We gratefully acknowledge support from
the Simons Foundation and member institutions.

Information Theory

New submissions

[ total of 31 entries: 1-31 ]
[ showing up to 2000 entries per page: fewer | more ]

New submissions for Tue, 26 May 20

[1]  arXiv:2005.11412 [pdf, other]
Title: Non-Binary Constrained Codes for Two-Dimensional Magnetic Recording
Comments: 9 pages (double column), 2 figures, submitted to the IEEE Transactions on Magnetics (TMAG)
Subjects: Information Theory (cs.IT); Signal Processing (eess.SP)

The two-dimensional magnetic recording (TDMR) technology promises storage densities of $10$ terabits per square inch. However, when tracks are squeezed together, a bit stored in the two-dimensional (TD) grid suffers inter-symbol interference (ISI) from adjacent bits in the same track, and inter-track interference (ITI) from nearby bits in the adjacent tracks. A bit is highly likely to be read incorrectly if it is isolated in the middle of a $3 \times3$ square; surrounded by its complements, horizontally and vertically. We improve the reliability of TDMR systems by designing two-dimensional constrained codes that prevent these square isolation patterns. We exploit the way TD read heads operate to design our codes, and we focus on TD read heads that collect signals from three adjacent tracks. We represent the two-dimensional square isolation constraint as a one-dimensional constraint on an alphabet of eight non-binary symbols. We use this new representation to construct a non-binary lexicographically-ordered constrained code where one third of the information bits are unconstrained. Our TD constraint codes are capacity-achieving, and the data protection is achieved with redundancy less than $3\%$ and at modest complexity.

[2]  arXiv:2005.11561 [pdf, other]
Title: Fluid Antenna Systems
Comments: 26 pages, 5 figures
Subjects: Information Theory (cs.IT); Signal Processing (eess.SP)

Over the past decades, multiple antenna technologies have appeared in many different forms, most notably as multiple-input multiple-output (MIMO), to transform wireless communications for extraordinary diversity and multiplexing gains. The variety of technologies has been based on placing a number of antennas at fixed locations which dictates the fundamental limit on the achievable performance. By contrast, this paper envisages the scenario where the physical position of an antenna can be switched freely to one of the N positions over a fixed-length line space to pick up the strongest signal in the manner of traditional selection combining. We refer to this system as a fluid antenna system (FAS) for tremendous flexibility in its possible shape and position. The aim of this paper is to study the achievable performance of a single-antenna FAS system with a fixed length and N in arbitrarily correlated Rayleigh fading channels. Our contributions include exact and approximate closed-form expressions for the outage probability of FAS. We also derive an upper bound for the outage probability, from which it is shown that a single-antenna FAS given any arbitrarily small space can outperform an L-antenna maximum ratio combining (MRC) system if N is large enough. Our analysis also reveals the minimum required size of the FAS, and how large N is considered enough for the FAS to surpass MRC.

[3]  arXiv:2005.11652 [pdf, other]
Title: Fast Beam Training for IRS-Assisted Multiuser Communications
Comments: This paper proposed a new IRS beam training scheme that significantly reduces the training overhead of conventional single-beam training
Subjects: Information Theory (cs.IT); Networking and Internet Architecture (cs.NI)

In this letter, we consider an intelligent reflecting surface (IRS)-assisted multiuser communication system, where an IRS is deployed to provide virtual line-of-sight (LoS) links between an access point (AP) and multiple users. We consider the practical codebook-based IRS passive beamforming and study efficient design for IRS reflect beam training, which is challenging due to the large number of IRS reflecting elements. In contrast to the conventional single-beam training, we propose a new multi-beam training method by dividing the IRS reflecting elements into multiple sub-arrays and designing their simultaneous multi-beam steering over time. By simply comparing the received signal power over time, each user can detect its optimal IRS beam direction with a high probability, even without searching over all possible beam directions as the single-beam training. Simulation results show that our proposed multi-beam training significantly reduces the training time of conventional single-beam training and yet achieves comparable IRS passive beamforming performance for data transmission.

