THE interference channel problem describes a setup where multiple pairs of transmitters and receivers share a communication
|
|
- Gilbert Craig
- 6 years ago
- Views:
Transcription
1 Trade-off betwee Commuicatio ad Cooperatio i the Iterferece Chael Farhad Shirai EECS Departmet Uiversity of Michiga A Arbor,USA fshirai@umich.edu S. Sadeep Pradha EECS Departmet Uiversity of Michiga A Arbor,USA pradhav@umich.edu arxiv: v1 [cs.it] 17 Feb 2016 Abstract We cosider the problem of codig over the multi-user Iterferece Chael (IC). It is well-kow that aligig the iterferig sigals results i improved achievable rates i certai setups ivolvig more tha two users. We argue that i the geeral iterferece problem, seders face a tradeoff betwee commuicatig their message to their correspodig decoder or cooperatig with other users by aligig their sigals. Traditioally, iterferece aligmet is carried out usig structured codes such as liear codes ad group codes. We show through a example that the usual structured codig schemes used for iterferece eutralizatio lack the ecessary flexibility to optimize this tradeoff. Based o this ituitio, we propose a ew class of codes for this problem. We use the example to show that the applicatio of these codes gives strict improvemets i terms of achievable rates. Fially, we derive a ew achievable regio for the three user IC which strictly improves upo the previously kow ier bouds for this problem. I. Itroductio THE iterferece chael problem describes a setup where multiple pairs of trasmitters ad receivers share a commuicatio medium. Each receiver is oly iterested i decodig the message from its correspodig trasmitter. However, sice the chael is shared, sigals from other seders iterfere with the desired sigal at each decoder. The presece of iterferig sigals adds ew dimesios to this problem i terms of strategies that ca be used as compared to poit-to-poit (PtP) commuicatio. For example, the ecoders ca cooperate with each other by choosig their chael iputs i a way that would facilitate their joit commuicatio. It turs out that, ofte, this cooperatio requires a ecoder to employ a strategy which may be sub-optimal from its ow PtP commuicatios perspective. I this paper, we ivestigate this tradeoff ad develop a ew class of codes which allow for more efficiet cooperatio betwee the trasmitters. Characterizig the capacity regio for the geeral IC has bee a challege for decades. Eve i the simplest case of the two user IC, the capacity regio is oly kow i special cases [1] [2]. The best kow achievable regio for the IC was due to Ha ad Kobayashi [3]. However, recetly it was show that the Ha-Kobayashi (HK) rate regio is suboptimal [4] [9]. Particularly, whe there are more tha two trasmitter-receiver pairs, the atural geeralizatio of the HK strategy ca be improved upo by iducig structure i the codebooks used i the scheme [9]. Structured codes such as liear codes ad group codes eable the ecoders to alig their sigals more efficietly. This i tur reduces iterferece at the decoders. Such codebook structures have also prove to give gais i other multi-termial commuicatio problems [7]- [10]. The idea of iterferece aligmet was proposed for maagig iterferece whe there are three or more users. Iitially, the techique was proposed by Maddah-Ali et. al. [5] for the MIMO X chael, ad for the multi-user IC by Jafar ad Cadambe [6]. The iterferece aligmet strategy was developed for cases of additive iterferece ad uiform chael iputs over fiite fields. This was exteded to arbitrary iterferece settigs ad iput distributios i [9]. However, it turs out that aligmet is ot always beeficial to the users i terms of achievable rates. Cosider the example i Figure 1. Ituitively, it would be beeficial to alig the iput from users 1 ad 2 to reduce iterferece at decoder 3. However, if users 1 ad 2 alig their sigals, it becomes harder for decoder 2 to distiguish betwee the two iputs. Oe might suggest that the problem could be alleviated if users 1 ad 2 desiged their codebooks i a way that they would "look" aliged at decoder 3 based o P Y3 X 1,X 2,X 3, but at the same time they would seem differet at decoder 2 based o P Y2 X 1,X 2. I this paper we show that liear codes lack the ecessary flexibility for such a strategy. Based o this ituitio, we propose a ew class of structured codes. Usig these codes we derive a achievable rate regio which improves upo the best kow achievable regio for the three user IC give i [9]. The rest of the paper is orgaized as follows: Sectio II gives the otatio used i the paper as well as the problem statemet. I sectio III, we cosider two differet examples of three user IC. I the first example - where iterferece aligmet is strictly beeficial - we prove that ot oly structured codes are useful for aligmet but that ay arbitrary codig scheme which achieves optimality must possess certai liearity properties. I the secod example, we show the existece of the tradeoff discussed above ad prove that liear codes are suboptimal for that example. Sectio IV, gives the ew codebook costructios ad proves that these ew codes outperform the liear codig scheme i [9]. I Sectio V, we provide a ew geeral achievable rate regio for this problem. Sectio VI, cocludes the paper.
2 X1 P Y1 X1 Y1 X2 P Y2 X1,X2 Y2 X3 P Y3 X1,X2,X3 Y3 Fig. 1. A setup where iterferece aligmet is beeficial to user 3 but harmful for user 2. II. Problem Statemet ad Notatio I this sectio, we give the otatio used i the paper ad provide the problem statemet. Throughout the paper, we deote radom variables by capital letters such as X, U, their realizatios by small letters x, u, ad their correspodig alphabets (fiite) by sas-serif typeface X, U, respectively. Small letters such as l, k are used to represet umbers. The field of size q is deoted by F q. We represet the field additio by ad the additio o real umbers by +. For m N, We defie the set of umbers [1, m] {1, 2,, m}. Vectors are represeted by the bold type-face such as u, b. For a radom variable X, A ɛ (X) deotes the set of ɛ-typical sequece of legth with respect to the probability distributio P X, where we use the defiitio of frequecy typicality. Let q be a prime umber. For l N, cosider U i, i [1, m] i.i.d radom variables with distributio P U defied o the field F q. U l deotes a radom variable which has the same distributio as i [1,l] U i where the summatio is over F q. We proceed with formally defiig the three user IC problem. A three user IC cosists of three iput alphabets X i, i {1, 2, 3}, three output alphabets Y i, i {1, 2, 3}, ad a trasitio probability matrix P Y X. A code for this setup is defied as follows. Defiitio 1. A three user IC code (, M 1, M 2, M 3, e, d) cosists of (1) Three sets of message idices M i (2) Three ecoder mappigs e i : M i X i, i [1, 3], without loss of geerality, these maps are assumed to be ijective (3) ad three decodig fuctios d i : Y i M i, i [1, 3]. We defie the codebook correspodig to the ecodig map e i as C i = {e i (m i ) m i M i }, i [1, 3]. The rate of user i is defied as r i = 1 log C i. Defiitio 2. A rate-triple (R 1, R 2, R 3 ) is said to be achievable if for every ɛ > 0, there exists a code (, M 1, M 2, M 3, e, d) such that (1) r i R i ɛ, i [1, 3], ad (2) P(d(Y ) = M e(m) = X ) 1 ɛ. We make frequet use of coset codes ad Nested Liear Codes (NLC) which are defied ext. Defiitio 3. A (k, ) coset code C is characterized by a geerator matrix G k ad a dither b defied o the field F q. The code is defied as C {ug b u F k q}. The rate of the code is give by R = k log q. Defiitio 4. For atural umbers k i < k o, k o <, let G ki, G (ko k i ) ad G (k o k i ) be matrices o F q. Defie C i, C o ad C o as the liear codes geerated by G, [G G] ad [G G ], respectively. C o ad C o are called a pair of NLC s with ier code C i. We deote the outer rates as r o = k o ad r o = k o ad the ier rate r i = k i. III. The Iterferece Aligmet tradeoff I this sectio, we ivestigate the iterferece aligmet tradeoff metioed i the itroductio i more detail. We show that i certai three user iterferece setups, o the oe had, aligmet is beeficial to oe of the users, while o the other had, the rates achieved by the aligig users is reduced due to the aligmet. We ivestigate the pheomeo i two examples. The first example ivolves a three user iterferece setup. I this example, the first two ecoders use liear codes to maage the iterferece for the third user. This gives a strictly improved achievable rate regio. It is well-kow that iterferece aligmet ca be iduced efficietly by the applicatio of structured codes. Additioal to this, we show the stroger statemet that the oly esemble of codes which achieve the desired rate-triples i this example, are the oes with specific liearity properties. Next, we build upo the first example to create a setup where aligmet is beeficial to oe of the users ad harmful for the other oe. This secod example provides the motivatio for our ew codebook costructios i the ext sectio. A. Example 1 Cosider the example show i Figure 2. All of the iputs are q-ary ad the additios are defied o the field F q. The three outputs of the chael are Y i = X i N 1 N 3, i {1, 2}, Y 3 = X 1 X 2 X 3 N 3. We are iterested i achievig the followig rates for the first ad secod users: R 1 = R 2 = log q H(N 1 N 3 ). Give these rates, we wat to maximize R 3. The followig lemma shows that liear codes achieve the optimum R 3 for this setup. Furthermore, we show that if a esemble of codes achieves the optimum R 3, the the codes correspodig to the first two users are "almost" the same coset code.
