A New Achievability Scheme for the Relay Channel

Size: px
Start display at page:

Download "A New Achievability Scheme for the Relay Channel"

Transcription

1 A New Achievability Scheme for the Relay Chael Wei Kag Seur Ulukus Departmet of Electrical ad Computer Egieerig Uiversity of Marylad, College Park, MD October 4, 2007 Abstract I this paper, we propose a ew codig scheme for the geeral relay chael. This codig scheme is i the form of a block Markov code. The trasmitter uses a superpositio Markov code. The relay compresses the received sigal ad maps the compressed versio of the received sigal ito a codeword coditioed o the codeword of the previous block. The receiver performs joit decodig after it has received all of the B blocks. We show that this codig scheme ca be viewed as a geeralizatio of the well-kow Compress-Ad-Forward (CAF scheme proposed by Cover ad El Gamal. Our codig scheme provides optios for preservig the correlatio betwee the chael iputs of the trasmitter ad the relay, which is ot possible i the CAF scheme. Thus, our proposed scheme may potetially yield a larger achievable rate tha the CAF scheme. This work was supported by NSF Grats CCR 03-3, CCF ad CCF , ad was preseted i part at IEEE Iformatio Theory Workshop, Lake Tahoe, CA, September 2007.

2 Itroductio As the simplest model for cooperative commuicatios, relay chael has attracted plety of attetio sice 97, whe it was first itroduced by va der Meule []. I 979, Cover ad El Gamal proposed two major codig schemes for the relay chael [2]. These two schemes are widely kow as Decode-Ad-Forward (DAF ad Compress-Ad-Forward (CAF today; see [3] for a recet review. These two codig schemes represet two differet types of cooperatio. I DAF, the cooperatio is relatively obvious, where the relay decodes the message from the trasmitter, ad the trasmitter ad the relay cooperatively trasmit the costructed commo iformatio to the receiver i the ext block. I CAF, the cooperatio spirit is less easy to recogize, as the message is set by the trasmitter oly oce. However, the relay cooperates with the trasmitter by compressig ad sedig its sigal to the receiver. The rate gais i these achievable schemes are due to the fact that, through the chael from the trasmitter to the relay, correlatio is created betwee the trasmitter ad the relay, ad this correlatio is utilized to improve the rates. I the DAF scheme, correlatio is created ad the utilized i a block Markov codig structure. More specifically, a full correlatio is created by decodig the message fully at the relay, which eables the trasmitter ad the relay to create ay kid of joit distributio for the chael iputs i the ext block. The shortcomig of the DAF scheme is that by forcig the relay to decode the message i its etirety, it limits the overall achievable rate by the rate from the trasmitter to the relay. I cotrast, by ot forcig a full decodig at the relay, the CAF scheme does ot limit the overall rate by the rate from the trasmitter to the relay, ad may yield higher overall rates. The shortcomig of the CAF scheme, o the other had, is that the correlatio offered by the block codig structure is ot utilized effectively, sice i each block the chael iputs X ad X from the trasmitter ad the relay are idepedet, as the trasmitter seds the message oly oce. However, the essece of good codig schemes i multi-user systems with correlated sources (e.g., [4, 5] is to preserve the correlatio of the sources i the chael iputs. Motivated by this basic observatio, i this paper, we propose a ew codig scheme for the relay chael, that is based o the idea of preservig the correlatio i the chael iputs from the trasmitter ad the relay. We will show that our ew codig scheme may be viewed as a more geeral versio of the CAF scheme, ad therefore, our ew codig scheme may potetially yield larger rates tha the CAF scheme. Our proposed scheme ca be further combied with the DAF scheme to yield rates that are potetially larger tha those offered by both DAF ad CAF schemes, similar i spirit to [2, Theorem 7]. Our ew achievability scheme for the relay chael may be viewed as a variatio of the codig scheme of Ahlswede ad Ha [5] for the multiple access chael with a correlated helper. I our work, we view the relay as the helper because the receiver does ot eed to decode the iformatio set by the relay. Also, we ote that the relay is a correlated helper as the commuicatio chael from the trasmitter to the relay provides relay for free a 2

3 correlated versio of the sigal set by the trasmitter. The key aspects of the Ahlswede- Ha [5] scheme are: to preserve the correlatio betwee the chael iputs of the trasmitter ad the helper (relay, ad for the receiver to decode a virtual source, a compressed versio of the helper, but ot the etire sigal of the helper. Our ew codig scheme is i the form of block Markov codig. The trasmitter uses a superpositio Markov code, similar to the oe used i the DAF scheme [2], except i the radom codebook geeratio stage, a method similar to the oe i [4] is used i order to preserve the correlatio betwee the blocks. Thus, i each block, the fresh iformatio message is mapped ito a codeword coditioed o the codeword of the previous block. Therefore, the overall codebook at the trasmitter has a tree structure, where the codewords i block l emaate from the codewords i block l. The depth of the tree is. A similar strategy is applied at the relay side where the compressed versio of the received sigal is mapped ito a two-block-log codeword coditioed o the codeword of the previous block. Therefore, the overall codebook at the relay has a tree structure as well. As a result of this codig strategy, we successfully preserve the correlatio betwee the chael iputs of the trasmitter ad the relay. However, ulike the DAF scheme where a full correlatio is acquired through decodig at the relay, our scheme provides oly a partially correlated helper at the relay by ot tryig to decode the trasmitter s sigal fully. From [4,5], we ote that the chael iputs are correlated through the virtual sources i our case, ad therefore, the chael iputs betwee the cosecutive blocks are correlated. This correlatio betwee the blocks will surely hurt the achievable rate. The correlatio betwee the blocks is the price we pay for preservig the correlatio betwee the chael iputs of the trasmitter ad the relay withi ay give block. At the decodig stage, we perform joit decodig for the etire B blocks after all of the B blocks have bee received, which is differet compared with the DAF ad CAF schemes. The reaso for performig joit decodig at the receiver is that due to the correlatio betwee the blocks, decodig at ay time before the ed of all the B blocks would decrease the achievable rate. We ote that joit decodig icreases the decodig complexity ad the delay as compared to DAF ad CAF, though either of these is a major cocer i a iformatio theoretic cotext. The oly problem with the joit decodig strategy is that it makes the aalysis difficult as it requires the evaluatio of some mutual iformatio expressios ivolvig the joit probability distributios of up to B blocks of codes, where B is very large. The aalysis of the error evets provides us three coditios cotaiig mutual iformatio expressios ivolvig ifiite letters of the uderlyig radom process. Evaluatio of these mutual iformatio expressios is very difficult, if ot impossible. To obtai a computable result, we lower boud these mutual iformatios by otig some Markov structure i the uderlyig radom process. This operatio gives us three coditios to be satisfied by the achievable rates. These coditios ivolve eleve variables, the two chael iputs from the trasmitter ad the relay, the two chael outputs at the relay ad the receiver 3

4 ad the compressed versio of the chael output at the relay, i two cosecutive blocks, ad the chael iput from the trasmitter i the previous block. We fiish our aalysis by revisitig the CAF scheme. We develop a equivalet represetatio for the achievable rates give i [2] for the CAF scheme. We the show that this equivalet represetatio for the achievable rates for the CAF scheme is a special case of the achievable rates i our ew codig scheme, which is obtaied by a special selectio of the eleve variables metioed above. We therefore coclude that our proposed codig scheme yields potetially larger rates tha the CAF scheme. More importatly, our ew codig scheme creates more possibilities, ad therefore a spectrum of ew achievable schemes for the relay chael through the selectio of the uderlyig probability distributio, ad yields the well-kow CAF scheme as a special case, correspodig to a particular selectio of the uderlyig probability distributio. 2 The Relay Chael Cosider a relay chael with fiite iput alphabets X, X ad fiite output alphabets Y, Y, characterized by the trasitio probability p(y, y x, x. A -legth block code for the relay chael p(y, y x, x cosists of ecoders f, f i, i =,..., ad a decoder g f : M X f i : Y i X, i =,..., g : Y M where the ecoder at the trasmitter seds x = f(m ito the chael, where m M {, 2,..., M}; the ecoder at the relay at the ith chael istace seds x i = f i (y i ito the chael; the decoder outputs ˆm = g(y. The average probability of error is defied as P e = M m M P r( ˆm m m is trasmitted ( A rate R is achievable for the relay chael p(y, y x, x if for every 0 < ǫ <, η > 0, ad every sufficietly large, there exists a -legth block code (f, f i, g with P e ǫ ad l M R η. 3 A New Achievability Scheme for the Relay Chael We adopt a block Markov codig scheme, similar to the DAF ad CAF schemes. We have overall B blocks. I each block, we trasmit codewords of legth. We deote the variables i the lth block with a subscript of [l]. We deote -letter codewords trasmitted i each block with a superscript of. Followig the stadard relay chael literature, we deote 4