[4]  arXiv:2005.11732 [pdf, ps, other]
Title: A Note on Self-Dual Generalized Reed-Solomon Codes
Subjects: Information Theory (cs.IT)

A linear code is called an MDS self-dual code if it is both an MDS code and a self-dual code with respect to the Euclidean inner product. The parameters of such codes are completely determined by the code length. In this paper, we consider new constructions of MDS self-dual codes via generalized Reed-Solomon (GRS) codes and their extended codes. The critical idea of our constructions is to choose suitable evaluation points such that the corresponding (extended) GRS codes are self-dual. The evaluation set of our constructions is consists of a subgroup of finite fields and its cosets in a bigger subgroup. Four new families of MDS self-dual codes are obtained and they have better parameters than previous results in certain region. Moreover, by the Mobius action over finite fields, we give a systematic way to construct self-dual GRS codes with different evaluation points provided any known self-dual GRS codes. Specially, we prove that all the self-dual extended GRS codes over $\mathbb{F}_{q}$ with length $n< q+1$ can be constructed from GRS codes with the same parameters.

[5]  arXiv:2005.11894 [pdf, other]
Title: Update Bandwidth for Distributed Storage
Subjects: Information Theory (cs.IT)

In this paper, we consider the update bandwidth in distributed storage systems~(DSSs). The update bandwidth, which measures the transmission efficiency of the update process in DSSs, is defined as the total amount of data symbols transferred in the network when the data symbols stored in a node are updated. This paper contains the following contributions. First, we establish the closed-form expression of the minimum update bandwidth attainable by irregular array codes. Second, after defining a class of irregular array codes, called Minimum Update Bandwidth~(MUB) codes, which achieve the minimum update bandwidth of irregular array codes, we determine the smallest code redundancy attainable by MUB codes. Third, the code parameters, with which the minimum code redundancy of irregular array codes and the smallest code redundancy of MUB codes can be equal, are identified, which allows us to define MR-MUB codes as a class of irregular array codes that simultaneously achieve the minimum code redundancy and the minimum update bandwidth. Fourth, we introduce explicit code constructions of MR-MUB codes and MUB codes with the smallest code redundancy. Fifth, we establish a lower bound of the update complexity of MR-MUB codes, which can be used to prove that the minimum update complexity of irregular array codes may not be achieved by MR-MUB codes. Last, we construct a class of $(n = k + 2, k)$ vertical maximum-distance separable (MDS) array codes that can achieve all of the minimum code redundancy, the minimum update bandwidth and the optimal repair bandwidth of irregular array codes.

[6]  arXiv:2005.12235 [pdf, other]
Title: Dynamic Compression Ratio Selection for Edge Inference Systems with Hard Deadlines
Comments: 11 pages, 14 figures
Subjects: Information Theory (cs.IT); Machine Learning (cs.LG)

Implementing machine learning algorithms on Internet of things (IoT) devices has become essential for emerging applications, such as autonomous driving, environment monitoring. But the limitations of computation capability and energy consumption make it difficult to run complex machine learning algorithms on IoT devices, especially when latency deadline exists. One solution is to offload the computation intensive tasks to the edge server. However, the wireless uploading of the raw data is time consuming and may lead to deadline violation. To reduce the communication cost, lossy data compression can be exploited for inference tasks, but may bring more erroneous inference results. In this paper, we propose a dynamic compression ratio selection scheme for edge inference system with hard deadlines. The key idea is to balance the tradeoff between communication cost and inference accuracy. By dynamically selecting the optimal compression ratio with the remaining deadline budgets for queued tasks, more tasks can be timely completed with correct inference under limited communication resources. Furthermore, information augmentation that retransmits less compressed data of task with erroneous inference, is proposed to enhance the accuracy performance. While it is often hard to know the correctness of inference, we use uncertainty to estimate the confidence of the inference, and based on that, jointly optimize the information augmentation and compression ratio selection. Lastly, considering the wireless transmission errors, we further design a retransmission scheme to reduce performance degradation due to packet losses. Simulation results show the performance of the proposed schemes under different deadlines and task arrival rates.

