Information Theory
New submissions
[ showing up to 2000 entries per page: fewer  more ]
New submissions for Tue, 19 Oct 21
 [1] arXiv:2110.08317 [pdf, ps, other]

Title: Coverage Probability of DoubleIRS Assisted Communication SystemsComments: accepted in IEEE Wireless Communications LettersSubjects: Information Theory (cs.IT)
In this paper, we focus on the coverage probability of a doubleintelligent reflecting surface (IRS) assisted wireless network and study the impact of multiplicative beamforming gain and correlated Rayleigh fading. In particular, we obtain a novel closedform expression of the coverage probability of a singleinput singleoutput (SISO) system assisted by two large IRSs while being dependent on the corresponding arbitrary reflecting beamforming matrices (RBMs) and largescale statistics in terms of correlation matrices. Taking advantage of the largescale statistics, i.e., statistical channel state information (CSI), we perform optimization of the RBMs of both IRSs once per several coherence intervals rather than at each interval. Hence, we achieve a reduction of the computational complexity, otherwise increased in multiIRSassisted networks during their RBM optimization. Numerical results validate the analytical expressions even for small IRSs, confirm enhanced performance over the conventional singleIRS counterpart, and reveal insightful properties.
 [2] arXiv:2110.08513 [pdf, other]

Title: Deep Reinforcement Learning for Practical Phase Shift Optimization in RISaided MISO URLLC SystemsComments: This work has been submitted to the IEEE for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessibleSubjects: Information Theory (cs.IT)
Reconfigurable intelligent surfaces (RISs) can assist the wireless systems in providing reliable and lowlatency links to realize the requirements in Industry 4.0. In this paper, the practical phase shift optimization in a RISaided ultrareliable and lowlatency communication (URLLC) system at a factory setting is performed by applying a novel deep reinforcement learning (DRL) algorithm named as twindelayed deep deterministic policy gradient (TD3). First, the system achievable rate in finite blocklength (FBL) regime is identified for each actuator then, the problem is formulated where the objective is to maximize the total achievable FBL rate, subject to nonlinear amplitude response and the phase shift values constraint. Since the amplitude response equality constraint is highly nonconvex and nonlinear, we employ the TD3 to tackle the problem. The considered method relies on interacting RIS with industrial scenario by taking actions which are the phase shifts at the RIS elements, to maximize the total FBL rate. We assess the performance loss of the system when the RIS is nonideal, i.e., nonlinear amplitude response with/without phase quantization and compare it with ideal RIS. The numerical results show that optimizing phase shifts in nonideal RIS via the considered TD3 method is highly beneficial to improve the performance.
 [3] arXiv:2110.08704 [pdf, other]

Title: A QLearningbased Approach for Distributed Beam Scheduling in mmWave NetworksComments: 10 pagesSubjects: Information Theory (cs.IT); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
We consider the problem of distributed downlink beam scheduling and power allocation for millimeterWave (mmWave) cellular networks where multiple base stations (BSs) belonging to different service operators share the same unlicensed spectrum with no central coordination or cooperation among them. Our goal is to design efficient distributed beam scheduling and power allocation algorithms such that the networklevel payoff, defined as the weighted sum of the total throughput and a power penalization term, can be maximized. To this end, we propose a distributed scheduling approach to power allocation and adaptation for efficient interference management over the shared spectrum by modeling each BS as an independent Qlearning agent. As a baseline, we compare the proposed approach to the stateoftheart noncooperative gamebased approach which was previously developed for the same problem. We conduct extensive experiments under various scenarios to verify the effect of multiple factors on the performance of both approaches. Experiment results show that the proposed approach adapts well to different interference situations by learning from experience and can achieve higher payoff than the gamebased approach. The proposed approach can also be integrated into our previously developed Lyapunov stochastic optimization framework for the purpose of network utility maximization with optimality guarantee. As a result, the weights in the payoff function can be automatically and optimally determined by the virtual queue values from the subproblems derived from the Lyapunov optimization framework.
 [4] arXiv:2110.08707 [pdf, other]

