Research Collection. Mismatched decoding for the relay channel. Conference Paper. ETH Library. Author(s): Hucher, Charlotte; Sadeghi, Parastoo
|
|
- Patrick Norton
- 5 years ago
- Views:
Transcription
1 Researh Colletion Conferene Paper Mismathed deoding for the relay hannel Author(s): Huher, Charlotte; Sadeghi, Parastoo Publiation Date: 2010 Permanent Link: Rights / Liense: In Copyright - Non-Commerial Use Permitted This page was generated automatially upon download from the ETH Zurih Researh Colletion. For more information please onsult the Terms of use. ETH Library
2 Mismathed Deoding for the Relay Channel Charlotte Huher and Parastoo Sadeghi The Australian National University, Canberra, ACT, 0200, Australia Abstrat We onsider a disrete memoryless relay hannel, both relay and destination may have an inorret estimation of the hannel. This estimation error is modeled with mismathed deoders. In this paper, we provide a lower-bound on the mismath apaity of the relay hannel. Moreover, we prove that this lower-bound is indeed the exat apaity for the degraded relay hannel when random oding is used. I. INTRODUCTION The deoding method that minimizes the error probability is the maximum-likelihood (ML) deoder. However, it annot always be implemented in pratie beause of some hannel estimation errors or hardware limitations. An alternative deoder an then be a mismathed one, based on a different metri. The theoretial performane of mismathed deoding has been studied sine the 1980 s when Csiszàr and Körner in [1], and Hui in [2] both provided a lower-bound on the ahievable apaity in a point-to-point ommuniation hannel. In [3], the authors proved that this lower-bound is the exat apaity when random oding is used. The mismath apaity of multiple-aess hannels has also been haraterized in [4]. There is inreasing evidene that future wireless ommuniations will be based not on point-to-point transmission anymore, but on ooperation between the nodes in a network (see [5],[6]). The simplest model of a ooperative network is the relay hannel for whih apaity bounds have been derived in 1979 by Cover and El Gamal in [7]. In this paper, we onsider a disrete memoryless relay hannel with mismathed deoders at both reeivers (the relay and the destination). We provide a lower-bound on the mismath apaity of suh a hannel and prove that it is indeed the exat apaity of the mismathed degraded relay hannel when random oding is used. II. THE RELAY CHANNEL AND MISMATCHED DECODER We onsider a disrete memoryless relay hannel onsisting of one soure, one relay and one destination. We use the same setup as in [7]: The soure broadasts a signal x 1 X 1 whih is reeived by both the relay and the destination. The relay transmits a signal x 2 X 2 whih is reeived by the destination. Reeived signals at relay and destination are denoted by y 1 Y 1 and y Y respetively (see Figure 1). The hannel is modeled by a set of probability distributions p(y 1,y x 1,x 2 ). We onsider three mismathed deoders using the metris q sr (x 1,x 2,y 1 ), q rd (x 2,y) and q sd (x 1,x 2,y), the subsripts sr, rd and sd stand for the soure-relay, relay-destination and soure-destination links, respetively. w enoder x 1 y 1 Fig. 1. relay deoder/enoder p(y 1,y x 1,x 2 ) x 2 Relay hannel y deoder The following setup is used to prove the ahievability of the lower-bound on the mismath apaity derived in this paper. We onsider the transmission of B bloks of length n. In eah blok i {1,...,B, a message w i {1,...,2 nr is transmitted from the soure. Let us partition the set {1,...,2 nr into 2 nr0 independent subsets denoted by S s,s {1,...,2 nr0, suh that any w i {1,...,2 nr belongs to a unique subset S si. The message is then oded as x 1 (w i s i ) X1 n and x 2(s i ) X2 n at the soure and relay, respetively. Random oding: The hoie of the set C = {x 1 (..),x 2 (.) of odewords is random: 2 nr0 iid odewords in X2 n are first generated aording to the probability distribution p(x 2 )= n i=1 p(x 2i) and indexed by s {1,...,2 nr0 : x 2 (s); for eah x 2 (s), 2 nr iid odewords in X1 n are generated aording to the probability distribution p(x 1 x 2 (s)) and indexed by w {1,...,2 nr : x 1 (w s). Two transmission steps: Let us assume that (i 2) bloks have already been sent. Thus the relay has already deoded w i 2 and s i 1, the destination has deoded w i 3 and s i 2. In order to derive a lower bound on the apaity of the mismathed relay hannel, we hoose to use threshold deoders as in [2], [4]. Indeed, it an be proven that the deoding error probability of an ML mismathed deoder (whih is implemented in pratie) is upper-bounded by the deoding error probability of the onsidered threshold deoder. In blok (i 1), the soure and relay transmit x 1 (w i 1 s i 1 ) and x 2 (s i 1 ), respetively; the relay and destination reeive y 1 (i 1) and y(i 1). The relay is able to detet w i 1 as the unique w suh that (x 1 (w s i 1 ), x 2 (s i 1 ), y 1 (i 1)) is jointly typial and q sr (x 1 (w s i 1 ), x 2 (s i 1 ), y 1 (i 1)) is larger than a threshold to be defined later. The relay is thus able to determine s i suh that w i 1 S si. The soure is obviously also aware of s i. In blok i, the soure and relay transmit x 1 (w i s i ) and x 2 (s i ), respetively; the relay and destination reeive y 1 (i) and y(i). The destination an detet s i as the unique s suh that (x 2 (s i ), y(i)) is jointly typial and q rd (x 2 (s i ), y(i)) is larger than some threshold. It is then able to detet w 25