5 the (radom sigals trasmitted by the trasmitter ad the relay by X ad X, the sigals received at the receiver ad the relay by Y ad Y, ad the compressed versio of Y at the relay by Ŷ. The realizatios of these radom sigals will be deoted by lower-case letters. For example, the -letter sigals trasmitted by the trasmitter ad the relay i the lth block will be represeted by x [l] ad x [l]. Cosider the followig discrete time statioary Markov process G [l] (X, Ŷ, X, y, Y [l] for l = 0,,..., B, with the trasitio probability distributio p ( (x, ŷ, x, y, y [l] (x, ŷ, x, y, y [l ] = p(x [l] x [l ] p(y [l], y [l] x [l], x [l] p(x [l] ŷ [l ] p(ŷ [l] y [l], x [l] (2 The codebook geeratio ad the ecodig scheme for the lth block, l =,...,B, are as follows. Radom codebook geeratio: Let (x [l ] (m [l ], x [l ], y [l ], y [l ] deote the trasmitted ad the received sigals i the (l st block, where m [l ] is the message set by the trasmitter i the (l st block. A illustratio of the codebook structure is show i Figure.. For each x [l ] (m [l ] sequece, geerate M sequeces, where x [l] (m [l], the m [l] th sequece, is geerated idepedetly accordig to i= p(x i[l] x i[l ]. Here, every codeword i the (l st block expads ito a codebook i the lth block. This expasio is idicated by a directed coe from x [l ] to x [l] i Figure. 2. For each x [l ] sequece, geerate L Ŷ [l ] sequeces idepedetly uiformly distributed i the coditioal strog typical set T δ (x [l ] with respect to the distributio p(ŷ [l ] x [l ]. If l L > I(Y [l ]; Ŷ[l ] X [l ], for ay give y[l ] sequece, there exists oe ŷ[l ] sequece with high probability whe is sufficietly large such that (y[l ], ŷ [l ], x [l ] are joitly typical accordig to the probability distributio p(y [l ], ŷ [l ], x [l ]. Deote this ŷ[l ] as ŷ [l ] (y [l ], x [l ]. Here, the quatizatio from y[l ] to ŷ [l ], parameterized by x [l ], is idicated i Figure by a directed coe from y[l ] to ŷ [l ], with a straight lie from x [l ] for the parameterizatio. 3. For each ŷ[l ], geerate oe x [l] sequece accordig to i= p(x i[l] ŷ i[l ]. This oe-to-oe mappig is idicated by a straight lie betwee ŷ[l ] ad x [l] i Figure. Ecodig: Let m [l] be the message to be set i this block. If (x [l ] (m [l ], x [l ] are set ad y[l ] is received i the previous block, we choose (x [l] (m [l], ŷ[l ] (y [l ], x [l ], x [l] accordig to the code geeratio method described above ad trasmit (x [l] (m [l], x [l]. I Strog typical set ad coditioal strog typical set are defied i [6, Defiitio.2.8,.2.9]. For the sake of simplicity, we omit the subscript which is used to idicate the uderlyig distributio i [6]. 5

6 trasmitter block [] block [2] block [ l] block [B] x[] x [2] x [ l] x[b] relay x [] y y [] [] x [2] y y [2] [2] x [3] y [ l ] x y [ l] [ l] [ l+] y [ l] x y [] x y [B] [B] y [B] Figure : Codebook structure. the first block, we assume a virtual 0th block, where (x [0], x [0], ŷ [0], as well as x [], are kow by the trasmitter, the relay ad the receiver. I the Bth block, the trasmitter radomly geerates oe x [B] sequece accordig to i= p(x i[b] x i[] ad seds it ito the chael. The relay, after receivig y[b], radomly geerates oe ŷ [B] sequece accordig to i= p(ŷ i[b] y i[b], x i[b]. We assume that the trasmitter ad the relay reliably trasmit x [B] ad ŷ [B] to the receiver usig the ext b blocks, where b is some fiite positive iteger. We ote that B + b blocks are used i our scheme, while oly the first B blocks carry the message. Thus, the fial achievable rate is l M which coverges to lm for B+b sufficietly large B sice b is fiite. Decodig: After receivig B blocks of y sequeces, i.e., y [],...,y [B], ad assumig x [], x [B] ad ŷ [B] are kow at the receiver, we seek x [],...,x [], ŷ [],...,ŷ [], x [2],...,x [B], such that ( x [],...,x [B], ŷ[],...,ŷ[b], x [],...,x [B], y[],...,y[b] Tδ accordig to the statioary distributio of the Markov process G [l] i (2. The differeces betwee our scheme ad the CAF scheme are as follows. At the trasmitter side, i our scheme, the fresh message m [l] is mapped ito the codeword x [l] coditioed o the codeword of the previous block x [l ], while i the CAF scheme, m [l] is mapped ito x [l], which is geerated idepedet of x [l ]. At the relay side, i our scheme, the compressed received sigal ŷ[l ] is mapped ito the codeword x [l], which is geerated accordig to p(x [l] ŷ [l ], while i the CAF scheme, x [l] is geerated idepedet of ŷ[l ]. The aim of our desig is to preserve the correlatio built i the (l st block i the chael iputs of the lth block. At the decodig stage, we perform joit decodig for the etire B blocks after all of the B blocks have bee received, while i the CAF scheme, the decodig of the message of the (l st block is performed at the ed of the lth block. Probability of error: Whe is sufficietly large, the probability of error ca be made arbitrarily small whe the followig coditios are satisfied. 6

7 . For all j such that j B, (B j lm + (B ji(ŷ[l]; Y [l] X [l], X [l] < I(X [] 2. For all j, k such that j < k B, (B jl M + (B ki(ŷ[l]; Y [l] X [l], X [l] < I(X [] [k+] ; Y [B] 3. For all j, k such that k < j B, [j+] ; Y [B], Ŷ[B] X [j ], X (3, Ŷ[B], X [B], Ŷ [k ], X [j+] X [j ], X (4 (j ki(ŷ[l]; Y [l] X [l], X [l] + (B j lm + (B ji(ŷ[l]; Y [l] X [l], X [l] < I(X [] [k+] ; Y [B], Ŷ[B] X [j ], X (5 where the subscript [l] o the left had sides of (3, (4 ad (5 idicates that the correspodig radom variables belog to a geeric sample g [l] of the uderlyig radom process i (2. The details of the calculatio of the probability of error where these coditios are obtaied ca be foud i Appedix A.. The derivatio uses stadard techiques from iformatio theory, such as coutig error evets, etc. I the above coditios, we used the otatio A [B] as a shorthad to deote the sequece of radom variables A, A [j+],..., A [B]. Cosequetly, we ote that the mutual iformatios o the right had sides of (3, (4 ad (5 cotai vectors of radom variables whose legths go up to B, where B is very large. I order to simplify the coditios i (3, (4 ad (5, we lower boud the mutual iformatio expressios o the right had sides of (3, (4 ad (5 by those that ivolve radom variables that belog to up to three blocks. The detailed derivatio of the followig lower boudig operatio ca be foud i Appedix A.2. The derivatio uses stadard techiques from iformatio theory, such as the chai rule of mutual iformatio, ad exploitig the Markov structure of the ivolved radom variables.. For all j such that j B, ( (B j l M + I(Ŷ[l]; Y [l] X [l], X [l] < (B ji(y [l] ; X [l], Ŷ[l], X [l] X [l 2], X [l ], Y [l ] (6 7

8 2. For all j, k such that j < k B, (k j ( l M + (B k l M + I(Ŷ[l]; Y [l] X [l], X [l] < (k ji(x [l] ; Y [l], Ŷ[l] X [l], Y [l ], Ŷ[l ], X [l ], X [l 2] + (B ki(y [l] ; X [l], Ŷ[l], X [l] X [l 2], X [l ], Y [l ] (7 3. For all j, k such that k < j B, ( (j ki(ŷ[l];y [l] X [l], X [l] + (B j l M + I(Ŷ[l]; Y [l] X [l], X [l] < (j ki(y [l] ; Ŷ[l], X [l] X [l], X [l ], X [l ], Y [l ] + (B ji(y [l] ; X [l], Ŷ[l], X [l] X [l 2], X [l ], Y [l ] (8 We ca further derive sufficiet coditios for the above three coditios i (6, (7 ad (8 as follows. We defie the followig quatities: C l M + I(Ŷ[l]; Y [l] X [l], X [l] (9 C 2 l M (0 C 3 I(Ŷ[l]; Y [l] X [l], X [l] ( D I(Y [l] ; X [l], Ŷ[l], X [l] X [l 2], X [l ], Y [l ] (2 D 2 I(X [l] ; Y [l], Ŷ[l] X [l], Y [l ], Ŷ[l ], X [l ], X [l 2] (3 D 3 I(Y [l] ; Ŷ[l], X [l] X [l], X [l ], X [l ], Y [l ] (4 The, the sufficiet coditios i (6, (7 ad (8 ca also be writte as,. For all j such that j B, (B jc < (B jd (5 2. For all j, k such that j < k B, (k jc 2 + (B kc < (k jd 2 + (B kd (6 3. For all j, k such that k < j B, (j kc 3 + (B jc < (j kd 3 + (B jd (7 8

