Information Theory
New submissions
[ showing up to 2000 entries per page: fewer  more ]
New submissions for Tue, 26 May 20
 [1] arXiv:2005.11412 [pdf, other]

Title: NonBinary Constrained Codes for TwoDimensional Magnetic RecordingComments: 9 pages (double column), 2 figures, submitted to the IEEE Transactions on Magnetics (TMAG)Subjects: Information Theory (cs.IT); Signal Processing (eess.SP)
The twodimensional magnetic recording (TDMR) technology promises storage densities of $10$ terabits per square inch. However, when tracks are squeezed together, a bit stored in the twodimensional (TD) grid suffers intersymbol interference (ISI) from adjacent bits in the same track, and intertrack interference (ITI) from nearby bits in the adjacent tracks. A bit is highly likely to be read incorrectly if it is isolated in the middle of a $3 \times3$ square; surrounded by its complements, horizontally and vertically. We improve the reliability of TDMR systems by designing twodimensional constrained codes that prevent these square isolation patterns. We exploit the way TD read heads operate to design our codes, and we focus on TD read heads that collect signals from three adjacent tracks. We represent the twodimensional square isolation constraint as a onedimensional constraint on an alphabet of eight nonbinary symbols. We use this new representation to construct a nonbinary lexicographicallyordered constrained code where one third of the information bits are unconstrained. Our TD constraint codes are capacityachieving, and the data protection is achieved with redundancy less than $3\%$ and at modest complexity.
 [2] arXiv:2005.11561 [pdf, other]

Title: Fluid Antenna SystemsComments: 26 pages, 5 figuresSubjects: Information Theory (cs.IT); Signal Processing (eess.SP)
Over the past decades, multiple antenna technologies have appeared in many different forms, most notably as multipleinput multipleoutput (MIMO), to transform wireless communications for extraordinary diversity and multiplexing gains. The variety of technologies has been based on placing a number of antennas at fixed locations which dictates the fundamental limit on the achievable performance. By contrast, this paper envisages the scenario where the physical position of an antenna can be switched freely to one of the N positions over a fixedlength line space to pick up the strongest signal in the manner of traditional selection combining. We refer to this system as a fluid antenna system (FAS) for tremendous flexibility in its possible shape and position. The aim of this paper is to study the achievable performance of a singleantenna FAS system with a fixed length and N in arbitrarily correlated Rayleigh fading channels. Our contributions include exact and approximate closedform expressions for the outage probability of FAS. We also derive an upper bound for the outage probability, from which it is shown that a singleantenna FAS given any arbitrarily small space can outperform an Lantenna maximum ratio combining (MRC) system if N is large enough. Our analysis also reveals the minimum required size of the FAS, and how large N is considered enough for the FAS to surpass MRC.
 [3] arXiv:2005.11652 [pdf, other]

Title: Fast Beam Training for IRSAssisted Multiuser CommunicationsComments: This paper proposed a new IRS beam training scheme that significantly reduces the training overhead of conventional singlebeam trainingSubjects: Information Theory (cs.IT); Networking and Internet Architecture (cs.NI)
In this letter, we consider an intelligent reflecting surface (IRS)assisted multiuser communication system, where an IRS is deployed to provide virtual lineofsight (LoS) links between an access point (AP) and multiple users. We consider the practical codebookbased IRS passive beamforming and study efficient design for IRS reflect beam training, which is challenging due to the large number of IRS reflecting elements. In contrast to the conventional singlebeam training, we propose a new multibeam training method by dividing the IRS reflecting elements into multiple subarrays and designing their simultaneous multibeam steering over time. By simply comparing the received signal power over time, each user can detect its optimal IRS beam direction with a high probability, even without searching over all possible beam directions as the singlebeam training. Simulation results show that our proposed multibeam training significantly reduces the training time of conventional singlebeam training and yet achieves comparable IRS passive beamforming performance for data transmission.
 [4] arXiv:2005.11732 [pdf, ps, other]

