(Structured) Coding for Real-Time Streaming Communication
|
|
- Theodore Hicks
- 5 years ago
- Views:
Transcription
1 (Structured) Coding for Real-Time Streaming Communication Ashish Khisti Department of Electrical and Computer Engineering University of Toronto Joint work with: Ahmed Badr (Toronto), Farrokh Etezadi (Toronto), Wai-Tian Tan (Cisco), John Apostolopoulos (Cisco), Mitchell Trott (Luminate Wireless) October 9, 2014 University of Michigan, Ann Arbor
2 Multimedia Streaming Source Stream Latency Receiver Interrup;on Network Receiver 2 Latency Interrup;on Streaming Server Receiver 3 Applications Application Bit-Rate (Mbps) MSDU (B) Delay (ms) PLR Video Conf. 2 Mbps ms 10 4 Interactive Gaming 1 Mbps ms 10 4 Video Streaming 4 Mbps ms 10 6 October 9, 2014 University of Michigan, Ann Arbor 2/ 1
3 Multimedia Streaming Source Stream Latency Receiver Interrup;on Network Receiver 2 Latency Interrup;on Streaming Server Receiver 3 Packet-Loss Analysis Burst Losses - High Performance Degradation FEC vs Retransmission October 9, 2014 University of Michigan, Ann Arbor 2/ 1
4 Outline Real-Time Streaming Communication Streaming Error Correction Streaming Compression Collaborators: Ahmed Badr (Toronto) John Apostolopoulos (Cisco) Wai-Tian Tan (Cisco) Collaborators: Farrokh Etezadi (Toronto) Mitchell Trott October 9, 2014 University of Michigan, Ann Arbor 3/ 1
5 Outline Real-Time Streaming Communication Streaming Error Correction Streaming Compression Collaborators: Ahmed Badr (Toronto) John Apostolopoulos (Cisco) Wai-Tian Tan (Cisco) Collaborators: Farrokh Etezadi (Toronto) Mitchell Trott Physical Layer Security (Time Permitting) October 9, 2014 University of Michigan, Ann Arbor 3/ 1
6 Real-Time Communication System October 9, 2014 University of Michigan, Ann Arbor 4/ 1
7 Real-Time Communication System October 9, 2014 University of Michigan, Ann Arbor 4/ 1
8 Real-Time Communication System October 9, 2014 University of Michigan, Ann Arbor 4/ 1
9 Real-Time Communication System October 9, 2014 University of Michigan, Ann Arbor 4/ 1
10 Real-Time Communication System October 9, 2014 University of Michigan, Ann Arbor 4/ 1
11 Real-Time Communication System October 9, 2014 University of Michigan, Ann Arbor 4/ 1
12 Real-Time Communication System October 9, 2014 University of Michigan, Ann Arbor 4/ 1
13 Real-Time Communication System October 9, 2014 University of Michigan, Ann Arbor 4/ 1
14 Real-Time Communication System October 9, 2014 University of Michigan, Ann Arbor 4/ 1
15 Real-Time Communication System October 9, 2014 University of Michigan, Ann Arbor 4/ 1
16 Real-Time Communication System October 9, 2014 University of Michigan, Ann Arbor 4/ 1
17 Real-Time Communication System October 9, 2014 University of Michigan, Ann Arbor 4/ 1
18 Proposed Channel Model 1- Good Bad 1- Bad State Good State Bad State Gilbert-Elliott Model Structural Properties Performance Gains October 9, 2014 University of Michigan, Ann Arbor 5/ 1
19 Proposed Channel Model 1- Good Bad 1- Bad State Good State Bad State Gilbert-Elliott Model Sliding Window Erasure Channel: C(N, B, W ) In any sliding window of length W, the channel can introduce only one of the following: An erasure burst of maximum length B Upto N erasures in arbitrary positions October 9, 2014 University of Michigan, Ann Arbor 5/ 1
20 Sliding Window Erasure Channel: Remarks (N,B,W) = (2,3,6) W = 6 N = 2 October 9, 2014 University of Michigan, Ann Arbor 6/ 1
21 Sliding Window Erasure Channel: Remarks (N,B,W) = (2,3,6) W = W 6= 6 N = N 2= 2 October 9, 2014 University of Michigan, Ann Arbor 6/ 1
22 Sliding Window Erasure Channel: Remarks (N,B,W) = (2,3,6) W = W 6= W 6= 6 N = N 2= N 2= 2 October 9, 2014 University of Michigan, Ann Arbor 6/ 1
23 Sliding Window Erasure Channel: Remarks (N,B,W) = (2,3,6) W = W 6= W 6= W 6= 6 N = N 2= N 2= B 2= 3 October 9, 2014 University of Michigan, Ann Arbor 6/ 1
24 Sliding Window Erasure Channel: Remarks (N,B,W) = (2,3,6) W = W 6= W 6= W 6= W 6= 6 N = N 2= N 2= B 2= B 3= 3 C(N = 1, B, W ): Burst-Erasure Channel October 9, 2014 University of Michigan, Ann Arbor 6/ 1
25 Sliding Window Erasure Channel: Remarks (N,B,W) = (2,3,6) W = W 6= W 6= W 6= W 6= 6 N = N 2= N 2= B 2= B 3= 3 C(N = 1, B, W ): Burst-Erasure Channel B W-1 B W-1 October 9, 2014 University of Michigan, Ann Arbor 6/ 1
26 Sliding Window Erasure Channel: Remarks (N,B,W) = (2,3,6) W = W 6= W 6= W 6= W 6= 6 N = N 2= N 2= B 2= B 3= 3 C(N = 1, B, W ): Burst-Erasure Channel C(N, B, W ): Worst-Case B W-N B W-N October 9, 2014 University of Michigan, Ann Arbor 6/ 1
27 Problem Setup - Sliding Window Erasure Channel Model Source Model : i.i.d. sequence s[t] p s ( )= Unif{(F q ) k } Streaming Encoder: x[t] = f t (s[0],..., s[t]), x[t] (F q ) n Erasure Channel: (Sliding Window Model) Delay-Constrained Decoder: ŝ[t] = g t (y[0],..., y[t + T ]) Rate R = k n Streaming Capacity A rate R is achievable over the C(N, B, W ) channel, if there is a sequence of encoding and decoding functions, f t ( ) and g t ( ) respectively over a sufficiently large field F q, with delay T and rate R = k n. The supremum of achievable rates is the streaming capacity. October 9, 2014 University of Michigan, Ann Arbor 7/ 1
28 Problem Setup - Sliding Window Erasure Channel Model Source Model : i.i.d. sequence s[t] p s ( )= Unif{(F q ) k } Streaming Encoder: x[t] = f t (s[0],..., s[t]), x[t] (F q ) n Erasure Channel: (Sliding Window Model) Delay-Constrained Decoder: ŝ[t] = g t (y[0],..., y[t + T ]) Rate R = k n Streaming Capacity A rate R is achievable over the C(N, B, W ) channel, if there is a sequence of encoding and decoding functions, f t ( ) and g t ( ) respectively over a sufficiently large field F q, with delay T and rate R = k n. The supremum of achievable rates is the streaming capacity. Worst Case Definition Arbitrarily large field size October 9, 2014 University of Michigan, Ann Arbor 7/ 1
29 Main Result Badr-Patil-Khisti-Tan-Apostolopoulos, IEEE Trans. on Inform. Theory (Under Review) Theorem Consider the C(N, B, W ) channel, with W B + 1, and let the delay be T. Upper-Bound For any rate R code, we have: ( R 1 R ) B + N min(w, T + 1) Lower-Bound: There exists a rate R code that satisfies: ( ) R B + N min(w, T + 1) 1. 1 R The gap between the upper and lower bound is 1 unit of delay. October 9, 2014 University of Michigan, Ann Arbor 8/ 1
30 Baseline Codes - Full Rank Condition k n s 0 s 1 s 2 s 3 s 4 s 5 s 6 s 7 x i p 0 p 1 p 2 p 3 p 4 p 5 p 6 p 7 p i = s i H 0 + s i 1 H s i M H M, Erasure Codes: H i F k n k q Random Linear Codes Strongly-MDS Codes (Gabidulin 88, Gluesing-Luerssen 06 ) October 9, 2014 University of Michigan, Ann Arbor 9/ 1
31 Baseline Codes - Full Rank Condition k n s 0 s 1 s 2 s 3 s 4 s 5 s 6 s 7 x i p 0 p 1 p 2 p 3 p 4 p 5 p 6 p 7 p i = s i H 0 + s i 1 H s i M H M, Erasure Codes: H i F k n k q Random Linear Codes Strongly-MDS Codes (Gabidulin 88, Gluesing-Luerssen 06 ) October 9, 2014 University of Michigan, Ann Arbor 9/ 1