3 X1 N1 q N3 N1 q N3 X2 N3 X3 Fig. 2. A Three User IC Where Aligmet Is Strictly Beeficial Lemma 1. For a give family of codes (, M 1, M 2, M 3, e, d), N satisfyig the rate ad error costraits at decoders 1 ad 2, user 3 ca achieve the rate R 3 = H(N 1 N 3 ) H(N 3 ) iff there exists a dither b such that for every radom variable N defied o F q with positive etropy, the followig holds: P(e 1 (M 1 ) e 2 (M 2 )) C 1 C 2 A ɛ (N) b) 1, as. (1) Equivaletly, the optimal rate is achieved iff there exists aother family of codes (, M 1, M 2, M 3, e, d ), N for which 1) P(e i(m i ) C i A ɛ (N)) 1 as, 2) C 1 = C 2 is a coset code, ad 3) they also achieve the rate triple (R 1, R 2, R 3 ) = (log q H(N 1 N 3 ), log q H(N 1 N 3 ), H(N 1 N 3 ) H(N 3 )). Proof: We provide a outlie of the proof i Appedix A. The lemma proves that eve if we expad our search to arbitrary -legth codebook costructios (as opposed to the usual radom codebook geeratio based o sigle-letter distributios), coset codes are the oly efficiet esemble of codes for the classes of iterferece chaels uder cosideratio up to small perturbatios. This is a stroger assertio tha the well-kow result that liear codes are useful for aligig the iterferig sigals. The lemma ca be used to provide a coverse result provig that schemes ivolvig radom ustructured codes (e.g. the geeralized versio of the sigle-letter HK scheme), ca t achieve the desired rate-triple without directly aalyzig the bouds correspodig to their achievable rate regio as doe i [9]. B. Example 2 Next, we cosider a example where iterferece aligmet results i a tradeoff betwee two of the users. Cosider the setup i Figure 3. Similar to the previous example, all iput alphabets, output alphabets, ad additios are defied o the field F q. The outputs of the chael are Y 1 = X 1 q N 1 q N 2 q N 3, Y 2 = X 1 q X 2 q N 2 N 3, ad Y 3 = 2X 1 q X 2 q X 3 q N 3. Followig our argumets i the previous example, for user 3 to be able to trasmit its messages at rate R 3 = H(X 3 N 3 ) H(N 3 ), the iputs for users 1 ad 2 must alig. However, if these two users alig their iputs, user 2 would ot be able to decode its message which is beig corrupted by its aliged iterferig sigal comig from user 1. Hece, we have a tradeoff. We proceed with evaluatig the rate-triples achievable i this example. The followig lemma proves that we must have R 1 + R 2 log q H(N 2 N 3 ), otherwise the rate-triple (R 1, R 2, R 3 ) is ot achievable. N1 q N2 q N3 X1 2 N2 q N3 X2 N3 X3 Fig. 3. A Three User IC Where Aligmet Results i a Tradeoff Lemma 2. Give that (R 1, R 2, R 3 ) is achievable, we must have R 1 + R 2 logq H(N 2 N 3 ). Proof: Sice the rate triple is achievable, there exists a family of codes (, M 1, M 2, M 3, e, d) for which the codewords set by the secod user, X2, is decoded at decoder 2 with error probability approachig 0. Assumig errorless decodig at decoder 2, the decoder has access to X2, X 1 X 2 N 2. The decoder ca subtract X 2 from X 1 X 2 N 2 to get X 1 N 2. Now, sice by assumptio decoder 1 ca decode X1 from X 1 N 1 N 2 with error goig to 0, decoder 2 ca use X 1 N 2 to recover X 1 with
4 small error. So decoder 2 has access to M 1 ad M 2. By the coverse of the poit-to-poit chael codig theorem, we must have 1 log M 1 M 2 log q H(N 2 ), which completes the proof. We wat to achieve the rate R 1 = log q H(N 1 N 2 N 3 ). I other words, ecoder 1 is to operate at PtP optimality. The goal is to optimize the liear combiatio R 2 + R 3. We argue that the liear codig scheme preseted i [9] ca t achieve the triple (R 1, R 2, R 3 ) for R 2 + R 3 > H(N 1 N 2 N 3 ) H(N 3 ). Lemma 3. Give R 1 = log q H(N 1 ), the scheme i [9] ca t achieve R 2 + R 3 > H(N 1 N 2 N 3 ) H(N 3 ). Proof: We provide the ituitio behid the proof here. Let us use two NCL s C 1 ad C 2 as defied i Defiitio 4 to trasmit the messages at ecoders 1 ad 2. Let the rate of C j, j {1, 2} be r j ad let the ier code have rate r i. If we assume that the codig scheme exists which achieves the rate-triple, the by the proof of Lemma 2, oe should be able to recover X 1, X 2 from X 1 X 2 N 2 N 3 with small error probability. Also, at decoder 3, the decoder ca recostruct X 3 with low error probability ad by subtractio it ca have 2X 1 X 2 N 3. Note that i the liear codig scheme, both 2X 1 X 2 ad X 1 X 2 come from radomly ad uiformly geerated liear codes of rate r 1 + r 2 r i. So, give that X 1 ad X 2 ca be recovered from X 1 X 2 N 2 N 3, decoder 3 must be able to recover X 1 ad X 2 from 2X 1 X 2 N 3. The similar to the proof of Lemma 1, by the poit-to-poit chael codig coverse, we must have R 1 + R 2 + R 3 < log q H(N 3 ). The argumets i the proof of the previous lemma suggest that NLC s lack the ecessary flexibility whe it comes to determiig the size of differet liear combiatios of such codes. We explai this i more detail. Cosider two NLC s, C ad C, with rates r o ad r o, respectively, ad with ier code rate r i. The rate of ay liear combiatio of the two, αc βc, α, β F q \{0}, is equal to r o + r o r i. Whereas i settigs such as the oe at had, it is desirable to have differet rates for differet values of α ad β. I this setup, decoder 2 requires C 1 C 2 to be large (sice by Lemma 2 i order to icrease R 2 it eeds to icrease the rate of this liear combiatio) ad decoder 3 wats the size of the iterferig codebook 2C 1 C 2 to be small, so that it ca decode the iterferece. I the ext sectio, we provide a ew class of codes. The ew costructio allows for differet rates for differet liear combiatios of such codes. This i tur results i higher achievable sum-rates. IV. A New Class of Code Costructios I this