Achievable Rates for Shaped Bit-Metric Decoding

Size: px
Start display at page:

Download "Achievable Rates for Shaped Bit-Metric Decoding"

Transcription

1 Achievable Rates for Shaped Bit-Metric Decoding Georg Böcherer, Meber, IEEE Abstract arxiv: v6 [cs.it] 8 May 06 A new achievable rate for bit-etric decoding (BMD) is derived using rando coding arguents. The rate expression can be evaluated for any input distribution, and in particular the bit-levels of binary input labels can be stochastically dependent. Probabilistic shaping with dependent bit-levels (shaped BMD), shaping of independent bit-levels (bit-shaped BMD) and uniforly distributed independent bit-levels (unifor BMD) are evaluated on the additive white Gaussian noise (AWGN) channel with Gray labeled bipolar aplitude shift keying (ASK). For 3-ASK at a rate of 3.8 bits/channel use, the gap to 3-ASK capacity is db for shaped BMD, 0.46 db for bit-shaped BMD, and.4 db for unifor BMD. These nuerical results illustrate that dependence between the bit-levels is beneficial on the AWGN channel. The relation to the LM rate and the generalized utual inforation (GMI) is discussed. Index Ters probabilistic shaping, bit-etric decoding, bit-interleaved coded odulation (BICM), achievable rate, aplitude shift keying (ASK), binary labeling I. INTRODUCTION Bit-interleaved coded odulation (BICM) cobines higher order odulation with binary error correcting codes [], [3]. This akes BICM attractive for practical application and BICM is widely used in standards, e.g., in DVB-T/S/C. At a BICM receiver, bit-etric decoding (BMD) is used [4, Sec. II]. For BMD, the channel input is labeled by bit strings of length. The bit-levels are treated independently at the decoder. Let B = (B, B,..., B ) denote a vector of binary rando variables B i, i =,,...,, representing the bit-levels with joint distribution P B on {0, }. Consider the channel p Y B with output Y and input distribution P B. Define R BMD (P B ) := [ H(B) + H(B i Y )] () where [ ] + := ax{0, }, and where H( ) denotes entropy. For independent bit-levels, we have P B = P B i and R BMD ( P B i ) = I(B i ; Y ) () where I( ; ) denotes utual inforation. Martinez et al. showed in [4] that () with independent and uniforly distributed bit-levels is achievable with BMD. We call this ethod unifor BMD. Guillén i Fàbregas and Martinez [5] generalized the result of [4] to non-uniforly distributed independent bit-levels. We call this ethod bit-shaped BMD. An iportant tool to assess the perforance of decoding etrics is the generalized utual inforation (GMI) [6, Sec..4]. An interpretation of unifor BMD and bit-shaped BMD as a GMI are given in [4] and [5], respectively. In [7, Sec. 4..4], the GMI is evaluated for a bitetric. It is observed that the GMI increases when the bits are dependent. We call this approach shaped GMI. Another ethod to evaluate decoding etrics is the LM rate, see [8] and references therein. The LM rate is applied to BICM in [9]. A part of this work has been presented at ISIT 04 in Honolulu []. The author is with the Institute for Counications Engineering, Technical University of Munich, Munich D-80333, Gerany (e-ail: georg.boecherer@tu.de).

2 bits/channel use log ( + SNR) ASK capacity C shaped BMD shaped GMI [7, Sec. 4..4] bit-shaped BMD [5] unifor ASK unifor BMD [4] SNR in db Fig.. Achievable rates for bipolar ASK with 3 equidistant signal points, see Sec. IV. At 3.8 bits/channel use, bit-shaped BMD is 0.46 db less energy efficient than shaped BMD. Our ain contribution is to show that R BMD in () with arbitrarily distributed bit-levels is achievable with BMD. In particular, the bit-levels can be dependent, in which case R BMD is not equal to (). We call our ethod shaped BMD. For exaple, consider the additive white Gaussian noise (AWGN) channel with bipolar aplitude shift keying (ASK), see Sec. IV for details. We display inforation rate results for 3- ASK in Fig.. At a rate of 3.8 bits/channel use, the gap to ASK capacity of shaped BMD is db, the gap for shaped GMI is 0. db, the gap for bit-shaped BMD is 0.46 db, and the gap is.4 db for unifor BMD. Dependence between the bit-levels is thus beneficial on the AWGN channel. The rate expression () is used in [0] to construct surrogate channels, which are used to design low-density parity-check codes for shaped BMD. In [], R BMD is used to estiate achievable rates in fiber-optic transission experients. This paper is organized as follows. We state our ain result in Sec. II. We relate R BMD to the LM rate and the GMI in Sec. III and we discuss its application to the AWGN channel in Sec. IV. Sec. V concludes the paper and the appendix provides technical results. II. MAIN RESULT Let p Y B be a eoryless channel with input B = (B, B,..., B ). Let C be a codebook with code words b n = (b, b,..., b n ) with b i {0, }. We denote the ith bit-level of a code word by b n i = (b i, b i,..., b in ). A bit-etric decoder uses a decision rule of the for argax b n C q i (y n, b n i ) (3)

3 3 where y n is the decoder s observation of the channel output and where for each bit-level i, the value of the bit-etric q i (y n, b n i ) depends on P B p Y B only via the arginal P Bi (b)p Y Bi (y b) = p Y B (y a)p B (a). (4) a {0,} : a i =b Theore. Let P B be a distribution on {0, } and let p Y B be a eoryless channel. The rate R BMD (P B ) can be achieved by a bit-etric decoder. Proof: The theore follows by Lea, see Sec. III. For channels with finite output alphabets, we give a proof by typicality in Appendix B. A. Dependent Bit-Levels Can Be Better We develop a siple contrived exaple to show that dependent bit-levels can be better than independent bit-levels. Consider the identity channel with input label B B and transition probabilities Consider the input cost function f satisfying P Y B B (ab ab) =, ab {00, 0, 0, }. f(00) = f() =, f(0) = f(0) = 0 and suppose we ipose the average cost constraint E[f(B B )] <, where E[ ] denotes expectation. For independent bit-levels B and B, this constraint can be achieved only by P B (0) = P B () = or P B () = P B (0) =. In both cases, we have H(B B ) H(B i Y ) = 0 = R BMD (P B P B ). (5) We next choose P B B (0) = P B B (0) = /, which akes the bit-levels dependent. The average input cost is zero and we have H(B B ) H(B i Y ) = = R BMD (P B B ). (6) We conclude that for the considered input-constraint channel, no positive rate is achievable with independent bit-levels and any rate below one is achievable with dependent bit-levels. B. H(B) H(B i Y ) Can Be Negative Consider the erase-all channel with output alphabet {e} and transition probabilities P Y B B (e ab) =, ab {00, 0, 0, }. For the input distribution P B B (0) = P B B (0) = /, we copute Thus, R BMD (P B B ) = [ ] + = 0. H(B B ) H(B i Y ) = =. (7)

4 4 A. Rando Coding III. R BMD, LM RATE, AND GMI Consider a eoryless channel p Y B with input alphabet {0, } and real-valued output Y. Let C {0, } n be a codebook with block length n over the alphabet {0, } of size C = nr. The decision rule of a axiu likelihood (ML) decoder is ˆb n = argax b n C n p Y B (y i b i ) (8) where y n is the decoder s observation of the channel output. If ore than one code word axiizes the likelihood function, the argax operator selects one axiizing code word randoly. For the enseble of codes whose code words are drawn iid according to PB n, the following holds (see, e.g., [, Chap. 7]): the average probability of erroneous ML-decoding (the average is both over the codes in the enseble and the code words) approaches zero for n approaching infinity if R < I(B; Y ) (9) which shows that I(B; Y ) is an achievable rate for ML-decoding. A isatched decoder [8, Sec. II] uses a etric q : {0, } R R instead of p Y B and the isatched decoding rule is n ˆb n = argax q(y i, b i ). (0) b n C B. LM Rate and R BMD Let s 0 be a non-negative scalar and let r : {0, } R be a real-valued function defined on the input alphabet {0, }. Define [ ] q(y, B) s r(b) R(P B, q, s, r) = E log () b supp P B P B (b)q(y, b) s r(b) where supp P B := {b {0, } : P B (b) > 0} is the support of P B. By [8, Theore ], the LM rate R LM (P X, q) = ax s 0,r R(P B, q, s, r) () is achievable by the isatched decoder (0). This iplies that for each s 0 and function r, the rate [R(P B, q, s, r)] + is also an achievable rate for the isatched decoder. The next lea states that R BMD is an instance of [R(P B, q, s, r)] + for a particular choice of q, s, r. Lea. Consider the eoryless channel p Y B with input distribution P B and define q BMD (y, b) = p Y Bi (y b i ) (3) ) We have s BMD = (4) r BMD (b) = P B i (b i ). (5) P B (b) R BMD (P B ) [R(P B, q BMD, s BMD, r BMD )] + (6) with equality if and only if P B is strictly positive, i.e., if P B (b) > 0 for all b {0, }. ) R BMD is an achievable rate for the isatched decoder (0) for q = q BMD.