9 We ote that the above coditios are implied by the followig three coditios, C < D (8 C 2 < D 2 (9 C 3 < D 3 (20 or i other words, by, R η l M < I(X [l]; Y [l], Ŷ[l] X [l], Y [l ], Ŷ[l ], X [l ], X [l 2] (2 I(Ŷ[l]; Y [l] X [l], X [l] < I(Y [l] ; Ŷ[l], X [l] X [l], X [l ], X [l ], Y [l ] (22 R η + I(Ŷ[l]; Y [l] X [l], X [l] < I(Y [l] ; X [l], Ŷ[l], X [l] X [l 2], X [l ], Y [l ] (23 The expressios i (2, (22 ad (23 give sufficiet coditios to be satisfied by the rate i order for the probability of error to become arbitrarily close to zero. We ote that these coditios deped o variables used i three cosecutive blocks, l, l ad l 2. With this developmet, we obtai the mai result of our paper which is stated i the followig theorem. Theorem The rate R is achievable for the relay chael, if the followig coditios are satisfied R I(Y, Ŷ; X X, Ŷ, Ỹ, X, X (24 I(Ŷ; Y X, X <I(Y ; Ŷ, X X, Ỹ, X, X (25 R + I(Ŷ; Y X, X I(Y ; Ŷ, X, X Ỹ, X, X (26 where X ( X, Ŷ, X, Ỹ, Ỹ (X, Ŷ, X, Y, Y (27 p(x, ŷ, x, y, y, x = p( x, ŷ, x, ỹ, ỹ, x (28 p(x, ŷ, x, y, y x, ŷ, x, ỹ, ỹ = p(x xp(x ŷ p(y, y x, x p(ŷ y, x (29 I the above theorem, the otatios ad are used to deote the sigals belogig to the previous block ad the block before the previous block, respectively, with respect to a referece block. Therefore, we see that the achievable rate i the relay chael, usig our proposed codig scheme, eeds to satisfy three coditios that ivolve mutual iformatio expressios calculated usig eleve variables which satisfy the Markov chai costrait i (27, the margial distributio costrait i (28, ad the additioal iter-block probability distributio costrait i (29. I the ext sectio, we will revisit the well-kow CAF scheme proposed i [2]. First, we 9

10 will develop a equivalet represetatio for the well-kow represetatio of the achievable rate i the CAF scheme. We will the show that the rates achievable by the CAF scheme ca be achieved with our proposed scheme by choosig a certai special structure for the joit probability distributio of the eleve radom variables i Theorem while still satisfyig the three coditios i (27, (28 ad (29. 4 Revisitig the Compress-Ad-Forward (CAF Scheme I [2], the achievable rates for the CAF are characterized as i the followig theorem. Theorem 2 ( [2] The rate R is achievable for the relay chael, if the followig coditios are satisfied R I(X; Y, Ŷ X (30 I(Y ; Ŷ X, Y < I(X ; Y (3 where p(x, x, y, y, ŷ = p(xp(x p(y, y x, x p(ŷ y, x (32 I the followig theorem, we preset three equivalet forms for the rate achievable by the CAF scheme. Theorem 3 The followig three coditios are equivalet.. For some p(x, x, y, y, ŷ = p(xp(x p(y, y x, x p(ŷ y, x R I(X; Ŷ X I(X; Y Ŷ, X (33 I(Y ; Ŷ X < I(Ŷ; Y X + I(X ; Y (34 2. For some p(x, x, y, y, ŷ = p(xp(x p(y, y x, x p(ŷ y, x R I(X; Ŷ X I(X; Y Ŷ, X (35 R I(X; Ŷ X + I(Y ; Ŷ X I(X, Ŷ; Y X + I(X ; Y (36 3. For some p(x, x, y, y, ŷ = p(xp(x p(y, y x, x p(ŷ y, x R I(X; Ŷ X I(X; Y Ŷ, X (37 I(Ŷ; Y X, X < I(Ŷ; Y X, X + I(X ; Y X (38 R I(X; Ŷ X + I(Y ; Ŷ X I(X, Ŷ; Y X + I(X ; Y (39 0

11 The proof of the above theorem is give i Appedix A.3. We rewrite the fial equivalet represetatio i (37, (38 ad (39 i the followig more compact form i order to compare the rates achievable with our proposed scheme ad the rates achievable with the CAF scheme i the ext sectio. R I(X; Y, Ŷ X (40 I(Ŷ; Y X, X < I(Ŷ, X ; Y X (4 R + I(Y ; Ŷ X, X I(X, Ŷ, X ; Y (42 5 Compariso of the Achievable Rates with Our Scheme ad with the CAF Scheme We ote that the coditios o the achievable rates with our scheme give i Theorem, i.e., (24, (25, (26, are very similar to the fial equivalet form for the coditios o the achievable rates with the CAF scheme, i.e., (40, (4, (42, except for two differeces. First, the chael iputs of the trasmitter ad the relay, i.e., X ad X, i our proposed scheme ca be correlated, while i the CAF scheme they are idepedet, ad secod, i our scheme there are some extra radom variables, which mutual iformatio expressios are coditioed o, e.g., X, X, Ỹ, Ŷ, X. These two differeces come from our codig scheme where we itroduced correlatio betwee the chael iputs of the trasmitter ad the relay i a block, ad betwee the variables across the blocks. The correlatio betwee the chael iputs from the trasmitter ad the relay i ay block is a advatage, as for chaels which favor correlatio, this traslates ito higher rates. However, the correlatio across the blocks is a disadvatage as it decreases the efficiecy of trasmissio, ad therefore the achievable rates. I fact, the price we pay for the correlatio betwee the chael iputs i ay give block is precisely the correlatio we have created across the blocks. For a give correlatio structure, it is ot clear which of these two opposite effects will overcome the other. That is, the rate of our scheme for a certai correlated distributio may be lower or higher tha the rate of the CAF scheme. However, we ote that the CAF scheme ca be viewed as a special case of our proposed scheme by choosig a idepedet distributio, i.e., by choosig the followig coditioal distributio i (29 p(x, ŷ, x, y, y x, ŷ, x, ỹ, ỹ = p(xp(x p(y, y x, x p(ŷ x, y (43 I this case, the expressios i Theorem, i.e., (24, (25, (26, degeerate ito the third equivalet form for the CAF scheme i Theorem 3, i.e., (40, (4, (42. The above observatio implies that the maximum achievable rate with our proposed scheme over all possible distributios is ot less tha the achievable rate of the CAF scheme. Thus, we ca claim that this paper offers more choices i the achievability scheme tha the CAF scheme, ad

12 that these choices may potetially yield larger achievable rates tha those offered by the CAF scheme. A Appedix A. Probability of Error Calculatio The average probability of decodig error ca be expressed as follows, where P e = Pr(E E 2 = Pr(E + Pr(E 2 E c (44 E ( x [,...,B], ŷ [,...,B], x [,...,B], [,...,B] y / Tδ (45 E 2 ( x [,...,B], ŷ [,...,B], x [,...,B], y [,...,B] Tδ (46 x [,...,B], ŷ [,...,] x [,...,B],ŷ [,...,] where ( x [,...,B], ŷ [,...,], x [2,...,B] is aother codeword that is geerated accordig to the rules of our scheme. From (2, we ote the followig Markov properties:. coditioed o (Ŷ[l], X [l], X [l], Y [l] is idepedet of G [...,l ] ad G [l,...] ; 2. coditioed o (X [l ], Ŷ[l ], G [l,...] is idepedet of G [...,l ]. Here, ad i the sequel, subscript [l] refers to a geeric block withi overall B blocks. Pr(E ca be upper bouded as follows: Pr(E B ( ( Pr (x [l], x [l], y [l], y [l], g [...,l ] / T δ g[...,l ] T δ l= + Pr ( (ŷ [l], x [l], x [l], y [l], y [l], g [...,l ] / T δ (x [l], x [l], y [l], y [l], g [...,l ] T δ (47 From the way the code is geerated, we have Pr ( (x [l], x [l], y [l], y [l], g [...,l ] / T δ g [...,l ] T δ ǫ (48 The compressio from y [l] to ŷ [l] is a coditioal versio of a rate-distortio code. If R > I(Y ; Ŷ X, the, whe is sufficietly large, we have Pr ( (ŷ [l], x [l], x [l], y [l], y [l], g [...,l ] / T δ (x [l], x [l], y [l], y [l], g [...,l ] T δ ǫ (49 Thus, Pr(E 2Bǫ (50 2