sectio, we preset our ew codig costructios. These ew codes are called Quasi Liear Codes (QLC). They are ot liearly closed but maitai a degree of liearity. I order to costruct a QLC, we first costruct a liear code. The, we take a subset of that codebook to trasmit the messages. More precisely, QLC s are defied as follows: Defiitio 5. A (k, ) QLC o the field F q, is characterized by a geerator matrix G k, a dither b ad a set U. The codebook is defied as C {ug b u U}. For ijective G o U, the rate of the code is give by R = 1 log C = 1 log U. I this paper we oly cosider the cases whe U is a cartesia product of typical sets: C { u i G i b u i A k i ɛ (U i )}. i [1,m] A pair of Nested Quasi Liear Codes (NQLC) is defied below: Defiitio 6. For atural umbers k 1, k 2,, k m, let G ki, i [1, m] be matrices, ad b, b dithers all defied o F q. Also, let (U 1, U 2,, U m ) ad (U 1, U 2,, U m) be a pair of radom vectors o F q. The pair of QLC s characterized by the matrices G ki, i [1, m] ad each of the two dithers ad vectors of radom variables are called a pair of NQLC s. As explaied i the previous sectio, our motivatio for defiig NQLC s, is to costruct codes such that differet liear combiatios of those codes have differet rates. The ext lemma shows that NQLC s have this property. Lemma 4. Let C ad C be two QLC s as defied i Defiitio 6, whose geerator matrices ad dithers are take radomly ad uiformly from F q. The, αc 1 βc 2 has rate close to i [1,m] k i H(αU i βu i ) for large with high probability. Proof: The proof follows from the ijectiveess of the G i s ad the usual typicality argumets ad is omitted. Havig defied QLC s, we retur to our iterferece chael setup i Example 2. We claim that NQLC s ca achieve a sum-rate R 2 + R 3 which is higher tha H(N 1 N 2 N 3 ) H(N 3 ). Lemma 5. There exists achievable rate-triples (R 1, R 2, R 3 ) = (log q H(N 1 N 2 N 3 ), r 2, r 3 ) such that r 2 + r 3 > H(N 1 N 2 N 3 ) H(N 3 ). Proof: Refer to Appedix B. So far we have proved that NQLC s outperform NLC s i this specific example. It is straightforward to show that NQLC s are a geeralizatio of NLC s. To see this, cosider a arbitrary pair of NLC s with the parameters as i defiitio 4. These
5 two codes are a pair of NQLC s with parameters m = 3, U 1, U 2 ad U 1, U 3 uiform, U 3 ad U 2 costats ad k 1 = k 1 = k i ad k 2 = k o k i, k 3 = k o k i. So, ay rate regio achievable by NLC s is also achievable usig NQLC s. V. New Achievable Rate Regio I this sectio, we provide a geeral achievable rate regio for the three user IC. The scheme is similar to the oe preseted i [9] (Theorem 2). The mai differece is that here istead of NLC s we use NQLC s. The radom variables ivolved i the codig scheme are depicted i Figure 4. Note that i cotrast with the scheme i [9], decoder 2 recostructs a liear combiatio of U 1 ad U 2. By settig α 2 = 0, β 2 = 1, we recover the radom variables i [9]. The ext theorem provides the achievable rate regio. X1, U1 X1, U1 X2, U2 P (Y1, Y2, Y3 X1, X2, X3) X2, α2u1 + β2u2 X3 X3, α3u1 + β3u2 Fig. 4. The LHS radom variables are the oes set by each ecoder, the RHS radom variables are the oes decoded at each decoder. Defiitio 7. For a give three user IC problem with q-ary iputs ad outputs, defie the set R 3-IC as the set of rate triples (R 1, R 2, R 3 ) such that there exist 1) a joit probability distributio P U1,X 1 P U2,X 3 P X3, 2) A vector of positive reals (K 1, K 2, L 1, L 2, T 1, T 2 ), ad 3) a vector of parameters (m,, k 1, k 2,, k m ) ad pair of vectors of radom variables (V i j ) j [1,m], i {1, 2}, such that the followig iequalities are satisfied:,where r α,β i [1,m] k i H(αV 1 βv 2 ), α, β F q. R 1 = L 1 + T 1, R 2 = L 2 + I(U 2; α 2 U 1 α 2 U 2 ) T 2 H(U 2 ) (2) r 1,0 T 1 log q H(U 1 ), r 0,1 T 2 log q H(U 2 ), (3) K 1 + r 1,0 T 1 log q + H(X 1 ) H(X 1, U 1 ) (4) K 2 + r 0,1 T 2 log q + H(X 2 ) H(X 2, U 2 ) (5) r 0,1 log q H(U 1 X 1, Y 1 ) (6) r 0,1 + L 1 + K 1 log q + H(X 1 ) H(U 1, X 1 Y 1 ) (7) L 1 + K 1 I(X 1 ; U 1 Y 1 ) (8) r α2,β 2 log q H(α 2 U 1 β 2 X 2, Y 2 ) (9) r α2,β 2 + L 2 + K 2 log q+h(x 2 ) H(α 2 U 1 β 2 U 2, X 2 Y 2 ) (10) L 2 + K 2 I(X 2 ; U 2 Y 2 ) (11) r α3,β 3 + L 3 + K 3 log q+h(x 3 ) H(α 3 U 1 β 3 U 2, X 3 Y 3 ) (12) R 3 I(X 3 ; Y 3, α 3 U 1 β 3 U 2 ) (13) Theorem 1. A rate triple (R 1, R 2, R 3 ) is achievable if it belogs to cl(r 3-IC ). Proof: We provide a outlie of the proof. The codig scheme is similar to the oe i [9]. Except that 1) decoder 2 also decodes a liear combiatio α 2 U 1 + β 2 U 2, 2) The uderlyig codes for U 1 ad U 2 are QNLC s istead of ested coset codes, ad 2) There is a outer code o U 2 which allows decoder 2 to decode U 2 from α 2 U 1 + β 2 U 2. As a result the rate regio is similar to the oe i [9] except for a few chages. Bouds (3)-(5) esure the existece of joitly typical codewords at each ecoder. These bouds are the same with the oes i [9]. Bouds (6)-(8) esure errorless decodig at decoder 1, they also remai the same. Iequalities (9)-(11) correspod to the error evets at decoder 2, these bouds are altered to esure recostructio of α 2 U 1 + β 2 U 2, also the rate R 2 is chaged ad the liear codig rate T 2 is multiplied by I(U 2;α 2 U 1 α 2 U 2 ) H(U 2 ), which is due to the outer code. Lastly, (12)-(13) are for the error evets at decoder 3, which is also similar to the oes i [9]. Remark 1. For ease of otatio, we have dropped the time-sharig radom variable Q. The scheme ca be ehaced by addig the variable i the stadard way. Remark 2. By takig α 2 = 0 ad β 2 = 1 ad choosig the NQLC parameters so that the codes become a pair of NLC s we recover the boud i [9] as expected.