3 w i 1 as the unique w suh that w S si L(y(i 1)), L(y(i 1)) is the set of all w {1,...,2 nr suh that (x 1 (w s i 1 ), x 2 (s i 1 ), y(i 1)) is jointly typial and q sd (x 1 (w s i 1 ), x 2 (s i 1 ), y(i 1)) is larger than some threshold. Notation: Let E p (q(x)) denote the expeted value of q(x) w.r.t. the probability distribution p(x). LetI f (X; Y ) denote the usual mutual information between X and Y w.r.t. the probability distribution f(x, y). For a probability distribution p(x) on a finite set X and a onstant δ > 0, let Np(x) δ denote the set of all probability distributions on X that are within δ of p(x): Np(x) δ = {f P(X ): x X, f(x) p(x) δ. LetT p(x) δ be the set of all sequenes in X n whose type is in N p(x) δ : Tp(x) {x δ = X n : f x Np(x) δ,f x (x) is the number of elements of the sequene x that are equal to x, normalized by the sequene length n. In the following, we drop the subsript arguments when the ontext is lear enough and write f(x) Np δ and (x, y) Tp δ. III. MAIN RESULTS Theorem 1: (Ahievability) Consider a disrete memoryless relay hannel desribed by the probability distribution p(y 1,y x 1,x 2 ). The apaity C M obtained using the mismathed deoders q sr (x 1,x 2,y 1 ), q rd (x 2,y) and q sd (x 1,x 2,y) is lower-bounded by: C LM = max I LM(p(x 1,x 2 )) (1) p(x 1,x 2) I LM (p(x 1,x 2 )) = min{i sr (p(x 1,x 2 )),I rd (p(x 2 )) + I sd (p(x 1,x 2 )) (2) I sr (p(x 1,x 2 )) = min I f (X 1 ; Y 1 X 2 )+I f (X 1 ; X 2 ) (3) I rd (p(x 2 )) = min I f (X 2 ; Y ) f D rd (4) I sd (p(x 1,x 2 )) = min I f (X 1 ; Y X 2 )+I f (X 1 ; X 2 ) f D sd (5) and D sr ={f(x 1,x 2,y 1 ):f(x 1 )=p(x 1 ),f(x 2,y 1 )=p(x 2,y 1 ), E f (q sr (x 1,x 2,y 1 )) E p (q sr (x 1,x 2,y 1 )) (6) D rd ={f(x 2,y):f(x 2 )=p(x 2 ),f(y) =p(y), E f (q rd (x 2,y)) E p (q rd (x 2,y)) (7) D sd ={f(x 1,x 2,y):f(x 1 )=p(x 1 ),f(x 2,y)=p(x 2,y), E f (q sd (x 1,x 2,y)) E p (q sd (x 1,x 2,y)). (8) Let now suppose that there exist three probability distributions ˆf i, i {sr, rd, sd suh that E ˆfi (q i ) >E p (q i ) with strit inequality. Theorem 2: (Converse) With the above assumption and for a degraded relay hannel, if for some input distribution p(x 1,x 2 ),therater>c LM, then the average probability of error, averaged over all random odebooks drawn aording to p(x 1,x 2 ), approahes one as the blok length tends to infinity. IV. PROOF OF THEOREM 1 A. Upper-bounding the error probability In order to prove the ahievability of this lower-bound, we onsider the four possible error events desribed in [7] adapted to the use of a threshold deoder. For eah blok i, these possible error events are: E 0i : (x 1 (w i s i ), x 2 (s i ), y 1 (i), y(i)) is not jointly typial; E 1i : there exists w w i suh that (x 1 ( w s i ), x 2 (s i ), y 1 (i)) is jointly typial and q sr (x 1 ( w s i ), x 2 (s i ), y 1 (i)) is larger than some threshold; E 2i : there exists s s i suh that (x 2 ( s), y(i)) is jointly typial and q rd (x 2 ( s), y(i)) is larger than some threshold; E 3i = E 3i E 3i E 3i : w i 1 / S si L(y(i 1)) E 3i : there exists w w i 1 suh that w S si L(y(i 1)). Let F i be the deoding error event in blok i. Let us assume that no error has ourred till blok i 1. Thus, the deoding error probability in blok i is given by: { 3 k 1 3 p e (i) = Pr E ki Fi 1 Eli p ek (i). k=0 l=0 k=0 1) Probability of error event E 0i : By Sanov s theorem [8, Theorem ], this probability is exponentially small in n. There exists ψ>0 suh that p e0 (i) < 2 nψ. 2) Probability of error event E 1i : An error ours if there exists w w i suh that the metri q sr (x 1 ( w s i ), x 2 (s i ), y 1 (i)) is greater than the threshold Υ δ sr =min p(x 1,x 2,y 1 )q sr (x 1,x 2,y 1 ), δ (x 1,x 2,y 1) X 1 X 2 Y 1 δ is a small positive number. The probability of error event E 1i is thus given by p e1 (i) =Pr{ w w i, x 1 ( w s i ) T δ p, q sr (x 1 ( w s i ), x 2 (s i ), y 1 (i)) Υ δ sr F i 1. Using Sanov s theorem, we obtain the upper-bound R sr δ = p e1 (i) (2 nr 1)(n +1) X1 X2 Y1 2 n R δ sr (n +1) X1 X2 Y1 2 n( R δ sr R), min f(x 1,x 2,y) D δ sr D(f(x 1,x 2,y 1 ) p(x 1 )p(x 2,y 1 )) (10) Dsr δ = {f(x 1,x 2,y 1 ):f(x 1 ) Np δ,f(x 2,y 1 ) Np δ, E f (q sr (x 1,x 2,y 1 )) Υ δ sr, (11) with D(..) denoting the KL divergene [8, equation (2.26)]. Thus, if R < R sr, δ the probability of error event E 1i is exponentially small in n: p e1 (i) < 2 nψ for some ψ>0. (9) 26
