Research Collection. Mismatched decoding for the relay channel. Conference Paper. ETH Library. Author(s): Hucher, Charlotte; Sadeghi, Parastoo

Size: px
Start display at page:

Download "Research Collection. Mismatched decoding for the relay channel. Conference Paper. ETH Library. Author(s): Hucher, Charlotte; Sadeghi, Parastoo"

Transcription

1 Researh Colletion Conferene Paper Mismathed deoding for the relay hannel Author(s): Huher, Charlotte; Sadeghi, Parastoo Publiation Date: 2010 Permanent Link: Rights / Liense: In Copyright - Non-Commerial Use Permitted This page was generated automatially upon download from the ETH Zurih Researh Colletion. For more information please onsult the Terms of use. ETH Library

2 Mismathed Deoding for the Relay Channel Charlotte Huher and Parastoo Sadeghi The Australian National University, Canberra, ACT, 0200, Australia Abstrat We onsider a disrete memoryless relay hannel, both relay and destination may have an inorret estimation of the hannel. This estimation error is modeled with mismathed deoders. In this paper, we provide a lower-bound on the mismath apaity of the relay hannel. Moreover, we prove that this lower-bound is indeed the exat apaity for the degraded relay hannel when random oding is used. I. INTRODUCTION The deoding method that minimizes the error probability is the maximum-likelihood (ML) deoder. However, it annot always be implemented in pratie beause of some hannel estimation errors or hardware limitations. An alternative deoder an then be a mismathed one, based on a different metri. The theoretial performane of mismathed deoding has been studied sine the 1980 s when Csiszàr and Körner in [1], and Hui in [2] both provided a lower-bound on the ahievable apaity in a point-to-point ommuniation hannel. In [3], the authors proved that this lower-bound is the exat apaity when random oding is used. The mismath apaity of multiple-aess hannels has also been haraterized in [4]. There is inreasing evidene that future wireless ommuniations will be based not on point-to-point transmission anymore, but on ooperation between the nodes in a network (see [5],[6]). The simplest model of a ooperative network is the relay hannel for whih apaity bounds have been derived in 1979 by Cover and El Gamal in [7]. In this paper, we onsider a disrete memoryless relay hannel with mismathed deoders at both reeivers (the relay and the destination). We provide a lower-bound on the mismath apaity of suh a hannel and prove that it is indeed the exat apaity of the mismathed degraded relay hannel when random oding is used. II. THE RELAY CHANNEL AND MISMATCHED DECODER We onsider a disrete memoryless relay hannel onsisting of one soure, one relay and one destination. We use the same setup as in [7]: The soure broadasts a signal x 1 X 1 whih is reeived by both the relay and the destination. The relay transmits a signal x 2 X 2 whih is reeived by the destination. Reeived signals at relay and destination are denoted by y 1 Y 1 and y Y respetively (see Figure 1). The hannel is modeled by a set of probability distributions p(y 1,y x 1,x 2 ). We onsider three mismathed deoders using the metris q sr (x 1,x 2,y 1 ), q rd (x 2,y) and q sd (x 1,x 2,y), the subsripts sr, rd and sd stand for the soure-relay, relay-destination and soure-destination links, respetively. w enoder x 1 y 1 Fig. 1. relay deoder/enoder p(y 1,y x 1,x 2 ) x 2 Relay hannel y deoder The following setup is used to prove the ahievability of the lower-bound on the mismath apaity derived in this paper. We onsider the transmission of B bloks of length n. In eah blok i {1,...,B, a message w i {1,...,2 nr is transmitted from the soure. Let us partition the set {1,...,2 nr into 2 nr0 independent subsets denoted by S s,s {1,...,2 nr0, suh that any w i {1,...,2 nr belongs to a unique subset S si. The message is then oded as x 1 (w i s i ) X1 n and x 2(s i ) X2 n at the soure and relay, respetively. Random oding: The hoie of the set C = {x 1 (..),x 2 (.) of odewords is random: 2 nr0 iid odewords in X2 n are first generated aording to the probability distribution p(x 2 )= n i=1 p(x 2i) and indexed by s {1,...,2 nr0 : x 2 (s); for eah x 2 (s), 2 nr iid odewords in X1 n are generated aording to the probability distribution p(x 1 x 2 (s)) and indexed by w {1,...,2 nr : x 1 (w s). Two transmission steps: Let us assume that (i 2) bloks have already been sent. Thus the relay has already deoded w i 2 and s i 1, the destination has deoded w i 3 and s i 2. In order to derive a lower bound on the apaity of the mismathed relay hannel, we hoose to use threshold deoders as in [2], [4]. Indeed, it an be proven that the deoding error probability of an ML mismathed deoder (whih is implemented in pratie) is upper-bounded by the deoding error probability of the onsidered threshold deoder. In blok (i 1), the soure and relay transmit x 1 (w i 1 s i 1 ) and x 2 (s i 1 ), respetively; the relay and destination reeive y 1 (i 1) and y(i 1). The relay is able to detet w i 1 as the unique w suh that (x 1 (w s i 1 ), x 2 (s i 1 ), y 1 (i 1)) is jointly typial and q sr (x 1 (w s i 1 ), x 2 (s i 1 ), y 1 (i 1)) is larger than a threshold to be defined later. The relay is thus able to determine s i suh that w i 1 S si. The soure is obviously also aware of s i. In blok i, the soure and relay transmit x 1 (w i s i ) and x 2 (s i ), respetively; the relay and destination reeive y 1 (i) and y(i). The destination an detet s i as the unique s suh that (x 2 (s i ), y(i)) is jointly typial and q rd (x 2 (s i ), y(i)) is larger than some threshold. It is then able to detet w 25