13 Now we switch to the error evet E 2. Pr(E 2 E c = p(x [,...,B], ŷ [,...,B], x [,...,B], y [,...,B] x [,...,B],ŷ [,...,B],x [,...,B],y T [,...,B] δ max x [,...,B],ŷ [,...,B],x [,...,B],y [,...,B] Pr ( E 2 (x [,...,B], ŷ [,...,B], x [,...,B], y [,...,B] set T δ Pr ( E 2 (x [,...,B], ŷ [,...,B], x [,...,B], y [,...,B] set (5 From our proposed codig scheme, we ote that the codebooks at both trasmitter ad relay have tree structures with B stages. A correct codeword x [,...,] ca be viewed as a path i the tree-structured codebook at the trasmitter. Similarly, for the codeword ŷ [,...,] at the relay. A error occurs whe we diverge from the correct path at a certai stage i the tree. Thus, the error evet E 2 ca be decomposed as E 2 = j=2,..., k=2,..., ( x [],..., x [j ], ŷ [],..., ŷ [k ]=(x [],...,x [j ],ŷ [],...,ŷ [k ] ( x, ŷ (x,ŷ ( x [],..., x [B], ŷ [],..., ŷ [B], x [],..., x [B], y [],...,y [B] Tδ (52 where each term i the uio i the above equatio represets the error evet that results whe we diverge from the correct paths at the jth stage at the trasmitter ad at the kth stage at the relay. Let us defie F to be the set cosistig of all feasible codeword pairs (x, ŷ for the jth block for a give x [j ] ad x. The, we have L F F M exp((h(ŷ X, X + 2ǫ ( ǫ exp((h(ŷ X 2ǫ exp((i(ŷ; Y X + ǫ M exp((h(ŷ X, X + 2ǫ ( ǫ exp((h(ŷ X 2ǫ M exp((i(ŷ; Y X, X + 6ǫ (53 We also defie F 2 to be the set cosistig of all feasible codewords x a give x [j ]. The, for the jth block for F 2 F 2 = M (54 Similarly, we defie F 3 to be the set cosistig of all feasible codewords ŷ for the jth block 3

14 for a give x ad x. The, F 3 F 3 L exp((h(ŷ X, X + 2ǫ ( ǫ exp((h(ŷ X 2ǫ exp((i(ŷ; Y X, X + 6ǫ (55 We defie the error evet E 2jk E 2jk ( x [],..., x [j ], ŷ [],..., ŷ [k ]=(x [],...,x [j ],ŷ [],...,ŷ [k ] ( x, ŷ (x,ŷ ( x [],..., x [B], ŷ [],..., ŷ [B], x [],..., x [B], y [],...,y [B] Tδ (56 The, we have ad Pr(E 2 E c Pr(E 2jk E c (57 j=2 k=2 Pr(E 2jk E c A jk where max ( x [],..., x [], ŷ [],..., ŷ [] A jk A jk codeword ( x ( [],..., x [], ŷ [],..., ŷ [] : x [],..., x [j ], ŷ [],..., ŷ [k ] ( x, ŷ P ( x [],..., x [], ŷ [],..., ŷ [] P ( x [],..., x [], ŷ [],..., ŷ [] (58 = ( x [],..., x [j ], ŷ [],..., ŷ [k ] ( x, ŷ Pr(( x [],..., x [B], ŷ [],..., ŷ [B], x [],..., x [B], y [],...,y [B] T δ (60 ( give x [],...,x [B], ŷ [],...,ŷ [B], x [],..., x [B], y [],..., y [B] T δ. I order to have the probability of such error evets go to zero, we eed the followig coditios to hold. Whe j = k, from the structure of the block Markov code ad (53, we have (59 A jk = F B j M B j exp((b j(i(ŷ[l]; Y [l] X [l], X [l] + 6ǫ (6 4

15 ad ad ad P ( x [],..., x [], ŷ [],..., ŷ [] exp((h(x [] exp( (H(X [] = exp(( I(X [] Whe j < k, we have [B] [j+] Y, Ŷ[B], X [j ], X + 2ǫ [j+] X [j ], X 2ǫ [j+] ; Y [B], Ŷ[B] X [j ], X + 4ǫ (62 A jk = F k j 2 F B k M B j exp((b k(i(ŷ[l]; Y [l] X [l], X [l] + 6ǫ (63 P ( x [],..., x [], ŷ [],..., ŷ [] exp((h(x [] exp( (H(X [] = exp(( I(X [] Whe j > k, we have [B] [k+] Y, Ŷ[B], Ŷ [k ], X [j ], X + 2ǫ [k+] X [j ], X 2ǫ [k+] ; Y [B], Ŷ[B], Ŷ [k ], X [j+] X [j ], X + 4ǫ (64 A jk = F j k 3 F B j exp((j k(i(ŷ; Y X, X + 6ǫ P ( x [],..., x [], ŷ [],..., ŷ [] exp((h(x [] exp( (H(X [] = exp(( I(X [] M B k l exp((b k(i(ŷ[l]; Y [l] X [l], X [l] + 6ǫ (65 [B] [k+] Y, Ŷ[B], X [j k], X + 2ǫ [k+] X[j ], X 2ǫ [k+] ; Y [B], Ŷ[B] X [j ], X + 4ǫ (66 Thus, whe is sufficietly large, usig (58 ad (6 through (66, we have if the followig coditios are satisfied: Pr(E 2jk E c ǫ, j, k = 2,...,B (67 5

16 . For all j such that j B, (B j lm + (B ji(ŷ[l]; Y [l] X [l], X [l] < I(X [] [j+] ; Y [B], Ŷ[B] X [j ], X (68 2. For all j, k such that j < k B, (B j l M + (B ki(ŷ[l]; Y [l] X [l], X [l] < I(X [] [k+] ; Y [B], Ŷ[B], X [B], Ŷ [k ], X [j+] X [j ], X (69 3. For all j, k such that k < j B, (j ki(ŷ[l]; Y [l] X [l], X [l] + (B j lm + (B ji(ŷ[l]; Y [l] X [l], X [l] < I(X [] [k+] ; Y [B], Ŷ[B] X [j ], X (70 Therefore, we have P e = Pr(E + Pr(E 2 E c (2B + B2 ǫ (7 Whe is sufficietly large, (2B + B 2 ǫ ca be made arbitrarily small. 6

17 A.2 Lower Boudig the Mutual Iformatios i (3, (4, (5 For the right had side of (3, we have I(X [] = l=j [j+] ; Y [B], Ŷ[B] X [j ], X I(X [] + I(X [] 2 = I(Y ; X, Ŷ X, X [j ] + 3 = 4 = 5 = [j+] ; Y [l] X [j ], X, Y [l ] [j+] ; Y [B], Ŷ[B] X [j ], X, Y [] l=j+ + I(Y [B], Ŷ[B] ; X [B], X [] X [j ], X, Y [] l=j+ I(Y [l] ; X [l], Ŷ[l], X [l] X [j ], X, Y [l ] I(Y [l] ; X [l], Ŷ[l], X [l] X [j ], X, Y [l ] + I(Y [B] ; X [B], Ŷ[B] X [B], X [] + I(Y [B], Ŷ[B] ; X [B], X [] X [j ], X, Y [] l=j+ I(Y [l] ; X [l], Ŷ[l], X [l] X [j ], X, Y [l ] + I(Y [B] ; X [B], Ŷ[B] X [B], X [], X [j ], X, Y [] + I(Y [B] ; X [B], X [] X [j ], X, Y [] l=j+ l=j+ I(Y [l] ; X [l], Ŷ[l], X [l] X [j ], X, Y [l ] + I(Y [B] ; X [B], Ŷ[B], X [B], X [] X [j ], X, Y [] B I(Y [l] ; X [l], Ŷ[l], X [l] X [j ], X, Y [l ] 6 (B ji(y [l] ; X [l], Ŷ[l], X [l] X [l 2], X [l ], Y [l ] (72 where. follows from the chai rule; 2. because of Markov properties ad 2; 3. because of the statioarity of the radom process ad the property that coditioig reduces etropy; 4. because of Markov property 2; 5. because of Markov property ; 6. because of Markov property 2 ad the statioarity of the radom process. 7

18 For the right had side of (4, we have I(X [] [k+] ; Y [B], Ŷ[B], Ŷ [k ], X [j+] X [j ], X = I(X [] [k+] ; Y, Ŷ X [j ], X + k l=j+ + I(X [] + l=k+ + I(X [] I(X [] I(X [] [k+] ; Y [l], Ŷ[l], X [l] X [j ], Y [l ], Ŷ [l ], X [l ] [k+] ; Y, X X [j ], Y [k ], Ŷ [k ], X [k ] 2 I(X ; Y, Ŷ X [j ], X + 3 = 4 + I(X, Ŷ; Y X [j ], Y [k ] + l=k+ [k+] ; Y [l] X [j ], Y [l ], Ŷ [k ], X [k+] ; Y [B], Ŷ[B] X [j ], Y [] k l=j+, Ŷ [k ], X I(X [l] ; Y [l], Ŷ[l] X [j ], Y [l ], Ŷ [l ], X [l], Ŷ [k ], X I(X [l], Ŷ[l], X [l] ; Y [l] X [j ], Y [l ], Ŷ [k ], X + I(X [], X [B] ; Y [B], Ŷ[B] X [j ], Y [] k l=j+ + l=k+ I(X [l] ; Y [l], Ŷ[l] X [j ], Y [l ], Ŷ [l ], X [l] I(X [l], Ŷ[l], X [l] ; Y [l] X [j ], Y [l ] + I(X [B] ; Y [B], Ŷ[B] X [], X [B], Ŷ [k ], X, Ŷ [k ], X + I(X [B], Ŷ[B]; Y [B] X [j +B k], Y [] [j+b k] [j+b k], X[B] [j+b k] + I(X [], X [B] ; Y [B], Ŷ[B] X [j ], Y [] k l=j+ + l=k+ I(X [l] ; Y [l], Ŷ[l] X [j ], Y [l ], Ŷ [l ], X [l] I(X [l], Ŷ[l], X [l] ; Y [l] X [j ], Y [l ], Ŷ [k ], X, Ŷ [k ], X + I(X [B] ; Y [B], Ŷ[B] X [B], S + I(X [B], Ŷ[B], X [B] ; Y [B] S 5 (k ji(x [l] ; Y [l], Ŷ[l] X [l], Y [l ], Ŷ[l ], X [l ], X [l 2] + (B ki(y [l] ; X [l], Ŷ[l], X [l] X [l 2], X [l ], Y [l ] (73 8

