We gratefully acknowledge support from
the Simons Foundation and member institutions.

Information Theory

New submissions

[ total of 42 entries: 1-42 ]
[ showing up to 2000 entries per page: fewer | more ]

New submissions for Tue, 19 Oct 21

[1]  arXiv:2110.08317 [pdf, ps, other]
Title: Coverage Probability of Double-IRS Assisted Communication Systems
Comments: accepted in IEEE Wireless Communications Letters
Subjects: Information Theory (cs.IT)

In this paper, we focus on the coverage probability of a double-intelligent reflecting surface (IRS) assisted wireless network and study the impact of multiplicative beamforming gain and correlated Rayleigh fading. In particular, we obtain a novel closed-form expression of the coverage probability of a single-input single-output (SISO) system assisted by two large IRSs while being dependent on the corresponding arbitrary reflecting beamforming matrices (RBMs) and large-scale statistics in terms of correlation matrices. Taking advantage of the large-scale statistics, i.e., statistical channel state information (CSI), we perform optimization of the RBMs of both IRSs once per several coherence intervals rather than at each interval. Hence, we achieve a reduction of the computational complexity, otherwise increased in multi-IRS-assisted networks during their RBM optimization. Numerical results validate the analytical expressions even for small IRSs, confirm enhanced performance over the conventional single-IRS counterpart, and reveal insightful properties.

[2]  arXiv:2110.08513 [pdf, other]
Title: Deep Reinforcement Learning for Practical Phase Shift Optimization in RIS-aided MISO URLLC Systems
Comments: This work has been submitted to the IEEE for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessible
Subjects: Information Theory (cs.IT)

Reconfigurable intelligent surfaces (RISs) can assist the wireless systems in providing reliable and low-latency links to realize the requirements in Industry 4.0. In this paper, the practical phase shift optimization in a RIS-aided ultra-reliable and low-latency communication (URLLC) system at a factory setting is performed by applying a novel deep reinforcement learning (DRL) algorithm named as twin-delayed deep deterministic policy gradient (TD3). First, the system achievable rate in finite blocklength (FBL) regime is identified for each actuator then, the problem is formulated where the objective is to maximize the total achievable FBL rate, subject to non-linear amplitude response and the phase shift values constraint. Since the amplitude response equality constraint is highly non-convex and non-linear, we employ the TD3 to tackle the problem. The considered method relies on interacting RIS with industrial scenario by taking actions which are the phase shifts at the RIS elements, to maximize the total FBL rate. We assess the performance loss of the system when the RIS is non-ideal, i.e., non-linear amplitude response with/without phase quantization and compare it with ideal RIS. The numerical results show that optimizing phase shifts in non-ideal RIS via the considered TD3 method is highly beneficial to improve the performance.

[3]  arXiv:2110.08704 [pdf, other]
Title: A Q-Learning-based Approach for Distributed Beam Scheduling in mmWave Networks
Comments: 10 pages
Subjects: Information Theory (cs.IT); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)

We consider the problem of distributed downlink beam scheduling and power allocation for millimeter-Wave (mmWave) cellular networks where multiple base stations (BSs) belonging to different service operators share the same unlicensed spectrum with no central coordination or cooperation among them. Our goal is to design efficient distributed beam scheduling and power allocation algorithms such that the network-level payoff, defined as the weighted sum of the total throughput and a power penalization term, can be maximized. To this end, we propose a distributed scheduling approach to power allocation and adaptation for efficient interference management over the shared spectrum by modeling each BS as an independent Q-learning agent. As a baseline, we compare the proposed approach to the state-of-the-art non-cooperative game-based approach which was previously developed for the same problem. We conduct extensive experiments under various scenarios to verify the effect of multiple factors on the performance of both approaches. Experiment results show that the proposed approach adapts well to different interference situations by learning from experience and can achieve higher payoff than the game-based approach. The proposed approach can also be integrated into our previously developed Lyapunov stochastic optimization framework for the purpose of network utility maximization with optimality guarantee. As a result, the weights in the payoff function can be automatically and optimally determined by the virtual queue values from the sub-problems derived from the Lyapunov optimization framework.