Title: A Note on SelfDual Generalized ReedSolomon CodesSubjects: Information Theory (cs.IT)
A linear code is called an MDS selfdual code if it is both an MDS code and a selfdual code with respect to the Euclidean inner product. The parameters of such codes are completely determined by the code length. In this paper, we consider new constructions of MDS selfdual codes via generalized ReedSolomon (GRS) codes and their extended codes. The critical idea of our constructions is to choose suitable evaluation points such that the corresponding (extended) GRS codes are selfdual. The evaluation set of our constructions is consists of a subgroup of finite fields and its cosets in a bigger subgroup. Four new families of MDS selfdual codes are obtained and they have better parameters than previous results in certain region. Moreover, by the Mobius action over finite fields, we give a systematic way to construct selfdual GRS codes with different evaluation points provided any known selfdual GRS codes. Specially, we prove that all the selfdual extended GRS codes over $\mathbb{F}_{q}$ with length $n< q+1$ can be constructed from GRS codes with the same parameters.
 [5] arXiv:2005.11894 [pdf, other]

Title: Update Bandwidth for Distributed StorageSubjects: Information Theory (cs.IT)
In this paper, we consider the update bandwidth in distributed storage systems~(DSSs). The update bandwidth, which measures the transmission efficiency of the update process in DSSs, is defined as the total amount of data symbols transferred in the network when the data symbols stored in a node are updated. This paper contains the following contributions. First, we establish the closedform expression of the minimum update bandwidth attainable by irregular array codes. Second, after defining a class of irregular array codes, called Minimum Update Bandwidth~(MUB) codes, which achieve the minimum update bandwidth of irregular array codes, we determine the smallest code redundancy attainable by MUB codes. Third, the code parameters, with which the minimum code redundancy of irregular array codes and the smallest code redundancy of MUB codes can be equal, are identified, which allows us to define MRMUB codes as a class of irregular array codes that simultaneously achieve the minimum code redundancy and the minimum update bandwidth. Fourth, we introduce explicit code constructions of MRMUB codes and MUB codes with the smallest code redundancy. Fifth, we establish a lower bound of the update complexity of MRMUB codes, which can be used to prove that the minimum update complexity of irregular array codes may not be achieved by MRMUB codes. Last, we construct a class of $(n = k + 2, k)$ vertical maximumdistance separable (MDS) array codes that can achieve all of the minimum code redundancy, the minimum update bandwidth and the optimal repair bandwidth of irregular array codes.
 [6] arXiv:2005.12235 [pdf, other]

Title: Dynamic Compression Ratio Selection for Edge Inference Systems with Hard DeadlinesComments: 11 pages, 14 figuresSubjects: Information Theory (cs.IT); Machine Learning (cs.LG)
Implementing machine learning algorithms on Internet of things (IoT) devices has become essential for emerging applications, such as autonomous driving, environment monitoring. But the limitations of computation capability and energy consumption make it difficult to run complex machine learning algorithms on IoT devices, especially when latency deadline exists. One solution is to offload the computation intensive tasks to the edge server. However, the wireless uploading of the raw data is time consuming and may lead to deadline violation. To reduce the communication cost, lossy data compression can be exploited for inference tasks, but may bring more erroneous inference results. In this paper, we propose a dynamic compression ratio selection scheme for edge inference system with hard deadlines. The key idea is to balance the tradeoff between communication cost and inference accuracy. By dynamically selecting the optimal compression ratio with the remaining deadline budgets for queued tasks, more tasks can be timely completed with correct inference under limited communication resources. Furthermore, information augmentation that retransmits less compressed data of task with erroneous inference, is proposed to enhance the accuracy performance. While it is often hard to know the correctness of inference, we use uncertainty to estimate the confidence of the inference, and based on that, jointly optimize the information augmentation and compression ratio selection. Lastly, considering the wireless transmission errors, we further design a retransmission scheme to reduce performance degradation due to packet losses. Simulation results show the performance of the proposed schemes under different deadlines and task arrival rates.
 [7] arXiv:2005.12239 [pdf, ps, other]

