A Linearithmic Time Algorithm for a Shortest Vector Problem in Compute-and-Forward Design
|
|
- Ashlie Bradford
- 5 years ago
- Views:
Transcription
1 A Linearithmic Time Algorithm for a Shortest Vector Problem in Compute-and-Forward Design Jing Wen and Xiao-Wen Chang ENS de Lyon, LIP, CNRS, ENS de Lyon, Inria, UCBL), Lyon 69007, France, jwen@math.mcll.ca School of Computer Science, McGill University, Montreal, H3A A7, Canada, chang@cs.mcll.ca Abstract We modify the algorithm proposed by Sahraei et al. in 05, resulting an algorithm with expected complexity of On log n) arithmetic operations to solve a special shortest vector problem arising in computer-and-forward design, n is the dimension of the channel vector. This algorithm is more efficient than the best known algorithms with proved complexity. Index Terms Shortest vector problem, Compute-and-forward, linearithmic time algorithm. I. INTRODUCTION In this paper, we consider solving the following quadratic integer programg problem arising in compute-and-forward CF) design: P a Z n \0} at Ga, G = I + P h hht, ) P, a constant, is the transmission power, h R n is a random channel vector following the normal distribution N 0, I) and h = h T h) /. In relay networks, CF is a promising relaying strategy that can offer higher rates than traditional ones such as amplifyand-forward and decode-and-forward, especially in the moderate SNR reme. To find the optimal coefficient vector that maximizes the computation rate at a relay in CF scheme, we need to solve ). Is easy to verify that the matrix G in ) is symmetric positive definite, so it has the Cholesky factorization G = R T R, R is an upper triangular matrix. Then we can rewrite ) as a shortest vector problem SVP): a Z n \0} Ra. ) The general SVP arises in many applications, including cryptography and communications, and there are different algorithms to solve it see, e.g., [], []). Although it has not been proved that the general SVP is NP-hard, it was shown in [3] that the SVP is NP-hard for randomized reductions. However, since the SVP ) is special due to the structure of G, efficient algorithms can be designed to solve it. Various methods have been proposed for solving ), including the branch-and-bound algorithm [4] which did not This work was supported by NSERC of Canada grant 79-, Programme Avenir Lyon Saint-Etienne de l Université de Lyon in the framework of the programme Inverstissements d Avenir ANR--IDEX-0007) and by ANR through the HPAC project under Grant ANR BS0 03. use the properties of G), the algorithm proposed in [5] and its improvement [6], which has the best known proved expected complexity of On.5 log n) In this paper, the complexity is measured by the number of arithmetic operations.), the sphere decoding based algorithm ven in [7], whose expected complexity is approximately On.5 ). There are also some suboptimal algorithms, see [8], [9] and [0]. In this paper, we will modify the algorithm proposed in [6] for solving ) to reduce the expected complexity to On log n). The rest of the paper is organized as follows. In Section II, we review the algorithms proposed in [6] and [7] for solving ). Then, in Section III, we propose a new algorithm. To compare these three algorithms computationally, we ve numerical results in Section IV. Finally, conclusions are ven in Section V. Notation. We use R n and Z n to denote the spaces of the n dimensional column real vectors and integer vectors, respectively, and R m n to denote the spaces of the m n real matrices. Boldface lowercase letters denote column vectors and boldface uppercase letters denote matrices. For a vector t, t denotes its l -norm. We use e k to denote the k-th column of an n n identity matrix I, e to denote the n dimensional vector with all of its elements being one and 0 denote the n dimensional zero vector. For x R, we use x and x respectively denote the smallesnteger thas not smaller than x and the largesnteger thas not larger than x. For t R n, we use t to denote its nearesnteger vector, i.e., each entry of s rounded to its nearesnteger. For a set Φ, we use Φ to denote its cardinality. II. EXISTING ALGORITHMS In this section, we review the algorithms proposed in [6] and [7] for solving ). A. The Algorithm of Sahraei and Gastpar In this subsection, we review the algorithm of Sahraei and Gastpar proposed in [6], which has the complexity Onψ lognψ)), ψ = + P h. 3) We will show that the expected complexity is On.5 log n) when h, as is assumed in computer-and-forward design,
2 follows the normal distribution N 0, I). For the sake of convenience, we will refer to the algorithm as Algorithm SG. Given h, we assume is a nonzero vector. Otherwise the problem ) becomes trivial. We first simplify notation as [6] does. Let v = P h h, α = h + P h. 4) Then v = and we can rewrite ) as a Z n \0} at Ga, G = I αvv T. 5) The algorithm in [6] is based on the following two theorems which were ven in [] and [5], respectively. Theorem : The solution a to the SVP problem 5) satisfies a ψ, ψ is defined in 3). Theorem : The solution a to 5) is a standard unit vector, up to a sign, i.e., a = ±e i for some i,..., n}, or satisfies for some x R, leading to a e < vx < a + e 6) a = vx. 7) Define ax) = vx, then for any v i 0, a i x) = v i x is a piecewise constant function of x and so is the objective function fax)) = ax) T Gax). Thus, fax)) can be represented as p k, if ξ k < x < ξ k+, k =,,... fax)) =, 8) q k, if x = ξ k, k =,,... ξ k are sorted real numbers denoting the discontinuity points of fax)). By 8), fax)) is a constant for x ξ k, ξ k+ ). Thus, by 6), fa ) = f k=,,... a ξk + ξ ) ) k+. 