[4]  arXiv:2110.08707 [pdf, other]
Title: Novel Secret-Key-Assisted Schemes for Secure MISOME-OFDM Systems
Subjects: Information Theory (cs.IT); Signal Processing (eess.SP)

We propose a new secure transmission scheme for uplink multiple-input single-output (MISO) orthogonal-frequency multiplexing (OFDM) systems in the presence of multiple eavesdroppers. Our proposed scheme utilizes the sub-channels orthogonality of OFDM systems to simultaneously transmit data and secret key symbols. The base station, Bob, shares secret key symbols with the legitimate user, Alice, using wiretap coding over a portion of the sub-channels. Concurrently, Alice uses the accumulated secret keys in her secret-key queue to encrypt data symbols using a one time pad (OTP) cipher and transmits them to Bob over the remaining sub-channels. if Alice did not accumulate sufficient keys in her secret-key queue, she employs wiretap coding to secure her data transmissions. We propose fixed and dynamic sub-channel allocation schemes to divide the sub-channels between data and secret keys. We derive the secrecy outage probability (SOP) and the secure throughput for the proposed scheme. We quantify the system's security under practical non-Gaussian transmissions where discrete signal constellation points are transmitted by the legitimate source nodes. Numerical results validate our theoretical findings and quantify the impact of different system design parameters.

[5]  arXiv:2110.08716 [pdf, ps, other]
Title: Multifractal of mass function
Subjects: Information Theory (cs.IT)

Multifractal plays an important role in many fields. However, there is few attentions about mass function, which can better deal with uncertain information than probability. In this paper, we proposed multifractal of mass function. Firstly, the definition of multifractal spectrum of mass function is given. Secondly, the multifractal dimension of mass function is defined as $D_{\alpha}$. When mass function degenerates to probability distribution, $D_{\alpha}$ degenerates to $d_{\alpha}$, which is information dimension proposed by Renyi. One interesting property is that the multifractal dimension of mass function with maximum Deng entropy is 1.585 no matter the order. Other interesting properties and numerical examples are shown to illustrate proposed model.

[6]  arXiv:2110.08746 [pdf, ps, other]
Title: Spectral Efficiency of OTFS Based Orthogonal Multiple Access with Rectangular Pulses
Comments: This work has been submitted to the IEEE for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessible
Subjects: Information Theory (cs.IT); Signal Processing (eess.SP)

In this paper we consider Orthogonal Time Frequency Space (OTFS) modulation based multiple-access (MA). We specifically consider Orthogonal MA methods (OMA) where the user terminals (UTs) are allocated non-overlapping physical resource in the delay-Doppler (DD) and/or time-frequency (TF) domain. To the best of our knowledge, in prior literature, the performance of OMA methods have been reported only for ideal transmit and receive pulses. In [20] and [21], OMA methods were proposed which were shown to achieve multi-user interference (MUI) free communication with ideal pulses. Since ideal pulses are not realizable, in this paper we study the spectral efficiency (SE) performance of these OMA methods with practical rectangular pulses. For these OMA methods, we derive the expression for the received DD domain symbols at the base station (BS) receiver and the effective DD domain channel matrix when rectangular pulses are used. We then derive the expression for the achievable sum SE. These expressions are also derived for another well known OMA method where guard bands (GB) are used to reduce MUI (called as the GB based MA methods) [19]. Through simulations, we observe that with rectangular pulses the sum SE achieved by the method in [21] is almost invariant of the Doppler shift and is higher than that achieved by the methods in [19], [20] at practical values of the received signal-to-noise ratio.

[7]  arXiv:2110.08768 [pdf, other]
Title: A Framework of Mahalanobis-Distance Metric with Supervised Learning for Clustering Multipath Components in MIMO Channel Analysis
Comments: 13 pages
Subjects: Information Theory (cs.IT); Signal Processing (eess.SP)

As multipath components (MPCs) are experimentally observed to appear in clusters, cluster-based channel models have been focused in the wireless channel study. However, most of the MPC clustering algorithms for MIMO channels with delay and angle information of MPCs are based on the distance metric that quantifies the similarity of two MPCs and determines the preferred cluster shape, greatly impacting MPC clustering quality. In this paper, a general framework of Mahalanobis-distance metric is proposed for MPC clustering in MIMO channel analysis, without user-specified parameters. Remarkably, the popular multipath component distance (MCD) is proved to be a special case of the proposed distance metric framework. Furthermore, two machine learning algorithms, namely, weak-supervised Mahalanobis metric for clustering and supervised large margin nearest neighbor, are introduced to learn the distance metric. To evaluate the effectiveness, a modified channel model is proposed based on the 3GPP spatial channel model to generate clustered MPCs with delay and angular information, since the original 3GPP spatial channel model (SCM) is incapable to evaluate clustering quality. Experiment results show that the proposed distance metric can significantly improve the clustering quality of existing clustering algorithms, while the learning phase requires considerably limited efforts of labeling MPCs.