6 Remark 3. Followig the geeralizatios i [9], this codig scheme ca be ehaced by addig additioal layers cotaiig the public message codebooks correspodig to the HK strategy. VI. Coclusio The problem of three user IC was cosidered. We showed that there is a iheret tradeoff i the geeral IC. The users ca choose to commuicate their messages by usig optimal PtP strategies or cooperate with other users to facilitate their commuicatio. It was show that the previously used codig structures are uable to optimize this tradeoff. New codig structures were proposed. It was show through a example that these ew structures give strict improvemets. Usig these ew codebooks, a achievable regio for the three user IC was derived which improves upo the previous kow ier bouds for this problem. Appedix A Proof of Lemma 1 Assume the family (, M 1, M 2, M 3, e, d), N achieves the rate-triple. Let M i, i {1, 2, 3} be uiform radom variables defied o sets M i. I the first step, we argue that the size of the set C 1 C 2 C 3 A ɛ (N 3 ) is close to C 1 C 2 A ɛ (N 3 ) C 3. More precisely, we prove the followig claim: Claim 1. For every ɛ R +, there exists a sequece of umbers α,ɛ R +, N such that the followig iequality holds: ad α,ɛ goes to 0 as ad ɛ 0. 1 log C 1 C 2 C 3 A ɛ (N 3 ) 1 log ( C 1 C 2 A ɛ (N 3 ) C 3 ) α,ɛ, Proof: Ituitively, if the size of C 1 C 2 C 3 A ɛ (N 3 ) is much smaller tha C 1 C 2 A ɛ (N 3 ) C 3, that meas there exists a large umber of sets of vectors c 1, c 2, c 3, 3, with differet c 3 s for which the sum is equal. This causes a large error probability i decoder 3 sice the decoder is uable to distiguish betwee these sets of vectors. More precisely, let t be a type o vectors i A ɛ (N 3 ), ad let c 3 C 3, defie B c3, t as follows, B c3, t = {c 1 c 2 3 c 1, c 2, c 3, 3 C 1 C 2 C 3 P t, such that c 1 c 2 c 3 3 = c 1 c 2 c 3 3, c 3 c 3}, where P t is the set of all vectors 3 A ɛ (N 3 ) with type t. That is B c3, t is the set of (c 1, c 2, 3 ) s for which the decoder has o-zero error probability for decodig c 3 or aother codeword c 3. From set theory, we have the followig: C 1 C 2 C 3 A ɛ (N 3 ) C 1 C 2 C 3 P t (14) = C 1 C 2 c 3 P t (15) c 3 C 1 C 2 c 3 P t C 1 C 2 c 3 P t (16) c 3 c 3 c 3 = C 1 C 2 c 3 P t C 1 C 2 c 3 P t (17) c 3 c 3 c 3 = ( C 1 C 2 P t B c3, t ) (18) c 3 C 3 = C 1 C 2 P t C 3 B c3, t (19) c 3 C 3 B = C 1 C 2 P t C 3 C 3 c3,t (20) C c 3 C 3 3 = ( C 1 C 2 P t E( B c3, t ) ) C 3 (21) ( ) E( B c3, = C 1 C 2 P t (1 t ) C 1 C 2 P t ) C 3. (22) O the other had, as, the error probability at decoder 3 goes to 0. This meas that P (d 3 (c 1 c 2 e(m 3 ) 3 ) M 3 ) goes to 0. Cosequetly, there exists a family of types type t such that P (d 3 (c 1 c 2 e(m 3 ) 3 ) M 3 t ) goes to 0. There
7 exists a sequece δ which approaches 0 at the limit such that: δ P (d 3 (c 1 c 2 e(m 3 ) 3 ) M 3 t ) 1 2 P ( ) c 1 c 2 3 B e(m3 ), t t 1 B c3,t 2 C c 3 C 3 C 1 C 2 P t 3 = 1 E( B e3 (M 3 ), t ) 2 C 1 C 2 P t Isertig this last iequality i (22) we have, C 1 C 2 P t C 3 B c3 c 3 C 3 ( C 1 C 2 P t (1 2δ )) C 3 Observe that P t ad A ɛ (N 3 ) have the same expoetial rate. Note that C 1 C 2 A ɛ (N 3 ) C 1 A ɛ (N 3 ) ad sice decoder 1 ca decode X 1 with probability of error approachig 0, we ca use the same argumet to show the followig: 1 log C 1 A ɛ (N 3 ) 1 log C 1 A ɛ (N 3 ) log q H(N 1 ) H(N 3 ) 1 log C 1 C 2 C 3 A ɛ (N 3 ) (23) ( log q H(N1 ) + H(N 3 ) ) + (H(N 1 ) H(N 3 )) = log q. 1 But we kow that log C 1 C 2 C 3 A ɛ (N 3 ) log q. So, we should have equality at all of the iequalities. Hece, 1 log q C 1 C 2 A ɛ (N 3 ) 1 log q C 1 A ɛ (N 3 ). I order to have C 1 C 2 close to C 1, we must have the properties stated i the lemma. Appedix B Proof of Lemma 5 We provide a codig scheme based o NQLC s which achieves the rate vector. Cosider two terary radom variables V 1 ad V 2 such that H(V 1 V 2 ) > H(2V 1 V 2 ). We will show the achievability of the followig rate-triple: R 1 = log q H(N 1 N 2 N 3 ) R 2 = ( H(V 1 V 2 ) 1)(log q H(N 1 N 2 N 3 )) H(V 1 ) R 3 = log q H(N 3 ) H(2V 1 V 2 ) ( log q H(N1 N 2 N 3 ) ). H(V 1 ) Note that i this case R 2 + R 3 = H(N 1 N 2 N 3 ) H(N 3 ) + (H(V 1 V 2 ) H(2V 1 V 2 )) ( H(V 1 ) log q H(N1 N 2 N 3 ) ). Choose radom variable V 3 such that R 3 = H(V 3 N 3 ) H(N 3 ). Codebook Geeratio: Costruct a family of pairs NQLC s with legth ad parameters m = 1, k 1 = (log q H(N 1 N 2 N 3 )) H(V 1 ), U 1 = V 1, ad U 1 = V 2 by choosig the dither b ad geerator matrix G 1 radomly ad uiformly o F q. For a fixed N, Let C 1 ad C 2 be the correspodig pair of NQLC s. Let Φ i = 2 R i for i {1, 2}. Choose Φ i of the codewords i C i radomly ad uiformly, ad idex these sequeces usig the idices [1, Φ i ]. Also, geerate a ustructured codebook C 3 radomly ad uiformly with rate R 3 based o the sigle-letter distributio P V3. Idex C 3 by [1, 2 R 3 ]. Ecodig: Upo receivig message idex M i ecoder i seds the sequece i C 1 which is idexed M i for i {1, 2}. Let the codewords set by ecoder i, i {1, 2} be deoted by v i G 1 b i. Ecoder 3 seds the codeword i C 3 idexed by M 3. Let the codeword set by the third decoder be deoted by c 3. Decodig: Decoder 1 receives X1 N 1 N 2 N 3. Usig typicality decodig, the decoder ca decode the message as log as k 1 H(V 1 ) log q H(N 1 N 2 N 3 ). Decoder 2 receives X1 X 2 N 2 N 3 = (v 1 v 2 )G 1 b 1 b 2 N2 N 3. It ca decode v 1, v 2 joitly as log as 1) k 1 H(V 1 V 2 ) < log q H(N 1 N 3 ), ad 2) R 1 + R 2 k 1 H(V 1 V 2 ). The first coditio esures that v 1 v 2 ca be recovered with probability of error goig to 0 as. After recoverig v 1 v 2, the decoder eeds to joitly decode v 1, v 2 (for reasos explaied i Lemma 2). This is a oiseless additive MAC problem ad coditio 2 esures errorless decodig. Note that i coditio 2, the coefficiet k 1 is preset sice v 1 is of legth k 1. Also, The term H(V 1 V 2 ) is the capacity of the MAC chael. Decoder 3 receives X1 X 2 X 3 N 3 = (2v 1 v 2 )G 1 b 1 b 2 c 3 N 3. The decoder
8 ca recover 2v 1 v 2 as log as k 1 H(2V 1 V 2 ) < log q H(X 3 N 3 ). The, the decoder subtracts 2X 1 X 2 to get X 3 N 3. It ca decode X 3 as log as R 3 H(V 3 N 3 ) H(N 3 ). It is straightforward to check the rate give at the begiig satisfy all of these bouds. Refereces [1] H. Sato, "The capacity of the Gaussia iterferece chael uder strog iterferece," IEEE Tras. If. Theory, vol. 27, o. 6, pp , Nov [2] M. H. M. Costa, ad A. El Gamal, "The capacity regio of the discrete memoryless iterferece chael with strog iterferece," IEEE Tras. If. Theory, vol. 33, o. 5, pp , [3] T. S. Ha, ad K. Kobayashi, "A ew achievable rate regio for the iterferece chael," IEEE Tras. If. Theory, vol. 27, o. 1, pp , [4] C. Nair, K. Xia, ad M. Yazdapaah, "Sub-optimality of the Ha Kobayashi Achievable Regio for Iterferece Chaels", arxiv preprit arxiv: , 2015 [5] M. Maddah-Ali, A. Motahari, ad A. Khadai, "Commuicatio over MIMO X chaels: Iterferece aligmet, decompositio, ad performace aalysis," Iformatio Theory, IEEE Trasactios o, vol. 54, o. 8, pp , Aug [6] V. Cadambe, ad S. Jafar, "Iterferece aligmet ad degrees of freedom of the k -user iterferece chael," IEEE Tras. o Ifo. Th., vol. 54, o. 8, pp , [7] J. Korer, K. Marto, How to ecode the modulo-two sum of biary sources, IEEE Trasactios o Iformatio Theory, vol. 25, o. 2, pp , [8] A. Padakadla, S.S. Pradha, Achievable rate regio for three user discrete broadcast chael based o coset codes, i IEEE Iteratioal Symp. o Iformatio Theory. IEEE, pp.1277,1281, 7-12 July 2013 [9] A. Padakadla, A.G. Sahebi, S.S. Pradha, A ew achievable rate regio for the 3-user discrete memoryless iterferece chael, Proceedigs of IEEE Iteratioal Symposium o Iformatio Theory, July, 2012 [10] F. Shirai, S.S. Pradha, "A Achievable Rate-Distortio Regio for Multiple Descriptios Source Codig Based o Coset Codes," arxiv: , 2016
