigues, I. J. Wassell, R. Carrasco
Can Punctured Rate-1/2 Turbo Codes Achieve a Lower Error Floor than their Rate-1/3 Parent Codes?
5 pages, 7 figures, Proceedings of the 2006 IEEE Information Theory Workshop, Chengdu, China, October 22-26, 2006
null
10.1109/ITW2.2006.323763
null
cs.IT math.IT
null
In this paper we concentrate on rate-1/3 systematic parallel concatenated convolutional codes and their rate-1/2 punctured child codes. Assuming maximum-likelihood decoding over an additive white Gaussian channel, we demonstrate that a rate-1/2 non-systematic child code can exhibit a lower error floor than that of its rate-1/3 parent code, if a particular condition is met. However, assuming iterative decoding, convergence of the non-systematic code towards low bit-error rates is problematic. To alleviate this problem, we propose rate-1/2 partially-systematic codes that can still achieve a lower error floor than that of their rate-1/3 parent codes. Results obtained from extrinsic information transfer charts and simulations support our conclusion.
[ { "version": "v1", "created": "Tue, 9 Jan 2007 16:32:59 GMT" } ]
2016-11-17T00:00:00
[ [ "Chatzigeorgiou", "I.", "" ], [ "Rodrigues", "M. R. D.", "" ], [ "Wassell", "I. J.", "" ], [ "Carrasco", "R.", "" ] ]
new_dataset
0.992617
cs/0703078
Igor Bjelakovic
Tobias J. Oechtering, Igor Bjelakovic, Clemens Schnurr and Holger Boche
Broadcast Capacity Region of Two-Phase Bidirectional Relaying
25 pages, 2 figures, submitted to IEEE Transactions on Information Theory
null
10.1109/TIT.2007.911158
null
cs.IT math.IT
null
In a three-node network a half-duplex relay node enables bidirectional communication between two nodes with a spectral efficient two phase protocol. In the first phase, two nodes transmit their message to the relay node, which decodes the messages and broadcast a re-encoded composition in the second phase. In this work we determine the capacity region of the broadcast phase. In this scenario each receiving node has perfect information about the message that is intended for the other node. The resulting set of achievable rates of the two-phase bidirectional relaying includes the region which can be achieved by applying XOR on the decoded messages at the relay node. We also prove the strong converse for the maximum error probability and show that this implies that the $[\eps_1,\eps_2]$-capacity region defined with respect to the average error probability is constant for small values of error parameters $\eps_1$, $\eps_2$.
[ { "version": "v1", "created": "Thu, 15 Mar 2007 10:26:04 GMT" } ]
2016-11-17T00:00:00
[ [ "Oechtering", "Tobias J.", "" ], [ "Bjelakovic", "Igor", "" ], [ "Schnurr", "Clemens", "" ], [ "Boche", "Holger", "" ] ]
new_dataset
0.992018
1604.07957
Minho Yang
Minho Yang, Sang-Woon Jeon, Dong Ku Kim
Degrees of Freedom of Full-Duplex Cellular Networks with Reconfigurable Antennas at Base Station
Submitted to IEEE Transactions on Wireless Communications
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Full-duplex (FD) cellular networks are considered in which a FD base station (BS) simultaneously supports a set of half-duplex (HD) downlink (DL) users and a set of HD uplink (UL) users. The transmitter and the receiver of the BS are equipped with reconfigurable antennas, each of which can choose its transmit or receive mode from several preset modes. Under the no self-interference assumption arisen from FD operation at the BS, the sum degrees of freedom (DoF) of FD cellular networks is investigated for both no channel state information at the transmit side (CSIT) and partial CSIT. In particular, the sum DoF is completely characterized for no CSIT model and an achievable sum DoF is established for the partial CSIT model, which improves the sum DoF of the conventional HD cellular networks. For both no CSIT and partial CSIT models, the results show that the FD BS with reconfigurable antennas can double the sum DoF even in the presence of user-to-user interference as both the numbers of DL and UL users and preset modes increase. It is further demonstrated that such DoF improvement indeed yields the sum rate improvement at the finite and operational signal-to-noise ratio regime.
[ { "version": "v1", "created": "Wed, 27 Apr 2016 07:23:58 GMT" }, { "version": "v2", "created": "Tue, 15 Nov 2016 00:55:55 GMT" } ]
2016-11-16T00:00:00
[ [ "Yang", "Minho", "" ], [ "Jeon", "Sang-Woon", "" ], [ "Kim", "Dong Ku", "" ] ]
new_dataset
0.996667
1611.04061
Enys Mones
Enys Mones and Arkadiusz Stopczynski and Sune Lehmann
Contact activity and dynamics of the online elite
null
null
null
null
cs.SI physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Humans interact through numerous channels to build and maintain social connections: they meet face-to-face, initiate phone calls or send text messages, and interact via social media. Although it is known that the network of physical contacts, for example, is distinct from the network arising from communication events via phone calls and instant messages, the extent to which these networks differ is not clear. In fact, the network structure of these channels shows large structural variations. Each network of interactions, however, contains both central and peripheral individuals: central members are characterized by higher connectivity and can reach a high fraction of the network within a low number of connections, contrary to the nodes on the periphery. Here we show that the various channels account for diverse relationships between pairs of individuals and the corresponding interaction patterns across channels differ to an extent that hinders the simple reduction of social ties to a single layer. Furthemore, the origin and purpose of each network also determine the role of their respective central members: highly connected individuals in the person-to-person networks interact with their environment in a regular manner, while members central in the social communication networks display irregular behavior with respect to their physical contacts and are more active through rare, social events. These results suggest that due to the inherently different functions of communication channels, each one favors different social behaviors and different strategies for interacting with the environment. Our findings can facilitate the understanding of the varying roles and impact individuals have on the population, which can further shed light on the prediction and prevention of epidemic outbreaks, or information propagation.
[ { "version": "v1", "created": "Sun, 13 Nov 2016 00:37:36 GMT" } ]
2016-11-16T00:00:00
[ [ "Mones", "Enys", "" ], [ "Stopczynski", "Arkadiusz", "" ], [ "Lehmann", "Sune", "" ] ]
new_dataset
0.985396
1611.04358
Weijie Huang
Weijie Huang, Jun Wang
Character-level Convolutional Network for Text Classification Applied to Chinese Corpus
MSc Thesis, 44 pages
null
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This article provides an interesting exploration of character-level convolutional neural network solving Chinese corpus text classification problem. We constructed a large-scale Chinese language dataset, and the result shows that character-level convolutional neural network works better on Chinese corpus than its corresponding pinyin format dataset. This is the first time that character-level convolutional neural network applied to text classification problem.
[ { "version": "v1", "created": "Mon, 14 Nov 2016 12:24:27 GMT" }, { "version": "v2", "created": "Tue, 15 Nov 2016 14:41:23 GMT" } ]
2016-11-16T00:00:00
[ [ "Huang", "Weijie", "" ], [ "Wang", "Jun", "" ] ]
new_dataset
0.982983
1611.04636
Honglin Zheng
Honglin Zheng, Tianlang Chen, Jiebo Luo
When Saliency Meets Sentiment: Understanding How Image Content Invokes Emotion and Sentiment
7 pages, 5 figures, submitted to AAAI-17
null
null
null
cs.AI cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Sentiment analysis is crucial for extracting social signals from social media content. Due to the prevalence of images in social media, image sentiment analysis is receiving increasing attention in recent years. However, most existing systems are black-boxes that do not provide insight on how image content invokes sentiment and emotion in the viewers. Psychological studies have confirmed that salient objects in an image often invoke emotions. In this work, we investigate more fine-grained and more comprehensive interaction between visual saliency and visual sentiment. In particular, we partition images in several primary scene-type dimensions, including: open-closed, natural-manmade, indoor-outdoor, and face-noface. Using state of the art saliency detection algorithm and sentiment classification algorithm, we examine how the sentiment of the salient region(s) in an image relates to the overall sentiment of the image. The experiments on a representative image emotion dataset have shown interesting correlation between saliency and sentiment in different scene types and in turn shed light on the mechanism of visual sentiment evocation.
[ { "version": "v1", "created": "Mon, 14 Nov 2016 22:02:09 GMT" } ]
2016-11-16T00:00:00
[ [ "Zheng", "Honglin", "" ], [ "Chen", "Tianlang", "" ], [ "Luo", "Jiebo", "" ] ]
new_dataset
0.998967
1611.04665
Omid Kavehei
Jeeson Kim, Taimur Ahmed, Hussein Nili, Jiawei Yang, Doo Seok Jeong, Paul Beckett, Sharath Sriram, Damith C. Ranasinghe, Omid Kavehei
A Physical Unclonable Function with Redox-based Nanoionic Resistive Memory
12 pages, 8 figures
null
null
null
cs.ET cond-mat.other
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A unique set of characteristics are packed in emerging nonvolatile reduction-oxidation (redox)-based resistive switching memories (ReRAMs) such as their underlying stochastic switching processes alongside their intrinsic highly nonlinear current-voltage characteristic, which in addition to known nano-fabrication process variation make them a promising candidate for the next generation of low-cost, low-power, tiny and secure Physically Unclonable Functions (PUFs). This paper takes advantage of this otherwise disadvantageous ReRAM feature using a combination of novel architectural and peripheral circuitry. We present a physical one-way function, nonlinear resistive Physical Unclonable Function (nrPUF), potentially applicable in variety of cyber-physical security applications given its performance characteristics. We experimentally verified performance of Valency Change Mechanism (VCM)-based ReRAM in nano-fabricated crossbar arrays across multiple dies and runs. In addition to a massive pool of Challenge-Response Pairs (CRPs), using a combination of experimental and simulation, our proposed PUF shows a reliability of 98.67%, a uniqueness of 49.85%, a diffuseness of 49.86%, a uniformity of 47.28%, and a bit-aliasing of 47.48%.
[ { "version": "v1", "created": "Tue, 15 Nov 2016 01:21:33 GMT" } ]
2016-11-16T00:00:00
[ [ "Kim", "Jeeson", "" ], [ "Ahmed", "Taimur", "" ], [ "Nili", "Hussein", "" ], [ "Yang", "Jiawei", "" ], [ "Jeong", "Doo Seok", "" ], [ "Beckett", "Paul", "" ], [ "Sriram", "Sharath", "" ], [ "Ranasinghe", "Damith C.", "" ], [ "Kavehei", "Omid", "" ] ]
new_dataset
0.997764
1611.04786
Battista Biggio
Igino Corona and Battista Biggio and Davide Maiorca
AdversariaLib: An Open-source Library for the Security Evaluation of Machine Learning Algorithms Under Attack
null
null
null
null
cs.CR cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present AdversariaLib, an open-source python library for the security evaluation of machine learning (ML) against carefully-targeted attacks. It supports the implementation of several attacks proposed thus far in the literature of adversarial learning, allows for the evaluation of a wide range of ML algorithms, runs on multiple platforms, and has multi-processing enabled. The library has a modular architecture that makes it easy to use and to extend by implementing novel attacks and countermeasures. It relies on other widely-used open-source ML libraries, including scikit-learn and FANN. Classification algorithms are implemented and optimized in C/C++, allowing for a fast evaluation of the simulated attacks. The package is distributed under the GNU General Public License v3, and it is available for download at http://sourceforge.net/projects/adversarialib.
[ { "version": "v1", "created": "Tue, 15 Nov 2016 10:54:58 GMT" } ]
2016-11-16T00:00:00
[ [ "Corona", "Igino", "" ], [ "Biggio", "Battista", "" ], [ "Maiorca", "Davide", "" ] ]
new_dataset
0.996886
1611.04853
Qingchun Chen
Lei Zheng, Qifa Yan, Qingchun Chen, Xiaohu Tang
On the Coded Caching Delivery Design over Wireless Networks
18 pages, 7 figures
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Coded caching scheme is a promising technique to migrate the network burden in peak hours, which attains more prominent gains than the uncoded caching. The coded caching scheme can be classified into two types, namely, the centralized and the decentralized scheme, according to whether the placement procedures are carefully designed or operated at random. However, most of the previous analysis assumes that the connected links between server and users are error-free. In this paper, we explore the coded caching based delivery design in wireless networks, where all the connected wireless links are different. For both centralized and decentralized cases, we proposed two delivery schemes, namely, the orthogonal delivery scheme and the concurrent delivery scheme. We focus on the transmission time slots spent on satisfying the system requests, and prove that for both the centralized and the decentralized cases, the concurrent delivery always outperforms orthogonal delivery scheme. Furthermore, for the orthogonal delivery scheme, we derive the gap in terms of transmission time between the decentralized and centralized case, which is essentially no more than 1.5.
[ { "version": "v1", "created": "Tue, 15 Nov 2016 14:29:38 GMT" } ]
2016-11-16T00:00:00
[ [ "Zheng", "Lei", "" ], [ "Yan", "Qifa", "" ], [ "Chen", "Qingchun", "" ], [ "Tang", "Xiaohu", "" ] ]
new_dataset
0.993372
0704.3199
Enrico Paolini
E. Paolini, M. Fossorier, M. Chiani
Generalized Stability Condition for Generalized and Doubly-Generalized LDPC Codes
5 pages, 2 figures, to appear in Proc. of IEEE ISIT 2007
null
10.1109/ISIT.2007.4557440
null
cs.IT math.IT
null
In this paper, the stability condition for low-density parity-check (LDPC) codes on the binary erasure channel (BEC) is extended to generalized LDPC (GLDPC) codes and doublygeneralized LDPC (D-GLDPC) codes. It is proved that, in both cases, the stability condition only involves the component codes with minimum distance 2. The stability condition for GLDPC codes is always expressed as an upper bound to the decoding threshold. This is not possible for D-GLDPC codes, unless all the generalized variable nodes have minimum distance at least 3. Furthermore, a condition called derivative matching is defined in the paper. This condition is sufficient for a GLDPC or DGLDPC code to achieve the stability condition with equality. If this condition is satisfied, the threshold of D-GLDPC codes (whose generalized variable nodes have all minimum distance at least 3) and GLDPC codes can be expressed in closed form.
[ { "version": "v1", "created": "Tue, 24 Apr 2007 14:11:58 GMT" } ]
2016-11-15T00:00:00
[ [ "Paolini", "E.", "" ], [ "Fossorier", "M.", "" ], [ "Chiani", "M.", "" ] ]
new_dataset
0.997826
0708.2273
Ozgur Oyman
Ozgur Oyman
Opportunism in Multiuser Relay Channels: Scheduling, Routing and Spectrum Reuse
5 pages
IEEE International Symposium on Information Theory (ISIT), Nice, France, June 2007
10.1109/ISIT.2007.4557240
null
cs.IT math.IT
null
In order to understand the key merits of multiuser diversity techniques in relay-assisted cellular multihop networks, this paper analyzes the spectral efficiency of opportunistic (i.e., channel-aware) scheduling algorithms over a fading multiuser relay channel with $K$ users in the asymptotic regime of large (but finite) number of users. Using tools from extreme-value theory, we characterize the limiting distribution of spectral efficiency focusing on Type I convergence and utilize it in investigating the large system behavior of the multiuser relay channel as a function of the number of users and physical channel signal-to-noise ratios (SNRs). Our analysis results in very accurate formulas in the large (but finite) $K$ regime, provides insights on the potential performance enhancements from multihop routing and spectrum reuse policies in the presence of multiuser diversity gains from opportunistic scheduling and helps to identify the regimes and conditions in which relay-assisted multiuser communication provides a clear advantage over direct multiuser communication.
[ { "version": "v1", "created": "Thu, 16 Aug 2007 21:44:43 GMT" } ]
2016-11-15T00:00:00
[ [ "Oyman", "Ozgur", "" ] ]
new_dataset
0.993411
0712.1169
Shengshan Cui
Shengshan Cui, Alexander M. Haimovich, Oren Somekh and H. Vincent Poor
Opportunistic Relaying in Wireless Networks
17 pages, 8 figures, To appear in IEEE Transactions on Information Theory
null
10.1109/TIT.2009.2030435
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Relay networks having $n$ source-to-destination pairs and $m$ half-duplex relays, all operating in the same frequency band in the presence of block fading, are analyzed. This setup has attracted significant attention and several relaying protocols have been reported in the literature. However, most of the proposed solutions require either centrally coordinated scheduling or detailed channel state information (CSI) at the transmitter side. Here, an opportunistic relaying scheme is proposed, which alleviates these limitations. The scheme entails a two-hop communication protocol, in which sources communicate with destinations only through half-duplex relays. The key idea is to schedule at each hop only a subset of nodes that can benefit from \emph{multiuser diversity}. To select the source and destination nodes for each hop, it requires only CSI at receivers (relays for the first hop, and destination nodes for the second hop) and an integer-value CSI feedback to the transmitters. For the case when $n$ is large and $m$ is fixed, it is shown that the proposed scheme achieves a system throughput of $m/2$ bits/s/Hz. In contrast, the information-theoretic upper bound of $(m/2)\log \log n$ bits/s/Hz is achievable only with more demanding CSI assumptions and cooperation between the relays. Furthermore, it is shown that, under the condition that the product of block duration and system bandwidth scales faster than $\log n$, the achievable throughput of the proposed scheme scales as $\Theta ({\log n})$. Notably, this is proven to be the optimal throughput scaling even if centralized scheduling is allowed, thus proving the optimality of the proposed scheme in the scaling law sense.
[ { "version": "v1", "created": "Fri, 7 Dec 2007 16:19:52 GMT" }, { "version": "v2", "created": "Wed, 7 Jan 2009 07:17:19 GMT" }, { "version": "v3", "created": "Fri, 24 Jul 2009 06:06:23 GMT" } ]
2016-11-15T00:00:00
[ [ "Cui", "Shengshan", "" ], [ "Haimovich", "Alexander M.", "" ], [ "Somekh", "Oren", "" ], [ "Poor", "H. Vincent", "" ] ]
new_dataset
0.996671
0802.1815
Ding Yang
Yang Ding
A Construction for Constant-Composition Codes
4 pages, submitted to IEEE Infromation Theory
null
10.1109/TIT.2008.926380
null
cs.IT math.IT
null
By employing the residue polynomials, a construction of constant-composition codes is given. This construction generalizes the one proposed by Xing[16]. It turns out that when d=3 this construction gives a lower bound of constant-composition codes improving the one in [10]. Moreover, for d>3, we give a lower bound on maximal size of constant-composition codes. In particular, our bound for d=5 gives the best possible size of constant-composition codes up to magnitude.