5 5 3) R BMD is less or equal to the LM rate, i.e., R BMD (P B ) R LM (P B, q BMD ). (7) Proof: We prove stateent ) in Appendix C. Stateents ) and 3) now follow by ) and (). Reark. The achievability of R BMD for channels with finite output alphabets is show in Appendix B by the following code construction, which is different fro the construction in Sec. III-A: The codebook C is generated iid according to a unifor distribution on the alphabet {0, }. The transitter only transits code words that are P B typical (for the foral definition of typicality, see Appendix A), which results in the signaling set S = {b n C : b n is P B typical}. (8) The receiver uses a bit-wise typicality decoder, i.e., it outputs b n, if it is the only code word whose bit levels b n i are jointly P Bi Y typical with the observed channel output y n, for i =,,...,. Thus, the decoder evaluates its decoding etric for the decoding set D = {b n C : b n i is P Bi typical, for i =,,..., }. (9) In the case of dependent bit-levels, the signaling set S and the decoding set D are not equal. This codebook isatch is also present in the practical ipleentation of shaped BMD [3]. A related work on codebook isatch is [4]. C. Generalized Mutual Inforation By setting r( ) = and axiizing over s, we obtain the GMI R GMI (P B, q) = ax s 0 R(P B, q, s, ). (0) The achievability of R GMI by the isatched decoder (0) now follows by observing that R GMI (P B, q) R LM (P B, q) or by invoking [6, Sec..4]. In [7, Sec. 4..4], dependent bit-levels are used together with the etric q BMD, which yields the shaped GMI rate R sgmi (P B ) := R GMI (P B, q BMD ). () In the next section, we will see that for bipolar ASK on the AWGN channel, R BMD is larger than R sgmi. IV. -ASK MODULATION FOR THE AWGN CHANNEL The signal constellation of bipolar ASK is given by X ASK = {±, ±3,..., ±( )}. () The points x X ASK are labeled by a binary vector B = (B,..., B ). We use the Binary Reflected Gray Code (BRGC) [5]. The labeling influences the rate that is achievable by BMD, see, e.g., [3, Sec. VI.C]. To control the transit power, the channel input x B is scaled by a positive real nuber. The input-output relation of the AWGN channel is Y = x B + Z (3) where Z is zero ean Gaussian noise with variance one. The input is subject to an average power constraint P, i.e., and P B ust satisfy E[( x B ) ] P. The ASK capacity is C = ax I(B; Y ). (4),P B : E[( x B ) ] P The optial paraeters, PB can be calculated using the Blahut-Arioto algorith [6], [7] and they can be approxiated closely by axiizing over the faily of Maxwell-Boltzann distributions [8],

6 6 see also [3, Sec. III]. We evaluate R BMD (shaped BMD) and R sgmi (shaped GMI) in, PB. In Fig., we plot for 3 signal points ( = 5) the ASK capacity C and the inforation rate curves of shaped BMD and shaped GMI together with the corresponding rate curves that result fro unifor inputs. Since we noralized the noise power to one, the signal-to-noise ratio (SNR) in db is given by E[( x B ) ] SNR = 0 log 0. (5) The gap between the 3-ASK capacity C and the shaped BMD rate R BMD is negligibly sall over the considered SNR range. At 3.8 bits/channel use, the gap between C and R BMD is db and the gap of sgmi is 0. db. For coparison, we calculate the bit-shaped BMD rate. The optiization proble is axiize I(B i ; Y ) P B, (6) subject to P B = P Bi, E[( x B ) ] P. This is a non-convex optiization proble [9], [0] so we calculate a solution by exhaustive search over the bit distributions with a precision of ± The resulting rate curve is displayed in Fig.. We observe that bit-shaped BMD (independent bit-levels) is 0.46 db less energy efficient than shaped BMD (dependent bit-levels) at 3.8 bits/channel use. V. CONCLUSIONS The achievable rate in () allows dependence between the bit-levels while the achievable rate in () (see [4], [5]) requires independent bit-levels. We have shown that on the AWGN channel under bit-etric decoding, dependent bit-levels can achieve higher rates than independent bit-levels. Interesting research directions are to study codebook isatch (see Reark ) and to study error exponents for shaped BMD. ACKNOWLEDGMENT This work was supported by the Geran Federal Ministry of Education and Research in the fraework of an Alexander von Huboldt Professorship. APPENDIX A TYPICAL SEQUENCES We use letter-typical sequences as defined in [, Sec..3]. Consider a discrete eoryless source (DMS) P X with a finite alphabet X. For x n X n, let N(a x n ) be the nuber of ties that letter a X occurs in x n, i.e., N(a x n ) = {i: x i = a}. (7) We say x n is ɛ-letter-typical with respect to P X if for each letter a X, ( ɛ)p X (a) N(a xn ) ( + ɛ)p X (a), a X. (8) n Let Tɛ n (P X ) be the set of all sequences x n that fulfill (8). The sequences (8) are called typical in [, Sec. 3.3], [3, Sec..4] and robust typical in [4, Appendix]. We next list the properties of typical sequences that we need in this work and whenever possible, we refer for the proofs to the literature. Define µ X := in a supp P X P X (a). (9)

7 7 Lea (Typicality, [, Theore.], [4, Lea 9]). Suppose 0 < ɛ < µ X. We have ( δ ɛ (n, P X )) n( ɛ) H(X) T n ɛ (P X ) (30) where δ ɛ (P X, n) is such that δ ɛ (P X, n) n exponentially fast in n. The definitions and properties of typicality apply in particular when the rando variable X stands for a tuple of rando variables, e.g., X = (Y, Z). If x n = (y n, z n ) is typical, then y n and z n are called jointly typical. Lea 3 (Marginal Typicality, [4, Lea ], [, Sec..5]). Joint typicality iplies arginal typicality, i.e., Tɛ n (P Y Z ) Tɛ n (P Y ) Tɛ n (P Z ). Lea 4 (Misatched Typicality). Suppose ɛ > 0, X n is eitted by the DMS P X and supp P X supp P X. We have ( δ ɛ (P X, n)) n[d(p X P X ) ɛ log (µ Xµ X )] Pr[X n T n ɛ (P X)]. (3) Proof: For x n T n ɛ (P X), we have Now, we have Pr[X n T n ɛ (P X)] = (3) P n X(x n ) = = x n T n ɛ (P X) x n T n ɛ (P X) a supp P X a supp P X a supp P X P X (a) N(a xn ) n(+ɛ)p P X (a) X(a) n(+ɛ)p X(a) log P X (a). (3) P n X(x n ) (33) a supp P n(+ɛ)p X(a) log P X (a) X (30) ( δ ɛ (n, P X)) n( ɛ) H( X) a supp P n(+ɛ)p X(a) log P X (a) X = ( δ ɛ (n, P X)) n[d(p X P X ) ɛ H( X)+ɛ a supp P X P X(a) log P X (a)] (34) (35) (36) ( δ ɛ (n, P X)) n[d(p X P X )+ɛ log (µ Xµ X )]. (37) Define now the set Note that T n ɛ (P XY x n ) = if x n / T n ɛ (P X ). { } Tɛ n (P XY x n ) := y n : (x n, y n ) Tɛ n (P XY ). (38) Lea 5 (Conditional Typicality, [, Theore.], [4, Lea, 4]). Suppose 0 < ɛ < ɛ < µ XY. For any x n X n, we have T n ɛ (P XY x n ) n(+ɛ ) H(Y X). (39) Suppose x n T n ɛ (P X ) and that (X n, Y n ) is eitted by the DMS P XY. We have δ ɛ,ɛ (P XY, n) Pr[Y n T n ɛ (P XY x n ) X n = x n ] (40) where δ ɛ,ɛ (P XY, n) approaches zero exponentially fast in n.