4 3) Probability of error event E 2i : Using the threshold Υ δ rd =min p(x 2,y)q rd (x 2,y), (12) δ (x 2,y) X 2 Y we an write the probability of error event E 2i as p e2 (i) =Pr { s s i, x 2 ( s) Tp δ,q rd (x 2 ( s), y(i)) Υ δ rd Fi 1 (n +1) X2 Y 2 n( R δ rd R0), the upper-bound is obtained using Sanov s theorem with R rd δ = min D(f(x 2,y) p(x 2 )p(y)) (13) f(x 2,y) D δ rd Drd δ = {f(x 2,y):f(x 2 ) Np δ,f(y) Np δ, E f (q rd (x 2,y)) Υ δ rd. (14) If R 0 < R rd δ,thenp e2(i) < 2 nψ for some ψ>0. 4) Probability of error event E 3i : Error event E 3i an be deomposed into two different events E 3i and E 3i. If we assume that the previous transmission was orretly reeived at destination, then w i 1 L(y(i 1)). Moreover, the fat that the error event E 2i does not our implies that w i 1 Sŝi = S si. Thus the first term of the deomposition has a probability zero and we only need to onsider E p e3 (i) =Pr { w w i 1, w S si L(y(i 1)) Fi 1 E Pr { w S si Fi 1 w w i 1, w L(y(i 1)) E { L(y(i 1)) 2 nr0 Fi 1. denotes the ardinality of the onsidered set. Let 1, x 1 ( w s i 1 ) Tp δ, ϕ( w y) = q sd (x 1 ( w s i 1 ), x 2 (s i 1 ), y(i 1)) Υ δ sd 0, otherwise. the threshold is defined by Υ δ sd =min p(x 1,x 2,y)q sd (x 1,x 2,y). δ (x 1,x 2,y) X 1 X 2 Y (15) Using Sanov s theorem, we an upper-bound the expeted ardinality of L(y(i 1)) given that w w i 1 R sd δ = E { L(y(i 1)) w w i 1 F = E ϕ( w y) F w w i 1 i 1 i 1 (2 nr 1)(n +1) X1 X2 Y 2 n R δ sd (n +1) X1 X2 Y 2 n( R δ sd R), min f(x 1,x 2,y) D δ sd 3i. D(f(x 1,x 2,y) p(x 1 )p(x 2,y)) (16) Dsd δ = {f(x 1,x 2,y):f(x 1 ) Np δ,f(x 2,y) Np δ, E f (q sd (x 1,x 2,y)) Υ δ sd. (17) The error probability is then upper-bounded by p e3 (i) (n +1) X1 X2 Y 2 n( R δ sd R) 2 nr0 (n +1) X1 X2 Y 2 n( R δ sd +R0 R). Replaing R 0 by the onstraint previously omputed p e3 (i) (n +1) X1 X2 Y 2 n( R δ sd + R δ rd R). If R< R δ sd + R δ rd,thenp e3(i) < 2 nψ for some ψ>0. B. Existene of a random ode If R < R sr δ and R < R rd δ + R sd δ, then the total error probability is exponentially small in n: p e < 4B 2 nψ. Thus, as n tends to infinity, the probability of finding a set of odewords C respeting p e (C) < 4B 2 nψ tends to one. Let C be suh a set of odewords of length n. Its average error probability is lower than 4B 2 nψ.throwingaway the worst half of the odewords, we end up with a set of odewords C of length n 2 whose maximum error probability is lower than 2 4B 2 nψ, whih tends to zero, and whose rate is R 1 n whih tends to R. C. Letting δ tend to zero We note that lim δ 0 Υδ sr = E p (q sr (x 1,x 2,y 1 )). Thus, the set Dsr δ beomes D sr ={f(x 1,x 2,y 1 ):f(x 1 )=p(x 1 ),f(x 2,y 1 )=p(x 2,y 1 ), E f (q sr (x 1,x 2,y 1 )) E p (q sr (x 1,x 2,y 1 )) and with these new onstraints on the probability distribution D(f(x 1,x 2,y 1 ) p(x 1 )p(x 2,y 1 )) = I f (X 1 ; Y 1 X 2 )+I f (X 1 ; X 2 ). Thus the first onstraint of the rate beomes I sr (p(x 1,x 2 )) min I f (X 1 ; Y 1 X 2 )+I f (X 1 ; X 2 ). (18) In the same way, we find the final expressions of I rd (p(x 1,x 2 )) and I sd (p(x 1,x 2 )). V. PROOF OF THEOREM 2 The proof of Theorem 2 is in essene similar to the one of [4, Theorem 3]. A. Deoding at relay Let us assume that R> min I f (X 1 ; Y 1 X 2 )+I f (X 1 ; X 2 ). (19) Let f be the probability distribution that ahieves (19). Let f =(1 ɛ)f + ɛ ˆf sr. We reall that ˆfsr is a probability distribution that respets E ˆfsr (q sr ) > E p (q sr ). Then, for suffiiently small ɛ, R>I f (X 1 ; Y 1 X 2 )+I f (X 1 ; X 2 ) (20) E f (q sr ) >E p (q sr ). (21) 27
5 Using (20), (21) and the ontinuity of the divergene, we an find Δ > 0, ɛ>0 and a neighborhood U of f(x 1,x 2,y 1 ) suh that for all f U and p (x 2,y 1 ) N ɛ p,wehave R>D(f(x 1 x 2,y 1 ) p(x 1 ) p (x 2,y 1 )) + Δ (22) E f (q sr ) >E p (q sr )+Δ, (23) D(...) is defined in [4]. Let V be a suffiiently small neighborhood of p(x 1,x 2,y 1 ), suh that for every p (x 1,x 2,y 1 ) V,thenp (x 2,y 1 ) N ɛ p and E p (q sr ) <E p (q sr )+Δ. (24) Let us assume that the true message in blok i is w i and that the triple (x 1 (w i s i ), x 2 (s i ), y 1 (i)) has empirial type in V. If there exists another message w w i suh that the empirial type of (x 1 ( w s i ), x 2 (s i ), y 1 (i)) is in U, then a deoding error ours. Let W ( w) take the value 1 if the empirial type of (x 1 ( w s i ), x 2 (s i ), y 1 (i)) is in U and 0 otherwise. The expetation of W = w w i W ( w) given y 1 is E(W y 1 )=(2 nr 1)π 0. =2 nr π 0, (25) =. denotes the behavior of the expression when n and π 0 = E(W ( w ) y 1 ) = Pr{W ( w ) = 1 y 1 with w being a random message different from w i. For two different messages w and w,theeventsw( w) and W ( w ) are independent. Thus the variane of W given y 1 is Var(W y 1 )= w w i Var(W ( w) y 1 ). Sine W ( w) an only take the values 0 and 1, we an upperbound Var(W ( w) y 1 ) E(W ( w) y 1 ). Thus Var(W y 1 ) w w i E(W ( w) y 1 ). =2 nr π 0. (26) Using (25), (26) and the fat that for any random variable X, Pr(X =0) Var(X) E(X) 2, we an write Pr(W =0 y 1 ) 2nR π 0 (2 nr π 0 ) 2 =2 nr 1 π 0. (27) Using the seond part of Sanov s theorem, we obtain the asymptoti behavior π 0. = 2 n R sr, Rsr = min f U D(f(x 1 x 2,y 1 ) p(x 1 ) p (x 2,y 1 )). Using (22), we an then lower-bound π 0 2 n(r Δ) and onlude that the probability of no deoding error tends to 0 when n : Pr(W =0 y 1 ) 2 nr 2 n(r Δ) =2 nδ. (28) B. Deoding at destination The seond inequality an be dealt in two separate parts. Indeed, we have shown in the diret part that R 0 min I f (X 2 ; Y ) f D rd (29) R R 0 + min I f (X 1 ; Y X 2 )+I f (X 1 ; X 2 ). f D sd (30) We thus have to show that if one of these