Title: Novel SecretKeyAssisted Schemes for Secure MISOMEOFDM SystemsSubjects: Information Theory (cs.IT); Signal Processing (eess.SP)
We propose a new secure transmission scheme for uplink multipleinput singleoutput (MISO) orthogonalfrequency multiplexing (OFDM) systems in the presence of multiple eavesdroppers. Our proposed scheme utilizes the subchannels orthogonality of OFDM systems to simultaneously transmit data and secret key symbols. The base station, Bob, shares secret key symbols with the legitimate user, Alice, using wiretap coding over a portion of the subchannels. Concurrently, Alice uses the accumulated secret keys in her secretkey queue to encrypt data symbols using a one time pad (OTP) cipher and transmits them to Bob over the remaining subchannels. if Alice did not accumulate sufficient keys in her secretkey queue, she employs wiretap coding to secure her data transmissions. We propose fixed and dynamic subchannel allocation schemes to divide the subchannels between data and secret keys. We derive the secrecy outage probability (SOP) and the secure throughput for the proposed scheme. We quantify the system's security under practical nonGaussian transmissions where discrete signal constellation points are transmitted by the legitimate source nodes. Numerical results validate our theoretical findings and quantify the impact of different system design parameters.
 [5] arXiv:2110.08716 [pdf, ps, other]

Title: Multifractal of mass functionSubjects: Information Theory (cs.IT)
Multifractal plays an important role in many fields. However, there is few attentions about mass function, which can better deal with uncertain information than probability. In this paper, we proposed multifractal of mass function. Firstly, the definition of multifractal spectrum of mass function is given. Secondly, the multifractal dimension of mass function is defined as $D_{\alpha}$. When mass function degenerates to probability distribution, $D_{\alpha}$ degenerates to $d_{\alpha}$, which is information dimension proposed by Renyi. One interesting property is that the multifractal dimension of mass function with maximum Deng entropy is 1.585 no matter the order. Other interesting properties and numerical examples are shown to illustrate proposed model.
 [6] arXiv:2110.08746 [pdf, ps, other]

Title: Spectral Efficiency of OTFS Based Orthogonal Multiple Access with Rectangular PulsesComments: This work has been submitted to the IEEE for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessibleSubjects: Information Theory (cs.IT); Signal Processing (eess.SP)
In this paper we consider Orthogonal Time Frequency Space (OTFS) modulation based multipleaccess (MA). We specifically consider Orthogonal MA methods (OMA) where the user terminals (UTs) are allocated nonoverlapping physical resource in the delayDoppler (DD) and/or timefrequency (TF) domain. To the best of our knowledge, in prior literature, the performance of OMA methods have been reported only for ideal transmit and receive pulses. In [20] and [21], OMA methods were proposed which were shown to achieve multiuser interference (MUI) free communication with ideal pulses. Since ideal pulses are not realizable, in this paper we study the spectral efficiency (SE) performance of these OMA methods with practical rectangular pulses. For these OMA methods, we derive the expression for the received DD domain symbols at the base station (BS) receiver and the effective DD domain channel matrix when rectangular pulses are used. We then derive the expression for the achievable sum SE. These expressions are also derived for another well known OMA method where guard bands (GB) are used to reduce MUI (called as the GB based MA methods) [19]. Through simulations, we observe that with rectangular pulses the sum SE achieved by the method in [21] is almost invariant of the Doppler shift and is higher than that achieved by the methods in [19], [20] at practical values of the received signaltonoise ratio.
 [7] arXiv:2110.08768 [pdf, other]

Title: A Framework of MahalanobisDistance Metric with Supervised Learning for Clustering Multipath Components in MIMO Channel AnalysisComments: 13 pagesSubjects: Information Theory (cs.IT); Signal Processing (eess.SP)
As multipath components (MPCs) are experimentally observed to appear in clusters, clusterbased channel models have been focused in the wireless channel study. However, most of the MPC clustering algorithms for MIMO channels with delay and angle information of MPCs are based on the distance metric that quantifies the similarity of two MPCs and determines the preferred cluster shape, greatly impacting MPC clustering quality. In this paper, a general framework of Mahalanobisdistance metric is proposed for MPC clustering in MIMO channel analysis, without userspecified parameters. Remarkably, the popular multipath component distance (MCD) is proved to be a special case of the proposed distance metric framework. Furthermore, two machine learning algorithms, namely, weaksupervised Mahalanobis metric for clustering and supervised large margin nearest neighbor, are introduced to learn the distance metric. To evaluate the effectiveness, a modified channel model is proposed based on the 3GPP spatial channel model to generate clustered MPCs with delay and angular information, since the original 3GPP spatial channel model (SCM) is incapable to evaluate clustering quality. Experiment results show that the proposed distance metric can significantly improve the clustering quality of existing clustering algorithms, while the learning phase requires considerably limited efforts of labeling MPCs.
 [8] arXiv:2110.08865 [pdf, other]