3 w i 1 as the unique w suh that w S si L(y(i 1)), L(y(i 1)) is the set of all w {1,...,2 nr suh that (x 1 (w s i 1 ), x 2 (s i 1 ), y(i 1)) is jointly typial and q sd (x 1 (w s i 1 ), x 2 (s i 1 ), y(i 1)) is larger than some threshold. Notation: Let E p (q(x)) denote the expeted value of q(x) w.r.t. the probability distribution p(x). LetI f (X; Y ) denote the usual mutual information between X and Y w.r.t. the probability distribution f(x, y). For a probability distribution p(x) on a finite set X and a onstant δ > 0, let Np(x) δ denote the set of all probability distributions on X that are within δ of p(x): Np(x) δ = {f P(X ): x X, f(x) p(x) δ. LetT p(x) δ be the set of all sequenes in X n whose type is in N p(x) δ : Tp(x) {x δ = X n : f x Np(x) δ,f x (x) is the number of elements of the sequene x that are equal to x, normalized by the sequene length n. In the following, we drop the subsript arguments when the ontext is lear enough and write f(x) Np δ and (x, y) Tp δ. III. MAIN RESULTS Theorem 1: (Ahievability) Consider a disrete memoryless relay hannel desribed by the probability distribution p(y 1,y x 1,x 2 ). The apaity C M obtained using the mismathed deoders q sr (x 1,x 2,y 1 ), q rd (x 2,y) and q sd (x 1,x 2,y) is lower-bounded by: C LM = max I LM(p(x 1,x 2 )) (1) p(x 1,x 2) I LM (p(x 1,x 2 )) = min{i sr (p(x 1,x 2 )),I rd (p(x 2 )) + I sd (p(x 1,x 2 )) (2) I sr (p(x 1,x 2 )) = min I f (X 1 ; Y 1 X 2 )+I f (X 1 ; X 2 ) (3) I rd (p(x 2 )) = min I f (X 2 ; Y ) f D rd (4) I sd (p(x 1,x 2 )) = min I f (X 1 ; Y X 2 )+I f (X 1 ; X 2 ) f D sd (5) and D sr ={f(x 1,x 2,y 1 ):f(x 1 )=p(x 1 ),f(x 2,y 1 )=p(x 2,y 1 ), E f (q sr (x 1,x 2,y 1 )) E p (q sr (x 1,x 2,y 1 )) (6) D rd ={f(x 2,y):f(x 2 )=p(x 2 ),f(y) =p(y), E f (q rd (x 2,y)) E p (q rd (x 2,y)) (7) D sd ={f(x 1,x 2,y):f(x 1 )=p(x 1 ),f(x 2,y)=p(x 2,y), E f (q sd (x 1,x 2,y)) E p (q sd (x 1,x 2,y)). (8) Let now suppose that there exist three probability distributions ˆf i, i {sr, rd, sd suh that E ˆfi (q i ) >E p (q i ) with strit inequality. Theorem 2: (Converse) With the above assumption and for a degraded relay hannel, if for some input distribution p(x 1,x 2 ),therater>c LM, then the average probability of error, averaged over all random odebooks drawn aording to p(x 1,x 2 ), approahes one as the blok length tends to infinity. IV. PROOF OF THEOREM 1 A. Upper-bounding the error probability In order to prove the ahievability of this lower-bound, we onsider the four possible error events desribed in [7] adapted to the use of a threshold deoder. For eah blok i, these possible error events are: E 0i : (x 1 (w i s i ), x 2 (s i ), y 1 (i), y(i)) is not jointly typial; E 1i : there exists w w i suh that (x 1 ( w s i ), x 2 (s i ), y 1 (i)) is jointly typial and q sr (x 1 ( w s i ), x 2 (s i ), y 1 (i)) is larger than some threshold; E 2i : there exists s s i suh that (x 2 ( s), y(i)) is jointly typial and q rd (x 2 ( s), y(i)) is larger than some threshold; E 3i = E 3i E 3i E 3i : w i 1 / S si L(y(i 1)) E 3i : there exists w w i 1 suh that w S si L(y(i 1)). Let F i be the deoding error event in blok i. Let us assume that no error has ourred till blok i 1. Thus, the deoding error probability in blok i is given by: { 3 k 1 3 p e (i) = Pr E ki Fi 1 Eli p ek (i). k=0 l=0 k=0 1) Probability of error event E 0i : By Sanov s theorem [8, Theorem ], this probability is exponentially small in n. There exists ψ>0 suh that p e0 (i) < 2 nψ. 2) Probability of error event E 1i : An error ours if there exists w w i suh that the metri q sr (x 1 ( w s i ), x 2 (s i ), y 1 (i)) is greater than the threshold Υ δ sr =min p(x 1,x 2,y 1 )q sr (x 1,x 2,y 1 ), δ (x 1,x 2,y 1) X 1 X 2 Y 1 δ is a small positive number. The probability of error event E 1i is thus given by p e1 (i) =Pr{ w w i, x 1 ( w s i ) T δ p, q sr (x 1 ( w s i ), x 2 (s i ), y 1 (i)) Υ δ sr F i 1. Using Sanov s theorem, we obtain the upper-bound R sr δ = p e1 (i) (2 nr 1)(n +1) X1 X2 Y1 2 n R δ sr (n +1) X1 X2 Y1 2 n( R δ sr R), min f(x 1,x 2,y) D δ sr D(f(x 1,x 2,y 1 ) p(x 1 )p(x 2,y 1 )) (10) Dsr δ = {f(x 1,x 2,y 1 ):f(x 1 ) Np δ,f(x 2,y 1 ) Np δ, E f (q sr (x 1,x 2,y 1 )) Υ δ sr, (11) with D(..) denoting the KL divergene [8, equation (2.26)]. Thus, if R < R sr, δ the probability of error event E 1i is exponentially small in n: p e1 (i) < 2 nψ for some ψ>0. (9) 26

4 3) Probability of error event E 2i : Using the threshold Υ δ rd =min p(x 2,y)q rd (x 2,y), (12) δ (x 2,y) X 2 Y we an write the probability of error event E 2i as p e2 (i) =Pr { s s i, x 2 ( s) Tp δ,q rd (x 2 ( s), y(i)) Υ δ rd Fi 1 (n +1) X2 Y 2 n( R δ rd R0), the upper-bound is obtained using Sanov s theorem with R rd δ = min D(f(x 2,y) p(x 2 )p(y)) (13) f(x 2,y) D δ rd Drd δ = {f(x 2,y):f(x 2 ) Np δ,f(y) Np δ, E f (q rd (x 2,y)) Υ δ rd. (14) If R 0 < R rd δ,thenp e2(i) < 2 nψ for some ψ>0. 4) Probability of error event E 3i : Error event E 3i an be deomposed into two different events E 3i and E 3i. If we assume that the previous transmission was orretly reeived at destination, then w i 1 L(y(i 1)). Moreover, the fat that the error event E 2i does not our implies that w i 1 Sŝi = S si. Thus the first term of the deomposition has a probability zero and we only need to onsider E p e3 (i) =Pr { w w i 1, w S si L(y(i 1)) Fi 1 E Pr { w S si Fi 1 w w i 1, w L(y(i 1)) E { L(y(i 1)) 2 nr0 Fi 1. denotes the ardinality of the onsidered set. Let 1, x 1 ( w s i 1 ) Tp δ, ϕ( w y) = q sd (x 1 ( w s i 1 ), x 2 (s i 1 ), y(i 1)) Υ δ sd 0, otherwise. the threshold is defined by Υ δ sd =min p(x 1,x 2,y)q sd (x 1,x 2,y). δ (x 1,x 2,y) X 1 X 2 Y (15) Using Sanov s theorem, we an upper-bound the expeted ardinality of L(y(i 1)) given that w w i 1 R sd δ = E { L(y(i 1)) w w i 1 F = E ϕ( w y) F w w i 1 i 1 i 1 (2 nr 1)(n +1) X1 X2 Y 2 n R δ sd (n +1) X1 X2 Y 2 n( R δ sd R), min f(x 1,x 2,y) D δ sd 3i. D(f(x 1,x 2,y) p(x 1 )p(x 2,y)) (16) Dsd δ = {f(x 1,x 2,y):f(x 1 ) Np δ,f(x 2,y) Np δ, E f (q sd (x 1,x 2,y)) Υ δ sd. (17) The error probability is then upper-bounded by p e3 (i) (n +1) X1 X2 Y 2 n( R δ sd R) 2 nr0 (n +1) X1 X2 Y 2 n( R δ sd +R0 R). Replaing R 0 by the onstraint previously omputed p e3 (i) (n +1) X1 X2 Y 2 n( R δ sd + R δ rd R). If R< R δ sd + R δ rd,thenp e3(i) < 2 nψ for some ψ>0. B. Existene of a random ode If R < R sr δ and R < R rd δ + R sd δ, then the total error probability is exponentially small in n: p e < 4B 2 nψ. Thus, as n tends to infinity, the probability of finding a set of odewords C respeting p e (C) < 4B 2 nψ tends to one. Let C be suh a set of odewords of length n. Its average error probability is lower than 4B 2 nψ.throwingaway the worst half of the odewords, we end up with a set of odewords C of length n 2 whose maximum error probability is lower than 2 4B 2 nψ, whih tends to zero, and whose rate is R 1 n whih tends to R. C. Letting δ tend to zero We note that lim δ 0 Υδ sr = E p (q sr (x 1,x 2,y 1 )). Thus, the set Dsr δ beomes D sr ={f(x 1,x 2,y 1 ):f(x 1 )=p(x 1 ),f(x 2,y 1 )=p(x 2,y 1 ), E f (q sr (x 1,x 2,y 1 )) E p (q sr (x 1,x 2,y 1 )) and with these new onstraints on the probability distribution D(f(x 1,x 2,y 1 ) p(x 1 )p(x 2,y 1 )) = I f (X 1 ; Y 1 X 2 )+I f (X 1 ; X 2 ). Thus the first onstraint of the rate beomes I sr (p(x 1,x 2 )) min I f (X 1 ; Y 1 X 2 )+I f (X 1 ; X 2 ). (18) In the same way, we find the final expressions of I rd (p(x 1,x 2 )) and I sd (p(x 1,x 2 )). V. PROOF OF THEOREM 2 The proof of Theorem 2 is in essene similar to the one of [4, Theorem 3]. A. Deoding at relay Let us assume that R> min I f (X 1 ; Y 1 X 2 )+I f (X 1 ; X 2 ). (19) Let f be the probability distribution that ahieves (19). Let f =(1 ɛ)f + ɛ ˆf sr. We reall that ˆfsr is a probability distribution that respets E ˆfsr (q sr ) > E p (q sr ). Then, for suffiiently small ɛ, R>I f (X 1 ; Y 1 X 2 )+I f (X 1 ; X 2 ) (20) E f (q sr ) >E p (q sr ). (21) 27