8 8 APPENDIX B PROOF OF THEOREM We prove Theore by rando coding arguents. In the following, let 0 < ɛ < ɛ < µ BY, where by (9), µ BY = in P BY (by). b,y : P BY (by)>0 Code Construction: Choose n(r+ R) code words U n (w, v), w =,,..., nr, v =,,..., n R of length n by choosing the n n(r+ R) sybols independent and uniforly distributed according to the unifor distribution P U on {0, }. Let C be the resulting codebook. Encoding: Given essage w {,, 3,..., nr }, try to find a v such that U n (w, v) Tɛ n (P B ). If there is such a v, transit U n (w, v). If there is no such v, declare an error. Decoding: We define the bit-etric { q i (y n, b n, (b n i, y n ) Tɛ n i ) = (P Bi Y ) (4) 0, otherwise. The corresponding decoding etric is q(y n, b n ) = Define the set ˆB(y n ) := {b n C : q(y n, b n ) = }. The decoder output is { b n, if ˆB(y n ) = {b n } error, otherwise. q i (y n, b n i ). (4) Analysis: Suppose essage w should be transitted. The first error event is (43) E := { v : U n (w, v) T n ɛ (P B ) }. (44) Suppose now E did not occur and for soe v, U n (w, v) = b n with b n T n ɛ (P B ). The vector b n is transitted. The second error event can occur at the decoder, and it is given by E := { b n / ˆB(Y n ) U n (w, v) = b n}. (45) Suppose next that the second error event did not occur. This iplies in particular that Y n Tɛ n (P Y ). Suppose that Y n = y n for soe y n Tɛ n (P Y ). The third error event is now First error event: By (3), we have E 3 := { w, ṽ : w w and U n ( w, ṽ) ˆB(y n ) Y n = y n}. (46) Pr[U n T n ɛ (P B )] [ δ ɛ (P B, n)] n[d(p B P U ) ɛ log (µ B µ U )] where by (9), µ B = in P B(b) and µ U = in P U(u). Note that since P U is unifor on b: P B (b)>0 u: P U (u)>0 {0, }, we have µ U =. For large enough n, we have δ ɛ (P B, n) /. The probability to generate n R sequences U n (w, v), v =,,..., n R, that are not in Tɛ n (P B ) is thus bounded fro above by ( ) [ n R n[d(p B P U ) ɛ log (µ B µ U )] exp ] n[d(p B P U ) ɛ log (µ B µ U )] n R (48) where inequality in (48) follows by ( r) s exp( rs). This probability tends to zero if (47) R > D(P B P U ) + ɛ log µ B µ U. (49)

9 9 We conclude that if R > D(P B P U ) (50) then for sall enough positive ɛ and large enough n, we have U n (w, v) Tɛ n (P B ) for soe v {,,..., n R} with high probability. Second error event: By (40), the probability Pr[(b n, Y n ) Tɛ n (P BY ) U n (w, v) = b n ] = Pr[Y n Tɛ n (P BY b n ) U n (w, v) = b n ] approaches one for n. By Lea 3, joint typicality iplies arginal typicality, so also Pr[(b n i, Y n ) Tɛ n (P Bi Y ) U n (w, v) = b n ] approaches one for i =,,...,. This shows that Pr[E ] n 0. Third error event: By (39), we have The size of ˆB(y n ) is thus bounded as Furtherore, by our rando coding experient, we have We have T n ɛ (P Bi Y y n ) n H(B i Y )(+ɛ ). (5) ˆB(y n ) n H(B i Y )(+ɛ ). (5) Pr[U n ( w, ṽ) = b n ] = n = n H(U), b n {0, } n. (53) [ Pr[E 3 ] = Pr w w ṽ [ = Pr w w ṽ U n ( w, ṽ) ˆB(y n ) Y n = y n ] U n ( w, ṽ) ˆB(y ] n ) (54) (55) ( nr ) n R Pr[U n ˆB(y n )] (56) < n(r+ R) Pr[U n ˆB(y n )] (57) n(r+ R) = Pr[U n = b n ] (58) (53) n(r+ R) = b n ˆB(y n ) b n ˆB(y n ) n H(U) (59) (5) n(r+ R) n H(B i Y )(+ɛ ) n H(U) (60) where equality in (55) follows because U n (w, v) was transitted, so Y n and U n ( w, ṽ) are independent for w w. Inequality in (56) follows by the union bound. By (60), the probability Pr[E 3 ] approaches zero for n if R + R + H(B i Y )( + ɛ ) H(U) < 0. (6) By choosing R according to (49), condition (6) becoes R < R H(B i Y )( + ɛ ) + H(U) (6) < H(B i Y )( + ɛ ) + H(U) D(P B P U ) ɛ log µ B µ U (63) = H(B) H(B i Y )( + ɛ ) ɛ log µ B µ U (64)

10 0 where equality in (64) follows because U is uniforly distributed, thus D(P B P U ) = H(U) H(B). Suppose now H(B) H(B i Y ) > 0. Then, for any positive R < H(B) H(B i Y ), we can find sall enough positive ɛ < ɛ so that both condition (49) and (6) are fulfilled. By choosing n large enough, the probability of the three error events approaches zero. If H(B) H(B i Y ) 0, we let the transitter transit a duy sequence corresponding to a rate of zero, which can be achieved on any channel. This shows that R BMD as defined in () can be achieved by BMD. APPENDIX C PROOF OF LEMMA We have [ R(P B, q BMD, s BMD, r BMD ) = E log P ] [ ] B i (B i ) + E log P B (B) p Y Bi (Y B i ) }{{} =H(B) }{{} H(B i) = h(y B i) [ ( )] E log P B (b) P B i (b i ) p Y Bj (Y b j ) P B (b) b supp P B j= }{{} ( ) where h( ) denotes differential entropy in bits. For the ter ( ), we have [ ( )] ( ) = E log P Bi (b i )p Y Bi (Y b i ) E log = E log = E = [ log b supp P B b {0,} ( b {0,} p Y (Y ) (65) (66) P Bi (b i )p Y Bi (Y b i ) (67) ] P Bi (b)p Y Bi (Y b)) (68) (69) h(y ) (70) with equality in (67) if and only if P B is strictly positive. Using (70) in (65), we have [ R(P B, q BMD, s BMD, r BMD ) H(B) H(B i ) + h(y ) h(y Bi ) ] (7) = H(B) = H(B) = H(B) with equality in (7) if and only if P B is strictly positive. H(B i ) + H(B i ) + I(B i ; Y ) (7) [ H(Bi ) H(B i Y ) ] (73) H(B i Y ) (74)