19 where S (X [j +B k], Y [] [j+b k] [j+b k], X[] [j+b k], X [j ], Y [], Ŷ [k ], X (74 ad. follows from the chai rule; 2. because of Markov properties ad 2; 3. because of the statioarity of the radom process; 4. because of the followig derivatio I(X [B] ; Y [B], Ŷ[B] X [], X [B] + I(X [B], Ŷ[B]; Y [B] X [j +B k], Y [] [j+b k] [j+b k], X[B] [j+b k] + I(X [], X [B] ; Y [B], Ŷ[B] X [j ], Y [], Ŷ [k ], X I(X [B] ; Y [B], Ŷ[B] X [], X [B], S + I(X [B], Ŷ[B]; Y [B] X [B], S + I(X [], X [B] ; Y [B], Ŷ[B] S I(X [B] ; Y [B], Ŷ[B] X [], X [B], S + I(X [B], Ŷ[B]; Y [B] X [B], S + I(X [] ; Y [B], Ŷ[B] X [B], S + I(X [B] ; Y [B] S = I(X [B] ; Y [B], Ŷ[B] X [B], S + I(X [B], Ŷ[B], X [B] ; Y [B] S (75 5. because of Markov property ad 2 ad the statioarity of the radom process. 9

20 For the right had side of (5, we have I(X [] = l=k [k+] ; Y [B], Ŷ[B] X [j ], X I(X [] + I(X [] [k+] ; Y [l] X [j ], X, Y [l ] [k+] ; Y [B], Ŷ[B] X [j ], X, Y [] 2 I(Y ; Ŷ X, X + 3 = 4 j l=k+ + I(Y ; X, Ŷ, X X [j ], X, Y [j ] + l=j+ I(Y [l] ; Ŷ[l], X [l] X [l], X, Y [l ] I(Y [l] ; X [l], Ŷ[l], X [l] X [j ], X, Y [l ] + I(Y [B], Ŷ[B] ; X [] j l=k+ + l=j+ I(Y [l] ; Ŷ[l], X [l] X [l], X, Y [l ], X [B] X [j ], X, Y [] I(Y [l] ; X [l], Ŷ[l], X [l] X [j ], X, Y [l ] + I(Y [B] ; Ŷ[B] X [B], X [B] + I(Y [B] ; X [B], Ŷ[B], X [B] X [] [k+b j], X [k+b j], Y [] [k+b j] + I(Y [B], Ŷ[B] ; X [] j l=k+ + l=j+ I(Y [l] ; Ŷ[l], X [l] X [l], X, Y [l ], X [B] X [j ], X, Y [] I(Y [l] ; X [l], Ŷ[l], X [l] X [j ], X, Y [l ] + I(Y [B] ; Ŷ[B], X [B] X [B], S + I(Y [B] ; X [B], Ŷ[B], X [B] S 5 (j ki(y [l] ; Ŷ[l], X [l] X [l], X [l ], X [l ], Y [l ] + (B ji(y [l] ; X [l], Ŷ[l], X [l] X [l 2], X [l ], Y [l ] (76 where S (X [k+b j], Y [], X [j ], X (77 ad. follows from the chai rule; 2. because of Markov properties ad 2; 3. because of the statioarity of the radom process; 20

21 4. because of the followig derivatio I(Y [B] ; Ŷ[B] X [B], X [B] + I(Y [B] ; X [B], Ŷ[B], X [B] X [] [k+b j], X [k+b j], Y [] [k+b j] + I(Y [B], Ŷ[B] ; X [], X [B] X [j ], X, Y [] I(Y [B] ; Ŷ[B] X [B], X [B], S + I(Y [B] ; X [B], Ŷ[B], X [B] X [], S + I(Y [B], Ŷ[B] ; X [], X [B] S = I(Y [B] ; Ŷ[B] X [B], X [B], S + I(Y [B] ; X [B], Ŷ[B], X [B] X [], S + I(Y [B], Ŷ[B] ; X [B] X [], S + I(Y [B], Ŷ[B] ; X [] S I(Y [B] ; Ŷ[B] X [B], X [B], X [], S + I(Y [B] ; X [B], Ŷ[B], X [B] X [], S + I(Y [B] ; X [B] X [B], X [], S + I(Y [B] ; X [] S = I(Y [B] ; Ŷ[B], X [B] X [B], S + I(Y [B] ; X [B], Ŷ[B], X [B] S (78 5. because of Markov property ad 2 ad the statioarity of the radom process. A.3 Proof of Theorem 3 First, we ote that coditio is equivalet to the expressio i Theorem 2. We also ote that coditio 2 is seemigly weaker tha coditio because (36 is implied by (33 ad (34, ad coditio 3 is seemigly stroger tha coditio 2 because coditio 3 cosists of every elemet i coditio 2 plus (38. Eve though they seem differet, these three coditios are ideed equivalet. The equivalece of coditios 2 ad 3 is show i [5]. Here, we use a similar proof techique to show the equivalece of coditios ad 2 as follows 2. For a give distributio p(x, x, y, y, ŷ, coditio is stroger tha coditio 2, which meas that a arbitrary rate R satisfyig coditio will also satisfy coditio 2. Coversely, for a rate R satisfyig coditio 2, if (34 is satisfied, the coditio is satisfied. If (34 is ot satisfied, i.e., I(Y ; Ŷ X I(Ŷ; Y X + I(X ; Y (79 we kow that R [0, R ], where R I(X; Ŷ X I(X; Y Ŷ, X (80 R I(X; Ŷ X + I(Y ; Ŷ X = I(X, Ŷ; Y X + I(X ; Y (8 2 A similar result is give i [7] by meas of time-sharig. 2

22 That is, R is defied such that (36 is satisfied with equality. We may rewrite (80 ad (8 as R I(X; Y X + I(X; Ŷ Y, X (82 R = I(X, X ; Y I(Y ; Ŷ X, X, Y (83 We defie a ew radom variable Ŷ such that Ŷ has the same margial distributio as Ŷ ad Ŷ Ŷ (Y, X, X, Y. Due to the cotiuity of mutual iformatio, there exists a choice of Ŷ such that I(X; Ŷ Y, X = A for ay A [0, I(X; Ŷ Y, X ]. If R I(X; Y X > 0, we choose Ŷ such that R = I(X; Y X + I(X; Ŷ that, i this case, I(Y ; Ŷ X, X, Y I(Y ; Ŷ X, X, Y. Thus, Y, X. We ote R = I(X; Y X + I(X; Ŷ Y, X (84 R I(X, X ; Y I(Y ; Ŷ X, X, Y (85 which meas that R satisfies coditio with joit distributio p(x, x, y, y, ŷ ad so does ay R R. If R I(X; Y X 0, we choose Ŷ idepedet of (Ŷ, X, X, Y, Y. I this case, R I(X; Y X + I(X; Ŷ Y, X = I(X; Y X (86 0 = I(Y ; Ŷ X I(Ŷ ; Y X + I(X ; Y (87 Therefore, i this case, R satisfies coditio with joit distributio p(x, x, y, y, ŷ ad so does ay R R. As we metioed above the equivalece betwee coditio 2 ad 3 is show i [5]. For completeess, we restate their proof here as follows. For a give distributio p(x, x, y, y, ŷ, coditio 3 is stroger tha coditio 2, which meas that a arbitrary rate R satisfyig coditio 3 will also satisfy coditio 2. Coversely, for a rate R satisfyig coditio 2, if (38 is satisfied, the coditio 3 is satisfied. If (38 is ot satisfied, i.e., the followig iequalities are satisfied R I(X; Ŷ X I(X; Y Ŷ, X (88 I(Ŷ; Y X, X I(Ŷ; Y X, X + I(X ; Y X (89 R I(X; Ŷ X + I(Y ; Ŷ X I(X, Ŷ; Y X + I(X ; Y (90 the the followig iequalities are satisfied also, sice we simply drop the first iequality, I(Ŷ; Y X, X I(Ŷ; Y X, X + I(X ; Y X (9 R I(X; Ŷ X + I(Y ; Ŷ X I(X, Ŷ; Y X + I(X ; Y (92 22