Title: System Outage Probability and Diversity Analysis of SWIPT Enabled TwoWay DF Relaying under Hardware ImpairmentsComments: This paper has been accepted by China CommunicationsSubjects: Information Theory (cs.IT)
This paper investigates the system outage performance of a simultaneous wireless information and power transfer (SWIPT) based twoway decodeandforward (DF) relay network, where potential hardware impairments (HIs) in all transceivers are considered. After harvesting energy and decoding messages simultaneously via a power splitting scheme, the energylimited relay node forwards the decoded information to both terminals. Each terminal combines the signals from the direct and relaying links via selection combining. We derive the system outage probability under independent but nonidentically distributed Nakagamim fading channels. It reveals an overall system ceiling (OSC) effect, i.e., the system falls in outage if the target rate exceeds an OSC threshold that is determined by the levels of HIs. Furthermore, we derive the diversity gain of the considered network. The result reveals that when the transmission rate is below the OSC threshold, the achieved diversity gain equals the sum of the shape parameter of the direct link and the smaller shape parameter of the terminaltorelay links; otherwise, the diversity gain is zero. This is different from the amplifyandforward (AF) strategy, under which the relaying links have no contribution to the diversity gain. Simulation results validate the analytical results and reveal that compared with the AF strategy, the SWIPT based twoway relaying links under the DF strategy are more robust to HIs and achieve a lower system outage probability.
 [9] arXiv:2110.08964 [pdf, ps, other]

Title: Affine Hermitian Grassmann CodesSubjects: Information Theory (cs.IT); Algebraic Geometry (math.AG)
The Grassmannian is an important object in Algebraic Geometry. One of the many techniques used to study the Grassmannian is to build a vector space from its points in the projective embedding and study the properties of the resulting linear code.
We introduce a new class of linear codes, called Affine Hermitian Grassman Codes. These codes are the linear codes resulting from an affine part of the projection of the Polar Hermitian Grassmann codes. They combine Polar Hermitian Grassmann codes and Affine Grassmann codes. We will determine the parameters of these codes and discuss their minimum distance codewords.  [10] arXiv:2110.08980 [pdf, other]

Title: Location Information Assisted Beamforming Design for Reconfigurable Intelligent Surface Aided Communication SystemsComments: 13 pages, 8 figures. This work has been submitted to the IEEE for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessibleSubjects: Information Theory (cs.IT); Signal Processing (eess.SP)
In reconfigurable intelligent surface (RIS) aided millimeterwave (mmWave) communication systems, in order to overcome the limitation of the conventional channel state information (CSI) acquisition techniques, this paper proposes a location information assisted beamforming design without the requirement of the conventional channel training process. First, we establish the geometrical relation between the channel model and the user location, based on which we derive an approximate CSI error bound based on the user location error by means of Taylor approximation, triangle and power mean inequalities, and semidefinite relaxation (SDR). Second, for combating the uncertainty of the location error, we formulate a worstcase robust beamforming optimization problem. To solve the problem efficiently, we develop a novel iterative algorithm by utilizing various optimization tools such as Lagrange multiplier, matrix inversion lemma, SDR, as well as branchandbound (BnB). Particularly, the BnB algorithm is modified to acquire the phase shift solution under an arbitrary constraint of possible phase shift values. Finally, we analyse the algorithm complexity, and carry out simulations to validate the theoretical derivation of the CSI error bound and the robustness of the proposed algorithm. Compared with the existing nonrobust approach and the robust beamforming techniques based on Sprocedure and penalty convexconcave procedure (CCP), our method converges faster and achieves better performance in terms of the worstcase signaltonoise ratio (SNR) at the receiver.
 [11] arXiv:2110.09001 [pdf, ps, other]