[8]  arXiv:2110.08865 [pdf, other]
Title: System Outage Probability and Diversity Analysis of SWIPT Enabled Two-Way DF Relaying under Hardware Impairments
Comments: This paper has been accepted by China Communications
Subjects: Information Theory (cs.IT)

This paper investigates the system outage performance of a simultaneous wireless information and power transfer (SWIPT) based two-way decode-and-forward (DF) relay network, where potential hardware impairments (HIs) in all transceivers are considered. After harvesting energy and decoding messages simultaneously via a power splitting scheme, the energy-limited relay node forwards the decoded information to both terminals. Each terminal combines the signals from the direct and relaying links via selection combining. We derive the system outage probability under independent but non-identically distributed Nakagami-m fading channels. It reveals an overall system ceiling (OSC) effect, i.e., the system falls in outage if the target rate exceeds an OSC threshold that is determined by the levels of HIs. Furthermore, we derive the diversity gain of the considered network. The result reveals that when the transmission rate is below the OSC threshold, the achieved diversity gain equals the sum of the shape parameter of the direct link and the smaller shape parameter of the terminal-to-relay links; otherwise, the diversity gain is zero. This is different from the amplify-and-forward (AF) strategy, under which the relaying links have no contribution to the diversity gain. Simulation results validate the analytical results and reveal that compared with the AF strategy, the SWIPT based two-way relaying links under the DF strategy are more robust to HIs and achieve a lower system outage probability.

[9]  arXiv:2110.08964 [pdf, ps, other]
Title: Affine Hermitian Grassmann Codes
Subjects: Information Theory (cs.IT); Algebraic Geometry (math.AG)

The Grassmannian is an important object in Algebraic Geometry. One of the many techniques used to study the Grassmannian is to build a vector space from its points in the projective embedding and study the properties of the resulting linear code.
We introduce a new class of linear codes, called Affine Hermitian Grassman Codes. These codes are the linear codes resulting from an affine part of the projection of the Polar Hermitian Grassmann codes. They combine Polar Hermitian Grassmann codes and Affine Grassmann codes. We will determine the parameters of these codes and discuss their minimum distance codewords.

[10]  arXiv:2110.08980 [pdf, other]
Title: Location Information Assisted Beamforming Design for Reconfigurable Intelligent Surface Aided Communication Systems
Comments: 13 pages, 8 figures. This work has been submitted to the IEEE for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessible
Subjects: Information Theory (cs.IT); Signal Processing (eess.SP)

In reconfigurable intelligent surface (RIS) aided millimeter-wave (mmWave) communication systems, in order to overcome the limitation of the conventional channel state information (CSI) acquisition techniques, this paper proposes a location information assisted beamforming design without the requirement of the conventional channel training process. First, we establish the geometrical relation between the channel model and the user location, based on which we derive an approximate CSI error bound based on the user location error by means of Taylor approximation, triangle and power mean inequalities, and semidefinite relaxation (SDR). Second, for combating the uncertainty of the location error, we formulate a worst-case robust beamforming optimization problem. To solve the problem efficiently, we develop a novel iterative algorithm by utilizing various optimization tools such as Lagrange multiplier, matrix inversion lemma, SDR, as well as branch-and-bound (BnB). Particularly, the BnB algorithm is modified to acquire the phase shift solution under an arbitrary constraint of possible phase shift values. Finally, we analyse the algorithm complexity, and carry out simulations to validate the theoretical derivation of the CSI error bound and the robustness of the proposed algorithm. Compared with the existing non-robust approach and the robust beamforming techniques based on S-procedure and penalty convex-concave procedure (CCP), our method converges faster and achieves better performance in terms of the worst-case signal-to-noise ratio (SNR) at the receiver.

