Distortion Bounds for Source Broadcast. Problem
|
|
- Arabella Hunter
- 5 years ago
- Views:
Transcription
1 Distortio Bouds for Source Broadcast 1 Problem Lei Yu, Houqiag Li, Seior Member, IEEE, ad Weipig Li, Fellow, IEEE Abstract This paper ivestigates the joit source-chael codig problem of sedig a memoryless source over a memoryless broadcast chael. A ier boud ad a outer boud o the achievable distortio regio are derived, which respectively geeralize ad uify several existig bouds. As a cosequece, we also obtai a ier boud ad a outer boud for degraded broadcast chael case. Whe specialized to Gaussia source broadcast or biary source broadcast, the ier boud ad outer boud ot oly ca recover the best kow ier boud ad outer boud i the literature, but also ca be used to geerate some ew results. Besides, we also exted the ier boud ad outer boud to Wyer-Ziv source broadcast problem, i.e., source broadcast with side iformatio available at decoders. Some ew bouds are obtaied whe specialized to Wyer-Ziv Gaussia case ad Wyer-Ziv biary case. I additio, whe specialized to lossless trasmissio of a source with idepedet compoets, the bouds for source broadcast problem without side iformatio is also used to achieve a ier boud ad a outer boud o capacity regio of geeral broadcast chael with commo messages, which respectively geeralize Marto s ier boud ad Nair-El Gamal outer boud to K-user broadcast chael case. Idex Terms Joit source-chael codig JSCC, hybrid codig, hybrid digital-aalog HDA, broadcast, Wyer-Ziv, side iformatio, multivariate coverig/packig, etwork iformatio theory. I. INTRODUCTION As stated i Shao s source-chael separatio theorem [2], cascadig source codig ad chael codig does ot lose the optimality for the poit-to-poit commuicatio systems. This separatio theorem does ot oly suggest a simple system architecture i which source codig ad chael codig are separated by a uiversal digital iterface, but also guaratees that such architecture does ot icur ay asymptotic performace loss. Cosequetly, it forms the basis of the architecture of today s commuicatio systems. However, for may multi-user commuicatio systems, the optimality of such a separatio does ot hold ay more [3], [4]. Therefore, a icreasig amout of literature focus o joit source-chael codig JSCC i multi-user settig. The authors are all with the Departmet of Electroic Egieerig ad Iformatio Sciece, Uiversity of Sciece ad Techology of Chia, Hefei , Chia yulei@ustc.edu.c, lihq@ustc.edu.c, wpli@ustc.edu.c. The material i this paper will be preseted i part at IEEE ISIT 2016 [1].
2 2 Oe of the most classical problems i this area is JSCC of trasmittig a Gaussia source over average power costraied K-user Gaussia broadcast chael. Goblick [3] observed that whe the source badwidth ad the chael badwidth are matched i.e., oe chael use per source sample liear ucoded trasmissio symbol-bysymbol mappig is optimal. However, the optimality of such a simple liear scheme caot be exteded to the case of the badwidth mismatch. Oe way to approximately characterize the achievable distortio regio is fidig its ier boud ad outer boud. For ier boud, aalog codig schemes or hybrid codig schemes have bee studied i a vast body of literature [4], [5], [6], [7]. For 2-user Gaussia broadcast commuicatio, Prabhakara et al. [7] gave the tightest ier boud so far, which is achieved by hybrid digital-aalog HDA scheme. O the other had, Rezic et al. [8] derived a otrivial outer boud for 2-user Gaussia broadcast problem with badwidth expasio i.e., more tha oe chael uses per source sample by itroducig a auxiliary radom variable or remote source. Tia et al. [9] exteded this outer boud to K-user case by itroducig more tha oe auxiliary radom variables. Similar to the results of Rezic et al., the outer boud give by Tia et al. is also otrivial oly for badwidth expasio case [10]. Beyod broadcast commuicatio, Miero et al. [15] cosidered sedig memoryless correlated source trasmitted over memoryless multi-access chael ad derived a ier boud usig a uified framework of hybrid codig, ad also Lee et al. [20] derived a uified achievability result for memoryless etwork commuicatio. Besides, i [6], [17], [18] Wyer-Ziv source commuicatio problem was ivestigated, i which side iformatio of the source is available at decoders. Shamai et al. [6] studied the problem of sedig Wyer-Ziv source over poit-to-poit chael, ad proved that for such commuicatio system separate codig which combies Wyer-Ziv codig with chael codig does ot icur ay loss of optimality. Nayak et al. [17] ad Gao et al. [18] ivestigated Wyer-Ziv source broadcast problem, ad obtaied a outer boud by simply applyig cut-set boud the miimum distortio achieved i poit-to-poit settig for each receiver. I this paper, we cosider JSCC of trasmittig a memoryless source over K-user memoryless broadcast chael, ad give a ier boud ad a outer boud o the achievable distortio regio. The ier boud is derived by a uified framework of hybrid codig ispired by [15], ad the outer boud is derived by itroducig auxiliary radom variables or remote sources as i [8] ad [9]. Both these two bouds are geeralizatios ad uificatios of several existig bouds i the literature. Besides, as a cosequece, we also obtai a ier boud ad a outer boud for degraded broadcast chael case. Owig to the geeralizatio of our results, whe specialized to Gaussia source broadcast ad biary source broadcast, our ier boud could recover best kow performace achieved by hybrid codig, ad our outer boud could recover the best kow outer bouds give by Tia et al. [9] ad Khezeli et al. [11]. Moreover, for these cases, our bouds ca also be used to geerate some ew results. Besides, we also exted the ier boud ad outer boud to Wyer-Ziv source broadcast problem, i.e., source broadcast with side iformatio at decoders. Whe specialized to Wyer-Ziv Gaussia case ad Wyer-Ziv biary case, our bouds reduce to some ew bouds. I additio, whe specialized to lossless trasmissio of a source with idepedet compoets, the bouds for source broadcast problem without side iformatio is also used to achieve a ier boud ad a outer boud o capacity regio of geeral broadcast chael with commo messages,
3 3 Y1 S ˆ 1 Decoder 1 S Ecoder X p Y 1 Y 2 Y K X Y K Decoder K ˆ S K Fig. 1. Source broadcast system. which respectively geeralize Marto s ier boud ad Nair-El Gamal outer boud to K-user broadcast chael case. The rest of this paper is orgaized as follows. Sectio II summarizes basic otatios, defiitios ad prelimiaries, ad formulates the problem. Sectio III gives the mai results for source broadcast problem, icludig geeral, degraded, Gaussia ad biary cases. Sectio IV exteds the results to Wyer-Ziv source broadcast problem. Fially, Sectio V gives the cocludig remarks. A. Notatio II. PROBLEM FORMULATION AND PRELIMINARIES Throughout this paper, we follow the otatio i [16]. For example, for discrete radom variable X p X o alphabet X ad ɛ 0, 1, the set of ɛ-typical -sequeces x or the typical set i short is defied as T ɛ X = {x : {i : x i = x / p X x ɛp X x for all x X. Whe it is clear from the cotext, we will use T ɛ istead of T ɛ X. I additio, we use X A to deote the vector X j : j A, use [i : j] to deote the set { i, i + 1,, j, ad use 1 to deote a all-oe vector similarly, use 2 to deote a all-2 vector. We say vector m [1:N] is smaller tha vector m [1:N] if m j = m j, k < j K ad m k < m k for some k. For two vectors m I ad m I, we say m I is compoet-wise uequal to m I, if m i m i for all i I, ad deote it as m I m I. Besides, we use 1 {A to deote idicator fuctio of evet A, i.e., 1, if A is true; 1 {A = 0, if A is false. B. Problem Formulatio Cosider the source broadcast system show i Fig. 1. The discrete memoryless source DMS S is first coded ito X usig a source-chael code, the trasmitted to K receivers through a discrete memoryless broadcast chael DM-BC p Y[1:K] X, ad fially, the receiver k produces source recostructio Ŝ k Y k. from the received sigal
4 4 Defiitio 1 Source. A discrete memoryless source DMS is specified by a probability mass fuctio pmf p S o a fiite alphabet S. The DMS p S geerates a i.i.d. radom process {S i with S i p S. Defiitio 2 Broadcast Chael. A K-user discrete memoryless broadcast chael DM-BC is specified by a collectio of coditioal pmfs p Y[1:K] X o fiite output alphabet Y 1 Y K for each x i fiite iput alphabet X. Defiitio 3 Degraded Broadcast Chael. A DM-BC p Y[1:K] X is stochastically degraded or simply degraded if there exist a radom vector Ỹ[1:K] such that Ỹk {X = x p Yk Xỹ k x, 1 k K, i.e., Ỹ [1:K] has the same coditioal margial pmfs as Y [1:K] give X, ad X ỸK ỸK 1 Ỹ1 1 form a Markov chai. I additio, as a special case, if X Y K Y K 1 Y 1, i.e., Ỹ k = Y k, 1 k K, the p Y[1:K] X is physically degraded. Defiitio 4. A -legth source-chael code is defied by the ecodig fuctio x : S X ad a sequece of decodig fuctios ŝ k : Y k ˆ S k, 1 k K, where Ŝk is the alphabet of source recostructio at receiver k. For ay -legth source-chael code, the iduced distortio is defied as Ed k S, Ŝ k = 1 Ed k S t, Ŝk,t, 1 for 1 k K, where d k s, ŝ k : S Ŝk [0, + ] is a distortio measure fuctio for receiver k. Defiitio 5. For trasmittig source S over chael p Y[1:K] X, if there exists a sequece of source-chael codes such that the we say that the distortio tuple D [1:K] is achievable. t=1 lim sup Ed k S, Ŝ k D k, 2 Defiitio 6. For trasmittig source S over chael p Y[1:K] X, the admissible distortio regio is defied as R { D [1:K] : D [1:K] is achievable. 3 The admissible distortio regio R oly depeds o the margial distributios of p Y[1:K] X, hece for source broadcast over stochastically degraded chael it suffices to oly cosider the broadcast over physically degraded chael. I additio, Shao s source-chael separatio theorem shows that the miimum distortio for trasmittig source over poit-to-poit chael satisfies R k D k = C k, 4 1 To simplify otatio, the Markov chai is assumed i this directio. Note that this differs from that i the coferece versio [1].
5 5 where R k is the rate-distortio fuctio of the source with distortio measure d k, ad C k is the capacity of the chael of the receiver k. Therefore, the optimal distortio Shao limit is D k = R 1 k C k. 5 Obviously, R R { D [1:K] : D k D k, 1 k K, 6 where R is amed trivial outer boud. I the system above, source badwidth ad chael badwidth are matched. I this paper, we also cosider the commuicatio system with badwidth mismatch, whereby m samples of a DMS are trasmitted through uses of a DM-BC. For this case, badwidth mismatch factor is defied as b = m. C. Multivariate Coverig/Packig Lemma Two importat results we eed to prove the achievability part i this work are the followig lemmas, both of which are geeralized versios of the existig coverig/packig lemmas. Let U, V [0:k] p U,V[0:k], ad let U, V 0 p U,V 0 be a radom vector sequece. For each j [1 : k], let A j [1 : j 1]. Assume A j satisfies if i A j, the A i A j. For each j [1 : k] ad each m Aj i A j [1 : 2 ri ], let V j m A j, m j, m j [1 : 2 rj ], be pairwise coditioally idepedet radom sequeces, each distributed accordig to p V j V Aj,V 0 v j,i v Aj,im Aj, v 0,i. Hece for each j [1 : k], A j {0 deotes the idex set of the radom variables o which the codeword V j is superposed. Based o the otatios above, we have the followig geeralized Multivariate Coverig Lemma ad geeralized Multivariate Packig Lemma. Lemma 1 Multivariate Coverig Lemma. Let ɛ < ɛ. If lim P U, V0 T ɛ = 1, the there exists δɛ that teds to zero as ɛ 0 such that lim P U, V0, V [1:k] m [1:k] T ɛ for some m [1:k] = 1, 7 if j J r j > j J H V j V Aj V 0 H VJ V 0 U + δɛ for all J [1 : k] such that J = ad if j J, the A j J. Lemma 2 Multivariate Packig Lemma. There exists δɛ that teds to zero as ɛ 0 such that lim P U, V0, V [1:k] m [1:k] T ɛ for some m [1:k] = 0, 8 if j J r j < j J H V j V Aj V 0 H VJ V 0 U δɛ for some J [1 : k] such that J = ad if j J, the A j J. Note that all the existig coverig ad packig lemmas such as [16, Lem. 8.2] ad [19, Lem. 4], oly ivolve sigle-layer codebook. Our Multivariate Coverig ad Packig Lemmas geeralize them to the case of multilayer codebook, ad certaily our Coverig/Packig Lemmas could recover all of them.