9) To reduce the computational cost, [6] looks at only part of the discontinuity points. Is easy to see that the discontinuity points of a i x) are x = c v i v i 0) for any c Z, which are also the discontinuity points of the objective function fax)). Notice thaf a is a solution, then a is also a solution. This fact was used in [] to reduce the search cost.) Using this fact, [6] just considers only positive discontinuity points, i.e., only positive candidates for c are considered. Furthermore, from Theorem, v i x ψ. Thus one needs only to consider those c satisfying 0 < c ψ + / this bound was ven in [6] and is easy to see that can be replaced by a slightly tighter bound ψ + /). Therefore, if 6) holds, from 9), we have fa ) = f ξ k,ξ k+ Ψ a ξk + ξ ) ) k+, 0) Ψ = n Ψ i, ) vi = 0 Ψ i = c 0 < c ψ +, c Z} v i 0. ) v i The algorithm proposed in [6] for solving 5) calculates the set Ψ and sorts its elements in increasing order and then computes the right hand side of 0), and then compares it with i f±e i ), which is equal to i αvi ), to get the solution. By 5), for a Z n, fa) = a T Ga = a i α a i v i ). According to [6], since the discontinuity points of f are sorted and at each step only one of the a i s change, n a i and α n a iv i ) can be updated in constant time. Therefore, fa) can also be calculated in constant time. Here we make a remark. Actually different Ψ i may have the same elements. But they can be regarded as different quantities when fa) is updated. In order to remember which a i needs to be updated at each step, a label is assigned to every element of Ψ to indicate which Ψ j it orinally belonged to. In the new algorithm proposed in Section III, we will ve more details about this idea. Now we describe the complexity analysis ven in [6] for the algorithm. By ), the number of elements of Ψ i is upper bounded by ψ +, so the number of elements of Ψ is upper bounded by n ψ + ) note thaf v i 0 for i n, this is the exact number of elements). From the above analysis, the complexity of the algorithm is detered by the sorting step, which has the complexity of Onψ lognψ)), ψ is defined in 3). In the following, we derive the expected complexity of Algorithm SG when h N 0, I) by following [7]. Since h N 0, I), h χ n). Therefore, E[ h ] = n. Since + P x is a concave function of x, by Jensen s Inequality, [ ] E [ψ] = E + P h + np. 3) Thus, the expected complexity of Algorithm SG is On.5 log n). B. The Algorithm of Wen, Zhou, Mow and Chang In this subsection, we review the algorithm of Wen et al ven in [7], an improvement of the earlier version ven in []. Its complexity is approximated by Onlog n+ψ)) based on the Gaussian heuristic, ψ is defined in 3). By 3), the expected complexity is approximately On.5 ) when h N 0, I). For the sake of convenience, we will refer to the algorithm as Algorithm WZMC. Again we want to simplify the matrix G in ). Define P t = + P h h = αv. 4)
3 Then, ) can be rewritten as a Z n \0} at Ga, G = I tt T. 5) Since h 0, t 0. Obviously, if a is a solution to 5), then so is a. Thus, for simplicity, only the solution a such that t T a 0 was considered in [] and [7]. We also use this restriction throughout the rest of this paper. In [7], 5) is first transformed to the standard form of the SVP ) by finding the Cholesky factor R of G i.e., G = R T R) based on the following theorem. Theorem 3: The Cholesky factor R of G in 5) is ven by r ij = g i, j = i n t j g i g i, i < j n, g 0 = and for i n, g i = i k= t k. Instead of forg the whole R explicitly, only the diagonal entries of R were calculated, so is easy to check that the complexity of this step is only On). It was showed in [4] thaf t t... t n 0, 6) then there exists a solution a to 5) satisfying a a... a n 0. 7) Given t, if < 0 for some i, we can change it to without channg anything else. To have the order 6), we can permute the entries of t. This step costs On log n). To decrease the computational cost, the following n + ) dimensional vector p was introduced in [7]: Define p n+ = 0, p i = p i+ + a i, i = n, n,...,. d n = 0, d i = r ii j=i+ r ij a j, i = n,...,. Then, by Theorem 3, d i = t i t j a j = p i+, i = n,...,. Thus, Ra = j=i+ n r iia i d i ) = r ii a i p i+ /g i ). The Schnorr-Euchner search algorithm [3] was modified to search the optimal solution satisfying 7) within the ellipsoid: riia i p i+ / ) < fe ) = t. If no nonzero integer poins found, e is the solution. The cost of the search process was approximately Onψ) based on the Gaussian heuristic. Thus, by the above analysis and 3), the expected complexity of Algorithm WZMC is approximated by On.5 ) when h N 0, I). III. A MODIFIED ALGORITHM In this section, we modify the SG algorithm, resulting an algorithm with complexity of O n + n, φ}φ) logn + n, φ}φ) ), φ = + P h max i n h i ). 8) By 3) and 3), the expected complexity is On log n) when h N 0, I). Recall that Algorithm SG checks some discontinuity points of the objective function to find the optimal solution. The main idea of our modified algorithm is to reduce the number of discontinuity points to be checked. In the following, we introduce a theorem, which can significantly reduce the number of discontinuity points to be checked in finding the optimal one. Theorem 4: Suppose that t satisfies t =... = t p > t p+... t q > t q+ =... = t n = 0, 9) integers p and q satisfying p, q n we define t n+ = 0 when p = n or q = n). Then the solution a to 5) satisfies either or for some x R satisfying a = ±e k, k p, a = ± tx t x µ, 0) t µ = i q i t Proof. Note that for k,..., p}, ) +. ) f±e i) = i n i n ) = t k = f±e k ). Is possible that ±e k for k =,..., p are solutions to 5). In the following proof we assume they are not. By 4) and Theorem, there exists x R such that the solution can be written as a = tx. Note thaf tx is a solution, so is tx. Thus we can just assume that x here is positive. Then by 9) we have a =... = a p a p+... a q a q+ =... = a n = 0. ) We must have a, otherwise a = e, contradicting with our assumption. Thus, t x a. Therefore, the firsnequality in 0) holds. In the following, we show that the second inequality in 0) holds. Since e is not an optimal solution, fa ) < fe ), i.e., a t T a ) < t.