Title: The IsometryDual Property in Flags of TwoPoint Algebraic Geometry CodesSubjects: Information Theory (cs.IT); Algebraic Geometry (math.AG)
A flag of codes $C_0 \subsetneq C_1 \subsetneq \cdots \subsetneq C_s \subseteq {\mathbb F}_q^n$ is said to satisfy the {\it isometrydual property} if there exists ${\bf x}\in (\mathbb{F}_q^*)^n$ such that the code $C_i$ is {\bf x}isometric to the dual code $C_{si}^\perp$ for all $i=0,\ldots, s$. For $P$ and $Q$ rational places in a function field ${\mathcal F}$, we investigate the existence of isometrydual flags of codes in the families of twopoint algebraic geometry codes $$C_\mathcal L(D, a_0P+bQ)\subsetneq C_\mathcal L(D, a_1P+bQ)\subsetneq \dots \subsetneq C_\mathcal L(D, a_sP+bQ),$$ where the divisor $D$ is the sum of pairwise different rational places of ${\mathcal F}$ and $P, Q$ are not in $\mbox{supp}(D)$. We characterize those sequences in terms of $b$ for general function fields. We then apply the result to the broad class of Kummer extensions ${\mathcal F}$ defined by affine equations of the form $y^m=f(x)$, for $f(x)$ a separable polynomial of degree $r$, where $\mbox{gcd}(r, m)=1$. For $P$ the rational place at infinity and $Q$ the rational place associated to one of the roots of $f(x)$, it is shown that the flag of twopoint algebraic geometry codes has the isometrydual property if and only if $m$ divides $2b+1$. At the end we illustrate our results by applying them to twopoint codes over several well know function fields.
Crosslists for Tue, 26 May 20
 [8] arXiv:2005.11544 (crosslist from eess.SP) [pdf, ps, other]

Title: Joint Deployment and Multiple Access Design for Intelligent Reflecting Surface Assisted NetworksComments: 30 pages, 8 figuresSubjects: Signal Processing (eess.SP); Information Theory (cs.IT)
The fundamental intelligent reflecting surface (IRS) deployment problem is investigated for IRSassisted networks, where one IRS is arranged to be deployed in a specific region for assisting the communication between an access point (AP) and multiple users. Specifically, three multiple access schemes are considered, namely nonorthogonal multiple access (NOMA), frequency division multiple access (FDMA), and time division multiple access (TDMA). The weighted sum rate maximization problem for joint optimization of the deployment location and the reflection coefficients of the IRS as well as the power allocation at the AP is formulated. The nonconvex optimization problems obtained for NOMA and FDMA are solved by employing monotonic optimization and semidefinite relaxation to find a performance upper bound. The problem obtained for TDMA is optimally solved by leveraging the timeselective nature of the IRS. Furthermore, for all three multiple access schemes, lowcomplexity suboptimal algorithms are developed by exploiting alternating optimization and successive convex approximation techniques, where a local region optimization method is applied for optimizing the IRS deployment location. Numerical results are provided to show that: 1) nearoptimal performance can be achieved by the proposed suboptimal algorithms; 2) asymmetric and symmetric IRS deployment strategies are preferable for NOMA and FDMA/TDMA, respectively; 3) the performance gain achieved with IRS can be significantly improved by optimizing the deployment location.
 [9] arXiv:2005.11635 (crosslist from math.ST) [pdf, other]