Finite Block-Length Gains in Distributed Source Coding
Decoder Fiite Block-Legth Gais i Distributed Source Codig Farhad Shirai EECS Departmet Uiversity of Michiga A Arbor,USA Email: fshirai@umichedu S Sadeep Pradha EECS Departmet Uiversity of Michiga A Arbor,USA
More informationLecture 11: Channel Coding Theorem: Converse Part
EE376A/STATS376A Iformatio Theory Lecture - 02/3/208 Lecture : Chael Codig Theorem: Coverse Part Lecturer: Tsachy Weissma Scribe: Erdem Bıyık I this lecture, we will cotiue our discussio o chael codig
More informationThe Maximum-Likelihood Decoding Performance of Error-Correcting Codes
The Maximum-Lielihood Decodig Performace of Error-Correctig Codes Hery D. Pfister ECE Departmet Texas A&M Uiversity August 27th, 2007 (rev. 0) November 2st, 203 (rev. ) Performace of Codes. Notatio X,
More informationLecture 7: Channel coding theorem for discrete-time continuous memoryless channel
Lecture 7: Chael codig theorem for discrete-time cotiuous memoryless chael Lectured by Dr. Saif K. Mohammed Scribed by Mirsad Čirkić Iformatio Theory for Wireless Commuicatio ITWC Sprig 202 Let us first
More informationSymmetric Two-User Gaussian Interference Channel with Common Messages
Symmetric Two-User Gaussia Iterferece Chael with Commo Messages Qua Geg CSL ad Dept. of ECE UIUC, IL 680 Email: geg5@illiois.edu Tie Liu Dept. of Electrical ad Computer Egieerig Texas A&M Uiversity, TX
More informationOptimally Sparse SVMs
A. Proof of Lemma 3. We here prove a lower boud o the umber of support vectors to achieve geeralizatio bouds of the form which we cosider. Importatly, this result holds ot oly for liear classifiers, but
More informationAsymptotic Coupling and Its Applications in Information Theory
Asymptotic Couplig ad Its Applicatios i Iformatio Theory Vicet Y. F. Ta Joit Work with Lei Yu Departmet of Electrical ad Computer Egieerig, Departmet of Mathematics, Natioal Uiversity of Sigapore IMS-APRM
More informationCooperative Communication Fundamentals & Coding Techniques
3 th ICACT Tutorial Cooperative commuicatio fudametals & codig techiques Cooperative Commuicatio Fudametals & Codig Techiques 0..4 Electroics ad Telecommuicatio Research Istitute Kiug Jug 3 th ICACT Tutorial
More informationSUCCESSIVE INTERFERENCE CANCELLATION DECODING FOR THE K -USER CYCLIC INTERFERENCE CHANNEL
Joural of Theoretical ad Applied Iformatio Techology 31 st December 212 Vol 46 No2 25-212 JATIT & LLS All rights reserved ISSN: 1992-8645 wwwatitorg E-ISSN: 1817-3195 SCCESSIVE INTERFERENCE CANCELLATION
More informationAre Slepian-Wolf Rates Necessary for Distributed Parameter Estimation?
Are Slepia-Wolf Rates Necessary for Distributed Parameter Estimatio? Mostafa El Gamal ad Lifeg Lai Departmet of Electrical ad Computer Egieerig Worcester Polytechic Istitute {melgamal, llai}@wpi.edu arxiv:1508.02765v2
More informationA New Achievability Scheme for the Relay Channel
A New Achievability Scheme for the Relay Chael Wei Kag Seur Ulukus Departmet of Electrical ad Computer Egieerig Uiversity of Marylad, College Park, MD 20742 wkag@umd.edu ulukus@umd.edu October 4, 2007
More informationProduct measures, Tonelli s and Fubini s theorems For use in MAT3400/4400, autumn 2014 Nadia S. Larsen. Version of 13 October 2014.
Product measures, Toelli s ad Fubii s theorems For use i MAT3400/4400, autum 2014 Nadia S. Larse Versio of 13 October 2014. 1. Costructio of the product measure The purpose of these otes is to preset the
More informationThe multiplicative structure of finite field and a construction of LRC
IERG6120 Codig for Distributed Storage Systems Lecture 8-06/10/2016 The multiplicative structure of fiite field ad a costructio of LRC Lecturer: Keeth Shum Scribe: Zhouyi Hu Notatios: We use the otatio
More informationarxiv: v1 [cs.it] 13 Jul 2012
O the Sum Capacity of the Discrete Memoryless Iterferece Chael with Oe-Sided Weak Iterferece ad Mixed Iterferece Fagfag Zhu ad Biao Che Syracuse Uiversity Departmet of EECS Syracuse, NY 3244 Email: fazhu{biche}@syr.edu
More informationLecture 27. Capacity of additive Gaussian noise channel and the sphere packing bound
Lecture 7 Ageda for the lecture Gaussia chael with average power costraits Capacity of additive Gaussia oise chael ad the sphere packig boud 7. Additive Gaussia oise chael Up to this poit, we have bee
More informationLecture 14: Graph Entropy
15-859: Iformatio Theory ad Applicatios i TCS Sprig 2013 Lecture 14: Graph Etropy March 19, 2013 Lecturer: Mahdi Cheraghchi Scribe: Euiwoog Lee 1 Recap Bergma s boud o the permaet Shearer s Lemma Number
More informationLecture 15: Strong, Conditional, & Joint Typicality
EE376A/STATS376A Iformatio Theory Lecture 15-02/27/2018 Lecture 15: Strog, Coditioal, & Joit Typicality Lecturer: Tsachy Weissma Scribe: Nimit Sohoi, William McCloskey, Halwest Mohammad I this lecture,
More informationConvergence of random variables. (telegram style notes) P.J.C. Spreij
Covergece of radom variables (telegram style otes).j.c. Spreij this versio: September 6, 2005 Itroductio As we kow, radom variables are by defiitio measurable fuctios o some uderlyig measurable space
More informationUC Berkeley CS 170: Efficient Algorithms and Intractable Problems Handout 17 Lecturer: David Wagner April 3, Notes 17 for CS 170
UC Berkeley CS 170: Efficiet Algorithms ad Itractable Problems Hadout 17 Lecturer: David Wager April 3, 2003 Notes 17 for CS 170 1 The Lempel-Ziv algorithm There is a sese i which the Huffma codig was
More informationChapter 3. Strong convergence. 3.1 Definition of almost sure convergence
Chapter 3 Strog covergece As poited out i the Chapter 2, there are multiple ways to defie the otio of covergece of a sequece of radom variables. That chapter defied covergece i probability, covergece i
More informationMASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.436J/15.085J Fall 2008 Lecture 19 11/17/2008 LAWS OF LARGE NUMBERS II THE STRONG LAW OF LARGE NUMBERS
MASSACHUSTTS INSTITUT OF TCHNOLOGY 6.436J/5.085J Fall 2008 Lecture 9 /7/2008 LAWS OF LARG NUMBRS II Cotets. The strog law of large umbers 2. The Cheroff boud TH STRONG LAW OF LARG NUMBRS While the weak
More informationInformation Theory Tutorial Communication over Channels with memory. Chi Zhang Department of Electrical Engineering University of Notre Dame