32 Baseline Codes - Full Rank Condition k n s 0 s 1 s 2 s 3 s 4 s 5 s 6 s 7 x i p 0 p 1 p 2 p 3 p 4 p 5 p 6 p 7 p i = s i H 0 + s i 1 H s i M H M, Erasure Codes: H i F k n k q Random Linear Codes Strongly-MDS Codes (Gabidulin 88, Gluesing-Luerssen 06 ) October 9, 2014 University of Michigan, Ann Arbor 9/ 1
33 Baseline Codes - Full Rank Condition k n s 0 s 1 s 2 s 3 s 4 s 5 s 6 s 7 x i p 0 p 1 p 2 p 3 p 4 p 5 p 6 p 7 p i = s i H 0 + s i 1 H s i M H M, Erasure Codes: H i F k n k q Random Linear Codes Strongly-MDS Codes (Gabidulin 88, Gluesing-Luerssen 06 ) October 9, 2014 University of Michigan, Ann Arbor 9/ 1
34 Baseline Codes - Full Rank Condition k n s 0 s 1 s 2 s 3 s 4 s 5 s 6 s 7 x i p 0 p 1 p 2 p 3 p 4 p 5 p 6 p 7 p i = s i H 0 + s i 1 H s i M H M, Erasure Codes: H i F k n k q Random Linear Codes Strongly-MDS Codes (Gabidulin 88, Gluesing-Luerssen 06 ) October 9, 2014 University of Michigan, Ann Arbor 9/ 1
35 Baseline Codes - Full Rank Condition k n s 0 s 1 s 2 s 3 s 4 s 5 s 6 s 7 x i p 0 p 1 p 2 p 3 p 4 p 5 p 6 p 7 p i = s i H 0 + s i 1 H s i M H M, Erasure Codes: H i F k n k q Random Linear Codes Strongly-MDS Codes (Gabidulin 88, Gluesing-Luerssen 06 ) October 9, 2014 University of Michigan, Ann Arbor 9/ 1
36 Baseline Codes - Full Rank Condition k n s 0 s 1 s 2 s 3 s 4 s 5 s 6 s 7 x i p 0 p 1 p 2 p 3 p 4 p 5 p 6 p 7 p i = s i H 0 + s i 1 H s i M H M, Erasure Codes: Recover s 0, s 1, s 2, s 3 H i F k n k q Random Linear Codes Strongly-MDS Codes (Gabidulin 88, Gluesing-Luerssen 06 ) October 9, 2014 University of Michigan, Ann Arbor 9/ 1
37 Baseline Codes - Full Rank Condition k n s 0 s 1 s 2 s 3 s 4 s 5 s 6 s 7 x i p 0 p 1 p 2 p 3 p 4 p 5 p 6 p 7 p i = s i H 0 + s i 1 H s i M H M, Erasure Codes: Recover s 0, s 1, s 2, s 3 H i F k n k q Random Linear Codes Strongly-MDS Codes (Gabidulin 88, Gluesing-Luerssen 06 ) October 9, 2014 University of Michigan, Ann Arbor 9/ 1
38 Baseline Codes - Full Rank Condition k n s 0 s 1 s 2 s 3 s 4 s 5 s 6 s 7 x i p 0 p 1 p 2 p 3 p 4 p 5 p 6 p 7 p i = s i H 0 + s i 1 H s i M H M, Erasure Codes: Recover s 0, s 1, s 2, s 3 H i F k n k q Random Linear Codes Strongly-MDS Codes (Gabidulin 88, Gluesing-Luerssen 06 ) p 4 H 4 H 3 H 2 H 1 s 0 p 5 p 6 = H 5 H 4 H 3 H 2 s 1 0 H 5 H 4 H 3 s 2 p H 5 H 4 s 3 }{{} full rank October 9, 2014 University of Michigan, Ann Arbor 9/ 1
39 Streaming Code - Example B = 4, T = 8, R = T T +B = 2 3 Rate 1/2 Baseline Erasure Codes, T = 7 v 0 v 1 v 2 v 3 v 4 v 5 v 6 v 7 p 0 p 1 p 2 p 3 p 4 p 5 p 6 p 7 v 8 v 9 v 10 v 11 p 8 p 9 p 10 p 11 x i v 0,v 1,v 2,v 3 October 9, 2014 University of Michigan, Ann Arbor 10/ 1
40 Streaming Code - Example B = 4, T = 8, R = T T +B = 2 3 Rate 1/2 Baseline Erasure Codes, T = 7 v 0 v 1 v 2 v 3 v 4 v 5 v 6 v 7 p 0 p 1 p 2 p 3 p 4 p 5 p 6 p 7 v 8 v 9 v 10 v 11 p 8 p 9 p 10 p 11 x i Rate 1/2 Repetition Code, T = 8 v 0,v 1,v 2,v 3 u 0 u 1 u 2 u 3 u 4 u 5 u 6 u 7 u -8 u -7 u -6 u -5 u -4 u -3 u -2 u -1 u 8 u 9 u 10 u 11 u 0 u 1 u 2 u 3 x i u 0 u 1 u 2 u 3 October 9, 2014 University of Michigan, Ann Arbor 10/ 1
41 Streaming Code - Example B = 4, T = 8, R = T T +B = 2 3 v 0 v 1 v 2 v 3 v 4 v 5 v 6 v 7 v 8 v 9 v 10 v 11 p 0 p 1 p 2 p 3 p 4 p 5 p 6 p 7 p 8 p 9 p 10 p 11 v u u 0 u 1 u 2 u 3 u 4 u 5 u 6 u 7 u 8 u 9 u 10 u 11 u -8 u -7 u -6 u -5 u -4 u -3 u -2 u -1 u 0 u 1 u 2 u 3 u u October 9, 2014 University of Michigan, Ann Arbor 11/ 1
42 Streaming Code - Example B = 4, T = 8, R = T T +B = 2 3 u 0 v 0 v 1 v 2 v 3 v 4 v 5 v 6 v 7 v 8 v 9 v 10 v 11 p 0 p 1 p 2 p 3 p 4 p 5 p 6 p 7 p 8 p 9 p 10 u -8 u 1 u -7 u 2 u -6 u 3 u -5 u 4 u -4 u 5 u -3 u 6 u -2 u 7 u -1 u 8 u 0 u 9 u 1 u 10 u 2 u 11 p 11 u 3 u v u u R= u+v 3u+v = 1 2 October 9, 2014 University of Michigan, Ann Arbor 11/ 1
43 Streaming Code - Example B = 4, T = 8, R = T T +B = 2 3 s i u 0 u 1 u 2 u 3 u 4 u 5 u 6 u 7 u 8 u 9 u 10 u 11 v 0 v 1 v 2 v 3 v 4 v 5 v 6 v 7 v 8 v 9 v 10 v 11 p 0 p 1 p 2 p 3 p 4 p 5 p 6 p 7 p 8 p 9 p 10 p 11 +u -8 +u -7 +u -6 +u -5 +u -3 +u -2 +u -1 +u 0 +u 1 +u 2 +u 3 +u -4 u v u x i R= u+v 2 u+v = 2 3 October 9, 2014 University of Michigan, Ann Arbor 11/ 1
44 Streaming Code - Example B = 4, T = 8, R = T T +B = 2 3 s i u 0 u 1 u 2 u 3 u 4 u 5 u 6 u 7 u 8 u 9 u 10 u 11 v 0 v 1 v 2 v 3 v 4 v 5 v 6 v 7 v 8 v 9 v 10 v 11 p 0 p 1 p 2 p 3 p 4 p 5 p 6 p 7 p 8 p 9 p 10 p 11 +u -8 +u -7 +u -6 +u -5 +u -3 +u -2 +u -1 +u 0 +u 1 +u 2 +u 3 +u -4 u v u x i R= u v 2 u v Encoding: 1 Source Splitting: s i = (u i, v i ), u i F B q, v i F T B q 2 Erasure Code on v i : Generate v i (v i, p i ) where p i F B q is obtained from a Strongly-MDS code. 3 Repetition Code on u i : Repeat the u i symbols with a shift of T 4 Merging: Combine the repeated u i s with the p i s 5 Rate: R = T T +B October 9, 2014 University of Michigan, Ann Arbor 11/ 1
45 Streaming Code - Example B = 4, T = 8, R = T T +B = 2 3 s i u 0 u 1 u 2 u 3 u 4 u 5 u 6 u 7 u 8 u 9 u 10 u 11 v 0 v 1 v 2 v 3 v 4 v 5 v 6 v 7 v 8 v 9 v 10 v 11 p 0 p 1 p 2 p 3 p 4 p 5 p 6 p 7 p 8 p 9 p 10 p 11 +u -8 +u -7 +u -6 +u -5 +u -3 +u -2 +u -1 +u 0 +u 1 +u 2 +u 3 +u -4 u v u x i R= u+v 2 u+v = 2 3 v 0,v 1,v 2,v 3 Encoding: 1 Source Splitting: s i = (u i, v i ), u i F B q, v i F T B q 2 Erasure Code on v i : Generate v i (v i, p i ) where p i F B q is obtained from a Strongly-MDS code. 3 Repetition Code on u i : Repeat the u i symbols with a shift of T 4 Merging: Combine the repeated u i s with the p i s 5 Rate: R = T T +B October 9, 2014 University of Michigan, Ann Arbor 11/ 1
46 Streaming Code - Example B = 4, T = 8, R = T T +B = 2 3 s i u 0 u 1 u 2 u 3 u 4 u 5 u 6 u 7 u 8 u 9 u 10 u 11 v 0 v 1 v 2 v 3 v 4 v 5 v 6 v 7 v 8 v 9 v 10 v 11 p 0 p 1 p 2 p 3 p 4 p 5 p 6 p 7 p 8 p 9 p 10 p 11 +u -8 +u -7 +u -6 +u -5 +u -3 +u -2 +u -1 +u 0 +u 1 +u 2 +u 3 +u -4 u v u x i R= u v 2 u v v 0,v 1,v 2,v 3 u 0 u 1 u 2 u 3 Encoding: 1 Source Splitting: s i = (u i, v i ), u i F B q, v i F T B q 2 Erasure Code on v i : Generate v i (v i, p i ) where p i F B q is obtained from a Strongly-MDS code. 3 Repetition Code on u i : Repeat the u i symbols with a shift of T 4 Merging: Combine the repeated u i s with the p i s 5 Rate: R = T T +B October 9, 2014 University of Michigan, Ann Arbor 11/ 1
47 Streaming Code - Example B = 4, T = 8, R = T T +B = 2 3 s i u 0 u 1 u 2 u 3 u 4 u 5 u 6 u 7 u 8 u 9 u 10 u 11 v 0 v 1 v 2 v 3 v 4 v 5 v 6 v 7 v 8 v 9 v 10 v 11 p 0 p 1 p 2 p 3 p 4 p 5 p 6 p 7 p 8 p 9 p 10 p 11 +u -8 +u -7 +u -6 +u -5 +u -3 +u -2 +u -1 +u 0 +u 1 +u 2 +u 3 +u -4 u v u x i R= u+v 2 u+v = 2 3 v 0,v 1,v 2,v 3 u 0 u 1 u 2 u 3 Encoding: s 0 s 1 s 2 s 3 1 Source Splitting: s i = (u i, v i ), u i F B q, v i F T B q 2 Erasure Code on v i : Generate v i (v i, p i ) where p i F B q is obtained from a Strongly-MDS code. 3 Repetition Code on u i : Repeat the u i symbols with a shift of T 4 Merging: Combine the repeated u i s with the p i s 5 Rate: R = T T +B October 9, 2014 University of Michigan, Ann Arbor 11/ 1