6 6 III. SOURCE BROADCAST A. Source Broadcast Now, we boud the distortio regio for source broadcast commuicatio. To write the ier boud, we first itroduce a auxiliary radom variable V j, 1 j N 2 K 1 for each of the 2 K 1 oempty subsets G j [1 : K], ad let V j deote a commo message trasmitted from seder to all the receivers i G j. The V j correspods to a subset G j by the followig oe-to-oe mappig. Sort all the oempty subsets G [1 : K] i the decreasig order 2. Map the jth subset i the resultig sequece to j. Obviously this mappig is oe-to-oe correspodig. For example, if K = 3, the G 1 = {1, 2, 3, G 2 = {2, 3, G 3 = {1, 3, G 4 = {1, 2, G 5 = {3, G 6 = {2, G 7 = {1. Besides, let A j {i [1 : N] : G j G i, 1 j N, 9 D k {i [1 : N] : k G i, 1 k K. 10 Later we will show that they respectively correspod to the idex set of the radom variables o which the codeword V j is superposed, ad the idex set of decodable codewords Vj s for receiver k i the proposed hybrid codig scheme; see Appedix C-A. Decoder k is able to recover correctly the Vj, desigated by the ecoder with probability approachig 1 as if j D k. I additio, it is easy to verify that if j D k, the A j D k. It meas that the proposed codebook satisfies that if iformatio V j ca be recovered correctly by receiver k, the V A j ca also be recovered correctly by it. Based o the otatios above, we defie distortio regio { R i = D [1:K] : There exist some pmf p V[1:N] S, vector r [1:N], ad fuctios x v [1:N], s, ŝ k v Dk, y k, 1 k K such that Ed k S, Ŝk D k, 1 k K, r j > H V j V Aj H VJ S j J j J for all J [1 : N] such that J = ad if j J, the A j J, r j < H Vj V Aj H VJ c Y k V J j J c j J c for all 1 k K ad for all J D k such that J c D k \J = ad if j J, the A j J We say a set G is larger tha aother H if G > H, or G = H ad there exists some 1 i G such that G [i] > H [i] ad G [l] = H [l] for all 1 l i 1, where G [i] or H [i] deotes the ith largest elemet i G or H.
7 7 S Source Ecoder V M [1: N] [1: N] x v, [1: N ] s X p Y 1 Y 2 Y K X Y1 Y K ˆ 1 V M Chael 1 1 ˆ Decoder 1 1, 1 1 ˆ ˆ S1 s v y K V M Chael K K sˆ Decoder K K v, y K K ˆ S K Fig. 2. A uified hybrid codig used to prove the ier boud i Theorem 1. Besides, defie aother distortio regio { R o = D [1:K] : There exists some pmf pŝ[1:k] S Ed k S, Ŝk D k, 1 k K, such that ad for ay pmf p U[1:L] S, oe ca fid p X, Ũ [1:L],W [1:K],W satisfyig [1:K] m m I ŜAi ; U Bi U i 1 j=0 Bj I Y Ai ; ŨB WAi+1 i Ũ i 1 WAi WAi 1, j=0 Bj for ay m 1, A i [1 : K], B i [1 : L], 0 i m, A 0, A m+1, ad W Ai W Ai, if i is odd; W A i, otherwise, or W Ai W A i, if i is odd; W Ai, otherwise. 12 The we have the followig theorem. The proof is give i Appedix C. Theorem 1. For trasmittig source S over geeral broadcast chael p Y[1:K] X, R i R R o. 13 Remark 1. The ier boud i Theorem 1 ca be easily exteded to Gaussia or ay other well-behaved cotiuousalphabet source-chael pair by stadard discretizatio method [16, Thm. 3.3], ad moreover for this case the outer boud still holds. Theorem 1 ca be also exteded to the case of source-chael badwidth mismatch, where m samples of a DMS are trasmitted through uses of a DM-BC. This ca be accomplished by replacig the source ad chael symbols i Theorem 1 by supersymbols of legths m ad, respectively. Besides, Theorem 1 could be also exteded to the problem of broadcastig correlated sources by modifyig the distortio measure or source broadcast with chael iput cost by addig chael iput costrait. The ier boud R i i Theorem 1 is achieved by a uified hybrid codig scheme depicted i Fig. 2. I this scheme, the codebook has a layered or superpositio structure, ad cosists of radomly ad idepedetly geerated codewords V [1:N] m [1:N], m [1:N] N [1 : 2ri ], where r [1:N] satisfies 11. At ecoder side, upo source sequece S, the ecoder produces digital messages M [1:N] with M i meat for all the receivers k satisfyig
8 8 i D k. The, the codeword V [1:N] M [1:N] ad the source sequece S are used to geerate chael iput X by symbol-by-symbol mappig xv [1:N], s. At decoder sides, upo received sigal Yk, decoder k could recostruct M Dk ad also V D k M Dk losslessly, ad the Ŝ k is produced by symbol-by-symbol mappig ŝ kv Dk, y k. Such a scheme could achieve ay D [1:K] i the ier boud R i. To reveal essece of such hybrid codig, the digital trasmissio part of this hybrid codig ca be roughly uderstood as cascade of a K-user Gray-Wyer source-codig ad a K-user Marto s broadcast chael-codig, which share a commo codebook. Accordig to [16, Thm. 13.3], the ecodig operatio of Gray-Wyer source-codig with rates r [1:N] is successful if j J r j > j J H V j V Aj H VJ S for all J [1 : N] such that J = ad if j J, the A j J, ad accordig to [16, Thm 5.2] the decodig operatio of Marto s broadcast chael-codig with rates r [1:N] is successful if j J c r j < j J c H V j V Aj H VJ c Y k V J for all 1 k K ad for all J D k such that J c ad if j J, the A j J. Note that i Marto s broadcast chaelcodig, r [1:N] does ot correspod to the regular broadcast-rates i.e., the rates of subcodebooks i multicodig, but is the rates of the whole codebook. Sice the proposed hybrid codig satisfies the two sufficiet coditios above, V D k M Dk could be losslessly trasmitted to receiver k. Note that such iformal uderstadig is iaccurate owig to the use of symbol-by-symbol mappig, but it provides the ratioale for our scheme. Besides, the desig of such uified hybrid codig is ispired by the hybrid codig scheme for sedig correlated sources over multi-access chael i [15]. The outer boud R o i Theorem 1 are derived by itroducig auxiliary radom variables or remote sources U[1:L]. This proof method could also be foud i [9], [11, Thm. 2] ad [12, Lem. 1]. I [9] it is used to derive the outer boud for Gaussia source broadcast, ad i [11, Thm. 2] ad [12, Lem. 1] it is used to derive the outer bouds for sedig source over 2-user geeral broadcast chael. A deeper uderstadig of this proof method has bee give by Khezeli et al. i [12]. pŝ[1:k] S ca be cosidered as a virtual broadcast chael realized over physical broadcast chael p Y[1:K] X, ad hece certai measuremets based o pŝ[1:k] S are less tha or equal to those based o p Y[1:K] X. This leads to the ecessary coditios o the commuicatio. Note that this proof method geeralizes the oe used to derive trivial outer boud, but it does ot always result i a tighter outer boud tha the trivial oe [10]. For 2-user broadcast case, the ier boud i Theorem 1 reduces to { R i = D 1, D 2 : There exist some pmf p V0,V 1,V 2 S, ad fuctios x v 0, v 1, v 2, s, ŝ k v 0, v k, y k, k = 1, 2, such that Ed k S, Ŝk D k, IV 0 V k ; S < IV 0 V k ; Y k, j = 1, 2, IV 0 V 1 V 2 ; S + IV 1 ; V 2 V 0 < mi {IV 0 ; Y 1, IV 0 ; Y 2 + IV 1 ; Y 1 V 0 + IV 2 ; Y 2 V 0, IV 0 V 1 ; S + IV 0 V 2 ; S + IV 1 ; V 2 V 0 S < IV 0 V 1 ; Y 1 + IV 0 V 2 ; Y This ier boud was first give i by Yassaee et. al [21]. O the other had, for 2-user broadcast case, lettig
9 9 L = 3, the outer boud i Theorem 1 reduces to { R o = D 1, D 2 : There exists some pmf pŝ1,ŝ2 S such that Ed k S, Ŝk D k, k = 1, 2, ad for ay pmf p U1,U 2,U 3 S, oe ca fid p X, Ũ 1,Ũ2,Ũ3,W1,W2,W 1,W 2satisfyig I ŜA1 ; U B1 U B0 I Y A1 ; ŨB 1 ŨB 0 WA1, I ŜA1 ; U B1 U B0 + I ŜA2 ; U B2 U B0 U B1 I Y A1 ; ŨB 1 WA2 ŨB 0 WA1 + I Y A2 ; ŨB 2 ŨB 0 Ũ B1 WA1 WA2, I ŜA1 ; U B1 U B0 + I ŜA2 ; U B2 U B0 U B1 + I ŜA3 ; U B3 U B0 U B1 U B2 I Y A1 ; ŨB 1 WA2 ŨB 0 WA1 + I Y A2 ; ŨB WA3 2 ŨB 0 Ũ B1 WA1 WA2 + I Y A3 ; ŨB 3 ŨB 0 Ũ B1 Ũ B2 WA2 WA3, for ay A i [1 : 2], B i [1 : 3], 0 i 3, ad W Ai W Ai, if i is odd; W A i, otherwise, or W Ai W A i, if i is odd; W Ai, otherwise. 15 This outer boud is as tight as if ot tighter tha that give by Khezeli et al. i [12, Thm. 1]. This is because the outer boud i [12, Lem 1] is just R o with A i restricted to be a elemet ot a subset of [1 : 2]. Whe cosider lossless trasmissio of idepedet source, Theorem 1 ca be used to achieve bouds o capacity regio of geeral broadcast chael with commo messages. I this case, S = M j : 1 j N ad all M j s are idepedet with each other. For each 1 j N, let R j deote the rate of the commo message M j that is to be trasmitted losslessly from seder to all the receivers i G j [1 : K]. The correspodece betwee M j ad G j is kept same to that betwee V j ad G j ; see the begiig of this sectio. The such achievable rates R [1:N] costitute the capacity regio C. Now, defie rate regio { C i = R [1:N] : There exist some pmf p V[1:N] S, vector r [1:N] ad fuctio x v [1:N] such that r j > R j + H V j V Aj H VJ S j J j J j J for all J [1 : N] such that J = ad if j J, the A j J, r j < H Vj V Aj H VJ c Y k V J j J c j J c for all 1 k K ad for all J D k such that J c D k \J ad if j J, the A j J, 16
10 10 ad aother rate regio { C o = R [1:N] : There exists some pmf m j k A D k i B i R j m I N pũi p W[1:K],W [1:K] Ũ[1:N] ad fuctio x ũ [1:N] such that Y Ai ; ŨB WAi+1 i Ũ i 1 WAi WAi 1, j=0 Bj for ay m 1, A i [1 : K], B i [1 : N], 0 i m, A 0, A m+1, ad W Ai W Ai, if i is odd; W A i, otherwise, or W Ai W A i, if i is odd; W Ai, otherwise. 17 The as a cosequece of Theorem 1, we ca establish the followig bouds o the capacity regio of geeral broadcast chael. The proof is omitted. Theorem 2. For geeral broadcast chael p Y[1:K] X, the capacity regio C with commo messages satisfies C i C C o. 18 Remark 2. The ier boud ad the outer boud i Theorem 2 respectively geeralize Marto s ier boud ad Nair-El Gamal outer boud to the case of K-user broadcast chael. B. Source Broadcast over Degraded Chael If the chael is degraded, defie R i DBC = {D [1:K] : There exist some pmf p VK Sp VK 1 V K p V1 V 2, ad ad fuctios x v K, s, ŝ k v k, y k, 1 k K such that Ed k S, Ŝk D k, I S; V k k j=1 I Y j ; V j V j 1, 1 k K, where V 0, 19 R o DBC {D = [1:K] : There exists some pmf pŝ[1:k] S such that Ed k S, Ŝk D k, 1 k K, I Ŝ[1:k] ; S : k [1 : K] C DBC p Y[1:K] X, ad for ay pmf p UK 1 Sp UK 2 U K 1 p U1 U 2, U 0, U K S, I Ŝ[1:k] ; U k U k 1 : k [1 : K] C DBC holds, 20 p Y[1:K] X where C DBC p Y[1:K] X = {R [1:K] : 0 R k I X; Y k, 1 k K for some pmf p X 21