Iformatio Theory Tutorial Commuicatio over Chaels with memory Chi Zhag Departmet of Electrical Egieerig Uiversity of Notre Dame Abstract A geeral capacity formula C = sup I(; Y ), which is correct for
More informationOn the Capacity of Symmetric Gaussian Interference Channels with Feedback
O the Capacity of Symmetric Gaussia Iterferece Chaels with Feedback La V Truog Iformatio Techology Specializatio Departmet ITS FPT Uiversity, Haoi, Vietam E-mail: latv@fpteduv Hirosuke Yamamoto Dept of
More informationBeurling Integers: Part 2
Beurlig Itegers: Part 2 Isomorphisms Devi Platt July 11, 2015 1 Prime Factorizatio Sequeces I the last article we itroduced the Beurlig geeralized itegers, which ca be represeted as a sequece of real umbers
More informationIncreasing timing capacity using packet coloring
003 Coferece o Iformatio Scieces ad Systems, The Johs Hopkis Uiversity, March 4, 003 Icreasig timig capacity usig packet colorig Xi Liu ad R Srikat[] Coordiated Sciece Laboratory Uiversity of Illiois e-mail:
More informationInfinite Sequences and Series
Chapter 6 Ifiite Sequeces ad Series 6.1 Ifiite Sequeces 6.1.1 Elemetary Cocepts Simply speakig, a sequece is a ordered list of umbers writte: {a 1, a 2, a 3,...a, a +1,...} where the elemets a i represet
More informationThe Three-Terminal Interactive. Lossy Source Coding Problem
The Three-Termial Iteractive 1 Lossy Source Codig Problem Leoardo Rey Vega, Pablo Piataida ad Alfred O. Hero III arxiv:1502.01359v3 cs.it] 18 Ja 2016 Abstract The three-ode multitermial lossy source codig
More informationA Partial Decode-Forward Scheme For A Network with N relays
A Partial Decode-Forward Scheme For A etwork with relays Yao Tag ECE Departmet, McGill Uiversity Motreal, QC, Caada Email: yaotag2@mailmcgillca Mai Vu ECE Departmet, Tufts Uiversity Medford, MA, USA Email:
More informationMultiterminal source coding with complementary delivery
Iteratioal Symposium o Iformatio Theory ad its Applicatios, ISITA2006 Seoul, Korea, October 29 November 1, 2006 Multitermial source codig with complemetary delivery Akisato Kimura ad Tomohiko Uyematsu
More informationHybrid Coding for Gaussian Broadcast Channels with Gaussian Sources
Hybrid Codig for Gaussia Broadcast Chaels with Gaussia Sources Rajiv Soudararaja Departmet of Electrical & Computer Egieerig Uiversity of Texas at Austi Austi, TX 7871, USA Email: rajivs@mailutexasedu
More informationIntro to Learning Theory
Lecture 1, October 18, 2016 Itro to Learig Theory Ruth Urer 1 Machie Learig ad Learig Theory Comig soo 2 Formal Framework 21 Basic otios I our formal model for machie learig, the istaces to be classified
More informationFrequentist Inference
Frequetist Iferece The topics of the ext three sectios are useful applicatios of the Cetral Limit Theorem. Without kowig aythig about the uderlyig distributio of a sequece of radom variables {X i }, for
More informationThe Likelihood Encoder with Applications to Lossy Compression and Secrecy
The Likelihood Ecoder with Applicatios to Lossy Compressio ad Secrecy Eva C. Sog Paul Cuff H. Vicet Poor Dept. of Electrical Eg., Priceto Uiversity, NJ 8544 {csog, cuff, poor}@priceto.edu Abstract A likelihood
More informationCS284A: Representations and Algorithms in Molecular Biology
CS284A: Represetatios ad Algorithms i Molecular Biology Scribe Notes o Lectures 3 & 4: Motif Discovery via Eumeratio & Motif Represetatio Usig Positio Weight Matrix Joshua Gervi Based o presetatios by
More informationInformation Theory and Coding
Sol. Iformatio Theory ad Codig. The capacity of a bad-limited additive white Gaussia (AWGN) chael is give by C = Wlog 2 ( + σ 2 W ) bits per secod(bps), where W is the chael badwidth, is the average power
More informationSecond-Order Rate of Constant-Composition Codes for the Gel fand-pinsker Channel
Research Collectio Coferece aper Secod-Order Rate of Costat-Compositio Codes for the Gel fad-isker Chael Author(s: Scarlett, Joatha ublicatio Date: 204 ermaet ik: https://doi.org/0.3929/ethz-a-0009456
More informationInequalities for Entropies of Sets of Subsets of Random Variables
Iequalities for Etropies of Sets of Subsets of Radom Variables Chao Tia AT&T Labs-Research Florham Par, NJ 0792, USA. tia@research.att.com Abstract Ha s iequality o the etropy rates of subsets of radom
More informationAxioms of Measure Theory
MATH 532 Axioms of Measure Theory Dr. Neal, WKU I. The Space Throughout the course, we shall let X deote a geeric o-empty set. I geeral, we shall ot assume that ay algebraic structure exists o X so that
More informationReport on Private Information Retrieval over Unsynchronized Databases
Report o Private Iformatio Retrieval over Usychroized Databases Lembit Valgma Supervised by Vitaly Skachek May 25, 217 1 Problem Statemet There are may challeges cocerig olie privacy. Private iformatio
More informationLecture 19: Convergence
Lecture 19: Covergece Asymptotic approach I statistical aalysis or iferece, a key to the success of fidig a good procedure is beig able to fid some momets ad/or distributios of various statistics. I may
More informationRandom Walks on Discrete and Continuous Circles. by Jeffrey S. Rosenthal School of Mathematics, University of Minnesota, Minneapolis, MN, U.S.A.
Radom Walks o Discrete ad Cotiuous Circles by Jeffrey S. Rosethal School of Mathematics, Uiversity of Miesota, Mieapolis, MN, U.S.A. 55455 (Appeared i Joural of Applied Probability 30 (1993), 780 789.)
More informationUniversal source coding for complementary delivery
SITA2006 i Hakodate 2005.2. p. Uiversal source codig for complemetary delivery Akisato Kimura, 2, Tomohiko Uyematsu 2, Shigeaki Kuzuoka 2 Media Iformatio Laboratory, NTT Commuicatio Sciece Laboratories,
More informationOn Evaluating the Rate-Distortion Function of Sources with Feed-Forward and the Capacity of Channels with Feedback.
O Evaluatig the Rate-Distortio Fuctio of Sources with Feed-Forward ad the Capacity of Chaels with Feedback. Ramji Vekataramaa ad S. Sadeep Pradha Departmet of EECS, Uiversity of Michiga, A Arbor, MI 4805
More informationMultiterminal Source Coding with an Entropy-Based Distortion Measure
20 IEEE Iteratioal Symposium o Iformatio Theory Proceedigs Multitermial Source Codig with a Etropy-Based Distortio Measure Thomas A. Courtade ad Richard D. Wesel Departmet of Electrical Egieerig Uiversity
More informationLecture 3: August 31
36-705: Itermediate Statistics Fall 018 Lecturer: Siva Balakrisha Lecture 3: August 31 This lecture will be mostly a summary of other useful expoetial tail bouds We will ot prove ay of these i lecture,
More informationVector Permutation Code Design Algorithm. Danilo SILVA and Weiler A. FINAMORE
Iteratioal Symposium o Iformatio Theory ad its Applicatios, ISITA2004 Parma, Italy, October 10 13, 2004 Vector Permutatio Code Desig Algorithm Dailo SILVA ad Weiler A. FINAMORE Cetro de Estudos em Telecomuicações
More informationRiesz-Fischer Sequences and Lower Frame Bounds
Zeitschrift für Aalysis ud ihre Aweduge Joural for Aalysis ad its Applicatios Volume 1 (00), No., 305 314 Riesz-Fischer Sequeces ad Lower Frame Bouds P. Casazza, O. Christese, S. Li ad A. Lider Abstract.