[ { "version": "v1", "created": "Wed, 13 Feb 2008 12:59:04 GMT" } ]
2016-11-15T00:00:00
[ [ "Ding", "Yang", "" ] ]
new_dataset
0.998961
0803.3632
Mikhail Nesterenko
Mikhail Nesterenko, Adnan Vora
Void Traversal for Guaranteed Delivery in Geometric Routing
null
The 2nd IEEE International Conference on Mobile Ad-hoc and Sensor Systems (MASS 2005), Washington, DC, November, 2005
10.1109/MAHSS.2005.1542862
null
cs.OS cs.DC cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Geometric routing algorithms like GFG (GPSR) are lightweight, scalable algorithms that can be used to route in resource-constrained ad hoc wireless networks. However, such algorithms run on planar graphs only. To efficiently construct a planar graph, they require a unit-disk graph. To make the topology unit-disk, the maximum link length in the network has to be selected conservatively. In practical setting this leads to the designs where the node density is rather high. Moreover, the network diameter of a planar subgraph is greater than the original graph, which leads to longer routes. To remedy this problem, we propose a void traversal algorithm that works on arbitrary geometric graphs. We describe how to use this algorithm for geometric routing with guaranteed delivery and compare its performance with GFG.
[ { "version": "v1", "created": "Tue, 25 Mar 2008 20:52:17 GMT" } ]
2016-11-15T00:00:00
[ [ "Nesterenko", "Mikhail", "" ], [ "Vora", "Adnan", "" ] ]
new_dataset
0.978078
0804.0996
Boris Kudryashov D.
Irina E. Bocharova, Rolf Johannesson, Boris D.Kudryashov, Victor V. Zyablov
Woven Graph Codes: Asymptotic Performances and Examples
Submitted to IEEE Trans. Inform. Theory
null
10.1109/TIT.2009.2034787
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Constructions of woven graph codes based on constituent block and convolutional codes are studied. It is shown that within the random ensemble of such codes based on $s$-partite, $s$-uniform hypergraphs, where $s$ depends only on the code rate, there exist codes satisfying the Varshamov-Gilbert (VG) and the Costello lower bound on the minimum distance and the free distance, respectively. A connection between regular bipartite graphs and tailbiting codes is shown. Some examples of woven graph codes are presented. Among them an example of a rate $R_{\rm wg}=1/3$ woven graph code with $d_{\rm free}=32$ based on Heawood's bipartite graph and containing $n=7$ constituent rate $R^{c}=2/3$ convolutional codes with overall constraint lengths $\nu^{c}=5$ is given. An encoding procedure for woven graph codes with complexity proportional to the number of constituent codes and their overall constraint length $\nu^{c}$ is presented.
[ { "version": "v1", "created": "Mon, 7 Apr 2008 09:56:10 GMT" }, { "version": "v2", "created": "Tue, 22 Apr 2008 09:21:50 GMT" } ]
2016-11-15T00:00:00
[ [ "Bocharova", "Irina E.", "" ], [ "Johannesson", "Rolf", "" ], [ "Kudryashov", "Boris D.", "" ], [ "Zyablov", "Victor V.", "" ] ]
new_dataset
0.999774
0804.2998
G.Susinder Rajan
G. Susinder Rajan and B. Sundar Rajan
OFDM based Distributed Space Time Coding for Asynchronous Relay Networks
5 pages, 2 figures, to appear in IEEE International Conference on Communications, Beijing, China, May 19-23, 2008
null
10.1109/ICC.2008.218
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recently Li and Xia have proposed a transmission scheme for wireless relay networks based on the Alamouti space time code and orthogonal frequency division multiplexing to combat the effect of timing errors at the relay nodes. This transmission scheme is amazingly simple and achieves a diversity order of two for any number of relays. Motivated by its simplicity, this scheme is extended to a more general transmission scheme that can achieve full cooperative diversity for any number of relays. The conditions on the distributed space time block code (DSTBC) structure that admit its application in the proposed transmission scheme are identified and it is pointed out that the recently proposed full diversity four group decodable DSTBCs from precoded co-ordinate interleaved orthogonal designs and extended Clifford algebras satisfy these conditions. It is then shown how differential encoding at the source can be combined with the proposed transmission scheme to arrive at a new transmission scheme that can achieve full cooperative diversity in asynchronous wireless relay networks with no channel information and also no timing error knowledge at the destination node. Finally, four group decodable distributed differential space time block codes applicable in this new transmission scheme for power of two number of relays are also provided.
[ { "version": "v1", "created": "Fri, 18 Apr 2008 11:17:50 GMT" }, { "version": "v2", "created": "Sat, 19 Apr 2008 09:19:49 GMT" } ]
2016-11-15T00:00:00
[ [ "Rajan", "G. Susinder", "" ], [ "Rajan", "B. Sundar", "" ] ]
new_dataset
0.999324
0804.4187
Hazer Inaltekin
Hazer Inaltekin, Mung Chiang, Harold Vincent Poor and Stephen B. Wicker
On the Asymptotic Behavior of Selfish Transmitters Sharing a Common Channel
Proceedings of the 2008 IEEE International Symposium on Information Theory, Toronto, ON, Canada, July 6 - 11, 2008
null
10.1109/ISIT.2008.4595345
null
cs.IT cs.GT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper analyzes the asymptotic behavior of a multiple-access network comprising a large number of selfish transmitters competing for access to a common wireless communication channel, and having different utility functions for determining their strategies. A necessary and sufficient condition is given for the total number of packet arrivals from selfish transmitters to converge in distribution. The asymptotic packet arrival distribution at Nash equilibrium is shown to be a mixture of a Poisson distribution and finitely many Bernoulli distributions.
[ { "version": "v1", "created": "Sat, 26 Apr 2008 18:31:59 GMT" } ]
2016-11-15T00:00:00
[ [ "Inaltekin", "Hazer", "" ], [ "Chiang", "Mung", "" ], [ "Poor", "Harold Vincent", "" ], [ "Wicker", "Stephen B.", "" ] ]
new_dataset
0.996103
0805.0241
David G. M. Mitchell
David G. M. Mitchell, Ali E. Pusane, Kamil Sh. Zigangirov, and Daniel J. Costello, Jr
Asymptotically Good LDPC Convolutional Codes Based on Protographs
Proceedings of the 2008 IEEE International Symposium on Information Theory, Toronto, ON, Canada, July 6 - 11, 2008
null
10.1109/ISIT.2008.4595143
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
LDPC convolutional codes have been shown to be capable of achieving the same capacity-approaching performance as LDPC block codes with iterative message-passing decoding. In this paper, asymptotic methods are used to calculate a lower bound on the free distance for several ensembles of asymptotically good protograph-based LDPC convolutional codes. Further, we show that the free distance to constraint length ratio of the LDPC convolutional codes exceeds the minimum distance to block length ratio of corresponding LDPC block codes.
[ { "version": "v1", "created": "Fri, 2 May 2008 16:13:16 GMT" } ]
2016-11-15T00:00:00
[ [ "Mitchell", "David G. M.", "" ], [ "Pusane", "Ali E.", "" ], [ "Zigangirov", "Kamil Sh.", "" ], [ "Costello,", "Daniel J.", "Jr" ] ]
new_dataset
0.997091
0806.1819
Pavan Srinath
K. Pavan Srinath, B. Sundar Rajan
A Low-Complexity, Full-Rate, Full-Diversity 2 X 2 STBC with Golden Code's Coding Gain
Submitted to IEEE Globecom - 2008. 6 pages, 3 figures, 1 table
null
10.1109/GLOCOM.2008.ECP.235
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents a low-ML-decoding-complexity, full-rate, full-diversity space-time block code (STBC) for a 2 transmit antenna, 2 receive antenna multiple-input multiple-output (MIMO) system, with coding gain equal to that of the best and well known Golden code for any QAM constellation. Recently, two codes have been proposed (by Paredes, Gershman and Alkhansari and by Sezginer and Sari), which enjoy a lower decoding complexity relative to the Golden code, but have lesser coding gain. The $2\times 2$ STBC presented in this paper has lesser decoding complexity for non-square QAM constellations, compared with that of the Golden code, while having the same decoding complexity for square QAM constellations. Compared with the Paredes-Gershman-Alkhansari and Sezginer-Sari codes, the proposed code has the same decoding complexity for non-rectangular QAM constellations. Simulation results, which compare the codeword error rate (CER) performance, are presented.
[ { "version": "v1", "created": "Wed, 11 Jun 2008 09:25:09 GMT" } ]
2016-11-15T00:00:00
[ [ "Srinath", "K. Pavan", "" ], [ "Rajan", "B. Sundar", "" ] ]
new_dataset
0.987988
0807.4770
Zhang Shengli
Shengli Zhang, Soung-Chang Liew
Channel Coding and Decoding in a Relay System Operated with Physical layer Network Coding
null
IEEE journal on selection area in communications, Jun. 2009
10.1109/JSAC.2009.090618
null
cs.NI cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Physical-layer Network Coding (PNC) can significantly improve the throughput of wireless two way relay channel (TWRC) by allowing the two end nodes to transmit messages to the relay simultaneously. To achieve reliable communication, channel coding could be applied on top of PNC. This paper investigates link-by-link channel-coded PNC, in which a critical process at the relay is to transform the superimposed channel-coded packets received from the two end nodes plus noise, Y3=X1+X2+W3, to the network-coded combination of the source packets, S1 XOR S2 . This is in distinct to the traditional multiple-access problem, in which the goal is to obtain S1 and S2 separately. The transformation from Y3 to (S1 XOR S2) is referred to as the Channel-decoding-Network-Coding process (CNC) in that it involves both channel decoding and network coding operations. A contribution of this paper is the insight that in designing CNC, we should first (i) channel-decode Y3 to the superimposed source symbols S1+S2 before (ii) transforming S1+S2 to the network-coded packets (S1 XOR S2) . Compared with previously proposed strategies for CNC, this strategy reduces the channel-coding network-coding mismatch. It is not obvious, however, that an efficient decoder for step (i) exists. A second contribution of this paper is to provide an explicit construction of such a decoder based on the use of the Repeat Accumulate (RA) code. Specifically, we redesign the belief propagation algorithm of the RA code for traditional point-to-point channel to suit the need of the PNC multiple-access channel. Simulation results show that our new scheme outperforms the previously proposed schemes significantly in terms of BER without added complexity.
[ { "version": "v1", "created": "Wed, 30 Jul 2008 02:44:37 GMT" }, { "version": "v2", "created": "Mon, 18 Jan 2010 07:04:05 GMT" } ]
2016-11-15T00:00:00
[ [ "Zhang", "Shengli", "" ], [ "Liew", "Soung-Chang", "" ] ]
new_dataset
0.999066
0901.0163
Manish Agarwal
Manish Agarwal, Dongning Guo, Michael Honig
Limited-Rate Channel State Feedback for Multicarrier Block Fading Channels
Submitted to IEEE Transactions on Information Theory
null
10.1109/TIT.2010.2080970
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The capacity of a fading channel can be substantially increased by feeding back channel state information from the receiver to the transmitter. With limited-rate feedback what state information to feed back and how to encode it are important open questions. This paper studies power loading in a multicarrier system using no more than one bit of feedback per sub-channel. The sub-channels can be correlated and full channel state information is assumed at the receiver.
[ { "version": "v1", "created": "Thu, 1 Jan 2009 05:35:05 GMT" } ]
2016-11-15T00:00:00
[ [ "Agarwal", "Manish", "" ], [ "Guo", "Dongning", "" ], [ "Honig", "Michael", "" ] ]
new_dataset
0.967857
0901.2913
MinJi Kim
MinJi Kim, Muriel Medard, Joao Barros, Ralf Koetter
An Algebraic Watchdog for Wireless Network Coding
5 pages, 4 figures, submitted to IEEE International Symposium on Information Theory (ISIT) 2009. This is the final version. The content has been changed to incorporate reviewer comments and recent results
null
10.1109/ISIT.2009.5206004
null
cs.NI cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we propose a scheme, called the "algebraic watchdog" for wireless network coding, in which nodes can detect malicious behaviors probabilistically, police their downstream neighbors locally using overheard messages, and, thus, provide a secure global "self-checking network". Unlike traditional Byzantine detection protocols which are receiver-based, this protocol gives the senders an active role in checking the node downstream. This work is inspired by Marti et. al.'s watchdog-pathrater, which attempts to detect and mitigate the effects of routing misbehavior. As the first building block of a such system, we focus on a two-hop network. We present a graphical model to understand the inference process nodes execute to police their downstream neighbors; as well as to compute, analyze, and approximate the probabilities of misdetection and false detection. In addition, we present an algebraic analysis of the performance using an hypothesis testing framework, that provides exact formulae for probabilities of false detection and misdetection.
[ { "version": "v1", "created": "Mon, 19 Jan 2009 19:03:04 GMT" }, { "version": "v2", "created": "Mon, 25 May 2009 17:28:09 GMT" } ]
2016-11-15T00:00:00
[ [ "Kim", "MinJi", "" ], [ "Medard", "Muriel", "" ], [ "Barros", "Joao", "" ], [ "Koetter", "Ralf", "" ] ]
new_dataset
0.952738
0902.1278
Salah A. Aly
Salah A. Aly, Zhenning Kong, Emina Soljanin
Fountain Codes Based Distributed Storage Algorithms for Large-scale Wireless Sensor Networks
A method to estimate the total number of nodes in a graph is presented in this 12 pages
Proc. IEEE/ACM IPSN 2008, pp 171-182
10.1109/IPSN.2008.64
null
cs.IT cs.DS cs.NI math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider large-scale sensor networks with n nodes, out of which k are in possession, (e.g., have sensed or collected in some other way) k information packets. In the scenarios in which network nodes are vulnerable because of, for example, limited energy or a hostile environment, it is desirable to disseminate the acquired information throughout the network so that each of the n nodes stores one (possibly coded) packet and the original k source packets can be recovered later in a computationally simple way from any (1 + \epsilon)k nodes for some small \epsilon > 0. We developed two distributed algorithms for solving this problem based on simple random walks and Fountain codes. Unlike all previously developed schemes, our solution is truly distributed, that is, nodes do not know n, k or connectivity in the network, except in their own neighborhoods, and they do not maintain any routing tables. In the first algorithm, all the sensors have the knowledge of n and k. In the second algorithm, each sensor estimates these parameters through the random walk dissemination. We present analysis of the communication/transmission and encoding/decoding complexity of these two algorithms, and provide extensive simulation results as well
[ { "version": "v1", "created": "Sun, 8 Feb 2009 07:49:20 GMT" } ]
2016-11-15T00:00:00
[ [ "Aly", "Salah A.", "" ], [ "Kong", "Zhenning", "" ], [ "Soljanin", "Emina", "" ] ]
new_dataset
0.998147
0907.1992
Zhi Quan
Zhi Quan, Stephen J. Shellhammer, Wenyi Zhang, and Ali H. Sayed
Spectrum sensing by cognitive radios at very low SNR
IEEE Global Communications Conference 2009
null
10.1109/GLOCOM.2009.5426262
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Spectrum sensing is one of the enabling functionalities for cognitive radio (CR) systems to operate in the spectrum white space. To protect the primary incumbent users from interference, the CR is required to detect incumbent signals at very low signal-to-noise ratio (SNR). In this paper, we present a spectrum sensing technique based on correlating spectra for detection of television (TV) broadcasting signals. The basic strategy is to correlate the periodogram of the received signal with the a priori known spectral features of the primary signal. We show that according to the Neyman-Pearson criterion, this spectral correlation-based sensing technique is asymptotically optimal at very low SNR and with a large sensing time. From the system design perspective, we analyze the effect of the spectral features on the spectrum sensing performance. Through the optimization analysis, we obtain useful insights on how to choose effective spectral features to achieve reliable sensing. Simulation results show that the proposed sensing technique can reliably detect analog and digital TV signals at SNR as low as -20 dB.
[ { "version": "v1", "created": "Sat, 11 Jul 2009 20:38:37 GMT" }, { "version": "v2", "created": "Tue, 14 Jul 2009 05:15:30 GMT" } ]
2016-11-15T00:00:00
[ [ "Quan", "Zhi", "" ], [ "Shellhammer", "Stephen J.", "" ], [ "Zhang", "Wenyi", "" ], [ "Sayed", "Ali H.", "" ] ]
new_dataset
0.993084
0910.0733
Manar Mohaisen
Manar Mohaisen, KyungHi Chang
Co-Channel Interference Cancellation in OFDM Networks using Coordinated Symbol Repetition and Soft Decision MLE CCI Canceler
4 pages, 8 figures, IEEE International Conference on Signal Processing and Communications, 2007. ICSPC 2007
null
10.1109/ICSPC.2007.4728510
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, a new scheme of downlink co-channel interference (CCI) cancellation in OFDM cellular networks is introduced for users at the cell-edge. Coordinated symbol transmission between base stations (BS) is operated where the same symbol is transmitted from different BS on different sub-carriers. At the mobile station (MS) receiver, we introduce a soft decision maximum likelihood CCI canceler and a modified maximum ratio combining (M-MRC) to obtain an estimate of the transmitted symbols. Weights used in the combining method are derived from the channels coefficients between the cooperated BS and the MS. Simulations show that the proposed scheme works well under frequency-selective channels and frequency non-selective channels. A gain of 9 dB and 6 dB in SIR is obtained under multipath fading and flat-fading channels, respectively.
[ { "version": "v1", "created": "Mon, 5 Oct 2009 11:38:36 GMT" } ]
2016-11-15T00:00:00
[ [ "Mohaisen", "Manar", "" ], [ "Chang", "KyungHi", "" ] ]
new_dataset
0.999223
1001.3475
Bo Niu
Bo Niu, Mihaela C. Beluri, Zinan Lin, Prabhakar Chitrapu
Relay Assisted Cooperative OSTBC Communication with SNR Imbalance and Channel Estimation Errors
5 pages, 3 figures, IEEE 69th Vehicular Technology Conference
null
10.1109/VETECS.2009.5073832
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, a two-hop relay assisted cooperative Orthogonal Space-Time Block Codes (OSTBC) transmission scheme is considered for the downlink communication of a cellular system, where the base station (BS) and the relay station (RS) cooperate and transmit data to the user equipment (UE) in a distributed fashion. We analyze the impact of the SNR imbalance between the BS-UE and RS-UE links, as well as the imperfect channel estimation at the UE receiver. The performance is analyzed in the presence of Rayleigh flat fading and our results show that the SNR imbalance does not impact the spatial diversity order. On the other hand, channel estimation errors have a larger impact on the system performance. Simulation results are then provided to confirm the analysis.