Title: The Optimal 'AND'Authors: Richard RohwerComments: 23 pages, 5 figures, to be submitted (shortened) to NeurIPS20Subjects: Statistics Theory (math.ST); Information Theory (cs.IT); Logic in Computer Science (cs.LO)
The joint distribution $P(X,Y)$ cannot be determined from its marginals $P(X)$ and $P(Y)$ alone; one also needs one of the conditionals $P(XY)$ or $P(YX)$. But is there a best guess, given only the marginals? Here we answer this question in the affirmative, obtaining in closed form the function of the marginals that has the lowest expected KullbachLiebler (KL) divergence between the unknown "true" joint probability and the function value. The expectation is taken with respect to Jeffreys' noninformative prior over the possible joint probability values, given the marginals. This distribution can also be used to obtain the expected information loss for any other "aggregation operator", as such estimators are often called in fuzzy logic, for any given pair of marginal input values. This enables such such operators, including ours, to be compared according to their expected loss under the minimal knowledge conditions we assume. We go on to develop a method for evaluating the expected accuracy of any aggregation operator in the absence of knowledge of its inputs. This requires averaging the expected loss over all possible input pairs, weighted by an appropriate distribution. We obtain this distribution by marginalizing Jeffreys' prior over the possible joint distributions (over the 3 functionally independent coordinates of the space of joint distributions over two Boolean variables) onto a joint distribution over the pair of marginal distributions, a 2dimensional space with one parameter for each marginal. We report the resulting inputaveraged expected losses for a few commonly used operators, as well as the optimal operator. Finally, we discuss the potential to develop our methodology into a principled risk management approach to replace the often rather arbitrary conditionalindependence assumptions made for probabilistic graphical models.
 [10] arXiv:2005.11651 (crosslist from cs.CR) [pdf, other]

Title: Successive Refinement of PrivacySubjects: Cryptography and Security (cs.CR); Information Theory (cs.IT); Machine Learning (cs.LG)
This work examines a novel question: how much randomness is needed to achieve local differential privacy (LDP)? A motivating scenario is providing {\em multiple levels of privacy} to multiple analysts, either for distribution or for heavyhitter estimation, using the \emph{same} (randomized) output. We call this setting \emph{successive refinement of privacy}, as it provides hierarchical access to the raw data with different privacy levels. For example, the same randomized output could enable one analyst to reconstruct the input, while another can only estimate the distribution subject to LDP requirements. This extends the classical Shannon (wiretap) security setting to local differential privacy. We provide (orderwise) tight characterizations of privacyutilityrandomness tradeoffs in several cases for distribution estimation, including the standard LDP setting under a randomness constraint. We also provide a nontrivial privacy mechanism for multilevel privacy. Furthermore, we show that we cannot reuse random keys over time while preserving privacy of each user.
 [11] arXiv:2005.11663 (crosslist from eess.SP) [pdf, other]

Title: SumRate Maximization for Multiuser MISO Downlink Systems with Selfsustainable IRSComments: submitted to IEEE Global Commun. Conf. (GLOBECOM), Taiwan, Dec. 2020Subjects: Signal Processing (eess.SP); Information Theory (cs.IT)
This paper investigates multiuser multiinput singleoutput (MISO) downlink communications assisted by a selfsustainable intelligent reflection surface (IRS), which can harvest power from the received signals. We study the joint design of the beamformer at an access point (AP) and the phase shifts and the power harvesting schedule at an IRS for maximizing the system sumrate. The design is formulated as a nonconvex optimization problem taking into account the capability of IRS elements to harvest wireless power for realizing selfsustainability. Subsequently, we propose a computationallyefficient alternating algorithm to obtain a suboptimal solution to the design problem. Our simulation results unveil that: 1) there is a nontrivial tradeoff between the system sumrate and selfsustainability in IRSassisted systems; 2) the performance gain achieved by the proposed scheme is improved with an increasing number of IRS elements; 3) an IRS equipped with small bitresolution discrete phase shifters is sufficient to achieve a considerable system sumrate of an ideal case with continuous phase shifts.
 [12] arXiv:2005.11705 (crosslist from math.PR) [pdf, ps, other]

Title: Sharp varianceentropy comparison for nonnegative gaussian quadratic formsSubjects: Probability (math.PR); Information Theory (cs.IT)
In this article we study quadratic forms in n independent standard normal random variables. We show that among nonnegative quadratic forms, a diagonal form with equal coefficients maximizes differential entropy when variance is fixed. We also prove that differential entropy of a weighted sum of i.i.d. exponential random variables with nonnegative weights is maximized, under fixed variance, when the weights are equal.
 [13] arXiv:2005.11778 (crosslist from cs.CR) [pdf, other]