11 REFERENCES [] G. Böcherer, Probabilistic signal shaping for bit-etric decoding, in Proc. IEEE Int. Syp. Inf. Theory (ISIT), Honolulu, HI, USA, Jun. 04, pp [] E. Zehavi, 8-PSK trellis codes for a Rayleigh channel, IEEE Trans. Coun., vol. 40, no. 5, pp , May 99. [3] G. Caire, G. Taricco, and E. Biglieri, Bit-interleaved coded odulation, IEEE Trans. Inf. Theory, vol. 44, no. 3, pp , May 998. [4] A. Martinez, A. Guillén i Fàbregas, G. Caire, and F. Willes, Bit-interleaved coded odulation revisited: A isatched decoding perspective, IEEE Trans. Inf. Theory, vol. 55, no. 6, pp , Jun [5] A. Guillén i Fàbregas and A. Martinez, Bit-interleaved coded odulation with shaping, in Proc. IEEE Inf. Theory Workshop (ITW), Dublin, Ireland, Aug. 00, pp. 5. [6] G. Kaplan and S. Shaai (Shitz), Inforation rates and error exponents of copound channels with application to antipodal signaling in a fading environent, AEÜ, vol. 47, no. 4, pp. 8 39, 993. [7] L. Peng, Fundaentals of bit-interleaved coded odulation and reliable source transission, Ph.D. dissertation, University of Cabridge, 0. [8] A. Ganti, A. Lapidoth, and E. Telatar, Misatched decoding revisited: General alphabets, channels with eory, and the wide-band liit, IEEE Trans. Inf. Theory, vol. 46, no. 7, pp , Nov [9] L. Peng, A. Guillén i Fàbregas, and A. Martinez, Iproved exponents and rates for bit-interleaved coded odulation, in Proc. IEEE Int. Syp. Inf. Theory (ISIT), Istanbul, Turkey, Jul. 03, pp [0] F. Steiner, G. Böcherer, and G. Liva, Protograph-based LDPC code design for shaped bit-etric decoding, IEEE J. Sel. Areas Coun., vol. 34, no., pp , Feb. 06. [] F. Buchali, F. Steiner, G. Böcherer, L. Schalen, P. Schulte, and W. Idler, Rate adaptation and reach increase by probabilistically shaped 64-QAM: An experiental deonstration, J. Lightw. Technol., vol. 34, no. 7, Apr. 06. [] R. G. Gallager, Inforation Theory and Reliable Counication. John Wiley & Sons, Inc., 968. [3] G. Böcherer, F. Steiner, and P. Schulte, Bandwidth efficient and rate-atched low-density parity-check coded odulation, IEEE Trans. Coun., vol. 63, no., pp , Dec. 05. [4] S. Achtenberg and D. Raphaeli, Theoretic shaping bounds for single letter constraints and isatched decoding, arxiv, 03. [Online]. Available: [5] F. Gray, Pulse code counication, U. S. Patent , 953. [6] R. Blahut, Coputation of channel capacity and rate-distortion functions, IEEE Trans. Inf. Theory, vol. 8, no. 4, pp , Jul. 97. [7] S. Arioto, An algorith for coputing the capacity of arbitrary discrete eoryless channels, IEEE Trans. Inf. Theory, vol. 8, no., pp. 4 0, Jan. 97. [8] F. R. Kschischang and S. Pasupathy, Optial nonunifor signaling for Gaussian channels, IEEE Trans. Inf. Theory, vol. 39, no. 3, pp , May 993. [9] A. Alvarado, F. Brännströ, and E. Agrell, High SNR bounds for the BICM capacity, in Proc. IEEE Inf. Theory Workshop (ITW), Paraty, Brazil, Oct. 0, pp [0] G. Böcherer, F. Altenbach, A. Alvarado, S. Corroy, and R. Mathar, An efficient algorith to calculate BICM capacity, in Proc. IEEE Int. Syp. Inf. Theory (ISIT), Cabridge, MA, USA, Jul. 0, pp [] G. Kraer, Topics in ulti-user inforation theory, Foundations and Trends in Co. and Inf. Theory, vol. 4, no. 4 5, pp , 007. [] J. L. Massey, Applied digital inforation theory I, lecture notes, ETH Zurich. [Online]. Available: archive/assey scr/adit.pdf [3] A. El Gaal and Y.-H. Ki, Network Inforation Theory. Cabridge University Press, 0. [4] A. Orlitsky and J. R. Roche, Coding for coputing, IEEE Trans. Inf. Theory, vol. 47, no. 3, pp , Mar. 00.

Fixed-to-Variable Length Distribution Matching

Fixed-to-Variable Length Distribution Matching Fixed-to-Variable Length Distribution Matching Rana Ali Ajad and Georg Böcherer Institute for Counications Engineering Technische Universität München, Gerany Eail: raa2463@gail.co,georg.boecherer@tu.de

More information

Achievable Rates for Probabilistic Shaping

Achievable Rates for Probabilistic Shaping Achievable Rates for Probabilistic Shaping Georg Böcherer Mathematical and Algorithmic Sciences Lab Huawei Technologies France S.A.S.U. georg.boecherer@ieee.org May 3, 08 arxiv:707.034v5 cs.it May 08 For

More information

Bandwidth Efficient and Rate-Matched Low-Density Parity-Check Coded Modulation

Bandwidth Efficient and Rate-Matched Low-Density Parity-Check Coded Modulation Bandwidth Efficient and Rate-Matched Low-Density Parity-Check Coded Modulation Georg Böcherer, Patrick Schulte, Fabian Steiner Chair for Communications Engineering patrick.schulte@tum.de April 29, 2015

More information

Partition-Based Distribution Matching

Partition-Based Distribution Matching MITSUBISHI ELECTRIC RESEARCH LABORATORIES http://www.erl.co Partition-Based Distribution Matching Fehenberger, T.; Millar, D.S.; Koike-Akino, T.; Kojia, K.; Parsons, K. TR2018-023 January 2018 Abstract

More information

Upper and Lower Bounds on the Capacity of Wireless Optical Intensity Channels

Upper and Lower Bounds on the Capacity of Wireless Optical Intensity Channels ISIT7, Nice, France, June 4 June 9, 7 Upper and Lower Bounds on the Capacity of Wireless Optical Intensity Channels Ahed A. Farid and Steve Hranilovic Dept. Electrical and Coputer Engineering McMaster

More information

Multiset-Partition Distribution Matching

Multiset-Partition Distribution Matching T. FEHENBERGER et al.: MULTISET-PARTITION DISTRIBUTION MATCHING 1 Multiset-Partition Distribution Matching Tobias Fehenberger, Meber, IEEE, David S. Millar, Meber, IEEE, Toshiaki Koike-Akino, Senior Meber,

More information

Multiset-Partition Distribution Matching

Multiset-Partition Distribution Matching MITSUBISHI ELECTRIC RESEARCH LABORATORIES http://www.erl.co Multiset-Partition Distribution Matching Fehenberger, T.; Millar, D.S.; Koike-Akino, T.; Kojia, K.; Parsons, K. TR2018-168 Deceber 27, 2018 Abstract

More information

Error Exponents in Asynchronous Communication

Error Exponents in Asynchronous Communication IEEE International Syposiu on Inforation Theory Proceedings Error Exponents in Asynchronous Counication Da Wang EECS Dept., MIT Cabridge, MA, USA Eail: dawang@it.edu Venkat Chandar Lincoln Laboratory,

More information

Bit-Interleaved Coded Modulation Revisited: A Mismatched Decoding Perspective

Bit-Interleaved Coded Modulation Revisited: A Mismatched Decoding Perspective Bit-Interleaved Coded Modulation Revisited: A Mismatched Decoding Perspective Alfonso Martinez, Albert Guillén i Fàbregas, Giuseppe Caire and Frans Willems Abstract arxiv:0805.37v [cs.it] 9 May 008 We

More information

On Constant Power Water-filling

On Constant Power Water-filling On Constant Power Water-filling Wei Yu and John M. Cioffi Electrical Engineering Departent Stanford University, Stanford, CA94305, U.S.A. eails: {weiyu,cioffi}@stanford.edu Abstract This paper derives

More information

E0 370 Statistical Learning Theory Lecture 6 (Aug 30, 2011) Margin Analysis

E0 370 Statistical Learning Theory Lecture 6 (Aug 30, 2011) Margin Analysis E0 370 tatistical Learning Theory Lecture 6 (Aug 30, 20) Margin Analysis Lecturer: hivani Agarwal cribe: Narasihan R Introduction In the last few lectures we have seen how to obtain high confidence bounds

More information

Secret-Key Sharing Based on Layered Broadcast Coding over Fading Channels

Secret-Key Sharing Based on Layered Broadcast Coding over Fading Channels Secret-Key Sharing Based on Layered Broadcast Coding over Fading Channels Xiaojun Tang WINLAB, Rutgers University Ruoheng Liu Princeton University Predrag Spasojević WINLAB, Rutgers University H. Vincent

More information

Impact of Imperfect Channel State Information on ARQ Schemes over Rayleigh Fading Channels

Impact of Imperfect Channel State Information on ARQ Schemes over Rayleigh Fading Channels This full text paper was peer reviewed at the direction of IEEE Counications Society subject atter experts for publication in the IEEE ICC 9 proceedings Ipact of Iperfect Channel State Inforation on ARQ

More information

This model assumes that the probability of a gap has size i is proportional to 1/i. i.e., i log m e. j=1. E[gap size] = i P r(i) = N f t.