[ { "version": "v1", "created": "Wed, 20 Jan 2010 07:22:21 GMT" } ]
2016-11-15T00:00:00
[ [ "Niu", "Bo", "" ], [ "Beluri", "Mihaela C.", "" ], [ "Lin", "Zinan", "" ], [ "Chitrapu", "Prabhakar", "" ] ]
new_dataset
0.998087
1004.0346
Roghieh Joda
Roghayeh Joda, Farshad Lahouti
Network Code Design for Orthogonal Two-hop Network with Broadcasting Relay: A Joint Source-Channel-Network Coding Approach
27 pages, 9 figures, Submited to IEEE Transaction on Communication
null
10.1109/TCOMM.2011.112311.100515
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper addresses network code design for robust transmission of sources over an orthogonal two-hop wireless network with a broadcasting relay. The network consists of multiple sources and destinations in which each destination, benefiting the relay signal, intends to decode a subset of the sources. Two special instances of this network are orthogonal broadcast relay channel and the orthogonal multiple access relay channel. The focus is on complexity constrained scenarios, e.g., for wireless sensor networks, where channel coding is practically imperfect. Taking a source-channel and network coding approach, we design the network code (mapping) at the relay such that the average reconstruction distortion at the destinations is minimized. To this end, by decomposing the distortion into its components, an efficient design algorithm is proposed. The resulting network code is nonlinear and substantially outperforms the best performing linear network code. A motivating formulation of a family of structured nonlinear network codes is also presented. Numerical results and comparison with linear network coding at the relay and the corresponding distortion-power bound demonstrate the effectiveness of the proposed schemes and a promising research direction.
[ { "version": "v1", "created": "Fri, 2 Apr 2010 14:36:34 GMT" }, { "version": "v2", "created": "Tue, 14 Sep 2010 14:04:24 GMT" } ]
2016-11-15T00:00:00
[ [ "Joda", "Roghayeh", "" ], [ "Lahouti", "Farshad", "" ] ]
new_dataset
0.982034
1006.0284
Takahiro Ota Ph.D
Takahiro Ota, Hiroyoshi Morita
Asymptotic Optimality of Antidictionary Codes
5 pages, to appear in the proceedings of 2010 IEEE International Symposium on Information Theory (ISIT2010)
null
10.1109/ISIT.2010.5513281
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
An antidictionary code is a lossless compression algorithm using an antidictionary which is a set of minimal words that do not occur as substrings in an input string. The code was proposed by Crochemore et al. in 2000, and its asymptotic optimality has been proved with respect to only a specific information source, called balanced binary source that is a binary Markov source in which a state transition occurs with probability 1/2 or 1. In this paper, we prove the optimality of both static and dynamic antidictionary codes with respect to a stationary ergodic Markov source on finite alphabet such that a state transition occurs with probability $p (0 < p \leq 1)$.
[ { "version": "v1", "created": "Wed, 2 Jun 2010 03:14:46 GMT" } ]
2016-11-15T00:00:00
[ [ "Ota", "Takahiro", "" ], [ "Morita", "Hiroyoshi", "" ] ]
new_dataset
0.997871
1006.0763
Mubarak Jibril
Mubarak Jibril, Martin tomlinson, Mohammed Zaki Ahmed and Cen Tjhai
Good Codes From Generalised Algebraic Geometry Codes
3 pages, to be presented at the IEEE Symposium on Information Theory (ISIT 2010) in Austin, Texas, June 2010
null
10.1109/ISIT.2010.5513687
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Algebraic geometry codes or Goppa codes are defined with places of degree one. In constructing generalised algebraic geometry codes places of higher degree are used. In this paper we present 41 new codes over GF(16) which improve on the best known codes of the same length and rate. The construction method uses places of small degree with a technique originally published over 10 years ago for the construction of generalised algebraic geometry codes.
[ { "version": "v1", "created": "Fri, 4 Jun 2010 01:00:43 GMT" } ]
2016-11-15T00:00:00
[ [ "Jibril", "Mubarak", "" ], [ "tomlinson", "Martin", "" ], [ "Ahmed", "Mohammed Zaki", "" ], [ "Tjhai", "Cen", "" ] ]
new_dataset
0.999498
1006.4255
Eren Sasoglu
Eren Sasoglu, Emre Telatar, Edmund Yeh
Polar codes for the two-user multiple-access channel
12 pages. Submitted to the IEEE Transactions on Information Theory
null
10.1109/TIT.2013.2268946
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Arikan's polar coding method is extended to two-user multiple-access channels. It is shown that if the two users of the channel use the Arikan construction, the resulting channels will polarize to one of five possible extremals, on each of which uncoded transmission is optimal. The sum rate achieved by this coding technique is the one that correponds to uniform input distributions. The encoding and decoding complexities and the error performance of these codes are as in the single-user case: $O(n\log n)$ for encoding and decoding, and $o(\exp(-n^{1/2-\epsilon}))$ for block error probability, where $n$ is the block length.
[ { "version": "v1", "created": "Tue, 22 Jun 2010 10:34:33 GMT" } ]
2016-11-15T00:00:00
[ [ "Sasoglu", "Eren", "" ], [ "Telatar", "Emre", "" ], [ "Yeh", "Edmund", "" ] ]
new_dataset
0.999108
1006.5879
Ashish Khisti
Ashish Khisti, Gregory Wornell
Secure Transmission with Multiple Antennas II: The MIMOME Wiretap Channel
To Appear, IEEE Trans. Information Theory
null
10.1109/TIT.2010.2068852
null
cs.IT cs.CR math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The capacity of the Gaussian wiretap channel model is analyzed when there are multiple antennas at the sender, intended receiver and eavesdropper. The associated channel matrices are fixed and known to all the terminals. A computable characterization of the secrecy capacity is established as the saddle point solution to a minimax problem. The converse is based on a Sato-type argument used in other broadcast settings, and the coding theorem is based on Gaussian wiretap codebooks. At high signal-to-noise ratio (SNR), the secrecy capacity is shown to be attained by simultaneously diagonalizing the channel matrices via the generalized singular value decomposition, and independently coding across the resulting parallel channels. The associated capacity is expressed in terms of the corresponding generalized singular values. It is shown that a semi-blind "masked" multi-input multi-output (MIMO) transmission strategy that sends information along directions in which there is gain to the intended receiver, and synthetic noise along directions in which there is not, can be arbitrarily far from capacity in this regime. Necessary and sufficient conditions for the secrecy capacity to be zero are provided, which simplify in the limit of many antennas when the entries of the channel matrices are independent and identically distributed. The resulting scaling laws establish that to prevent secure communication, the eavesdropper needs 3 times as many antennas as the sender and intended receiver have jointly, and that the optimimum division of antennas between sender and intended receiver is in the ratio of 2:1.
[ { "version": "v1", "created": "Wed, 30 Jun 2010 15:10:04 GMT" } ]
2016-11-15T00:00:00
[ [ "Khisti", "Ashish", "" ], [ "Wornell", "Gregory", "" ] ]
new_dataset
0.969684
1010.5644
Camilla Hollanti
Roope Vehkalahti, Camilla Hollanti, and Fr\'ed\'erique Oggier
Fast-Decodable Asymmetric Space-Time Codes from Division Algebras
26 pages, 1 figure, submitted to IEEE Trans. Inf. Theory, October 2010
null
10.1109/TIT.2011.2176310
null
cs.IT math.IT math.RA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Multiple-input double-output (MIDO) codes are important in the near-future wireless communications, where the portable end-user device is physically small and will typically contain at most two receive antennas. Especially tempting is the 4 x 2 channel due to its immediate applicability in the digital video broadcasting (DVB). Such channels optimally employ rate-two space-time (ST) codes consisting of (4 x 4) matrices. Unfortunately, such codes are in general very complex to decode, hence setting forth a call for constructions with reduced complexity. Recently, some reduced complexity constructions have been proposed, but they have mainly been based on different ad hoc methods and have resulted in isolated examples rather than in a more general class of codes. In this paper, it will be shown that a family of division algebra based MIDO codes will always result in at least 37.5% worst-case complexity reduction, while maintaining full diversity and, for the first time, the non-vanishing determinant (NVD) property. The reduction follows from the fact that, similarly to the Alamouti code, the codes will be subsets of matrix rings of the Hamiltonian quaternions, hence allowing simplified decoding. At the moment, such reductions are among the best known for rate-two MIDO codes. Several explicit constructions are presented and shown to have excellent performance through computer simulations.
[ { "version": "v1", "created": "Wed, 27 Oct 2010 11:03:01 GMT" } ]
2016-11-15T00:00:00
[ [ "Vehkalahti", "Roope", "" ], [ "Hollanti", "Camilla", "" ], [ "Oggier", "Frédérique", "" ] ]
new_dataset
0.963627
1011.5274
Amitav Mukherjee
Amitav Mukherjee, A. Lee Swindlehurst
Jamming Games in the MIMO Wiretap Channel With an Active Eavesdropper
27 pages, 8 figures. To appear, IEEE Transactions on Signal Processing
null
10.1109/TSP.2012.2222386
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper investigates reliable and covert transmission strategies in a multiple-input multiple-output (MIMO) wiretap channel with a transmitter, receiver and an adversarial wiretapper, each equipped with multiple antennas. In a departure from existing work, the wiretapper possesses a novel capability to act either as a passive eavesdropper or as an active jammer, under a half-duplex constraint. The transmitter therefore faces a choice between allocating all of its power for data, or broadcasting artificial interference along with the information signal in an attempt to jam the eavesdropper (assuming its instantaneous channel state is unknown). To examine the resulting trade-offs for the legitimate transmitter and the adversary, we model their interactions as a two-person zero-sum game with the ergodic MIMO secrecy rate as the payoff function. We first examine conditions for the existence of pure-strategy Nash equilibria (NE) and the structure of mixed-strategy NE for the strategic form of the game.We then derive equilibrium strategies for the extensive form of the game where players move sequentially under scenarios of perfect and imperfect information. Finally, numerical simulations are presented to examine the equilibrium outcomes of the various scenarios considered.
[ { "version": "v1", "created": "Wed, 24 Nov 2010 02:23:16 GMT" }, { "version": "v2", "created": "Tue, 25 Sep 2012 05:04:58 GMT" } ]
2016-11-15T00:00:00
[ [ "Mukherjee", "Amitav", "" ], [ "Swindlehurst", "A. Lee", "" ] ]
new_dataset
0.996764
1101.0250
Jaydip Sen
Jaydip Sen
An Adaptive and Multi-Service Routing Protocol for Wireless Sensor Networks
6 pages, 8 figures. 16th IEEE Asia-Pacific Conference on Communications (APCC) 2010, Auckland, New Zealand, October 31 - November 3, 2010
null
10.1109/APCC.2010.5679779
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Wireless Sensor Networks (WSNs) are highly distributed networks consisting of a large number of tiny, low-cost, light-weight wireless nodes deployed to monitor an environment or a system. Each node in a WSN consists of three subsystems: the sensor subsystem which senses the environment, the processing subsystem which performs local computations on the sensed data, and the communication subsystem which is responsible for message exchange with neighboring sensor nodes. While an individual sensor node has limited sensing region, processing power, and energy, networking a large number of sensor nodes give rise to a robust, reliable, and accurate sensor network covering a wide region. Thus, routing in WSNs is a very important issue. This paper presents a query-based routing protocol for a WSN that provides different levels of Quality of Service (QoS): energy-efficiency, reliability, low latency and fault-tolerance-under different application scenarios. The algorithm has low computational complexity but can dynamically guarantee different QoS support depending on the requirement of the applications. The novelty of the proposed algorithm is its ability to provide multiple QoS support without reconfiguration and redeployment of the sensor nodes. The algorithm is implemented in network simulator ns-2 and its performance has been evaluated. The results show that the algorithm is more efficient than some of the currently existing routing algorithms for WSNs.
[ { "version": "v1", "created": "Fri, 31 Dec 2010 12:49:32 GMT" } ]
2016-11-15T00:00:00
[ [ "Sen", "Jaydip", "" ] ]
new_dataset
0.989092
1102.3561
Chandramani Singh
Eitan Altman, Anurag Kumar, Chandramani Singh and Rajesh Sundaresan
Spatial SINR Games of Base Station Placement and Mobile Association
null
IEEE INFOCOM, April, 2009, Rio De Janeiro, Brazil
10.1109/INFCOM.2009.5062081
null
cs.NI cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study the question of determining locations of base stations that may belong to the same or to competing service providers. We take into account the impact of these decisions on the behavior of intelligent mobile terminals who can connect to the base station that offers the best utility. The signal to interference and noise ratio is used as the quantity that determines the association. We first study the SINR association-game: we determine the cells corresponding to each base stations, i.e., the locations at which mobile terminals prefer to connect to a given base station than to others. We make some surprising observations: (i) displacing a base station a little in one direction may result in a displacement of the boundary of the corresponding cell to the opposite direction; (ii) A cell corresponding to a BS may be the union of disconnected sub-cells. We then study the hierarchical equilibrium in the combined BS location and mobile association problem: we determine where to locate the BSs so as to maximize the revenues obtained at the induced SINR mobile association game. We consider the cases of single frequency band and two frequency bands of operation. Finally, we also consider hierarchical equilibria in two frequency systems with successive interference cancellation.
[ { "version": "v1", "created": "Thu, 17 Feb 2011 11:17:25 GMT" } ]
2016-11-15T00:00:00
[ [ "Altman", "Eitan", "" ], [ "Kumar", "Anurag", "" ], [ "Singh", "Chandramani", "" ], [ "Sundaresan", "Rajesh", "" ] ]
new_dataset
0.970788
1103.4086
Jean-Claude Belfiore
Fr\'ed\'erique Oggier and Patrick Sol\'e and Jean-Claude Belfiore
Lattice Codes for the Wiretap Gaussian Channel: Construction and Analysis
43 pages, 16 figures, submitted to IEEE Trans. on Inform. Theory
null
10.1007/978-3-642-20901-7_3
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider the Gaussian wiretap channel, where two legitimate players Alice and Bob communicate over an additive white Gaussian noise (AWGN) channel, while Eve is eavesdropping, also through an AWGN channel. We propose a coding strategy based on lattice coset encoding. We analyze Eve's probability of decoding, from which we define the secrecy gain as a design criterion for wiretap lattice codes, expressed in terms of the lattice theta series, which characterizes Eve's confusion as a function of the channel parameters. The secrecy gain is studied for even unimodular lattices, and an asymptotic analysis shows that it grows exponentially in the dimension of the lattice. Examples of wiretap lattice codes are given. Interestingly, minimizing Eve's probability of error involves the same optimization of the theta series as does the flatness factor, another newly defined code design that characterizes lattice codes that achieve strong secrecy.
[ { "version": "v1", "created": "Mon, 21 Mar 2011 17:17:41 GMT" }, { "version": "v2", "created": "Tue, 8 Jan 2013 09:27:59 GMT" }, { "version": "v3", "created": "Wed, 9 Jan 2013 17:34:54 GMT" } ]
2016-11-15T00:00:00
[ [ "Oggier", "Frédérique", "" ], [ "Solé", "Patrick", "" ], [ "Belfiore", "Jean-Claude", "" ] ]
new_dataset
0.99006
1106.6174
Jianquan Liu
Jianquan Liu, Meixia Tao, and Youyun Xu
Pairwise Check Decoding for LDPC Coded Two-Way Relay Block Fading Channels
to appear in IEEE Trans. on Communications, 2012
null
10.1109/TCOMM.2012.050812.110187
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Partial decoding has the potential to achieve a larger capacity region than full decoding in two-way relay (TWR) channels. Existing partial decoding realizations are however designed for Gaussian channels and with a static physical layer network coding (PLNC). In this paper, we propose a new solution for joint network coding and channel decoding at the relay, called pairwise check decoding (PCD), for low-density parity-check (LDPC) coded TWR system over block fading channels. The main idea is to form a check relationship table (check-relation-tab) for the superimposed LDPC coded packet pair in the multiple access (MA) phase in conjunction with an adaptive PLNC mapping in the broadcast (BC) phase. Using PCD, we then present a partial decoding method, two-stage closest-neighbor clustering with PCD (TS-CNC-PCD), with the aim of minimizing the worst pairwise error probability. Moreover, we propose the minimum correlation optimization (MCO) for selecting the better check-relation-tabs. Simulation results confirm that the proposed TS-CNC-PCD offers a sizable gain over the conventional XOR with belief propagation (BP) in fading channels.
[ { "version": "v1", "created": "Thu, 30 Jun 2011 10:07:59 GMT" }, { "version": "v2", "created": "Tue, 15 Nov 2011 10:06:18 GMT" }, { "version": "v3", "created": "Thu, 1 Mar 2012 05:53:20 GMT" } ]
2016-11-15T00:00:00
[ [ "Liu", "Jianquan", "" ], [ "Tao", "Meixia", "" ], [ "Xu", "Youyun", "" ] ]
new_dataset
0.979568
1109.3952
Chin Keong Ho
Chin Keong Ho, Kiran T. Gowda, and Sumei Sun
Gaussian Two-way Relay Channel with Private Information for the Relay
6 pages, 3 figures, accepted for publication in IEEE Transactions on Communications
null
10.1109/TCOMM.2011.112311.090671
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce a generalized two-way relay channel where two sources exchange information (not necessarily of the same rate) with help from a relay, and each source additionally sends private information to the relay. We consider the Gaussian setting where all point-to-point links are Gaussian channels. For this channel, we consider a two-phase protocol consisting of a multiple access channel (MAC) phase and a broadcast channel (BC) phase. We propose a general decode-and-forward (DF) scheme where the MAC phase is related to computation over MAC, while the BC phase is related to BC with receiver side information. In the MAC phase, we time share a capacity-achieving code for the MAC and a superposition code with a lattice code as its component code. We show that the proposed DF scheme is near optimal for any channel conditions, in that it achieves rates within half bit of the capacity region of the two-phase protocol.