[7]  arXiv:2005.12239 [pdf, ps, other]
Title: The Isometry-Dual Property in Flags of Two-Point Algebraic Geometry Codes
Subjects: Information Theory (cs.IT); Algebraic Geometry (math.AG)

A flag of codes $C_0 \subsetneq C_1 \subsetneq \cdots \subsetneq C_s \subseteq {\mathbb F}_q^n$ is said to satisfy the {\it isometry-dual property} if there exists ${\bf x}\in (\mathbb{F}_q^*)^n$ such that the code $C_i$ is {\bf x}-isometric to the dual code $C_{s-i}^\perp$ for all $i=0,\ldots, s$. For $P$ and $Q$ rational places in a function field ${\mathcal F}$, we investigate the existence of isometry-dual flags of codes in the families of two-point algebraic geometry codes $$C_\mathcal L(D, a_0P+bQ)\subsetneq C_\mathcal L(D, a_1P+bQ)\subsetneq \dots \subsetneq C_\mathcal L(D, a_sP+bQ),$$ where the divisor $D$ is the sum of pairwise different rational places of ${\mathcal F}$ and $P, Q$ are not in $\mbox{supp}(D)$. We characterize those sequences in terms of $b$ for general function fields. We then apply the result to the broad class of Kummer extensions ${\mathcal F}$ defined by affine equations of the form $y^m=f(x)$, for $f(x)$ a separable polynomial of degree $r$, where $\mbox{gcd}(r, m)=1$. For $P$ the rational place at infinity and $Q$ the rational place associated to one of the roots of $f(x)$, it is shown that the flag of two-point algebraic geometry codes has the isometry-dual property if and only if $m$ divides $2b+1$. At the end we illustrate our results by applying them to two-point codes over several well know function fields.

Cross-lists for Tue, 26 May 20

[8]  arXiv:2005.11544 (cross-list from eess.SP) [pdf, ps, other]
Title: Joint Deployment and Multiple Access Design for Intelligent Reflecting Surface Assisted Networks
Comments: 30 pages, 8 figures
Subjects: Signal Processing (eess.SP); Information Theory (cs.IT)

The fundamental intelligent reflecting surface (IRS) deployment problem is investigated for IRS-assisted networks, where one IRS is arranged to be deployed in a specific region for assisting the communication between an access point (AP) and multiple users. Specifically, three multiple access schemes are considered, namely non-orthogonal multiple access (NOMA), frequency division multiple access (FDMA), and time division multiple access (TDMA). The weighted sum rate maximization problem for joint optimization of the deployment location and the reflection coefficients of the IRS as well as the power allocation at the AP is formulated. The non-convex optimization problems obtained for NOMA and FDMA are solved by employing monotonic optimization and semidefinite relaxation to find a performance upper bound. The problem obtained for TDMA is optimally solved by leveraging the time-selective nature of the IRS. Furthermore, for all three multiple access schemes, low-complexity suboptimal algorithms are developed by exploiting alternating optimization and successive convex approximation techniques, where a local region optimization method is applied for optimizing the IRS deployment location. Numerical results are provided to show that: 1) near-optimal performance can be achieved by the proposed suboptimal algorithms; 2) asymmetric and symmetric IRS deployment strategies are preferable for NOMA and FDMA/TDMA, respectively; 3) the performance gain achieved with IRS can be significantly improved by optimizing the deployment location.

[9]  arXiv:2005.11635 (cross-list from math.ST) [pdf, other]
Title: The Optimal 'AND'
Authors: Richard Rohwer
Comments: 23 pages, 5 figures, to be submitted (shortened) to NeurIPS20
Subjects: Statistics Theory (math.ST); Information Theory (cs.IT); Logic in Computer Science (cs.LO)