48 Streaming Code - Example B = 4, T = 8, R = s i T T +B = 2 3 v u 0 p v 0 v u 1 p v 1 v u 2 p v 2 v u 3 p v 3 v u 4 p v 4 v u 5 p v 5 v u 6 p v 6 v u 7 7 p v 7 7 v u 8 p v 8 v u 9 p v 9 v u 10 p v 10 v u 11 p v 11 p 0 p 1 p 2 p 3 p 4 p 5 p 6 p 7 p 8 p 9 p 10 p 11 +u -8 +u -7 +u -6 +u -5 +u -4 +u -3 +u -2 +u -1 +u 0 +u 1 +u 2 +u 3 u -8 u -7 u -6 u -5 +u u -4-4 u -3 u 0 u 1 R= u u+v u v 2 u 3 u 4 u 5 u 6 u u+v 1 2 v u v 0,v 1,v 2,v 3 u 0 u 1 u 2 u 2 = u -8 u -7 u -6 u -5 u -4 u -3 u -2 u -1 u 0 u 1 u 2 Encoding: u -2 u -1 u 0 u 1 u 2 u 3 u 3 s 0 s 1 s 2 s 3 uv vu u u u u x i 1 Source Splitting: s i = (u i, v i ), u i F B q, v i F T B q 2 Erasure Code on v i : Generate v i (v i, p i ) where p i F B q is obtained from a Strongly-MDS code. 3 Repetition Code on u i : Repeat the u i symbols with a shift of T 4 Merging: Combine the repeated u i s with the p i s 5 Rate: R = T T +B October 9, 2014 University of Michigan, Ann Arbor 11/ 1
49 Streaming Code Burst Erasure Channel 1 Source Splitting: s i = (u i, v i ), u i F B q, v i F T B q 2 Erasure Code on v i : Generate v i (v i, p i ) where p i F B q is obtained from a Strongly-MDS code. 3 Repetition Code on u i : Repeat the u i symbols with a shift of T 4 Merging: Combine the repeated u i s with the p i s October 9, 2014 University of Michigan, Ann Arbor 12/ 1
50 Robust Extension: C(N, B, W ) Channel Layered Code Design u 0 u 1 u 2 u 3 u 4 u 5 u 6 u 7 u 8 u 9 u 10 u 11 v 0 v 1 v 2 v 3 v 4 v 5 v 6 v 7 v 8 v 9 v 10 v 11 p 0 p 1 p 2 p 3 p 4 p 5 p 6 p 7 p 8 p 9 p 10 p 11 u +u -8 +u -7 +u -6 +u -5 +u -4 +u -3 +u -2 +u -1 +u 0 +u 1 +u 2 +u 3 q 1 q 2 q 3 q 4 q 5 q 6 q 7 q 8 q 9 q 10 q 11 k q 0 u v x i Burst-Erasure Streaming Code: (u i, v i, p i + u i T ) Erasure Code: q i = M t=1 u i t H u t, q i F k q Concatenation: (u i, v i, p i + u i T, q i ) Attains the lower bound R = T T + B + k October 9, 2014 University of Michigan, Ann Arbor 13/ 1
51 Distance and Span Properties Consider (n, k, m) Convolutional code: x i = m j=0 s i jg j States Trellis Diagram October 9, 2014 University of Michigan, Ann Arbor 14/ 1
52 Distance and Span Properties Consider (n, k, m) Convolutional code: x i = m j=0 s i jg j States Trellis Diagram Free Distance October 9, 2014 University of Michigan, Ann Arbor 14/ 1
53 Distance and Span Properties Consider (n, k, m) Convolutional code: x i = m j=0 s i jg j Column Distance: d T G 0 G 1... G T [ ] 0 G 0... G T 1 s0... s T d T = min [s 0,...,s T ] s 0 0 wt G 0 October 9, 2014 University of Michigan, Ann Arbor 14/ 1
54 Distance and Span Properties Consider (n, k, m) Convolutional code: x i = m j=0 s i jg j Column Distance: d T G 0 G 1... G T [ ] 0 G 0... G T 1 s0... s T d T = min [s 0,...,s T ] s 0 0 wt G 0 October 9, 2014 University of Michigan, Ann Arbor 14/ 1
55 Distance and Span Properties Consider (n, k, m) Convolutional code: x i = m j=0 s i jg j Column Distance: d T G 0 G 1... G T [ ] 0 G 0... G T 1 s0... s T d T = min [s 0,...,s T ] s 0 0 wt G States Column Span in [0,3] October 9, 2014 University of Michigan, Ann Arbor 14/ 1
56 Distance and Span Properties Consider (n, k, m) Convolutional code: x i = m j=0 s i jg j Column Distance: d T G 0 G 1... G T [ ] 0 G 0... G T 1 s0... s T d T = min [s 0,...,s T ] s 0 0 wt G 0 Column Span: c T G 0 G 1... G T [ ] 0 G 0... G T 1 c T = min span s0... s T [s 0,...,s T ]..... s G 0 October 9, 2014 University of Michigan, Ann Arbor 14/ 1
57 Column-Distance & Column Span Tradeoff Badr-Patil-Khisti-Tan-Apostolopoulos 2014 Theorem Consider a C(N, B, W ) channel with delay T and W T + 1. A streaming code is feasible over this channel if and only if it satisfies: d T N + 1 and c T B + 1 October 9, 2014 University of Michigan, Ann Arbor 15/ 1
58 Column-Distance & Column Span Tradeoff Badr-Patil-Khisti-Tan-Apostolopoulos 2014 Theorem Consider a C(N, B, W ) channel with delay T and W T + 1. A streaming code is feasible over this channel if and only if it satisfies: d T N + 1 and c T B + 1 Theorem For any rate R convolutional code and any T 0 the Column-Distance d T and Column-Span c T satisfy the following: ( R 1 R ) c T + d T T R There exists a rate R code (MiDAS Code) over a sufficiently large field that satisfies: ( ) R c T + d T T R 1 R October 9, 2014 University of Michigan, Ann Arbor 15/ 1
59 Simulation Result Gilbert-Elliott Channel (α, β) = (5 10 4, 0.5), T = 12 and R 0.5 Gilbert Elliott Channel Good State: Pr(loss) = ε Bad State: Pr(loss) = 1 1- Good Bad Gilbert Channel (, ) = (5x10 4,0.5) Simulation Length = Probability of Occurence Burst Length October 9, 2014 University of Michigan, Ann Arbor 16/ 1
60 Simulation Results Gilbert-Elliott Channel (α, β) = (5 10 4, 0.5), T = 12 and R Gilbert Elliott Channel (, ) = (5E 4,0.5), T = Loss Probability x 10 3 Code N B Code N B Strongly MDS 6 6 MiDAS 2 9 Burst-Erasure 1 11 October 9, 2014 University of Michigan, Ann Arbor 17/ 1
61 Simulation Results-II Fritchman Channel (α, β) = (1e 5, 0.5) and T = 40 and R = 40/79, 9 states α Good E 1 E 2 E 3 E N-1 E N 1- α α = 1e 5 β = Histogram of Burst Lengths for 9 States Fritchman Channel (, ) = (1E 5,0.5) Analytical Actual Probability of Occurence Burst Length October 9, 2014 University of Michigan, Ann Arbor 18/ 1
62 Simulation Results-II Fritchman Channel (α, β) = (1e 5, 0.5) and T = 40 and R = 40/79, 9 states Uncoded RLC SCo E RLC (Shift = 32) E RLC (Shift = 36) 9 States Fritchman Channel (, ) = (1e 005,0.5), T = 40 Loss Probability x 10 3 Code N B Code N B Strongly MDS MiDAS-I 8 31 Burst Erasure 1 39 MiDAS-II 4 35 October 9, 2014 University of Michigan, Ann Arbor 18/ 1
63 Multicast Streaming Codes Burst Erasure Broadcast Channel Src. Stream Encoder X[i] B 1 Decoder 1 Delay = T 1 B 2 Decoder 2 Delay = T 2 Motivation B 1 < B 2 Receiver 1 : Good Channel State Receiver 2: Weaker Channel State Delay adapts to Channel State October 9, 2014 University of Michigan, Ann Arbor 19/ 1
64 Multicast Streaming Codes Burst Erasure Broadcast Channel Src. Stream Encoder X[i] B 1 Decoder 1 Delay = T 1 B 2 Decoder 2 Delay = T 2 Capacity Function Capacity function C(T 1, T 2, B 1, B 2 ) Single User Upper Bound: C min ( T1 T 1 +B 1, Concatenation Lower Bound: C 1 1+ B 1 T 1 + B 2 T 2 ) T 2 T 2 +B 2 October 9, 2014 University of Michigan, Ann Arbor 19/ 1
65 Multicast Streaming Setup Burst Erasure Broadcast Channel Src. Stream Encoder X[i] B 1 Decoder 1 Delay = T 1 B 2 Decoder 2 Delay = T 2 Capacity Function Capacity function C(T 1, T 2, B 1, B 2 ) Single User Upper Bound: C min ( T1 T 1 +B 1, Concatenation Lower Bound: C 1 1+ B 1 T 1 + B 2 T 2 ) T 2 T 2 +B 2 October 9, 2014 University of Michigan, Ann Arbor 20/ 1
66 Multicast Streaming Capacity Badr-Khisti-Lui (IT Trans. To Appear 2014) Assume w.l.o.g. B 2 B 1 T 2 B T = T1 B1 B1 Region A Capacity T2 T + B 2 2 B C B 1 + B 2 E (B 1, B 2 ) DE-SCo B 2 D T 2 =T 1 +B 1 T 2 =T 1 SCo A T 1 B C D E T1 T + B 2 1 T1 T + B 1 1 Partial Characterization 1 T2 B1 T B + B 2 2 October 9, 2014 University of Michigan, Ann Arbor 21/ 1