This model assumes that the probability of a gap has size i is proportional to 1/i. i.e., i log m e. j=1. E[gap size] = i P r(i) = N f t. CS 493: Algoriths for Massive Data Sets Feb 2, 2002 Local Models, Bloo Filter Scribe: Qin Lv Local Models In global odels, every inverted file entry is copressed with the sae odel. This work wells when

More information

General BER Expression for One-Dimensional Constellations

General BER Expression for One-Dimensional Constellations General BER Expression for One-Dimensional Constellations Mikhail Ivanov, Fredrik Brännström, Alex Alvarado, and Erik Agrell Department of Signals and Systems, Chalmers University of Technology, Gothenburg,

More information

An Achievable Error Exponent for the Mismatched Multiple-Access Channel

An Achievable Error Exponent for the Mismatched Multiple-Access Channel An Achievable Error Exponent for the Mismatched Multiple-Access Channel Jonathan Scarlett University of Cambridge jms265@camacuk Albert Guillén i Fàbregas ICREA & Universitat Pompeu Fabra University of

More information

Course Notes for EE227C (Spring 2018): Convex Optimization and Approximation

Course Notes for EE227C (Spring 2018): Convex Optimization and Approximation Course Notes for EE227C (Spring 2018): Convex Optiization and Approxiation Instructor: Moritz Hardt Eail: hardt+ee227c@berkeley.edu Graduate Instructor: Max Sichowitz Eail: sichow+ee227c@berkeley.edu October

More information

ESE 523 Information Theory

ESE 523 Information Theory ESE 53 Inforation Theory Joseph A. O Sullivan Sauel C. Sachs Professor Electrical and Systes Engineering Washington University 11 Urbauer Hall 10E Green Hall 314-935-4173 (Lynda Marha Answers) jao@wustl.edu

More information

Non-Parametric Non-Line-of-Sight Identification 1

Non-Parametric Non-Line-of-Sight Identification 1 Non-Paraetric Non-Line-of-Sight Identification Sinan Gezici, Hisashi Kobayashi and H. Vincent Poor Departent of Electrical Engineering School of Engineering and Applied Science Princeton University, Princeton,

More information

Optimal Jamming Over Additive Noise: Vector Source-Channel Case

Optimal Jamming Over Additive Noise: Vector Source-Channel Case Fifty-first Annual Allerton Conference Allerton House, UIUC, Illinois, USA October 2-3, 2013 Optial Jaing Over Additive Noise: Vector Source-Channel Case Erah Akyol and Kenneth Rose Abstract This paper

More information

Convolutional Codes. Lecture Notes 8: Trellis Codes. Example: K=3,M=2, rate 1/2 code. Figure 95: Convolutional Encoder

Convolutional Codes. Lecture Notes 8: Trellis Codes. Example: K=3,M=2, rate 1/2 code. Figure 95: Convolutional Encoder Convolutional Codes Lecture Notes 8: Trellis Codes In this lecture we discuss construction of signals via a trellis. That is, signals are constructed by labeling the branches of an infinite trellis with

More information

e-companion ONLY AVAILABLE IN ELECTRONIC FORM

e-companion ONLY AVAILABLE IN ELECTRONIC FORM OPERATIONS RESEARCH doi 10.1287/opre.1070.0427ec pp. ec1 ec5 e-copanion ONLY AVAILABLE IN ELECTRONIC FORM infors 07 INFORMS Electronic Copanion A Learning Approach for Interactive Marketing to a Custoer

More information

Bit-interleaved coded modulation revisited: a mismatched decoding perspective Martinez Vicente, A.; Guillén i Fàbregas, A.; Caire, G.; Willems, F.M.J.

Bit-interleaved coded modulation revisited: a mismatched decoding perspective Martinez Vicente, A.; Guillén i Fàbregas, A.; Caire, G.; Willems, F.M.J. Bit-interleaved coded modulation revisited: a mismatched decoding perspective Martinez Vicente, A.; Guillén i Fàbregas, A.; Caire, G.; Willems, F.M.J. Published in: IEEE International Symposium on Information

More information

Design of Spatially Coupled LDPC Codes over GF(q) for Windowed Decoding

Design of Spatially Coupled LDPC Codes over GF(q) for Windowed Decoding IEEE TRANSACTIONS ON INFORMATION THEORY (SUBMITTED PAPER) 1 Design of Spatially Coupled LDPC Codes over GF(q) for Windowed Decoding Lai Wei, Student Meber, IEEE, David G. M. Mitchell, Meber, IEEE, Thoas

More information

Generalized Alignment Chain: Improved Converse Results for Index Coding

Generalized Alignment Chain: Improved Converse Results for Index Coding Generalized Alignent Chain: Iproved Converse Results for Index Coding Yucheng Liu and Parastoo Sadeghi Research School of Electrical, Energy and Materials Engineering Australian National University, Canberra,

More information

Rateless Codes for MIMO Channels

Rateless Codes for MIMO Channels Rateless Codes for MIMO Channels Marya Modir Shanechi Dept EECS, MIT Cabridge, MA Eail: shanechi@itedu Uri Erez Tel Aviv University Raat Aviv, Israel Eail: uri@engtauacil Gregory W Wornell Dept EECS, MIT

More information

Research Article Rapidly-Converging Series Representations of a Mutual-Information Integral

Research Article Rapidly-Converging Series Representations of a Mutual-Information Integral International Scholarly Research Network ISRN Counications and Networking Volue 11, Article ID 5465, 6 pages doi:1.54/11/5465 Research Article Rapidly-Converging Series Representations of a Mutual-Inforation

More information

CS Lecture 13. More Maximum Likelihood

CS Lecture 13. More Maximum Likelihood CS 6347 Lecture 13 More Maxiu Likelihood Recap Last tie: Introduction to axiu likelihood estiation MLE for Bayesian networks Optial CPTs correspond to epirical counts Today: MLE for CRFs 2 Maxiu Likelihood

More information

The Transactional Nature of Quantum Information

The Transactional Nature of Quantum Information The Transactional Nature of Quantu Inforation Subhash Kak Departent of Coputer Science Oklahoa State University Stillwater, OK 7478 ABSTRACT Inforation, in its counications sense, is a transactional property.

More information

SPECTRUM sensing is a core concept of cognitive radio

SPECTRUM sensing is a core concept of cognitive radio World Acadey of Science, Engineering and Technology International Journal of Electronics and Counication Engineering Vol:6, o:2, 202 Efficient Detection Using Sequential Probability Ratio Test in Mobile

More information

ASSUME a source over an alphabet size m, from which a sequence of n independent samples are drawn. The classical

ASSUME a source over an alphabet size m, from which a sequence of n independent samples are drawn. The classical IEEE TRANSACTIONS ON INFORMATION THEORY Large Alphabet Source Coding using Independent Coponent Analysis Aichai Painsky, Meber, IEEE, Saharon Rosset and Meir Feder, Fellow, IEEE arxiv:67.7v [cs.it] Jul

More information

On the Design of MIMO-NOMA Downlink and Uplink Transmission

On the Design of MIMO-NOMA Downlink and Uplink Transmission On the Design of MIMO-NOMA Downlink and Uplink Transission Zhiguo Ding, Meber, IEEE, Robert Schober, Fellow, IEEE, and H. Vincent Poor, Fellow, IEEE Abstract In this paper, a novel MIMO-NOMA fraework for

More information

Combining Classifiers

Combining Classifiers Cobining Classifiers Generic ethods of generating and cobining ultiple classifiers Bagging Boosting References: Duda, Hart & Stork, pg 475-480. Hastie, Tibsharini, Friedan, pg 246-256 and Chapter 10. http://www.boosting.org/

More information

A note on the multiplication of sparse matrices

A note on the multiplication of sparse matrices Cent. Eur. J. Cop. Sci. 41) 2014 1-11 DOI: 10.2478/s13537-014-0201-x Central European Journal of Coputer Science A note on the ultiplication of sparse atrices Research Article Keivan Borna 12, Sohrab Aboozarkhani

More information

Bit-Interleaved Coded Modulation With Mismatched Decoding Metrics

Bit-Interleaved Coded Modulation With Mismatched Decoding Metrics Bit-Interleaved Coded Modulation With Mismatched Decoding Metrics 1 Trung Thanh Nguyen and Lutz Lampe Department of Electrical and Computer Engineering The University of British Columbia, Vancouver, Canada

More information

Compression and Predictive Distributions for Large Alphabet i.i.d and Markov models

Compression and Predictive Distributions for Large Alphabet i.i.d and Markov models 2014 IEEE International Syposiu on Inforation Theory Copression and Predictive Distributions for Large Alphabet i.i.d and Markov odels Xiao Yang Departent of Statistics Yale University New Haven, CT, 06511