5 Using (20), (21) and the ontinuity of the divergene, we an find Δ > 0, ɛ>0 and a neighborhood U of f(x 1,x 2,y 1 ) suh that for all f U and p (x 2,y 1 ) N ɛ p,wehave R>D(f(x 1 x 2,y 1 ) p(x 1 ) p (x 2,y 1 )) + Δ (22) E f (q sr ) >E p (q sr )+Δ, (23) D(...) is defined in [4]. Let V be a suffiiently small neighborhood of p(x 1,x 2,y 1 ), suh that for every p (x 1,x 2,y 1 ) V,thenp (x 2,y 1 ) N ɛ p and E p (q sr ) <E p (q sr )+Δ. (24) Let us assume that the true message in blok i is w i and that the triple (x 1 (w i s i ), x 2 (s i ), y 1 (i)) has empirial type in V. If there exists another message w w i suh that the empirial type of (x 1 ( w s i ), x 2 (s i ), y 1 (i)) is in U, then a deoding error ours. Let W ( w) take the value 1 if the empirial type of (x 1 ( w s i ), x 2 (s i ), y 1 (i)) is in U and 0 otherwise. The expetation of W = w w i W ( w) given y 1 is E(W y 1 )=(2 nr 1)π 0. =2 nr π 0, (25) =. denotes the behavior of the expression when n and π 0 = E(W ( w ) y 1 ) = Pr{W ( w ) = 1 y 1 with w being a random message different from w i. For two different messages w and w,theeventsw( w) and W ( w ) are independent. Thus the variane of W given y 1 is Var(W y 1 )= w w i Var(W ( w) y 1 ). Sine W ( w) an only take the values 0 and 1, we an upperbound Var(W ( w) y 1 ) E(W ( w) y 1 ). Thus Var(W y 1 ) w w i E(W ( w) y 1 ). =2 nr π 0. (26) Using (25), (26) and the fat that for any random variable X, Pr(X =0) Var(X) E(X) 2, we an write Pr(W =0 y 1 ) 2nR π 0 (2 nr π 0 ) 2 =2 nr 1 π 0. (27) Using the seond part of Sanov s theorem, we obtain the asymptoti behavior π 0. = 2 n R sr, Rsr = min f U D(f(x 1 x 2,y 1 ) p(x 1 ) p (x 2,y 1 )). Using (22), we an then lower-bound π 0 2 n(r Δ) and onlude that the probability of no deoding error tends to 0 when n : Pr(W =0 y 1 ) 2 nr 2 n(r Δ) =2 nδ. (28) B. Deoding at destination The seond inequality an be dealt in two separate parts. Indeed, we have shown in the diret part that R 0 min I f (X 2 ; Y ) f D rd (29) R R 0 + min I f (X 1 ; Y X 2 )+I f (X 1 ; X 2 ). f D sd (30) We thus have to show that if one of these inequalities is reversed, an error ours with asymptoti probability one. This an be done using the same reasoning as in previous subsetion. VI. MATCHED DECODING CASE In the mathed deoding ase, i.e. q sr (x 1,x 2,y 1 ) = log p(y 1 x 1,x 2 ), q rd (x 2,y) = logp(y x 2 ) and q sd (x 1,x 2,y) = logp(y x 1,x 2 ), the apaity oinides with the one of degraded relay omputed by Cover and El Gamal in [7]. Indeed, for any distribution f D sr,wehave I f (X 1 ; Y 1 X 2 )+I f (X 1 ; X 2 ) I f (X 1 ; Y 1 X 2 ) = H(Y 1 X 2 ) H f (Y 1 X 1,X 2 ) (31) H(Y 1 X 2 )+ f(x 1,x 2,y 1 )logp(y 1 x 1,x 2 ) (32) x 1,x 2,y 1 H(Y 1 X 2 )+ p(x 1,x 2,y 1 )logp(y 1 x 1,x 2 ) (33) x 1,x 2,y 1 = I(X 1 ; Y 1 X 2 ), (31) holds beause f(x 2,y 1 )=p(x 2,y 1 ), (32) follows from the non-negativity of the divergene and (33) is obtained using E f (log p(y 1 x 1,x 2 )) E(log p(y 1 x 1,x 2 )). Moreover, by hoosing f(x 1,x 2,y 1 ) = p(x 1 )p(x 2 )p(y 1 x 1,x 2 ) D sr, I f (X 1 ; X 2 ) = 0 and I f (X 1 ; Y 1 X 2 )+I f (X 1 ; X 2 )=I(X 1 ; Y 1 X 2 ). The bound is ahievable, so I sr (p(x 1,x 2 )) = I(X 1 ; Y 1 X 2 ). In the same way, we an prove that I rd (p(x 1,x 2 )) = I(X 2 ; Y ) and I sd (p(x 1,x 2 )) = I(X 1 ; Y X 2 ). Finally, in the mathed ase, the following rate is ahievable R =min{i(x 1 ; Y 1 X 2 ),I(X 2 ; Y )+I(X 1 ; Y X 2 ) (34) =min{i(x 1 ; Y 1 X 2 ),I(X 1,X 2 ; Y ). (35) ACKNOWLEDGEMENT This work was supported under Australian Researh Counil s Disovery Projets funding sheme (projet no. DP ). The authors would also like to thank Prof. Lapidoth for useful disussions. REFERENCES [1] I. Csiszàr and J. Körner, Graph deomposition: A new key to oding theorems, IEEE Trans. Inform. Theory, vol. 27, no. 1, pp. 5 12, Jan [2] J. Hui, Fundamental issues of multiple aessing, Ph.D. dissertation, M.I.T., 1983, hap. IV. [3] N. Merhav, G. Kaplan, A. Lapidoth, and S. Shamai Shitz, On information rates for mismathed deoders, IEEE Trans. Inform. Theory, vol. 40, no. 6, pp , Nov [4] A. Lapidoth, Mismathed deoding and the multiple-aess hannel, IEEE Trans. Inform. Theory, vol. 42, no. 5, pp , Sep [5] A. Sendonaris, E. Erkip, and B. Aazhang, User Cooperation Diversity. Part I and II, IEEE Trans. Commun., vol. 51, no. 11, pp , Nov [6] A. Nosratinia and A. Hedayat, Cooperative Communiation in Wireless Networks, IEEE Commun. Mag., vol. 42, no. 10, pp , Ot [7] T. Cover and A. Gamal, Capaity theorems for the relay hannel, IEEE Trans. Inform. Theory, vol. 25, no. 5, pp , Sep [8] T. M. Cover and J. A. Thomas, Elements of Information Theory, 2nd ed. Wiley-Intersiene,