inequalities is reversed, an error ours with asymptoti probability one. This an be done using the same reasoning as in previous subsetion. VI. MATCHED DECODING CASE In the mathed deoding ase, i.e. q sr (x 1,x 2,y 1 ) = log p(y 1 x 1,x 2 ), q rd (x 2,y) = logp(y x 2 ) and q sd (x 1,x 2,y) = logp(y x 1,x 2 ), the apaity oinides with the one of degraded relay omputed by Cover and El Gamal in [7]. Indeed, for any distribution f D sr,wehave I f (X 1 ; Y 1 X 2 )+I f (X 1 ; X 2 ) I f (X 1 ; Y 1 X 2 ) = H(Y 1 X 2 ) H f (Y 1 X 1,X 2 ) (31) H(Y 1 X 2 )+ f(x 1,x 2,y 1 )logp(y 1 x 1,x 2 ) (32) x 1,x 2,y 1 H(Y 1 X 2 )+ p(x 1,x 2,y 1 )logp(y 1 x 1,x 2 ) (33) x 1,x 2,y 1 = I(X 1 ; Y 1 X 2 ), (31) holds beause f(x 2,y 1 )=p(x 2,y 1 ), (32) follows from the non-negativity of the divergene and (33) is obtained using E f (log p(y 1 x 1,x 2 )) E(log p(y 1 x 1,x 2 )). Moreover, by hoosing f(x 1,x 2,y 1 ) = p(x 1 )p(x 2 )p(y 1 x 1,x 2 ) D sr, I f (X 1 ; X 2 ) = 0 and I f (X 1 ; Y 1 X 2 )+I f (X 1 ; X 2 )=I(X 1 ; Y 1 X 2 ). The bound is ahievable, so I sr (p(x 1,x 2 )) = I(X 1 ; Y 1 X 2 ). In the same way, we an prove that I rd (p(x 1,x 2 )) = I(X 2 ; Y ) and I sd (p(x 1,x 2 )) = I(X 1 ; Y X 2 ). Finally, in the mathed ase, the following rate is ahievable R =min{i(x 1 ; Y 1 X 2 ),I(X 2 ; Y )+I(X 1 ; Y X 2 ) (34) =min{i(x 1 ; Y 1 X 2 ),I(X 1,X 2 ; Y ). (35) ACKNOWLEDGEMENT This work was supported under Australian Researh Counil s Disovery Projets funding sheme (projet no. DP ). The authors would also like to thank Prof. Lapidoth for useful disussions. REFERENCES [1] I. Csiszàr and J. Körner, Graph deomposition: A new key to oding theorems, IEEE Trans. Inform. Theory, vol. 27, no. 1, pp. 5 12, Jan [2] J. Hui, Fundamental issues of multiple aessing, Ph.D. dissertation, M.I.T., 1983, hap. IV. [3] N. Merhav, G. Kaplan, A. Lapidoth, and S. Shamai Shitz, On information rates for mismathed deoders, IEEE Trans. Inform. Theory, vol. 40, no. 6, pp , Nov [4] A. Lapidoth, Mismathed deoding and the multiple-aess hannel, IEEE Trans. Inform. Theory, vol. 42, no. 5, pp , Sep [5] A. Sendonaris, E. Erkip, and B. Aazhang, User Cooperation Diversity. Part I and II, IEEE Trans. Commun., vol. 51, no. 11, pp , Nov [6] A. Nosratinia and A. Hedayat, Cooperative Communiation in Wireless Networks, IEEE Commun. Mag., vol. 42, no. 10, pp , Ot [7] T. Cover and A. Gamal, Capaity theorems for the relay hannel, IEEE Trans. Inform. Theory, vol. 25, no. 5, pp , Sep [8] T. M. Cover and J. A. Thomas, Elements of Information Theory, 2nd ed. Wiley-Intersiene,
Broadcast Channels with Cooperating Decoders
To appear in the IEEE Transations on Information Theory, Deember 2006. 1 Broadast Channels with Cooperating Deoders Ron Dabora Sergio D. Servetto arxiv:s/0505032v3 [s.it] 1 Nov 2006 Abstrat We onsider
More informationFrequency hopping does not increase anti-jamming resilience of wireless channels
Frequeny hopping does not inrease anti-jamming resiliene of wireless hannels Moritz Wiese and Panos Papadimitratos Networed Systems Seurity Group KTH Royal Institute of Tehnology, Stoholm, Sweden {moritzw,
More informationELG 5372 Error Control Coding. Claude D Amours Lecture 2: Introduction to Coding 2
ELG 5372 Error Control Coding Claude D Amours Leture 2: Introdution to Coding 2 Deoding Tehniques Hard Deision Reeiver detets data before deoding Soft Deision Reeiver quantizes reeived data and deoder
More informationCoding for Noisy Write-Efficient Memories
Coding for oisy Write-Effiient Memories Qing Li Computer Si. & Eng. Dept. Texas A & M University College Station, TX 77843 qingli@se.tamu.edu Anxiao (Andrew) Jiang CSE and ECE Departments Texas A & M University
More informationNonreversibility of Multiple Unicast Networks
Nonreversibility of Multiple Uniast Networks Randall Dougherty and Kenneth Zeger September 27, 2005 Abstrat We prove that for any finite direted ayli network, there exists a orresponding multiple uniast
More informationCase I: 2 users In case of 2 users, the probability of error for user 1 was earlier derived to be 2 A1
MUTLIUSER DETECTION (Letures 9 and 0) 6:33:546 Wireless Communiations Tehnologies Instrutor: Dr. Narayan Mandayam Summary By Shweta Shrivastava (shwetash@winlab.rutgers.edu) bstrat This artile ontinues
More informationThe Capacity Loss of Dense Constellations
The Capaity Loss of Dense Constellations Tobias Koh University of Cambridge tobi.koh@eng.am.a.uk Alfonso Martinez Universitat Pompeu Fabra alfonso.martinez@ieee.org Albert Guillén i Fàbregas ICREA & Universitat
More informationOn the Designs and Challenges of Practical Binary Dirty Paper Coding
On the Designs and Challenges of Pratial Binary Dirty Paper Coding 04 / 08 / 2009 Gyu Bum Kyung and Chih-Chun Wang Center for Wireless Systems and Appliations Shool of Eletrial and Computer Eng. Outline
More informationOn the Bit Error Probability of Noisy Channel Networks With Intermediate Node Encoding I. INTRODUCTION
5188 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 54, NO. 11, NOVEMBER 2008 [8] A. P. Dempster, N. M. Laird, and D. B. Rubin, Maximum likelihood estimation from inomplete data via the EM algorithm, J.