67 Other Extensions Mismatched Streaming Codes (Patil-Badr-Khisti-Tan Asilomar 2013) Partial Recovery Streaming Codes (Badr-Khisti-Tan-Apostolopoulos JSTSP 2014) Multiple Erasure Bursts (Li-Khisti-Girod Asilomar 2011) - Interleaved Low-Delay Codes Multiple Links (Lui-Badr-Khisti CWIT 2011) - Layered coding for burst erasure channels Multiple Source Streams with Different Decoding Delays (Lui (Unpublished) 2011) - Embedded Codes Other Results Burst Erasure Channels: Martinian and Sundberg (IT-2004) Other Recent Results: Leong-Ho (ISIT 2012), Leong-Qureshi-Ho (ISIT 2013) October 9, 2014 University of Michigan, Ann Arbor 22/ 1
68 Outline Real-Time Streaming Communication Streaming Error Correction Streaming Compression Collaborators: Ahmed Badr (Toronto) John Apostolopoulos (Cisco) Wai-Tian Tan (Cisco) Collaborators: Farrokh Etezadi (Toronto) Mitchell Trott October 9, 2014 University of Michigan, Ann Arbor 23/ 1
69 Compression Vs Error Propagation GOP Picture Structure 1 Compression Predictive Coding Still Image Coding Error Propagation Interleaving Approach Error Control Coding 1 Source : October 9, 2014 University of Michigan, Ann Arbor 24/ 1
70 Motivation - Video Streaming Compression Efficiency Predictive Coding Still Image Compression Robustness to Error Propagation October 9, 2014 University of Michigan, Ann Arbor 25/ 1
71 Motivation - Video Streaming Compression Efficiency Predictive Coding MPEG Still Image Compression Robustness to Error Propagation October 9, 2014 University of Michigan, Ann Arbor 25/ 1
72 Motivation - Video Streaming Compression Efficiency Predictive Coding MPEG Fundamental Tradeoff Still Image Compression Robustness to Error Propagation October 9, 2014 University of Michigan, Ann Arbor 25/ 1
73 Information Theoretic Model Src Packets s 1 s 2 s 3 s 4 s 5 s 6 s 7 s 8 Compressed Packets f 1 f 2 f 3 f 4 f 5 f 6 f 7 f 8 Channel f 1 f 2 f 3 * f 5 f 6 f 7 f 8 Reproduced Stream s 1 s 2 s 3 S 4 S 5 S 6 s 7 s 8 System Parameters: Compression Rate: R Erasure Burst Length: B Recovery Window: W Lossless or Lossy Recovery B=1 W=2 October 9, 2014 University of Michigan, Ann Arbor 26/ 1
74 Problem Setup Source Model: Sequence of vectors Temporally Markov, Spatially i.i.d. (see Viswanathan and Berger ( 00), Wang and Xu ( 10), Song-Chen-Wang-Liu ( 13), Ma-Ishwar ( 11)) Pr(s n i s n i 1, s n i 2,..., ) = n Pr(s ij s i 1,j ) j=1 Channel Model: { Burst Erasure Model f i, i / {j, j + 1,..., j + B 1} g i =, otherwise October 9, 2014 University of Michigan, Ann Arbor 27/ 1
75 Problem Setup Source Model: Sequence of vectors Temporally Markov, Spatially i.i.d. (see Viswanathan and Berger ( 00), Wang and Xu ( 10), Song-Chen-Wang-Liu ( 13), Ma-Ishwar ( 11)) Pr(s n i s n i 1, s n i 2,..., ) = n Pr(s ij s i 1,j ) j=1 Channel Model: { Burst Erasure Model f i, i / {j, j + 1,..., j + B 1} g i =, otherwise Encoder: F i : {s n 0,..., sn i } f i {1, 2,..., 2 nr }. Decoder: G i : {g 0,..., g i } ŝ n i Lossless Recovery: Pr(si n ŝi n ) ε n except for i [j,..., j + B + W 1]. October 9, 2014 University of Michigan, Ann Arbor 27/ 1
76 Rate-Recovery Function Definition (Rate-Recovery Function) The minimum compression rate R that is achieved when: Burst-Erasure Length = B Recovery Window = W Lossless or Lossy Recovery s n 0 s n 1 s n 2 s n j 1 s n j s n j+1 s n j+b 1 s n j+b s n j+b+w 1 s n j+b+w f 0 f 1 f 2 f j 1 f j f j+1 f j+b 1 f j+b f j+b+w 1 f j+b+w f 0 f 1 f 2 f j 1 f j+b f j+b+w 1 f j+b+w ŝ n 0 ŝ n 1 ŝ n 2 ŝ n j 1 ŝ n j+b+w Erased Not to be recovered Error Propagation Window October 9, 2014 University of Michigan, Ann Arbor 28/ 1
77 Rate-Recovery Function Etezadi-Khisti-Trott (IEEE Trans. Information Theory, Aug. 2014) s n 0 s n 1 s n 2 s n j 1 s n j s n j+1 s n j+b 1 s n j+b s n j+b+w 1 s n j+b+w f 0 f 1 f 2 f j 1 f j f j+1 f j+b 1 f j+b f j+b+w 1 f j+b+w f 0 f 1 f 2 f j 1 f j+b f j+b+w 1 f j+b+w ŝ n 0 ŝ n 1 ŝ n 2 ŝ n j 1 Erased Not to be recovered Error Propagation Window Theorem (Upper and Lower Bounds - Lossless Case) ŝ n j+b+w R + (B, W ) = H(s 1 s 0 ) + 1 W + 1 I(s B; s B 1 s 1 ) R (B, W ) = H(s 1 s 0 ) + 1 W + 1 I(s B+W ; s B 1 s 1 ) Upper bound : Binning based scheme. Upper and Lower Bounds Coincide: W = 0 and W. October 9, 2014 University of Michigan, Ann Arbor 29/ 1
78 Lower Bound - Rate Recovery Function Etezadi-Khisti-Trott (IEEE Trans. Information Theory, Aug. 2014) Let W = 1. Encoding of s n j, sn j+1 sn j 1 s n j, sn j+1 Encoder f j f j+1 Decoder j Decoder j+1 ŝ n j ŝ n j+1 s n j B 1 October 9, 2014 University of Michigan, Ann Arbor 30/ 1
79 Lower Bound - Rate Recovery Function Etezadi-Khisti-Trott (IEEE Trans. Information Theory, Aug. 2014) Let W = 1. Encoding of s n j, sn j+1 sn j 1, sn j+1 s n j, sn j+1 Encoder f j f j+1 Decoder j Decoder j+1 ŝ n j ŝ n j+1 s n j B 1 October 9, 2014 University of Michigan, Ann Arbor 30/ 1
80 Lower Bound - Rate Recovery Function Etezadi-Khisti-Trott (IEEE Trans. Information Theory, Aug. 2014) Let W = 1. Encoding of s n j, sn j+1 sn j 1, sn j+1 s n j, sn j+1 Encoder f j f j+1 Decoder j Decoder j+1 ŝ n j ŝ n j+1 s n j B 1 Lower Bound: R j + R j+1 H(s j s j 1, s j+1 ) + H(s j+1 s j B 1 ). October 9, 2014 University of Michigan, Ann Arbor 30/ 1
81 Gauss-Markov Source Etezadi-Khisti-Trott (IEEE Trans. Information Theory, Aug. 2014) Stationary Gauss-Markov Source, s i N (0, 1). s i = ρs i 1 + z i, z i N (0, 1 ρ 2 ) {s j } j<i October 9, 2014 University of Michigan, Ann Arbor 31/ 1
82 Gauss-Markov Source Etezadi-Khisti-Trott (IEEE Trans. Information Theory, Aug. 2014) Stationary Gauss-Markov Source, s i N (0, 1). s i = ρs i 1 + z i, z i N (0, 1 ρ 2 ) {s j } j<i Quadratic Distortion Measure: [ ] 1 n E (s i (k) ŝ i (k)) 2 D, n k=1 October 9, 2014 University of Michigan, Ann Arbor 31/ 1
83 Gauss-Markov Source Etezadi-Khisti-Trott (IEEE Trans. Information Theory, Aug. 2014) Stationary Gauss-Markov Source, s i N (0, 1). s i = ρs i 1 + z i, z i N (0, 1 ρ 2 ) {s j } j<i Quadratic Distortion [ Measure: ] 1 n E (s i (k) ŝ i (k)) 2 D, n k=1 No Recovery Period, W = 0. s 0 s 1 s j 1 s j s j+1 s j+b 1 s j+b f 0 f 1 f j 1 f j f j+1 f j+b 1 f j+b f 0 f 1 f j 1 f j+b ŝ 0 ŝ 1 ŝ j 1 Erased ŝ j+b October 9, 2014 University of Michigan, Ann Arbor 31/ 1
84 Gauss-Markov Source Etezadi-Khisti-Trott (IEEE Trans. Information Theory, Aug. 2014) Stationary Gauss-Markov Source, s i N (0, 1). s i = ρs i 1 + z i, z i N (0, 1 ρ 2 ) {s j } j<i Quadratic Distortion Measure: [ ] 1 n E (s i (k) ŝ i (k)) 2 D, n k=1 No Recovery Period, W = 0 Lossy Rate Recovery Function R(B, D) High Resolution Limit R(B, D) = 1 2 log ( 1 ρ 2(B+1) D Upper and Lower bounds. W > 0: Novel Hybrid Coding Schemes ) + o D (1). October 9, 2014 University of Michigan, Ann Arbor 31/ 1
85 Gauss-Markov Sources W > 0 (In Progress) Predictive Coding: u i = s i ŝ i (u i 1 ) + n i Memoryless Quantize and Binning: u i = s i + n i Truncated Prediction (Hybrid): u i = s i ŝ i (u i i W ) + n i s n 0 s n 1 s n 2 s n j 1 s n j s n j+1 s n j+b 1 s n j+b s n j+b+w 1 s n j+b+w f 0 f 1 f 2 f j 1 f j f j+1 f j+b 1 f j+b f j+b+w 1 f j+b+w f 0 f 1 f 2 f j 1 f j+b f j+b+w 1 f j+b+w ŝ n 0 ŝ n 1 ŝ n 2 ŝ n j 1 ŝ n j+b+w Erased Not to be recovered Error Propagation Window October 9, 2014 University of Michigan, Ann Arbor 32/ 1