Broadcast Channels with Cooperating Decoders

Broadcast Channels with Cooperating Decoders To appear in the IEEE Transations on Information Theory, Deember 2006. 1 Broadast Channels with Cooperating Deoders Ron Dabora Sergio D. Servetto arxiv:s/0505032v3 [s.it] 1 Nov 2006 Abstrat We onsider

More information

Frequency hopping does not increase anti-jamming resilience of wireless channels

Frequency hopping does not increase anti-jamming resilience of wireless channels Frequeny hopping does not inrease anti-jamming resiliene of wireless hannels Moritz Wiese and Panos Papadimitratos Networed Systems Seurity Group KTH Royal Institute of Tehnology, Stoholm, Sweden {moritzw,

More information

ELG 5372 Error Control Coding. Claude D Amours Lecture 2: Introduction to Coding 2

ELG 5372 Error Control Coding. Claude D Amours Lecture 2: Introduction to Coding 2 ELG 5372 Error Control Coding Claude D Amours Leture 2: Introdution to Coding 2 Deoding Tehniques Hard Deision Reeiver detets data before deoding Soft Deision Reeiver quantizes reeived data and deoder

More information

Coding for Noisy Write-Efficient Memories

Coding for Noisy Write-Efficient Memories Coding for oisy Write-Effiient Memories Qing Li Computer Si. & Eng. Dept. Texas A & M University College Station, TX 77843 qingli@se.tamu.edu Anxiao (Andrew) Jiang CSE and ECE Departments Texas A & M University

More information

Nonreversibility of Multiple Unicast Networks

Nonreversibility of Multiple Unicast Networks Nonreversibility of Multiple Uniast Networks Randall Dougherty and Kenneth Zeger September 27, 2005 Abstrat We prove that for any finite direted ayli network, there exists a orresponding multiple uniast

More information

Case I: 2 users In case of 2 users, the probability of error for user 1 was earlier derived to be 2 A1

Case I: 2 users In case of 2 users, the probability of error for user 1 was earlier derived to be 2 A1 MUTLIUSER DETECTION (Letures 9 and 0) 6:33:546 Wireless Communiations Tehnologies Instrutor: Dr. Narayan Mandayam Summary By Shweta Shrivastava (shwetash@winlab.rutgers.edu) bstrat This artile ontinues

More information

The Capacity Loss of Dense Constellations

The Capacity Loss of Dense Constellations The Capaity Loss of Dense Constellations Tobias Koh University of Cambridge tobi.koh@eng.am.a.uk Alfonso Martinez Universitat Pompeu Fabra alfonso.martinez@ieee.org Albert Guillén i Fàbregas ICREA & Universitat

More information

On the Designs and Challenges of Practical Binary Dirty Paper Coding

On the Designs and Challenges of Practical Binary Dirty Paper Coding On the Designs and Challenges of Pratial Binary Dirty Paper Coding 04 / 08 / 2009 Gyu Bum Kyung and Chih-Chun Wang Center for Wireless Systems and Appliations Shool of Eletrial and Computer Eng. Outline

More information

On the Bit Error Probability of Noisy Channel Networks With Intermediate Node Encoding I. INTRODUCTION

On the Bit Error Probability of Noisy Channel Networks With Intermediate Node Encoding I. INTRODUCTION 5188 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 54, NO. 11, NOVEMBER 2008 [8] A. P. Dempster, N. M. Laird, and D. B. Rubin, Maximum likelihood estimation from inomplete data via the EM algorithm, J.

More information

Assessing the Performance of a BCI: A Task-Oriented Approach

Assessing the Performance of a BCI: A Task-Oriented Approach Assessing the Performane of a BCI: A Task-Oriented Approah B. Dal Seno, L. Mainardi 2, M. Matteui Department of Eletronis and Information, IIT-Unit, Politenio di Milano, Italy 2 Department of Bioengineering,

More information

THE classical noiseless index coding problem consists of. Lattice Index Coding. arxiv: v3 [cs.it] 7 Oct 2015

THE classical noiseless index coding problem consists of. Lattice Index Coding. arxiv: v3 [cs.it] 7 Oct 2015 Lattie Index Coding Lakshmi Natarajan, Yi Hong, Senior Member, IEEE, and Emanuele Viterbo, Fellow, IEEE arxiv:40.6569v3 [s.it] 7 Ot 05 Abstrat The index oding problem involves a sender with K messages

More information

Probabilistic Graphical Models

Probabilistic Graphical Models Probabilisti Graphial Models David Sontag New York University Leture 12, April 19, 2012 Aknowledgement: Partially based on slides by Eri Xing at CMU and Andrew MCallum at UMass Amherst David Sontag (NYU)

More information

Multi-version Coding for Consistent Distributed Storage of Correlated Data Updates

Multi-version Coding for Consistent Distributed Storage of Correlated Data Updates Multi-version Coding for Consistent Distributed Storage of Correlated Data Updates Ramy E. Ali and Vivek R. Cadambe 1 arxiv:1708.06042v1 [s.it] 21 Aug 2017 Abstrat Motivated by appliations of distributed

More information

Methods of evaluating tests

Methods of evaluating tests Methods of evaluating tests Let X,, 1 Xn be i.i.d. Bernoulli( p ). Then 5 j= 1 j ( 5, ) T = X Binomial p. We test 1 H : p vs. 1 1 H : p>. We saw that a LRT is 1 if t k* φ ( x ) =. otherwise (t is the observed

More information

Complexity of Regularization RBF Networks

Complexity of Regularization RBF Networks Complexity of Regularization RBF Networks Mark A Kon Department of Mathematis and Statistis Boston University Boston, MA 02215 mkon@buedu Leszek Plaskota Institute of Applied Mathematis University of Warsaw

More information

Chapter 8 Hypothesis Testing

Chapter 8 Hypothesis Testing Leture 5 for BST 63: Statistial Theory II Kui Zhang, Spring Chapter 8 Hypothesis Testing Setion 8 Introdution Definition 8 A hypothesis is a statement about a population parameter Definition 8 The two

More information

An Achievable Error Exponent for the Mismatched Multiple-Access Channel

An Achievable Error Exponent for the Mismatched Multiple-Access Channel An Achievable Error Exponent for the Mismatched Multiple-Access Channel Jonathan Scarlett University of Cambridge jms265@camacuk Albert Guillén i Fàbregas ICREA & Universitat Pompeu Fabra University of

More information

SINCE Zadeh s compositional rule of fuzzy inference

SINCE Zadeh s compositional rule of fuzzy inference IEEE TRANSACTIONS ON FUZZY SYSTEMS, VOL. 14, NO. 6, DECEMBER 2006 709 Error Estimation of Perturbations Under CRI Guosheng Cheng Yuxi Fu Abstrat The analysis of stability robustness of fuzzy reasoning

More information

DESIGN FOR DIGITAL COMMUNICATION SYSTEMS VIA SAMPLED-DATA H CONTROL

DESIGN FOR DIGITAL COMMUNICATION SYSTEMS VIA SAMPLED-DATA H CONTROL DESIG FOR DIGITAL COMMUICATIO SYSTEMS VIA SAMPLED-DATA H COTROL M agahara 1 Y Yamamoto 2 Department of Applied Analysis and Complex Dynamial Systems Graduate Shool of Informatis Kyoto University Kyoto