11 11 ad { C DBC p Y[1:K] X = R [1:K] : There exists some pmf p X p VK 1 Xp VK 2 V K 1 p V1 V 2 such that 0 R k I Y k ; V k V k 1, 1 k K, where V 0, V K X. 22 Note that C DBC p Y[1:K] X is the capacity of degraded broadcast chael p Y[1:K] X, ad by rate-splittig argumet, it ca be also expressed as { C DBC p Y[1:K] X = R [1:K] : There exists some pmf p X p VK 1 Xp VK 2 V K 1 p V1 V 2 such that R k 0, k R j j=1 k j=1 I Y j ; V j V j 1, 1 k K, where V 0, V K X. 23 The as a cosequece of Theorem 1, the followig theorem holds. The proof is give i Appedix D. Theorem 3. For trasmittig source S over degraded broadcast chael p Y[1:K] X, R i DBC R Ro DBC. 24 C. Quadratic Gaussia Source Broadcast Cosider sedig Gaussia source S N 0, N S with quadratic distortio measure d k s, ŝ = ds, ŝ s ŝ 2 over Gaussia broadcast chael Y k = X +W k, 1 k K with W k N 0, N k, N 1 N 2 N K. Assume badwidth mismatch factor is b. The the ier boud R i DBC i Theorem 3 could recover the best kow ier boud so far [7, Thm. 5] by settig suitable radom variables ad symbol-by-symbol mappigs. Corollary 1. [7, Thm. 5] For trasmittig Gaussia source S with quadratic distortio measure over 2-user Gaussia broadcast chael with badwidth mismatch factor b, R i DBC R. For b < 1 badwidth compressio where R i DBC = {D 1λ, γ, D 2 λ, γ : 0 λ 1, 0 γ 1, 25 D 1 λ, γ = bn S λp +N bn S b 1 b λγp +N 1 P +N 1 λp +N 1, 26 For b > 1 badwidth expasio D 2 λ, γ = bn S λp +N 1 + λγp +N 1 1 bn S P +N 1 λp +N 1 λγp +N 2 N 2 b b R i DBC = {D 1λ, γ, D 2 λ, γ : 0 λ 1, 0 γ 1, 28
12 12 where Y k D 1 λ, γ = D 2 λ, γ = b1 γ b 1 P +N1 λ b1 γ b 1 P +N1 b1 γ b 1 P +N1 λ b1 γ b 1 P +N1 N S b 1 bγp +N1, 29 N 1 N S b 1 bγp +N2 N 2 λ b1 γ b 1 P +N2. b 1 30 N 2 Proof: For b = m < 1 badwidth compressio, the source Sm = S, S+1 m is trasmitted over chael = X + Wk, k = 1, 2. Defie a set of radom variables U1 m, E1 m, U2 m, E2 m, X1, X 2, X 2, V 1, V 2 such that S m +1 = U m 1 + E m 1, 31 E m 1 = U m 2 + E m 2, 32 X 2 = X 2 + βαs, 33 V 1 = U m 1, X 1, 34 V 2 = V 1, U m 2, X 2, 35 where U m 1, U m 2, E m 2 are mutually idepedet Gaussia variables, X 2 ad X 1 are Gaussia variables idepedet of all the other variables, VarX 2 = λγp, VarX 1 = 1 λ P, VarE 1 = VarE 1 λ1 γp b, ad α = λγp +N2 N 1 b S, β = λγp λγp +N 2. Defie a set of fuctios N 2 N S b P +N1 1 b λp +N 1, VarE 2 = x v 2, s m = x 1 + αs + x 2 βαs = x 1 + αs + x 2, 36 ŝ m 1 v 1, y1 αn S = α 2 y1 x 1, u m 1, 37 N S + N 1 ŝ m 2 v 2, y2 αn S = α 2 y2 x 1, u m 1 + u m N S + N 2 Substitute these variables ad fuctios ito the ier boud R i DBC i Theorem 3, the the b < 1 case i Corollary 1 is recovered. For b = m > 1 badwidth expasio, the source S is trasmitted over chael Wk m, W k,m+1 where U m 1, U m 2, E m 2 Y m k, Y k,m+1 = X m, Xm+1 +, k = 1, 2. Defie a set of radom variables U m 1, E m 1, U m 2, E m 2, X m 1, X m 2, V 1, V 2 such that S m = U m 1 + E m 1, 39 E m 1 = U m 2 + E m 2, 40 V 1 = U m 1, X m 1, 41 V 2 = V 1, U m 2, X m 2, 42 are mutually idepedet Gaussia variables, X m 1 ad X m 2 are two Gaussia variables idepedet of all the other radom variables, VarX 1 = 1 λ1 γbp b 1, VarX 2 = λ1 γbp b 1, VarE 1 =
13 13 b1 γ N S b 1 P +N 1 λ b1 γ b 1 P +N 1 where α = b 1 ad VarE 2 = bγp +N2 VarE 1 λ b1 γ b 1 P +N 2 N 2 N 2 b 1. Defie a set of fuctios bγp N 2 x v 2, s m = α s m u m 1, x m 1 + x m 2 = αe m 1, x m 1 + x m 2, 43 ŝ m 1 v 1, y1 = u m αvare α 2 y1 m, 44 VarE 1 + N 1 ŝ m 2 v 2, y2 = u m N α 2 u m αvare VarE 2 + N 2 α 2 y2 m, 45 VarE 2 + N 2 γbp VarE 1. Substitute these variables ad fuctios ito the ier boud Ri DBC i Theorem 3, the the b > 1 case i Corollary 1 is also recovered. O the other had, settig U [1:K 1] to be joitly Gaussia with S, the outer boud R o DBC i Theorem 3 could recover the best kow outer boud [9, Thm. 2]. Theorem 4. [9, Thm. 2] For trasmittig Gaussia source S with quadratic distortio measure over K-user Gaussia broadcast chael with badwidth mismatch factor b, R R o DBC {D [1:K] : For ay variables + = τ 0 τ 1 τ K = 0, 1 1 b 2 log N S + τ k D k + τ k 1 : k [1 : K] C GBC, 46 D k + τ k N S + τ k 1 where C GBC deotes the capacity of Gaussia broadcast chael give by { K C GBC = R [1:K] : R k 0, 1 k K, N K+1 = 0, N k N k+1 exp 2 k=1 k j=1 R j P + N To compare R o DBC with the trivial distortio boud, we cosider a set of Gaussia test chaels p Ŝ k S, 1 k K that achieves the optimal poit-to-poit distortio for each receiver. Assume pŝ S is the backward Gaussia [1:K] broadcast chael cosistig of subchaels pŝ k S, 1 k K. Sice ay backward Gaussia chael ca be trasformed ito a forward Gaussia chael with the same probability distributio, assume p V[1:K] U is the forward Gaussia broadcast chael of pŝ S. The for Gaussia source broadcast, the outer boud is i form of the [1:K] compariso of capacity regios for two Gaussia broadcast chaels p V[1:K] U ad p Y[1:K] X. Note that p Y[1:K] X ad p V[1:K] U have differet badwidth the badwidth ratio is b but the same poit-to-poit capacity for each receiver. It ca be proved that the Gaussia broadcast capacity regio shriks as the badwidth icreases. Additioally, C DBC p V[1:K] U = C DBC p Y[1:K] X whe badwidth matched. Hece C DBC p V[1:K] U C DBC p Y[1:K] X always holds for badwidth compressio case. This is the reaso why the outer boud i [9] is otrivial oly for badwidth expasio. The details ca be foud i [10]. The bouds i Corollary 1 ad Theorem 4 are illustrated i Fig. 3. D. Hammig Biary Source Broadcast Cosider sedig biary source S Ber 1 2 with Hammig distortio measure dk s, ŝ = ds, ŝ 0, if s = ŝ; 1, otherwise, over biary broadcast chael Y k = X W k, 1 k K with W k Ber p k, 1 2 p 1 p 2 p K 0. Assume badwidth mismatch factor is b.
14 x Ier Boud Outer Boud 2 D2 Ier Boud 1 1 Outer Boud 1 Trivial Outer Boud D 1 Fig. 3. Distortio bouds for sedig Gaussia source over Gaussia broadcast chael with b = 2, N S = 1, P = 50, N 1 = 10, N 2 = 1. Outer Bouds 1 ad 2 ad Ier Bouds 1 ad 2 respectively correspod to the outer boud i Theorem 4, the outer boud i Theorem 8, the ier boud i Corollary 1, ad the ier boud achieved by Wyer-Ziv separate codig ucoded systematic code [17, Lem. 3]. Trivial Outer Boud correspods to the trivial outer boud 6. Besides, Outer Boud 2 ad Ier Boud 2 could be cosidered as the outer boud ad ier boud for Wyer-Ziv source broadcast problem with b = 1, β 1 = N S N 1 P +N 1, β 2 = N S N 2 P +N 2, ad i this case Trivial Outer Boud correspods to the Wyer-Ziv outer boud 55. We first cosider the ier boud. For badwidth expasio b > 1, as a special case of hybrid codig systematic source-chael codig Ucoded Systematic Codig has bee first ivestigated i [6]. For ay poit-to-poit lossless commuicatio system, such systematic codig does ot loss the optimality; however, for some lossy cases such as Hammig biary source commuicatio, it is ot optimal ay more. To retai the optimality, we ca first quatize the source S, ad the trasmit the quatized sigal usig Ucoded Systematic Codig. The performace of this code could be obtaied directly from Theorem 3. Specifically, let U 2 = S E 2, U 1 = U 2 E 1 with E 2 BerD 2, E 1 Berd 1. Let V 2 = U 2, X b 1, V 1 = U1, X1 b 1, X b 1 1 = X b 1 B b 1, where X1 b 1 ad X b 1 are idepedet of U 2 ad U 1, ad X b 1 ad B b 1 follow b 1 dimesioal Ber 1 2 ad Berθ, respectively. Let xb v 2, s = u 2, x b 1, ŝ 2 v2, y2 b = u2 ad ŝ 1 v1, y1 b = u1, if d 1 < p 1 ; y 1, otherwise. Substitute these variables ad fuctios ito the ier boud R i Theorem 3, the we get the followig corollary. DBC i Corollary 2 Coded Systematic Codig. For trasmittig biary source S with Hammig distortio measure over
15 15 2-user biary broadcast chael with badwidth mismatch factor b, R R i CSC covexhull {D 1, D 2 : 0 θ, d 1 1 2, where deotes the biary covolutio, i.e., ad H 2 deotes the biary etropy fuctio, i.e., D 1 mi {d 1 D 2, p 1 D 2, r 1 = 1 H 2 d 1 p 1 + b 1 [1 H 2 θ p 1 ], r 2 = H 2 d 1 p 2 H 2 p 2 + b 1 [H 2 θ p 2 H 2 p 2 ], 1 H 2 d 1 D 2 r 1, 1 H 2 D 2 r 1 + r 2, 48 x y = 1 xy + x1 y, 49 H 2 p = p log p 1 p log1 p. 50 Remark 3. Coded Systematic Codig without timesharig does ot always lead to a covex distortio regio, hece a timesharig mechaism is eeded to improve performace ad achieve R i CSC. It is equivalet to addig a timesharig variable Q ito V 2 ad V 1, before substitute them ito the ier boud R i DBC. Besides, ote that ulike Ucoded Systematic Codig, the Coded Systematic Codig could always achieve the optimal distortio for at least oe of the receivers. Moreover, ulike separate codig the Coded Systematic Codig could weake the cliff effect, ad result i slope-cliff effect. I additio, the outer boud i Theorem 3 reduces to the followig outer boud for Hammig biary source broadcast problem. This outer boud was first give i [11, Equatio 41] for 2-user case. The proof is similar to that of [11, Equatio 41], hece it is omitted here. Theorem 5. For trasmittig biary source S with Hammig distortio measure over K-user biary broadcast chael with badwidth mismatch factor b, R R o DBC {D [1:K] : For ay variables 1 2 = τ 0 τ 1 τ 2 τ K = 0, 1 b H 2 τ k 1 D k H 2 τ k D k : k [1 : K] C BBC, 51 where C BBC deotes the capacity of biary broadcast chael give by { C BBC = R [1:K] : There exist some variables 1 2 = θ 0 θ 1 θ 2 θ K = 0 such that 0 R k H 2 θ k 1 p k H 2 θ k p k, 1 k K. 52 The bouds i Corollary 2 ad Theorem 5 are illustrated i Fig. 4.