More informationApplication to Random Graphs
A Applicatio to Radom Graphs Brachig processes have a umber of iterestig ad importat applicatios. We shall cosider oe of the most famous of them, the Erdős-Réyi radom graph theory. 1 Defiitio A.1. Let
More informationRademacher Complexity
EECS 598: Statistical Learig Theory, Witer 204 Topic 0 Rademacher Complexity Lecturer: Clayto Scott Scribe: Ya Deg, Kevi Moo Disclaimer: These otes have ot bee subjected to the usual scrutiy reserved for
More informationOn Random Line Segments in the Unit Square
O Radom Lie Segmets i the Uit Square Thomas A. Courtade Departmet of Electrical Egieerig Uiversity of Califoria Los Ageles, Califoria 90095 Email: tacourta@ee.ucla.edu I. INTRODUCTION Let Q = [0, 1] [0,
More information1 Review and Overview
DRAFT a fial versio will be posted shortly CS229T/STATS231: Statistical Learig Theory Lecturer: Tegyu Ma Lecture #3 Scribe: Migda Qiao October 1, 2013 1 Review ad Overview I the first half of this course,
More informationEntropies & Information Theory
Etropies & Iformatio Theory LECTURE I Nilajaa Datta Uiversity of Cambridge,U.K. For more details: see lecture otes (Lecture 1- Lecture 5) o http://www.qi.damtp.cam.ac.uk/ode/223 Quatum Iformatio Theory
More informationEECS564 Estimation, Filtering, and Detection Hwk 2 Solns. Winter p θ (z) = (2θz + 1 θ), 0 z 1
EECS564 Estimatio, Filterig, ad Detectio Hwk 2 Sols. Witer 25 4. Let Z be a sigle observatio havig desity fuctio where. p (z) = (2z + ), z (a) Assumig that is a oradom parameter, fid ad plot the maximum
More informationLecture 3 The Lebesgue Integral
Lecture 3: The Lebesgue Itegral 1 of 14 Course: Theory of Probability I Term: Fall 2013 Istructor: Gorda Zitkovic Lecture 3 The Lebesgue Itegral The costructio of the itegral Uless expressly specified
More informationA Hybrid Random-Structured Coding Scheme for the Gaussian Two-Terminal Source Coding Problem Under a Covariance Matrix Distortion Constraint
A Hybrid Radom-Structured Codig Scheme for the Gaussia Two-Termial Source Codig Problem Uder a Covariace Matrix Distortio Costrait Yag Yag ad Zixiag Xiog Dept of Electrical ad Computer Egieerig Texas A&M
More informationDefinition 4.2. (a) A sequence {x n } in a Banach space X is a basis for X if. unique scalars a n (x) such that x = n. a n (x) x n. (4.
4. BASES I BAACH SPACES 39 4. BASES I BAACH SPACES Sice a Baach space X is a vector space, it must possess a Hamel, or vector space, basis, i.e., a subset {x γ } γ Γ whose fiite liear spa is all of X ad
More informationLecture 1: Basic problems of coding theory
Lecture 1: Basic problems of codig theory Error-Correctig Codes (Sprig 016) Rutgers Uiversity Swastik Kopparty Scribes: Abhishek Bhrushudi & Aditya Potukuchi Admiistrivia was discussed at the begiig of
More informationSequences A sequence of numbers is a function whose domain is the positive integers. We can see that the sequence
Sequeces A sequece of umbers is a fuctio whose domai is the positive itegers. We ca see that the sequece 1, 1, 2, 2, 3, 3,... is a fuctio from the positive itegers whe we write the first sequece elemet
More informationEntropy and Ergodic Theory Lecture 5: Joint typicality and conditional AEP
Etropy ad Ergodic Theory Lecture 5: Joit typicality ad coditioal AEP 1 Notatio: from RVs back to distributios Let (Ω, F, P) be a probability space, ad let X ad Y be A- ad B-valued discrete RVs, respectively.
More information6.3 Testing Series With Positive Terms
6.3. TESTING SERIES WITH POSITIVE TERMS 307 6.3 Testig Series With Positive Terms 6.3. Review of what is kow up to ow I theory, testig a series a i for covergece amouts to fidig the i= sequece of partial
More informationInseparability of the Multiple Access Wiretap Channel
Iseparability of the Multiple Access Wiretap Chael Jiawei Xie Seur Ulukus Departmet of Electrical ad Computer Egieerig Uiversity of Marylad, College Park, MD 074 xiejw@umd.edu ulukus@umd.edu Abstract We
More informationMachine Learning Theory Tübingen University, WS 2016/2017 Lecture 12
Machie Learig Theory Tübige Uiversity, WS 06/07 Lecture Tolstikhi Ilya Abstract I this lecture we derive risk bouds for kerel methods. We will start by showig that Soft Margi kerel SVM correspods to miimizig
More informationLecture 6 Simple alternatives and the Neyman-Pearson lemma
STATS 00: Itroductio to Statistical Iferece Autum 06 Lecture 6 Simple alteratives ad the Neyma-Pearso lemma Last lecture, we discussed a umber of ways to costruct test statistics for testig a simple ull
More informationNon-Asymptotic Achievable Rates for Gaussian Energy-Harvesting Channels: Best-Effort and Save-and-Transmit
08 IEEE Iteratioal Symposium o Iformatio Theory ISIT No-Asymptotic Achievable Rates for Gaussia Eergy-Harvestig Chaels: Best-Effort ad Save-ad-Trasmit Silas L Fog Departmet of Electrical ad Computer Egieerig
More informationAn Introduction to Randomized Algorithms
A Itroductio to Radomized Algorithms The focus of this lecture is to study a radomized algorithm for quick sort, aalyze it usig probabilistic recurrece relatios, ad also provide more geeral tools for aalysis
More informationRandomized Algorithms I, Spring 2018, Department of Computer Science, University of Helsinki Homework 1: Solutions (Discussed January 25, 2018)
Radomized Algorithms I, Sprig 08, Departmet of Computer Sciece, Uiversity of Helsiki Homework : Solutios Discussed Jauary 5, 08). Exercise.: Cosider the followig balls-ad-bi game. We start with oe black
More informationLecture 2. The Lovász Local Lemma
Staford Uiversity Sprig 208 Math 233A: No-costructive methods i combiatorics Istructor: Ja Vodrák Lecture date: Jauary 0, 208 Origial scribe: Apoorva Khare Lecture 2. The Lovász Local Lemma 2. Itroductio
More informationNon-Asymptotic Achievable Rates for Gaussian Energy-Harvesting Channels: Best-Effort and Save-and-Transmit
No-Asymptotic Achievable Rates for Gaussia Eergy-Harvestig Chaels: Best-Effort ad Save-ad-Trasmit Silas L. Fog, Jig Yag, ad Ayli Yeer arxiv:805.089v [cs.it] 30 May 08 Abstract A additive white Gaussia
More informationVector Quantization: a Limiting Case of EM
. Itroductio & defiitios Assume that you are give a data set X = { x j }, j { 2,,, }, of d -dimesioal vectors. The vector quatizatio (VQ) problem requires that we fid a set of prototype vectors Z = { z
More information4.1 Sigma Notation and Riemann Sums
0 the itegral. Sigma Notatio ad Riema Sums Oe strategy for calculatig the area of a regio is to cut the regio ito simple shapes, calculate the area of each simple shape, ad the add these smaller areas
More informationBasics of Probability Theory (for Theory of Computation courses)
Basics of Probability Theory (for Theory of Computatio courses) Oded Goldreich Departmet of Computer Sciece Weizma Istitute of Sciece Rehovot, Israel. oded.goldreich@weizma.ac.il November 24, 2008 Preface.