More informationAssessing the Performance of a BCI: A Task-Oriented Approach
Assessing the Performane of a BCI: A Task-Oriented Approah B. Dal Seno, L. Mainardi 2, M. Matteui Department of Eletronis and Information, IIT-Unit, Politenio di Milano, Italy 2 Department of Bioengineering,
More informationTHE classical noiseless index coding problem consists of. Lattice Index Coding. arxiv: v3 [cs.it] 7 Oct 2015
Lattie Index Coding Lakshmi Natarajan, Yi Hong, Senior Member, IEEE, and Emanuele Viterbo, Fellow, IEEE arxiv:40.6569v3 [s.it] 7 Ot 05 Abstrat The index oding problem involves a sender with K messages
More informationProbabilistic Graphical Models
Probabilisti Graphial Models David Sontag New York University Leture 12, April 19, 2012 Aknowledgement: Partially based on slides by Eri Xing at CMU and Andrew MCallum at UMass Amherst David Sontag (NYU)
More informationMulti-version Coding for Consistent Distributed Storage of Correlated Data Updates
Multi-version Coding for Consistent Distributed Storage of Correlated Data Updates Ramy E. Ali and Vivek R. Cadambe 1 arxiv:1708.06042v1 [s.it] 21 Aug 2017 Abstrat Motivated by appliations of distributed
More informationMethods of evaluating tests
Methods of evaluating tests Let X,, 1 Xn be i.i.d. Bernoulli( p ). Then 5 j= 1 j ( 5, ) T = X Binomial p. We test 1 H : p vs. 1 1 H : p>. We saw that a LRT is 1 if t k* φ ( x ) =. otherwise (t is the observed
More informationComplexity of Regularization RBF Networks
Complexity of Regularization RBF Networks Mark A Kon Department of Mathematis and Statistis Boston University Boston, MA 02215 mkon@buedu Leszek Plaskota Institute of Applied Mathematis University of Warsaw
More informationChapter 8 Hypothesis Testing
Leture 5 for BST 63: Statistial Theory II Kui Zhang, Spring Chapter 8 Hypothesis Testing Setion 8 Introdution Definition 8 A hypothesis is a statement about a population parameter Definition 8 The two
More informationAn Achievable Error Exponent for the Mismatched Multiple-Access Channel
An Achievable Error Exponent for the Mismatched Multiple-Access Channel Jonathan Scarlett University of Cambridge jms265@camacuk Albert Guillén i Fàbregas ICREA & Universitat Pompeu Fabra University of
More informationSINCE Zadeh s compositional rule of fuzzy inference
IEEE TRANSACTIONS ON FUZZY SYSTEMS, VOL. 14, NO. 6, DECEMBER 2006 709 Error Estimation of Perturbations Under CRI Guosheng Cheng Yuxi Fu Abstrat The analysis of stability robustness of fuzzy reasoning
More informationDESIGN FOR DIGITAL COMMUNICATION SYSTEMS VIA SAMPLED-DATA H CONTROL
DESIG FOR DIGITAL COMMUICATIO SYSTEMS VIA SAMPLED-DATA H COTROL M agahara 1 Y Yamamoto 2 Department of Applied Analysis and Complex Dynamial Systems Graduate Shool of Informatis Kyoto University Kyoto
More informationA Queueing Model for Call Blending in Call Centers
A Queueing Model for Call Blending in Call Centers Sandjai Bhulai and Ger Koole Vrije Universiteit Amsterdam Faulty of Sienes De Boelelaan 1081a 1081 HV Amsterdam The Netherlands E-mail: {sbhulai, koole}@s.vu.nl
More informationNational University of Singapore Department of Electrical & Computer Engineering. Examination for
National University of Singapore Department of Electrical & Computer Engineering Examination for EE5139R Information Theory for Communication Systems (Semester I, 2014/15) November/December 2014 Time Allowed:
More informationHankel Optimal Model Order Reduction 1
Massahusetts Institute of Tehnology Department of Eletrial Engineering and Computer Siene 6.245: MULTIVARIABLE CONTROL SYSTEMS by A. Megretski Hankel Optimal Model Order Redution 1 This leture overs both
More informationSpatial Degrees of Freedom of Large Distributed MIMO Systems and Wireless Ad hoc Networks
Spatial Degrees of Freedom of Large Distributed MIMO Systems and Wireless Ad ho Networks Ayfer Özgür Stanford University aozgur@stanford.edu Olivier Lévêque EPFL, Switzerland olivier.leveque@epfl.h David
More informationCMSC 451: Lecture 9 Greedy Approximation: Set Cover Thursday, Sep 28, 2017
CMSC 451: Leture 9 Greedy Approximation: Set Cover Thursday, Sep 28, 2017 Reading: Chapt 11 of KT and Set 54 of DPV Set Cover: An important lass of optimization problems involves overing a ertain domain,
More informationA Half-Duplex Cooperative Scheme with Partial Decode-Forward Relaying
A Half-Duplex Cooperative Scheme with Partial Decode-Forward Relaying Ahmad Abu Al Haija, and Mai Vu, Department of Electrical and Computer Engineering McGill University Montreal, QC H3A A7 Emails: ahmadabualhaija@mailmcgillca,
More informationLECTURE NOTES FOR , FALL 2004
LECTURE NOTES FOR 18.155, FALL 2004 83 12. Cone support and wavefront set In disussing the singular support of a tempered distibution above, notie that singsupp(u) = only implies that u C (R n ), not as
More informationDIGITAL DISTANCE RELAYING SCHEME FOR PARALLEL TRANSMISSION LINES DURING INTER-CIRCUIT FAULTS
CHAPTER 4 DIGITAL DISTANCE RELAYING SCHEME FOR PARALLEL TRANSMISSION LINES DURING INTER-CIRCUIT FAULTS 4.1 INTRODUCTION Around the world, environmental and ost onsiousness are foring utilities to install
More informationEstimating the probability law of the codelength as a function of the approximation error in image compression
Estimating the probability law of the odelength as a funtion of the approximation error in image ompression François Malgouyres Marh 7, 2007 Abstrat After some reolletions on ompression of images using
More informationQuasi-Monte Carlo Algorithms for unbounded, weighted integration problems
Quasi-Monte Carlo Algorithms for unbounded, weighted integration problems Jürgen Hartinger Reinhold F. Kainhofer Robert F. Tihy Department of Mathematis, Graz University of Tehnology, Steyrergasse 30,
More informationPacking Plane Spanning Trees into a Point Set
Paking Plane Spanning Trees into a Point Set Ahmad Biniaz Alfredo Garía Abstrat Let P be a set of n points in the plane in general position. We show that at least n/3 plane spanning trees an be paked into
More informationResearch Collection. The relation between block length and reliability for a cascade of AWGN links. Conference Paper. ETH Library
Research Collection Conference Paper The relation between block length and reliability for a cascade of AWG links Authors: Subramanian, Ramanan Publication Date: 0 Permanent Link: https://doiorg/0399/ethz-a-00705046
More informationLightpath routing for maximum reliability in optical mesh networks
Vol. 7, No. 5 / May 2008 / JOURNAL OF OPTICAL NETWORKING 449 Lightpath routing for maximum reliability in optial mesh networks Shengli Yuan, 1, * Saket Varma, 2 and Jason P. Jue 2 1 Department of Computer
More informationMaximum Entropy and Exponential Families
Maximum Entropy and Exponential Families April 9, 209 Abstrat The goal of this note is to derive the exponential form of probability distribution from more basi onsiderations, in partiular Entropy. It
More informationJournal of Inequalities in Pure and Applied Mathematics
Journal of Inequalities in Pure and Applied Mathematis A NEW ARRANGEMENT INEQUALITY MOHAMMAD JAVAHERI University of Oregon Department of Mathematis Fenton Hall, Eugene, OR 97403. EMail: javaheri@uoregon.edu
More informationInvestigation of the de Broglie-Einstein velocity equation s. universality in the context of the Davisson-Germer experiment. Yusuf Z.