16 Trivial Outer Boud Outer Boud 2 Separate Codig Ucoded Systematic Codig Wyer Ziv Broadcast Codig D Outer Boud 1 Coded Systematic Codig Trivial Outer Boud D2 Fig. 4. Distortio bouds for sedig biary source over biary broadcast chael with b = 2, p 1 = 0.18, p 2 = Outer Bouds 1 ad 2 respectively correspod to the outer boud i Theorem 5 ad the outer boud i Theorem 9. Separate Codig, Ucoded Systematic Codig ad Coded Systematic Codig respectively correspod to the separate scheme combiig successive-refiemet code [16, Example 13.3] with superpositio code [16, Example 5.3], the ier boud i Corollary 3, ad the ier boud i Corollary 2. Trivial Outer Bouds 1 ad 2 correspod to the trivial outer boud 6 ad the Wyer-Ziv outer boud 55, respectively. Besides, Trivial Outer Boud 2, Outer Boud 2 ad Ucoded Systematic Codig could be cosidered as the outer bouds ad ier boud for Wyer-Ziv source broadcast problem with b = 1, β 1 = p 1, β 2 = p 2. Y1 S ˆ 1 Decoder 1 S Ecoder X p Y 1 Y 2 Y K X Z1 Y K Decoder K ˆ S K Z K Fig. 5. Wyer-Ziv source broadcast system: broadcast commuicatio system with side iformatio at decoders. IV. WYNER-ZIV SOURCE BROADCAST: SOURCE BROADCAST WITH SIDE INFORMATION We ow exted the problem by allowig decoders to access side iformatio correlated with the source. As depicted i Fig. 5, receiver k observes memoryless side iformatio Z k, ad it produces source recostructio Ŝ k from received sigal Y k ad side iformatio Z k. Defiitio 7. A -legth Wyer-Ziv source-chael code is defied by the ecodig fuctio x : S X ad a sequece of decodig fuctios ŝ k : Y k Z k Ŝ k, 1 k K.
17 17 Defiitio 8. If there exists a sequece of Wyer-Ziv source-chael codes satisfyig lim sup Ed k S, Ŝ k D k, 53 the we say that the distortio tuple D [1:K] is achievable. Defiitio 9. The admissible distortio regio for Wyer-Ziv broadcast problem is defied as R SI { D [1:K] : D [1:K] is achievable. 54 I additio, Shamai et al. [6, Thm. 2.1] showed that for trasmittig source over poit-to-poit chael p Yk X with side iformatio Z k available at decoder, the miimum achievable distortio satisfies R S Zk D k = C k, where R S Zk is the Wyer-Ziv rate-distortio fuctio of the source S give that the decoder observes Z k [16]. Therefore, the optimal distortio is D SI,k = R 1 S Z k C k. Obviously, where R SI is amed Wyer-Ziv outer boud. R SI R SI { D [1:K] : D k D SI,k, 1 k K, 55 Besides, we also cosider the commuicatio system with badwidth mismatch, whereby m samples of a DMS are trasmitted through uses of a DM-BC with l samples of side iformatio available at each decoder. For simplicity, we let m = l, ad for this case, badwidth mismatch factor is defied as b = m. A. Wyer-Ziv Source Broadcast If cosider Z [1:K] to be trasmitted from seder to the receivers over a virtual broadcast chael p Z[1:K] S, ad defie X = S, X ad Y k = Z k, Y k, 1 k K, the the Wyer-Ziv source broadcast problem is equivalet to the problem of sedig p S over p Y with S restricted to be the iput of subchael p [1:K] X Z [1:K] S. Hece Wyer-Ziv source broadcast problem could be cosidered as the problem of ucoded systematic source-chael codig. If set x v [1:N], s = s, x v [1:N], s, the from Theorem 1, we obtai the followig ier boud for such systematic source-chael codig problem. It is therefore also a ier boud for the Wyer-Ziv source broadcast problem. { R i SI = D [1:K] : There exist some pmf p V[1:N] S, vector r [1:N], ad fuctios x v [1:N], s, ŝ k v Dk, y k, z k, 1 k K such that Ed k S, Ŝk D k, 1 k K, r j > H V j V Aj H VJ S j J j J for all J [1 : N] such that J ad if j J, the A j J, r j < Vj V Aj H VJ c Y k Z k V J j J c j J c H for all 1 k K ad for all J D k such that J c D k \J = ad if j J, the A j J. 56
18 18 O the other had, the distortio regio of systematic source-chael codig problem belogs to that of the source broadcast problem without iput costrait for subchael p Z[1:K] S. Hece R SI R p S, p Y, [1:K] X where R p S, p Y deotes the admissible distortio regio for sedig S over broadcast chael p [1:K] X Y X. [1:K] The from Theorem 1, we obtai the followig outer boud o R p S, p Y, which therefore is also a outer [1:K] X boud o R SI. R o SI,1 {D = [1:K] : There exists some pmf p V[1:K] S ad fuctios ŝ k v k, z k, 1 k K such that Ed k S, Ŝk D k, 1 k K, ad for ay pmf p U[1:L] S, oe ca fid p S,X, Ũ [1:L],W [1:K],W satisfyig [1:K] m m I V Ai Z Ai ; U Bi U i 1 j=0 Bj I Y Ai Z Ai ; ŨB WAi+1 i Ũ i 1 WAi WAi 1, j=0 Bj for ay m 1, A i [1 : K], B i [1 : L], 0 i m, A 0, A m+1, ad W Ai W Ai, if i is odd; W A i, otherwise, or W Ai W A i, if i is odd; W Ai, otherwise. 57 I additio, regard U [1:L], Z [1:K] as auxiliary radom variables followig pu[1:l] Sp Z[1:K] S, the followig a similar proof to that of the outer boud i Theorem 1, we ca achieve aother outer boud o R SI. R o SI,2 {D = [1:K] : There exists some pmf p V[1:K] S ad fuctios ŝ k v k, z k, 1 k K such that Ed k S, Ŝk D k, 1 k K, ad for ay pmf p U[1:L] S, oe ca fid p X, Ũ [1:L], Z [1:K],W [1:K],W satisfyig [1:K] m m I V Ai ; U Bi Z Ai+1 U i 1 Z j=0 Bj i j=1 Aj I Y Ai ; ŨB i ZAi+1 WAi+1 Ũ i 1 Z j=0 Bj i j=1 A WAi WAi 1 j, for ay m 1, A i [1 : K], B i [1 : L], 0 i m, A 0, A m+1, ad W Ai W Ai, if i is odd; W A i, otherwise, or W Ai W A i, if i is odd; W Ai, otherwise. 58 Therefore, the followig theorem holds. The proof is omitted. Theorem 6. For trasmittig source S over broadcast chael p Y[1:K] X with side iformatio Z k at decoder k, R i SI R SI R o SI,1 Ro SI,2. 59 Remark 4. Similar to Theorem 1, Theorem 6 could also be exteded to Gaussia or ay other well-behaved cotiuous-alphabet source-chael pair, the problem of broadcastig Wyer-Ziv correlated sources, or Wyer-Ziv source broadcast with chael iput cost.
19 19 B. Wyer-Ziv Source Broadcast over Degraded Chael with Degraded Side Iformatio Theorem 6 ca be used to derive the ier boud ad outer boud for the case of degraded chael ad degraded side iformatio. Defie R i SI-D = {D [1:K] : There exists some pmf p VK Sp VK 1 V K p V1 V 2, ad ad fuctios x v K, s, ŝ k v k, y k, z k, 1 k K such that Ed k S, Ŝk D k, I S; V k k j=1 I Y j Z j ; V j V j 1, 1 k K, where V 0, 60 R o SI-D = {D [1:K] : There exists some pmf p VK Sp VK 1 V K p V1 V 2 ad fuctios ŝ k v k, z k, 1 k K such that Ed k S, Ŝk D k, I V k ; S Z k : k [1 : K] C DBC p Y[1:K] X, ad for ay pmf p UK 1 Sp UK 2 U K 1 p U1 U 2, U 0, U K S, I V k ; U k U k 1 Z k : k [1 : K] C DBC p Y[1:K] X holds, 61 where C DBC p Y[1:K] X ad C DBC p Y[1:K] X are give i 21 ad 22, respectively. The we have the followig theorem. The proof is aalogous to that of Theorem 3, ad is therefore omitted. Theorem 7. For trasmittig source S over degraded broadcast chael p Y[1:K] X X Y K Y K 1 Y 1 with degraded side iformatio Z k S Z K Z K 1 Z 1 at decoder k, R i SI-D R SI R o SI-D. 62 C. Wyer-Ziv Gaussia Source Broadcast Cosider sedig Gaussia source S N 0, N S with quadratic distortio measure d k s, ŝ = ds, ŝ s ŝ 2 over Gaussia broadcast chael Y k = X + W k, 1 k K with W k N 0, N k, N 1 N 2 N K. Assume the side iformatio Z k observed by receiver k satisfies S = Z k +B k with idepedet Gaussia variables Z k N 0, N S β k ad B k N 0, β k. Assume badwidth mismatch factor is b. The the ier boud i Theorem 7 could recover the existig results i the literature [17], [18], ad the outer boud i Theorem 7 could be used to prove the followig outer boud for Wyer-Ziv Gaussia source broadcast problem. The proof is give i Appedix E.