More information

A Queueing Model for Call Blending in Call Centers

A Queueing Model for Call Blending in Call Centers A Queueing Model for Call Blending in Call Centers Sandjai Bhulai and Ger Koole Vrije Universiteit Amsterdam Faulty of Sienes De Boelelaan 1081a 1081 HV Amsterdam The Netherlands E-mail: {sbhulai, koole}@s.vu.nl

More information

National University of Singapore Department of Electrical & Computer Engineering. Examination for

National University of Singapore Department of Electrical & Computer Engineering. Examination for National University of Singapore Department of Electrical & Computer Engineering Examination for EE5139R Information Theory for Communication Systems (Semester I, 2014/15) November/December 2014 Time Allowed:

More information

Hankel Optimal Model Order Reduction 1

Hankel Optimal Model Order Reduction 1 Massahusetts Institute of Tehnology Department of Eletrial Engineering and Computer Siene 6.245: MULTIVARIABLE CONTROL SYSTEMS by A. Megretski Hankel Optimal Model Order Redution 1 This leture overs both

More information

Spatial Degrees of Freedom of Large Distributed MIMO Systems and Wireless Ad hoc Networks

Spatial Degrees of Freedom of Large Distributed MIMO Systems and Wireless Ad hoc Networks Spatial Degrees of Freedom of Large Distributed MIMO Systems and Wireless Ad ho Networks Ayfer Özgür Stanford University aozgur@stanford.edu Olivier Lévêque EPFL, Switzerland olivier.leveque@epfl.h David

More information

CMSC 451: Lecture 9 Greedy Approximation: Set Cover Thursday, Sep 28, 2017

CMSC 451: Lecture 9 Greedy Approximation: Set Cover Thursday, Sep 28, 2017 CMSC 451: Leture 9 Greedy Approximation: Set Cover Thursday, Sep 28, 2017 Reading: Chapt 11 of KT and Set 54 of DPV Set Cover: An important lass of optimization problems involves overing a ertain domain,

More information

A Half-Duplex Cooperative Scheme with Partial Decode-Forward Relaying

A Half-Duplex Cooperative Scheme with Partial Decode-Forward Relaying A Half-Duplex Cooperative Scheme with Partial Decode-Forward Relaying Ahmad Abu Al Haija, and Mai Vu, Department of Electrical and Computer Engineering McGill University Montreal, QC H3A A7 Emails: ahmadabualhaija@mailmcgillca,

More information

LECTURE NOTES FOR , FALL 2004

LECTURE NOTES FOR , FALL 2004 LECTURE NOTES FOR 18.155, FALL 2004 83 12. Cone support and wavefront set In disussing the singular support of a tempered distibution above, notie that singsupp(u) = only implies that u C (R n ), not as

More information

DIGITAL DISTANCE RELAYING SCHEME FOR PARALLEL TRANSMISSION LINES DURING INTER-CIRCUIT FAULTS

DIGITAL DISTANCE RELAYING SCHEME FOR PARALLEL TRANSMISSION LINES DURING INTER-CIRCUIT FAULTS CHAPTER 4 DIGITAL DISTANCE RELAYING SCHEME FOR PARALLEL TRANSMISSION LINES DURING INTER-CIRCUIT FAULTS 4.1 INTRODUCTION Around the world, environmental and ost onsiousness are foring utilities to install

More information

Estimating the probability law of the codelength as a function of the approximation error in image compression

Estimating the probability law of the codelength as a function of the approximation error in image compression Estimating the probability law of the odelength as a funtion of the approximation error in image ompression François Malgouyres Marh 7, 2007 Abstrat After some reolletions on ompression of images using

More information

Quasi-Monte Carlo Algorithms for unbounded, weighted integration problems

Quasi-Monte Carlo Algorithms for unbounded, weighted integration problems Quasi-Monte Carlo Algorithms for unbounded, weighted integration problems Jürgen Hartinger Reinhold F. Kainhofer Robert F. Tihy Department of Mathematis, Graz University of Tehnology, Steyrergasse 30,

More information

Packing Plane Spanning Trees into a Point Set

Packing Plane Spanning Trees into a Point Set Paking Plane Spanning Trees into a Point Set Ahmad Biniaz Alfredo Garía Abstrat Let P be a set of n points in the plane in general position. We show that at least n/3 plane spanning trees an be paked into

More information

Research Collection. The relation between block length and reliability for a cascade of AWGN links. Conference Paper. ETH Library

Research Collection. The relation between block length and reliability for a cascade of AWGN links. Conference Paper. ETH Library Research Collection Conference Paper The relation between block length and reliability for a cascade of AWG links Authors: Subramanian, Ramanan Publication Date: 0 Permanent Link: https://doiorg/0399/ethz-a-00705046

More information

Lightpath routing for maximum reliability in optical mesh networks

Lightpath routing for maximum reliability in optical mesh networks Vol. 7, No. 5 / May 2008 / JOURNAL OF OPTICAL NETWORKING 449 Lightpath routing for maximum reliability in optial mesh networks Shengli Yuan, 1, * Saket Varma, 2 and Jason P. Jue 2 1 Department of Computer

More information

Maximum Entropy and Exponential Families

Maximum Entropy and Exponential Families Maximum Entropy and Exponential Families April 9, 209 Abstrat The goal of this note is to derive the exponential form of probability distribution from more basi onsiderations, in partiular Entropy. It

More information

Journal of Inequalities in Pure and Applied Mathematics

Journal of Inequalities in Pure and Applied Mathematics Journal of Inequalities in Pure and Applied Mathematis A NEW ARRANGEMENT INEQUALITY MOHAMMAD JAVAHERI University of Oregon Department of Mathematis Fenton Hall, Eugene, OR 97403. EMail: javaheri@uoregon.edu

More information

Investigation of the de Broglie-Einstein velocity equation s. universality in the context of the Davisson-Germer experiment. Yusuf Z.

Investigation of the de Broglie-Einstein velocity equation s. universality in the context of the Davisson-Germer experiment. Yusuf Z. Investigation of the de Broglie-instein veloity equation s universality in the ontext of the Davisson-Germer experiment Yusuf Z. UMUL Canaya University, letroni and Communiation Dept., Öğretmenler Cad.,

More information

Superposition Encoding and Partial Decoding Is Optimal for a Class of Z-interference Channels

Superposition Encoding and Partial Decoding Is Optimal for a Class of Z-interference Channels Superposition Encoding and Partial Decoding Is Optimal for a Class of Z-interference Channels Nan Liu and Andrea Goldsmith Department of Electrical Engineering Stanford University, Stanford CA 94305 Email:

More information

Information Theory. Lecture 10. Network Information Theory (CT15); a focus on channel capacity results

Information Theory. Lecture 10. Network Information Theory (CT15); a focus on channel capacity results Information Theory Lecture 10 Network Information Theory (CT15); a focus on channel capacity results The (two-user) multiple access channel (15.3) The (two-user) broadcast channel (15.6) The relay channel

More information

The Laws of Acceleration

The Laws of Acceleration The Laws of Aeleration The Relationships between Time, Veloity, and Rate of Aeleration Copyright 2001 Joseph A. Rybzyk Abstrat Presented is a theory in fundamental theoretial physis that establishes the

More information

Stability of alternate dual frames

Stability of alternate dual frames Stability of alternate dual frames Ali Akbar Arefijamaal Abstrat. The stability of frames under perturbations, whih is important in appliations, is studied by many authors. It is worthwhile to onsider

More information

Multiaccess Channels with State Known to One Encoder: A Case of Degraded Message Sets