Investigation of the de Broglie-instein veloity equation s universality in the ontext of the Davisson-Germer experiment Yusuf Z. UMUL Canaya University, letroni and Communiation Dept., Öğretmenler Cad.,
More informationSuperposition Encoding and Partial Decoding Is Optimal for a Class of Z-interference Channels
Superposition Encoding and Partial Decoding Is Optimal for a Class of Z-interference Channels Nan Liu and Andrea Goldsmith Department of Electrical Engineering Stanford University, Stanford CA 94305 Email:
More informationInformation Theory. Lecture 10. Network Information Theory (CT15); a focus on channel capacity results
Information Theory Lecture 10 Network Information Theory (CT15); a focus on channel capacity results The (two-user) multiple access channel (15.3) The (two-user) broadcast channel (15.6) The relay channel
More informationThe Laws of Acceleration
The Laws of Aeleration The Relationships between Time, Veloity, and Rate of Aeleration Copyright 2001 Joseph A. Rybzyk Abstrat Presented is a theory in fundamental theoretial physis that establishes the
More informationStability of alternate dual frames
Stability of alternate dual frames Ali Akbar Arefijamaal Abstrat. The stability of frames under perturbations, whih is important in appliations, is studied by many authors. It is worthwhile to onsider
More informationMultiaccess Channels with State Known to One Encoder: A Case of Degraded Message Sets
Multiaccess Channels with State Known to One Encoder: A Case of Degraded Message Sets Shivaprasad Kotagiri and J. Nicholas Laneman Department of Electrical Engineering University of Notre Dame Notre Dame,
More informationComputer Science 786S - Statistical Methods in Natural Language Processing and Data Analysis Page 1
Computer Siene 786S - Statistial Methods in Natural Language Proessing and Data Analysis Page 1 Hypothesis Testing A statistial hypothesis is a statement about the nature of the distribution of a random
More informationEnhanced Max-Min SINR for Uplink Cell-Free Massive MIMO Systems
Enhaned Max-Min SINR for Uplin Cell-Free Massive MIMO Systems Manijeh Bashar, Kanapathippillai Cumanan, Alister G. Burr,Mérouane Debbah, and Hien Quo Ngo Department of Eletroni Engineering, University
More informationDerivation of Non-Einsteinian Relativistic Equations from Momentum Conservation Law
Asian Journal of Applied Siene and Engineering, Volue, No 1/13 ISSN 35-915X(p); 37-9584(e) Derivation of Non-Einsteinian Relativisti Equations fro Moentu Conservation Law M.O.G. Talukder Varendra University,
More informationA NETWORK SIMPLEX ALGORITHM FOR THE MINIMUM COST-BENEFIT NETWORK FLOW PROBLEM
NETWORK SIMPLEX LGORITHM FOR THE MINIMUM COST-BENEFIT NETWORK FLOW PROBLEM Cen Çalışan, Utah Valley University, 800 W. University Parway, Orem, UT 84058, 801-863-6487, en.alisan@uvu.edu BSTRCT The minimum
More informationThe gravitational phenomena without the curved spacetime
The gravitational phenomena without the urved spaetime Mirosław J. Kubiak Abstrat: In this paper was presented a desription of the gravitational phenomena in the new medium, different than the urved spaetime,
More informationarxiv:gr-qc/ v2 6 Feb 2004
Hubble Red Shift and the Anomalous Aeleration of Pioneer 0 and arxiv:gr-q/0402024v2 6 Feb 2004 Kostadin Trenčevski Faulty of Natural Sienes and Mathematis, P.O.Box 62, 000 Skopje, Maedonia Abstrat It this
More informationON A PROCESS DERIVED FROM A FILTERED POISSON PROCESS
ON A PROCESS DERIVED FROM A FILTERED POISSON PROCESS MARIO LEFEBVRE and JEAN-LUC GUILBAULT A ontinuous-time and ontinuous-state stohasti proess, denoted by {Xt), t }, is defined from a proess known as
More informationThe Poisson Channel with Side Information
The Poisson Channel with Side Information Shraga Bross School of Enginerring Bar-Ilan University, Israel brosss@macs.biu.ac.il Amos Lapidoth Ligong Wang Signal and Information Processing Laboratory ETH
More informationmax min z i i=1 x j k s.t. j=1 x j j:i T j
AM 221: Advaned Optimization Spring 2016 Prof. Yaron Singer Leture 22 April 18th 1 Overview In this leture, we will study the pipage rounding tehnique whih is a deterministi rounding proedure that an be
More informationSensitivity Analysis in Markov Networks
Sensitivity Analysis in Markov Networks Hei Chan and Adnan Darwihe Computer Siene Department University of California, Los Angeles Los Angeles, CA 90095 {hei,darwihe}@s.ula.edu Abstrat This paper explores
More informationNon-Orthogonal Random Access for 5G Mobile Communication Systems
This artile has been aepted for publiation in a future issue of this journal, but has not been fully edited. Content may hange prior to final publiation. Citation information: DOI.9/TVT.8.86, IEEE Non-Orthogonal
More informationCapacity of MIMO Channels with Antenna Selection
1 Capaity of MIMO Channels with Antenna Seletion Shahab Sanayei and Aria Nosratinia Department of Eletrial Engineering The University of Texas at Dallas, Rihardson, TX 75083-0688 E-mail: {sxs025500,aria}@utdallas.edu
More informationParallel disrete-event simulation is an attempt to speed-up the simulation proess through the use of multiple proessors. In some sense parallel disret
Exploiting intra-objet dependenies in parallel simulation Franeso Quaglia a;1 Roberto Baldoni a;2 a Dipartimento di Informatia e Sistemistia Universita \La Sapienza" Via Salaria 113, 198 Roma, Italy Abstrat
More informationAn Outer Bound for the Gaussian. Interference channel with a relay.