23 By combiig (9 ad (92, we have R I(X; Ŷ X I(Y ; Ŷ X + I(Ŷ; Y X, X + I(X, Ŷ; Y X + I(X ; Y I(Ŷ; Y X, X I(X ; Y X I(X; Y X (I(X ; Y X I(X ; Y I(X; Y X (93 which implies coditio 3, i.e., (37, (38 ad (39, with Ŷ set to be a costat. Refereces [] E. C. va der Meule. Three-termial commuicatio chaels. Adv. App. Prob., 3:20 54, 97. [2] T. M. Cover ad A. El Gamal. Capacity theorems for the relay chael. IEEE Tras. Iform. Theory, 25: , Sep [3] G. Kramer, M. Gastpar, ad P. Gupta. Cooperative strategies ad capacity theorems for relay etworks. IEEE Tras. Iform. Theory, 5(9: , September [4] T. M. Cover, A. El Gamal, ad M. Salehi. Multiple access chael with arbitrarily correlated sources. IEEE Tras. Iform. Theory, 26: , Nov [5] R. Ahlswede ad T. S. Ha. O source codig with side iformatio via a multiple-access chael ad related problems i multi-user iformatio theory. IEEE Tras. Iform. Theory, 29(3:396 42, 983. [6] I. Csiszar ad J. Korer. Iformatio Theory: Codig Theorems for Discrete Memoryless Systems. Academic Press, 98. [7] R. Dabora ad S. Servetto. O the role of estimate-ad-forward with time-sharig i cooperative commuicatios. Submitted to IEEE Trasactios o Iformatio Theory, 2006, 23

Lecture 11: Channel Coding Theorem: Converse Part

Lecture 11: Channel Coding Theorem: Converse Part EE376A/STATS376A Iformatio Theory Lecture - 02/3/208 Lecture : Chael Codig Theorem: Coverse Part Lecturer: Tsachy Weissma Scribe: Erdem Bıyık I this lecture, we will cotiue our discussio o chael codig

More information

Lecture 7: Channel coding theorem for discrete-time continuous memoryless channel

Lecture 7: Channel coding theorem for discrete-time continuous memoryless channel Lecture 7: Chael codig theorem for discrete-time cotiuous memoryless chael Lectured by Dr. Saif K. Mohammed Scribed by Mirsad Čirkić Iformatio Theory for Wireless Commuicatio ITWC Sprig 202 Let us first

More information

Information Theory Tutorial Communication over Channels with memory. Chi Zhang Department of Electrical Engineering University of Notre Dame

Information Theory Tutorial Communication over Channels with memory. Chi Zhang Department of Electrical Engineering University of Notre Dame Iformatio Theory Tutorial Commuicatio over Chaels with memory Chi Zhag Departmet of Electrical Egieerig Uiversity of Notre Dame Abstract A geeral capacity formula C = sup I(; Y ), which is correct for

More information

Lecture 27. Capacity of additive Gaussian noise channel and the sphere packing bound

Lecture 27. Capacity of additive Gaussian noise channel and the sphere packing bound Lecture 7 Ageda for the lecture Gaussia chael with average power costraits Capacity of additive Gaussia oise chael ad the sphere packig boud 7. Additive Gaussia oise chael Up to this poit, we have bee

More information

Symmetric Two-User Gaussian Interference Channel with Common Messages

Symmetric Two-User Gaussian Interference Channel with Common Messages Symmetric Two-User Gaussia Iterferece Chael with Commo Messages Qua Geg CSL ad Dept. of ECE UIUC, IL 680 Email: geg5@illiois.edu Tie Liu Dept. of Electrical ad Computer Egieerig Texas A&M Uiversity, TX

More information

Multiterminal source coding with complementary delivery

Multiterminal source coding with complementary delivery Iteratioal Symposium o Iformatio Theory ad its Applicatios, ISITA2006 Seoul, Korea, October 29 November 1, 2006 Multitermial source codig with complemetary delivery Akisato Kimura ad Tomohiko Uyematsu

More information

A Partial Decode-Forward Scheme For A Network with N relays

A Partial Decode-Forward Scheme For A Network with N relays A Partial Decode-Forward Scheme For A etwork with relays Yao Tag ECE Departmet, McGill Uiversity Motreal, QC, Caada Email: yaotag2@mailmcgillca Mai Vu ECE Departmet, Tufts Uiversity Medford, MA, USA Email:

More information

Lecture 15: Strong, Conditional, & Joint Typicality

Lecture 15: Strong, Conditional, & Joint Typicality EE376A/STATS376A Iformatio Theory Lecture 15-02/27/2018 Lecture 15: Strog, Coditioal, & Joit Typicality Lecturer: Tsachy Weissma Scribe: Nimit Sohoi, William McCloskey, Halwest Mohammad I this lecture,

More information

Asymptotic Coupling and Its Applications in Information Theory

Asymptotic Coupling and Its Applications in Information Theory Asymptotic Couplig ad Its Applicatios i Iformatio Theory Vicet Y. F. Ta Joit Work with Lei Yu Departmet of Electrical ad Computer Egieerig, Departmet of Mathematics, Natioal Uiversity of Sigapore IMS-APRM

More information

Cooperative Communication Fundamentals & Coding Techniques

Cooperative Communication Fundamentals & Coding Techniques 3 th ICACT Tutorial Cooperative commuicatio fudametals & codig techiques Cooperative Commuicatio Fudametals & Codig Techiques 0..4 Electroics ad Telecommuicatio Research Istitute Kiug Jug 3 th ICACT Tutorial

More information

Entropies & Information Theory

Entropies & Information Theory Etropies & Iformatio Theory LECTURE I Nilajaa Datta Uiversity of Cambridge,U.K. For more details: see lecture otes (Lecture 1- Lecture 5) o http://www.qi.damtp.cam.ac.uk/ode/223 Quatum Iformatio Theory

More information

THE interference channel problem describes a setup where multiple pairs of transmitters and receivers share a communication

THE interference channel problem describes a setup where multiple pairs of transmitters and receivers share a communication Trade-off betwee Commuicatio ad Cooperatio i the Iterferece Chael Farhad Shirai EECS Departmet Uiversity of Michiga A Arbor,USA Email: fshirai@umich.edu S. Sadeep Pradha EECS Departmet Uiversity of Michiga

More information

Optimally Sparse SVMs

Optimally Sparse SVMs A. Proof of Lemma 3. We here prove a lower boud o the umber of support vectors to achieve geeralizatio bouds of the form which we cosider. Importatly, this result holds ot oly for liear classifiers, but

More information

The Maximum-Likelihood Decoding Performance of Error-Correcting Codes

The Maximum-Likelihood Decoding Performance of Error-Correcting Codes The Maximum-Lielihood Decodig Performace of Error-Correctig Codes Hery D. Pfister ECE Departmet Texas A&M Uiversity August 27th, 2007 (rev. 0) November 2st, 203 (rev. ) Performace of Codes. Notatio X,

More information

Non-Asymptotic Achievable Rates for Gaussian Energy-Harvesting Channels: Best-Effort and Save-and-Transmit

Non-Asymptotic Achievable Rates for Gaussian Energy-Harvesting Channels: Best-Effort and Save-and-Transmit No-Asymptotic Achievable Rates for Gaussia Eergy-Harvestig Chaels: Best-Effort ad Save-ad-Trasmit Silas L. Fog, Jig Yag, ad Ayli Yeer arxiv:805.089v [cs.it] 30 May 08 Abstract A additive white Gaussia

More information

Finite Block-Length Gains in Distributed Source Coding

Finite Block-Length Gains in Distributed Source Coding Decoder Fiite Block-Legth Gais i Distributed Source Codig Farhad Shirai EECS Departmet Uiversity of Michiga A Arbor,USA Email: fshirai@umichedu S Sadeep Pradha EECS Departmet Uiversity of Michiga A Arbor,USA

More information

CEE 522 Autumn Uncertainty Concepts for Geotechnical Engineering

CEE 522 Autumn Uncertainty Concepts for Geotechnical Engineering CEE 5 Autum 005 Ucertaity Cocepts for Geotechical Egieerig Basic Termiology Set A set is a collectio of (mutually exclusive) objects or evets. The sample space is the (collectively exhaustive) collectio

More information

Shannon s noiseless coding theorem

Shannon s noiseless coding theorem 18.310 lecture otes May 4, 2015 Shao s oiseless codig theorem Lecturer: Michel Goemas I these otes we discuss Shao s oiseless codig theorem, which is oe of the foudig results of the field of iformatio

More information

Lecture 7: October 18, 2017

Lecture 7: October 18, 2017 Iformatio ad Codig Theory Autum 207 Lecturer: Madhur Tulsiai Lecture 7: October 8, 207 Biary hypothesis testig I this lecture, we apply the tools developed i the past few lectures to uderstad the problem

More information

Lecture 6: Source coding, Typicality, and Noisy channels and capacity

Lecture 6: Source coding, Typicality, and Noisy channels and capacity 15-859: Iformatio Theory ad Applicatios i TCS CMU: Sprig 2013 Lecture 6: Source codig, Typicality, ad Noisy chaels ad capacity Jauary 31, 2013 Lecturer: Mahdi Cheraghchi Scribe: Togbo Huag 1 Recap Uiversal

More information

On Random Line Segments in the Unit Square

On Random Line Segments in the Unit Square O Radom Lie Segmets i the Uit Square Thomas A. Courtade Departmet of Electrical Egieerig Uiversity of Califoria Los Ageles, Califoria 90095 Email: tacourta@ee.ucla.edu I. INTRODUCTION Let Q = [0, 1] [0,