Multiaccess Channels with State Known to One Encoder: A Case of Degraded Message Sets Multiaccess Channels with State Known to One Encoder: A Case of Degraded Message Sets Shivaprasad Kotagiri and J. Nicholas Laneman Department of Electrical Engineering University of Notre Dame Notre Dame,

More information

Computer Science 786S - Statistical Methods in Natural Language Processing and Data Analysis Page 1

Computer Science 786S - Statistical Methods in Natural Language Processing and Data Analysis Page 1 Computer Siene 786S - Statistial Methods in Natural Language Proessing and Data Analysis Page 1 Hypothesis Testing A statistial hypothesis is a statement about the nature of the distribution of a random

More information

Enhanced Max-Min SINR for Uplink Cell-Free Massive MIMO Systems

Enhanced Max-Min SINR for Uplink Cell-Free Massive MIMO Systems Enhaned Max-Min SINR for Uplin Cell-Free Massive MIMO Systems Manijeh Bashar, Kanapathippillai Cumanan, Alister G. Burr,Mérouane Debbah, and Hien Quo Ngo Department of Eletroni Engineering, University

More information

Derivation of Non-Einsteinian Relativistic Equations from Momentum Conservation Law

Derivation of Non-Einsteinian Relativistic Equations from Momentum Conservation Law Asian Journal of Applied Siene and Engineering, Volue, No 1/13 ISSN 35-915X(p); 37-9584(e) Derivation of Non-Einsteinian Relativisti Equations fro Moentu Conservation Law M.O.G. Talukder Varendra University,

More information

A NETWORK SIMPLEX ALGORITHM FOR THE MINIMUM COST-BENEFIT NETWORK FLOW PROBLEM

A NETWORK SIMPLEX ALGORITHM FOR THE MINIMUM COST-BENEFIT NETWORK FLOW PROBLEM NETWORK SIMPLEX LGORITHM FOR THE MINIMUM COST-BENEFIT NETWORK FLOW PROBLEM Cen Çalışan, Utah Valley University, 800 W. University Parway, Orem, UT 84058, 801-863-6487, en.alisan@uvu.edu BSTRCT The minimum

More information

The gravitational phenomena without the curved spacetime

The gravitational phenomena without the curved spacetime The gravitational phenomena without the urved spaetime Mirosław J. Kubiak Abstrat: In this paper was presented a desription of the gravitational phenomena in the new medium, different than the urved spaetime,

More information

arxiv:gr-qc/ v2 6 Feb 2004

arxiv:gr-qc/ v2 6 Feb 2004 Hubble Red Shift and the Anomalous Aeleration of Pioneer 0 and arxiv:gr-q/0402024v2 6 Feb 2004 Kostadin Trenčevski Faulty of Natural Sienes and Mathematis, P.O.Box 62, 000 Skopje, Maedonia Abstrat It this

More information

ON A PROCESS DERIVED FROM A FILTERED POISSON PROCESS

ON A PROCESS DERIVED FROM A FILTERED POISSON PROCESS ON A PROCESS DERIVED FROM A FILTERED POISSON PROCESS MARIO LEFEBVRE and JEAN-LUC GUILBAULT A ontinuous-time and ontinuous-state stohasti proess, denoted by {Xt), t }, is defined from a proess known as

More information

The Poisson Channel with Side Information

The Poisson Channel with Side Information The Poisson Channel with Side Information Shraga Bross School of Enginerring Bar-Ilan University, Israel brosss@macs.biu.ac.il Amos Lapidoth Ligong Wang Signal and Information Processing Laboratory ETH

More information

max min z i i=1 x j k s.t. j=1 x j j:i T j

max min z i i=1 x j k s.t. j=1 x j j:i T j AM 221: Advaned Optimization Spring 2016 Prof. Yaron Singer Leture 22 April 18th 1 Overview In this leture, we will study the pipage rounding tehnique whih is a deterministi rounding proedure that an be

More information

Sensitivity Analysis in Markov Networks

Sensitivity Analysis in Markov Networks Sensitivity Analysis in Markov Networks Hei Chan and Adnan Darwihe Computer Siene Department University of California, Los Angeles Los Angeles, CA 90095 {hei,darwihe}@s.ula.edu Abstrat This paper explores

More information

Non-Orthogonal Random Access for 5G Mobile Communication Systems

Non-Orthogonal Random Access for 5G Mobile Communication Systems This artile has been aepted for publiation in a future issue of this journal, but has not been fully edited. Content may hange prior to final publiation. Citation information: DOI.9/TVT.8.86, IEEE Non-Orthogonal

More information

Capacity of MIMO Channels with Antenna Selection

Capacity of MIMO Channels with Antenna Selection 1 Capaity of MIMO Channels with Antenna Seletion Shahab Sanayei and Aria Nosratinia Department of Eletrial Engineering The University of Texas at Dallas, Rihardson, TX 75083-0688 E-mail: {sxs025500,aria}@utdallas.edu

More information

Parallel disrete-event simulation is an attempt to speed-up the simulation proess through the use of multiple proessors. In some sense parallel disret

Parallel disrete-event simulation is an attempt to speed-up the simulation proess through the use of multiple proessors. In some sense parallel disret Exploiting intra-objet dependenies in parallel simulation Franeso Quaglia a;1 Roberto Baldoni a;2 a Dipartimento di Informatia e Sistemistia Universita \La Sapienza" Via Salaria 113, 198 Roma, Italy Abstrat

More information

An Outer Bound for the Gaussian. Interference channel with a relay.

An Outer Bound for the Gaussian. Interference channel with a relay. An Outer Bound for the Gaussian Interference Channel with a Relay Ivana Marić Stanford University Stanford, CA ivanam@wsl.stanford.edu Ron Dabora Ben-Gurion University Be er-sheva, Israel ron@ee.bgu.ac.il

More information

The Method of Types and Its Application to Information Hiding

The Method of Types and Its Application to Information Hiding The Method of Types and Its Application to Information Hiding Pierre Moulin University of Illinois at Urbana-Champaign www.ifp.uiuc.edu/ moulin/talks/eusipco05-slides.pdf EUSIPCO Antalya, September 7,

More information

Scalable Positivity Preserving Model Reduction Using Linear Energy Functions

Scalable Positivity Preserving Model Reduction Using Linear Energy Functions Salable Positivity Preserving Model Redution Using Linear Energy Funtions Sootla, Aivar; Rantzer, Anders Published in: IEEE 51st Annual Conferene on Deision and Control (CDC), 2012 DOI: 10.1109/CDC.2012.6427032

More information

Connectivity and Blockage Effects in Millimeter-Wave Air-To-Everything Networks

Connectivity and Blockage Effects in Millimeter-Wave Air-To-Everything Networks 1 Connetivity and Blokage Effets in Millimeter-Wave Air-To-Everything Networks Kaifeng Han, Kaibin Huang and Robert W. Heath Jr. arxiv:1808.00144v1 [s.it] 1 Aug 2018 Abstrat Millimeter-wave (mmwave) offers

More information

Control Theory association of mathematics and engineering

Control Theory association of mathematics and engineering Control Theory assoiation of mathematis and engineering Wojieh Mitkowski Krzysztof Oprzedkiewiz Department of Automatis AGH Univ. of Siene & Tehnology, Craow, Poland, Abstrat In this paper a methodology

More information

Variable Length Codes for Degraded Broadcast Channels

Variable Length Codes for Degraded Broadcast Channels Variable Length Codes for Degraded Broadcast Channels Stéphane Musy School of Computer and Communication Sciences, EPFL CH-1015 Lausanne, Switzerland Email: stephane.musy@ep.ch Abstract This paper investigates