Title: Deep LearningBased Power Control for Uplink CellFree Massive MIMO SystemsComments: 6 pages, 6 figures, accepted by IEEE Globecom 2021Subjects: Information Theory (cs.IT); Machine Learning (cs.LG); Signal Processing (eess.SP)
In this paper, a general framework for deep learningbased power control methods for maxmin, maxproduct and maxsumrate optimization in uplink cellfree massive multipleinput multipleoutput (CF mMIMO) systems is proposed. Instead of using supervised learning, the proposed method relies on unsupervised learning, in which optimal power allocations are not required to be known, and thus has low training complexity. More specifically, a deep neural network (DNN) is trained to learn the map between fading coefficients and power coefficients within short time and with low computational complexity. It is interesting to note that the spectral efficiency of CF mMIMO systems with the proposed method outperforms previous optimization methods for maxmin optimization and fits well for both maxsumrate and maxproduct optimizations.
 [12] arXiv:2110.09089 [pdf, ps, other]

Title: DNA Codes over the Ring $\mathbb{Z}_4 + w\mathbb{Z}_4$Comments: 32 pagesSubjects: Information Theory (cs.IT); Emerging Technologies (cs.ET); Rings and Algebras (math.RA)
In this present work, we generalize the study of construction of DNA codes over the rings $\mathcal{R}_\theta=\mathbb{Z}_4+w\mathbb{Z}_4$, $w^2 = \theta $ for $\theta \in \mathbb{Z}_4+w\mathbb{Z}_4$. Rigorous study along with characterization of the ring structures is presented. We extend the Gau map and Gau distance, defined in \cite{DKBG}, over all the $16$ rings $\mathcal{R}_\theta$. Furthermore, an isometry between the codes over the rings $\mathcal{R}_\theta$ and the analogous DNA codes is established in general. Brief study of dual and self dual codes over the rings is given including the construction of special class of self dual codes that satisfy reverse and reversecomplement constraints. The technical contributions of this paper are twofold. Considering the Generalized Gau distance, Sphere Packinglike bound, GVlike bound, Singleton like bound and Plotkinlike bound are established over the rings $\mathcal{R}_\theta$. In addition to this, optimal class of codes are provided with respect to Singletonlike bound and Plotkinlike bound. Moreover, the construction of family of DNA codes is proposed that satisfies reverse and reversecomplement constraints using the ReedMuller type codes over the rings $\mathcal{R}_\theta$.
 [13] arXiv:2110.09123 [pdf, other]

Title: Joint Spatial Division and Coaxial Multiplexing for Downlink MultiUser OAM Wireless BackhaulSubjects: Information Theory (cs.IT); Signal Processing (eess.SP)
Orbital angular momentum (OAM) at radio frequency (RF) provides a novel approach of multiplexing a set of orthogonal modes on the same frequency channel to achieve high spectral efficiencies (SEs). However, the existing research on OAM wireless communications is mainly focused on pointtopoint transmission in the lineofsight (LoS) scenario. In this paper, we propose an overall scheme of the downlink multiuser OAM (MUOAM) wireless backhaul based on uniform circular arrays (UCAs) for broadcasting networks, which can achieve the joint spatial division and coaxial multiplexing (JSDCM). A salient feature of the proposed downlink MUOAM wireless backhaul systems is that the channel matrices are completely characterized by the position of each small base station (SBS), independent of the numbers of subcarriers and antennas, which avoids estimating large channel matrices required by the traditional downlink multiuser multipleinput multipleoutput (MUMIMO) wireless backhaul systems. Thereafter, we propose an OAMbased multiuser distance and angle of arrival (AoA) estimation method, which is able to simultaneously estimate the positions of multiple SBSs with a flexible number of training symbols. With the estimated distances and AoAs, a MUOAM preprocessing scheme is applied to eliminate the comode and intermode interferences in the downlink MUOAM channel. At last, the proposed methods are extended to the downlink MUOAMMIMO wireless backhaul system equipped with uniform concentric circular arrays (UCCAs), for which much higher spectral efficiency (SE) and energy efficiency (EE) than traditional MUMIMO systems can be achieved. Both mathematical analysis and simulation results validate that the proposed scheme can effectively eliminate both interferences of the practical downlink MUOAM channel and approaches the performance of the ideal MUOAM channel.
 [14] arXiv:2110.09215 [pdf, other]