4 Therefore, by the Cauchy-Schwarz inequality, By ), for i =,..., q, a < t t. 3) a ia i ). 4) Then, using the fact that a = tx and 3) and 4), we have x a i + t i t +. Since the aforementioned equality holds for all i =,..., q, the second inequality in 0) holds, completing the proof. Like Algorithm WZMC, our new algorithm first performs a transformation on n 5) such that 9) holds, costing On log n). We define ax) = tx cf. Section II-A). Then for any i =,..., q, q is defined in 9)), a i x) = x is a piecewise constant function of x and its discontinuity points are x = c c Z. To find the optimal discrete points, we need consider only a finite subset of those discrete points. In fact, by Theorem 4, we need to consider only those x = c/, c satisfies Thus, we define Φ i = t c µ, Φ = c Z q Φ i, 5) c, i ) t c µ, c Z }. 6) Then the optimal discontinuity point and its position in the vector ax) must be in Φ. Like in [6], we sort the first elements of the members of Φ in increasing order, then by 6), only one entry of a increase for each elemenn Φ note thaf some of the entries of t are the same, then the corresponding Φ i have the same x, but we can regard them as different quantities to update a and the corresponding fax))). By following [6], we can compute fax)) for each x by constant time. Specifically, denote T = n a i and T = n a i, then fax)) = T T. We start from T = T = 0 and a = 0, and for each x, i) Φ, we update a by setting a i = a i +, then we update T by setting T = T +a i, update T by setting T = T +, and update f by setting f = T T. During the enumeration process, we only keep the a which imizes f and the corresponding f. If f < t, then the final a is a, otherwise, a = e. By the above analysis, the algorithm can be summarized in Algorithm. Before analyzing the complexity of Algorithm, we look into the number of discontinuous points needed to be checked Algorithm Modified Algorithm Input: Channel vector h and transmission power P Output: a Initialization: : calculate t by 4) : perform a signed permutation on t such that the new t satisfies 9) 3: calculate µ by ) 4: let Φ =, f = t, a = e Phase : 5: for all i,..., q} do 6: for all c / Z such that /t ) c µ do 7: calculate x = c/ 8: Φ = Φ x, i) 9: end for 0: end for Phase : : sort Φ by the first element of the members in an increasing order : set T = 0, T = 0 and a = 0. 3: for every x, i) Φ do 4: a i = a i + 5: T = T + a i 6: T = T + 7: f = T T 8: if f < f then 9: set a = a 0: set f = f : end if : end for 3: return sign permuted a by Algorithm and Algorithm SG. By ), 4) and 8), for i,..., q}, µ t i t i = + P h max h j ) = φ, i j the max is involved because t is the largest among all t i after the permutation of t see 6)). Thus, by 6), Φ i φ/ i +. 7) By ), for i,..., n}, Ψ i = ψ +, 8) ψ is defined in 3). Thus, from 7), 8), 3) and 8), it follows that Φ i φ/ i + Ψ i <, i =,..., q. ψ + Note that φ can be arbitrarily smaller than ψ see 3) and 8)). Also when i is big enough, φ/ i = 0. Thus the modified
5 algorithm can significantly reduce the number of discontinuity points to be checked. Now we study the complexity of Algorithm. Clearly, ψ/ i = 0 when i > φ. Then, with k = q, φ } and by 7), we have Φ = q Φ i φ k i + q φ k = kφ + q n, φ}φ + n. i i x dx + q Thus the complexity of line of Algorithm is On + n, φ}φ) logn + n, φ}φ). Is easy to see it is actually the complexity of the whole algorithm. Then it follows from 3), 8) and 3) that the expected complexity of Algorithm is On log n) when h N 0, I). IV. NUMERICAL SIMULATIONS In this section, we present numerical results to compare the efficiency of our modified method, i.e., Algorithm denoted by Modified ) with those in [6] denoted by SG ) and [7] denoted by WZMC ). We do not compare Algorithm with the branch-and-bound algorithm in [4] since numerical tests in [7] show that the algorithm in [5] is faster, while the algorithm in [6] is an improved version of than [5]. All the numerical tests were done by MATLAB 00a on a laptop with IntelR) CoreTM) i5-5300u CPU@.30GHz. We set the dimension n of h being 0, 0,..., 80 and h N 0, I). For each ven n and P, we randomly generate 000 realizations of h and apply the three algorithms to solve ). Figure shows the total CPU time for P =. CPU Time SG Modified WZMC Dimension n Fig.. Total CPU time versus n for P = From Figure, we can see that the total CPU time for the modified method and WZMC are very close, So for comparisons we also ve Table I to show the total CPU time for P = 50. From Figure and Table I, we can see that our proposed algorithm is much faster than SG, and is also faster than WZMC if both n and P are not very large which means the new algorithm and WZMC have advantages in different n TABLE I TOTAL CPU TIME IN SECONDS VERSUS n FOR P = SG Modified WZMC settings, so both of them are useful. Algorithm has another advantage, i.e., its complexity can be rigorously analyzed, while the complexity for WZMC was based on Gaussian heuristic. V. CONCLUSIONS In this paper, we proposed an algorithm with the expected complexity of On log n) for a shortest vector problem arising in compute-and-forward network coding design, by modifying the algorithm in [6]. The complexity is lower than On.5 log n), the expected complexity of the latest algorithm in [6], and On.5 ), the approximated expected complexity of the algorithm proposed in [7]. Simulation results showed that the new algorithm is much faster than that ven in [6]. REFERENCES [] E. Agrell, T. Eriksson, A. Vardy, and K. Zeger, Closest point search in lattices, IEEE Transactions on Information Theory, vol. 48, no. 8, pp. 0 4, 00. [] G. Hanrot, X. Xavier Pujol, and D. Stehlé, Algorithms for the shortest and closest lattice vector problems, in Proceedings of the third international conference on coding and cryptology IWCC ). Springer- Verlag Berlin, Heidelberg, 0, pp [3] M. Ajtai, The shortest vector problem in l is np-hard for randomized reductions, in Proceedings of the thirtieth annual ACM symposium on Theory of computing. ACM, 998, pp [4] J. Richter, C. Scheunert, and E. Jorswieck, An efficient branch-andbound algorithm for compute-and-forward, in IEEE 3rd International Symposium on Personal Indoor and Mobile Radio Communications PIMRC ), Sept 0, pp [5] S. Sahraei and M. Gastpar, Compute-and-forward: Finding the best equation, in 04 5nd Annual Allerton Conference on Communication, Control, and Computing Allerton). IEEE, 04, pp [6], Polynomially solvable instances of the shortest and closest vector problems with applications to compute-and-forward, arxiv preprint arxiv: , 05. [7] J. Wen, B. Zhou, W. Mow, and X.-W. Chang, An efficient algorithm for optimally solving a shortest vector problem in compute-and-forward design, submitted to IEEE Transactions on Wireless Communications. [8] A. Sakzad, E. Viterbo, Y. Hong, and J. Boutros, On the ergodic rate for compute-and-forward, in 0 International Symposium on Network Coding NetCod), 0, pp [9] B. Zhou and W. Mow, A quadratic programg relaxation approach to compute-and-forward network coding design, in The 04 IEEE International Symposium on Information Theory ISIT 04), 04, pp [0] B. Zhou, J. Wen, and W. Mow, A quadratic programg relaxation approach to compute-and-forward network coding design, submitted to IEEE Transactions on Communications. [] B. Nazer and M. Gastpar, Compute-and-forward: Harnessing interference through structured codes, IEEE Transactions on Information Theory, vol. 57, no. 0, pp , 0. [] J. Wen, B. Zhou, W. Mow, and X.-W. Chang, Compute-and-Forward design based on improved sphere decoding, in 05 IEEE International Conference on Communications, ICC 05, London, United Kingdom, June 8-, 05, 05, pp [3] C. Schnorr and M. Euchner, Lattice basis reduction: improved practical algorithms and solving subset sum problems, Mathematical Programg, vol. 66, pp. 8 9, 994.