An Outer Bound for the Gaussian Interference Channel with a Relay Ivana Marić Stanford University Stanford, CA ivanam@wsl.stanford.edu Ron Dabora Ben-Gurion University Be er-sheva, Israel ron@ee.bgu.ac.il
More informationThe Method of Types and Its Application to Information Hiding
The Method of Types and Its Application to Information Hiding Pierre Moulin University of Illinois at Urbana-Champaign www.ifp.uiuc.edu/ moulin/talks/eusipco05-slides.pdf EUSIPCO Antalya, September 7,
More informationScalable Positivity Preserving Model Reduction Using Linear Energy Functions
Salable Positivity Preserving Model Redution Using Linear Energy Funtions Sootla, Aivar; Rantzer, Anders Published in: IEEE 51st Annual Conferene on Deision and Control (CDC), 2012 DOI: 10.1109/CDC.2012.6427032
More informationConnectivity and Blockage Effects in Millimeter-Wave Air-To-Everything Networks
1 Connetivity and Blokage Effets in Millimeter-Wave Air-To-Everything Networks Kaifeng Han, Kaibin Huang and Robert W. Heath Jr. arxiv:1808.00144v1 [s.it] 1 Aug 2018 Abstrat Millimeter-wave (mmwave) offers
More informationControl Theory association of mathematics and engineering
Control Theory assoiation of mathematis and engineering Wojieh Mitkowski Krzysztof Oprzedkiewiz Department of Automatis AGH Univ. of Siene & Tehnology, Craow, Poland, Abstrat In this paper a methodology
More informationVariable Length Codes for Degraded Broadcast Channels
Variable Length Codes for Degraded Broadcast Channels Stéphane Musy School of Computer and Communication Sciences, EPFL CH-1015 Lausanne, Switzerland Email: stephane.musy@ep.ch Abstract This paper investigates
More informationA Functional Representation of Fuzzy Preferences
Theoretial Eonomis Letters, 017, 7, 13- http://wwwsirporg/journal/tel ISSN Online: 16-086 ISSN Print: 16-078 A Funtional Representation of Fuzzy Preferenes Susheng Wang Department of Eonomis, Hong Kong
More informationOn Molecular Timing Channels with α-stable Noise
On Moleular Timing Channels with α-stable Noise Yonathan Murin, Nariman Farsad, Mainak Chowdhury, and Andrea Goldsmith Department of Eletrial Engineering, Stanford University, USA Abstrat This work studies
More informationA Characterization of Wavelet Convergence in Sobolev Spaces
A Charaterization of Wavelet Convergene in Sobolev Spaes Mark A. Kon 1 oston University Louise Arakelian Raphael Howard University Dediated to Prof. Robert Carroll on the oasion of his 70th birthday. Abstrat
More informationError Bounds for Context Reduction and Feature Omission
Error Bounds for Context Redution and Feature Omission Eugen Bek, Ralf Shlüter, Hermann Ney,2 Human Language Tehnology and Pattern Reognition, Computer Siene Department RWTH Aahen University, Ahornstr.
More informationOn the Capacity of the Two-Hop Half-Duplex Relay Channel
On the Capacity of the Two-Hop Half-Duplex Relay Channel Nikola Zlatanov, Vahid Jamali, and Robert Schober University of British Columbia, Vancouver, Canada, and Friedrich-Alexander-University Erlangen-Nürnberg,
More informationThe law of the iterated logarithm for c k f(n k x)
The law of the iterated logarithm for k fn k x) Christoph Aistleitner Abstrat By a lassial heuristis, systems of the form osπn k x) k 1 and fn k x)) k 1, where n k ) k 1 is a rapidly growing sequene of
More informationProduct Policy in Markets with Word-of-Mouth Communication. Technical Appendix
rodut oliy in Markets with Word-of-Mouth Communiation Tehnial Appendix August 05 Miro-Model for Inreasing Awareness In the paper, we make the assumption that awareness is inreasing in ustomer type. I.e.,
More informationUniversity of Groningen
University of Groningen Port Hamiltonian Formulation of Infinite Dimensional Systems II. Boundary Control by Interonnetion Mahelli, Alessandro; van der Shaft, Abraham; Melhiorri, Claudio Published in:
More informationSensor management for PRF selection in the track-before-detect context
Sensor management for PRF seletion in the tra-before-detet ontext Fotios Katsilieris, Yvo Boers, and Hans Driessen Thales Nederland B.V. Haasbergerstraat 49, 7554 PA Hengelo, the Netherlands Email: {Fotios.Katsilieris,
More informationJoint Source-Channel Coding for the Multiple-Access Relay Channel
Joint Source-Channel Coding for the Multiple-Access Relay Channel Yonathan Murin, Ron Dabora Department of Electrical and Computer Engineering Ben-Gurion University, Israel Email: moriny@bgu.ac.il, ron@ee.bgu.ac.il
More informationMismatched Multi-letter Successive Decoding for the Multiple-Access Channel
Mismatched Multi-letter Successive Decoding for the Multiple-Access Channel Jonathan Scarlett University of Cambridge jms265@cam.ac.uk Alfonso Martinez Universitat Pompeu Fabra alfonso.martinez@ieee.org
More information11.1 Polynomial Least-Squares Curve Fit
11.1 Polynomial Least-Squares Curve Fit A. Purpose This subroutine determines a univariate polynomial that fits a given disrete set of data in the sense of minimizing the weighted sum of squares of residuals.
More informationA model for measurement of the states in a coupled-dot qubit
A model for measurement of the states in a oupled-dot qubit H B Sun and H M Wiseman Centre for Quantum Computer Tehnology Centre for Quantum Dynamis Griffith University Brisbane 4 QLD Australia E-mail:
More informationA Spatiotemporal Approach to Passive Sound Source Localization
A Spatiotemporal Approah Passive Sound Soure Loalization Pasi Pertilä, Mikko Parviainen, Teemu Korhonen and Ari Visa Institute of Signal Proessing Tampere University of Tehnology, P.O.Box 553, FIN-330,
More informationComplementarities in Spectrum Markets
Complementarities in Spetrum Markets Hang Zhou, Randall A. Berry, Mihael L. Honig and Rakesh Vohra EECS Department Northwestern University, Evanston, IL 6008 {hang.zhou, rberry, mh}@ees.northwestern.edu
More informationCapacity-achieving Input Covariance for Correlated Multi-Antenna Channels
Capaity-ahieving Input Covariane for Correlated Multi-Antenna Channels Antonia M. Tulino Universita Degli Studi di Napoli Federio II 85 Napoli, Italy atulino@ee.prineton.edu Angel Lozano Bell Labs (Luent
More informationSUPPORTING ultra-reliable and low-latency communications
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 17, NO. 1, JANUARY 2018 127 Cross-Layer Optimization for Ultra-Reliable and Low-Lateny Radio Aess Networs Changyang She, Member, IEEE, Chenyang Yang,
More information4828 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 61, NO. 9, SEPTEMBER 2015
4828 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 61, NO. 9, SEPTEMBER 2015 Key Generation Algorithms for Pairwise Independent Networks Based on Graphial Models Lifeng Lai, Member, IEEE, and Siu-Wai Ho,
More informationContact Block Reduction Method for Ballistic Quantum Transport with Semi-empirical sp3d5s* Tight Binding band models
Purdue University Purdue e-pubs Other Nanotehnology Publiations Birk Nanotehnology Center -2-28 Contat Redution Method for Ballisti Quantum Transport with Semi-empirial sp3d5s* Tight Binding band models
More informationSpace-time duality in multiple antenna channels
Spae-time duality in multiple antenna hannels Massimo Franeshetti, Kaushik Chakraborty 1 Abstrat The onept of information transmission in a multiple antenna hannel with sattering objets is studied from
More informationPassivity and Stability of Switched Systems Under Quantization
Passivity and Stability of Swithed Systems Under Quantization Feng Zhu Department of Eletrial Engineering University of Notre Dame Notre Dame, IN, 46556 fzhu1@nd.edu Han Yu Department of Eletrial Engineering
More informationFaster Data-access in Large-scale Systems: Network-scale Latency Analysis under General Service-time Distributions
arxiv:807.02253v [s.dc 6 Jul 208 Faster Data-aess in Large-sale Systems: Networ-sale Lateny Analysis under General Servie-time Distributions Avishe Ghosh Department of EECS University of California, Bereley,
More informationSensitivity of Spectrum Sensing Techniques to RF impairments
Sensitivity of Spetrum Sensing Tehniques to RF impairments Jonathan Verlant-Chenet Julien Renard Jean-Mihel Driot Philippe De Donker François Horlin Université Libre de Bruelles - OPERA Dpt., Avenue F.D.