Title: A Primer on the Statistical Relation between Wireless UltraReliability and Location EstimationComments: 5 pages and 4 figures. Has been submitted in IEEE Wireless Communication LettersSubjects: Information Theory (cs.IT); Signal Processing (eess.SP)
This letter statistically characterizes the impact of location estimation uncertainty in the wireless communication reliability, in which location information is used as a proxy to choose the rate. First, a Cram\'erRao bound for the localization error is derived. Then, through a simplified setup, we show that the reliability  characterized by how likely the outage probability is to be above a target threshold  can be sensitive to location errors, especially when the channel statistics are also sensitive to the location. Finally, we highlight the difficulty of choosing a rate that both meets target reliability and accounts for the location uncertainty, and that the most direct solutions suffer from being too conservative.
 [15] arXiv:2110.09244 [pdf, other]

Title: The search of Type I codesSubjects: Information Theory (cs.IT); Mathematical Software (cs.MS)
A selfdual binary linear code is called Type I code if it has singlyeven codewords, i.e.~it has codewords with weight divisible by $2.$ The purpose of this paper is to investigate interesting properties of Type I codes of different lengths. Further, we build up a computerbased codesearching program based on our knowledge about Type I codes. Some computation results achieved by this program are given.
 [16] arXiv:2110.09291 [pdf, ps, other]

Title: Reconfigurable Intelligent SurfaceEnhanced OFDM Communications via Delay Adjustable MetasurfaceSubjects: Information Theory (cs.IT); Signal Processing (eess.SP)
Reconfigurable intelligent surface (RIS) is a promising technology for establishing spectral and energyefficient wireless networks. In this paper, we study RISenhanced orthogonal frequency division multiplexing (OFDM) communications, which generalize the existing RISdriven context focusing only on frequencyflat channels. Firstly, we introduce the delay adjustable metasurface (DAM) relying on varactor diodes. In contrast to existing reflecting elements, each one in DAM is capable of storing and retrieving the impinging electromagnetic waves upon dynamically controlling its electromagnetically induced transparency (EIT) properties, thus additionally imposing an extra delay onto the reflected incident signals. Secondly, we formulate the ratemaximization problem by jointly optimizing the transmit power allocation and the RIS reflection coefficients as well as the RIS delays. Furthermore, to address the coupling among optimization variables, we propose an efficient algorithm to achieve a highquality solution for the formulated nonconvex design problem by alternately optimizing the transmit power allocation and the RIS reflection pattern, including the reflection coefficients and the delays. Thirdly, to circumvent the high complexity for optimizing the RIS reflection coefficients, we conceive a lowcomplexity scheme upon aligning the strongest taps of all reflected channels, while ensuring that the maximum delay spread after introducing extra RIS delays does not exceed the length of the cyclic prefix (CP). Finally, simulation results demonstrate that the proposed design significantly improves the OFDM rate performance as well as the RIS's adaptability to wideband signals compared to baseline schemes without employing DAM.
 [17] arXiv:2110.09405 [pdf, ps, other]

Title: Capacity Region Bounds for the K user Dispersive Nonlinear Optical WDM Channel with Peak Power ConstraintsSubjects: Information Theory (cs.IT)
It is known that fiber nonlinearities induce crosstalk in a wavelength division multiplexed (WDM) system, which limits the capacity of such systems especially at higher signal powers. Traditionally, the channel capacity of a single WDM user is analyzed under different assumptions for the transmitted signals of the other users. In this paper, we instead take a multiuser information theoretic view of an optical WDM channel impaired by crossphase modulation and dispersion as an interference channel. We characterize, for the first time, an outer bound on the capacity region of simultaneously achievable rate pairs, assuming a general Kuser perturbative channel model using genieaided techniques. Furthermore, an achievable rate region is obtained by timesharing between certain singleuser strategies, and it is shown that the latter can achieve better rate tuples compared to treating nonlinear interference as noise.
Crosslists for Tue, 19 Oct 21
 [18] arXiv:2110.08252 (crosslist from cs.LG) [pdf, other]

Title: A RateDistortion Framework for Explaining Blackbox Model DecisionsSubjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Information Theory (cs.IT)
We present the RateDistortion Explanation (RDE) framework, a mathematically wellfounded method for explaining blackbox model decisions. The framework is based on perturbations of the target input signal and applies to any differentiable pretrained model such as neural networks. Our experiments demonstrate the framework's adaptability to diverse data modalities, particularly images, audio, and physical simulations of urban environments.
 [19] arXiv:2110.08414 (crosslist from quantph) [pdf, ps, other]