[11]  arXiv:2110.09001 [pdf, ps, other]
Title: Deep Learning-Based Power Control for Uplink Cell-Free Massive MIMO Systems
Comments: 6 pages, 6 figures, accepted by IEEE Globecom 2021
Subjects: Information Theory (cs.IT); Machine Learning (cs.LG); Signal Processing (eess.SP)

In this paper, a general framework for deep learning-based power control methods for max-min, max-product and max-sum-rate optimization in uplink cell-free massive multiple-input multiple-output (CF mMIMO) systems is proposed. Instead of using supervised learning, the proposed method relies on unsupervised learning, in which optimal power allocations are not required to be known, and thus has low training complexity. More specifically, a deep neural network (DNN) is trained to learn the map between fading coefficients and power coefficients within short time and with low computational complexity. It is interesting to note that the spectral efficiency of CF mMIMO systems with the proposed method outperforms previous optimization methods for max-min optimization and fits well for both max-sum-rate and max-product optimizations.

[12]  arXiv:2110.09089 [pdf, ps, other]
Title: DNA Codes over the Ring $\mathbb{Z}_4 + w\mathbb{Z}_4$
Comments: 32 pages
Subjects: Information Theory (cs.IT); Emerging Technologies (cs.ET); Rings and Algebras (math.RA)

In this present work, we generalize the study of construction of DNA codes over the rings $\mathcal{R}_\theta=\mathbb{Z}_4+w\mathbb{Z}_4$, $w^2 = \theta $ for $\theta \in \mathbb{Z}_4+w\mathbb{Z}_4$. Rigorous study along with characterization of the ring structures is presented. We extend the Gau map and Gau distance, defined in \cite{DKBG}, over all the $16$ rings $\mathcal{R}_\theta$. Furthermore, an isometry between the codes over the rings $\mathcal{R}_\theta$ and the analogous DNA codes is established in general. Brief study of dual and self dual codes over the rings is given including the construction of special class of self dual codes that satisfy reverse and reverse-complement constraints. The technical contributions of this paper are twofold. Considering the Generalized Gau distance, Sphere Packing-like bound, GV-like bound, Singleton like bound and Plotkin-like bound are established over the rings $\mathcal{R}_\theta$. In addition to this, optimal class of codes are provided with respect to Singleton-like bound and Plotkin-like bound. Moreover, the construction of family of DNA codes is proposed that satisfies reverse and reverse-complement constraints using the Reed-Muller type codes over the rings $\mathcal{R}_\theta$.

[13]  arXiv:2110.09123 [pdf, other]
Title: Joint Spatial Division and Coaxial Multiplexing for Downlink Multi-User OAM Wireless Backhaul
Subjects: Information Theory (cs.IT); Signal Processing (eess.SP)

Orbital angular momentum (OAM) at radio frequency (RF) provides a novel approach of multiplexing a set of orthogonal modes on the same frequency channel to achieve high spectral efficiencies (SEs). However, the existing research on OAM wireless communications is mainly focused on pointto-point transmission in the line-of-sight (LoS) scenario. In this paper, we propose an overall scheme of the downlink multi-user OAM (MU-OAM) wireless backhaul based on uniform circular arrays (UCAs) for broadcasting networks, which can achieve the joint spatial division and coaxial multiplexing (JSDCM). A salient feature of the proposed downlink MU-OAM wireless backhaul systems is that the channel matrices are completely characterized by the position of each small base station (SBS), independent of the numbers of subcarriers and antennas, which avoids estimating large channel matrices required by the traditional downlink multi-user multiple-input multiple-output (MU-MIMO) wireless backhaul systems. Thereafter, we propose an OAM-based multiuser distance and angle of arrival (AoA) estimation method, which is able to simultaneously estimate the positions of multiple SBSs with a flexible number of training symbols. With the estimated distances and AoAs, a MU-OAM preprocessing scheme is applied to eliminate the co-mode and inter-mode interferences in the downlink MU-OAM channel. At last, the proposed methods are extended to the downlink MU-OAM-MIMO wireless backhaul system equipped with uniform concentric circular arrays (UCCAs), for which much higher spectral efficiency (SE) and energy efficiency (EE) than traditional MU-MIMO systems can be achieved. Both mathematical analysis and simulation results validate that the proposed scheme can effectively eliminate both interferences of the practical downlink MU-OAM channel and approaches the performance of the ideal MU-OAM channel.