The joint distribution $P(X,Y)$ cannot be determined from its marginals $P(X)$ and $P(Y)$ alone; one also needs one of the conditionals $P(X|Y)$ or $P(Y|X)$. But is there a best guess, given only the marginals? Here we answer this question in the affirmative, obtaining in closed form the function of the marginals that has the lowest expected Kullbach-Liebler (KL) divergence between the unknown "true" joint probability and the function value. The expectation is taken with respect to Jeffreys' non-informative prior over the possible joint probability values, given the marginals. This distribution can also be used to obtain the expected information loss for any other "aggregation operator", as such estimators are often called in fuzzy logic, for any given pair of marginal input values. This enables such such operators, including ours, to be compared according to their expected loss under the minimal knowledge conditions we assume. We go on to develop a method for evaluating the expected accuracy of any aggregation operator in the absence of knowledge of its inputs. This requires averaging the expected loss over all possible input pairs, weighted by an appropriate distribution. We obtain this distribution by marginalizing Jeffreys' prior over the possible joint distributions (over the 3 functionally independent coordinates of the space of joint distributions over two Boolean variables) onto a joint distribution over the pair of marginal distributions, a 2-dimensional space with one parameter for each marginal. We report the resulting input-averaged expected losses for a few commonly used operators, as well as the optimal operator. Finally, we discuss the potential to develop our methodology into a principled risk management approach to replace the often rather arbitrary conditional-independence assumptions made for probabilistic graphical models.

[10]  arXiv:2005.11651 (cross-list from cs.CR) [pdf, other]
Title: Successive Refinement of Privacy
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT); Machine Learning (cs.LG)

This work examines a novel question: how much randomness is needed to achieve local differential privacy (LDP)? A motivating scenario is providing {\em multiple levels of privacy} to multiple analysts, either for distribution or for heavy-hitter estimation, using the \emph{same} (randomized) output. We call this setting \emph{successive refinement of privacy}, as it provides hierarchical access to the raw data with different privacy levels. For example, the same randomized output could enable one analyst to reconstruct the input, while another can only estimate the distribution subject to LDP requirements. This extends the classical Shannon (wiretap) security setting to local differential privacy. We provide (order-wise) tight characterizations of privacy-utility-randomness trade-offs in several cases for distribution estimation, including the standard LDP setting under a randomness constraint. We also provide a non-trivial privacy mechanism for multi-level privacy. Furthermore, we show that we cannot reuse random keys over time while preserving privacy of each user.

[11]  arXiv:2005.11663 (cross-list from eess.SP) [pdf, other]
Title: Sum-Rate Maximization for Multiuser MISO Downlink Systems with Self-sustainable IRS
Comments: submitted to IEEE Global Commun. Conf. (GLOBECOM), Taiwan, Dec. 2020
Subjects: Signal Processing (eess.SP); Information Theory (cs.IT)

This paper investigates multiuser multi-input single-output (MISO) downlink communications assisted by a self-sustainable intelligent reflection surface (IRS), which can harvest power from the received signals. We study the joint design of the beamformer at an access point (AP) and the phase shifts and the power harvesting schedule at an IRS for maximizing the system sum-rate. The design is formulated as a non-convex optimization problem taking into account the capability of IRS elements to harvest wireless power for realizing self-sustainability. Subsequently, we propose a computationally-efficient alternating algorithm to obtain a suboptimal solution to the design problem. Our simulation results unveil that: 1) there is a non-trivial trade-off between the system sum-rate and self-sustainability in IRS-assisted systems; 2) the performance gain achieved by the proposed scheme is improved with an increasing number of IRS elements; 3) an IRS equipped with small bit-resolution discrete phase shifters is sufficient to achieve a considerable system sum-rate of an ideal case with continuous phase shifts.

[12]  arXiv:2005.11705 (cross-list from math.PR) [pdf, ps, other]
Title: Sharp variance-entropy comparison for nonnegative gaussian quadratic forms
Subjects: Probability (math.PR); Information Theory (cs.IT)

In this article we study quadratic forms in n independent standard normal random variables. We show that among nonnegative quadratic forms, a diagonal form with equal coefficients maximizes differential entropy when variance is fixed. We also prove that differential entropy of a weighted sum of i.i.d. exponential random variables with nonnegative weights is maximized, under fixed variance, when the weights are equal.