Title: Quantum Error Correction with Reflexive Stabilizer Codes and Cayley GraphsComments: 19 pagesSubjects: Quantum Physics (quantph); Information Theory (cs.IT); Mathematical Physics (mathph)
Long distance communication of digital data, whether through a physical medium or a broadcast signal, is often subjected to noise. To deliver data reliably through noisy communication channels, one must use codes that can detect and correct the particular noise of the channel. For transmission of classical data, error correcting schemes can be as simple as the sending of replicates. For quantum data, and in tandem the development of machines that can process quantum data, quantum error correcting codes must be developed. In addition to a larger set of possible errors, quantum error correcting schemes must contend with other peculiarities of quantum mechanics, such as the nocloning theorem which can prevent the sending of replicate messages. Stabilizer codes are one family of quantum error correcting codes which can protect and correct errors expressed in terms of the Pauli group, exploiting its group structure and utilizing classical codes and the corresponding duals. We develop and examine a family of quantum stabilizer codes which arise from reflexive stabilizers. Moreover, we provide a mapping from our reflexive stabilizer codes to the wellknown CSS codes developed by Calderbank, Shor, and Steane. For the case of a 4state system we show that these codes can obtain the minimal embedding for code which can correct any flip or phase error. We also provide heuristic algorithms for creating reflexive stabilizer codes starting from the noise of a quantum channel. Furthermore, we show that the problem can be posed in terms of finding maximal Cayley subgraphs with restrictions imposed by the set of potential errors.
 [20] arXiv:2110.08627 (crosslist from cs.LG) [pdf, other]

Title: On the Pareto Frontier of Regret Minimization and Best Arm Identification in Stochastic BanditsComments: 27 pages, 8 figuresSubjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Information Theory (cs.IT); Machine Learning (stat.ML)
We study the Pareto frontier of two archetypal objectives in stochastic bandits, namely, regret minimization (RM) and best arm identification (BAI) with a fixed horizon. It is folklore that the balance between exploitation and exploration is crucial for both RM and BAI, but exploration is more critical in achieving the optimal performance for the latter objective. To make this precise, we first design and analyze the BoBWlil'UCB$({\gamma})$ algorithm, which achieves orderwise optimal performance for RM or BAI under different values of ${\gamma}$. Complementarily, we show that no algorithm can simultaneously perform optimally for both the RM and BAI objectives. More precisely, we establish nontrivial lower bounds on the regret achievable by any algorithm with a given BAI failure probability. This analysis shows that in some regimes BoBWlil'UCB$({\gamma})$ achieves Paretooptimality up to constant or small terms. Numerical experiments further demonstrate that when applied to difficult instances, BoBWlil'UCB outperforms a close competitor UCB$_{\alpha}$ (Degenne et al., 2019), which is designed for RM and BAI with a fixed confidence.
 [21] arXiv:2110.08673 (crosslist from cs.CR) [pdf, other]

Title: Scaling Blockchains: Can Elected Committees Help?Subjects: Cryptography and Security (cs.CR); Computer Science and Game Theory (cs.GT); Information Theory (cs.IT); General Economics (econ.GN); Trading and Market Microstructure (qfin.TR)
In the highstakes race to develop more scalable blockchains, some platforms (Cosmos, EOS, TRON, etc.) have adopted committeebased consensus protocols, whereby the blockchain's recordkeeping rights are entrusted to a committee of elected block producers. In theory, the smaller the committee, the faster the blockchain can reach consensus and the more it can scale. What's less clear, is whether this mechanism ensures that honest committees can be consistently elected, given voters typically have limited information. Using EOS' Delegated Proof of Stake (DPoS) protocol as a backdrop, we show that identifying the optimal voting strategy is complex and practically out of reach. We empirically characterize some simpler (suboptimal) voting strategies that token holders resort to in practice and show that these nonetheless converge to optimality, exponentially quickly. This yields efficiency gains over other PoS protocols that rely on randomized block producer selection. Our results suggest that (elected) committeebased consensus, as implemented in DPoS, can be robust and efficient, despite its complexity.
 [22] arXiv:2110.08775 (crosslist from condmat.disnn) [pdf, other]