[14]  arXiv:2110.09215 [pdf, other]
Title: A Primer on the Statistical Relation between Wireless Ultra-Reliability and Location Estimation
Comments: 5 pages and 4 figures. Has been submitted in IEEE Wireless Communication Letters
Subjects: Information Theory (cs.IT); Signal Processing (eess.SP)

This letter statistically characterizes the impact of location estimation uncertainty in the wireless communication reliability, in which location information is used as a proxy to choose the rate. First, a Cram\'er-Rao bound for the localization error is derived. Then, through a simplified setup, we show that the reliability - characterized by how likely the outage probability is to be above a target threshold - can be sensitive to location errors, especially when the channel statistics are also sensitive to the location. Finally, we highlight the difficulty of choosing a rate that both meets target reliability and accounts for the location uncertainty, and that the most direct solutions suffer from being too conservative.

[15]  arXiv:2110.09244 [pdf, other]
Title: The search of Type I codes
Subjects: Information Theory (cs.IT); Mathematical Software (cs.MS)

A self-dual binary linear code is called Type I code if it has singly-even codewords, i.e.~it has codewords with weight divisible by $2.$ The purpose of this paper is to investigate interesting properties of Type I codes of different lengths. Further, we build up a computer-based code-searching program based on our knowledge about Type I codes. Some computation results achieved by this program are given.

[16]  arXiv:2110.09291 [pdf, ps, other]
Title: Reconfigurable Intelligent Surface-Enhanced OFDM Communications via Delay Adjustable Metasurface
Subjects: Information Theory (cs.IT); Signal Processing (eess.SP)

Reconfigurable intelligent surface (RIS) is a promising technology for establishing spectral- and energy-efficient wireless networks. In this paper, we study RIS-enhanced orthogonal frequency division multiplexing (OFDM) communications, which generalize the existing RIS-driven context focusing only on frequency-flat channels. Firstly, we introduce the delay adjustable metasurface (DAM) relying on varactor diodes. In contrast to existing reflecting elements, each one in DAM is capable of storing and retrieving the impinging electromagnetic waves upon dynamically controlling its electromagnetically induced transparency (EIT) properties, thus additionally imposing an extra delay onto the reflected incident signals. Secondly, we formulate the rate-maximization problem by jointly optimizing the transmit power allocation and the RIS reflection coefficients as well as the RIS delays. Furthermore, to address the coupling among optimization variables, we propose an efficient algorithm to achieve a high-quality solution for the formulated non-convex design problem by alternately optimizing the transmit power allocation and the RIS reflection pattern, including the reflection coefficients and the delays. Thirdly, to circumvent the high complexity for optimizing the RIS reflection coefficients, we conceive a low-complexity scheme upon aligning the strongest taps of all reflected channels, while ensuring that the maximum delay spread after introducing extra RIS delays does not exceed the length of the cyclic prefix (CP). Finally, simulation results demonstrate that the proposed design significantly improves the OFDM rate performance as well as the RIS's adaptability to wideband signals compared to baseline schemes without employing DAM.

[17]  arXiv:2110.09405 [pdf, ps, other]
Title: Capacity Region Bounds for the K user Dispersive Nonlinear Optical WDM Channel with Peak Power Constraints
Subjects: Information Theory (cs.IT)

It is known that fiber nonlinearities induce crosstalk in a wavelength division multiplexed (WDM) system, which limits the capacity of such systems especially at higher signal powers. Traditionally, the channel capacity of a single WDM user is analyzed under different assumptions for the transmitted signals of the other users. In this paper, we instead take a multi-user information theoretic view of an optical WDM channel impaired by cross-phase modulation and dispersion as an interference channel. We characterize, for the first time, an outer bound on the capacity region of simultaneously achievable rate pairs, assuming a general K-user perturbative channel model using genie-aided techniques. Furthermore, an achievable rate region is obtained by time-sharing between certain single-user strategies, and it is shown that the latter can achieve better rate tuples compared to treating nonlinear interference as noise.

Cross-lists for Tue, 19 Oct 21

[18]  arXiv:2110.08252 (cross-list from cs.LG) [pdf, other]
Title: A Rate-Distortion Framework for Explaining Black-box Model Decisions
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Information Theory (cs.IT)

We present the Rate-Distortion Explanation (RDE) framework, a mathematically well-founded method for explaining black-box model decisions. The framework is based on perturbations of the target input signal and applies to any differentiable pre-trained model such as neural networks. Our experiments demonstrate the framework's adaptability to diverse data modalities, particularly images, audio, and physical simulations of urban environments.