[ { "version": "v1", "created": "Mon, 19 Sep 2011 06:55:38 GMT" } ]
2016-11-15T00:00:00
[ [ "Ho", "Chin Keong", "" ], [ "Gowda", "Kiran T.", "" ], [ "Sun", "Sumei", "" ] ]
new_dataset
0.986905
1110.5890
Sergio Valcarcel Macua
Pavle Belanovic, Sergio Valcarcel Macua, and Santiago Zazo
Location-aided Distributed Primary User Identification in a Cognitive Radio Scenario
Submitted to IEEE ICASSP2012
null
10.1109/ICASSP.2012.6288735
null
cs.NI cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We address a cognitive radio scenario, where a number of secondary users performs identification of which primary user, if any, is transmitting, in a distributed way and using limited location information. We propose two fully distributed algorithms: the first is a direct identification scheme, and in the other a distributed sub-optimal detection based on a simplified Neyman-Pearson energy detector precedes the identification scheme. Both algorithms are studied analytically in a realistic transmission scenario, and the advantage obtained by detection pre-processing is also verified via simulation. Finally, we give details of their fully distributed implementation via consensus averaging algorithms.
[ { "version": "v1", "created": "Wed, 26 Oct 2011 19:32:25 GMT" } ]
2016-11-15T00:00:00
[ [ "Belanovic", "Pavle", "" ], [ "Macua", "Sergio Valcarcel", "" ], [ "Zazo", "Santiago", "" ] ]
new_dataset
0.962049
1201.4793
Marco Di Renzo
Marco Di Renzo, Dario De Leonardis, Fabio Graziosi, and Harald Haas
Space Shift Keying (SSK-) MIMO with Practical Channel Estimates
IEEE Transactions on Communications (to appear, 2012)
null
10.1109/TCOMM.2012.021712.100778
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we study the performance of space modulation for Multiple-Input-Multiple-Output (MIMO) wireless systems with imperfect channel knowledge at the receiver. We focus our attention on two transmission technologies, which are the building blocks of space modulation: i) Space Shift Keying (SSK) modulation; and ii) Time-Orthogonal-Signal-Design (TOSD-) SSK modulation, which is an improved version of SSK modulation providing transmit-diversity. We develop a single-integral closed-form analytical framework to compute the Average Bit Error Probability (ABEP) of a mismatched detector for both SSK and TOSD-SSK modulations. The framework exploits the theory of quadratic-forms in conditional complex Gaussian Random Variables (RVs) along with the Gil-Pelaez inversion theorem. The analytical model is very general and can be used for arbitrary transmit- and receive-antennas, fading distributions, fading spatial correlations, and training pilots. The analytical derivation is substantiated through Monte Carlo simulations, and it is shown, over independent and identically distributed (i.i.d.) Rayleigh fading channels, that SSK modulation is as robust as single-antenna systems to imperfect channel knowledge, and that TOSD-SSK modulation is more robust to channel estimation errors than the Alamouti scheme. Furthermore, it is pointed out that only few training pilots are needed to get reliable enough channel estimates for data detection, and that transmit- and receive-diversity of SSK and TOSD-SSK modulations are preserved even with imperfect channel knowledge.
[ { "version": "v1", "created": "Mon, 23 Jan 2012 18:15:39 GMT" } ]
2016-11-15T00:00:00
[ [ "Di Renzo", "Marco", "" ], [ "De Leonardis", "Dario", "" ], [ "Graziosi", "Fabio", "" ], [ "Haas", "Harald", "" ] ]
new_dataset
0.998352
1201.6313
Ravi Tandon
Ravi Tandon, Soheil Mohajer, H. Vincent Poor, Shlomo Shamai (Shitz)
On X-Channels with Feedback and Delayed CSI
Submitted to IEEE ISIT 2012 on Jan 22, 2012
null
10.1109/ISIT.2012.6283623
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The sum degrees of freedom (DoF) of the two-user MIMO X-channel is characterized in the presence of output feedback and delayed channel state information (CSI). The number of antennas at each transmitters is assumed to be M and the number of antennas at each of the receivers is assumed to be N. It is shown that the sum DoF of the two-user MIMO X-channel is the same as the sum DoF of a two-user MIMO broadcast channel with 2M transmit antennas, and N antennas at each receiver. Hence, for this symmetric antenna configuration, there is no performance loss in the sum degrees of freedom due to the distributed nature of the transmitters. This result highlights the usefulness of feedback and delayed CSI for the MIMO X-channel. The K-user X-channel with single antenna at each transmitter and each receiver is also studied. In this network, each transmitter has a message intended for each receiver. For this network, it is shown that the sum DoF with partial output feedback alone is at least 2K/(K+1). This lower bound is strictly better than the best lower bound known for the case of delayed CSI assumption for all values of K.
[ { "version": "v1", "created": "Mon, 30 Jan 2012 18:26:21 GMT" } ]
2016-11-15T00:00:00
[ [ "Tandon", "Ravi", "", "Shitz" ], [ "Mohajer", "Soheil", "", "Shitz" ], [ "Poor", "H. Vincent", "", "Shitz" ], [ "Shamai", "Shlomo", "", "Shitz" ] ]
new_dataset
0.996381
1202.0253
Sertac Karaman
Sertac Karaman, Emilio Frazzoli
High-speed Flight in an Ergodic Forest
Manuscript submitted to the IEEE Transactions on Robotics
null
10.1109/ICRA.2012.6225235
null
cs.RO cs.SY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Inspired by birds flying through cluttered environments such as dense forests, this paper studies the theoretical foundations of a novel motion planning problem: high-speed navigation through a randomly-generated obstacle field when only the statistics of the obstacle generating process are known a priori. Resembling a planar forest environment, the obstacle generating process is assumed to determine the locations and sizes of disk-shaped obstacles. When this process is ergodic, and under mild technical conditions on the dynamics of the bird, it is shown that the existence of an infinite collision-free trajectory through the forest exhibits a phase transition. On one hand, if the bird flies faster than a certain critical speed, then, with probability one, there is no infinite collision-free trajectory, i.e., the bird will eventually collide with some tree, almost surely, regardless of the planning algorithm governing the bird's motion. On the other hand, if the bird flies slower than this critical speed, then there exists at least one infinite collision-free trajectory, almost surely. Lower and upper bounds on the critical speed are derived for the special case of a homogeneous Poisson forest considering a simple model for the bird's dynamics. For the same case, an equivalent percolation model is provided. Using this model, the phase diagram is approximated in Monte-Carlo simulations. This paper also establishes novel connections between robot motion planning and statistical physics through ergodic theory and percolation theory, which may be of independent interest.
[ { "version": "v1", "created": "Wed, 1 Feb 2012 19:30:59 GMT" } ]
2016-11-15T00:00:00
[ [ "Karaman", "Sertac", "" ], [ "Frazzoli", "Emilio", "" ] ]
new_dataset
0.999153
1202.4664
Bo Yuan
Zhongfeng Wang
Super-FEC Codes for 40/100 Gbps Networking
This work has been accepted by IEEE Communications Letters for future publication. Copyright may be transferred without notice, after which this version may no longer be accessible
null
10.1109/LCOMM.2012.112012.122083
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents a simple approach to evaluate the performance bound at very low bit-error-rate (BER) range for binary pseudo-product codes and true-product codes. Moreover it introduces a super-product BCH code that can achieve near-Shannon limit performance with very low decoding complexity. This work has been accepted by IEEE Communications Letters for future publication. Copyright may be transferred without notice, after which this version may no longer be accessible.
[ { "version": "v1", "created": "Mon, 20 Feb 2012 05:54:00 GMT" }, { "version": "v2", "created": "Sat, 23 Jun 2012 01:17:22 GMT" }, { "version": "v3", "created": "Wed, 27 Jun 2012 01:32:12 GMT" }, { "version": "v4", "created": "Mon, 29 Oct 2012 04:42:56 GMT" }, { "version": "v5", "created": "Tue, 30 Oct 2012 15:59:39 GMT" } ]
2016-11-15T00:00:00
[ [ "Wang", "Zhongfeng", "" ] ]
new_dataset
0.999679
1204.2048
Mostafa Rahimi Azghadi
Mostafa Rahimi Azghadi, O. Kavehie, K. Navi
A Novel Design for Quantum-dot Cellular Automata Cells and Full Adders
arXiv admin note: text overlap with arXiv:cond-mat/0104406
Journal of Applied Sciences, Vol. 7, No. 22, pp. 3460-3468, 2007
10.3923/jas.2007.3460.3468
null
cs.ET
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Quantum dot Cellular Automata (QCA) is a novel and potentially attractive technology for implementing computing architectures at the nanoscale. The basic Boolean primitive in QCA is the majority gate. In this paper we present a novel design for QCA cells and another possible and unconventional scheme for majority gates. By applying these items, the hardware requirements for a QCA design can be reduced and circuits can be simpler in level and gate counts. As an example, a 1-bit QCA adder is constructed by applying our new scheme and is compared to the other existing implementation. Beside, some Boolean functions are expressed as examples and it has been shown, how our reduction method by using new proposed item, decreases gate counts and levels in comparison to the other previous methods.
[ { "version": "v1", "created": "Tue, 10 Apr 2012 05:38:20 GMT" } ]
2016-11-15T00:00:00
[ [ "Azghadi", "Mostafa Rahimi", "" ], [ "Kavehie", "O.", "" ], [ "Navi", "K.", "" ] ]
new_dataset
0.998992
1205.4208
Cedomir Stefanovic
Cedomir Stefanovic, Petar Popovski and Dejan Vukobratovic
Frameless ALOHA Protocol for Wireless Networks
To appear in IEEE Communications Letters
null
10.1109/LCOMM.2012.101712.121073
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose a novel distributed random access scheme for wireless networks based on slotted ALOHA, motivated by the analogies between successive interference cancellation and iterative belief-propagation decoding on erasure channels. The proposed scheme assumes that each user independently accesses the wireless link in each slot with a predefined probability, resulting in a distribution of user transmissions over slots. The operation bears analogy with rateless codes, both in terms of probability distributions as well as to the fact that the ALOHA frame becomes fluid and adapted to the current contention process. Our aim is to optimize the slot access probability in order to achieve rateless-like distributions, focusing both on the maximization of the resolution probability of user transmissions and the throughput of the scheme.
[ { "version": "v1", "created": "Fri, 18 May 2012 17:57:42 GMT" }, { "version": "v2", "created": "Tue, 11 Sep 2012 07:40:21 GMT" }, { "version": "v3", "created": "Wed, 12 Sep 2012 11:30:42 GMT" }, { "version": "v4", "created": "Wed, 10 Oct 2012 12:31:48 GMT" } ]
2016-11-15T00:00:00
[ [ "Stefanovic", "Cedomir", "" ], [ "Popovski", "Petar", "" ], [ "Vukobratovic", "Dejan", "" ] ]
new_dataset
0.987968
1206.3350
Srinivas Yerramalli
Srinivas Yerramalli, Rahul Jain and Urbashi Mitra
Coalitional Games for Transmitter Cooperation in MIMO Multiple Access Channels
in review for publication in IEEE Transactions on Signal Processing
null
10.1109/TSP.2013.2290496
null
cs.IT cs.GT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Cooperation between nodes sharing a wireless channel is becoming increasingly necessary to achieve performance goals in a wireless network. The problem of determining the feasibility and stability of cooperation between rational nodes in a wireless network is of great importance in understanding cooperative behavior. This paper addresses the stability of the grand coalition of transmitters signaling over a multiple access channel using the framework of cooperative game theory. The external interference experienced by each TX is represented accurately by modeling the cooperation game between the TXs in \emph{partition form}. Single user decoding and successive interference cancelling strategies are examined at the receiver. In the absence of coordination costs, the grand coalition is shown to be \emph{sum-rate optimal} for both strategies. Transmitter cooperation is \emph{stable}, if and only if the core of the game (the set of all divisions of grand coalition utility such that no coalition deviates) is nonempty. Determining the stability of cooperation is a co-NP-complete problem in general. For a single user decoding receiver, transmitter cooperation is shown to be \emph{stable} at both high and low SNRs, while for an interference cancelling receiver with a fixed decoding order, cooperation is stable only at low SNRs and unstable at high SNR. When time sharing is allowed between decoding orders, it is shown using an approximate lower bound to the utility function that TX cooperation is also stable at high SNRs. Thus, this paper demonstrates that ideal zero cost TX cooperation over a MAC is stable and improves achievable rates for each individual user.
[ { "version": "v1", "created": "Fri, 15 Jun 2012 00:28:11 GMT" }, { "version": "v2", "created": "Thu, 11 Oct 2012 22:15:09 GMT" } ]
2016-11-15T00:00:00
[ [ "Yerramalli", "Srinivas", "" ], [ "Jain", "Rahul", "" ], [ "Mitra", "Urbashi", "" ] ]
new_dataset
0.996184
1208.2331
Nadeem Javaid
N. Javaid, A. Sharif, A. Mahmood, S. Ahmed, U. Qasim, Z. A. Khan
Monitoring and Controlling Power using Zigbee Communications
5th International Workshop on NGWMN with 7th IEEE International Conference on BWCCA 2012, Victoria, Canada, 2012
null
10.1109/BWCCA.2012.107
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Smart grid is a modified form of electrical grid where generation, transmission, distribution and customers are not only connected electrically but also through strong communication network with each other as well as with market, operation and service provider. For achieving good communication link among them, it is very necessary to find suitable protocol. In this paper, we discuss different hardware techniques for power monitoring, power management and remote power controlling at home and transmission side and also discuss the suitability of Zigbee for required communication link. Zigbee has major role in monitoring and direct load controlling for efficient power utilization. It covers enough area needed for communication and it works on low data rate of 20Kbps to 250Kbps with minimum power consumption. This paper describes the user friendly control home appliances, power on/off through the internet, PDA using Graphical User Interface (GUI) and through GSM cellular mobile phone.
[ { "version": "v1", "created": "Sat, 11 Aug 2012 09:28:39 GMT" } ]
2016-11-15T00:00:00
[ [ "Javaid", "N.", "" ], [ "Sharif", "A.", "" ], [ "Mahmood", "A.", "" ], [ "Ahmed", "S.", "" ], [ "Qasim", "U.", "" ], [ "Khan", "Z. A.", "" ] ]
new_dataset
0.992792
1208.3598
Kai Chen
Kai Chen, Kai Niu and Jia-Ru Lin
Improved Successive Cancellation Decoding of Polar Codes
This paper is modified and submitted to IEEE Transactions on Communications
null
10.1109/TCOMM.2013.070213.120789
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
As improved versions of successive cancellation (SC) decoding algorithm, successive cancellation list (SCL) decoding and successive cancellation stack (SCS) decoding are used to improve the finite-length performance of polar codes. Unified descriptions of SC, SCL and SCS decoding algorithms are given as path searching procedures on the code tree of polar codes. Combining the ideas of SCL and SCS, a new decoding algorithm named successive cancellation hybrid (SCH) is proposed, which can achieve a better trade-off between computational complexity and space complexity. Further, to reduce the complexity, a pruning technique is proposed to avoid unnecessary path searching operations. Performance and complexity analysis based on simulations show that, with proper configurations, all the three improved successive cancellation (ISC) decoding algorithms can have a performance very close to that of maximum-likelihood (ML) decoding with acceptable complexity. Moreover, with the help of the proposed pruning technique, the complexities of ISC decoders can be very close to that of SC decoder in the moderate and high signal-to-noise ratio (SNR) regime.
[ { "version": "v1", "created": "Fri, 17 Aug 2012 13:42:49 GMT" }, { "version": "v2", "created": "Thu, 17 Jan 2013 02:52:38 GMT" } ]
2016-11-15T00:00:00
[ [ "Chen", "Kai", "" ], [ "Niu", "Kai", "" ], [ "Lin", "Jia-Ru", "" ] ]
new_dataset
0.965143
1210.8176
Paulo Urriza
Paulo Urriza, Eric Rebeiz, Danijela Cabric
Eigenvalue-based Cyclostationary Spectrum Sensing Using Multiple Antennas
6 pages, 6 figures, accepted to IEEE GLOBECOM 2012
null
10.1109/GLOCOM.2012.6503326
null
cs.PF cs.IT math.IT stat.AP
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we propose a signal-selective spectrum sensing method for cognitive radio networks and specifically targeted for receivers with multiple-antenna capability. This method is used for detecting the presence or absence of primary users based on the eigenvalues of the cyclic covariance matrix of received signals. In particular, the cyclic correlation significance test is used to detect a specific signal-of-interest by exploiting knowledge of its cyclic frequencies. The analytical threshold for achieving constant false alarm rate using this detection method is presented, verified through simulations, and shown to be independent of both the number of samples used and the noise variance, effectively eliminating the dependence on accurate noise estimation. The proposed method is also shown, through numerical simulations, to outperform existing multiple-antenna cyclostationary-based spectrum sensing algorithms under a quasi-static Rayleigh fading channel, in both spatially correlated and uncorrelated noise environments. The algorithm also has significantly lower computational complexity than these other approaches.
[ { "version": "v1", "created": "Tue, 30 Oct 2012 21:23:57 GMT" } ]
2016-11-15T00:00:00
[ [ "Urriza", "Paulo", "" ], [ "Rebeiz", "Eric", "" ], [ "Cabric", "Danijela", "" ] ]
new_dataset
0.993245
1211.0313
Paulo Urriza
Paulo Urriza, Eric Rebeiz, Danijela Cabric
Multiple Antenna Cyclostationary Spectrum Sensing Based on the Cyclic Correlation Significance Test
26 pages, 8 figures, submitted to IEEE JSAC: Cognitive Radio Series. arXiv admin note: substantial text overlap with arXiv:1210.8176
null
10.1109/JSAC.2013.131118
null
cs.PF stat.AP
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we propose and analyze a spectrum sensing method based on cyclostationarity specifically targeted for receivers with multiple antennas. This detection method is used for determining the presence or absence of primary users in cognitive radio networks based on the eigenvalues of the cyclic covariance matrix of received signals. In particular, the cyclic correlation significance test is used to detect a specific signal-of-interest by exploiting knowledge of its cyclic frequencies. Analytical expressions for the probability of detection and probability of false-alarm under both spatially uncorrelated or spatially correlated noise are derived and verified by simulation. The detection performance in a Rayleigh flat-fading environment is found and verified through simulations. One of the advantages of the proposed method is that the detection threshold is shown to be independent of both the number of samples and the noise covariance, effectively eliminating the dependence on accurate noise estimation. The proposed method is also shown to provide higher detection probability and better robustness to noise uncertainty than existing multiple-antenna cyclostationary-based spectrum sensing algorithms under both AWGN as well as a quasi-static Rayleigh fading channel.