More information

On Conditions for Linearity of Optimal Estimation

On Conditions for Linearity of Optimal Estimation On Conditions for Linearity of Optial Estiation Erah Akyol, Kuar Viswanatha and Kenneth Rose {eakyol, kuar, rose}@ece.ucsb.edu Departent of Electrical and Coputer Engineering University of California at

More information

Course Notes for EE227C (Spring 2018): Convex Optimization and Approximation

Course Notes for EE227C (Spring 2018): Convex Optimization and Approximation Course Notes for EE7C (Spring 018: Convex Optiization and Approxiation Instructor: Moritz Hardt Eail: hardt+ee7c@berkeley.edu Graduate Instructor: Max Sichowitz Eail: sichow+ee7c@berkeley.edu October 15,

More information

Vulnerability of MRD-Code-Based Universal Secure Error-Correcting Network Codes under Time-Varying Jamming Links

Vulnerability of MRD-Code-Based Universal Secure Error-Correcting Network Codes under Time-Varying Jamming Links Vulnerability of MRD-Code-Based Universal Secure Error-Correcting Network Codes under Tie-Varying Jaing Links Jun Kurihara KDDI R&D Laboratories, Inc 2 5 Ohara, Fujiino, Saitaa, 356 8502 Japan Eail: kurihara@kddilabsjp

More information

PULSE-TRAIN BASED TIME-DELAY ESTIMATION IMPROVES RESILIENCY TO NOISE

PULSE-TRAIN BASED TIME-DELAY ESTIMATION IMPROVES RESILIENCY TO NOISE PULSE-TRAIN BASED TIME-DELAY ESTIMATION IMPROVES RESILIENCY TO NOISE 1 Nicola Neretti, 1 Nathan Intrator and 1,2 Leon N Cooper 1 Institute for Brain and Neural Systes, Brown University, Providence RI 02912.

More information

Mismatched Multi-letter Successive Decoding for the Multiple-Access Channel

Mismatched Multi-letter Successive Decoding for the Multiple-Access Channel Mismatched Multi-letter Successive Decoding for the Multiple-Access Channel Jonathan Scarlett University of Cambridge jms265@cam.ac.uk Alfonso Martinez Universitat Pompeu Fabra alfonso.martinez@ieee.org

More information

A Low-Complexity Congestion Control and Scheduling Algorithm for Multihop Wireless Networks with Order-Optimal Per-Flow Delay

A Low-Complexity Congestion Control and Scheduling Algorithm for Multihop Wireless Networks with Order-Optimal Per-Flow Delay A Low-Coplexity Congestion Control and Scheduling Algorith for Multihop Wireless Networks with Order-Optial Per-Flow Delay Po-Kai Huang, Xiaojun Lin, and Chih-Chun Wang School of Electrical and Coputer

More information

Computational and Statistical Learning Theory

Computational and Statistical Learning Theory Coputational and Statistical Learning Theory Proble sets 5 and 6 Due: Noveber th Please send your solutions to learning-subissions@ttic.edu Notations/Definitions Recall the definition of saple based Radeacher

More information

Supplement to: Subsampling Methods for Persistent Homology

Supplement to: Subsampling Methods for Persistent Homology Suppleent to: Subsapling Methods for Persistent Hoology A. Technical results In this section, we present soe technical results that will be used to prove the ain theores. First, we expand the notation

More information

Solutions 1. Introduction to Coding Theory - Spring 2010 Solutions 1. Exercise 1.1. See Examples 1.2 and 1.11 in the course notes.

Solutions 1. Introduction to Coding Theory - Spring 2010 Solutions 1. Exercise 1.1. See Examples 1.2 and 1.11 in the course notes. Solutions 1 Exercise 1.1. See Exaples 1.2 and 1.11 in the course notes. Exercise 1.2. Observe that the Haing distance of two vectors is the iniu nuber of bit flips required to transfor one into the other.

More information

Interactive Markov Models of Evolutionary Algorithms

Interactive Markov Models of Evolutionary Algorithms Cleveland State University EngagedScholarship@CSU Electrical Engineering & Coputer Science Faculty Publications Electrical Engineering & Coputer Science Departent 2015 Interactive Markov Models of Evolutionary

More information

Witsenhausen s counterexample as Assisted Interference Suppression

Witsenhausen s counterexample as Assisted Interference Suppression Witsenhausen s counterexaple as Assisted Interference Suppression Pulkit Grover and Anant Sahai Wireless Foundations, epartent of EECS University of California at Berkeley, CA-947, USA {pulkit, sahai}@eecs.berkeley.edu

More information

Iterative Decoding of LDPC Codes over the q-ary Partial Erasure Channel

Iterative Decoding of LDPC Codes over the q-ary Partial Erasure Channel 1 Iterative Decoding of LDPC Codes over the q-ary Partial Erasure Channel Rai Cohen, Graduate Student eber, IEEE, and Yuval Cassuto, Senior eber, IEEE arxiv:1510.05311v2 [cs.it] 24 ay 2016 Abstract In

More information

Bayesian Learning. Chapter 6: Bayesian Learning. Bayes Theorem. Roles for Bayesian Methods. CS 536: Machine Learning Littman (Wu, TA)

Bayesian Learning. Chapter 6: Bayesian Learning. Bayes Theorem. Roles for Bayesian Methods. CS 536: Machine Learning Littman (Wu, TA) Bayesian Learning Chapter 6: Bayesian Learning CS 536: Machine Learning Littan (Wu, TA) [Read Ch. 6, except 6.3] [Suggested exercises: 6.1, 6.2, 6.6] Bayes Theore MAP, ML hypotheses MAP learners Miniu

More information

Constant-Space String-Matching. in Sublinear Average Time. (Extended Abstract) Wojciech Rytter z. Warsaw University. and. University of Liverpool

Constant-Space String-Matching. in Sublinear Average Time. (Extended Abstract) Wojciech Rytter z. Warsaw University. and. University of Liverpool Constant-Space String-Matching in Sublinear Average Tie (Extended Abstract) Maxie Crocheore Universite de Marne-la-Vallee Leszek Gasieniec y Max-Planck Institut fur Inforatik Wojciech Rytter z Warsaw University

More information

Fast Montgomery-like Square Root Computation over GF(2 m ) for All Trinomials

Fast Montgomery-like Square Root Computation over GF(2 m ) for All Trinomials Fast Montgoery-like Square Root Coputation over GF( ) for All Trinoials Yin Li a, Yu Zhang a, a Departent of Coputer Science and Technology, Xinyang Noral University, Henan, P.R.China Abstract This letter

More information

Nonmonotonic Networks. a. IRST, I Povo (Trento) Italy, b. Univ. of Trento, Physics Dept., I Povo (Trento) Italy

Nonmonotonic Networks. a. IRST, I Povo (Trento) Italy, b. Univ. of Trento, Physics Dept., I Povo (Trento) Italy Storage Capacity and Dynaics of Nononotonic Networks Bruno Crespi a and Ignazio Lazzizzera b a. IRST, I-38050 Povo (Trento) Italy, b. Univ. of Trento, Physics Dept., I-38050 Povo (Trento) Italy INFN Gruppo

More information

A Simple Regression Problem

A Simple Regression Problem A Siple Regression Proble R. M. Castro March 23, 2 In this brief note a siple regression proble will be introduced, illustrating clearly the bias-variance tradeoff. Let Y i f(x i ) + W i, i,..., n, where

More information

Chalmers Publication Library. Copyright Notice

Chalmers Publication Library. Copyright Notice Chalmers Publication Library Copyright Notice " ACM, 009. This is the author's version of the work. It is posted here by permission of ACM for your personal use. Not for redistribution. The definitive

More information

DERIVING PROPER UNIFORM PRIORS FOR REGRESSION COEFFICIENTS

DERIVING PROPER UNIFORM PRIORS FOR REGRESSION COEFFICIENTS DERIVING PROPER UNIFORM PRIORS FOR REGRESSION COEFFICIENTS N. van Erp and P. van Gelder Structural Hydraulic and Probabilistic Design, TU Delft Delft, The Netherlands Abstract. In probles of odel coparison