Title: Perturbative construction of meanfield equations in extensiverank matrix factorization and denoisingComments: 28 pages (main text), 24 pages of references and appendicesSubjects: Disordered Systems and Neural Networks (condmat.disnn); Statistical Mechanics (condmat.statmech); Information Theory (cs.IT); Probability (math.PR)
Factorization of matrices where the rank of the two factors diverges linearly with their sizes has many applications in diverse areas such as unsupervised representation learning, dictionary learning or sparse coding. We consider a setting where the two factors are generated from known componentwise independent prior distributions, and the statistician observes a (possibly noisy) componentwise function of their matrix product. In the limit where the dimensions of the matrices tend to infinity, but their ratios remain fixed, we expect to be able to derive closed form expressions for the optimal mean squared error on the estimation of the two factors. However, this remains a very involved mathematical and algorithmic problem. A related, but simpler, problem is extensiverank matrix denoising, where one aims to reconstruct a matrix with extensive but usually small rank from noisy measurements. In this paper, we approach both these problems using hightemperature expansions at fixed order parameters. This allows to clarify how previous attempts at solving these problems failed at finding an asymptotically exact solution. We provide a systematic way to derive the corrections to these existing approximations, taking into account the structure of correlations particular to the problem. Finally, we illustrate our approach in detail on the case of extensiverank matrix denoising. We compare our results with known optimal rotationallyinvariant estimators, and show how exact asymptotic calculations of the minimal error can be performed using extensiverank matrix integrals.
 [23] arXiv:2110.08920 (crosslist from cs.LO) [pdf, other]

Title: Semantics of ConjecturesAuthors: Alessio RolfiniComments: 17 pages, 1 figureSubjects: Logic in Computer Science (cs.LO); Information Theory (cs.IT)
This paper aims to expand and detail the notion of formal semantics of Conjectures by applying a theoreticmodel approach. After a short introduction to the concepts and basics of Conjectures, we will start from the notion of Simple Interpretation of RDF, applying and extending the semantic rules and conditions to fully cover the concepts and features of Conjectures.
 [24] arXiv:2110.09502 (crosslist from math.ST) [pdf, other]

Title: Minimum $\ell_{1}$norm interpolators: Precise asymptotics and multiple descentSubjects: Statistics Theory (math.ST); Information Theory (cs.IT); Machine Learning (cs.LG); Signal Processing (eess.SP); Machine Learning (stat.ML)
An evolving line of machine learning works observe empirical evidence that suggests interpolating estimators  the ones that achieve zero training error  may not necessarily be harmful. This paper pursues theoretical understanding for an important type of interpolators: the minimum $\ell_{1}$norm interpolator, which is motivated by the observation that several learning algorithms favor low $\ell_1$norm solutions in the overparameterized regime. Concretely, we consider the noisy sparse regression model under Gaussian design, focusing on linear sparsity and highdimensional asymptotics (so that both the number of features and the sparsity level scale proportionally with the sample size).
We observe, and provide rigorous theoretical justification for, a curious multidescent phenomenon; that is, the generalization risk of the minimum $\ell_1$norm interpolator undergoes multiple (and possibly more than two) phases of descent and ascent as one increases the model capacity. This phenomenon stems from the special structure of the minimum $\ell_1$norm interpolator as well as the delicate interplay between the overparameterized ratio and the sparsity, thus unveiling a fundamental distinction in geometry from the minimum $\ell_2$norm interpolator. Our finding is built upon an exact characterization of the risk behavior, which is governed by a system of two nonlinear equations with two unknowns.
Replacements for Tue, 19 Oct 21
 [25] arXiv:2010.02471 (replaced) [pdf, ps, other]

Title: Determination for minimum symbolpair and RT weights via torsional degrees of repeatedroot cyclic codesAuthors: Boran KimSubjects: Information Theory (cs.IT)
 [26] arXiv:2101.06722 (replaced) [pdf, other]

Title: Almost Optimal Construction of Functional Batch Codes Using Hadamard CodesSubjects: Information Theory (cs.IT)
 [27] arXiv:2101.12146 (replaced) [pdf, other]

Title: Online Tensor Completion Based Prediction For Wireless Edge CachingSubjects: Information Theory (cs.IT); Performance (cs.PF)
 [28] arXiv:2101.12161 (replaced) [pdf, other]

Title: Improved RateEnergy Tradeoff For SWIPT Using Chordal Distance Decomposition In Interference Alignment NetworksSubjects: Information Theory (cs.IT)
 [29] arXiv:2104.06084 (replaced) [pdf, ps, other]