A Quadratic Programming Relaxation Approach to Compute-and-Forward Network Coding Design
1 A Quadratic Programming Relaxation Approach to Compute-and-Forward Network Coding Design Baojian Zhou, Student Member, IEEE, Jinming Wen, arxiv:1607.01864v1 [cs.it] 7 Jul 2016 and Wai Ho Mow, Senior
More informationPartial LLL Reduction
Partial Reduction Xiaohu Xie School of Computer Science McGill University Montreal, Quebec, Canada H3A A7 Email: xiaohu.xie@mail.mcgill.ca Xiao-Wen Chang School of Computer Science McGill University Montreal,
More informationAn Efficient Optimal Algorithm for Integer-Forcing Linear MIMO Receivers Design
An Efficient Optimal Algorithm for Integer-Forcing Linear MIMO Receivers Design Jinming Wen, Lanping Li, Xiaohu Tang, Wai Ho Mow, and Chintha Tellambura Department of Electrical and Computer Engineering,
More informationInteger Least Squares: Sphere Decoding and the LLL Algorithm
Integer Least Squares: Sphere Decoding and the LLL Algorithm Sanzheng Qiao Department of Computing and Software McMaster University 28 Main St. West Hamilton Ontario L8S 4L7 Canada. ABSTRACT This paper
More informationSolving the Shortest Lattice Vector Problem in Time n
Solving the Shortest Lattice Vector Problem in Time.465n Xavier Pujol 1 and Damien Stehlé 1 Université de Lyon, Laboratoire LIP, CNRS-ENSL-INRIA-UCBL, 46 Allée d Italie, 69364 Lyon Cedex 07, France CNRS,
More informationClosest Point Search in Lattices
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 48, NO 8, AUGUST 2002 2201 Closest Point Search in Lattices Erik Agrell, Member, IEEE, Thomas Eriksson, Member, IEEE, Alexander Vardy, Fellow, IEEE, and Kenneth
More informationAnalyzing Blockwise Lattice Algorithms using Dynamical Systems
Analyzing Blockwise Lattice Algorithms using Dynamical Systems Guillaume Hanrot, Xavier Pujol, Damien Stehlé ENS Lyon, LIP (CNRS ENSL INRIA UCBL - ULyon) Analyzing Blockwise Lattice Algorithms using Dynamical
More informationOn the diversity of the Naive Lattice Decoder
On the diversity of the Naive Lattice Decoder Asma Mejri, Laura Luzzi, Ghaya Rekaya-Ben Othman To cite this version: Asma Mejri, Laura Luzzi, Ghaya Rekaya-Ben Othman. On the diversity of the Naive Lattice
More informationInteractive Interference Alignment
Interactive Interference Alignment Quan Geng, Sreeram annan, and Pramod Viswanath Coordinated Science Laboratory and Dept. of ECE University of Illinois, Urbana-Champaign, IL 61801 Email: {geng5, kannan1,
More informationSome Goodness Properties of LDA Lattices
Some Goodness Properties of LDA Lattices Shashank Vatedka and Navin Kashyap {shashank,nkashyap}@eceiiscernetin Department of ECE Indian Institute of Science Bangalore, India Information Theory Workshop
More informationCryptanalysis of a Public Key Cryptosystem Proposed at ACISP 2000
Cryptanalysis of a Public Key Cryptosystem Proposed at ACISP 2000 Amr Youssef 1 and Guang Gong 2 1 Center for Applied Cryptographic Research Department of Combinatorics & Optimization 2 Department of Electrical
More informationConstruction of Barnes-Wall Lattices from Linear Codes over Rings
01 IEEE International Symposium on Information Theory Proceedings Construction of Barnes-Wall Lattices from Linear Codes over Rings J Harshan Dept of ECSE, Monh University Clayton, Australia Email:harshanjagadeesh@monhedu
More informationPhase Precoded Compute-and-Forward with Partial Feedback
Phase Precoded Compute-and-Forward with Partial Feedback Amin Sakzad, Emanuele Viterbo Dept. Elec. & Comp. Sys. Monash University, Australia amin.sakzad,emanuele.viterbo@monash.edu Joseph Boutros, Dept.