[ { "version": "v1", "created": "Thu, 1 Nov 2012 21:30:52 GMT" } ]
2016-11-15T00:00:00
[ [ "Urriza", "Paulo", "" ], [ "Rebeiz", "Eric", "" ], [ "Cabric", "Danijela", "" ] ]
new_dataset
0.986882
1212.3844
Saeed Hajizadeh
Saeed Hajizadeh, and Ghosheh Abed Hodtani
Three-Receiver Broadcast Channel with Side Information
13 pages, 4 figures, This paper is partially presented at 2012 IEEE International Symposium on Information Theory
null
10.1109/ISIT.2012.6284216
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Three-Receiver broadcast channels (BC) are of interest due to their information-theoretic differences with two-receiver one. In this paper, we derive achievable rate regions for two classes of 3-receiver BC with side information (SI), i.e. Multilevel BC (MBC) and 3-receiver less noisy BC, using a combination of superposition coding, Gelfand-Pinsker binning scheme and Nair-El Gamal indirect decoding. Our rate region for MBC subsumes Steinberg rate region for 2-receiver degraded BC with SI as its special case. We will also show that the obtained achievable rate regions in the first two cases are tight for several classes of non-deterministic, semi-deterministic, and deterministic 3-receiver BC when SI is available both at the transmitter and at the receivers. We also prove that as far as a receiver is deterministic in the three-receiver less noisy BC, the presence of side information at that receiver does not affect the capacity region. We have also provided the writing on dirty paper (WDP) property for 3-receiver BC is provided as an example. In the last section, we provide simple bounds on the capacity region of the Additive Exponential noise three-receiver broadcast channels with Additive Exponential interference (AEN-3BC-EI).
[ { "version": "v1", "created": "Sun, 16 Dec 2012 22:30:54 GMT" } ]
2016-11-15T00:00:00
[ [ "Hajizadeh", "Saeed", "" ], [ "Hodtani", "Ghosheh Abed", "" ] ]
new_dataset
0.96015
1212.5792
Kui Xu
Kui Xu, Youyun Xu, Xiaochen Xia, Dongmei Zhang
On Max-SINR Receiver for Hexagonal Multicarrier Transmission Over Doubly Dispersive Channel
6 pages. The paper has been published in Proc. IEEE GLOBECOM 2012. Copyright transferred to IEEE. arXiv admin note: text overlap with arXiv:1212.5791
null
10.1109/GLOCOM.2012.6503687
null
cs.IT math.IT
http://creativecommons.org/licenses/by-nc-sa/3.0/
In this paper, a novel receiver for Hexagonal Multicarrier Transmission (HMT) system based on the maximizing Signal-to-Interference-plus-Noise Ratio (Max-SINR) criterion is proposed. Theoretical analysis shows that the prototype pulse of the proposed Max-SINR receiver should adapt to the root mean square (RMS) delay spread of the doubly dispersive (DD) channel with exponential power delay profile and U-shape Doppler spectrum. Simulation results show that the proposed Max-SINR receiver outperforms traditional projection scheme and obtains an approximation to the theoretical upper bound SINR performance within the full range of channel spread factor. Meanwhile, the SINR performance of the proposed prototype pulse is robust to the estimation error between the estimated value and the real value of time delay spread.
[ { "version": "v1", "created": "Sun, 23 Dec 2012 13:21:10 GMT" }, { "version": "v2", "created": "Thu, 10 Jan 2013 01:00:11 GMT" } ]
2016-11-15T00:00:00
[ [ "Xu", "Kui", "" ], [ "Xu", "Youyun", "" ], [ "Xia", "Xiaochen", "" ], [ "Zhang", "Dongmei", "" ] ]
new_dataset
0.994733
1301.2935
Tao Wang Dr.
Tao Wang, Yong Fang, Luc Vandendorpe
Novel Subcarrier-pair based Opportunistic DF Protocol for Cooperative Downlink OFDMA
6 pages, accepted by 2013 IEEE Wireless Communications and Networking Conference
null
10.1109/WCNC.2013.6555089
null
cs.IT cs.NI math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A novel subcarrier-pair based opportunistic DF protocol is proposed for cooperative downlink OFDMA transmission aided by a decode-and-forward (DF) relay. Specifically, user message bits are transmitted in two consecutive equal-duration time slots. A subcarrier in the first slot can be paired with a subcarrier in the second slot for the DF relay-aided transmission to a user. In particular, the source and the relay can transmit simultaneously to implement beamforming at the subcarrier in the second slot for the relay-aided transmission. Each unpaired subcarrier in either the first or second slot is used by the source for direct transmission to a user without the relay's assistance. The sum rate maximized resource allocation (RA) problem is addressed for this protocol under a total power constraint. It is shown that the novel protocol leads to a maximum sum rate greater than or equal to that for a benchmark one, which does not allow the source to implement beamforming at the subcarrier in the second slot for the relay-aided transmission. Then, a polynomial-complexity RA algorithm is developed to find an (at least approximately) optimum resource allocation (i.e., source/relay power, subcarrier pairing and assignment to users) for either the proposed or benchmark protocol. Numerical experiments illustrate that the novel protocol can lead to a much greater sum rate than the benchmark one.
[ { "version": "v1", "created": "Mon, 14 Jan 2013 12:05:53 GMT" } ]
2016-11-15T00:00:00
[ [ "Wang", "Tao", "" ], [ "Fang", "Yong", "" ], [ "Vandendorpe", "Luc", "" ] ]
new_dataset
0.988675
1302.0951
Jun Muramatsu
Jun Muramatsu
Channel Coding and Lossy Source Coding Using a Constrained Random Number Generator
submitted to IEEE Transactions on Information Theory, 42 pages
null
10.1109/TIT.2014.2309140
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Stochastic encoders for channel coding and lossy source coding are introduced with a rate close to the fundamental limits, where the only restriction is that the channel input alphabet and the reproduction alphabet of the lossy source code are finite. Random numbers, which satisfy a condition specified by a function and its value, are used to construct stochastic encoders. The proof of the theorems is based on the hash property of an ensemble of functions, where the results are extended to general channels/sources and alternative formulas are introduced for channel capacity and the rate-distortion region. Since an ensemble of sparse matrices has a hash property, we can construct a code by using sparse matrices, where the sum-product algorithm can be used for encoding and decoding by assuming that channels/sources are memoryless.
[ { "version": "v1", "created": "Tue, 5 Feb 2013 07:36:34 GMT" } ]
2016-11-15T00:00:00
[ [ "Muramatsu", "Jun", "" ] ]
new_dataset
0.969341
1302.4706
Antonio Campello
Antonio Campello, Cristiano Torezzan and Sueli I. R. Costa
Curves on Flat Tori and Analog Source-Channel Codes
15 pages, 6 figures. Accepted for publication IEEE Trans. Inf. Theory. arXiv admin note: substantial text overlap with arXiv:1202.2111
null
10.1109/TIT.2013.2269135
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we consider the problem of transmitting a continuous alphabet discrete-time source over an AWGN channel. We propose a constructive scheme based on a set of curves on the surface of a N-dimensional sphere. Our approach shows that the design of good codes for this communication problem is related to geometrical properties of spherical codes and projections of N-dimensional rectangular lattices. Theoretical comparisons with some previous works in terms of the mean square error as a function of the channel SNR as well as simulations are provided.
[ { "version": "v1", "created": "Tue, 19 Feb 2013 18:53:30 GMT" }, { "version": "v2", "created": "Mon, 10 Jun 2013 17:42:32 GMT" }, { "version": "v3", "created": "Thu, 13 Jun 2013 00:32:49 GMT" } ]
2016-11-15T00:00:00
[ [ "Campello", "Antonio", "" ], [ "Torezzan", "Cristiano", "" ], [ "Costa", "Sueli I. R.", "" ] ]
new_dataset
0.99576
1302.4793
Seunghyun Lee
Seunghyun Lee, Rui Zhang, Kaibin Huang
Opportunistic Wireless Energy Harvesting in Cognitive Radio Networks
This is the longer version of a paper to appear in IEEE Transactions on Wireless Communications
null
10.1109/TWC.2013.072613.130323
null
cs.NI cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Wireless networks can be self-sustaining by harvesting energy from ambient radio-frequency (RF) signals. Recently, researchers have made progress on designing efficient circuits and devices for RF energy harvesting suitable for low-power wireless applications. Motivated by this and building upon the classic cognitive radio (CR) network model, this paper proposes a novel method for wireless networks coexisting where low-power mobiles in a secondary network, called secondary transmitters (STs), harvest ambient RF energy from transmissions by nearby active transmitters in a primary network, called primary transmitters (PTs), while opportunistically accessing the spectrum licensed to the primary network. We consider a stochastic-geometry model in which PTs and STs are distributed as independent homogeneous Poisson point processes (HPPPs) and communicate with their intended receivers at fixed distances. Each PT is associated with a guard zone to protect its intended receiver from ST's interference, and at the same time delivers RF energy to STs located in its harvesting zone. Based on the proposed model, we analyze the transmission probability of STs and the resulting spatial throughput of the secondary network. The optimal transmission power and density of STs are derived for maximizing the secondary network throughput under the given outage-probability constraints in the two coexisting networks, which reveal key insights to the optimal network design. Finally, we show that our analytical result can be generally applied to a non-CR setup, where distributed wireless power chargers are deployed to power coexisting wireless transmitters in a sensor network.
[ { "version": "v1", "created": "Wed, 20 Feb 2013 02:26:27 GMT" }, { "version": "v2", "created": "Fri, 12 Jul 2013 05:41:46 GMT" } ]
2016-11-15T00:00:00
[ [ "Lee", "Seunghyun", "" ], [ "Zhang", "Rui", "" ], [ "Huang", "Kaibin", "" ] ]
new_dataset
0.995481
1302.5518
Lluis Pamies-Juarez
Lluis Pamies-Juarez, Henk D.L. Hollmann, Fr\'ed\'erique Oggier
Locally Repairable Codes with Multiple Repair Alternatives
IEEE International Symposium on Information Theory (ISIT 2013)
null
10.1109/ISIT.2013.6620355
null
cs.IT cs.DC math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Distributed storage systems need to store data redundantly in order to provide some fault-tolerance and guarantee system reliability. Different coding techniques have been proposed to provide the required redundancy more efficiently than traditional replication schemes. However, compared to replication, coding techniques are less efficient for repairing lost redundancy, as they require retrieval of larger amounts of data from larger subsets of storage nodes. To mitigate these problems, several recent works have presented locally repairable codes designed to minimize the repair traffic and the number of nodes involved per repair. Unfortunately, existing methods often lead to codes where there is only one subset of nodes able to repair a piece of lost data, limiting the local repairability to the availability of the nodes in this subset. In this paper, we present a new family of locally repairable codes that allows different trade-offs between the number of contacted nodes per repair, and the number of different subsets of nodes that enable this repair. We show that slightly increasing the number of contacted nodes per repair allows to have repair alternatives, which in turn increases the probability of being able to perform efficient repairs. Finally, we present pg-BLRC, an explicit construction of locally repairable codes with multiple repair alternatives, constructed from partial geometries, in particular from Generalized Quadrangles. We show how these codes can achieve practical lengths and high rates, while requiring a small number of nodes per repair, and providing multiple repair alternatives.
[ { "version": "v1", "created": "Fri, 22 Feb 2013 08:40:12 GMT" }, { "version": "v2", "created": "Wed, 15 May 2013 04:06:54 GMT" } ]
2016-11-15T00:00:00
[ [ "Pamies-Juarez", "Lluis", "" ], [ "Hollmann", "Henk D. L.", "" ], [ "Oggier", "Frédérique", "" ] ]
new_dataset
0.998532
1302.6703
Karsten Fyhn
Karsten Fyhn, Tobias Lindstr{\o}m Jensen, Torben Larsen, and S{\o}ren Holdt Jensen
Compressive Sensing for Spread Spectrum Receivers
11 pages, 11 figures, 1 table, accepted for publication in IEEE Transactions on Wireless Communications
null
10.1109/TWC.2013.032113.120975
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
With the advent of ubiquitous computing there are two design parameters of wireless communication devices that become very important power: efficiency and production cost. Compressive sensing enables the receiver in such devices to sample below the Shannon-Nyquist sampling rate, which may lead to a decrease in the two design parameters. This paper investigates the use of Compressive Sensing (CS) in a general Code Division Multiple Access (CDMA) receiver. We show that when using spread spectrum codes in the signal domain, the CS measurement matrix may be simplified. This measurement scheme, named Compressive Spread Spectrum (CSS), allows for a simple, effective receiver design. Furthermore, we numerically evaluate the proposed receiver in terms of bit error rate under different signal to noise ratio conditions and compare it with other receiver structures. These numerical experiments show that though the bit error rate performance is degraded by the subsampling in the CS-enabled receivers, this may be remedied by including quantization in the receiver model. We also study the computational complexity of the proposed receiver design under different sparsity and measurement ratios. Our work shows that it is possible to subsample a CDMA signal using CSS and that in one example the CSS receiver outperforms the classical receiver.
[ { "version": "v1", "created": "Wed, 27 Feb 2013 09:29:04 GMT" } ]
2016-11-15T00:00:00
[ [ "Fyhn", "Karsten", "" ], [ "Jensen", "Tobias Lindstrøm", "" ], [ "Larsen", "Torben", "" ], [ "Jensen", "Søren Holdt", "" ] ]
new_dataset
0.96717
1303.1038
Alberto Tarable
Alberto Tarable, Alessandro Nordio, Fabrizio Dabbene and Roberto Tempo
Anytime Reliable LDPC Convolutional Codes for Networked Control over Wireless Channel
5 pages, 3 figures, submitted to IEEE International Symposium on Information Theory 2013 (ISIT 2013)
null
10.1109/ISIT.2013.6620589
null
cs.IT cs.SY math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper deals with the problem of stabilizing an unstable system through networked control over the wireless medium. In such a situation a remote sensor communicates the measurements to the system controller through a noisy channel. In particular, in the AWGN scenario, we show that protograph-based LDPC convolutional codes achieve anytime reliability and we also derive a lower bound to the signal-to-noise ratio required to stabilize the system. Moreover, on the Rayleigh-fading channel, we show by simulations that resorting to multiple sensors allows to achieve a diversity gain.
[ { "version": "v1", "created": "Tue, 5 Mar 2013 14:05:24 GMT" } ]
2016-11-15T00:00:00
[ [ "Tarable", "Alberto", "" ], [ "Nordio", "Alessandro", "" ], [ "Dabbene", "Fabrizio", "" ], [ "Tempo", "Roberto", "" ] ]
new_dataset
0.997718
1303.2870
Jie Xu Mr.
Jie Xu, Rui Zhang
CoMP Meets Smart Grid: A New Communication and Energy Cooperation Paradigm
to appear in IEEE Transactions on Vehicular Technology
null
10.1109/TVT.2014.2345415
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we pursue a unified study on smart grid and coordinated multi-point (CoMP) enabled wireless communication by investigating a new joint communication and energy cooperation approach. We consider a practical CoMP system with clustered multiple-antenna base stations (BSs) cooperatively communicating with multiple single-antenna mobile terminals (MTs), where each BS is equipped with local renewable energy generators to supply power and also a smart meter to enable two-way energy flow with the grid. We propose a new energy cooperation paradigm, where a group of BSs dynamically share their renewable energy for more efficient operation via locally injecting/drawing power to/from an aggregator with a zero effective sum-energy exchanged. Under this new energy cooperation model, we consider the downlink transmission in one CoMP cluster with cooperative zero-forcing (ZF) based precoding at the BSs. We maximize the weighted sum-rate for all MTs by jointly optimizing the transmit power allocations at cooperative BSs and their exchanged energy amounts subject to a new type of power constraints featuring energy cooperation among BSs with practical loss ratios. Our new setup with BSs' energy cooperation generalizes the conventional CoMP transmit optimization under BSs' sum-power or individual-power constraints. Finally, we validate our results by simulations under various practical setups, and show that the proposed joint communication and energy cooperation scheme substantially improves the downlink throughput of CoMP systems powered by smart grid and renewable energy, as compared to other suboptimal designs without communication and/or energy cooperation.
[ { "version": "v1", "created": "Tue, 12 Mar 2013 13:21:37 GMT" }, { "version": "v2", "created": "Tue, 30 Jul 2013 05:31:42 GMT" }, { "version": "v3", "created": "Thu, 16 Jan 2014 04:46:11 GMT" }, { "version": "v4", "created": "Thu, 31 Jul 2014 06:21:09 GMT" } ]
2016-11-15T00:00:00
[ [ "Xu", "Jie", "" ], [ "Zhang", "Rui", "" ] ]
new_dataset
0.999531
1307.4463
Mahyar Shirvanimoghaddam
Mahyar Shirvanimoghaddam, Yonghui Li, Shuang Tian, Branka Vucetic
Distributed Raptor Coding for Erasure Channels: Partially and Fully Coded Cooperation
To be Published in IEEE Transaction on Communications
null
10.1109/TCOMM.2013.072913.120724
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we propose a new rateless coded cooperation scheme for a general multi-user cooperative wireless system. We develop cooperation methods based on Raptor codes with the assumption that the channels face erasure with specific erasure probabilities and transmitters have no channel state information. A fully coded cooperation (FCC) and a partially coded cooperation (PCC) strategy are developed to maximize the average system throughput. Both PCC and FCC schemes have been analyzed through AND-OR tree analysis and a linear programming optimization problem is then formulated to find the optimum degree distribution for each scheme. Simulation results show that optimized degree distributions can bring considerable throughput gains compared to existing degree distributions which are designed for point-to-point binary erasure channels. It is also shown that the PCC scheme outperforms the FCC scheme in terms of average system throughput.