20 20 Theorem 8. For trasmittig Gaussia source S over Gaussia broadcast chael with degraded side iformatio Z k β 1 β 2 β K at decoder k, R SI R o SI-D {D [1:K] : For ay variables + = τ 0 τ 1 τ K = 0, 1 1 b 2 log β k + τ k D k + τ k 1 : k [1 : K] C GBC, 63 D k + τ k β k + τ k 1 where C GBC deotes the capacity regio of the Gaussia broadcast chael give i 47. The boud i Theorem 8 is show i Fig. 3. D. Wyer-Ziv Biary Source Broadcast Cosider sedig biary source S Ber 1 2 with Hammig distortio measure dk s, ŝ = ds, ŝ 0, if s = ŝ; 1, otherwise, over biary broadcast chael Y k = X W k, 1 k K with W k Ber p k, 1 2 p 1 p 2 p K 0. Assume the side iformatio Z k observed by receiver k satisfies S = Z k B k with idepedet variables Z k Ber 1 2 ad Bk Ber β k. Assume badwidth mismatch factor is b. Let V 1 = U 1, X b 1, V2 = U 2, X b, V 3 =, ad U 1 ad U 2 are idepedet of X b 1 ad X b. S, U 2 ad U 1 satisfy the distributio p U2 Sp U1 U 2, where p U2 S = q 2ᾱ 2 q 2 α 2 q 2 q 2 α 2 q 2 ᾱ 2 q 2, 64 p U1 U 2 = q 1ᾱ 1 q 1α 1 q 1 q 1α 1 q 1ᾱ 1 q with 0 q 2, q 1 1, 0 α 2, α Xb ad X1 b satisfy X1 b = X b B b, X b b dimesioal Ber 1 2, ad B b b dimesioal Berθ with 0 θ 1 2. Deote α 1 = α 2 α 1, q 1 = q 2 q 1, ad set x b v 2, s = x b ad for i = 1, 2, Substitute these radom variables ad fuctios ito R i SI ŝ i vi, yi b z i, if α i β i or α i < β i, u i = 2;, z i = u i, if α i < β i, u i = 0, i Theorem 6, the we get the followig performace the hybrid codig reduces to a layered digital codig, which is tighter tha that of the Layered Descriptio Scheme LDS [17, Lem. 4]. Corollary 3 Layered Digital Codig. For trasmittig biary source S with Hammig distortio measure over
21 21 2-user biary broadcast chael with side iformatio Z k at decoder k, R SI R i LDC {D 1, D 2 : 0 q 1 q 2 1, 0 α 2 α 1 1 2, 0 θ 1 2, q 1 rα 1, β 1 b 1 H 2 θ p 1, q 1 rα 1, β 2 b 1 H 2 θ p 2, q 2 rα 2, β 2 b 1 H 2 p 2, q 1 rα 1, β 1 + q 2 rα 2, β 2 q 1 rα 1, β 2 b 1 H 2 θ p 1 + b H 2 θ p 2 H 2 p 2, D i q i mi {α i, β i + 1 q i β i, i = 1, 2, 67 where rα, β = H 2 α β H 2 α, 68 deotes the biary covolutio give i 49, ad H 2 deotes the biary etropy fuctio give i 50. I additio, the outer boud i Theorem 7 reduces to the followig oe for Wyer-Ziv biary case. The proof is give i Appedix F. Theorem 9. For trasmittig biary source S with Hammig distortio measure over K-user biary broadcast chael with degraded side iformatio Z k 1 2 β 1 β 2 β K 0 at decoder k, R SI R o SI-D {D [1:K] : There exists some variables 0 α 1, α 2,, α K 1 2 such that α k D k mi {D k, β k, 1 k K, ad for ay variables 1 2 = τ 0 τ 1 τ 2 τ K = 0, 1 η k H 2 β k τ k H 2 β k τ k 1 H 4 α k, β k, τ k H 4 α k, β k, τ k 1 : k [1 : K] C BBC, b where C BBC deotes the capacity regio of the biary broadcast chael give i 52, β k D k β η k k α k, if α k < β k, 0, otherwise, H 4 x, y, z xyz + xyz log xyz + xyz xyz + xyz log xyz + xyz xyz + xyz log xyz + xyz xyz + xyz log xyz + xyz, 71 ad x 1 x.. The bouds i Corollary 3 ad Theorem 9 are show i Fig. 4.
22 22 V. CONCLUDING REMARKS I this paper, we focused o the joit source-chael codig problem of sedig a memoryless source over memoryless broadcast chael, ad developed a outer boud ad a ier boud for this problem. The ier boud is achieved by a uified hybrid codig scheme, ad it ca recover the best kow performace of existig hybrid codig. Similarly, our outer boud ca also recover the best kow outer boud i the literature. Besides, we also exted the results to Wyer-Ziv source broadcast problem. All these bouds are also used to geerate some ew results, icludig the bouds o capacity regio of geeral broadcast chael with commo messages which respectively geeralize Marto s ier boud ad Nair-El Gamal outer boud. The ier boud achieved by proposed hybrid codig is established by usig geeralized Multivariate Coverig Lemma ad geeralized Multivariate Packig Lemma, ad the outer boud is derived by itroducig auxiliary radom variables or remote sources ad exploitig Csiszár sum idetity as i [12]. These lemmas ad tools are expected to be exploited to derive more ad stroger achievability ad coverse results for etwork iformatio theory. APPENDIX A PROOF OF LEMMA 1 We follow similar steps to the proof of mutual coverig lemma [15]. Let { k B = m [1:k] [1 : 2 ri ] : U, V0, V[1:k] m [1:k] T ɛ. 72 The we oly eed to show lim P B = 0 = 0. O the other had, lim P B = 0 = lim lim = lim u,v 0 p U,V 0 u, v 0 P B = 0 u, v 0 73 u,v0 T ɛ u,v0 T ɛ p U,V u, v 0 0 P B = 0 u, v0 + lim P u, v0 / T ɛ 74 p U,V 0 u, v 0 P B = 0 u, v 0 75 To prove lim P B = 0 = 0, it is sufficiet to show lim P B = 0 u, v 0 = 0 for ay u, v 0 T ɛ. Utilizig Chebyshev lemma [16, App. B], we ca boud the probability as P B = 0 u, v0 P B E B 2 E B 2 u, v0 Var B u, v 0 E B u, v Next we prove the upper boud Var B u,v 0 E B u,v teds to zero as. Defie 0 2 E 1, if u, v0, V[1:k] m m [1:k] T [1:k] 0, otherwise, ɛ ; 77
23 23 for each m [1:k] k [1 : 2ri ], the B ca be expressed as Deote p 0 = P p I = P B = m [1:k] k [1:2r i ] u, v 0, V [1:k] m [1:k] T ɛ u, v 0 u, v 0, V [1:k] m [1:k] T ɛ E m [1:k]. 78, 79, 80, u, v0, V[1:k] m I, m Ic T ɛ u, v0 for m [1:k] = 1, ad m [1:k] = 2. Obviously, p [1:k] = p 0. The E B u, v0 = P u, v0, V[1:k] m [1:k] T ɛ u, v0 = 2 k j=1 rj p 0, 81 m [1:k] ad E B 2 u, v0 = I [1:k] m [1:k] m I c :m I c m I c = 2 k j=1 rj p 0 + Defie P u, v0, V I [1:k] m [1:k] m I c :m I c m I c [1:k] m [1:k] T ɛ P u, v0, V, u, v0, V[1:k] m I, m Ic T ɛ u, v0 [1:k] m [1:k] T ɛ 82, u, v0, V[1:k] m I, m Ic T ɛ u, v0. 83 J {J [1 : k] : if j J, the A j J. 84 The ay set I [1 : k] ca trasform ito a J I J by removig all the elemets j s such that A j I. Accordig to geeratio of radom codebook, we ca observe that p I = p J I. Therefore, P u, v0, V[1:k] m [1:k] T ɛ, u, v0, V[1:k] m I, m Ic T ɛ u, v0 I [1:k] m [1:k] m I c :m I c m I c = I [1:k] m [1:k] m I c :m I c m I c I [1:k] I [1:k] J J p J I 85 2 k j=1 rj+ j I c rj p J I 86 2 k j=1 rj+ j J I c rj p J I 87 2 k J 2 k j=1 rj+ j J c rj p J 88 J J 2 k j=1 rj+ j J c rj+o1 p J, 89
24 24 where 87 follows from J I I, 88 follows from that for each J J, there are at most 2 k J of I s that could trasform ito J, ad o1 deotes a term that vaishes as. Hece Var B u, v 0 E B 2 u, v k j=1 rj p k j=1 rj+ rj+o1 j J c p J. 91 J J Furthermore we have Var B u, v0 2 E B u, v0 2 k j=1 rj p 0 + J J 2 k j=1 rj+ j J c rj+o1 p J 2 k j=1 rj p = 2 k 1 j=1 rj + 2 rj+o1 p J j J p 0 p J J 0 Accordig to geeratio process of radom codebook, we ca observe that p 0 = P V[1:k] m [1:k] = v[1:k] u, v0 v [1:k] :u,v0,v T [1:k] ɛ 94 2 k j=1 HVj V A j V 0 HV [1:k] UV 0+2δɛ, 95 where 95 follows from that for ay u, v 0, v [1:k] T ad for ay u, v 0 T Similarly, we also ca get ɛ, P V[1:k] m [1:k] = v[1:k] u, v0 2 k j=1 HVj V A j V 0+δɛ, 96 ɛ, { v[1:k] : u, v0, v[1:k] T ɛ 2 HV [1:k] UV 0+δɛ. 97 p J 2 k j=1 HVj V A j V 0+ j J c HVj V A j V 0 HV [1:k] UV 0 HV J c UV 0V J 4δɛ. 98 Substitute 95 ad 98 ito 93, the we have Var B u, v0 E B u, v0 2 k j=1 rj k j=1 HVj V A j V 0 HV [1:k] UV 0+2δɛ 2 + J J 2 j J rj j J HVj V A j V 0 HV J UV 0+6δɛ+o teds to zero if k k r j > H V j V Aj V 0 H V[1:k] UV 0 + 2δ ɛ 100 j=1 j=1 r j > H V j V Aj V 0 H VJ UV 0 + 6δ ɛ + o1, 101 j J j J i.e., j J r j > j J H V j V Aj V 0 H VJ UV 0 + δ ɛ for some δ ɛ that teds to zero as ɛ 0. This completes the proof.