More informationWeakly Secure Data Exchange with Generalized Reed Solomon Codes
Weakly Secure Data Exchange with Generalized Reed Solomon Codes Muxi Yan, Alex Sprintson, and Igor Zelenko Department of Electrical and Computer Engineering, Texas A&M University Department of Mathematics,
More informationLattice preconditioning for the real relaxation branch-and-bound approach for integer least squares problems
J Glob Optim (24) 59:227 242 DOI.7/s898-4-48-4 Lattice preconditioning for the real relaxation branch-and-bound approach for integer least squares problems Miguel F. Anjos Xiao-Wen Chang Wen-Yang Ku Received:
More informationTO APPEAR IN IEEE TRANSACTIONS ON INFORMATION THEORY 1. Success probability of the Babai estimators for box-constrained integer linear models
TO APPEAR IN IEEE TRANACTION ON INFORMATION THEORY uccess probability of the Babai estimators for box-constrained integer linear models Jinming Wen and Xiao-Wen Chang Abstract In many applications including
More informationA Note on the Density of the Multiple Subset Sum Problems
A Note on the Density of the Multiple Subset Sum Problems Yanbin Pan and Feng Zhang Key Laboratory of Mathematics Mechanization, Academy of Mathematics and Systems Science, Chinese Academy of Sciences,
More informationOn the Duality between Multiple-Access Codes and Computation Codes
On the Duality between Multiple-Access Codes and Computation Codes Jingge Zhu University of California, Berkeley jingge.zhu@berkeley.edu Sung Hoon Lim KIOST shlim@kiost.ac.kr Michael Gastpar EPFL michael.gastpar@epfl.ch
More informationCS Topics in Cryptography January 28, Lecture 5
CS 4501-6501 Topics in Cryptography January 28, 2015 Lecture 5 Lecturer: Mohammad Mahmoody Scribe: Ameer Mohammed 1 Learning with Errors: Motivation An important goal in cryptography is to find problems
More informationA note on the minimal volume of almost cubic parallelepipeds
A note on the minimal volume of almost cubic parallelepipeds Daniele Micciancio Abstract We prove that the best way to reduce the volume of the n-dimensional unit cube by a linear transformation that maps
More informationA Polynomial-Time Algorithm for Pliable Index Coding
1 A Polynomial-Time Algorithm for Pliable Index Coding Linqi Song and Christina Fragouli arxiv:1610.06845v [cs.it] 9 Aug 017 Abstract In pliable index coding, we consider a server with m messages and n
More informationLecture #21. c T x Ax b. maximize subject to
COMPSCI 330: Design and Analysis of Algorithms 11/11/2014 Lecture #21 Lecturer: Debmalya Panigrahi Scribe: Samuel Haney 1 Overview In this lecture, we discuss linear programming. We first show that the
More informationLattice Reduction Algorithms: Theory and Practice
Lattice Reduction Algorithms: Theory and Practice Phong Q. Nguyen INRIA and ENS, Département d informatique, 45 rue d Ulm, 75005 Paris, France http://www.di.ens.fr/~pnguyen/ Abstract. Lattice reduction
More informationA Delayed Size-reduction Technique for Speeding Up the LLL Algorithm
A Delayed Size-reduction Technique for Speeding Up the LLL Algorithm Wen Zhang, Institute of Mathematics, School of Mathematical Science Fudan University, Shanghai, 00433 P.R. China Yimin Wei School of
More informationComputing Machine-Efficient Polynomial Approximations
Computing Machine-Efficient Polynomial Approximations N. Brisebarre, S. Chevillard, G. Hanrot, J.-M. Muller, D. Stehlé, A. Tisserand and S. Torres Arénaire, LIP, É.N.S. Lyon Journées du GDR et du réseau
More information712 IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 56, NO. 2, FEBRUARY 2008
712 IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 56, NO. 2, FEBRUARY 2008 Speeding up the Sphere Decoder With H SDP Inspired Lower Bounds Mihailo Stojnic, Haris Vikalo, Babak Hassibi Abstract It is well
More informationA Fast-Decodable, Quasi-Orthogonal Space Time Block Code for 4 2 MIMO
Forty-Fifth Annual Allerton Conference Allerton House, UIUC, Illinois, USA September 26-28, 2007 ThC6.4 A Fast-Decodable, Quasi-Orthogonal Space Time Block Code for 4 2 MIMO Ezio Biglieri Universitat Pompeu
More informationA Fast Phase-Based Enumeration Algorithm for SVP Challenge through y-sparse Representations of Short Lattice Vectors
A Fast Phase-Based Enumeration Algorithm for SVP Challenge through y-sparse Representations of Short Lattice Vectors Dan Ding 1, Guizhen Zhu 2, Yang Yu 1, Zhongxiang Zheng 1 1 Department of Computer Science
More informationIEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 57, NO. 11, NOVEMBER On the Performance of Sparse Recovery
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 57, NO. 11, NOVEMBER 2011 7255 On the Performance of Sparse Recovery Via `p-minimization (0 p 1) Meng Wang, Student Member, IEEE, Weiyu Xu, and Ao Tang, Senior
More informationMultiuser Downlink Beamforming: Rank-Constrained SDP
Multiuser Downlink Beamforming: Rank-Constrained SDP Daniel P. Palomar Hong Kong University of Science and Technology (HKUST) ELEC5470 - Convex Optimization Fall 2018-19, HKUST, Hong Kong Outline of Lecture
More informationLattice Reduction for Modular Knapsack
Lattice Reduction for Modular Knapsack Thomas Plantard, Willy Susilo, and Zhenfei Zhang Centre for Computer and Information Security Research School of Computer Science & Software Engineering (SCSSE) University
More informationHardness of the Covering Radius Problem on Lattices
Hardness of the Covering Radius Problem on Lattices Ishay Haviv Oded Regev June 6, 2006 Abstract We provide the first hardness result for the Covering Radius Problem on lattices (CRP). Namely, we show
More informationSUPPOSE that we have the following box-constrained linear model:
UBMITTED TO JOURNA OF IEEE TRANACTION ON INFORMATION THEORY uccess probability of the Babai estimators for box-constrained integer linear models Jinming Wen and Xiao-Wen Chang arxiv:40.5040v [cs.it] 9
More informationOn Nearly Orthogonal Lattice Bases
On Nearly Orthogonal Lattice Bases Ramesh Neelamani, Sanjeeb Dash, and Richard G. Baraniuk July 14, 2005 Abstract We study nearly orthogonal lattice bases, or bases where the angle between any basis vector
More informationThe Simple 7-(33,8,10)-Designs with Automorphism Group PΓL(2,32)
The Simple 7-(33,8,10)-Designs with Automorphism Group PΓL(2,32) Alfred Wassermann Abstract Lattice basis reduction in combination with an efficient backtracking algorithm is used to find all (4 996 426)
More informationCSE 206A: Lattice Algorithms and Applications Spring Basic Algorithms. Instructor: Daniele Micciancio
CSE 206A: Lattice Algorithms and Applications Spring 2014 Basic Algorithms Instructor: Daniele Micciancio UCSD CSE We have already seen an algorithm to compute the Gram-Schmidt orthogonalization of a lattice
More informationLINEAR SYSTEMS (11) Intensive Computation