More informationDiversity Analysis of Bit-Interleaved Coded Multiple Beamforming with Orthogonal Frequency Division Multiplexing
IEEE ICC 03 - Wireless Communiations Symposium Diversity Analysis of Bit-Interleaved Coded Multiple Beamforming with Orthogonal Frequeny Division Multiplexing Boyu Li and Ender Ayanoglu Center for Pervasive
More informationETSI EN V8.0.1 ( )
EN 300 728 V8.0.1 (2000-11) European Standard (Teleommuniations series) Digital ellular teleommuniations system (Phase 2+); Comfort noise aspets for Enhaned Full Rate (EFR) speeh traffi hannels (GSM 06.62
More informationOptimization of Statistical Decisions for Age Replacement Problems via a New Pivotal Quantity Averaging Approach
Amerian Journal of heoretial and Applied tatistis 6; 5(-): -8 Published online January 7, 6 (http://www.sienepublishinggroup.om/j/ajtas) doi:.648/j.ajtas.s.65.4 IN: 36-8999 (Print); IN: 36-96 (Online)
More informationDistributed Functional Compression through Graph Coloring
Distributed Functional Compression through Graph Coloring Vishal Doshi, Devavrat Shah, Muriel Médard, and Sidharth Jaggi Laboratory for Information and Decision Systems Massachusetts Institute of Technology
More informationSensor Network Localisation with Wrapped Phase Measurements
Sensor Network Loalisation with Wrapped Phase Measurements Wenhao Li #1, Xuezhi Wang 2, Bill Moran 2 # Shool of Automation, Northwestern Polytehnial University, Xian, P.R.China. 1. wenhao23@mail.nwpu.edu.n
More informationDiscrete Generalized Burr-Type XII Distribution
Journal of Modern Applied Statistial Methods Volume 13 Issue 2 Artile 13 11-2014 Disrete Generalized Burr-Type XII Distribution B. A. Para University of Kashmir, Srinagar, India, parabilal@gmail.om T.
More informationResolving RIPS Measurement Ambiguity in Maximum Likelihood Estimation
14th International Conferene on Information Fusion Chiago, Illinois, USA, July 5-8, 011 Resolving RIPS Measurement Ambiguity in Maximum Likelihood Estimation Wenhao Li, Xuezhi Wang, and Bill Moran Shool
More informationRelativistic Addition of Velocities *
OpenStax-CNX module: m42540 1 Relativisti Addition of Veloities * OpenStax This work is produed by OpenStax-CNX and liensed under the Creative Commons Attribution Liense 3.0 Abstrat Calulate relativisti
More informationIMPEDANCE EFFECTS OF LEFT TURNERS FROM THE MAJOR STREET AT A TWSC INTERSECTION
09-1289 Citation: Brilon, W. (2009): Impedane Effets of Left Turners from the Major Street at A TWSC Intersetion. Transportation Researh Reord Nr. 2130, pp. 2-8 IMPEDANCE EFFECTS OF LEFT TURNERS FROM THE
More informationEDGE-DISJOINT CLIQUES IN GRAPHS WITH HIGH MINIMUM DEGREE
EDGE-DISJOINT CLIQUES IN GRAPHS WITH HIGH MINIMUM DEGREE RAPHAEL YUSTER Abstrat For a graph G and a fixed integer k 3, let ν k G) denote the maximum number of pairwise edge-disjoint opies of K k in G For
More informationWord of Mass: The Relationship between Mass Media and Word-of-Mouth
Word of Mass: The Relationship between Mass Media and Word-of-Mouth Roman Chuhay Preliminary version Marh 6, 015 Abstrat This paper studies the optimal priing and advertising strategies of a firm in the
More informationSystems with Finite Communication Bandwidth Constraints Part I: State Estimation Problems
194 IEEE TRNSCTIONS ON UTOTIC CONTROL, VOL. 4, NO. 9, SEPTEBER 1997 Systems with Finite Communiation Bandwidth Constraints Part I State Estimation Prolems Wing Shing Wong and Roger W. Brokett strat In
More informationCapacity Pooling and Cost Sharing among Independent Firms in the Presence of Congestion
Capaity Pooling and Cost Sharing among Independent Firms in the Presene of Congestion Yimin Yu Saif Benjaafar Graduate Program in Industrial and Systems Engineering Department of Mehanial Engineering University
More informationRobust estimation of the external drift and the variogram of spatial data
Researh Colletion Conferene Paper Robust estimation of the external drift and the variogram of spatial data Author(s): Künsh, Hansruedi; Papritz, Andreas Jürg; Shwierz, Cornelia; Stahel, Werner A. Publiation
More informationEfficient Use of Joint Source-Destination Cooperation in the Gaussian Multiple Access Channel
Efficient Use of Joint Source-Destination Cooperation in the Gaussian Multiple Access Channel Ahmad Abu Al Haija ECE Department, McGill University, Montreal, QC, Canada Email: ahmad.abualhaija@mail.mcgill.ca
More informationECE Information theory Final (Fall 2008)
ECE 776 - Information theory Final (Fall 2008) Q.1. (1 point) Consider the following bursty transmission scheme for a Gaussian channel with noise power N and average power constraint P (i.e., 1/n X n i=1
More informationConvergence of reinforcement learning with general function approximators
Convergene of reinforement learning with general funtion approximators assilis A. Papavassiliou and Stuart Russell Computer Siene Division, U. of California, Berkeley, CA 94720-1776 fvassilis,russellg@s.berkeley.edu
More informationDynamic Rate and Channel Selection in Cognitive Radio Systems
1 Dynami Rate and Channel Seletion in Cognitive Radio Systems R. Combes and A. Proutiere KTH, The Royal Institute of Tehnology arxiv:1402.5666v2 [s.it] 12 May 2014 Abstrat In this paper, we investigate
More information