More information

Non-Asymptotic Achievable Rates for Gaussian Energy-Harvesting Channels: Best-Effort and Save-and-Transmit

Non-Asymptotic Achievable Rates for Gaussian Energy-Harvesting Channels: Best-Effort and Save-and-Transmit 08 IEEE Iteratioal Symposium o Iformatio Theory ISIT No-Asymptotic Achievable Rates for Gaussia Eergy-Harvestig Chaels: Best-Effort ad Save-ad-Trasmit Silas L Fog Departmet of Electrical ad Computer Egieerig

More information

Convergence of random variables. (telegram style notes) P.J.C. Spreij

Convergence of random variables. (telegram style notes) P.J.C. Spreij Covergece of radom variables (telegram style otes).j.c. Spreij this versio: September 6, 2005 Itroductio As we kow, radom variables are by defiitio measurable fuctios o some uderlyig measurable space

More information

arxiv: v1 [cs.it] 13 Jul 2012

arxiv: v1 [cs.it] 13 Jul 2012 O the Sum Capacity of the Discrete Memoryless Iterferece Chael with Oe-Sided Weak Iterferece ad Mixed Iterferece Fagfag Zhu ad Biao Che Syracuse Uiversity Departmet of EECS Syracuse, NY 3244 Email: fazhu{biche}@syr.edu

More information

The Capacity Region of the Degraded Finite-State Broadcast Channel

The Capacity Region of the Degraded Finite-State Broadcast Channel The Capacity Regio of the Degraded Fiite-State Broadcast Chael Ro Dabora ad Adrea Goldsmith Dept. of Electrical Egieerig, Staford Uiversity, Staford, CA Abstract We cosider the discrete, time-varyig broadcast

More information

IET Commun., 2009, Vol. 3, Iss. 1, pp doi: /iet-com: & The Institution of Engineering and Technology 2009

IET Commun., 2009, Vol. 3, Iss. 1, pp doi: /iet-com: & The Institution of Engineering and Technology 2009 Published i IET Commuicatios Received o 4th Jue 28 Revised o 3th July 28 doi: 1.149/iet-com:28373 ISSN 1751-8628 Symmetric relayig based o partial decodig ad the capacity of a class of relay etworks L.

More information

Chapter 3. Strong convergence. 3.1 Definition of almost sure convergence

Chapter 3. Strong convergence. 3.1 Definition of almost sure convergence Chapter 3 Strog covergece As poited out i the Chapter 2, there are multiple ways to defie the otio of covergece of a sequece of radom variables. That chapter defied covergece i probability, covergece i

More information

On Evaluating the Rate-Distortion Function of Sources with Feed-Forward and the Capacity of Channels with Feedback.

On Evaluating the Rate-Distortion Function of Sources with Feed-Forward and the Capacity of Channels with Feedback. O Evaluatig the Rate-Distortio Fuctio of Sources with Feed-Forward ad the Capacity of Chaels with Feedback. Ramji Vekataramaa ad S. Sadeep Pradha Departmet of EECS, Uiversity of Michiga, A Arbor, MI 4805

More information

Entropy and Ergodic Theory Lecture 5: Joint typicality and conditional AEP

Entropy and Ergodic Theory Lecture 5: Joint typicality and conditional AEP Etropy ad Ergodic Theory Lecture 5: Joit typicality ad coditioal AEP 1 Notatio: from RVs back to distributios Let (Ω, F, P) be a probability space, ad let X ad Y be A- ad B-valued discrete RVs, respectively.

More information

Information Theory and Coding

Information Theory and Coding Sol. Iformatio Theory ad Codig. The capacity of a bad-limited additive white Gaussia (AWGN) chael is give by C = Wlog 2 ( + σ 2 W ) bits per secod(bps), where W is the chael badwidth, is the average power

More information

Are Slepian-Wolf Rates Necessary for Distributed Parameter Estimation?

Are Slepian-Wolf Rates Necessary for Distributed Parameter Estimation? Are Slepia-Wolf Rates Necessary for Distributed Parameter Estimatio? Mostafa El Gamal ad Lifeg Lai Departmet of Electrical ad Computer Egieerig Worcester Polytechic Istitute {melgamal, llai}@wpi.edu arxiv:1508.02765v2

More information

MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.436J/15.085J Fall 2008 Lecture 19 11/17/2008 LAWS OF LARGE NUMBERS II THE STRONG LAW OF LARGE NUMBERS

MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.436J/15.085J Fall 2008 Lecture 19 11/17/2008 LAWS OF LARGE NUMBERS II THE STRONG LAW OF LARGE NUMBERS MASSACHUSTTS INSTITUT OF TCHNOLOGY 6.436J/5.085J Fall 2008 Lecture 9 /7/2008 LAWS OF LARG NUMBRS II Cotets. The strog law of large umbers 2. The Cheroff boud TH STRONG LAW OF LARG NUMBRS While the weak

More information

SUCCESSIVE INTERFERENCE CANCELLATION DECODING FOR THE K -USER CYCLIC INTERFERENCE CHANNEL

SUCCESSIVE INTERFERENCE CANCELLATION DECODING FOR THE K -USER CYCLIC INTERFERENCE CHANNEL Joural of Theoretical ad Applied Iformatio Techology 31 st December 212 Vol 46 No2 25-212 JATIT & LLS All rights reserved ISSN: 1992-8645 wwwatitorg E-ISSN: 1817-3195 SCCESSIVE INTERFERENCE CANCELLATION

More information

On Successive Refinement for the Wyner-Ziv Problem with Partially Cooperating Decoders

On Successive Refinement for the Wyner-Ziv Problem with Partially Cooperating Decoders ISIT 2008, Toroto, Caada, July 6-11, 2008 O Successive Refiemet for the Wyer-Ziv Problem with Partially Cooperatig Decoders Shraga I. Bross ad Tsachy Weissma, School of Egieerig, Bar-Ila Uiversity, Ramat-Ga

More information

Infinite Sequences and Series

Infinite Sequences and Series Chapter 6 Ifiite Sequeces ad Series 6.1 Ifiite Sequeces 6.1.1 Elemetary Cocepts Simply speakig, a sequece is a ordered list of umbers writte: {a 1, a 2, a 3,...a, a +1,...} where the elemets a i represet

More information

Discrete-Time Systems, LTI Systems, and Discrete-Time Convolution

Discrete-Time Systems, LTI Systems, and Discrete-Time Convolution EEL5: Discrete-Time Sigals ad Systems. Itroductio I this set of otes, we begi our mathematical treatmet of discrete-time s. As show i Figure, a discrete-time operates or trasforms some iput sequece x [

More information

Capacity Theorems for the Finite-State Broadcast Channel with Feedback

Capacity Theorems for the Finite-State Broadcast Channel with Feedback Capacity Theorems for the Fiite-State Broadcast Chael with Feedback Ro abora ad Adrea Goldsmith ept of Electrical Egieerig, Staford Uiversity Abstract We cosider the discrete, time-varyig broadcast chael

More information

On Routing-Optimal Network for Multiple Unicasts

On Routing-Optimal Network for Multiple Unicasts O Routig-Optimal Network for Multiple Uicasts Chu Meg, Athia Markopoulou Abstract I this paper, we cosider etworks with multiple uicast sessios. Geerally, o-liear etwork codig is eeded to achieve the whole

More information

Hybrid Coding for Gaussian Broadcast Channels with Gaussian Sources

Hybrid Coding for Gaussian Broadcast Channels with Gaussian Sources Hybrid Codig for Gaussia Broadcast Chaels with Gaussia Sources Rajiv Soudararaja Departmet of Electrical & Computer Egieerig Uiversity of Texas at Austi Austi, TX 7871, USA Email: rajivs@mailutexasedu

More information

UC Berkeley CS 170: Efficient Algorithms and Intractable Problems Handout 17 Lecturer: David Wagner April 3, Notes 17 for CS 170

UC Berkeley CS 170: Efficient Algorithms and Intractable Problems Handout 17 Lecturer: David Wagner April 3, Notes 17 for CS 170 UC Berkeley CS 170: Efficiet Algorithms ad Itractable Problems Hadout 17 Lecturer: David Wager April 3, 2003 Notes 17 for CS 170 1 The Lempel-Ziv algorithm There is a sese i which the Huffma codig was

More information

Sequences, Mathematical Induction, and Recursion. CSE 2353 Discrete Computational Structures Spring 2018

Sequences, Mathematical Induction, and Recursion. CSE 2353 Discrete Computational Structures Spring 2018 CSE 353 Discrete Computatioal Structures Sprig 08 Sequeces, Mathematical Iductio, ad Recursio (Chapter 5, Epp) Note: some course slides adopted from publisher-provided material Overview May mathematical

More information

Chapter 6 Infinite Series

Chapter 6 Infinite Series Chapter 6 Ifiite Series I the previous chapter we cosidered itegrals which were improper i the sese that the iterval of itegratio was ubouded. I this chapter we are goig to discuss a topic which is somewhat