LINEAR SYSTEMS () Intensive Computation 27-8 prof. Annalisa Massini Viviana Arrigoni EXACT METHODS:. GAUSSIAN ELIMINATION. 2. CHOLESKY DECOMPOSITION. ITERATIVE METHODS:. JACOBI. 2. GAUSS-SEIDEL 2 CHOLESKY
More informationOn the Optimal Phase Control in MIMO Systems with Phase Quantization
On the Optimal hase Control in MIMO Systems with hase Quantization Majid Khabbazian, Kin-Kwong Leung and Mohammad A. Safari Department of Electrical and Computer Engineering University of British Columbia,
More informationAugmented Lattice Reduction for MIMO decoding
Augmented Lattice Reduction for MIMO decoding LAURA LUZZI joint work with G. Rekaya-Ben Othman and J.-C. Belfiore at Télécom-ParisTech NANYANG TECHNOLOGICAL UNIVERSITY SEPTEMBER 15, 2010 Laura Luzzi Augmented
More informationBlack Box Linear Algebra
Black Box Linear Algebra An Introduction to Wiedemann s Approach William J. Turner Department of Mathematics & Computer Science Wabash College Symbolic Computation Sometimes called Computer Algebra Symbols
More informationA Note on Scalar Multiplication Using Division Polynomials
1 A Note on Scalar Multiplication Using Division Polynomials Binglong Chen, Chuangqiang Hu and Chang-An Zhao Abstract Scalar multiplication is the most important and expensive operation in elliptic curve
More informationTHIS paper is aimed at designing efficient decoding algorithms
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 45, NO. 7, NOVEMBER 1999 2333 Sort-and-Match Algorithm for Soft-Decision Decoding Ilya Dumer, Member, IEEE Abstract Let a q-ary linear (n; k)-code C be used
More informationSignal Recovery from Permuted Observations
EE381V Course Project Signal Recovery from Permuted Observations 1 Problem Shanshan Wu (sw33323) May 8th, 2015 We start with the following problem: let s R n be an unknown n-dimensional real-valued signal,
More informationData Gathering and Personalized Broadcasting in Radio Grids with Interferences
Data Gathering and Personalized Broadcasting in Radio Grids with Interferences Jean-Claude Bermond a,, Bi Li a,b, Nicolas Nisse a, Hervé Rivano c, Min-Li Yu d a Coati Project, INRIA I3S(CNRS/UNSA), Sophia
More informationFrom the Shortest Vector Problem to the Dihedral Hidden Subgroup Problem
From the Shortest Vector Problem to the Dihedral Hidden Subgroup Problem Curtis Bright December 9, 011 Abstract In Quantum Computation and Lattice Problems [11] Oded Regev presented the first known connection
More informationA Characterization of Sampling Patterns for Union of Low-Rank Subspaces Retrieval Problem
A Characterization of Sampling Patterns for Union of Low-Rank Subspaces Retrieval Problem Morteza Ashraphijuo Columbia University ashraphijuo@ee.columbia.edu Xiaodong Wang Columbia University wangx@ee.columbia.edu
More informationLattice reduction for modular knapsack
University of Wollongong Research Online Faculty of Engineering and Information Sciences - Papers: Part A Faculty of Engineering and Information Sciences 2013 Lattice reduction for modular knapsack Thomas
More informationOn the Robustness of Lattice Reduction Over. Correlated Fading Channels
On the Robustness of Lattice Reduction Over Correlated Fading Channels Hossein Najafi, Student Member, IEEE, Mohammad Erfan Danesh Jafari, Student Member, IEEE, and Mohamed Oussama Damen, Senior Member,
More informationc 2009 Society for Industrial and Applied Mathematics
SIAM J. MATRIX ANAL. APPL. Vol. 31, No. 3, pp. 1071 1089 c 2009 Society for Industrial and Applied Mathematics SOLVING ELLIPSOID-CONSTRAINED INTEGER LEAST SQUARES PROBLEMS XIAO-WEN CHANG AND GENE H. GOLUB
More informationarxiv:cs/ v1 [cs.it] 11 Sep 2006
0 High Date-Rate Single-Symbol ML Decodable Distributed STBCs for Cooperative Networks arxiv:cs/0609054v1 [cs.it] 11 Sep 2006 Zhihang Yi and Il-Min Kim Department of Electrical and Computer Engineering
More informationApplications of Robust Optimization in Signal Processing: Beamforming and Power Control Fall 2012
Applications of Robust Optimization in Signal Processing: Beamforg and Power Control Fall 2012 Instructor: Farid Alizadeh Scribe: Shunqiao Sun 12/09/2012 1 Overview In this presentation, we study the applications
More informationCommunication over Finite-Ring Matrix Channels
Communication over Finite-Ring Matrix Channels Chen Feng 1 Roberto W. Nóbrega 2 Frank R. Kschischang 1 Danilo Silva 2 1 Department of Electrical and Computer Engineering University of Toronto, Canada 2
More informationUnder sum power constraint, the capacity of MIMO channels
IEEE TRANSACTIONS ON COMMUNICATIONS, VOL 6, NO 9, SEPTEMBER 22 242 Iterative Mode-Dropping for the Sum Capacity of MIMO-MAC with Per-Antenna Power Constraint Yang Zhu and Mai Vu Abstract We propose an
More informationHKZ and Minkowski Reduction Algorithms for Lattice-Reduction-Aided MIMO Detection
IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 60, NO. 11, NOVEMBER 2012 5963 HKZ and Minkowski Reduction Algorithms for Lattice-Reduction-Aided MIMO Detection Wen Zhang, Sanzheng Qiao, and Yimin Wei Abstract
More informationEfficient Joint Maximum-Likelihood Channel. Estimation and Signal Detection
Efficient Joint Maximum-Likelihood Channel Estimation and Signal Detection H. Vikalo, B. Hassibi, and P. Stoica Abstract In wireless communication systems, channel state information is often assumed to
More informationDimension-Preserving Reductions Between Lattice Problems
Dimension-Preserving Reductions Between Lattice Problems Noah Stephens-Davidowitz Courant Institute of Mathematical Sciences, New York University. noahsd@cs.nyu.edu Last updated September 6, 2016. Abstract
More informationA GENERAL FORMULATION FOR SUPPORT VECTOR MACHINES. Wei Chu, S. Sathiya Keerthi, Chong Jin Ong
A GENERAL FORMULATION FOR SUPPORT VECTOR MACHINES Wei Chu, S. Sathiya Keerthi, Chong Jin Ong Control Division, Department of Mechanical Engineering, National University of Singapore 0 Kent Ridge Crescent,
More informationThe Diagonal Reduction Algorithm Using Fast Givens
The Diagonal Reduction Algorithm Using Fast Givens Wen Zhang, Sanzheng Qiao, and Yimin Wei Abstract Recently, a new lattice basis reduction notion, called diagonal reduction, was proposed for lattice-reduction-aided
More informationLinear Algebra. Session 12
Linear Algebra. Session 12 Dr. Marco A Roque Sol 08/01/2017 Example 12.1 Find the constant function that is the least squares fit to the following data x 0 1 2 3 f(x) 1 0 1 2 Solution c = 1 c = 0 f (x)
More informationCharacterization of Convex and Concave Resource Allocation Problems in Interference Coupled Wireless Systems
2382 IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL 59, NO 5, MAY 2011 Characterization of Convex and Concave Resource Allocation Problems in Interference Coupled Wireless Systems Holger Boche, Fellow, IEEE,
More informationShortest Vector Problem (1982; Lenstra, Lenstra, Lovasz)