More information

A Functional Representation of Fuzzy Preferences

A Functional Representation of Fuzzy Preferences Theoretial Eonomis Letters, 017, 7, 13- http://wwwsirporg/journal/tel ISSN Online: 16-086 ISSN Print: 16-078 A Funtional Representation of Fuzzy Preferenes Susheng Wang Department of Eonomis, Hong Kong

More information

On Molecular Timing Channels with α-stable Noise

On Molecular Timing Channels with α-stable Noise On Moleular Timing Channels with α-stable Noise Yonathan Murin, Nariman Farsad, Mainak Chowdhury, and Andrea Goldsmith Department of Eletrial Engineering, Stanford University, USA Abstrat This work studies

More information

A Characterization of Wavelet Convergence in Sobolev Spaces

A Characterization of Wavelet Convergence in Sobolev Spaces A Charaterization of Wavelet Convergene in Sobolev Spaes Mark A. Kon 1 oston University Louise Arakelian Raphael Howard University Dediated to Prof. Robert Carroll on the oasion of his 70th birthday. Abstrat

More information

Error Bounds for Context Reduction and Feature Omission

Error Bounds for Context Reduction and Feature Omission Error Bounds for Context Redution and Feature Omission Eugen Bek, Ralf Shlüter, Hermann Ney,2 Human Language Tehnology and Pattern Reognition, Computer Siene Department RWTH Aahen University, Ahornstr.

More information

On the Capacity of the Two-Hop Half-Duplex Relay Channel

On the Capacity of the Two-Hop Half-Duplex Relay Channel On the Capacity of the Two-Hop Half-Duplex Relay Channel Nikola Zlatanov, Vahid Jamali, and Robert Schober University of British Columbia, Vancouver, Canada, and Friedrich-Alexander-University Erlangen-Nürnberg,

More information

The law of the iterated logarithm for c k f(n k x)

The law of the iterated logarithm for c k f(n k x) The law of the iterated logarithm for k fn k x) Christoph Aistleitner Abstrat By a lassial heuristis, systems of the form osπn k x) k 1 and fn k x)) k 1, where n k ) k 1 is a rapidly growing sequene of

More information

Product Policy in Markets with Word-of-Mouth Communication. Technical Appendix

Product Policy in Markets with Word-of-Mouth Communication. Technical Appendix rodut oliy in Markets with Word-of-Mouth Communiation Tehnial Appendix August 05 Miro-Model for Inreasing Awareness In the paper, we make the assumption that awareness is inreasing in ustomer type. I.e.,

More information

University of Groningen

University of Groningen University of Groningen Port Hamiltonian Formulation of Infinite Dimensional Systems II. Boundary Control by Interonnetion Mahelli, Alessandro; van der Shaft, Abraham; Melhiorri, Claudio Published in:

More information

Sensor management for PRF selection in the track-before-detect context

Sensor management for PRF selection in the track-before-detect context Sensor management for PRF seletion in the tra-before-detet ontext Fotios Katsilieris, Yvo Boers, and Hans Driessen Thales Nederland B.V. Haasbergerstraat 49, 7554 PA Hengelo, the Netherlands Email: {Fotios.Katsilieris,

More information

Joint Source-Channel Coding for the Multiple-Access Relay Channel

Joint Source-Channel Coding for the Multiple-Access Relay Channel Joint Source-Channel Coding for the Multiple-Access Relay Channel Yonathan Murin, Ron Dabora Department of Electrical and Computer Engineering Ben-Gurion University, Israel Email: moriny@bgu.ac.il, ron@ee.bgu.ac.il

More information

Mismatched Multi-letter Successive Decoding for the Multiple-Access Channel

Mismatched Multi-letter Successive Decoding for the Multiple-Access Channel Mismatched Multi-letter Successive Decoding for the Multiple-Access Channel Jonathan Scarlett University of Cambridge jms265@cam.ac.uk Alfonso Martinez Universitat Pompeu Fabra alfonso.martinez@ieee.org

More information

11.1 Polynomial Least-Squares Curve Fit

11.1 Polynomial Least-Squares Curve Fit 11.1 Polynomial Least-Squares Curve Fit A. Purpose This subroutine determines a univariate polynomial that fits a given disrete set of data in the sense of minimizing the weighted sum of squares of residuals.

More information

A model for measurement of the states in a coupled-dot qubit

A model for measurement of the states in a coupled-dot qubit A model for measurement of the states in a oupled-dot qubit H B Sun and H M Wiseman Centre for Quantum Computer Tehnology Centre for Quantum Dynamis Griffith University Brisbane 4 QLD Australia E-mail:

More information

A Spatiotemporal Approach to Passive Sound Source Localization

A Spatiotemporal Approach to Passive Sound Source Localization A Spatiotemporal Approah Passive Sound Soure Loalization Pasi Pertilä, Mikko Parviainen, Teemu Korhonen and Ari Visa Institute of Signal Proessing Tampere University of Tehnology, P.O.Box 553, FIN-330,

More information

Complementarities in Spectrum Markets

Complementarities in Spectrum Markets Complementarities in Spetrum Markets Hang Zhou, Randall A. Berry, Mihael L. Honig and Rakesh Vohra EECS Department Northwestern University, Evanston, IL 6008 {hang.zhou, rberry, mh}@ees.northwestern.edu

More information

Capacity-achieving Input Covariance for Correlated Multi-Antenna Channels

Capacity-achieving Input Covariance for Correlated Multi-Antenna Channels Capaity-ahieving Input Covariane for Correlated Multi-Antenna Channels Antonia M. Tulino Universita Degli Studi di Napoli Federio II 85 Napoli, Italy atulino@ee.prineton.edu Angel Lozano Bell Labs (Luent

More information

SUPPORTING ultra-reliable and low-latency communications

SUPPORTING ultra-reliable and low-latency communications IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 17, NO. 1, JANUARY 2018 127 Cross-Layer Optimization for Ultra-Reliable and Low-Lateny Radio Aess Networs Changyang She, Member, IEEE, Chenyang Yang,

More information

4828 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 61, NO. 9, SEPTEMBER 2015

4828 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 61, NO. 9, SEPTEMBER 2015 4828 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 61, NO. 9, SEPTEMBER 2015 Key Generation Algorithms for Pairwise Independent Networks Based on Graphial Models Lifeng Lai, Member, IEEE, and Siu-Wai Ho,

More information

Contact Block Reduction Method for Ballistic Quantum Transport with Semi-empirical sp3d5s* Tight Binding band models

Contact Block Reduction Method for Ballistic Quantum Transport with Semi-empirical sp3d5s* Tight Binding band models Purdue University Purdue e-pubs Other Nanotehnology Publiations Birk Nanotehnology Center -2-28 Contat Redution Method for Ballisti Quantum Transport with Semi-empirial sp3d5s* Tight Binding band models

More information

Space-time duality in multiple antenna channels

Space-time duality in multiple antenna channels Spae-time duality in multiple antenna hannels Massimo Franeshetti, Kaushik Chakraborty 1 Abstrat The onept of information transmission in a multiple antenna hannel with sattering objets is studied from

More information

Passivity and Stability of Switched Systems Under Quantization

Passivity and Stability of Switched Systems Under Quantization Passivity and Stability of Swithed Systems Under Quantization Feng Zhu Department of Eletrial Engineering University of Notre Dame Notre Dame, IN, 46556 fzhu1@nd.edu Han Yu Department of Eletrial Engineering

More information

Faster Data-access in Large-scale Systems: Network-scale Latency Analysis under General Service-time Distributions

Faster Data-access in Large-scale Systems: Network-scale Latency Analysis under General Service-time Distributions arxiv:807.02253v [s.dc 6 Jul 208 Faster Data-aess in Large-sale Systems: Networ-sale Lateny Analysis under General Servie-time Distributions Avishe Ghosh Department of EECS University of California, Bereley,

More information

Sensitivity of Spectrum Sensing Techniques to RF impairments

Sensitivity of Spectrum Sensing Techniques to RF impairments Sensitivity of Spetrum Sensing Tehniques to RF impairments Jonathan Verlant-Chenet Julien Renard Jean-Mihel Driot Philippe De Donker François Horlin Université Libre de Bruelles - OPERA Dpt., Avenue F.D.