25 25 u,v 0 APPENDIX B PROOF OF LEMMA 2 For ay J such that J = ad if j J the A j J, P U, V0, V[1:k] m [1:k] T ɛ for some m [1:k] P U, V0, VJ m J T ɛ for some m J = p U,V0 u, v0 P u, v0, VJ m J T ɛ for some m J u, v0 u,v p U,V0 u, v0 P u, v0, VJ m J T ɛ u, v m J Similar to 95, we ca obtai that P u, v0, VJ m J T ɛ u, v0 2 j J HVj V A j V 0 HV J UV 0 2δɛ. 105 Substitute it ito 104, the we have P U, V0, V[1:k] m [1:k] T ɛ for some m [1:k] 2 j J rj j J HVj V A j V 0 HV J UV 0 2δɛ teds to zero if This completes the proof. r j < H V j V Aj V 0 H VJ UV 0 2δ ɛ. 107 j J j J APPENDIX C PROOF OF THEOREM 1 A. Ier Boud Actually the ier boud ca be see as a corollary to [20, Thm. 1] by choosig proper etwork topology, trasit probability ad symbol-by-symbol fuctios. I the followig, we provide a direct descriptio of the proposed hybrid codig scheme ad a direct proof for it. Codebook Geeratio: Fix coditioal pmf p V[1:N] S, vector r [1:N], ecodig fuctio x v [1:N], s ad decodig
26 26 fuctios ŝ k v Dk, y k that satisfy Ed k S, Ŝk D k, 1 k K, r j > H V j V Aj H VJ S j J j J 108 for all J [1 : N] such that J = ad if j J, the A j J, 109 r j < H Vj V Aj H VJ c Y k V J j J c j J c for all 1 k K ad for all J D k such that J c D k \J ad if j J, the A j J. For each j [1 : N] ad each m Aj 110 i A j [1 : 2 ri ], radomly ad idepedetly geerate a set of sequeces vj m A j, m j, m j [1 : 2 rj ], with each distributed accordig to p V j V Aj v j,i v Aj,im Aj. The codebook { C = m[1:n] : m[1:n] N [1 : ] ri v [1:N] is revealed to the ecoder ad all the decoders. Ecodig: We use joit typicality ecodig. Give s, ecoder fids the smallest idex vector m [1:N] such that s, v[1:n] m[1:n] T ɛ. If there is o such idex vector, let m [1:N] = 1. The the ecoder trasmits the sigal x i = x v [1:N],i m[1:n], si, 1 i. 112 Decodig: We use joit typicality decodig. Let ɛ > ɛ. Upo receivig sigal yk, the decoder of the receiver k fids the smallest idex vector ˆm k D k such that v D k ˆm k D k, y k T ɛ. 113 If there is o such idex vector, let ˆm k D k = 1. The decoder recostructs the source as ŝ k,i = ŝ k v Dk,i ˆm k D k, y k,i, 1 i. 114 Aalysis of Expected Distortio: We boud the distortio averaged over S, ad the radom choice of the codebook C. Defie the error evet where for 1 k K. Usig uio boud, we have E = E 1 E 2,k E 3,k, 115 k k { E 1 = S, V[1:N] m[1:n] / T ɛ for all m [1:N], 116 { E 2,k = S, V[1:N] m[1:n], Y k / T ɛ, 117 { V E 3,k = m, Y Dk Dk k T ɛ for some m D k, m D k M Dk, 118
27 27 P E P E 1 + K k=1 P E1 c E2,k + K P E 3,k. 119 Now we claim that if 109 ad 110 hold, the P E teds to zero as. Before provig it, we show that this claim implies the ier boud of Theorem 1. Defie E 4,k = k=1 { S, VD k k ˆM D k, Yk / T ɛ. 120 the we have E c E c 4,k, i.e., E 4,k E. This implies that P E 4,k P E 0 as. The utilizig typical average lemma [16], we have lim sup Ed k S, Ŝ k = lim sup = lim sup E ] P E 4,k E [d k S, Ŝ k E 4,k + P E4,k c ] E [d k S, Ŝ k E4,k c 1 + ɛ Ed k S, Ŝk ] [d k S, Ŝ k E4,k c ɛ D k. 124 Therefore, the desired distortios are achieved for sufficietly small ɛ. Next we tur back to prove the claim above. Followig from Multivariate Coverig Lemma Lemma 1, the first term of 119, P E 1, vaishes as, ad accordig to coditioal typicality lemma [16, Sec. 3.7], the secod item teds to zero as. Now we focus o the third term of 119. E 3,k ca be write as where E I 3,k = with I c D k \I. Usig uio boud we have Each D k E 3,k = I D k E I 3,k, 125 { V M Dk I, m I c, Y k T ɛ for some m I c, m I M c I, c 126 P E 3,k I D k P E I 3,k. 127 has fiite umber of subsets, hece we oly eed to show for each I D k, P. To show this, it is eeded to aalyze the correlatio betwee codig idex M [1:N] E I 3,k vaishes as ad ochose codewords. Specifically, M [1:N] depeds o source sequece ad the etire codebook, ad hece stadard packig lemma caot be applied directly. This problem has bee resolved by the techique developed i [15], [20].
Multiterminal source coding with complementary delivery
Iteratioal Symposium o Iformatio Theory ad its Applicatios, ISITA2006 Seoul, Korea, October 29 November 1, 2006 Multitermial source codig with complemetary delivery Akisato Kimura ad Tomohiko Uyematsu
More informationA Partial Decode-Forward Scheme For A Network with N relays
A Partial Decode-Forward Scheme For A etwork with relays Yao Tag ECE Departmet, McGill Uiversity Motreal, QC, Caada Email: yaotag2@mailmcgillca Mai Vu ECE Departmet, Tufts Uiversity Medford, MA, USA Email:
More informationInformation Theory Tutorial Communication over Channels with memory. Chi Zhang Department of Electrical Engineering University of Notre Dame
Iformatio Theory Tutorial Commuicatio over Chaels with memory Chi Zhag Departmet of Electrical Egieerig Uiversity of Notre Dame Abstract A geeral capacity formula C = sup I(; Y ), which is correct for
More informationCooperative Communication Fundamentals & Coding Techniques
3 th ICACT Tutorial Cooperative commuicatio fudametals & codig techiques Cooperative Commuicatio Fudametals & Codig Techiques 0..4 Electroics ad Telecommuicatio Research Istitute Kiug Jug 3 th ICACT Tutorial
More informationLecture 15: Strong, Conditional, & Joint Typicality
EE376A/STATS376A Iformatio Theory Lecture 15-02/27/2018 Lecture 15: Strog, Coditioal, & Joit Typicality Lecturer: Tsachy Weissma Scribe: Nimit Sohoi, William McCloskey, Halwest Mohammad I this lecture,
More informationLecture 27. Capacity of additive Gaussian noise channel and the sphere packing bound
Lecture 7 Ageda for the lecture Gaussia chael with average power costraits Capacity of additive Gaussia oise chael ad the sphere packig boud 7. Additive Gaussia oise chael Up to this poit, we have bee
More informationAsymptotic Coupling and Its Applications in Information Theory
Asymptotic Couplig ad Its Applicatios i Iformatio Theory Vicet Y. F. Ta Joit Work with Lei Yu Departmet of Electrical ad Computer Egieerig, Departmet of Mathematics, Natioal Uiversity of Sigapore IMS-APRM
More informationLecture 7: Channel coding theorem for discrete-time continuous memoryless channel
Lecture 7: Chael codig theorem for discrete-time cotiuous memoryless chael Lectured by Dr. Saif K. Mohammed Scribed by Mirsad Čirkić Iformatio Theory for Wireless Commuicatio ITWC Sprig 202 Let us first
More informationA New Achievability Scheme for the Relay Channel
A New Achievability Scheme for the Relay Chael Wei Kag Seur Ulukus Departmet of Electrical ad Computer Egieerig Uiversity of Marylad, College Park, MD 20742 wkag@umd.edu ulukus@umd.edu October 4, 2007
More informationFinite Block-Length Gains in Distributed Source Coding
Decoder Fiite Block-Legth Gais i Distributed Source Codig Farhad Shirai EECS Departmet Uiversity of Michiga A Arbor,USA Email: fshirai@umichedu S Sadeep Pradha EECS Departmet Uiversity of Michiga A Arbor,USA
More informationEntropies & Information Theory
Etropies & Iformatio Theory LECTURE I Nilajaa Datta Uiversity of Cambridge,U.K. For more details: see lecture otes (Lecture 1- Lecture 5) o http://www.qi.damtp.cam.ac.uk/ode/223 Quatum Iformatio Theory
More informationThe Maximum-Likelihood Decoding Performance of Error-Correcting Codes
The Maximum-Lielihood Decodig Performace of Error-Correctig Codes Hery D. Pfister ECE Departmet Texas A&M Uiversity August 27th, 2007 (rev. 0) November 2st, 203 (rev. ) Performace of Codes. Notatio X,
More informationLecture 11: Channel Coding Theorem: Converse Part
EE376A/STATS376A Iformatio Theory Lecture - 02/3/208 Lecture : Chael Codig Theorem: Coverse Part Lecturer: Tsachy Weissma Scribe: Erdem Bıyık I this lecture, we will cotiue our discussio o chael codig
More informationOn Random Line Segments in the Unit Square
O Radom Lie Segmets i the Uit Square Thomas A. Courtade Departmet of Electrical Egieerig Uiversity of Califoria Los Ageles, Califoria 90095 Email: tacourta@ee.ucla.edu I. INTRODUCTION Let Q = [0, 1] [0,
More informationInequalities for Entropies of Sets of Subsets of Random Variables
Iequalities for Etropies of Sets of Subsets of Radom Variables Chao Tia AT&T Labs-Research Florham Par, NJ 0792, USA. tia@research.att.com Abstract Ha s iequality o the etropy rates of subsets of radom
More informationMultiterminal Source Coding with an Entropy-Based Distortion Measure
20 IEEE Iteratioal Symposium o Iformatio Theory Proceedigs Multitermial Source Codig with a Etropy-Based Distortio Measure Thomas A. Courtade ad Richard D. Wesel Departmet of Electrical Egieerig Uiversity
More informationSymmetric Two-User Gaussian Interference Channel with Common Messages
Symmetric Two-User Gaussia Iterferece Chael with Commo Messages Qua Geg CSL ad Dept. of ECE UIUC, IL 680 Email: geg5@illiois.edu Tie Liu Dept. of Electrical ad Computer Egieerig Texas A&M Uiversity, TX
More informationSUCCESSIVE INTERFERENCE CANCELLATION DECODING FOR THE K -USER CYCLIC INTERFERENCE CHANNEL
Joural of Theoretical ad Applied Iformatio Techology 31 st December 212 Vol 46 No2 25-212 JATIT & LLS All rights reserved ISSN: 1992-8645 wwwatitorg E-ISSN: 1817-3195 SCCESSIVE INTERFERENCE CANCELLATION
More informationMASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.265/15.070J Fall 2013 Lecture 3 9/11/2013. Large deviations Theory. Cramér s Theorem
MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.265/5.070J Fall 203 Lecture 3 9//203 Large deviatios Theory. Cramér s Theorem Cotet.. Cramér s Theorem. 2. Rate fuctio ad properties. 3. Chage of measure techique.
More informationHybrid Coding for Gaussian Broadcast Channels with Gaussian Sources
Hybrid Codig for Gaussia Broadcast Chaels with Gaussia Sources Rajiv Soudararaja Departmet of Electrical & Computer Egieerig Uiversity of Texas at Austi Austi, TX 7871, USA Email: rajivs@mailutexasedu
More informationTHE interference channel problem describes a setup where multiple pairs of transmitters and receivers share a communication
Trade-off betwee Commuicatio ad Cooperatio i the Iterferece Chael Farhad Shirai EECS Departmet Uiversity of Michiga A Arbor,USA Email: fshirai@umich.edu S. Sadeep Pradha EECS Departmet Uiversity of Michiga
More informationMASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.436J/15.085J Fall 2008 Lecture 19 11/17/2008 LAWS OF LARGE NUMBERS II THE STRONG LAW OF LARGE NUMBERS
MASSACHUSTTS INSTITUT OF TCHNOLOGY 6.436J/5.085J Fall 2008 Lecture 9 /7/2008 LAWS OF LARG NUMBRS II Cotets. The strog law of large umbers 2. The Cheroff boud TH STRONG LAW OF LARG NUMBRS While the weak
More informationThe Three-Terminal Interactive. Lossy Source Coding Problem
The Three-Termial Iteractive 1 Lossy Source Codig Problem Leoardo Rey Vega, Pablo Piataida ad Alfred O. Hero III arxiv:1502.01359v3 cs.it] 18 Ja 2016 Abstract The three-ode multitermial lossy source codig
More informationNon-Asymptotic Achievable Rates for Gaussian Energy-Harvesting Channels: Best-Effort and Save-and-Transmit
No-Asymptotic Achievable Rates for Gaussia Eergy-Harvestig Chaels: Best-Effort ad Save-ad-Trasmit Silas L. Fog, Jig Yag, ad Ayli Yeer arxiv:805.089v [cs.it] 30 May 08 Abstract A additive white Gaussia
More informationThe Likelihood Encoder with Applications to Lossy Compression and Secrecy
The Likelihood Ecoder with Applicatios to Lossy Compressio ad Secrecy Eva C. Sog Paul Cuff H. Vicet Poor Dept. of Electrical Eg., Priceto Uiversity, NJ 8544 {csog, cuff, poor}@priceto.edu Abstract A likelihood
More informationEntropy and Ergodic Theory Lecture 5: Joint typicality and conditional AEP
Etropy ad Ergodic Theory Lecture 5: Joit typicality ad coditioal AEP 1 Notatio: from RVs back to distributios Let (Ω, F, P) be a probability space, ad let X ad Y be A- ad B-valued discrete RVs, respectively.