[ { "version": "v1", "created": "Wed, 17 Jul 2013 01:35:02 GMT" }, { "version": "v2", "created": "Sun, 21 Jul 2013 21:29:22 GMT" } ]
2016-11-15T00:00:00
[ [ "Shirvanimoghaddam", "Mahyar", "" ], [ "Li", "Yonghui", "" ], [ "Tian", "Shuang", "" ], [ "Vucetic", "Branka", "" ] ]
new_dataset
0.989855
1307.7105
Dr. Nadeem Javaid
Q. Nadeem, M. B. Rasheed, N. Javaid, Z. A. Khan, Y. Maqsood, A. Din
M-GEAR: Gateway-Based Energy-Aware Multi-Hop Routing Protocol for WSNs
IEEE 8th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA'13), Compiegne, France
null
10.1109/BWCCA.2013.35
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this research work, we advise gateway based energy-efficient routing protocol (M-GEAR) for Wireless Sensor Networks (WSNs). We divide the sensor nodes into four logical regions on the basis of their location in the sensing field. We install Base Station (BS) out of the sensing area and a gateway node at the centre of the sensing area. If the distance of a sensor node from BS or gateway is less than predefined distance threshold, the node uses direct communication. We divide the rest of nodes into two equal regions whose distance is beyond the threshold distance. We select cluster heads (CHs)in each region which are independent of the other region. These CHs are selected on the basis of a probability. We compare performance of our protocol with LEACH (Low Energy Adaptive Clustering Hierarchy). Performance analysis and compared statistic results show that our proposed protocol perform well in terms of energy consumption and network lifetime.
[ { "version": "v1", "created": "Fri, 26 Jul 2013 17:24:18 GMT" } ]
2016-11-15T00:00:00
[ [ "Nadeem", "Q.", "" ], [ "Rasheed", "M. B.", "" ], [ "Javaid", "N.", "" ], [ "Khan", "Z. A.", "" ], [ "Maqsood", "Y.", "" ], [ "Din", "A.", "" ] ]
new_dataset
0.998754
1307.7111
Dr. Nadeem Javaid
Y. Khan, N. Javaid, M. J. Khan, Y. Ahmad, M. H. Zubair, S. A. Shah
LPCH and UDLPCH: Location-aware Routing Techniques in WSNs
IEEE 8th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA'13), Compiegne, France
null
10.1109/BWCCA.2013.25
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Wireless sensor nodes along with Base Station (BS) constitute a Wireless Sensor Network (WSN). Nodes comprise of tiny power battery. Nodes sense the data and send it to BS. WSNs need protocol for efficient energy consumption of the network. In direct transmission and minimum transmission energy routing protocols, energy consumption is not well distributed. However, LEACH (Low-Energy Adaptive Clustering Hierarchy) is a clustering protocol; randomly selects the Cluster Heads (CHs) in each round. However, random selection of CHs does not guarantee efficient energy consumption of the network. Therefore, we proposed new clustering techniques in routing protocols, Location-aware Permanent CH (LPCH) and User Defined Location-aware Permanent CH (UDLPCH). In both protocols, network field is physically divided in to two regions, equal number of nodes are randomly deployed in each region. In LPCH, number of CHs are selected by LEACH algorithm in first round. However in UDLPCH, equal and optimum number of CHs are selected in each region, throughout the network life time number of CHs are remain same. Simulation results show that stability period and throughput of LPCH is greater than LEACH, stability period and throughput of UDLPCH is greater than LPCH.
[ { "version": "v1", "created": "Fri, 26 Jul 2013 17:36:42 GMT" } ]
2016-11-15T00:00:00
[ [ "Khan", "Y.", "" ], [ "Javaid", "N.", "" ], [ "Khan", "M. J.", "" ], [ "Ahmad", "Y.", "" ], [ "Zubair", "M. H.", "" ], [ "Shah", "S. A.", "" ] ]
new_dataset
0.996711
1307.7242
Dr. Nadeem Javaid
N. Javaid, S. Faisal, Z. A. Khan, D. Nayab, M. Zahid
Measuring Fatigue of Soldiers in Wireless Body Area Sensor Networks
IEEE 8th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA'13), Compiegne, France
null
10.1109/BWCCA.2013.43
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Wireless Body Area Sensor Networks (WBASNs) consist of on-body or in-body sensors placed on human body for health monitoring. Energy conservation of these sensors, while guaranteeing a required level of performance, is a challenging task. Energy efficient routing schemes are designed for the longevity of network lifetime. In this paper, we propose a routing protocol for measuring fatigue of a soldier. Three sensors are attached to soldier's body that monitor specific parameters. Our proposed protocol is an event driven protocol and takes three scenarios for measuring the fatigue of a soldier. We evaluate our proposed work in terms of network lifetime, throughput, remaining energy of sensors and fatigue of a soldier.
[ { "version": "v1", "created": "Sat, 27 Jul 2013 09:44:05 GMT" } ]
2016-11-15T00:00:00
[ [ "Javaid", "N.", "" ], [ "Faisal", "S.", "" ], [ "Khan", "Z. A.", "" ], [ "Nayab", "D.", "" ], [ "Zahid", "M.", "" ] ]
new_dataset
0.996601
1307.7245
Dr. Nadeem Javaid
A. Rao, M. Akbar, N. Javaid, S. N. Mohammad, S. Sarfraz
AM-DisCNT: Angular Multi-hop DIStance based Circular Network Transmission Protocol for WSNs
IEEE 8th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA'13), Compiegne, France
null
10.1109/BWCCA.2013.14
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The nodes in wireless sensor networks (WSNs) contain limited energy resources, which are needed to transmit data to base station (BS). Routing protocols are designed to reduce the energy consumption. Clustering algorithms are best in this aspect. Such clustering algorithms increase the stability and lifetime of the network. However, every routing protocol is not suitable for heterogeneous environments. AM-DisCNT is proposed and evaluated as a new energy efficient protocol for wireless sensor networks. AM-DisCNT uses circular deployment for even consumption of energy in entire wireless sensor network. Cluster-head selection is on the basis of energy. Highest energy node becomes CH for that round. Energy is again compared in the next round to check the highest energy node of that round. The simulation results show that AM-DisCNT performs better than the existing heterogeneous protocols on the basis of network lifetime, throughput and stability of the system.
[ { "version": "v1", "created": "Sat, 27 Jul 2013 10:21:02 GMT" } ]
2016-11-15T00:00:00
[ [ "Rao", "A.", "" ], [ "Akbar", "M.", "" ], [ "Javaid", "N.", "" ], [ "Mohammad", "S. N.", "" ], [ "Sarfraz", "S.", "" ] ]
new_dataset
0.966615
1307.8257
Mauro Femminella
Mauro Femminella, Francesco Giacinti, and Gianluca Reali
Enhancing Java Call Control with Media Server Control functions
Accepted for publication in IEEE Communications Magazine, Design and Implementation (D&I) Series
null
10.1109/MCOM.2013.6619577
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we propose a novel abstraction layer for application service implementation compliant with the Java Call Control (JCC) specifications. It simplifies creation of multimedia services using the Session Initiation Protocol (SIP) and the Media Gateway Control Protocol (MGCP). In order to show its effectiveness, we have implemented a JCC Resource Adaptor for a JAIN Service Logic Execution Environment (JSLEE), using the Mobicents application server, which is the only existing open source JSLEE implementation. Experimental results, obtained by implementing a complex VoIP service, show both a significant simplification of service implementation and improved performance over legacy solutions.
[ { "version": "v1", "created": "Wed, 31 Jul 2013 09:20:25 GMT" } ]
2016-11-15T00:00:00
[ [ "Femminella", "Mauro", "" ], [ "Giacinti", "Francesco", "" ], [ "Reali", "Gianluca", "" ] ]
new_dataset
0.981426
1309.1333
Nikolaos Pappas
Nikolaos Pappas, Marios Kountouris, Anthony Ephremides
The Stability Region of the Two-User Interference Channel
Accepted for publication at IEEE Information Theory Workshop 2013
null
10.1109/ITW.2013.6691293
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The stable throughput region of the two-user interference channel is investigated here. First, the stability region for the general case is characterized. Second, we study the cases where the receivers treat interference as noise or perform successive interference cancelation. Finally, we provide conditions for the convexity/concavity of the stability region and for which a certain interference management strategy leads to broader stability region.
[ { "version": "v1", "created": "Thu, 5 Sep 2013 12:38:35 GMT" } ]
2016-11-15T00:00:00
[ [ "Pappas", "Nikolaos", "" ], [ "Kountouris", "Marios", "" ], [ "Ephremides", "Anthony", "" ] ]
new_dataset
0.968185
1310.0557
Mahyar Shirvanimoghaddam
Mahyar Shirvanimoghaddam, Yonghui Li, and Branka Vucetic
Near-Capacity Adaptive Analog Fountain Codes for Wireless Channels
To appear in IEEE Communications Letters
null
10.1109/LCOMM.2013.101813.131972
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we propose a capacity-approaching analog fountain code (AFC) for wireless channels. In AFC, the number of generated coded symbols is potentially limitless. In contrast to the conventional binary rateless codes, each coded symbol in AFC is a real-valued symbol, generated as a weighted sum of $d$ randomly selected information bits, where $d$ and the weight coefficients are randomly selected from predefined probability mass functions. The coded symbols are then directly transmitted through wireless channels. We analyze the error probability of AFC and design the weight set to minimize the error probability. Simulation results show that AFC achieves the capacity of the Gaussian channel in a wide range of signal to noise ratio (SNR).
[ { "version": "v1", "created": "Wed, 2 Oct 2013 03:28:51 GMT" } ]
2016-11-15T00:00:00
[ [ "Shirvanimoghaddam", "Mahyar", "" ], [ "Li", "Yonghui", "" ], [ "Vucetic", "Branka", "" ] ]
new_dataset
0.995302
1310.0744
Marco Baldi
Marco Baldi, Marco Bianchi, Franco Chiaraluce, Roberto Garello, Ignacio Aguilar Sanchez, Stefano Cioni
Advanced channel coding for space mission telecommand links
5 pages, 7 figures, presented at IEEE VTC 2013 Fall, Las Vegas, USA, Sep. 2013 Proc. IEEE Vehicular Technology Conference (VTC 2013 Fall), ISBN 978-1-6185-9, Las Vegas, USA, Sep. 2013
null
10.1109/VTCFall.2013.6692087
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We investigate and compare different options for updating the error correcting code currently used in space mission telecommand links. Taking as a reference the solutions recently emerged as the most promising ones, based on Low-Density Parity-Check codes, we explore the behavior of alternative schemes, based on parallel concatenated turbo codes and soft-decision decoded BCH codes. Our analysis shows that these further options can offer similar or even better performance.
[ { "version": "v1", "created": "Wed, 2 Oct 2013 15:40:26 GMT" } ]
2016-11-15T00:00:00
[ [ "Baldi", "Marco", "" ], [ "Bianchi", "Marco", "" ], [ "Chiaraluce", "Franco", "" ], [ "Garello", "Roberto", "" ], [ "Sanchez", "Ignacio Aguilar", "" ], [ "Cioni", "Stefano", "" ] ]
new_dataset
0.991426
1311.1363
Valerio Cambareri
Valerio Cambareri, Mauro Mangia, Fabio Pareschi, Riccardo Rovatti, Gianluca Setti
On Known-Plaintext Attacks to a Compressed Sensing-based Encryption: A Quantitative Analysis
IEEE Transactions on Information Forensics and Security, accepted for publication. Article in press
null
10.1109/TIFS.2015.2450676
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Despite the linearity of its encoding, compressed sensing may be used to provide a limited form of data protection when random encoding matrices are used to produce sets of low-dimensional measurements (ciphertexts). In this paper we quantify by theoretical means the resistance of the least complex form of this kind of encoding against known-plaintext attacks. For both standard compressed sensing with antipodal random matrices and recent multiclass encryption schemes based on it, we show how the number of candidate encoding matrices that match a typical plaintext-ciphertext pair is so large that the search for the true encoding matrix inconclusive. Such results on the practical ineffectiveness of known-plaintext attacks underlie the fact that even closely-related signal recovery under encoding matrix uncertainty is doomed to fail. Practical attacks are then exemplified by applying compressed sensing with antipodal random matrices as a multiclass encryption scheme to signals such as images and electrocardiographic tracks, showing that the extracted information on the true encoding matrix from a plaintext-ciphertext pair leads to no significant signal recovery quality increase. This theoretical and empirical evidence clarifies that, although not perfectly secure, both standard compressed sensing and multiclass encryption schemes feature a noteworthy level of security against known-plaintext attacks, therefore increasing its appeal as a negligible-cost encryption method for resource-limited sensing applications.
[ { "version": "v1", "created": "Wed, 6 Nov 2013 12:04:25 GMT" }, { "version": "v2", "created": "Thu, 25 Jun 2015 12:20:21 GMT" } ]
2016-11-15T00:00:00
[ [ "Cambareri", "Valerio", "" ], [ "Mangia", "Mauro", "" ], [ "Pareschi", "Fabio", "" ], [ "Rovatti", "Riccardo", "" ], [ "Setti", "Gianluca", "" ] ]
new_dataset
0.998163
1311.2651
Ashish Khisti
Xiang He, Ashish Khisti, Aylin Yener
MIMO Broadcast Channel with an Unknown Eavesdropper: Secrecy Degrees of Freedom
Accepted to IEEE Transactions on Communications
null
10.1109/TCOMM.2013.112213.130302
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study a multi-antenna broadcast channel with two legitimate receivers and an external eavesdropper. We assume that the channel matrix of the eavesdropper is unknown to the legitimate terminals but satisfies a maximum rank constraint. As our main result we characterize the associated secrecy degrees of freedom for the broadcast channel with common and private messages. We show that a direct extension of the single-user wiretap codebook does not achieve the secrecy degrees of freedom. Our proposed optimal scheme involves decomposing the signal space into a common subspace, which can be observed by both receivers, and private subspaces which can be observed by only one of the receivers, and carefully transmitting a subset of messages in each subspace. We also consider the case when each user's private message must additionally remain confidential from the other legitimate receiver and characterize the s.d.o.f.\ region in this case.
[ { "version": "v1", "created": "Tue, 12 Nov 2013 00:54:08 GMT" } ]
2016-11-15T00:00:00
[ [ "He", "Xiang", "" ], [ "Khisti", "Ashish", "" ], [ "Yener", "Aylin", "" ] ]
new_dataset
0.970661
1312.0499
Christoph Neumann
Nicolas Le Scouarnec, Christoph Neumann, Gilles Straub
Cache policies for cloud-based systems: To keep or not to keep
Proceedings of IEEE International Conference on Cloud Computing 2014 (CLOUD 14)
null
10.1109/CLOUD.2014.11
null
cs.NI cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we study cache policies for cloud-based caching. Cloud-based caching uses cloud storage services such as Amazon S3 as a cache for data items that would have been recomputed otherwise. Cloud-based caching departs from classical caching: cloud resources are potentially infinite and only paid when used, while classical caching relies on a fixed storage capacity and its main monetary cost comes from the initial investment. To deal with this new context, we design and evaluate a new caching policy that minimizes the overall cost of a cloud-based system. The policy takes into account the frequency of consumption of an item and the cloud cost model. We show that this policy is easier to operate, that it scales with the demand and that it outperforms classical policies managing a fixed capacity.
[ { "version": "v1", "created": "Mon, 2 Dec 2013 16:21:25 GMT" }, { "version": "v2", "created": "Thu, 24 Apr 2014 08:05:14 GMT" } ]
2016-11-15T00:00:00
[ [ "Scouarnec", "Nicolas Le", "" ], [ "Neumann", "Christoph", "" ], [ "Straub", "Gilles", "" ] ]
new_dataset
0.983087
1401.4753
Rodrigo de Lamare
K. Zu, R. C. de Lamare and M. Haardt
Multi-Branch Tomlinson-Harashima Precoding for MU-MIMO Systems: Theory and Algorithms
13 figures, 12 pages. IEEE Transactions on Communications, 2014
null
10.1109/TCOMM.2014.012514.130241
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Tomlinson-Harashima precoding (THP) is a nonlinear processing technique employed at the transmit side and is a dual to the successive interference cancelation (SIC) detection at the receive side. Like SIC detection, the performance of THP strongly depends on the ordering of the precoded symbols. The optimal ordering algorithm, however, is impractical for multiuser MIMO (MU-MIMO) systems with multiple receive antennas due to the fact that the users are geographically distributed. In this paper, we propose a multi-branch THP (MB-THP) scheme and algorithms that employ multiple transmit processing and ordering strategies along with a selection scheme to mitigate interference in MU-MIMO systems. Two types of multi-branch THP (MB-THP) structures are proposed. The first one employs a decentralized strategy with diagonal weighted filters at the receivers of the users and the second uses a diagonal weighted filter at the transmitter. The MB-MMSE-THP algorithms are also derived based on an extended system model with the aid of an LQ decomposition, which is much simpler compared to the conventional MMSE-THP algorithms. Simulation results show that a better bit error rate (BER) performance can be achieved by the proposed MB-MMSE-THP precoder with a small computational complexity increase.
[ { "version": "v1", "created": "Sun, 19 Jan 2014 23:08:35 GMT" } ]
2016-11-15T00:00:00
[ [ "Zu", "K.", "" ], [ "de Lamare", "R. C.", "" ], [ "Haardt", "M.", "" ] ]
new_dataset
0.996586
1401.6060
Marco Mondelli
Marco Mondelli, S. Hamed Hassani, Igal Sason, and R\"udiger Urbanke
Achieving Marton's Region for Broadcast Channels Using Polar Codes
26 pages, 11 figures, accepted to IEEE Trans. Inform. Theory and presented in part at ISIT'14
null
10.1109/ISIT.2014.6874844
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents polar coding schemes for the 2-user discrete memoryless broadcast channel (DM-BC) which achieve Marton's region with both common and private messages. This is the best achievable rate region known to date, and it is tight for all classes of 2-user DM-BCs whose capacity regions are known. To accomplish this task, we first construct polar codes for both the superposition as well as the binning strategy. By combining these two schemes, we obtain Marton's region with private messages only. Finally, we show how to handle the case of common information. The proposed coding schemes possess the usual advantages of polar codes, i.e., they have low encoding and decoding complexity and a super-polynomial decay rate of the error probability. We follow the lead of Goela, Abbe, and Gastpar, who recently introduced polar codes emulating the superposition and binning schemes. In order to align the polar indices, for both schemes, their solution involves some degradedness constraints that are assumed to hold between the auxiliary random variables and the channel outputs. To remove these constraints, we consider the transmission of $k$ blocks and employ a chaining construction that guarantees the proper alignment of the polarized indices. The techniques described in this work are quite general, and they can be adopted to many other multi-terminal scenarios whenever there polar indices need to be aligned.