[19]  arXiv:2110.08414 (cross-list from quant-ph) [pdf, ps, other]
Title: Quantum Error Correction with Reflexive Stabilizer Codes and Cayley Graphs
Comments: 19 pages
Subjects: Quantum Physics (quant-ph); Information Theory (cs.IT); Mathematical Physics (math-ph)

Long distance communication of digital data, whether through a physical medium or a broadcast signal, is often subjected to noise. To deliver data reliably through noisy communication channels, one must use codes that can detect and correct the particular noise of the channel. For transmission of classical data, error correcting schemes can be as simple as the sending of replicates. For quantum data, and in tandem the development of machines that can process quantum data, quantum error correcting codes must be developed. In addition to a larger set of possible errors, quantum error correcting schemes must contend with other peculiarities of quantum mechanics, such as the no-cloning theorem which can prevent the sending of replicate messages. Stabilizer codes are one family of quantum error correcting codes which can protect and correct errors expressed in terms of the Pauli group, exploiting its group structure and utilizing classical codes and the corresponding duals. We develop and examine a family of quantum stabilizer codes which arise from reflexive stabilizers. Moreover, we provide a mapping from our reflexive stabilizer codes to the well-known CSS codes developed by Calderbank, Shor, and Steane. For the case of a 4-state system we show that these codes can obtain the minimal embedding for code which can correct any flip or phase error. We also provide heuristic algorithms for creating reflexive stabilizer codes starting from the noise of a quantum channel. Furthermore, we show that the problem can be posed in terms of finding maximal Cayley subgraphs with restrictions imposed by the set of potential errors.

[20]  arXiv:2110.08627 (cross-list from cs.LG) [pdf, other]
Title: On the Pareto Frontier of Regret Minimization and Best Arm Identification in Stochastic Bandits
Comments: 27 pages, 8 figures
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Information Theory (cs.IT); Machine Learning (stat.ML)

We study the Pareto frontier of two archetypal objectives in stochastic bandits, namely, regret minimization (RM) and best arm identification (BAI) with a fixed horizon. It is folklore that the balance between exploitation and exploration is crucial for both RM and BAI, but exploration is more critical in achieving the optimal performance for the latter objective. To make this precise, we first design and analyze the BoBW-lil'UCB$({\gamma})$ algorithm, which achieves order-wise optimal performance for RM or BAI under different values of ${\gamma}$. Complementarily, we show that no algorithm can simultaneously perform optimally for both the RM and BAI objectives. More precisely, we establish non-trivial lower bounds on the regret achievable by any algorithm with a given BAI failure probability. This analysis shows that in some regimes BoBW-lil'UCB$({\gamma})$ achieves Pareto-optimality up to constant or small terms. Numerical experiments further demonstrate that when applied to difficult instances, BoBW-lil'UCB outperforms a close competitor UCB$_{\alpha}$ (Degenne et al., 2019), which is designed for RM and BAI with a fixed confidence.

[21]  arXiv:2110.08673 (cross-list from cs.CR) [pdf, other]
Title: Scaling Blockchains: Can Elected Committees Help?
Subjects: Cryptography and Security (cs.CR); Computer Science and Game Theory (cs.GT); Information Theory (cs.IT); General Economics (econ.GN); Trading and Market Microstructure (q-fin.TR)

In the high-stakes race to develop more scalable blockchains, some platforms (Cosmos, EOS, TRON, etc.) have adopted committee-based consensus protocols, whereby the blockchain's record-keeping rights are entrusted to a committee of elected block producers. In theory, the smaller the committee, the faster the blockchain can reach consensus and the more it can scale. What's less clear, is whether this mechanism ensures that honest committees can be consistently elected, given voters typically have limited information. Using EOS' Delegated Proof of Stake (DPoS) protocol as a backdrop, we show that identifying the optimal voting strategy is complex and practically out of reach. We empirically characterize some simpler (suboptimal) voting strategies that token holders resort to in practice and show that these nonetheless converge to optimality, exponentially quickly. This yields efficiency gains over other PoS protocols that rely on randomized block producer selection. Our results suggest that (elected) committee-based consensus, as implemented in DPoS, can be robust and efficient, despite its complexity.