More informationRelaying via Hybrid Coding
011 IEEE Iteratioal Symposium o Iformatio Theory Proceedigs Relayig via Hybrid Codig Youg-Ha Kim Departmet of ECE UCSD La Jolla CA 9093 USA yhk@ucsd.edu Sug Hoo Lim Departmet of EE KAIST Daejeo Korea sughlim@kaist.ac.kr
More informationLossy Coding of Correlated Sources Over a Multiple Access Channel: Necessary Conditions and Separation Results
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 64, NO. 9, SETEMBER 08 608 Lossy Codig of Correlated Sources Over a Multiple Access Chael: Necessary Coditios ad Separatio Results Başak Güler, Member, IEEE,
More informationLecture 14: Graph Entropy
15-859: Iformatio Theory ad Applicatios i TCS Sprig 2013 Lecture 14: Graph Etropy March 19, 2013 Lecturer: Mahdi Cheraghchi Scribe: Euiwoog Lee 1 Recap Bergma s boud o the permaet Shearer s Lemma Number
More informationInformation Theory and Coding
Sol. Iformatio Theory ad Codig. The capacity of a bad-limited additive white Gaussia (AWGN) chael is give by C = Wlog 2 ( + σ 2 W ) bits per secod(bps), where W is the chael badwidth, is the average power
More informationChannel coding, linear block codes, Hamming and cyclic codes Lecture - 8
Digital Commuicatio Chael codig, liear block codes, Hammig ad cyclic codes Lecture - 8 Ir. Muhamad Asial, MSc., PhD Ceter for Iformatio ad Commuicatio Egieerig Research (CICER) Electrical Egieerig Departmet
More informationVector Permutation Code Design Algorithm. Danilo SILVA and Weiler A. FINAMORE
Iteratioal Symposium o Iformatio Theory ad its Applicatios, ISITA2004 Parma, Italy, October 10 13, 2004 Vector Permutatio Code Desig Algorithm Dailo SILVA ad Weiler A. FINAMORE Cetro de Estudos em Telecomuicações
More information62. Power series Definition 16. (Power series) Given a sequence {c n }, the series. c n x n = c 0 + c 1 x + c 2 x 2 + c 3 x 3 +
62. Power series Defiitio 16. (Power series) Give a sequece {c }, the series c x = c 0 + c 1 x + c 2 x 2 + c 3 x 3 + is called a power series i the variable x. The umbers c are called the coefficiets of
More informationLecture 7: October 18, 2017
Iformatio ad Codig Theory Autum 207 Lecturer: Madhur Tulsiai Lecture 7: October 8, 207 Biary hypothesis testig I this lecture, we apply the tools developed i the past few lectures to uderstad the problem
More informationRun-length & Entropy Coding. Redundancy Removal. Sampling. Quantization. Perform inverse operations at the receiver EEE
Geeral e Image Coder Structure Motio Video (s 1,s 2,t) or (s 1,s 2 ) Natural Image Samplig A form of data compressio; usually lossless, but ca be lossy Redudacy Removal Lossless compressio: predictive
More informationNon-Asymptotic Achievable Rates for Gaussian Energy-Harvesting Channels: Best-Effort and Save-and-Transmit
08 IEEE Iteratioal Symposium o Iformatio Theory ISIT No-Asymptotic Achievable Rates for Gaussia Eergy-Harvestig Chaels: Best-Effort ad Save-ad-Trasmit Silas L Fog Departmet of Electrical ad Computer Egieerig
More informationOn Routing-Optimal Network for Multiple Unicasts
O Routig-Optimal Network for Multiple Uicasts Chu Meg, Athia Markopoulou Abstract I this paper, we cosider etworks with multiple uicast sessios. Geerally, o-liear etwork codig is eeded to achieve the whole
More informationECE 564/645 - Digital Communication Systems (Spring 2014) Final Exam Friday, May 2nd, 8:00-10:00am, Marston 220
ECE 564/645 - Digital Commuicatio Systems (Sprig 014) Fial Exam Friday, May d, 8:00-10:00am, Marsto 0 Overview The exam cosists of four (or five) problems for 100 (or 10) poits. The poits for each part
More informationREGRESSION WITH QUADRATIC LOSS
REGRESSION WITH QUADRATIC LOSS MAXIM RAGINSKY Regressio with quadratic loss is aother basic problem studied i statistical learig theory. We have a radom couple Z = X, Y ), where, as before, X is a R d
More informationOptimally Sparse SVMs
A. Proof of Lemma 3. We here prove a lower boud o the umber of support vectors to achieve geeralizatio bouds of the form which we cosider. Importatly, this result holds ot oly for liear classifiers, but
More informationEECS564 Estimation, Filtering, and Detection Hwk 2 Solns. Winter p θ (z) = (2θz + 1 θ), 0 z 1
EECS564 Estimatio, Filterig, ad Detectio Hwk 2 Sols. Witer 25 4. Let Z be a sigle observatio havig desity fuctio where. p (z) = (2z + ), z (a) Assumig that is a oradom parameter, fid ad plot the maximum
More informationSequences. Notation. Convergence of a Sequence
Sequeces A sequece is essetially just a list. Defiitio (Sequece of Real Numbers). A sequece of real umbers is a fuctio Z (, ) R for some real umber. Do t let the descriptio of the domai cofuse you; it
More informationSingular Continuous Measures by Michael Pejic 5/14/10
Sigular Cotiuous Measures by Michael Peic 5/4/0 Prelimiaries Give a set X, a σ-algebra o X is a collectio of subsets of X that cotais X ad ad is closed uder complemetatio ad coutable uios hece, coutable
More informationChapter 3. Strong convergence. 3.1 Definition of almost sure convergence
Chapter 3 Strog covergece As poited out i the Chapter 2, there are multiple ways to defie the otio of covergece of a sequece of radom variables. That chapter defied covergece i probability, covergece i
More informationAn Introduction to Randomized Algorithms
A Itroductio to Radomized Algorithms The focus of this lecture is to study a radomized algorithm for quick sort, aalyze it usig probabilistic recurrece relatios, ad also provide more geeral tools for aalysis
More informationRefinement of Two Fundamental Tools in Information Theory
Refiemet of Two Fudametal Tools i Iformatio Theory Raymod W. Yeug Istitute of Network Codig The Chiese Uiversity of Hog Kog Joit work with Siu Wai Ho ad Sergio Verdu Discotiuity of Shao s Iformatio Measures
More informationAxioms of Measure Theory
MATH 532 Axioms of Measure Theory Dr. Neal, WKU I. The Space Throughout the course, we shall let X deote a geeric o-empty set. I geeral, we shall ot assume that ay algebraic structure exists o X so that
More informationDisjoint Systems. Abstract
Disjoit Systems Noga Alo ad Bey Sudaov Departmet of Mathematics Raymod ad Beverly Sacler Faculty of Exact Scieces Tel Aviv Uiversity, Tel Aviv, Israel Abstract A disjoit system of type (,,, ) is a collectio
More informationDiscrete-Time Systems, LTI Systems, and Discrete-Time Convolution
EEL5: Discrete-Time Sigals ad Systems. Itroductio I this set of otes, we begi our mathematical treatmet of discrete-time s. As show i Figure, a discrete-time operates or trasforms some iput sequece x [
More informationBeurling Integers: Part 2
Beurlig Itegers: Part 2 Isomorphisms Devi Platt July 11, 2015 1 Prime Factorizatio Sequeces I the last article we itroduced the Beurlig geeralized itegers, which ca be represeted as a sequece of real umbers
More informationUC Berkeley CS 170: Efficient Algorithms and Intractable Problems Handout 17 Lecturer: David Wagner April 3, Notes 17 for CS 170
UC Berkeley CS 170: Efficiet Algorithms ad Itractable Problems Hadout 17 Lecturer: David Wager April 3, 2003 Notes 17 for CS 170 1 The Lempel-Ziv algorithm There is a sese i which the Huffma codig was
More informationA Hybrid Random-Structured Coding Scheme for the Gaussian Two-Terminal Source Coding Problem Under a Covariance Matrix Distortion Constraint
A Hybrid Radom-Structured Codig Scheme for the Gaussia Two-Termial Source Codig Problem Uder a Covariace Matrix Distortio Costrait Yag Yag ad Zixiag Xiog Dept of Electrical ad Computer Egieerig Texas A&M
More informationChapter 6 Infinite Series
Chapter 6 Ifiite Series I the previous chapter we cosidered itegrals which were improper i the sese that the iterval of itegratio was ubouded. I this chapter we are goig to discuss a topic which is somewhat
More informationACO Comprehensive Exam 9 October 2007 Student code A. 1. Graph Theory
1. Graph Theory Prove that there exist o simple plaar triagulatio T ad two distict adjacet vertices x, y V (T ) such that x ad y are the oly vertices of T of odd degree. Do ot use the Four-Color Theorem.
More informationIncreasing timing capacity using packet coloring
003 Coferece o Iformatio Scieces ad Systems, The Johs Hopkis Uiversity, March 4, 003 Icreasig timig capacity usig packet colorig Xi Liu ad R Srikat[] Coordiated Sciece Laboratory Uiversity of Illiois e-mail:
More informationConvergence of random variables. (telegram style notes) P.J.C. Spreij
Covergece of radom variables (telegram style otes).j.c. Spreij this versio: September 6, 2005 Itroductio As we kow, radom variables are by defiitio measurable fuctios o some uderlyig measurable space
More informationUniversal source coding for complementary delivery
SITA2006 i Hakodate 2005.2. p. Uiversal source codig for complemetary delivery Akisato Kimura, 2, Tomohiko Uyematsu 2, Shigeaki Kuzuoka 2 Media Iformatio Laboratory, NTT Commuicatio Sciece Laboratories,
More informationIP Reference guide for integer programming formulations.
IP Referece guide for iteger programmig formulatios. by James B. Orli for 15.053 ad 15.058 This documet is iteded as a compact (or relatively compact) guide to the formulatio of iteger programs. For more
More informationOverview of Gaussian MIMO (Vector) BC
Overview of Gaussia MIMO (Vector) BC Gwamo Ku Adaptive Sigal Processig ad Iformatio Theory Research Group Nov. 30, 2012 Outlie / Capacity Regio of Gaussia MIMO BC System Structure Kow Capacity Regios -
More informationRegression with quadratic loss
Regressio with quadratic loss Maxim Ragisky October 13, 2015 Regressio with quadratic loss is aother basic problem studied i statistical learig theory. We have a radom couple Z = X,Y, where, as before,
More informationThe multiplicative structure of finite field and a construction of LRC
IERG6120 Codig for Distributed Storage Systems Lecture 8-06/10/2016 The multiplicative structure of fiite field ad a costructio of LRC Lecturer: Keeth Shum Scribe: Zhouyi Hu Notatios: We use the otatio
More informationLecture 6: Source coding, Typicality, and Noisy channels and capacity
15-859: Iformatio Theory ad Applicatios i TCS CMU: Sprig 2013 Lecture 6: Source codig, Typicality, ad Noisy chaels ad capacity Jauary 31, 2013 Lecturer: Mahdi Cheraghchi Scribe: Togbo Huag 1 Recap Uiversal
More informationThe z-transform. 7.1 Introduction. 7.2 The z-transform Derivation of the z-transform: x[n] = z n LTI system, h[n] z = re j
The -Trasform 7. Itroductio Geeralie the complex siusoidal represetatio offered by DTFT to a represetatio of complex expoetial sigals. Obtai more geeral characteristics for discrete-time LTI systems. 7.
More informationAre Slepian-Wolf Rates Necessary for Distributed Parameter Estimation?