86 Gauss-Markov Sources W > 0 (In Progress) Predictive Coding: u i = s i ŝ i (u i 1 ) + n i Memoryless Quantize and Binning: u i = s i + n i Truncated Prediction (Hybrid): u i = s i ŝ i (u i i W ) + n i October 9, 2014 University of Michigan, Ann Arbor 32/ 1
87 Block Fading Channels w 1 w 2 w 3 w 4 w 5 w 6 h 1 h 2 h 3 h 4 h 5 h 6 w 1 w 2 w 3 w 4 w 5 Block Fading Channel y i = h i x i + z i, i = 1, 2,... Block Fading Channels: n symbols per block Source Packet: One in each coherence block nr bits Decoding Delay: T coherence blocks Quasi-Static Model: T = 1 Ergodic Model T October 9, 2014 University of Michigan, Ann Arbor 33/ 1
88 Streaming DMT of Fading Channels Theorem (Khisti-Draper, IT-Trans To Appear, 2014) The diversity multiplexing tradeoff for streaming source with a delay of T coherence blocks and a block-fading channel model is d(r) = T d 1 (r) where d 1 (r) is the quasi-static DMT. Coding Scheme: Time-Sharing Upper Bound: Outage Amplification Argument October 9, 2014 University of Michigan, Ann Arbor 34/ 1
89 Achievability: Fading Channels T = 2 T parallel channel code Divide each coherence block into T sub-blocks Apply parallel channel code across T sub-blocks w 1 w 2 w 3 w 4 w 5 w 6 h 1 h 2 h 3 h 4 h 5 h 6 w 1 w 2 w 3 w 4 w 5 October 9, 2014 University of Michigan, Ann Arbor 35/ 1
90 Achievability: Fading Channels T = 2 T parallel channel code Divide each coherence block into T sub-blocks Apply parallel channel code across T sub-blocks w 1 w 2 w 3 w 4 w 5 w 6 X 1 X 2 X 3 X 4 X 5 X 6 w 1 w 2 w 3 w 4 w 5 October 9, 2014 University of Michigan, Ann Arbor 35/ 1
91 Achievability: Fading Channels T = 2 T parallel channel code Divide each coherence block into T sub-blocks Apply parallel channel code across T sub-blocks w 1 w 2 w 3 w 4 w 5 w 6 X 1 Y 0 X 2 Y 1 X 3 Y 2 X 4 Y 3 X 5 Y 4 X 6 Y 5 w 1 w 2 w 3 w 4 w 5 October 9, 2014 University of Michigan, Ann Arbor 35/ 1
92 Achievability: Fading Channels T = 2 T parallel channel code Divide each coherence block into T sub-blocks Apply parallel channel code across T sub-blocks w 1 w 2 w 3 w 4 w 5 w 6 X 1 Y 0 X 2 Y 1 X 3 Y 2 X 4 Y 3 X 5 Y 4 X 6 Y 5 w 1 w 2 w 3 w 4 w 5 DMT: d(r) = 2 2r October 9, 2014 University of Michigan, Ann Arbor 35/ 1
93 Physical Layer Security October 9, 2014 University of Michigan, Ann Arbor 36/ 1
94 Secret-Key Generation over Fading Channels Khisti, IT-Trans Submitted Aug m A A Forward Link A BA y = h x + n B B y = h x + n BA AB A AB Reverse Link B m B K A z + AE = g AE xa nae z BE = g BE xb + nbe K B E Two-way block-fading channel Coherence Period: T Channel Reciprocity Non Coherent Main-Channel, Perfect CSI for eavesdropper Interactive Communication October 9, 2014 University of Michigan, Ann Arbor 37/ 1
95 Secret-Key Generation over Fading Channels Khisti, IT-Trans Submitted Aug m A A Forward Link A BA y = h x + n B B y = h x + n BA AB A AB Reverse Link B m B K A z + AE = g AE xa nae z BE = g BE xb + nbe K B E High SNR Capacity: C 1 [ ( T I(h AB; h BA ) + E log 1 + h AB 2 )] [ ) g A 2 + E log (1 + h BA 2 )] g B 2 ) Optimal Scheme: Training + Interactive Communication October 9, 2014 University of Michigan, Ann Arbor 37/ 1
96 Secure Communication - Wiretap Channel Secure Multi-Antenna Multicast (A. Khisti IT-2011, A. Khisti and D. Zhang Comm Letters 2013) Practical Codes for MIMO Wiretap Channel (A. Khina and Y. Kochman ISIT 2014) V-Blast Type Decomposition Scalar AWGN Wiretap Codebooks MIMO Arbitrarily Varying Wiretap Channel (A. Yener and X. He, IT-Trans 2013, T-COMM 2014) Fading Wiretap Channel with Imperfect CSI (Z. Rezki and M. S. Alouini, T-COMM 2014, T-Wireless 2014) Private Broadcasting (T. Liu IT-Trans 2014) Secure Broadcasting with Independent Secret Keys (R. Schaefer, CISS 2014) October 9, 2014 University of Michigan, Ann Arbor 38/ 1
97 Conclusions Real-Time Streaming Communication Part I: Channel Coding Channels with Burst and Isolated Erasures Explicit Codes New Distance and Span Metrics Part II: Source Coding Tradeoff between compression rate and error propagation Lossless Recovery Gaussian Sources with Quadratic Distortion October 9, 2014 University of Michigan, Ann Arbor 39/ 1
Error Control for Real-Time Streaming Applications
Error Control for Real-Time Streaming Applications Ashish Khisti Department of Electrical and Computer Engineering University of Toronto Joint work with: Ahmed Badr (Toronto), Wai-Tian Tan (Cisco), Xiaoqing
More informationLayered Error-Correction Codes for Real-Time Streaming over Erasure Channels
Layered Error-Correction Codes for Real-Time Streaming over Erasure Channels Ashish Khisti University of Toronto Joint Work: Ahmed Badr (Toronto), Wai-Tian Tan (Cisco), John Apostolopoulos (Cisco). Sequential
More informationAN increasing number of multimedia applications require. Streaming Codes with Partial Recovery over Channels with Burst and Isolated Erasures
1 Streaming Codes with Partial Recovery over Channels with Burst and Isolated Erasures Ahmed Badr, Student Member, IEEE, Ashish Khisti, Member, IEEE, Wai-Tian Tan, Member IEEE and John Apostolopoulos,
More informationA Truncated Prediction Framework for Streaming over Erasure Channels
A Truncated Prediction Framework for Streaming over Erasure Channels Farrokh Etezadi, Ashish Khisti, Jun Chen Abstract We propose a new coding technique for sequential transmission of a stream of Gauss-Markov
More informationStreaming-Codes for Multicast over Burst Erasure Channels
1 Streaming-Codes for Multicast over Burst Erasure Channels Ahmed Badr, Devin Lui and Ashish Khisti School of Electrical and Computer Engineering University of Toronto Toronto, ON, M5S 3G4, Canada Email:
More informationMANY multimedia applications such as interactive audio/video conferencing, mobile gaming and cloud-computing require
Layered Constructions for Low-Delay Streaming Codes Ahmed Badr, Student Member, IEEE, Pratik Patil, Ashish Khisti, Member, IEEE, Wai-Tian Tan, Member, IEEE and John Apostolopoulos, Fellow, IEEE 1 arxiv:1308.3827v1
More informationConvolutional Codes with Maximum Column Sum Rank for Network Streaming
1 Convolutional Codes with Maximum Column Sum Rank for Network Streaming Rafid Mahmood, Ahmed Badr, and Ashish Khisti School of Electrical and Computer Engineering University of Toronto Toronto, ON, M5S
More informationPerformance-based Security for Encoding of Information Signals. FA ( ) Paul Cuff (Princeton University)
Performance-based Security for Encoding of Information Signals FA9550-15-1-0180 (2015-2018) Paul Cuff (Princeton University) Contributors Two students finished PhD Tiance Wang (Goldman Sachs) Eva Song
More informationSecure Degrees of Freedom of the MIMO Multiple Access Wiretap Channel
Secure Degrees of Freedom of the MIMO Multiple Access Wiretap Channel Pritam Mukherjee Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland, College Park, MD 074 pritamm@umd.edu
More informationSecret Key Agreement Using Asymmetry in Channel State Knowledge
Secret Key Agreement Using Asymmetry in Channel State Knowledge Ashish Khisti Deutsche Telekom Inc. R&D Lab USA Los Altos, CA, 94040 Email: ashish.khisti@telekom.com Suhas Diggavi LICOS, EFL Lausanne,