[22]  arXiv:2110.08775 (cross-list from cond-mat.dis-nn) [pdf, other]
Title: Perturbative construction of mean-field equations in extensive-rank matrix factorization and denoising
Comments: 28 pages (main text), 24 pages of references and appendices
Subjects: Disordered Systems and Neural Networks (cond-mat.dis-nn); Statistical Mechanics (cond-mat.stat-mech); Information Theory (cs.IT); Probability (math.PR)

Factorization of matrices where the rank of the two factors diverges linearly with their sizes has many applications in diverse areas such as unsupervised representation learning, dictionary learning or sparse coding. We consider a setting where the two factors are generated from known component-wise independent prior distributions, and the statistician observes a (possibly noisy) component-wise function of their matrix product. In the limit where the dimensions of the matrices tend to infinity, but their ratios remain fixed, we expect to be able to derive closed form expressions for the optimal mean squared error on the estimation of the two factors. However, this remains a very involved mathematical and algorithmic problem. A related, but simpler, problem is extensive-rank matrix denoising, where one aims to reconstruct a matrix with extensive but usually small rank from noisy measurements. In this paper, we approach both these problems using high-temperature expansions at fixed order parameters. This allows to clarify how previous attempts at solving these problems failed at finding an asymptotically exact solution. We provide a systematic way to derive the corrections to these existing approximations, taking into account the structure of correlations particular to the problem. Finally, we illustrate our approach in detail on the case of extensive-rank matrix denoising. We compare our results with known optimal rotationally-invariant estimators, and show how exact asymptotic calculations of the minimal error can be performed using extensive-rank matrix integrals.

[23]  arXiv:2110.08920 (cross-list from cs.LO) [pdf, other]
Title: Semantics of Conjectures
Authors: Alessio Rolfini
Comments: 17 pages, 1 figure
Subjects: Logic in Computer Science (cs.LO); Information Theory (cs.IT)

This paper aims to expand and detail the notion of formal semantics of Conjectures by applying a theoretic-model approach. After a short introduction to the concepts and basics of Conjectures, we will start from the notion of Simple Interpretation of RDF, applying and extending the semantic rules and conditions to fully cover the concepts and features of Conjectures.

[24]  arXiv:2110.09502 (cross-list from math.ST) [pdf, other]
Title: Minimum $\ell_{1}$-norm interpolators: Precise asymptotics and multiple descent
Authors: Yue Li, Yuting Wei
Subjects: Statistics Theory (math.ST); Information Theory (cs.IT); Machine Learning (cs.LG); Signal Processing (eess.SP); Machine Learning (stat.ML)

An evolving line of machine learning works observe empirical evidence that suggests interpolating estimators -- the ones that achieve zero training error -- may not necessarily be harmful. This paper pursues theoretical understanding for an important type of interpolators: the minimum $\ell_{1}$-norm interpolator, which is motivated by the observation that several learning algorithms favor low $\ell_1$-norm solutions in the over-parameterized regime. Concretely, we consider the noisy sparse regression model under Gaussian design, focusing on linear sparsity and high-dimensional asymptotics (so that both the number of features and the sparsity level scale proportionally with the sample size).
We observe, and provide rigorous theoretical justification for, a curious multi-descent phenomenon; that is, the generalization risk of the minimum $\ell_1$-norm interpolator undergoes multiple (and possibly more than two) phases of descent and ascent as one increases the model capacity. This phenomenon stems from the special structure of the minimum $\ell_1$-norm interpolator as well as the delicate interplay between the over-parameterized ratio and the sparsity, thus unveiling a fundamental distinction in geometry from the minimum $\ell_2$-norm interpolator. Our finding is built upon an exact characterization of the risk behavior, which is governed by a system of two non-linear equations with two unknowns.