[13]  arXiv:2005.11778 (cross-list from cs.CR) [pdf, other]
Title: Rethinking Blockchains in the Internet of Things Era from a Wireless Communication Perspective
Subjects: Cryptography and Security (cs.CR); Information Theory (cs.IT); Networking and Internet Architecture (cs.NI)

Due to the rapid development of Internet of Things (IoT), a massive number of devices are connected to the Internet. For these distributed devices in IoT networks, how to ensure their security and privacy becomes a significant challenge. The blockchain technology provides a promising solution to protect the data integrity, provenance, privacy, and consistency for IoT networks. In blockchains, communication is a prerequisite for participants, which are distributed in the system, to reach consensus. However, in IoT networks, most of the devices communicate through wireless links, which are not always reliable. Hence, the communication reliability of IoT devices influences the system security. In this article, we rethink the roles of communication and computing in blockchains by accounting for communication reliability. We analyze the tradeoff between communication reliability and computing power in blockchain security, and present a lower bound to the computing power that is needed to conduct an attack with a given communication reliability. Simulation results show that adversarial nodes can succeed in tampering a block with less computing power by hindering the propagation of blocks from other nodes.

[14]  arXiv:2005.12242 (cross-list from eess.SP) [pdf, other]
Title: Triplet-Based Wireless Channel Charting
Comments: Submitted to Globecom 2020
Subjects: Signal Processing (eess.SP); Information Theory (cs.IT); Machine Learning (cs.LG)

Channel charting is a data-driven baseband processing technique consisting in applying unsupervised machine learning techniques to channel state information (CSI), with the objective of reducing the dimension of the data and extracting the fundamental parameters governing the distribution of CSI samples observed by a given receiver. In this work, we focus on neural network-based approaches, and propose a new architecture based on triplets of samples. It allows to simultaneously learn a meaningful similarity metric between CSI samples, on the basis of proximity in their respective acquisition times, and to perform the sought dimensionality reduction. The proposed approach is evaluated on a dataset of measured massive MIMO CSI, and is shown to perform well in comparison to the state-of-the-art methods (UMAP, autoencoders and siamese networks). In particular, we show that the obtained chart representation is topologically close to the geographical user position, despite the fact that the charting approach is not supervised by any geographical data.