Title: Rethinking Blockchains in the Internet of Things Era from a Wireless Communication PerspectiveSubjects: Cryptography and Security (cs.CR); Information Theory (cs.IT); Networking and Internet Architecture (cs.NI)
Due to the rapid development of Internet of Things (IoT), a massive number of devices are connected to the Internet. For these distributed devices in IoT networks, how to ensure their security and privacy becomes a significant challenge. The blockchain technology provides a promising solution to protect the data integrity, provenance, privacy, and consistency for IoT networks. In blockchains, communication is a prerequisite for participants, which are distributed in the system, to reach consensus. However, in IoT networks, most of the devices communicate through wireless links, which are not always reliable. Hence, the communication reliability of IoT devices influences the system security. In this article, we rethink the roles of communication and computing in blockchains by accounting for communication reliability. We analyze the tradeoff between communication reliability and computing power in blockchain security, and present a lower bound to the computing power that is needed to conduct an attack with a given communication reliability. Simulation results show that adversarial nodes can succeed in tampering a block with less computing power by hindering the propagation of blocks from other nodes.
 [14] arXiv:2005.12242 (crosslist from eess.SP) [pdf, other]

Title: TripletBased Wireless Channel ChartingComments: Submitted to Globecom 2020Subjects: Signal Processing (eess.SP); Information Theory (cs.IT); Machine Learning (cs.LG)
Channel charting is a datadriven baseband processing technique consisting in applying unsupervised machine learning techniques to channel state information (CSI), with the objective of reducing the dimension of the data and extracting the fundamental parameters governing the distribution of CSI samples observed by a given receiver. In this work, we focus on neural networkbased approaches, and propose a new architecture based on triplets of samples. It allows to simultaneously learn a meaningful similarity metric between CSI samples, on the basis of proximity in their respective acquisition times, and to perform the sought dimensionality reduction. The proposed approach is evaluated on a dataset of measured massive MIMO CSI, and is shown to perform well in comparison to the stateoftheart methods (UMAP, autoencoders and siamese networks). In particular, we show that the obtained chart representation is topologically close to the geographical user position, despite the fact that the charting approach is not supervised by any geographical data.
Replacements for Tue, 26 May 20
 [15] arXiv:1605.09124 (replaced) [pdf, ps, other]

Title: Minimax RateOptimal Estimation of Divergences between Discrete DistributionsComments: This version has been significantly revisedSubjects: Information Theory (cs.IT); Statistics Theory (math.ST)
 [16] arXiv:1612.07806 (replaced) [pdf, other]

Title: Reliable recovery of hierarchically sparse signals for Gaussian and Kronecker product measurementsComments: 11+4 pages, 5 figures. V3: Incomplete funding information corrected and minor typos corrected. V4: Change of title and additional author Axel Flinth. Included new results on Kronecker product measurements and relations of HiRIP to hierarchical coherence measures. Improved presentation of general hierarchically sparse signals and correction of minor typosSubjects: Information Theory (cs.IT); Quantum Physics (quantph)
 [17] arXiv:1706.06764 (replaced) [src]

Title: An elementary description of polarization processAuthors: Ilya DumerComments: The paper employs wrong equation (14) in Section 5. This equation is then used in Sections 6 and 7. In particular, Theorem 1 of Section 6 contains incorrect proofSubjects: Information Theory (cs.IT)
 [18] arXiv:1707.01063 (replaced) [pdf, ps, other]

Title: On the relaxed maximumlikelihood blind MIMO channel estimation for orthogonal spacetime block codesSubjects: Information Theory (cs.IT)
 [19] arXiv:1904.02572 (replaced) [pdf, other]

Title: 5G Handover using Reinforcement LearningComments: 6 Pages, Planned for IEEE 5G WF 2020Subjects: Information Theory (cs.IT)
 [20] arXiv:1906.06523 (replaced) [pdf, ps, other]