More information

Diversity Analysis of Bit-Interleaved Coded Multiple Beamforming with Orthogonal Frequency Division Multiplexing

Diversity Analysis of Bit-Interleaved Coded Multiple Beamforming with Orthogonal Frequency Division Multiplexing IEEE ICC 03 - Wireless Communiations Symposium Diversity Analysis of Bit-Interleaved Coded Multiple Beamforming with Orthogonal Frequeny Division Multiplexing Boyu Li and Ender Ayanoglu Center for Pervasive

More information

ETSI EN V8.0.1 ( )

ETSI EN V8.0.1 ( ) EN 300 728 V8.0.1 (2000-11) European Standard (Teleommuniations series) Digital ellular teleommuniations system (Phase 2+); Comfort noise aspets for Enhaned Full Rate (EFR) speeh traffi hannels (GSM 06.62

More information

Optimization of Statistical Decisions for Age Replacement Problems via a New Pivotal Quantity Averaging Approach

Optimization of Statistical Decisions for Age Replacement Problems via a New Pivotal Quantity Averaging Approach Amerian Journal of heoretial and Applied tatistis 6; 5(-): -8 Published online January 7, 6 (http://www.sienepublishinggroup.om/j/ajtas) doi:.648/j.ajtas.s.65.4 IN: 36-8999 (Print); IN: 36-96 (Online)

More information

Distributed Functional Compression through Graph Coloring

Distributed Functional Compression through Graph Coloring Distributed Functional Compression through Graph Coloring Vishal Doshi, Devavrat Shah, Muriel Médard, and Sidharth Jaggi Laboratory for Information and Decision Systems Massachusetts Institute of Technology

More information

Sensor Network Localisation with Wrapped Phase Measurements

Sensor Network Localisation with Wrapped Phase Measurements Sensor Network Loalisation with Wrapped Phase Measurements Wenhao Li #1, Xuezhi Wang 2, Bill Moran 2 # Shool of Automation, Northwestern Polytehnial University, Xian, P.R.China. 1. wenhao23@mail.nwpu.edu.n

More information

Discrete Generalized Burr-Type XII Distribution

Discrete Generalized Burr-Type XII Distribution Journal of Modern Applied Statistial Methods Volume 13 Issue 2 Artile 13 11-2014 Disrete Generalized Burr-Type XII Distribution B. A. Para University of Kashmir, Srinagar, India, parabilal@gmail.om T.

More information

Resolving RIPS Measurement Ambiguity in Maximum Likelihood Estimation

Resolving RIPS Measurement Ambiguity in Maximum Likelihood Estimation 14th International Conferene on Information Fusion Chiago, Illinois, USA, July 5-8, 011 Resolving RIPS Measurement Ambiguity in Maximum Likelihood Estimation Wenhao Li, Xuezhi Wang, and Bill Moran Shool

More information

Relativistic Addition of Velocities *

Relativistic Addition of Velocities * OpenStax-CNX module: m42540 1 Relativisti Addition of Veloities * OpenStax This work is produed by OpenStax-CNX and liensed under the Creative Commons Attribution Liense 3.0 Abstrat Calulate relativisti

More information

IMPEDANCE EFFECTS OF LEFT TURNERS FROM THE MAJOR STREET AT A TWSC INTERSECTION

IMPEDANCE EFFECTS OF LEFT TURNERS FROM THE MAJOR STREET AT A TWSC INTERSECTION 09-1289 Citation: Brilon, W. (2009): Impedane Effets of Left Turners from the Major Street at A TWSC Intersetion. Transportation Researh Reord Nr. 2130, pp. 2-8 IMPEDANCE EFFECTS OF LEFT TURNERS FROM THE

More information

EDGE-DISJOINT CLIQUES IN GRAPHS WITH HIGH MINIMUM DEGREE

EDGE-DISJOINT CLIQUES IN GRAPHS WITH HIGH MINIMUM DEGREE EDGE-DISJOINT CLIQUES IN GRAPHS WITH HIGH MINIMUM DEGREE RAPHAEL YUSTER Abstrat For a graph G and a fixed integer k 3, let ν k G) denote the maximum number of pairwise edge-disjoint opies of K k in G For

More information

Word of Mass: The Relationship between Mass Media and Word-of-Mouth

Word of Mass: The Relationship between Mass Media and Word-of-Mouth Word of Mass: The Relationship between Mass Media and Word-of-Mouth Roman Chuhay Preliminary version Marh 6, 015 Abstrat This paper studies the optimal priing and advertising strategies of a firm in the

More information

Systems with Finite Communication Bandwidth Constraints Part I: State Estimation Problems

Systems with Finite Communication Bandwidth Constraints Part I: State Estimation Problems 194 IEEE TRNSCTIONS ON UTOTIC CONTROL, VOL. 4, NO. 9, SEPTEBER 1997 Systems with Finite Communiation Bandwidth Constraints Part I State Estimation Prolems Wing Shing Wong and Roger W. Brokett strat In

More information

Capacity Pooling and Cost Sharing among Independent Firms in the Presence of Congestion

Capacity Pooling and Cost Sharing among Independent Firms in the Presence of Congestion Capaity Pooling and Cost Sharing among Independent Firms in the Presene of Congestion Yimin Yu Saif Benjaafar Graduate Program in Industrial and Systems Engineering Department of Mehanial Engineering University

More information

Robust estimation of the external drift and the variogram of spatial data

Robust estimation of the external drift and the variogram of spatial data Researh Colletion Conferene Paper Robust estimation of the external drift and the variogram of spatial data Author(s): Künsh, Hansruedi; Papritz, Andreas Jürg; Shwierz, Cornelia; Stahel, Werner A. Publiation

More information

Efficient Use of Joint Source-Destination Cooperation in the Gaussian Multiple Access Channel

Efficient Use of Joint Source-Destination Cooperation in the Gaussian Multiple Access Channel Efficient Use of Joint Source-Destination Cooperation in the Gaussian Multiple Access Channel Ahmad Abu Al Haija ECE Department, McGill University, Montreal, QC, Canada Email: ahmad.abualhaija@mail.mcgill.ca

More information

ECE Information theory Final (Fall 2008)

ECE Information theory Final (Fall 2008) ECE 776 - Information theory Final (Fall 2008) Q.1. (1 point) Consider the following bursty transmission scheme for a Gaussian channel with noise power N and average power constraint P (i.e., 1/n X n i=1

More information

Convergence of reinforcement learning with general function approximators

Convergence of reinforcement learning with general function approximators Convergene of reinforement learning with general funtion approximators assilis A. Papavassiliou and Stuart Russell Computer Siene Division, U. of California, Berkeley, CA 94720-1776 fvassilis,russellg@s.berkeley.edu

More information

Dynamic Rate and Channel Selection in Cognitive Radio Systems

Dynamic Rate and Channel Selection in Cognitive Radio Systems 1 Dynami Rate and Channel Seletion in Cognitive Radio Systems R. Combes and A. Proutiere KTH, The Royal Institute of Tehnology arxiv:1402.5666v2 [s.it] 12 May 2014 Abstrat In this paper, we investigate

More information