Replacements for Tue, 26 May 20

[15]  arXiv:1605.09124 (replaced) [pdf, ps, other]
Title: Minimax Rate-Optimal Estimation of Divergences between Discrete Distributions
Comments: This version has been significantly revised
Subjects: Information Theory (cs.IT); Statistics Theory (math.ST)
[16]  arXiv:1612.07806 (replaced) [pdf, other]
Title: Reliable recovery of hierarchically sparse signals for Gaussian and Kronecker product measurements
Comments: 11+4 pages, 5 figures. V3: Incomplete funding information corrected and minor typos corrected. V4: Change of title and additional author Axel Flinth. Included new results on Kronecker product measurements and relations of HiRIP to hierarchical coherence measures. Improved presentation of general hierarchically sparse signals and correction of minor typos
Subjects: Information Theory (cs.IT); Quantum Physics (quant-ph)
[17]  arXiv:1706.06764 (replaced) [src]
Title: An elementary description of polarization process
Authors: Ilya Dumer
Comments: The paper employs wrong equation (14) in Section 5. This equation is then used in Sections 6 and 7. In particular, Theorem 1 of Section 6 contains incorrect proof
Subjects: Information Theory (cs.IT)
[18]  arXiv:1707.01063 (replaced) [pdf, ps, other]
Title: On the relaxed maximum-likelihood blind MIMO channel estimation for orthogonal space-time block codes
Subjects: Information Theory (cs.IT)
[19]  arXiv:1904.02572 (replaced) [pdf, other]
Title: 5G Handover using Reinforcement Learning
Comments: 6 Pages, Planned for IEEE 5G WF 2020
Subjects: Information Theory (cs.IT)
[20]  arXiv:1906.06523 (replaced) [pdf, ps, other]
Title: Non-Orthogonal Multiple Access for Air-to-Ground Communication
Journal-ref: Published in: IEEE Transactions on Communications (Volume: 68, Issue: 5, Page(s): 2934 - 2949, May 2020)
Subjects: Information Theory (cs.IT)
[21]  arXiv:1907.00173 (replaced) [pdf, ps, other]
Title: Fast Accurate Beam and Channel Tracking for Two-dimensional Phased Antenna Arrays
Subjects: Information Theory (cs.IT)
[22]  arXiv:1907.08116 (replaced) [pdf, other]
Title: Communication and Consensus Co-Design for Distributed, Low-Latency and Reliable Wireless Systems
Comments: 30 pages, 8 figures, to appear in IEEE Internet of Things Journal
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
[23]  arXiv:1911.09944 (replaced) [pdf, ps, other]
Title: Covering Codes using Insertions or Deletions
Comments: 13 pages
Subjects: Information Theory (cs.IT); Computational Complexity (cs.CC); Combinatorics (math.CO)
[24]  arXiv:2001.03913 (replaced) [pdf, ps, other]
Title: Capacity and Optimal Resource Allocation for IRS-assisted Multi-user Communication Systems
Comments: 29 pages, 7 figures
Subjects: Information Theory (cs.IT)
[25]  arXiv:2001.04769 (replaced) [pdf, ps, other]
Title: Cramér-Rao Lower Bounds Arising from Generalized Csiszár Divergences
Comments: 25 pages
Subjects: Information Theory (cs.IT); Signal Processing (eess.SP); Statistics Theory (math.ST); Machine Learning (stat.ML)
[26]  arXiv:2004.13318 (replaced) [pdf, ps, other]
Title: Hybrid Active/Passive Wireless Network Aided by Intelligent Reflecting Surface: System Modeling and Performance Analysis
Comments: 1-col, 30 pages. First work to model large-scale multi-cell hybrid network with distributed active BSs and passive IRSs subjected to inter-cell interference, and characterize distributions of signal/interference power, SINR and spatial throughput based on stochastic geometry. Unveil that the new hybrid network with optimal IRS/BS density ratio achieves linear capacity growth with deployment cost
Subjects: Information Theory (cs.IT); Networking and Internet Architecture (cs.NI); Applications (stat.AP)
[27]  arXiv:1912.08637 (replaced) [pdf, ps, other]
Title: Generalized Residual Ratio Thresholding
Comments: 13 pages, 8 figures
Subjects: Machine Learning (stat.ML); Information Theory (cs.IT); Machine Learning (cs.LG); Signal Processing (eess.SP)
[28]  arXiv:2002.04156 (replaced) [pdf, ps, other]
Title: Turbo-Aggregate: Breaking the Quadratic Aggregation Barrier in Secure Federated Learning
Comments: 22 pages, 8 figures
Subjects: Machine Learning (cs.LG); Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Information Theory (cs.IT); Machine Learning (stat.ML)
[29]  arXiv:2004.00363 (replaced) [pdf, other]
Title: DNN-based Localization from Channel Estimates: Feature Design and Experimental Results
Comments: Submitted to Globecom 2020
Subjects: Networking and Internet Architecture (cs.NI); Information Theory (cs.IT); Machine Learning (cs.LG); Signal Processing (eess.SP); Machine Learning (stat.ML)
[30]  arXiv:2005.10848 (replaced) [pdf, other]
Title: Global Multiclass Classification from Heterogeneous Local Models
Comments: 31 pages, 8 figures
Subjects: Machine Learning (cs.LG); Information Theory (cs.IT); Machine Learning (stat.ML)
[31]  arXiv:2005.11018 (replaced) [pdf, ps, other]
Title: Semi-Supervised Learning: the Case When Unlabeled Data is Equally Useful
Authors: Jingge Zhu
Comments: accepted to UAI 2020
Subjects: Machine Learning (cs.LG); Information Theory (cs.IT); Machine Learning (stat.ML)
[ total of 31 entries: 1-31 ]
[ showing up to 2000 entries per page: fewer | more ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, recent, 2005, contact, help  (Access key information)