[ { "version": "v1", "created": "Thu, 23 Jan 2014 17:23:38 GMT" }, { "version": "v2", "created": "Thu, 20 Feb 2014 17:09:15 GMT" }, { "version": "v3", "created": "Fri, 10 Oct 2014 18:29:05 GMT" } ]
2016-11-15T00:00:00
[ [ "Mondelli", "Marco", "" ], [ "Hassani", "S. Hamed", "" ], [ "Sason", "Igal", "" ], [ "Urbanke", "Rüdiger", "" ] ]
new_dataset
0.99893
1403.6982
Ahmed Benfarah
Ahmed Benfarah, Stefano Tomasin and Nicola Laurenti
Parallel BCC with One Common and Two Confidential Messages and Imperfect CSIT
This paper is accepted for publication in IEEE Globecom second Workshop on trusted Com. with Physical Layer Security (TCPLS 2014)
null
10.1109/GLOCOMW.2014.7063625
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider a broadcast communication system over parallel sub-channels where the transmitter sends three messages: a common message to two users, and two confidential messages to each user which need to be kept secret from the other user. We assume partial channel state information at the transmitter (CSIT), stemming from noisy channel estimation. The first contribution of this paper is the characterization of the secrecy capacity region boundary as the solution of weighted sum-rate problems, with suitable weights. Partial CSIT is addressed by adding a margin to the estimated channel gains. The second paper contribution is the solution of this problem in an almost closed-form, where only two single real parameters must be optimized, e.g., through dichotomic searches. On the one hand, the considered problem generalizes existing literature where only two out of the three messages are transmitted. On the other hand, the solution finds also practical applications into the resource allocation of orthogonal frequency division multiplexing (OFDM) systems with both secrecy and fairness constraints.
[ { "version": "v1", "created": "Thu, 27 Mar 2014 11:32:17 GMT" }, { "version": "v2", "created": "Tue, 20 Jan 2015 10:34:21 GMT" } ]
2016-11-15T00:00:00
[ [ "Benfarah", "Ahmed", "" ], [ "Tomasin", "Stefano", "" ], [ "Laurenti", "Nicola", "" ] ]
new_dataset
0.995791
1404.2864
Marco Baldi
Marco Baldi, Nicola Maturo, Giacomo Ricciutelli, Franco Chiaraluce
LDPC coded transmissions over the Gaussian broadcast channel with confidential messages
5 pages, 5 figures, to be presented at IEEE ICT 2014
null
10.1109/ICT.2014.6845079
null
cs.IT cs.CR math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We design and assess some practical low-density parity-check (LDPC) coded transmission schemes for the Gaussian broadcast channel with confidential messages (BCC). This channel model is different from the classical wiretap channel model as the unauthorized receiver (Eve) must be able to decode some part of the information. Hence, the reliability and security targets are different from those of the wiretap channel. In order to design and assess practical coding schemes, we use the error rate as a metric of the performance achieved by the authorized receiver (Bob) and the unauthorized receiver (Eve). We study the system feasibility, and show that two different levels of protection against noise are required on the public and the secret messages. This can be achieved in two ways: i) by using LDPC codes with unequal error protection (UEP) of the transmitted information bits or ii) by using two classical non-UEP LDPC codes with different rates. We compare these two approaches and show that, for the considered examples, the solution exploiting UEP LDPC codes is more efficient than that using non-UEP LDPC codes.
[ { "version": "v1", "created": "Thu, 10 Apr 2014 16:10:05 GMT" } ]
2016-11-15T00:00:00
[ [ "Baldi", "Marco", "" ], [ "Maturo", "Nicola", "" ], [ "Ricciutelli", "Giacomo", "" ], [ "Chiaraluce", "Franco", "" ] ]
new_dataset
0.997291
1404.5767
Hendrik Richter
Hendrik Richter
Codynamic Fitness Landscapes of Coevolutionary Minimal Substrates
null
In: Proc. IEEE Congress on Evolutionary Computation, IEEE CEC 2014, (Ed.: C. A. Coello, Coello), IEEE Press, Piscataway, NJ, 2014, 2692-2699
10.1109/CEC.2014.6900272
null
cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Coevolutionary minimal substrates are simple and abstract models that allow studying the relationships and codynamics between objective and subjective fitness. Using these models an approach is presented for defining and analyzing fitness landscapes of coevolutionary problems. We devise similarity measures of codynamic fitness landscapes and experimentally study minimal substrates of test--based and compositional problems for both cooperative and competitive interaction.
[ { "version": "v1", "created": "Wed, 23 Apr 2014 09:53:47 GMT" } ]
2016-11-15T00:00:00
[ [ "Richter", "Hendrik", "" ] ]
new_dataset
0.995719
1405.4957
Chenrong Xiong
Chenrong Xiong, Jun Lin and Zhiyuan Yan
Symbol-Based Successive Cancellation List Decoder for Polar Codes
Accepted by 2014 IEEE Workshop on Signal Processing Systems (SiPS)
null
10.1109/SiPS.2014.6986086
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Polar codes is promising because they can provably achieve the channel capacity while having an explicit construction method. Lots of work have been done for the bit-based decoding algorithm for polar codes. In this paper, generalized symbol-based successive cancellation (SC) and SC list decoding algorithms are discussed. A symbol-based recursive channel combination relationship is proposed to calculate the symbol-based channel transition probability. This proposed method needs less additions than the maximum-likelihood decoder used by the existing symbol-based polar decoding algorithm. In addition, a two-stage list pruning network is proposed to simplify the list pruning network for the symbol-based SC list decoding algorithm.
[ { "version": "v1", "created": "Tue, 20 May 2014 05:48:50 GMT" }, { "version": "v2", "created": "Tue, 14 Oct 2014 02:39:36 GMT" } ]
2016-11-15T00:00:00
[ [ "Xiong", "Chenrong", "" ], [ "Lin", "Jun", "" ], [ "Yan", "Zhiyuan", "" ] ]
new_dataset
0.997983
1406.7092
Neri Merhav
Neri Merhav
On zero-rate error exponents of finite-state channels with input-dependent states
22 pages; submitted to IEEE Transactions on Information Theory
null
10.1109/TIT.2014.2378259
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We derive a single-letter formula for the zero-rate reliability (error exponent) of a finite-state channel whose state variable depends deterministically (and recursively) on past channel inputs, where the code complies with a given channel input constraint. Special attention is then devoted to the important special case of the Gaussian channel with inter-symbol interference (ISI), where more explicit results are obtained.
[ { "version": "v1", "created": "Fri, 27 Jun 2014 07:39:33 GMT" } ]
2016-11-15T00:00:00
[ [ "Merhav", "Neri", "" ] ]
new_dataset
0.980557
1406.7098
Jalaluddin Qureshi
Jalaluddin Qureshi
Caching Piggyback Information for Efficient Index Code Transmission
This paper has been accepted for publication in the 39th IEEE Conference on Local Computer Networks (LCN) to be held in Edmonton, Canada, Sep. 8-11, 2014
null
10.1109/LCN.2014.6925757
null
cs.NI cs.IT math.IT
http://creativecommons.org/licenses/by-nc-sa/3.0/
The index coding problem is a fundamental transmission problem arising in content distribution and wireless networks. Traditional approach to solve this problem is to find heuristic/ approximation minimum clique partition solution on an appropriately mapped graph of the index coding problem. In this paper we study index code for unicast data flow for which we propose updated clique index coding (UCIC) scheme, UCIC piggybacks additional information in the coded symbol such that an unsatisfied client can update its cache. We show that UCIC has higher coding gain than previously proposed index coding schemes, and it is optimal for those instances where index code of minimum length is known.
[ { "version": "v1", "created": "Fri, 27 Jun 2014 08:08:17 GMT" } ]
2016-11-15T00:00:00
[ [ "Qureshi", "Jalaluddin", "" ] ]
new_dataset
0.995331
1407.4489
Urs Niesen
Urs Niesen, Mohammad Ali Maddah-Ali
Coded Caching for Delay-Sensitive Content
9 pages
IEEE International Conference on Communications (ICC), pp. 5559 - 5564, June 2015
10.1109/ICC.2015.7249208
null
cs.IT cs.NI math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Coded caching is a recently proposed technique that achieves significant performance gains for cache networks compared to uncoded caching schemes. However, this substantial coding gain is attained at the cost of large delivery delay, which is not tolerable in delay-sensitive applications such as video streaming. In this paper, we identify and investigate the tradeoff between the performance gain of coded caching and the delivery delay. We propose a computationally efficient caching algorithm that provides the gains of coding and respects delay constraints. The proposed algorithm achieves the optimum performance for large delay, but still offers major gains for small delay. These gains are demonstrated in a practical setting with a video-streaming prototype.
[ { "version": "v1", "created": "Wed, 16 Jul 2014 20:28:25 GMT" } ]
2016-11-15T00:00:00
[ [ "Niesen", "Urs", "" ], [ "Maddah-Ali", "Mohammad Ali", "" ] ]
new_dataset
0.98176
1407.6266
Kamal Rahimi Malekshan
K. Rahimi Malekshan, W. Zhuang, and Y. Lostanlen
An Energy Efficient MAC Protocol for Fully Connected Wireless Ad Hoc Networks
Published in IEEE Transaction on Wireless Communications
null
10.1109/TWC.2014.2336801
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Energy efficiency is an important performance measure of wireless network protocols, especially for battery-powered mobile devices such as smartphones. This paper presents a new energy-efficient medium access control (MAC) scheme for fully connected wireless ad hoc networks. The proposed scheme reduces energy consumption by putting radio interfaces in the sleep state periodically and by reducing transmission collisions, which results in high throughput and low packet transmission delay. The proposed MAC scheme can also address the energy saving in realtime traffics which require very low packet transmission delay. An analytical model is established to evaluate the performance of the proposed MAC scheme. Analytical and simulation results demonstrate that the proposed scheme has a significantly lower power consumption, achieves substantially higher throughput, and has lower packet transmission delay in comparison with existing power saving MAC protocols.
[ { "version": "v1", "created": "Wed, 23 Jul 2014 15:37:08 GMT" } ]
2016-11-15T00:00:00
[ [ "Malekshan", "K. Rahimi", "" ], [ "Zhuang", "W.", "" ], [ "Lostanlen", "Y.", "" ] ]
new_dataset
0.975411
1407.8510
Awais Khawar
Awais Khawar, Ahmed Abdelhadi, and T. Charles Clancy
QPSK Waveform for MIMO Radar with Spectrum Sharing Constraints
submitted to IEEE Transactions. Distribution Statement A: Approved for public release; distribution is unlimited
null
10.1016/j.phycom.2015.08.001
null
cs.NI cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Multiple-input multiple-output (MIMO) radar is a relatively new concept in the field of radar signal processing. Many novel MIMO radar waveforms have been developed by considering various performance metrics and constraints. In this paper, we show that finite alphabet constant-envelope (FACE) quadrature-pulse shift keying (QPSK) waveforms can be designed to realize a given covariance matrix by transforming a constrained nonlinear optimization problem into an unconstrained nonlinear optimization problem. In addition, we design QPSK waveforms in a way that they don't cause interference to a cellular system, by steering nulls towards a selected base station (BS). The BS is selected according to our algorithm which guarantees minimum degradation in radar performance due to null space projection (NSP) of radar waveforms. We design QPSK waveforms with spectrum sharing constraints for a stationary and moving radar platform. We show that the waveform designed for stationary MIMO radar matches the desired beampattern closely, when the number of BS antennas $N^{\text{BS}}$ is considerably less than the number of radar antennas $M$, due to quasi-static interference channel. However, for moving radar the difference between designed and desired waveforms is larger than stationary radar, due to rapidly changing channel.
[ { "version": "v1", "created": "Wed, 30 Jul 2014 18:13:17 GMT" }, { "version": "v2", "created": "Sun, 3 Aug 2014 17:42:42 GMT" }, { "version": "v3", "created": "Thu, 14 Aug 2014 19:30:05 GMT" } ]
2016-11-15T00:00:00
[ [ "Khawar", "Awais", "" ], [ "Abdelhadi", "Ahmed", "" ], [ "Clancy", "T. Charles", "" ] ]
new_dataset
0.990199
1409.2153
Ankit Chaudhary
J. L. Raheja, Dhiraj, D. Gopinath, Ankit Chaudhary
GUI system for Elders/Patients in Intensive Care
In proceedings of the 4th IEEE International Conference on International Technology Management Conference, Chicago, IL USA, 12-15 June, 2014
null
10.1109/ITMC.2014.6918605
null
cs.HC cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In the old age, few people need special care if they are suffering from specific diseases as they can get stroke while they are in normal life routine. Also patients of any age, who are not able to walk, need to be taken care of personally but for this, either they have to be in hospital or someone like nurse should be with them for better care. This is costly in terms of money and man power. A person is needed for 24x7 care of these people. To help in this aspect we purposes a vision based system which will take input from the patient and will provide information to the specified person, who is currently may not in the patient room. This will reduce the need of man power, also a continuous monitoring would not be needed. The system is using MS Kinect for gesture detection for better accuracy and this system can be installed at home or hospital easily. The system provides GUI for simple usage and gives visual and audio feedback to user. This system work on natural hand interaction and need no training before using and also no need to wear any glove or color strip.
[ { "version": "v1", "created": "Sun, 7 Sep 2014 19:02:32 GMT" } ]
2016-11-15T00:00:00
[ [ "Raheja", "J. L.", "" ], [ "Dhiraj", "", "" ], [ "Gopinath", "D.", "" ], [ "Chaudhary", "Ankit", "" ] ]
new_dataset
0.997663
1409.6001
Ghaith Hattab
Amr El-Mougy, Mohamed Ibnkahla, Ghaith Hattab, and Waleed Ejaz
Reconfigurable Wireless Networks
28 pages, 26 figures; Submitted to the Proceedings of the IEEE (a special issue on Reconfigurable Systems)
null
10.1109/JPROC.2014.2376812
null
cs.NI cs.IT math.IT
http://creativecommons.org/licenses/by/3.0/
Driven by the advent of sophisticated and ubiquitous applications, and the ever-growing need for information, wireless networks are without a doubt steadily evolving into profoundly more complex and dynamic systems. The user demands are progressively rampant, while application requirements continue to expand in both range and diversity. Future wireless networks, therefore, must be equipped with the ability to handle numerous, albeit challenging requirements. Network reconfiguration, considered as a prominent network paradigm, is envisioned to play a key role in leveraging future network performance and considerably advancing current user experiences. This paper presents a comprehensive overview of reconfigurable wireless networks and an in-depth analysis of reconfiguration at all layers of the protocol stack. Such networks characteristically possess the ability to reconfigure and adapt their hardware and software components and architectures, thus enabling flexible delivery of broad services, as well as sustaining robust operation under highly dynamic conditions. The paper offers a unifying framework for research in reconfigurable wireless networks. This should provide the reader with a holistic view of concepts, methods, and strategies in reconfigurable wireless networks. Focus is given to reconfigurable systems in relatively new and emerging research areas such as cognitive radio networks, cross-layer reconfiguration and software-defined networks. In addition, modern networks have to be intelligent and capable of self-organization. Thus, this paper discusses the concept of network intelligence as a means to enable reconfiguration in highly complex and dynamic networks. Finally, the paper is supported with several examples and case studies showing the tremendous impact of reconfiguration on wireless networks.
[ { "version": "v1", "created": "Sun, 21 Sep 2014 15:58:49 GMT" } ]
2016-11-15T00:00:00
[ [ "El-Mougy", "Amr", "" ], [ "Ibnkahla", "Mohamed", "" ], [ "Hattab", "Ghaith", "" ], [ "Ejaz", "Waleed", "" ] ]
new_dataset
0.989612
1411.0076
Juei-Chin Shen
Juei-Chin Shen, Jun Zhang, and Khaled Ben Letaief
User Capacity of Pilot-Contaminated TDD Massive MIMO Systems
Accepted by IEEE GLOBECOM 2014, 6 pages, 3 figures
null
10.1109/GLOCOM.2014.7037385
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Pilot contamination has been regarded as a main limiting factor of time division duplexing (TDD) massive multiple-input-multiple-output (Massive MIMO) systems, as it will make the signal-to-interference-plus-noise ratio (SINR) saturated. However, how pilot contamination will limit the user capacity of downlink Massive MIMO, i.e., the maximum number of admissible users, has not been addressed. This paper provides an explicit expression of the Massive MIMO user capacity in the pilot-contaminated regime where the number of users is larger than the pilot sequence length. Furthermore, the scheme for achieving the user capacity, i.e., the uplink pilot training sequence and downlink power allocation, has been identified. By using this capacity-achieving scheme, the SINR requirement of each user can be satisfied and energy-efficient transmission is feasible in the large-antenna-size (LAS) regime. Comparison with two non-capacity-achieving schemes highlights the superiority of our proposed scheme in terms of achieving higher user capacity.
[ { "version": "v1", "created": "Sat, 1 Nov 2014 06:39:24 GMT" } ]
2016-11-15T00:00:00
[ [ "Shen", "Juei-Chin", "" ], [ "Zhang", "Jun", "" ], [ "Letaief", "Khaled Ben", "" ] ]
new_dataset
0.989259
1411.1280
Gokce Gorbil
Gokce Gorbil, Omer H. Abdelrahman, Mihajlo Pavloski and Erol Gelenbe
Storms in Mobile Networks
Submitted to the IEEE TETC special issue on "Emerging topics in Cyber Security"
null
10.1145/2642687.2642688
null
cs.NI cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Mobile networks are vulnerable to signalling attacks and storms that are caused by traffic patterns that overload the control plane, and differ from distributed denial of service (DDoS) attacks in the Internet since they directly attack the control plane, and also reserve wireless bandwidth without actually using it. Such attacks can result from malware and mobile botnets, as well as from poorly designed applications, and can cause service outages in 3G and 4G networks which have been experienced by mobile operators. Since the radio resource control (RRC) protocol in 3G and 4G networks is particularly susceptible to such attacks, we analyze their effect with a mathematical model that helps to predict the congestion that is caused by an attack. A detailed simulation model of a mobile network is used to better understand the temporal dynamics of user behavior and signalling in the network and to show how RRC based signalling attacks and storms cause significant problems in the control plane and the user plane of the network. Our analysis also serves to identify how storms can be detected, and to propose how system parameters can be chosen to mitigate their effect.