Shortest Vector Problem (1982; Lenstra, Lenstra, Lovasz) Daniele Micciancio, University of California at San Diego, www.cs.ucsd.edu/ daniele entry editor: Sanjeev Khanna INDEX TERMS: Point lattices. Algorithmic
More informationCSE 206A: Lattice Algorithms and Applications Spring Basis Reduction. Instructor: Daniele Micciancio
CSE 206A: Lattice Algorithms and Applications Spring 2014 Basis Reduction Instructor: Daniele Micciancio UCSD CSE No efficient algorithm is known to find the shortest vector in a lattice (in arbitrary
More informationToday s class. Linear Algebraic Equations LU Decomposition. Numerical Methods, Fall 2011 Lecture 8. Prof. Jinbo Bi CSE, UConn
Today s class Linear Algebraic Equations LU Decomposition 1 Linear Algebraic Equations Gaussian Elimination works well for solving linear systems of the form: AX = B What if you have to solve the linear
More informationImproved Nguyen-Vidick Heuristic Sieve Algorithm for Shortest Vector Problem
Improved Nguyen-Vidick Heuristic Sieve Algorithm for Shortest Vector Problem Xiaoyun Wang,, Mingjie Liu, Chengliang Tian and Jingguo Bi Institute for Advanced Study, Tsinghua University, Beijing 84, China
More informationInteger-Forcing Linear Receiver Design over MIMO Channels
Globecom 0 - Signal Processing for Communications Symposium Integer-Forcing inear Receiver Design over MIMO Channels ili Wei, Member, IEEE and Wen Chen, Senior Member, IEEE Department of Electronic Engineering,
More informationA Fast Generalized Sphere Decoder for Optimum Decoding of Under-determined MIMO systems
A Fast Generalized Sphere Decoder for Optimum Decoding of Under-determined MIMO systems Pranav Dayal and Mahesh K. Varanasi e-mail: fdayalp, varanasig@dsp.colorado.edu University of Colorado, Boulder,
More informationImproved Methods for Search Radius Estimation in Sphere Detection Based MIMO Receivers
Improved Methods for Search Radius Estimation in Sphere Detection Based MIMO Receivers Patrick Marsch, Ernesto Zimmermann, Gerhard Fettweis Vodafone Chair Mobile Communications Systems Department of Electrical
More informationInterference Alignment at Finite SNR for TI channels
Interference Alignment at Finite SNR for Time-Invariant channels Or Ordentlich Joint work with Uri Erez EE-Systems, Tel Aviv University ITW 20, Paraty Background and previous work The 2-user Gaussian interference
More informationCONSIDER the following generic model:
1104 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 53, NO. 7, JULY 2005 Sphere Decoding Algorithms With Improved Radius Search Wanlun Zhao Georgios B. Giannakis, Fellow, IEEE Abstract We start by identifying
More information1 Shortest Vector Problem
Lattices in Cryptography University of Michigan, Fall 25 Lecture 2 SVP, Gram-Schmidt, LLL Instructor: Chris Peikert Scribe: Hank Carter Shortest Vector Problem Last time we defined the minimum distance
More informationGame Theoretic Solutions for Precoding Strategies over the Interference Channel
Game Theoretic Solutions for Precoding Strategies over the Interference Channel Jie Gao, Sergiy A. Vorobyov, and Hai Jiang Department of Electrical & Computer Engineering, University of Alberta, Canada
More informationOptimal Binary/Quaternary Adaptive Signature Design for Code-Division Multiplexing
Globecom 0 - Wireless Communications Symposium Optimal Binary/Quaternary Adaptive Signature Design for Code-Division Multiplexing ili Wei, Member, IEEE and Wen Chen, Senior Member, IEEE Department of Electronic
More informationSoft-Input Soft-Output Sphere Decoding
Soft-Input Soft-Output Sphere Decoding Christoph Studer Integrated Systems Laboratory ETH Zurich, 809 Zurich, Switzerland Email: studer@iiseeethzch Helmut Bölcskei Communication Technology Laboratory ETH
More informationSolving LWE with BKW
Martin R. Albrecht 1 Jean-Charles Faugére 2,3 1,4 Ludovic Perret 2,3 ISG, Royal Holloway, University of London INRIA CNRS IIS, Academia Sinica, Taipei, Taiwan PKC 2014, Buenos Aires, Argentina, 28th March
More informationDecomposing Bent Functions
2004 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 49, NO. 8, AUGUST 2003 Decomposing Bent Functions Anne Canteaut and Pascale Charpin Abstract In a recent paper [1], it is shown that the restrictions
More informationComputing the RSA Secret Key is Deterministic Polynomial Time Equivalent to Factoring
Computing the RSA Secret Key is Deterministic Polynomial Time Equivalent to Factoring Alexander May Faculty of Computer Science, Electrical Engineering and Mathematics University of Paderborn 33102 Paderborn,
More informationNetwork Coding Design in Wireless Cooperative Networks
Network Coding Design in Wireless Cooperative Networks Author : Dr. Lili Wei Advisor : Prof. Wen Chen Date : January 21, 2012 A dissertation submitted to Shanghai Jiao Tong University in partial fulfillment
More informationComputational Methods. Systems of Linear Equations
Computational Methods Systems of Linear Equations Manfred Huber 2010 1 Systems of Equations Often a system model contains multiple variables (parameters) and contains multiple equations Multiple equations
More informationLatent Tree Approximation in Linear Model
Latent Tree Approximation in Linear Model Navid Tafaghodi Khajavi Dept. of Electrical Engineering, University of Hawaii, Honolulu, HI 96822 Email: navidt@hawaii.edu ariv:1710.01838v1 [cs.it] 5 Oct 2017
More informationMILES: MATLAB package for solving Mixed Integer LEast Squares problems Theory and Algorithms
MILES: MATLAB package for solving Mixed Integer LEast Squares problems Theory and Algorithms Xiao-Wen Chang and Tianyang Zhou Scientific Computing Laboratory School of Computer Science McGill University
More informationA strongly polynomial algorithm for linear systems having a binary solution
A strongly polynomial algorithm for linear systems having a binary solution Sergei Chubanov Institute of Information Systems at the University of Siegen, Germany e-mail: sergei.chubanov@uni-siegen.de 7th
More informationPreliminaries and Complexity Theory
Preliminaries and Complexity Theory Oleksandr Romanko CAS 746 - Advanced Topics in Combinatorial Optimization McMaster University, January 16, 2006 Introduction Book structure: 2 Part I Linear Algebra
More informationLattice-Reduction-Aided Sphere-Detector as a Solution for Near-Optimal MIMO Detection in Spatial Multiplexing Systems
Lattice-Reduction-Aided Sphere-Detector as a Solution for Near-Optimal MIMO Detection in Spatial Multiplexing Systems Sébastien Aubert ST-ERICSSON Sophia & INSA IETR Rennes sebastien.aubert@stericsson.com
More informationData Gathering and Personalized Broadcasting in Radio Grids with Interferences
Data Gathering and Personalized Broadcasting in Radio Grids with Interferences Jean-Claude Bermond a,b,, Bi Li b,a,c, Nicolas Nisse b,a, Hervé Rivano d, Min-Li Yu e a Univ. Nice Sophia Antipolis, CNRS,
More informationThis document is downloaded from DR-NTU, Nanyang Technological University Library, Singapore.