More informationEfficient Use of Joint Source-Destination Cooperation in the Gaussian Multiple Access Channel
Efficient Use of Joint Source-Destination Cooperation in the Gaussian Multiple Access Channel Ahmad Abu Al Haija ECE Department, McGill University, Montreal, QC, Canada Email: ahmad.abualhaija@mail.mcgill.ca
More informationEnergy State Amplification in an Energy Harvesting Communication System
Energy State Amplification in an Energy Harvesting Communication System Omur Ozel Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland College Park, MD 20742 omur@umd.edu
More informationOn the Secrecy Capacity of Fading Channels
On the Secrecy Capacity of Fading Channels arxiv:cs/63v [cs.it] 7 Oct 26 Praveen Kumar Gopala, Lifeng Lai and Hesham El Gamal Department of Electrical and Computer Engineering The Ohio State University
More informationLecture 8: MIMO Architectures (II) Theoretical Foundations of Wireless Communications 1. Overview. Ragnar Thobaben CommTh/EES/KTH
MIMO : MIMO Theoretical Foundations of Wireless Communications 1 Wednesday, May 25, 2016 09:15-12:00, SIP 1 Textbook: D. Tse and P. Viswanath, Fundamentals of Wireless Communication 1 / 20 Overview MIMO
More informationIncremental Coding over MIMO Channels
Model Rateless SISO MIMO Applications Summary Incremental Coding over MIMO Channels Anatoly Khina, Tel Aviv University Joint work with: Yuval Kochman, MIT Uri Erez, Tel Aviv University Gregory W. Wornell,
More informationPREDICTIVE quantization is one of the most widely-used
618 IEEE JOURNAL OF SELECTED TOPICS IN SIGNAL PROCESSING, VOL. 1, NO. 4, DECEMBER 2007 Robust Predictive Quantization: Analysis and Design Via Convex Optimization Alyson K. Fletcher, Member, IEEE, Sundeep
More informationOn Scalable Source Coding for Multiple Decoders with Side Information
On Scalable Source Coding for Multiple Decoders with Side Information Chao Tian School of Computer and Communication Sciences Laboratory for Information and Communication Systems (LICOS), EPFL, Lausanne,
More informationError Exponent Region for Gaussian Broadcast Channels
Error Exponent Region for Gaussian Broadcast Channels Lihua Weng, S. Sandeep Pradhan, and Achilleas Anastasopoulos Electrical Engineering and Computer Science Dept. University of Michigan, Ann Arbor, MI
More informationSequential Coding of Gauss Markov Sources With Packet Erasures and Feedback
Sequential Coding of Gauss Markov Sources With Packet Erasures and Feedback Anatoly Khina, Victoria Kostina, Ashish Khisti, and Babak Hassibi Abstract We consider the problem of sequential transmission
More informationDegrees-of-Freedom Robust Transmission for the K-user Distributed Broadcast Channel
/33 Degrees-of-Freedom Robust Transmission for the K-user Distributed Broadcast Channel Presented by Paul de Kerret Joint work with Antonio Bazco, Nicolas Gresset, and David Gesbert ESIT 2017 in Madrid,
More informationII. THE TWO-WAY TWO-RELAY CHANNEL
An Achievable Rate Region for the Two-Way Two-Relay Channel Jonathan Ponniah Liang-Liang Xie Department of Electrical Computer Engineering, University of Waterloo, Canada Abstract We propose an achievable
More informationELEC546 Review of Information Theory
ELEC546 Review of Information Theory Vincent Lau 1/1/004 1 Review of Information Theory Entropy: Measure of uncertainty of a random variable X. The entropy of X, H(X), is given by: If X is a discrete random
More informationDiversity-Multiplexing Tradeoff in MIMO Channels with Partial CSIT. ECE 559 Presentation Hoa Pham Dec 3, 2007
Diversity-Multiplexing Tradeoff in MIMO Channels with Partial CSIT ECE 559 Presentation Hoa Pham Dec 3, 2007 Introduction MIMO systems provide two types of gains Diversity Gain: each path from a transmitter
More informationExploiting Partial Channel State Information for Secrecy over Wireless Channels
Exploiting Partial Channel State Information for Secrecy over Wireless Channels Matthieu R. Bloch and J. Nicholas Laneman Abstract In this paper, we investigate the effect of partial channel state information
More informationAnatoly Khina. Joint work with: Uri Erez, Ayal Hitron, Idan Livni TAU Yuval Kochman HUJI Gregory W. Wornell MIT
Network Modulation: Transmission Technique for MIMO Networks Anatoly Khina Joint work with: Uri Erez, Ayal Hitron, Idan Livni TAU Yuval Kochman HUJI Gregory W. Wornell MIT ACC Workshop, Feder Family Award
More informationDecomposing the MIMO Wiretap Channel
Decomposing the MIMO Wiretap Channel Anatoly Khina, Tel Aviv University Joint work with: Yuval Kochman, Hebrew University Ashish Khisti, University of Toronto ISIT 2014 Honolulu, Hawai i, USA June 30,
More informationAppendix B Information theory from first principles
Appendix B Information theory from first principles This appendix discusses the information theory behind the capacity expressions used in the book. Section 8.3.4 is the only part of the book that supposes
More informationGeneralized Writing on Dirty Paper
Generalized Writing on Dirty Paper Aaron S. Cohen acohen@mit.edu MIT, 36-689 77 Massachusetts Ave. Cambridge, MA 02139-4307 Amos Lapidoth lapidoth@isi.ee.ethz.ch ETF E107 ETH-Zentrum CH-8092 Zürich, Switzerland
More informationGraph-based Codes for Quantize-Map-and-Forward Relaying
20 IEEE Information Theory Workshop Graph-based Codes for Quantize-Map-and-Forward Relaying Ayan Sengupta, Siddhartha Brahma, Ayfer Özgür, Christina Fragouli and Suhas Diggavi EPFL, Switzerland, UCLA,
More informationOn the Impact of Quantized Channel Feedback in Guaranteeing Secrecy with Artificial Noise
On the Impact of Quantized Channel Feedback in Guaranteeing Secrecy with Artificial Noise Ya-Lan Liang, Yung-Shun Wang, Tsung-Hui Chang, Y.-W. Peter Hong, and Chong-Yung Chi Institute of Communications
More informationLecture 7 MIMO Communica2ons
Wireless Communications Lecture 7 MIMO Communica2ons Prof. Chun-Hung Liu Dept. of Electrical and Computer Engineering National Chiao Tung University Fall 2014 1 Outline MIMO Communications (Chapter 10
More informationCapacity of Memoryless Channels and Block-Fading Channels With Designable Cardinality-Constrained Channel State Feedback
2038 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 50, NO. 9, SEPTEMBER 2004 Capacity of Memoryless Channels and Block-Fading Channels With Designable Cardinality-Constrained Channel State Feedback Vincent
More informationLecture 5 Channel Coding over Continuous Channels
Lecture 5 Channel Coding over Continuous Channels I-Hsiang Wang Department of Electrical Engineering National Taiwan University ihwang@ntu.edu.tw November 14, 2014 1 / 34 I-Hsiang Wang NIT Lecture 5 From
More informationMidterm Exam Information Theory Fall Midterm Exam. Time: 09:10 12:10 11/23, 2016
Midterm Exam Time: 09:10 12:10 11/23, 2016 Name: Student ID: Policy: (Read before You Start to Work) The exam is closed book. However, you are allowed to bring TWO A4-size cheat sheet (single-sheet, two-sided).