More information

Generalized Writing on Dirty Paper

Generalized Writing on Dirty Paper Generalized Writing on Dirty Paper Aaron S. Cohen acohen@mit.edu MIT, 36-689 77 Massachusetts Ave. Cambridge, MA 02139-4307 Amos Lapidoth lapidoth@isi.ee.ethz.ch ETF E107 ETH-Zentrum CH-8092 Zürich, Switzerland

More information

Low-complexity, Low-memory EMS algorithm for non-binary LDPC codes

Low-complexity, Low-memory EMS algorithm for non-binary LDPC codes Low-coplexity, Low-eory EMS algorith for non-binary LDPC codes Adrian Voicila,David Declercq, François Verdier ETIS ENSEA/CP/CNRS MR-85 954 Cergy-Pontoise, (France) Marc Fossorier Dept. Electrical Engineering

More information

Using EM To Estimate A Probablity Density With A Mixture Of Gaussians

Using EM To Estimate A Probablity Density With A Mixture Of Gaussians Using EM To Estiate A Probablity Density With A Mixture Of Gaussians Aaron A. D Souza adsouza@usc.edu Introduction The proble we are trying to address in this note is siple. Given a set of data points

More information

13.2 Fully Polynomial Randomized Approximation Scheme for Permanent of Random 0-1 Matrices

13.2 Fully Polynomial Randomized Approximation Scheme for Permanent of Random 0-1 Matrices CS71 Randoness & Coputation Spring 018 Instructor: Alistair Sinclair Lecture 13: February 7 Disclaier: These notes have not been subjected to the usual scrutiny accorded to foral publications. They ay

More information

Fundamental Limits of Database Alignment

Fundamental Limits of Database Alignment Fundaental Liits of Database Alignent Daniel Cullina Dept of Electrical Engineering Princeton University dcullina@princetonedu Prateek Mittal Dept of Electrical Engineering Princeton University pittal@princetonedu

More information

Antenna Saturation Effects on MIMO Capacity

Antenna Saturation Effects on MIMO Capacity Antenna Saturation Effects on MIMO Capacity T S Pollock, T D Abhayapala, and R A Kennedy National ICT Australia Research School of Inforation Sciences and Engineering The Australian National University,

More information

On the Capacity of Free-Space Optical Intensity Channels

On the Capacity of Free-Space Optical Intensity Channels On the Capacity of Free-Space Optical Intensity Channels Amos Lapidoth TH Zurich Zurich, Switzerl mail: lapidoth@isi.ee.ethz.ch Stefan M. Moser National Chiao Tung University NCTU Hsinchu, Taiwan mail:

More information

New Designs for Bit-Interleaved Coded Modulation with Hard-Decision Feedback Iterative Decoding

New Designs for Bit-Interleaved Coded Modulation with Hard-Decision Feedback Iterative Decoding 1 New Designs for Bit-Interleaved Coded Modulation with Hard-Decision Feedback Iterative Decoding Alireza Kenarsari-Anhari, Student Member, IEEE, and Lutz Lampe, Senior Member, IEEE Abstract Bit-interleaved

More information

Polar Code Construction for List Decoding

Polar Code Construction for List Decoding 1 Polar Code Construction for List Decoding Peihong Yuan, Tobias Prinz, Georg Böcherer arxiv:1707.09753v1 [cs.it] 31 Jul 2017 Abstract A heuristic construction of polar codes for successive cancellation

More information

A Smoothed Boosting Algorithm Using Probabilistic Output Codes

A Smoothed Boosting Algorithm Using Probabilistic Output Codes A Soothed Boosting Algorith Using Probabilistic Output Codes Rong Jin rongjin@cse.su.edu Dept. of Coputer Science and Engineering, Michigan State University, MI 48824, USA Jian Zhang jian.zhang@cs.cu.edu

More information

Uniform Approximation and Bernstein Polynomials with Coefficients in the Unit Interval

Uniform Approximation and Bernstein Polynomials with Coefficients in the Unit Interval Unifor Approxiation and Bernstein Polynoials with Coefficients in the Unit Interval Weiang Qian and Marc D. Riedel Electrical and Coputer Engineering, University of Minnesota 200 Union St. S.E. Minneapolis,

More information

Randomized Recovery for Boolean Compressed Sensing

Randomized Recovery for Boolean Compressed Sensing Randoized Recovery for Boolean Copressed Sensing Mitra Fatei and Martin Vetterli Laboratory of Audiovisual Counication École Polytechnique Fédéral de Lausanne (EPFL) Eail: {itra.fatei, artin.vetterli}@epfl.ch

More information

arxiv: v1 [cs.ds] 3 Feb 2014

arxiv: v1 [cs.ds] 3 Feb 2014 arxiv:40.043v [cs.ds] 3 Feb 04 A Bound on the Expected Optiality of Rando Feasible Solutions to Cobinatorial Optiization Probles Evan A. Sultani The Johns Hopins University APL evan@sultani.co http://www.sultani.co/

More information

Linear Precoding for Large MIMO Configurations and QAM Constellations

Linear Precoding for Large MIMO Configurations and QAM Constellations 1 Linear Precoding for Large MIMO Configurations and QAM Constellations Abstract In this paper, the proble of designing a linear precoder for Multiple-Input Multiple-Output (MIMO systes in conjunction

More information

arxiv: v1 [cs.it] 4 Jun 2018

arxiv: v1 [cs.it] 4 Jun 2018 State-Dependent Interference Channel with Correlated States 1 Yunhao Sun, 2 Ruchen Duan, 3 Yingbin Liang, 4 Shlomo Shamai (Shitz) 5 Abstract arxiv:180600937v1 [csit] 4 Jun 2018 This paper investigates

More information

Intelligent Systems: Reasoning and Recognition. Perceptrons and Support Vector Machines

Intelligent Systems: Reasoning and Recognition. Perceptrons and Support Vector Machines Intelligent Systes: Reasoning and Recognition Jaes L. Crowley osig 1 Winter Seester 2018 Lesson 6 27 February 2018 Outline Perceptrons and Support Vector achines Notation...2 Linear odels...3 Lines, Planes

More information

CSE525: Randomized Algorithms and Probabilistic Analysis May 16, Lecture 13

CSE525: Randomized Algorithms and Probabilistic Analysis May 16, Lecture 13 CSE55: Randoied Algoriths and obabilistic Analysis May 6, Lecture Lecturer: Anna Karlin Scribe: Noah Siegel, Jonathan Shi Rando walks and Markov chains This lecture discusses Markov chains, which capture

More information

Fairness via priority scheduling

Fairness via priority scheduling Fairness via priority scheduling Veeraruna Kavitha, N Heachandra and Debayan Das IEOR, IIT Bobay, Mubai, 400076, India vavitha,nh,debayan}@iitbacin Abstract In the context of ulti-agent resource allocation

More information

Lower Bounds for Quantized Matrix Completion

Lower Bounds for Quantized Matrix Completion Lower Bounds for Quantized Matrix Copletion Mary Wootters and Yaniv Plan Departent of Matheatics University of Michigan Ann Arbor, MI Eail: wootters, yplan}@uich.edu Mark A. Davenport School of Elec. &

More information

Computable Shell Decomposition Bounds

Computable Shell Decomposition Bounds Coputable Shell Decoposition Bounds John Langford TTI-Chicago jcl@cs.cu.edu David McAllester TTI-Chicago dac@autoreason.co Editor: Leslie Pack Kaelbling and David Cohn Abstract Haussler, Kearns, Seung

More information

4196 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 64, NO. 10, OCTOBER 2016

4196 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 64, NO. 10, OCTOBER 2016 4196 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 64, NO. 10, OCTOBER 2016 Linear Precoding ain for Large MIMO Configurations With QAM and Reduced Coplexity Thoas Ketseoglou, Senior Meber, IEEE, and Ender

More information

Compressive Sensing Over Networks

Compressive Sensing Over Networks Forty-Eighth Annual Allerton Conference Allerton House, UIUC, Illinois, USA Septeber 29 - October, 200 Copressive Sensing Over Networks Soheil Feizi MIT Eail: sfeizi@it.edu Muriel Médard MIT Eail: edard@it.edu

More information

The PPM Poisson Channel: Finite-Length Bounds and Code Design

The PPM Poisson Channel: Finite-Length Bounds and Code Design August 21, 2014 The PPM Poisson Channel: Finite-Length Bounds and Code Design Flavio Zabini DEI - University of Bologna and Institute for Communications and Navigation German Aerospace Center (DLR) Balazs