This document is downloaded from DR-NTU, Nanyang Technological University Library, Singapore. Title Finite nilpotent metacyclic groups never violate the Ingleton inequality Author(s) Stancu, Radu; Oggier,
More information1: Introduction to Lattices
CSE 206A: Lattice Algorithms and Applications Winter 2012 Instructor: Daniele Micciancio 1: Introduction to Lattices UCSD CSE Lattices are regular arrangements of points in Euclidean space. The simplest
More informationEVERY lattice is represented with its generator matrix G,
Faster Projection in Sphere Decoding Arash Ghasemmehdi and Erik Agrell arxiv:0906.049v [cs.it] Dec 00 Abstract Most of the calculations in standard sphere decoders are redundant, in the sense that they
More informationThe Optimality of Beamforming: A Unified View
The Optimality of Beamforming: A Unified View Sudhir Srinivasa and Syed Ali Jafar Electrical Engineering and Computer Science University of California Irvine, Irvine, CA 92697-2625 Email: sudhirs@uciedu,
More informationInteger programming: an introduction. Alessandro Astolfi
Integer programming: an introduction Alessandro Astolfi Outline Introduction Examples Methods for solving ILP Optimization on graphs LP problems with integer solutions Summary Introduction Integer programming
More informationOn Nearly Orthogonal Lattice Bases and Random Lattices
On Nearly Orthogonal Lattice Bases and Random Lattices Ramesh Neelamani, Sanjeeb Dash, and Richard G. Baraniuk September 18, 2006 Abstract We study lattice bases where the angle between any basis vector
More informationLinear Algebra and Matrix Inversion
Jim Lambers MAT 46/56 Spring Semester 29- Lecture 2 Notes These notes correspond to Section 63 in the text Linear Algebra and Matrix Inversion Vector Spaces and Linear Transformations Matrices are much
More informationDegrees-of-Freedom for the 4-User SISO Interference Channel with Improper Signaling
Degrees-of-Freedom for the -User SISO Interference Channel with Improper Signaling C Lameiro and I Santamaría Dept of Communications Engineering University of Cantabria 9005 Santander Cantabria Spain Email:
More informationComputing minimal interpolation bases
Computing minimal interpolation bases Vincent Neiger,, Claude-Pierre Jeannerod Éric Schost Gilles Villard AriC, LIP, École Normale Supérieure de Lyon, France University of Waterloo, Ontario, Canada Supported
More information4184 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 51, NO. 12, DECEMBER Pranav Dayal, Member, IEEE, and Mahesh K. Varanasi, Senior Member, IEEE
4184 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 51, NO. 12, DECEMBER 2005 An Algebraic Family of Complex Lattices for Fading Channels With Application to Space Time Codes Pranav Dayal, Member, IEEE,
More informationSubquadratic Space Complexity Multiplication over Binary Fields with Dickson Polynomial Representation
Subquadratic Space Complexity Multiplication over Binary Fields with Dickson Polynomial Representation M A Hasan and C Negre Abstract We study Dickson bases for binary field representation Such representation
More informationExpressions for the covariance matrix of covariance data
Expressions for the covariance matrix of covariance data Torsten Söderström Division of Systems and Control, Department of Information Technology, Uppsala University, P O Box 337, SE-7505 Uppsala, Sweden
More informationChapter 1. Preliminaries. The purpose of this chapter is to provide some basic background information. Linear Space. Hilbert Space.
Chapter 1 Preliminaries The purpose of this chapter is to provide some basic background information. Linear Space Hilbert Space Basic Principles 1 2 Preliminaries Linear Space The notion of linear space
More informationEquivalence of Minimal l 0 and l p Norm Solutions of Linear Equalities, Inequalities and Linear Programs for Sufficiently Small p
Equivalence of Minimal l 0 and l p Norm Solutions of Linear Equalities, Inequalities and Linear Programs for Sufficiently Small p G. M. FUNG glenn.fung@siemens.com R&D Clinical Systems Siemens Medical
More informationBasic Concepts in Linear Algebra
Basic Concepts in Linear Algebra Grady B Wright Department of Mathematics Boise State University February 2, 2015 Grady B Wright Linear Algebra Basics February 2, 2015 1 / 39 Numerical Linear Algebra Linear
More informationFeasibility Conditions for Interference Alignment
Feasibility Conditions for Interference Alignment Cenk M. Yetis Istanbul Technical University Informatics Inst. Maslak, Istanbul, TURKEY Email: cenkmyetis@yahoo.com Tiangao Gou, Syed A. Jafar University
More information