More informationConfidence interval for the two-parameter exponentiated Gumbel distribution based on record values
Iteratioal Joural of Applied Operatioal Research Vol. 4 No. 1 pp. 61-68 Witer 2014 Joural homepage: www.ijorlu.ir Cofidece iterval for the two-parameter expoetiated Gumbel distributio based o record values
More informationShannon s noiseless coding theorem
18.310 lecture otes May 4, 2015 Shao s oiseless codig theorem Lecturer: Michel Goemas I these otes we discuss Shao s oiseless codig theorem, which is oe of the foudig results of the field of iformatio
More informationPolynomial identity testing and global minimum cut
CHAPTER 6 Polyomial idetity testig ad global miimum cut I this lecture we will cosider two further problems that ca be solved usig probabilistic algorithms. I the first half, we will cosider the problem
More informationDisjoint Systems. Abstract
Disjoit Systems Noga Alo ad Bey Sudaov Departmet of Mathematics Raymod ad Beverly Sacler Faculty of Exact Scieces Tel Aviv Uiversity, Tel Aviv, Israel Abstract A disjoit system of type (,,, ) is a collectio
More informationChapter IV Integration Theory
Chapter IV Itegratio Theory Lectures 32-33 1. Costructio of the itegral I this sectio we costruct the abstract itegral. As a matter of termiology, we defie a measure space as beig a triple (, A, µ), where
More informationChapter 6 Infinite Series
Chapter 6 Ifiite Series I the previous chapter we cosidered itegrals which were improper i the sese that the iterval of itegratio was ubouded. I this chapter we are goig to discuss a topic which is somewhat
More informationCapacity Theorems for the Finite-State Broadcast Channel with Feedback
Capacity Theorems for the Fiite-State Broadcast Chael with Feedback Ro abora ad Adrea Goldsmith ept of Electrical Egieerig, Staford Uiversity Abstract We cosider the discrete, time-varyig broadcast chael
More informationDistortion Bounds for Source Broadcast. Problem
Distortio Bouds for Source Broadcast 1 Problem Lei Yu, Houqiag Li, Seior Member, IEEE, ad Weipig Li, Fellow, IEEE Abstract This paper ivestigates the joit source-chael codig problem of sedig a memoryless
More informationCEE 522 Autumn Uncertainty Concepts for Geotechnical Engineering
CEE 5 Autum 005 Ucertaity Cocepts for Geotechical Egieerig Basic Termiology Set A set is a collectio of (mutually exclusive) objects or evets. The sample space is the (collectively exhaustive) collectio
More informationMachine Learning Theory Tübingen University, WS 2016/2017 Lecture 3
Machie Learig Theory Tübige Uiversity, WS 06/07 Lecture 3 Tolstikhi Ilya Abstract I this lecture we will prove the VC-boud, which provides a high-probability excess risk boud for the ERM algorithm whe
More informationMath 61CM - Solutions to homework 3
Math 6CM - Solutios to homework 3 Cédric De Groote October 2 th, 208 Problem : Let F be a field, m 0 a fixed oegative iteger ad let V = {a 0 + a x + + a m x m a 0,, a m F} be the vector space cosistig
More informationModule 5 EMBEDDED WAVELET CODING. Version 2 ECE IIT, Kharagpur
Module 5 EMBEDDED WAVELET CODING Versio ECE IIT, Kharagpur Lesso 4 SPIHT algorithm Versio ECE IIT, Kharagpur Istructioal Objectives At the ed of this lesso, the studets should be able to:. State the limitatios
More informationOPTIMAL ALGORITHMS -- SUPPLEMENTAL NOTES
OPTIMAL ALGORITHMS -- SUPPLEMENTAL NOTES Peter M. Maurer Why Hashig is θ(). As i biary search, hashig assumes that keys are stored i a array which is idexed by a iteger. However, hashig attempts to bypass
More informationBinary codes from graphs on triples and permutation decoding
Biary codes from graphs o triples ad permutatio decodig J. D. Key Departmet of Mathematical Scieces Clemso Uiversity Clemso SC 29634 U.S.A. J. Moori ad B. G. Rodrigues School of Mathematics Statistics
More informationarxiv: v1 [math.nt] 10 Dec 2014
A DIGITAL BINOMIAL THEOREM HIEU D. NGUYEN arxiv:42.38v [math.nt] 0 Dec 204 Abstract. We preset a triagle of coectios betwee the Sierpisi triagle, the sum-of-digits fuctio, ad the Biomial Theorem via a
More informationFilter banks. Separately, the lowpass and highpass filters are not invertible. removes the highest frequency 1/ 2and
Filter bas Separately, the lowpass ad highpass filters are ot ivertible T removes the highest frequecy / ad removes the lowest frequecy Together these filters separate the sigal ito low-frequecy ad high-frequecy
More informationHashing and Amortization
Lecture Hashig ad Amortizatio Supplemetal readig i CLRS: Chapter ; Chapter 7 itro; Sectio 7.. Arrays ad Hashig Arrays are very useful. The items i a array are statically addressed, so that isertig, deletig,
More informationDiscrete-Time Systems, LTI Systems, and Discrete-Time Convolution
EEL5: Discrete-Time Sigals ad Systems. Itroductio I this set of otes, we begi our mathematical treatmet of discrete-time s. As show i Figure, a discrete-time operates or trasforms some iput sequece x [
More informationLecture 11: Pseudorandom functions
COM S 6830 Cryptography Oct 1, 2009 Istructor: Rafael Pass 1 Recap Lecture 11: Pseudoradom fuctios Scribe: Stefao Ermo Defiitio 1 (Ge, Ec, Dec) is a sigle message secure ecryptio scheme if for all uppt
More information1. By using truth tables prove that, for all statements P and Q, the statement
Author: Satiago Salazar Problems I: Mathematical Statemets ad Proofs. By usig truth tables prove that, for all statemets P ad Q, the statemet P Q ad its cotrapositive ot Q (ot P) are equivalet. I example.2.3
More informationRegression with quadratic loss
Regressio with quadratic loss Maxim Ragisky October 13, 2015 Regressio with quadratic loss is aother basic problem studied i statistical learig theory. We have a radom couple Z = X,Y, where, as before,
More informationConsider the n-dimensional additive white Gaussian noise (AWGN) channel
8. Lattice codes (by O. Ordetlich) Cosider the -dimesioal additive white Gaussia oise (AWGN) chael Y = X + Z where Z N (0, I ) is statistically idepedet of the iput X. Our goal is to commuicate reliably
More informationInformation-based Feature Selection
Iformatio-based Feature Selectio Farza Faria, Abbas Kazeroui, Afshi Babveyh Email: {faria,abbask,afshib}@staford.edu 1 Itroductio Feature selectio is a topic of great iterest i applicatios dealig with
More informationA statistical method to determine sample size to estimate characteristic value of soil parameters
A statistical method to determie sample size to estimate characteristic value of soil parameters Y. Hojo, B. Setiawa 2 ad M. Suzuki 3 Abstract Sample size is a importat factor to be cosidered i determiig
More information1 Introduction to reducing variance in Monte Carlo simulations
Copyright c 010 by Karl Sigma 1 Itroductio to reducig variace i Mote Carlo simulatios 11 Review of cofidece itervals for estimatig a mea I statistics, we estimate a ukow mea µ = E(X) of a distributio by
More informationb i u x i U a i j u x i u x j
M ath 5 2 7 Fall 2 0 0 9 L ecture 1 9 N ov. 1 6, 2 0 0 9 ) S ecod- Order Elliptic Equatios: Weak S olutios 1. Defiitios. I this ad the followig two lectures we will study the boudary value problem Here
More informationA Note on Matrix Rigidity
A Note o Matrix Rigidity Joel Friedma Departmet of Computer Sciece Priceto Uiversity Priceto, NJ 08544 Jue 25, 1990 Revised October 25, 1991 Abstract I this paper we give a explicit costructio of matrices
More informationMathematical Induction
Mathematical Iductio Itroductio Mathematical iductio, or just iductio, is a proof techique. Suppose that for every atural umber, P() is a statemet. We wish to show that all statemets P() are true. I a
More informationOn Routing-Optimal Network for Multiple Unicasts
O Routig-Optimal Network for Multiple Uicasts Chu Meg, Athia Markopoulou Abstract I this paper, we cosider etworks with multiple uicast sessios. Geerally, o-liear etwork codig is eeded to achieve the whole
More information