More information

1 Bounding the Margin

1 Bounding the Margin COS 511: Theoretical Machine Learning Lecturer: Rob Schapire Lecture #12 Scribe: Jian Min Si March 14, 2013 1 Bounding the Margin We are continuing the proof of a bound on the generalization error of AdaBoost

More information

Support Vector Machines. Machine Learning Series Jerry Jeychandra Blohm Lab

Support Vector Machines. Machine Learning Series Jerry Jeychandra Blohm Lab Support Vector Machines Machine Learning Series Jerry Jeychandra Bloh Lab Outline Main goal: To understand how support vector achines (SVMs) perfor optial classification for labelled data sets, also a

More information

Detection and Estimation Theory

Detection and Estimation Theory ESE 54 Detection and Estiation Theory Joseph A. O Sullivan Sauel C. Sachs Professor Electronic Systes and Signals Research Laboratory Electrical and Systes Engineering Washington University 11 Urbauer

More information

Sharp Time Data Tradeoffs for Linear Inverse Problems

Sharp Time Data Tradeoffs for Linear Inverse Problems Sharp Tie Data Tradeoffs for Linear Inverse Probles Saet Oyak Benjain Recht Mahdi Soltanolkotabi January 016 Abstract In this paper we characterize sharp tie-data tradeoffs for optiization probles used

More information

HIGH RESOLUTION NEAR-FIELD MULTIPLE TARGET DETECTION AND LOCALIZATION USING SUPPORT VECTOR MACHINES

HIGH RESOLUTION NEAR-FIELD MULTIPLE TARGET DETECTION AND LOCALIZATION USING SUPPORT VECTOR MACHINES ICONIC 2007 St. Louis, O, USA June 27-29, 2007 HIGH RESOLUTION NEAR-FIELD ULTIPLE TARGET DETECTION AND LOCALIZATION USING SUPPORT VECTOR ACHINES A. Randazzo,. A. Abou-Khousa 2,.Pastorino, and R. Zoughi

More information

Tight Information-Theoretic Lower Bounds for Welfare Maximization in Combinatorial Auctions

Tight Information-Theoretic Lower Bounds for Welfare Maximization in Combinatorial Auctions Tight Inforation-Theoretic Lower Bounds for Welfare Maxiization in Cobinatorial Auctions Vahab Mirrokni Jan Vondrák Theory Group, Microsoft Dept of Matheatics Research Princeton University Redond, WA 9805

More information

arxiv: v1 [cs.ds] 17 Mar 2016

arxiv: v1 [cs.ds] 17 Mar 2016 Tight Bounds for Single-Pass Streaing Coplexity of the Set Cover Proble Sepehr Assadi Sanjeev Khanna Yang Li Abstract arxiv:1603.05715v1 [cs.ds] 17 Mar 2016 We resolve the space coplexity of single-pass

More information

Optimal Power Control in Decentralized Gaussian Multiple Access Channels

Optimal Power Control in Decentralized Gaussian Multiple Access Channels 1 Optimal Power Control in Decentralized Gaussian Multiple Access Channels Kamal Singh Department of Electrical Engineering Indian Institute of Technology Bombay. arxiv:1711.08272v1 [eess.sp] 21 Nov 2017

More information

Optimal Resource Allocation in Multicast Device-to-Device Communications Underlaying LTE Networks

Optimal Resource Allocation in Multicast Device-to-Device Communications Underlaying LTE Networks 1 Optial Resource Allocation in Multicast Device-to-Device Counications Underlaying LTE Networks Hadi Meshgi 1, Dongei Zhao 1 and Rong Zheng 2 1 Departent of Electrical and Coputer Engineering, McMaster

More information

On random Boolean threshold networks

On random Boolean threshold networks On rando Boolean threshold networs Reinhard Hecel, Steffen Schober and Martin Bossert Institute of Telecounications and Applied Inforation Theory Ul University Albert-Einstein-Allee 43, 89081Ul, Gerany

More information

A Theoretical Analysis of a Warm Start Technique

A Theoretical Analysis of a Warm Start Technique A Theoretical Analysis of a War Start Technique Martin A. Zinkevich Yahoo! Labs 701 First Avenue Sunnyvale, CA Abstract Batch gradient descent looks at every data point for every step, which is wasteful

More information

Complexity reduction in low-delay Farrowstructure-based. filters utilizing linear-phase subfilters

Complexity reduction in low-delay Farrowstructure-based. filters utilizing linear-phase subfilters Coplexity reduction in low-delay Farrowstructure-based variable fractional delay FIR filters utilizing linear-phase subfilters Air Eghbali and Håkan Johansson Linköping University Post Print N.B.: When

More information

New Bounds for Learning Intervals with Implications for Semi-Supervised Learning

New Bounds for Learning Intervals with Implications for Semi-Supervised Learning JMLR: Workshop and Conference Proceedings vol (1) 1 15 New Bounds for Learning Intervals with Iplications for Sei-Supervised Learning David P. Helbold dph@soe.ucsc.edu Departent of Coputer Science, University

More information

Rademacher Complexity Margin Bounds for Learning with a Large Number of Classes

Rademacher Complexity Margin Bounds for Learning with a Large Number of Classes Radeacher Coplexity Margin Bounds for Learning with a Large Nuber of Classes Vitaly Kuznetsov Courant Institute of Matheatical Sciences, 25 Mercer street, New York, NY, 002 Mehryar Mohri Courant Institute

More information

Subset Typicality Lemmas and Improved Achievable Regions in Multiterminal Source Coding

Subset Typicality Lemmas and Improved Achievable Regions in Multiterminal Source Coding Subset Typicality Lemmas and Improved Achievable Regions in Multiterminal Source Coding Kumar Viswanatha, Emrah Akyol and Kenneth Rose ECE Department, University of California - Santa Barbara {kumar,eakyol,rose}@ece.ucsb.edu

More information

Device-to-Device Collaboration through Distributed Storage

Device-to-Device Collaboration through Distributed Storage Device-to-Device Collaboration through Distributed Storage Negin Golrezaei, Student Meber, IEEE, Alexandros G Diakis, Meber, IEEE, Andreas F Molisch, Fellow, IEEE Dept of Electrical Eng University of Southern

More information

Threshold Optimization for Capacity-Achieving Discrete Input One-Bit Output Quantization

Threshold Optimization for Capacity-Achieving Discrete Input One-Bit Output Quantization Threshold Optimization for Capacity-Achieving Discrete Input One-Bit Output Quantization Rudolf Mathar Inst. for Theoretical Information Technology RWTH Aachen University D-556 Aachen, Germany mathar@ti.rwth-aachen.de

More information

Genetic Quantum Algorithm and its Application to Combinatorial Optimization Problem

Genetic Quantum Algorithm and its Application to Combinatorial Optimization Problem Genetic Quantu Algorith and its Application to Cobinatorial Optiization Proble Kuk-Hyun Han Dept. of Electrical Engineering, KAIST, 373-, Kusong-dong Yusong-gu Taejon, 305-70, Republic of Korea khhan@vivaldi.kaist.ac.kr

More information

Multi-Dimensional Hegselmann-Krause Dynamics

Multi-Dimensional Hegselmann-Krause Dynamics Multi-Diensional Hegselann-Krause Dynaics A. Nedić Industrial and Enterprise Systes Engineering Dept. University of Illinois Urbana, IL 680 angelia@illinois.edu B. Touri Coordinated Science Laboratory

More information

Probability Distributions

Probability Distributions Probability Distributions In Chapter, we ephasized the central role played by probability theory in the solution of pattern recognition probles. We turn now to an exploration of soe particular exaples

More information

On the Duality between Multiple-Access Codes and Computation Codes

On the Duality between Multiple-Access Codes and Computation Codes On the Duality between Multiple-Access Codes and Computation Codes Jingge Zhu University of California, Berkeley jingge.zhu@berkeley.edu Sung Hoon Lim KIOST shlim@kiost.ac.kr Michael Gastpar EPFL michael.gastpar@epfl.ch

More information

Principles of Coded Modulation. Georg Böcherer

Principles of Coded Modulation. Georg Böcherer Principles of Coded Modulation Georg Böcherer Contents. Introduction 9 2. Digital Communication System 2.. Transmission System............................. 2.2. Figures of Merit................................

More information