Title: NonOrthogonal Multiple Access for AirtoGround CommunicationJournalref: Published in: IEEE Transactions on Communications (Volume: 68, Issue: 5, Page(s): 2934  2949, May 2020)Subjects: Information Theory (cs.IT)
 [21] arXiv:1907.00173 (replaced) [pdf, ps, other]

Title: Fast Accurate Beam and Channel Tracking for Twodimensional Phased Antenna ArraysSubjects: Information Theory (cs.IT)
 [22] arXiv:1907.08116 (replaced) [pdf, other]

Title: Communication and Consensus CoDesign for Distributed, LowLatency and Reliable Wireless SystemsComments: 30 pages, 8 figures, to appear in IEEE Internet of Things JournalSubjects: Information Theory (cs.IT); Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
 [23] arXiv:1911.09944 (replaced) [pdf, ps, other]

Title: Covering Codes using Insertions or DeletionsComments: 13 pagesSubjects: Information Theory (cs.IT); Computational Complexity (cs.CC); Combinatorics (math.CO)
 [24] arXiv:2001.03913 (replaced) [pdf, ps, other]

Title: Capacity and Optimal Resource Allocation for IRSassisted Multiuser Communication SystemsComments: 29 pages, 7 figuresSubjects: Information Theory (cs.IT)
 [25] arXiv:2001.04769 (replaced) [pdf, ps, other]

Title: CramérRao Lower Bounds Arising from Generalized Csiszár DivergencesComments: 25 pagesSubjects: Information Theory (cs.IT); Signal Processing (eess.SP); Statistics Theory (math.ST); Machine Learning (stat.ML)
 [26] arXiv:2004.13318 (replaced) [pdf, ps, other]

Title: Hybrid Active/Passive Wireless Network Aided by Intelligent Reflecting Surface: System Modeling and Performance AnalysisComments: 1col, 30 pages. First work to model largescale multicell hybrid network with distributed active BSs and passive IRSs subjected to intercell interference, and characterize distributions of signal/interference power, SINR and spatial throughput based on stochastic geometry. Unveil that the new hybrid network with optimal IRS/BS density ratio achieves linear capacity growth with deployment costSubjects: Information Theory (cs.IT); Networking and Internet Architecture (cs.NI); Applications (stat.AP)
 [27] arXiv:1912.08637 (replaced) [pdf, ps, other]

Title: Generalized Residual Ratio ThresholdingComments: 13 pages, 8 figuresSubjects: Machine Learning (stat.ML); Information Theory (cs.IT); Machine Learning (cs.LG); Signal Processing (eess.SP)
 [28] arXiv:2002.04156 (replaced) [pdf, ps, other]

Title: TurboAggregate: Breaking the Quadratic Aggregation Barrier in Secure Federated LearningComments: 22 pages, 8 figuresSubjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Information Theory (cs.IT); Machine Learning (stat.ML)
 [29] arXiv:2004.00363 (replaced) [pdf, other]

Title: DNNbased Localization from Channel Estimates: Feature Design and Experimental ResultsComments: Submitted to Globecom 2020Subjects: Networking and Internet Architecture (cs.NI); Information Theory (cs.IT); Machine Learning (cs.LG); Signal Processing (eess.SP); Machine Learning (stat.ML)
 [30] arXiv:2005.10848 (replaced) [pdf, other]

Title: Global Multiclass Classification from Heterogeneous Local ModelsComments: 31 pages, 8 figuresSubjects: Machine Learning (cs.LG); Information Theory (cs.IT); Machine Learning (stat.ML)
 [31] arXiv:2005.11018 (replaced) [pdf, ps, other]

Title: SemiSupervised Learning: the Case When Unlabeled Data is Equally UsefulAuthors: Jingge ZhuComments: accepted to UAI 2020Subjects: Machine Learning (cs.LG); Information Theory (cs.IT); Machine Learning (stat.ML)
[ showing up to 2000 entries per page: fewer  more ]
Disable MathJax (What is MathJax?)
Links to: arXiv, form interface, find, cs, recent, 2005, contact, help (Access key information)