More informationLecture 9: Diversity-Multiplexing Tradeoff Theoretical Foundations of Wireless Communications 1
: Diversity-Multiplexing Tradeoff Theoretical Foundations of Wireless Communications 1 Rayleigh Friday, May 25, 2018 09:00-11:30, Kansliet 1 Textbook: D. Tse and P. Viswanath, Fundamentals of Wireless
More informationLecture 9: Diversity-Multiplexing Tradeoff Theoretical Foundations of Wireless Communications 1. Overview. Ragnar Thobaben CommTh/EES/KTH
: Diversity-Multiplexing Tradeoff Theoretical Foundations of Wireless Communications 1 Rayleigh Wednesday, June 1, 2016 09:15-12:00, SIP 1 Textbook: D. Tse and P. Viswanath, Fundamentals of Wireless Communication
More informationInformation Theory. Lecture 10. Network Information Theory (CT15); a focus on channel capacity results
Information Theory Lecture 10 Network Information Theory (CT15); a focus on channel capacity results The (two-user) multiple access channel (15.3) The (two-user) broadcast channel (15.6) The relay channel
More informationMinimum Energy Per Bit for Secret Key Acquisition Over Multipath Wireless Channels
Minimum Energy Per Bit for Secret Key Acquisition Over Multipath Wireless Channels Tzu-Han Chou Email: tchou@wisc.edu Akbar M. Sayeed Email: akbar@engr.wisc.edu Stark C. Draper Email: sdraper@ece.wisc.edu
More informationOn the Required Accuracy of Transmitter Channel State Information in Multiple Antenna Broadcast Channels
On the Required Accuracy of Transmitter Channel State Information in Multiple Antenna Broadcast Channels Giuseppe Caire University of Southern California Los Angeles, CA, USA Email: caire@usc.edu Nihar
More informationLecture 4 Noisy Channel Coding
Lecture 4 Noisy Channel Coding I-Hsiang Wang Department of Electrical Engineering National Taiwan University ihwang@ntu.edu.tw October 9, 2015 1 / 56 I-Hsiang Wang IT Lecture 4 The Channel Coding Problem
More informationInteractive Decoding of a Broadcast Message
In Proc. Allerton Conf. Commun., Contr., Computing, (Illinois), Oct. 2003 Interactive Decoding of a Broadcast Message Stark C. Draper Brendan J. Frey Frank R. Kschischang University of Toronto Toronto,
More informationNOMA: Principles and Recent Results
NOMA: Principles and Recent Results Jinho Choi School of EECS GIST September 2017 (VTC-Fall 2017) 1 / 46 Abstract: Non-orthogonal multiple access (NOMA) becomes a key technology in 5G as it can improve
More informationCompressed Sensing Using Bernoulli Measurement Matrices
ITSchool 11, Austin Compressed Sensing Using Bernoulli Measurement Matrices Yuhan Zhou Advisor: Wei Yu Department of Electrical and Computer Engineering University of Toronto, Canada Motivation Motivation
More informationIncremental Coding over MIMO Channels
Incremental Coding over MIMO Channels Anatoly Khina EE-Systems Dept, TAU Tel Aviv, Israel Email: anatolyk@engtauacil Yuval Kochman EECS Dept, MIT Cambridge, MA 02139, USA Email: yuvalko@mitedu Uri Erez
More informationCapacity of the Discrete Memoryless Energy Harvesting Channel with Side Information
204 IEEE International Symposium on Information Theory Capacity of the Discrete Memoryless Energy Harvesting Channel with Side Information Omur Ozel, Kaya Tutuncuoglu 2, Sennur Ulukus, and Aylin Yener
More informationThe Optimality of Beamforming: A Unified View
The Optimality of Beamforming: A Unified View Sudhir Srinivasa and Syed Ali Jafar Electrical Engineering and Computer Science University of California Irvine, Irvine, CA 92697-2625 Email: sudhirs@uciedu,
More informationDiversity Multiplexing Tradeoff in Multiple Antenna Multiple Access Channels with Partial CSIT
1 Diversity Multiplexing Tradeoff in Multiple Antenna Multiple Access Channels with artial CSIT Kaushi Josiam, Dinesh Rajan and Mandyam Srinath, Department of Electrical Engineering, Southern Methodist
More informationOn the Duality of Gaussian Multiple-Access and Broadcast Channels
On the Duality of Gaussian ultiple-access and Broadcast Channels Xiaowei Jin I. INTODUCTION Although T. Cover has been pointed out in [] that one would have expected a duality between the broadcast channel(bc)
More informationAsymptotic Distortion Performance of Source-Channel Diversity Schemes over Relay Channels
Asymptotic istortion Performance of Source-Channel iversity Schemes over Relay Channels Karim G. Seddik 1, Andres Kwasinski 2, and K. J. Ray Liu 1 1 epartment of Electrical and Computer Engineering, 2
More informationTurbo Codes for xdsl modems
Turbo Codes for xdsl modems Juan Alberto Torres, Ph. D. VOCAL Technologies, Ltd. (http://www.vocal.com) John James Audubon Parkway Buffalo, NY 14228, USA Phone: +1 716 688 4675 Fax: +1 716 639 0713 Email:
More informationIterative Quantization. Using Codes On Graphs
Iterative Quantization Using Codes On Graphs Emin Martinian and Jonathan S. Yedidia 2 Massachusetts Institute of Technology 2 Mitsubishi Electric Research Labs Lossy Data Compression: Encoding: Map source
More informationTraining-Symbol Embedded, High-Rate Complex Orthogonal Designs for Relay Networks
Training-Symbol Embedded, High-Rate Complex Orthogonal Designs for Relay Networks J Harshan Dept of ECE, Indian Institute of Science Bangalore 56001, India Email: harshan@eceiiscernetin B Sundar Rajan
More informationInterleave Division Multiple Access. Li Ping, Department of Electronic Engineering City University of Hong Kong
Interleave Division Multiple Access Li Ping, Department of Electronic Engineering City University of Hong Kong 1 Outline! Introduction! IDMA! Chip-by-chip multiuser detection! Analysis and optimization!
More informationOn Source-Channel Communication in Networks
On Source-Channel Communication in Networks Michael Gastpar Department of EECS University of California, Berkeley gastpar@eecs.berkeley.edu DIMACS: March 17, 2003. Outline 1. Source-Channel Communication
More informationSparse Regression Codes for Multi-terminal Source and Channel Coding
Sparse Regression Codes for Multi-terminal Source and Channel Coding Ramji Venkataramanan Yale University Sekhar Tatikonda Allerton 2012 1 / 20 Compression with Side-Information X Encoder Rate R Decoder
More informationSimultaneous SDR Optimality via a Joint Matrix Decomp.
Simultaneous SDR Optimality via a Joint Matrix Decomposition Joint work with: Yuval Kochman, MIT Uri Erez, Tel Aviv Uni. May 26, 2011 Model: Source Multicasting over MIMO Channels z 1 H 1 y 1 Rx1 ŝ 1 s
More informationSingle-User MIMO systems: Introduction, capacity results, and MIMO beamforming
Single-User MIMO systems: Introduction, capacity results, and MIMO beamforming Master Universitario en Ingeniería de Telecomunicación I. Santamaría Universidad de Cantabria Contents Introduction Multiplexing,
More informationDiversity-Fidelity Tradeoff in Transmission of Analog Sources over MIMO Fading Channels
Diversity-Fidelity Tradeo in Transmission o Analog Sources over MIMO Fading Channels Mahmoud Taherzadeh, Kamyar Moshksar and Amir K. Khandani Coding & Signal Transmission Laboratory www.cst.uwaterloo.ca
More informationDigital communication system. Shannon s separation principle
Digital communication system Representation of the source signal by a stream of (binary) symbols Adaptation to the properties of the transmission channel information source source coder channel coder modulation
More informationC.M. Liu Perceptual Signal Processing Lab College of Computer Science National Chiao-Tung University
Quantization C.M. Liu Perceptual Signal Processing Lab College of Computer Science National Chiao-Tung University http://www.csie.nctu.edu.tw/~cmliu/courses/compression/ Office: EC538 (03)5731877 cmliu@cs.nctu.edu.tw
More informationApproximate Ergodic Capacity of a Class of Fading Networks
Approximate Ergodic Capacity of a Class of Fading Networks Sang-Woon Jeon, Chien-Yi Wang, and Michael Gastpar School of Computer and Communication Sciences EPFL Lausanne, Switzerland {sangwoon.jeon, chien-yi.wang,
More informationSOURCE coding problems with side information at the decoder(s)
1458 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 59, NO. 3, MARCH 2013 Heegard Berger Cascade Source Coding Problems With Common Reconstruction Constraints Behzad Ahmadi, Student Member, IEEE, Ravi Ton,
More informationHow Much Training and Feedback are Needed in MIMO Broadcast Channels?