Replacements for Tue, 19 Oct 21

[25]  arXiv:2010.02471 (replaced) [pdf, ps, other]
Title: Determination for minimum symbol-pair and RT weights via torsional degrees of repeated-root cyclic codes
Authors: Boran Kim
Subjects: Information Theory (cs.IT)
[26]  arXiv:2101.06722 (replaced) [pdf, other]
Title: Almost Optimal Construction of Functional Batch Codes Using Hadamard Codes
Subjects: Information Theory (cs.IT)
[27]  arXiv:2101.12146 (replaced) [pdf, other]
Title: Online Tensor Completion Based Prediction For Wireless Edge Caching
Subjects: Information Theory (cs.IT); Performance (cs.PF)
[28]  arXiv:2101.12161 (replaced) [pdf, other]
Title: Improved Rate-Energy Trade-off For SWIPT Using Chordal Distance Decomposition In Interference Alignment Networks
Subjects: Information Theory (cs.IT)
[29]  arXiv:2104.06084 (replaced) [pdf, ps, other]
Title: On the efficiency of polar-like decoding for symmetric codes
Comments: Accepted to IEEE Transactions on Communications. This work was partially presented at the International Symposium on Information Theory and Applications'2020
Subjects: Information Theory (cs.IT)
[30]  arXiv:2105.06451 (replaced) [pdf, ps, other]
Title: Outage Common Randomness Capacity Characterization of Multiple-Antenna Slow Fading Channels
Comments: arXiv admin note: text overlap with arXiv:2102.01197
Subjects: Information Theory (cs.IT)
[31]  arXiv:2108.03874 (replaced) [pdf, other]
Title: Zero-Error Feedback Capacity of Finite-State Additive Noise Channels for Stabilization of Linear Systems
Comments: arXiv admin note: text overlap with arXiv:2006.00892
Subjects: Information Theory (cs.IT)
[32]  arXiv:2108.13512 (replaced) [pdf, ps, other]
Title: Energy-Efficient Massive MIMO for Serving Multiple Federated Learning Groups
Comments: Accepted to appear in Proc. IEEE Global Communications Conference (GLOBECOM), Madrid, Spain, Dec. 2021. (v2). arXiv admin note: text overlap with arXiv:2107.09577
Subjects: Information Theory (cs.IT)
[33]  arXiv:2109.06721 (replaced) [pdf, ps, other]
Title: Linear block and convolutional MDS codes to required rate, distance and type
Authors: Ted Hurley
Subjects: Information Theory (cs.IT)
[34]  arXiv:2109.06992 (replaced) [pdf, other]
Title: ML-aided power allocation for Tactical MIMO
Comments: Accepted at MILCOM 2021
Subjects: Information Theory (cs.IT); Signal Processing (eess.SP)
[35]  arXiv:2109.14920 (replaced) [pdf, other]
Title: On the Kullback-Leibler divergence between discrete normal distributions
Authors: Frank Nielsen
Comments: 26 pages
Subjects: Information Theory (cs.IT)
[36]  arXiv:2110.01798 (replaced) [pdf, other]
Title: Enabling Cell-Free Massive MIMO Systems with Wireless Millimeter Wave Fronthaul
Comments: Submitted, 30 pages, 7 figures
Subjects: Information Theory (cs.IT); Signal Processing (eess.SP)
[37]  arXiv:2110.05279 (replaced) [pdf, ps, other]
Title: Sliced Mutual Information: A Scalable Measure of Statistical Dependence
Subjects: Information Theory (cs.IT)
[38]  arXiv:2110.07233 (replaced) [pdf, ps, other]
Title: Optimal Update in Energy Harvesting Aided Terahertz Communications with Random Blocking
Comments: 9 pages, 4 Postscript figures
Subjects: Information Theory (cs.IT)
[39]  arXiv:2012.11026 (replaced) [pdf]
Title: Independent Approximates enable closed-form parameter estimation of heavy-tailed distributions
Authors: Kenric P. Nelson
Comments: 30 pages, 8 figures, 7 tables
Subjects: Methodology (stat.ME); Information Theory (cs.IT); Data Analysis, Statistics and Probability (physics.data-an)
[40]  arXiv:2105.08024 (replaced) [pdf, other]
Title: Sample-Efficient Reinforcement Learning Is Feasible for Linearly Realizable MDPs with Limited Revisiting
Subjects: Machine Learning (cs.LG); Information Theory (cs.IT); Optimization and Control (math.OC); Statistics Theory (math.ST); Machine Learning (stat.ML)
[41]  arXiv:2106.05232 (replaced) [pdf, ps, other]
Title: Realizing GANs via a Tunable Loss Function
Comments: Extended version of a paper accepted to ITW 2021. 8 pages, 2 figures
Subjects: Machine Learning (cs.LG); Information Theory (cs.IT); Machine Learning (stat.ML)
[42]  arXiv:2106.15358 (replaced) [pdf, other]
Title: Towards Sample-Optimal Compressive Phase Retrieval with Sparse and Generative Priors
Comments: Accepted to NeurIPS 2021
Subjects: Machine Learning (stat.ML); Information Theory (cs.IT); Machine Learning (cs.LG)
[ total of 42 entries: 1-42 ]
[ showing up to 2000 entries per page: fewer | more ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, recent, 2110, contact, help  (Access key information)