[ { "version": "v1", "created": "Wed, 5 Nov 2014 14:26:08 GMT" } ]
2016-11-15T00:00:00
[ [ "Gorbil", "Gokce", "" ], [ "Abdelrahman", "Omer H.", "" ], [ "Pavloski", "Mihajlo", "" ], [ "Gelenbe", "Erol", "" ] ]
new_dataset
0.999326
1411.2928
Pawe{\l} Rz\k{a}\.zewski
Valentin E. Brimkov, Konstanty Junosza-Szaniawski, Sean Kafer, Jan Kratochv\'il, Martin Pergel, Pawe{\l} Rz\k{a}\.zewski, Matthew Szczepankiewicz, Joshua Terhaar
Homothetic Polygons and Beyond: Intersection Graphs, Recognition, and Maximum Clique
null
null
null
null
cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study the {\sc Clique} problem in classes of intersection graphs of convex sets in the plane. The problem is known to be NP-complete in convex-set intersection graphs and straight-line-segment intersection graphs, but solvable in polynomial time in intersection graphs of homothetic triangles. We extend the latter result by showing that for every convex polygon $P$ with sides parallel to $k$ directions, every $n$-vertex graph which is an intersection graph of homothetic copies of $P$ contains at most $n^{k}$ inclusion-wise maximal cliques. We actually prove this result for a more general class of graphs, the so called $k_{\text{DIR}}-\text{CONV}$, which are intersection graphs of convex polygons whose sides are parallel to some fixed $k$ directions. Moreover, we provide some lower bounds on the numbers of maximal cliques, discuss the complexity of recognizing these classes of graphs and present a relationship with other classes of convex-set intersection graphs. Finally, we generalize the upper bound on the number of maximal cliques to intersection graphs of higher-dimensional convex polytopes in Euclidean space.
[ { "version": "v1", "created": "Tue, 11 Nov 2014 19:14:19 GMT" }, { "version": "v2", "created": "Mon, 14 Nov 2016 12:19:12 GMT" } ]
2016-11-15T00:00:00
[ [ "Brimkov", "Valentin E.", "" ], [ "Junosza-Szaniawski", "Konstanty", "" ], [ "Kafer", "Sean", "" ], [ "Kratochvíl", "Jan", "" ], [ "Pergel", "Martin", "" ], [ "Rzążewski", "Paweł", "" ], [ "Szczepankiewicz", "Matthew", "" ], [ "Terhaar", "Joshua", "" ] ]
new_dataset
0.99957
1411.3651
Irena Orovic Dr
Srdjan Stankovic, Irena Orovic, Ljubisa Stankovic
Polynomial Fourier Domain as a Domain of Signal Sparsity
submitted to IEEE Transactions of Signal Processing (10 pages, 11 Figures)
null
10.1016/j.sigpro.2016.07.015
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A compressive sensing (CS) reconstruction method for polynomial phase signals is proposed in this paper. It relies on the Polynomial Fourier transform, which is used to establish a relationship between the observation and sparsity domain. Polynomial phase signals are not sparse in commonly used domains such as Fourier or wavelet domain. Therefore, for polynomial phase signals standard CS algorithms applied in these transformation domains cannot provide satisfactory results. In that sense, the Polynomial Fourier transform is used to ensure sparsity. The proposed approach is generalized using time-frequency representations obtained by the Local Polynomial Fourier transform (LPFT). In particular, the first-order LPFT can produce linear time-frequency representation for chirps. It provides revealing signal local behavior, which leads to sparse representation. The theory is illustrated on examples.
[ { "version": "v1", "created": "Fri, 24 Oct 2014 13:58:33 GMT" }, { "version": "v2", "created": "Sun, 1 Mar 2015 16:17:40 GMT" } ]
2016-11-15T00:00:00
[ [ "Stankovic", "Srdjan", "" ], [ "Orovic", "Irena", "" ], [ "Stankovic", "Ljubisa", "" ] ]
new_dataset
0.95998
1411.6784
Jing Jiang
Minquan Cheng, Hung-Lin Fu, Jing Jiang, Yuan-Hsun Lo and Ying Miao
Codes with the Identifiable Parent Property for Multimedia Fingerprinting
7 pages, submitted to IEEE transction on information theory
null
10.1007/s10623-016-0203-x
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Let ${\cal C}$ be a $q$-ary code of length $n$ and size $M$, and ${\cal C}(i) = \{{\bf c}(i) \ | \ {\bf c}=({\bf c}(1), {\bf c}(2), \ldots, {\bf c}(n))^{T} \in {\cal C}\}$ be the set of $i$th coordinates of ${\cal C}$. The descendant code of a sub-code ${\cal C}^{'} \subseteq {\cal C}$ is defined to be ${\cal C}^{'}(1) \times {\cal C}^{'}(2) \times \cdots \times {\cal C}^{'}(n)$. In this paper, we introduce a multimedia analogue of codes with the identifiable parent property (IPP), called multimedia IPP codes or $t$-MIPPC$(n, M, q)$, so that given the descendant code of any sub-code ${\cal C}^{'}$ of a multimedia $t$-IPP code ${\cal C}$, one can always identify, as IPP codes do in the generic digital scenario, at least one codeword in ${\cal C}^{'}$. We first derive a general upper bound on the size $M$ of a multimedia $t$-IPP code, and then investigate multimedia $3$-IPP codes in more detail. We characterize a multimedia $3$-IPP code of length $2$ in terms of a bipartite graph and a generalized packing, respectively. By means of these combinatorial characterizations, we further derive a tight upper bound on the size of a multimedia $3$-IPP code of length $2$, and construct several infinite families of (asymptotically) optimal multimedia $3$-IPP codes of length $2$.
[ { "version": "v1", "created": "Tue, 25 Nov 2014 09:35:11 GMT" } ]
2016-11-15T00:00:00
[ [ "Cheng", "Minquan", "" ], [ "Fu", "Hung-Lin", "" ], [ "Jiang", "Jing", "" ], [ "Lo", "Yuan-Hsun", "" ], [ "Miao", "Ying", "" ] ]
new_dataset
0.972415
1503.04254
Sheng Zhou
Sheng Zhou, Jie Gong, Zhenyu Zhou, Wei Chen, Zhisheng Niu
GreenDelivery: Proactive Content Caching and Push with Energy-Harvesting-based Small Cells
15 pages, 5 figures, accepted by IEEE Communications Magazine
null
10.1109/MCOM.2015.7081087
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The explosive growth of mobile multimedia traffic calls for scalable wireless access with high quality of service and low energy cost. Motivated by the emerging energy harvesting communications, and the trend of caching multimedia contents at the access edge and user terminals, we propose a paradigm-shift framework, namely GreenDelivery, enabling efficient content delivery with energy harvesting based small cells. To resolve the two-dimensional randomness of energy harvesting and content request arrivals, proactive caching and push are jointly optimized, with respect to the content popularity distribution and battery states. We thus develop a novel way of understanding the interplay between content and energy over time and space. Case studies are provided to show the substantial reduction of macro BS activities, and thus the related energy consumption from the power grid is reduced. Research issues of the proposed GreenDelivery framework are also discussed.
[ { "version": "v1", "created": "Sat, 14 Mar 2015 01:30:52 GMT" }, { "version": "v2", "created": "Sun, 22 Mar 2015 06:02:47 GMT" } ]
2016-11-15T00:00:00
[ [ "Zhou", "Sheng", "" ], [ "Gong", "Jie", "" ], [ "Zhou", "Zhenyu", "" ], [ "Chen", "Wei", "" ], [ "Niu", "Zhisheng", "" ] ]
new_dataset
0.993749
1503.05365
Bhanukiran Perabathini
Bhanukiran Perabathini, Ejder Ba\c{s}tu\u{g}, Marios Kountouris, M\'erouane Debbah and Alberto Conte
Caching at the Edge: a Green Perspective for 5G Networks
to be presented at IEEE International Conference on Communications (ICC), London, UK, 2015
null
10.1109/ICCW.2015.7247608
null
cs.IT cs.NI math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Endowed with context-awareness and proactive capabilities, caching users' content locally at the edge of the network is able to cope with increasing data traffic demand in 5G wireless networks. In this work, we focus on the energy consumption aspects of cache-enabled wireless cellular networks, specifically in terms of area power consumption (APC) and energy efficiency (EE). We assume that both base stations (BSs) and mobile users are distributed according to homogeneous Poisson point processes (PPPs) and we introduce a detailed power model that takes into account caching. We study the conditions under which the area power consumption is minimized with respect to BS transmit power, while ensuring a certain quality of service (QoS) in terms of coverage probability. Furthermore, we provide the optimal BS transmit power that maximizes the area spectral efficiency per unit total power spent. The main takeaway of this paper is that caching seems to be an energy efficient solution.
[ { "version": "v1", "created": "Wed, 18 Mar 2015 12:17:12 GMT" } ]
2016-11-15T00:00:00
[ [ "Perabathini", "Bhanukiran", "" ], [ "Baştuğ", "Ejder", "" ], [ "Kountouris", "Marios", "" ], [ "Debbah", "Mérouane", "" ], [ "Conte", "Alberto", "" ] ]
new_dataset
0.994449
1503.07372
Martina Cardone
Martina Cardone, Daniela Tuninetti, Raymond Knopp
The Two-user Causal Cognitive Interference Channel: Novel Outer Bounds and Constant Gap Result for the Symmetric Gaussian Noise Channel in Weak Interference
Submitted to IEEE Transactions on Information Theory
null
10.1109/TIT.2016.2584619
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper studies the two-user Causal Cognitive Interference Channel (CCIC), where two transmitters aim to communicate independent messages to two different receivers via a common channel. One source, referred to as the cognitive, is capable of overhearing the other source, referred to as the primary, through a noisy in-band link and thus can assist in sending the primary's data. Two novel outer bounds of the type $2R_p+R_c$ and $R_p+2R_c$ are derived for the class of injective semi-deterministic CCICs where the noises at the different source-destination pairs are independent. An achievable rate region is derived based on Gelfand-Pinsker binning, superposition coding and simultaneous decoding at the receivers. The lower and outer bounds are then specialized to the practically relevant Gaussian noise case. The authors of this paper recently characterized to within a constant gap the capacity of the symmetric Gaussian CCIC in (a) the strong interference regime, and (b) for a subset of the weak interference regime when the cooperation link is larger than a given threshold. This work characterizes to within a constant gap the capacity for the symmetric Gaussian CCIC in the regime that was still open. In particular, it is shown that the novel outer bounds are necessary to characterize the capacity to within a constant gap when the cooperation link is weaker than the direct links, that is, in this regime unilateral cooperation leaves some system resources underutilized.
[ { "version": "v1", "created": "Wed, 25 Mar 2015 13:42:45 GMT" } ]
2016-11-15T00:00:00
[ [ "Cardone", "Martina", "" ], [ "Tuninetti", "Daniela", "" ], [ "Knopp", "Raymond", "" ] ]
new_dataset
0.974251
1503.08479
Lex Fridman
Lex Fridman, Steven Weber, Rachel Greenstadt, Moshe Kam
Active Authentication on Mobile Devices via Stylometry, Application Usage, Web Browsing, and GPS Location
Accepted for Publication in the IEEE Systems Journal
null
10.1109/JSYST.2015.2472579
null
cs.CR stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Active authentication is the problem of continuously verifying the identity of a person based on behavioral aspects of their interaction with a computing device. In this study, we collect and analyze behavioral biometrics data from 200subjects, each using their personal Android mobile device for a period of at least 30 days. This dataset is novel in the context of active authentication due to its size, duration, number of modalities, and absence of restrictions on tracked activity. The geographical colocation of the subjects in the study is representative of a large closed-world environment such as an organization where the unauthorized user of a device is likely to be an insider threat: coming from within the organization. We consider four biometric modalities: (1) text entered via soft keyboard, (2) applications used, (3) websites visited, and (4) physical location of the device as determined from GPS (when outdoors) or WiFi (when indoors). We implement and test a classifier for each modality and organize the classifiers as a parallel binary decision fusion architecture. We are able to characterize the performance of the system with respect to intruder detection time and to quantify the contribution of each modality to the overall performance.
[ { "version": "v1", "created": "Sun, 29 Mar 2015 18:59:23 GMT" } ]
2016-11-15T00:00:00
[ [ "Fridman", "Lex", "" ], [ "Weber", "Steven", "" ], [ "Greenstadt", "Rachel", "" ], [ "Kam", "Moshe", "" ] ]
new_dataset
0.99962
1505.00080
Mohammadali Mohammadi
Mohammadali Mohammadi, Himal A. Suraweera, Gan Zheng, Caijun Zhong, Ioannis Krikidis
Full-Duplex MIMO Relaying Powered by Wireless Energy Transfer
Accepted for IEEE International Workshop on Signal Processing Advances in Wireless Communications (SPAWC 2015), Invited paper
null
10.1109/SPAWC.2015.7227047
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider a full-duplex decode-and-forward system, where the wirelessly powered relay employs the time-switching protocol to receive power from the source and then transmit information to the destination. It is assumed that the relay node is equipped with two sets of antennas to enable full-duplex communications. Three different interference mitigation schemes are studied, namely, 1) optimal 2) zero-forcing and 3) maximum ratio combining/maximum ratio transmission. We develop new outage probability expressions to investigate delay-constrained transmission throughput of these schemes. Our analysis show interesting performance comparisons of the considered precoding schemes for different system and link parameters.
[ { "version": "v1", "created": "Fri, 1 May 2015 03:32:59 GMT" } ]
2016-11-15T00:00:00
[ [ "Mohammadi", "Mohammadali", "" ], [ "Suraweera", "Himal A.", "" ], [ "Zheng", "Gan", "" ], [ "Zhong", "Caijun", "" ], [ "Krikidis", "Ioannis", "" ] ]
new_dataset
0.975092
1507.01053
KyungHyun Cho
Kyunghyun Cho, Aaron Courville, Yoshua Bengio
Describing Multimedia Content using Attention-based Encoder--Decoder Networks
Submitted to IEEE Transactions on Multimedia Special Issue on Deep Learning for Multimedia Computing
null
10.1109/TMM.2015.2477044
null
cs.NE cs.CL cs.CV cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Whereas deep neural networks were first mostly used for classification tasks, they are rapidly expanding in the realm of structured output problems, where the observed target is composed of multiple random variables that have a rich joint distribution, given the input. We focus in this paper on the case where the input also has a rich structure and the input and output structures are somehow related. We describe systems that learn to attend to different places in the input, for each element of the output, for a variety of tasks: machine translation, image caption generation, video clip description and speech recognition. All these systems are based on a shared set of building blocks: gated recurrent neural networks and convolutional neural networks, along with trained attention mechanisms. We report on experimental results with these systems, showing impressively good performance and the advantage of the attention mechanism.
[ { "version": "v1", "created": "Sat, 4 Jul 2015 01:06:16 GMT" } ]
2016-11-15T00:00:00
[ [ "Cho", "Kyunghyun", "" ], [ "Courville", "Aaron", "" ], [ "Bengio", "Yoshua", "" ] ]
new_dataset
0.958189
1507.04204
Linglong Dai
Xudong Zhu, Zhaocheng Wang, Linglong Dai, and Chen Qian
Smart Pilot Assignment for Massive MIMO
4 pages, 3 figures
IEEE Communications Letters, vol. 19 , no. 8, Aug. 2015
10.1109/LCOMM.2015.2409176
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A massive multiple-input multiple-output (MIMO) system, which utilizes a large number of antennas at the base station (BS) to serve multiple users, suffers from pilot contamination due to inter-cell interference. A smart pilot assignment (SPA) scheme is proposed in this letter to improve the performance of users with severe pilot contamination. Specifically, by exploiting the large-scale characteristics of fading channels, the BS firstly measures the inter-cell interference of each pilot sequence caused by the users with the same pilot sequence in other adjacent cells. Then, in contrast to the conventional schemes which assign the pilot sequences to the users randomly, the proposed SPA method assigns the pilot sequence with the smallest inter-cell interference to the user having the worst channel quality in a sequential way to improve its performance. Simulation results verify the performance gain of the proposed scheme in typical massive MIMO systems.
[ { "version": "v1", "created": "Wed, 15 Jul 2015 13:21:09 GMT" } ]
2016-11-15T00:00:00
[ [ "Zhu", "Xudong", "" ], [ "Wang", "Zhaocheng", "" ], [ "Dai", "Linglong", "" ], [ "Qian", "Chen", "" ] ]
new_dataset
0.976057
1508.06218
Mina Taheri
Nirwan Ansari, Tao Han, and Mina Taheri
GATE: Greening At The Edge
7 Pages, 12 Figures, Submitted to IEEE Wireless Communications
null
10.1109/MWC.2016.7462486
null
cs.NI
http://creativecommons.org/publicdomain/zero/1.0/
Dramatic data traffic growth, especially wireless data, is driving a significant surge in energy consumption in the last mile access of the telecommunications infrastructure. The growing energy consumption not only escalates the operators' operational expenditures (OPEX) but also leads to a significant rise of carbon footprints. Therefore, enhancing the energy efficiency of broadband access networks is becoming a necessity to bolster social, environmental, and economic sustainability. This article provides an overview on the design and optimization of energy efficient broadband access networks, analyzes the energy efficient design of passive optical networks, discusses the enabling technologies for next generation broadband wireless access networks, and elicits the emerging technologies for enhancing the energy efficiency of the last mile access of the network infrastructure.
[ { "version": "v1", "created": "Mon, 24 Aug 2015 18:31:54 GMT" }, { "version": "v2", "created": "Mon, 14 Sep 2015 17:23:48 GMT" } ]
2016-11-15T00:00:00
[ [ "Ansari", "Nirwan", "" ], [ "Han", "Tao", "" ], [ "Taheri", "Mina", "" ] ]
new_dataset
0.988617