How uch raining and Feedback are Needed in IO Broadcast Channels? ari Kobayashi, SUPELEC Gif-sur-Yvette, France Giuseppe Caire, University of Southern California Los Angeles CA, 989 USA Nihar Jindal University
More informationImproved MU-MIMO Performance for Future Systems Using Differential Feedback
Improved MU-MIMO Performance for Future 80. Systems Using Differential Feedback Ron Porat, Eric Ojard, Nihar Jindal, Matthew Fischer, Vinko Erceg Broadcom Corp. {rporat, eo, njindal, mfischer, verceg}@broadcom.com
More informationSide-information Scalable Source Coding
Side-information Scalable Source Coding Chao Tian, Member, IEEE, Suhas N. Diggavi, Member, IEEE Abstract The problem of side-information scalable (SI-scalable) source coding is considered in this work,
More informationDistributed Decoding of Convolutional Network Error Correction Codes
1 Distributed Decoding of Convolutional Network Error Correction Codes Hengjie Yang and Wangmei Guo arxiv:1701.06283v2 [cs.it] 18 Feb 2017 Abstract A Viterbi-like decoding algorithm is proposed in this
More informationSecret-Key Generation from Channel Reciprocity: A Separation Approach
Secret-ey Generation from Channel Reciprocity: Separation pproach shish histi Department of Electrical and Computer Engineering University of Toronto Feb 11, 2013 Security at PHY-Layer Use PHY Resources
More informationGroup Secret Key Agreement over State-Dependent Wireless Broadcast Channels
Group Secret Key Agreement over State-Dependent Wireless Broadcast Channels Mahdi Jafari Siavoshani Sharif University of Technology, Iran Shaunak Mishra, Suhas Diggavi, Christina Fragouli Institute of
More informationA robust transmit CSI framework with applications in MIMO wireless precoding
A robust transmit CSI framework with applications in MIMO wireless precoding Mai Vu, and Arogyaswami Paulraj Information Systems Laboratory, Department of Electrical Engineering Stanford University, Stanford,
More informationAhmed S. Mansour, Rafael F. Schaefer and Holger Boche. June 9, 2015
The Individual Secrecy Capacity of Degraded Multi-Receiver Wiretap Broadcast Channels Ahmed S. Mansour, Rafael F. Schaefer and Holger Boche Lehrstuhl für Technische Universität München, Germany Department
More informationSoft-Output Trellis Waveform Coding
Soft-Output Trellis Waveform Coding Tariq Haddad and Abbas Yongaçoḡlu School of Information Technology and Engineering, University of Ottawa Ottawa, Ontario, K1N 6N5, Canada Fax: +1 (613) 562 5175 thaddad@site.uottawa.ca
More informationPhysical-Layer MIMO Relaying
Model Gaussian SISO MIMO Gauss.-BC General. Physical-Layer MIMO Relaying Anatoly Khina, Tel Aviv University Joint work with: Yuval Kochman, MIT Uri Erez, Tel Aviv University August 5, 2011 Model Gaussian
More informationDistributed Reed-Solomon Codes
Distributed Reed-Solomon Codes Farzad Parvaresh f.parvaresh@eng.ui.ac.ir University of Isfahan Institute for Network Coding CUHK, Hong Kong August 216 Research interests List-decoding of algebraic codes
More informationHalf-Pel Accurate Motion-Compensated Orthogonal Video Transforms
Flierl and Girod: Half-Pel Accurate Motion-Compensated Orthogonal Video Transforms, IEEE DCC, Mar. 007. Half-Pel Accurate Motion-Compensated Orthogonal Video Transforms Markus Flierl and Bernd Girod Max
More informationA Half-Duplex Cooperative Scheme with Partial Decode-Forward Relaying
A Half-Duplex Cooperative Scheme with Partial Decode-Forward Relaying Ahmad Abu Al Haija, and Mai Vu, Department of Electrical and Computer Engineering McGill University Montreal, QC H3A A7 Emails: ahmadabualhaija@mailmcgillca,
More informationLecture 4. Capacity of Fading Channels
1 Lecture 4. Capacity of Fading Channels Capacity of AWGN Channels Capacity of Fading Channels Ergodic Capacity Outage Capacity Shannon and Information Theory Claude Elwood Shannon (April 3, 1916 February
More informationFading Wiretap Channel with No CSI Anywhere
Fading Wiretap Channel with No CSI Anywhere Pritam Mukherjee Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland, College Park, MD 7 pritamm@umd.edu ulukus@umd.edu Abstract
More informationSingle-Symbol ML Decodable Distributed STBCs for Partially-Coherent Cooperative Networks
This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the ICC 2008 proceedings Single-Symbol ML Decodable Distributed STBCs for
More informationON SCALABLE CODING OF HIDDEN MARKOV SOURCES. Mehdi Salehifar, Tejaswi Nanjundaswamy, and Kenneth Rose
ON SCALABLE CODING OF HIDDEN MARKOV SOURCES Mehdi Salehifar, Tejaswi Nanjundaswamy, and Kenneth Rose Department of Electrical and Computer Engineering University of California, Santa Barbara, CA, 93106
More informationJoint Source-Channel Coding Optimized On Endto-End Distortion for Multimedia Source
Rochester Institute of Technology RIT Scholar Works Theses Thesis/Dissertation Collections 8-2016 Joint Source-Channel Coding Optimized On Endto-End Distortion for Multimedia Source Ebrahim Jarvis ej7414@rit.edu
More informationLecture 4 Capacity of Wireless Channels
Lecture 4 Capacity of Wireless Channels I-Hsiang Wang ihwang@ntu.edu.tw 3/0, 014 What we have learned So far: looked at specific schemes and techniques Lecture : point-to-point wireless channel - Diversity:
More informationJoint FEC Encoder and Linear Precoder Design for MIMO Systems with Antenna Correlation
Joint FEC Encoder and Linear Precoder Design for MIMO Systems with Antenna Correlation Chongbin Xu, Peng Wang, Zhonghao Zhang, and Li Ping City University of Hong Kong 1 Outline Background Mutual Information
More informationMultiple Description Transform Coding of Images
Multiple Description Transform Coding of Images Vivek K Goyal Jelena Kovačević Ramon Arean Martin Vetterli U. of California, Berkeley Bell Laboratories École Poly. Féd. de Lausanne École Poly. Féd. de
More informationCommunication constraints and latency in Networked Control Systems
Communication constraints and latency in Networked Control Systems João P. Hespanha Center for Control Engineering and Computation University of California Santa Barbara In collaboration with Antonio Ortega
More informationShannon s A Mathematical Theory of Communication
Shannon s A Mathematical Theory of Communication Emre Telatar EPFL Kanpur October 19, 2016 First published in two parts in the July and October 1948 issues of BSTJ. First published in two parts in the
More informationQuantization for Distributed Estimation
0 IEEE International Conference on Internet of Things ithings 0), Green Computing and Communications GreenCom 0), and Cyber-Physical-Social Computing CPSCom 0) Quantization for Distributed Estimation uan-yu
More informationMultiuser Successive Refinement and Multiple Description Coding
Multiuser Successive Refinement and Multiple Description Coding Chao Tian Laboratory for Information and Communication Systems (LICOS) School of Computer and Communication Sciences EPFL Lausanne Switzerland
More informationHarnessing Interaction in Bursty Interference Networks
215 IEEE Hong Kong-Taiwan Joint Workshop on Information Theory and Communications Harnessing Interaction in Bursty Interference Networks I-Hsiang Wang NIC Lab, NTU GICE 1/19, 215 Modern Wireless: Grand
More informationLecture 4 Capacity of Wireless Channels
Lecture 4 Capacity of Wireless Channels I-Hsiang Wang ihwang@ntu.edu.tw 3/0, 014 What we have learned So far: looked at specific schemes and techniques Lecture : point-to-point wireless channel - Diversity:
More informationTracking and Control of Gauss Markov Processes over Packet-Drop Channels with Acknowledgments
Tracking and Control of Gauss Markov Processes over Packet-Drop Channels with Acknowledgments Anatoly Khina, Victoria Kostina, Ashish Khisti, and Babak Hassibi arxiv:1702.01779v4 [cs.it] 23 May 2018 Abstract
More informationCapacity Region of the Two-Way Multi-Antenna Relay Channel with Analog Tx-Rx Beamforming
Capacity Region of the Two-Way Multi-Antenna Relay Channel with Analog Tx-Rx Beamforming Authors: Christian Lameiro, Alfredo Nazábal, Fouad Gholam, Javier Vía and Ignacio Santamaría University of Cantabria,
More informationRECURSIVE TRAINING WITH UNITARY MODULATION FOR CORRELATED BLOCK-FADING MIMO CHANNELS
RECURSIVE TRAINING WITH UNITARY MODULATION FOR CORRELATED BLOCK-FADING MIMO CHANNELS Wenyi Zhang, Student Member, IEEE, and J Nicholas Laneman, Member, IEEE Department of Electrical Engineering University
More informationMulti-User Gain Maximum Eigenmode Beamforming, and IDMA. Peng Wang and Li Ping City University of Hong Kong
Multi-User Gain Maximum Eigenmode Beamforming, and IDMA Peng Wang and Li Ping City University of Hong Kong 1 Contents Introduction Multi-user gain (MUG) Maximum eigenmode beamforming (MEB) MEB performance
More informationAn Alternative Proof for the Capacity Region of the Degraded Gaussian MIMO Broadcast Channel
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 58, NO. 4, APRIL 2012 2427 An Alternative Proof for the Capacity Region of the Degraded Gaussian MIMO Broadcast Channel Ersen Ekrem, Student Member, IEEE,
More informationWavelet Scalable Video Codec Part 1: image compression by JPEG2000
1 Wavelet Scalable Video Codec Part 1: image compression by JPEG2000 Aline Roumy aline.roumy@inria.fr May 2011 2 Motivation for Video Compression Digital video studio standard ITU-R Rec. 601 Y luminance
More informationThroughput-Delay Analysis of Random Linear Network Coding for Wireless Broadcasting
Throughput-Delay Analysis of Random Linear Network Coding for Wireless Broadcasting Swapna B.T., Atilla Eryilmaz, and Ness B. Shroff Departments of ECE and CSE The Ohio State University Columbus, OH 43210
More informationDelayed Sequential Coding of Correlated Sources
Delayed Sequential Coding of Correlated Sources Nan Ma, Ye Wang, and Prakash Ishwar Department of Electrical and Computer Engineering Boston University, Boston, MA 02215 {nanma, yw, pi}@bu.edu Abstract
More informationNetwork Control: A Rate-Distortion Perspective
Network Control: A Rate-Distortion Perspective Jubin Jose and Sriram Vishwanath Dept. of Electrical and Computer Engineering The University of Texas at Austin {jubin, sriram}@austin.utexas.edu arxiv:8.44v2
More informationSecret Key Agreement Using Conferencing in State- Dependent Multiple Access Channels with An Eavesdropper
Secret Key Agreement Using Conferencing in State- Dependent Multiple Access Channels with An Eavesdropper Mohsen Bahrami, Ali Bereyhi, Mahtab Mirmohseni and Mohammad Reza Aref Information Systems and Security
More informationELEC546 MIMO Channel Capacity
ELEC546 MIMO Channel Capacity Vincent Lau Simplified Version.0 //2004 MIMO System Model Transmitter with t antennas & receiver with r antennas. X Transmitted Symbol, received symbol Channel Matrix (Flat
More information