Title: On the efficiency of polarlike decoding for symmetric codesComments: Accepted to IEEE Transactions on Communications. This work was partially presented at the International Symposium on Information Theory and Applications'2020Subjects: Information Theory (cs.IT)
 [30] arXiv:2105.06451 (replaced) [pdf, ps, other]

Title: Outage Common Randomness Capacity Characterization of MultipleAntenna Slow Fading ChannelsComments: arXiv admin note: text overlap with arXiv:2102.01197Subjects: Information Theory (cs.IT)
 [31] arXiv:2108.03874 (replaced) [pdf, other]

Title: ZeroError Feedback Capacity of FiniteState Additive Noise Channels for Stabilization of Linear SystemsComments: arXiv admin note: text overlap with arXiv:2006.00892Subjects: Information Theory (cs.IT)
 [32] arXiv:2108.13512 (replaced) [pdf, ps, other]

Title: EnergyEfficient Massive MIMO for Serving Multiple Federated Learning GroupsComments: Accepted to appear in Proc. IEEE Global Communications Conference (GLOBECOM), Madrid, Spain, Dec. 2021. (v2). arXiv admin note: text overlap with arXiv:2107.09577Subjects: Information Theory (cs.IT)
 [33] arXiv:2109.06721 (replaced) [pdf, ps, other]

Title: Linear block and convolutional MDS codes to required rate, distance and typeAuthors: Ted HurleySubjects: Information Theory (cs.IT)
 [34] arXiv:2109.06992 (replaced) [pdf, other]

Title: MLaided power allocation for Tactical MIMOComments: Accepted at MILCOM 2021Subjects: Information Theory (cs.IT); Signal Processing (eess.SP)
 [35] arXiv:2109.14920 (replaced) [pdf, other]

Title: On the KullbackLeibler divergence between discrete normal distributionsAuthors: Frank NielsenComments: 26 pagesSubjects: Information Theory (cs.IT)
 [36] arXiv:2110.01798 (replaced) [pdf, other]

Title: Enabling CellFree Massive MIMO Systems with Wireless Millimeter Wave FronthaulComments: Submitted, 30 pages, 7 figuresSubjects: Information Theory (cs.IT); Signal Processing (eess.SP)
 [37] arXiv:2110.05279 (replaced) [pdf, ps, other]

Title: Sliced Mutual Information: A Scalable Measure of Statistical DependenceSubjects: Information Theory (cs.IT)
 [38] arXiv:2110.07233 (replaced) [pdf, ps, other]

Title: Optimal Update in Energy Harvesting Aided Terahertz Communications with Random BlockingComments: 9 pages, 4 Postscript figuresSubjects: Information Theory (cs.IT)
 [39] arXiv:2012.11026 (replaced) [pdf]

Title: Independent Approximates enable closedform parameter estimation of heavytailed distributionsAuthors: Kenric P. NelsonComments: 30 pages, 8 figures, 7 tablesSubjects: Methodology (stat.ME); Information Theory (cs.IT); Data Analysis, Statistics and Probability (physics.dataan)
 [40] arXiv:2105.08024 (replaced) [pdf, other]

Title: SampleEfficient Reinforcement Learning Is Feasible for Linearly Realizable MDPs with Limited RevisitingSubjects: Machine Learning (cs.LG); Information Theory (cs.IT); Optimization and Control (math.OC); Statistics Theory (math.ST); Machine Learning (stat.ML)
 [41] arXiv:2106.05232 (replaced) [pdf, ps, other]

Title: Realizing GANs via a Tunable Loss FunctionComments: Extended version of a paper accepted to ITW 2021. 8 pages, 2 figuresSubjects: Machine Learning (cs.LG); Information Theory (cs.IT); Machine Learning (stat.ML)
 [42] arXiv:2106.15358 (replaced) [pdf, other]

Title: Towards SampleOptimal Compressive Phase Retrieval with Sparse and Generative PriorsComments: Accepted to NeurIPS 2021Subjects: Machine Learning (stat.ML); Information Theory (cs.IT); Machine Learning (cs.LG)
[ showing up to 2000 entries per page: fewer  more ]
Disable MathJax (What is MathJax?)
Links to: arXiv, form interface, find, cs, recent, 2110, contact, help (Access key information)