Are Slepia-Wolf Rates Necessary for Distributed Parameter Estimatio? Mostafa El Gamal ad Lifeg Lai Departmet of Electrical ad Computer Egieerig Worcester Polytechic Istitute {melgamal, llai}@wpi.edu arxiv:1508.02765v2
More informationLONG SNAKES IN POWERS OF THE COMPLETE GRAPH WITH AN ODD NUMBER OF VERTICES
J Lodo Math Soc (2 50, (1994, 465 476 LONG SNAKES IN POWERS OF THE COMPLETE GRAPH WITH AN ODD NUMBER OF VERTICES Jerzy Wojciechowski Abstract I [5] Abbott ad Katchalski ask if there exists a costat c >
More informationThe source coding game with a cheating switcher
The source codig game with a cheatig switcher Hari Palaiyaur hpalaiya@eecsberkeleyedu Cheg Chag cchag@eecsberkeleyedu Departmet of Electrical Egieerig ad Computer Scieces Uiversity of Califoria at Berkeley
More information6.3 Testing Series With Positive Terms
6.3. TESTING SERIES WITH POSITIVE TERMS 307 6.3 Testig Series With Positive Terms 6.3. Review of what is kow up to ow I theory, testig a series a i for covergece amouts to fidig the i= sequece of partial
More informationShannon s noiseless coding theorem
18.310 lecture otes May 4, 2015 Shao s oiseless codig theorem Lecturer: Michel Goemas I these otes we discuss Shao s oiseless codig theorem, which is oe of the foudig results of the field of iformatio
More informationAdvanced Analysis. Min Yan Department of Mathematics Hong Kong University of Science and Technology
Advaced Aalysis Mi Ya Departmet of Mathematics Hog Kog Uiversity of Sciece ad Techology September 3, 009 Cotets Limit ad Cotiuity 7 Limit of Sequece 8 Defiitio 8 Property 3 3 Ifiity ad Ifiitesimal 8 4
More informationIET Commun., 2009, Vol. 3, Iss. 1, pp doi: /iet-com: & The Institution of Engineering and Technology 2009
Published i IET Commuicatios Received o 4th Jue 28 Revised o 3th July 28 doi: 1.149/iet-com:28373 ISSN 1751-8628 Symmetric relayig based o partial decodig ad the capacity of a class of relay etworks L.
More informationBasics of Probability Theory (for Theory of Computation courses)
Basics of Probability Theory (for Theory of Computatio courses) Oded Goldreich Departmet of Computer Sciece Weizma Istitute of Sciece Rehovot, Israel. oded.goldreich@weizma.ac.il November 24, 2008 Preface.
More informationEntropy Rates and Asymptotic Equipartition
Chapter 29 Etropy Rates ad Asymptotic Equipartitio Sectio 29. itroduces the etropy rate the asymptotic etropy per time-step of a stochastic process ad shows that it is well-defied; ad similarly for iformatio,
More informationarxiv: v1 [cs.it] 13 Jul 2012
O the Sum Capacity of the Discrete Memoryless Iterferece Chael with Oe-Sided Weak Iterferece ad Mixed Iterferece Fagfag Zhu ad Biao Che Syracuse Uiversity Departmet of EECS Syracuse, NY 3244 Email: fazhu{biche}@syr.edu
More informationMachine Learning Theory Tübingen University, WS 2016/2017 Lecture 12
Machie Learig Theory Tübige Uiversity, WS 06/07 Lecture Tolstikhi Ilya Abstract I this lecture we derive risk bouds for kerel methods. We will start by showig that Soft Margi kerel SVM correspods to miimizig
More informationCEE 522 Autumn Uncertainty Concepts for Geotechnical Engineering
CEE 5 Autum 005 Ucertaity Cocepts for Geotechical Egieerig Basic Termiology Set A set is a collectio of (mutually exclusive) objects or evets. The sample space is the (collectively exhaustive) collectio
More informationThe Boolean Ring of Intervals
MATH 532 Lebesgue Measure Dr. Neal, WKU We ow shall apply the results obtaied about outer measure to the legth measure o the real lie. Throughout, our space X will be the set of real umbers R. Whe ecessary,
More informationLecture 19: Convergence
Lecture 19: Covergece Asymptotic approach I statistical aalysis or iferece, a key to the success of fidig a good procedure is beig able to fid some momets ad/or distributios of various statistics. I may
More informationProduct measures, Tonelli s and Fubini s theorems For use in MAT3400/4400, autumn 2014 Nadia S. Larsen. Version of 13 October 2014.
Product measures, Toelli s ad Fubii s theorems For use i MAT3400/4400, autum 2014 Nadia S. Larse Versio of 13 October 2014. 1. Costructio of the product measure The purpose of these otes is to preset the
More informationIt is always the case that unions, intersections, complements, and set differences are preserved by the inverse image of a function.
MATH 532 Measurable Fuctios Dr. Neal, WKU Throughout, let ( X, F, µ) be a measure space ad let (!, F, P ) deote the special case of a probability space. We shall ow begi to study real-valued fuctios defied
More informationEcon 325/327 Notes on Sample Mean, Sample Proportion, Central Limit Theorem, Chi-square Distribution, Student s t distribution 1.
Eco 325/327 Notes o Sample Mea, Sample Proportio, Cetral Limit Theorem, Chi-square Distributio, Studet s t distributio 1 Sample Mea By Hiro Kasahara We cosider a radom sample from a populatio. Defiitio
More informationProblem Set 2 Solutions
CS271 Radomess & Computatio, Sprig 2018 Problem Set 2 Solutios Poit totals are i the margi; the maximum total umber of poits was 52. 1. Probabilistic method for domiatig sets 6pts Pick a radom subset S
More informationOn Evaluating the Rate-Distortion Function of Sources with Feed-Forward and the Capacity of Channels with Feedback.
O Evaluatig the Rate-Distortio Fuctio of Sources with Feed-Forward ad the Capacity of Chaels with Feedback. Ramji Vekataramaa ad S. Sadeep Pradha Departmet of EECS, Uiversity of Michiga, A Arbor, MI 4805
More informationInfinite Sequences and Series
Chapter 6 Ifiite Sequeces ad Series 6.1 Ifiite Sequeces 6.1.1 Elemetary Cocepts Simply speakig, a sequece is a ordered list of umbers writte: {a 1, a 2, a 3,...a, a +1,...} where the elemets a i represet
More informationA Converse for Lossy Source Coding in the Finite Blocklength Regime
Research Collectio Coferece Paper A Coverse for Lossy Source Codig i the Fiite Blocklegth Regime Author(s: Palzer, Lars; Timo, Roy Publicatio Date: 206 Permaet Lik: https://doi.org/0.3929/ethz-a-0064599
More information6.867 Machine learning, lecture 7 (Jaakkola) 1
6.867 Machie learig, lecture 7 (Jaakkola) 1 Lecture topics: Kerel form of liear regressio Kerels, examples, costructio, properties Liear regressio ad kerels Cosider a slightly simpler model where we omit
More informationModule 5 EMBEDDED WAVELET CODING. Version 2 ECE IIT, Kharagpur
Module 5 EMBEDDED WAVELET CODING Versio ECE IIT, Kharagpur Lesso 4 SPIHT algorithm Versio ECE IIT, Kharagpur Istructioal Objectives At the ed of this lesso, the studets should be able to:. State the limitatios
More informationA Formula for the Capacity of the General Gel fand-pinsker Channel
A Formula for the Capacity of the Geeral Gel fad-pisker Chael Vicet Y. F. Ta, Member, IEEE arxiv:20.09v5 cs.it 6 Apr 204 Abstract We cosider the Gel fad-pisker problem i which the chael ad state are geeral,
More informationThe Choquet Integral with Respect to Fuzzy-Valued Set Functions
The Choquet Itegral with Respect to Fuzzy-Valued Set Fuctios Weiwei Zhag Abstract The Choquet itegral with respect to real-valued oadditive set fuctios, such as siged efficiecy measures, has bee used i
More informationMAT1026 Calculus II Basic Convergence Tests for Series
MAT026 Calculus II Basic Covergece Tests for Series Egi MERMUT 202.03.08 Dokuz Eylül Uiversity Faculty of Sciece Departmet of Mathematics İzmir/TURKEY Cotets Mootoe Covergece Theorem 2 2 Series of Real
More information2.4 Sequences, Sequences of Sets
72 CHAPTER 2. IMPORTANT PROPERTIES OF R 2.4 Sequeces, Sequeces of Sets 2.4.1 Sequeces Defiitio 2.4.1 (sequece Let S R. 1. A sequece i S is a fuctio f : K S where K = { N : 0 for some 0 N}. 2. For each
More informationOn Successive Refinement for the Wyner-Ziv Problem with Partially Cooperating Decoders
ISIT 2008, Toroto, Caada, July 6-11, 2008 O Successive Refiemet for the Wyer-Ziv Problem with Partially Cooperatig Decoders Shraga I. Bross ad Tsachy Weissma, School of Egieerig, Bar-Ila Uiversity, Ramat-Ga
More informationEE / EEE SAMPLE STUDY MATERIAL. GATE, IES & PSUs Signal System. Electrical Engineering. Postal Correspondence Course
Sigal-EE Postal Correspodece Course 1 SAMPLE STUDY MATERIAL Electrical Egieerig EE / EEE Postal Correspodece Course GATE, IES & PSUs Sigal System Sigal-EE Postal Correspodece Course CONTENTS 1. SIGNAL
More informationFixed-Threshold Polar Codes
Fixed-Threshold Polar Codes Jig Guo Uiversity of Cambridge jg582@cam.ac.uk Albert Guillé i Fàbregas ICREA & Uiversitat Pompeu Fabra Uiversity of Cambridge guille@ieee.org Jossy Sayir Uiversity of Cambridge
More informationLecture 3 : Random variables and their distributions
Lecture 3 : Radom variables ad their distributios 3.1 Radom variables Let (Ω, F) ad (S, S) be two measurable spaces. A map X : Ω S is measurable or a radom variable (deoted r.v.) if X 1 (A) {ω : X(ω) A}
More information( θ. sup θ Θ f X (x θ) = L. sup Pr (Λ (X) < c) = α. x : Λ (x) = sup θ H 0. sup θ Θ f X (x θ) = ) < c. NH : θ 1 = θ 2 against AH : θ 1 θ 2
82 CHAPTER 4. MAXIMUM IKEIHOOD ESTIMATION Defiitio: et X be a radom sample with joit p.m/d.f. f X x θ. The geeralised likelihood ratio test g.l.r.t. of the NH : θ H 0 agaist the alterative AH : θ H 1,
More information(A sequence also can be thought of as the list of function values attained for a function f :ℵ X, where f (n) = x n for n 1.) x 1 x N +k x N +4 x 3
MATH 337 Sequeces Dr. Neal, WKU Let X be a metric space with distace fuctio d. We shall defie the geeral cocept of sequece ad limit i a metric space, the apply the results i particular to some special
More informationVector Quantization: a Limiting Case of EM
. Itroductio & defiitios Assume that you are give a data set X = { x j }, j { 2,,, }, of d -dimesioal vectors. The vector quatizatio (VQ) problem requires that we fid a set of prototype vectors Z = { z
More informationSupplementary Material for Fast Stochastic AUC Maximization with O(1/n)-Convergence Rate
Supplemetary Material for Fast Stochastic AUC Maximizatio with O/-Covergece Rate Migrui Liu Xiaoxua Zhag Zaiyi Che Xiaoyu Wag 3 iabao Yag echical Lemmas ized versio of Hoeffdig s iequality, ote that We
More informationProblem Set 4 Due Oct, 12
EE226: Radom Processes i Systems Lecturer: Jea C. Walrad Problem Set 4 Due Oct, 12 Fall 06 GSI: Assae Gueye This problem set essetially reviews detectio theory ad hypothesis testig ad some basic otios
More informationMi-Hwa Ko and Tae-Sung Kim
J. Korea Math. Soc. 42 2005), No. 5, pp. 949 957 ALMOST SURE CONVERGENCE FOR WEIGHTED SUMS OF NEGATIVELY ORTHANT DEPENDENT RANDOM VARIABLES Mi-Hwa Ko ad Tae-Sug Kim Abstract. For weighted sum of a sequece
More information