More information

Vector Permutation Code Design Algorithm. Danilo SILVA and Weiler A. FINAMORE

Vector Permutation Code Design Algorithm. Danilo SILVA and Weiler A. FINAMORE Iteratioal Symposium o Iformatio Theory ad its Applicatios, ISITA2004 Parma, Italy, October 10 13, 2004 Vector Permutatio Code Desig Algorithm Dailo SILVA ad Weiler A. FINAMORE Cetro de Estudos em Telecomuicações

More information

Multiterminal Source Coding with an Entropy-Based Distortion Measure

Multiterminal Source Coding with an Entropy-Based Distortion Measure 20 IEEE Iteratioal Symposium o Iformatio Theory Proceedigs Multitermial Source Codig with a Etropy-Based Distortio Measure Thomas A. Courtade ad Richard D. Wesel Departmet of Electrical Egieerig Uiversity

More information

Inequalities for Entropies of Sets of Subsets of Random Variables

Inequalities for Entropies of Sets of Subsets of Random Variables Iequalities for Etropies of Sets of Subsets of Radom Variables Chao Tia AT&T Labs-Research Florham Par, NJ 0792, USA. tia@research.att.com Abstract Ha s iequality o the etropy rates of subsets of radom

More information

An Introduction to Randomized Algorithms

An Introduction to Randomized Algorithms A Itroductio to Radomized Algorithms The focus of this lecture is to study a radomized algorithm for quick sort, aalyze it usig probabilistic recurrece relatios, ad also provide more geeral tools for aalysis

More information

Sequences A sequence of numbers is a function whose domain is the positive integers. We can see that the sequence

Sequences A sequence of numbers is a function whose domain is the positive integers. We can see that the sequence Sequeces A sequece of umbers is a fuctio whose domai is the positive itegers. We ca see that the sequece 1, 1, 2, 2, 3, 3,... is a fuctio from the positive itegers whe we write the first sequece elemet

More information

Basics of Probability Theory (for Theory of Computation courses)

Basics of Probability Theory (for Theory of Computation courses) Basics of Probability Theory (for Theory of Computatio courses) Oded Goldreich Departmet of Computer Sciece Weizma Istitute of Sciece Rehovot, Israel. oded.goldreich@weizma.ac.il November 24, 2008 Preface.

More information

Random Walks on Discrete and Continuous Circles. by Jeffrey S. Rosenthal School of Mathematics, University of Minnesota, Minneapolis, MN, U.S.A.

Random Walks on Discrete and Continuous Circles. by Jeffrey S. Rosenthal School of Mathematics, University of Minnesota, Minneapolis, MN, U.S.A. Radom Walks o Discrete ad Cotiuous Circles by Jeffrey S. Rosethal School of Mathematics, Uiversity of Miesota, Mieapolis, MN, U.S.A. 55455 (Appeared i Joural of Applied Probability 30 (1993), 780 789.)

More information

Linear Regression Demystified

Linear Regression Demystified Liear Regressio Demystified Liear regressio is a importat subject i statistics. I elemetary statistics courses, formulae related to liear regressio are ofte stated without derivatio. This ote iteds to

More information

Universal source coding for complementary delivery

Universal source coding for complementary delivery SITA2006 i Hakodate 2005.2. p. Uiversal source codig for complemetary delivery Akisato Kimura, 2, Tomohiko Uyematsu 2, Shigeaki Kuzuoka 2 Media Iformatio Laboratory, NTT Commuicatio Sciece Laboratories,

More information

On the Capacity of Symmetric Gaussian Interference Channels with Feedback

On the Capacity of Symmetric Gaussian Interference Channels with Feedback O the Capacity of Symmetric Gaussia Iterferece Chaels with Feedback La V Truog Iformatio Techology Specializatio Departmet ITS FPT Uiversity, Haoi, Vietam E-mail: latv@fpteduv Hirosuke Yamamoto Dept of

More information

Random Variables, Sampling and Estimation

Random Variables, Sampling and Estimation Chapter 1 Radom Variables, Samplig ad Estimatio 1.1 Itroductio This chapter will cover the most importat basic statistical theory you eed i order to uderstad the ecoometric material that will be comig

More information

CS284A: Representations and Algorithms in Molecular Biology

CS284A: Representations and Algorithms in Molecular Biology CS284A: Represetatios ad Algorithms i Molecular Biology Scribe Notes o Lectures 3 & 4: Motif Discovery via Eumeratio & Motif Represetatio Usig Positio Weight Matrix Joshua Gervi Based o presetatios by

More information

Largest families without an r-fork

Largest families without an r-fork Largest families without a r-for Aalisa De Bois Uiversity of Salero Salero, Italy debois@math.it Gyula O.H. Katoa Réyi Istitute Budapest, Hugary ohatoa@reyi.hu Itroductio Let [] = {,,..., } be a fiite

More information

Entropy Rates and Asymptotic Equipartition

Entropy Rates and Asymptotic Equipartition Chapter 29 Etropy Rates ad Asymptotic Equipartitio Sectio 29. itroduces the etropy rate the asymptotic etropy per time-step of a stochastic process ad shows that it is well-defied; ad similarly for iformatio,

More information

1 Hash tables. 1.1 Implementation

1 Hash tables. 1.1 Implementation Lecture 8 Hash Tables, Uiversal Hash Fuctios, Balls ad Bis Scribes: Luke Johsto, Moses Charikar, G. Valiat Date: Oct 18, 2017 Adapted From Virgiia Williams lecture otes 1 Hash tables A hash table is a

More information

A Hybrid Random-Structured Coding Scheme for the Gaussian Two-Terminal Source Coding Problem Under a Covariance Matrix Distortion Constraint

A Hybrid Random-Structured Coding Scheme for the Gaussian Two-Terminal Source Coding Problem Under a Covariance Matrix Distortion Constraint A Hybrid Radom-Structured Codig Scheme for the Gaussia Two-Termial Source Codig Problem Uder a Covariace Matrix Distortio Costrait Yag Yag ad Zixiag Xiog Dept of Electrical ad Computer Egieerig Texas A&M

More information

Journal of Multivariate Analysis. Superefficient estimation of the marginals by exploiting knowledge on the copula

Journal of Multivariate Analysis. Superefficient estimation of the marginals by exploiting knowledge on the copula Joural of Multivariate Aalysis 102 (2011) 1315 1319 Cotets lists available at ScieceDirect Joural of Multivariate Aalysis joural homepage: www.elsevier.com/locate/jmva Superefficiet estimatio of the margials

More information

Resilient Source Coding

Resilient Source Coding Resiliet Source Codig Maël Le Treust Laboratoire des Sigaux et Systèmes CNRS - Supélec - Uiv. Paris Sud 11 91191, Gif-sur-Yvette, Frace Email: mael.letreust@lss.supelec.fr Samso Lasaulce Laboratoire des

More information

Randomized Algorithms I, Spring 2018, Department of Computer Science, University of Helsinki Homework 1: Solutions (Discussed January 25, 2018)

Randomized Algorithms I, Spring 2018, Department of Computer Science, University of Helsinki Homework 1: Solutions (Discussed January 25, 2018) Radomized Algorithms I, Sprig 08, Departmet of Computer Sciece, Uiversity of Helsiki Homework : Solutios Discussed Jauary 5, 08). Exercise.: Cosider the followig balls-ad-bi game. We start with oe black

More information

The Three-Terminal Interactive. Lossy Source Coding Problem

The Three-Terminal Interactive. Lossy Source Coding Problem The Three-Termial Iteractive 1 Lossy Source Codig Problem Leoardo Rey Vega, Pablo Piataida ad Alfred O. Hero III arxiv:1502.01359v3 cs.it] 18 Ja 2016 Abstract The three-ode multitermial lossy source codig

More information

A Non-Asymptotic Achievable Rate for the AWGN Energy-Harvesting Channel using Save-and-Transmit

A Non-Asymptotic Achievable Rate for the AWGN Energy-Harvesting Channel using Save-and-Transmit 016 IEEE Iteratioal Symposium o Iformatio Theory A No-Asymptotic Achievable Rate for the AWGN Eergy-Harvestig Chael usig Save-ad-Trasmit Silas L. Fog, Vicet Y. F. Ta, ad Jig Yag Departmet of Electrical

More information

This is an introductory course in Analysis of Variance and Design of Experiments.

This is an introductory course in Analysis of Variance and Design of Experiments. 1 Notes for M 384E, Wedesday, Jauary 21, 2009 (Please ote: I will ot pass out hard-copy class otes i future classes. If there are writte class otes, they will be posted o the web by the ight before class

More information

Increasing timing capacity using packet coloring

Increasing timing capacity using packet coloring 003 Coferece o Iformatio Scieces ad Systems, The Johs Hopkis Uiversity, March 4, 003 Icreasig timig capacity usig packet colorig Xi Liu ad R Srikat[] Coordiated Sciece Laboratory Uiversity of Illiois e-mail:

More information

Disjoint Systems. Abstract

Disjoint Systems. Abstract Disjoit Systems Noga Alo ad Bey Sudaov Departmet of Mathematics Raymod ad Beverly Sacler Faculty of Exact Scieces Tel Aviv Uiversity, Tel Aviv, Israel Abstract A disjoit system of type (,,, ) is a collectio

More information

Generalized Semi- Markov Processes (GSMP)

Generalized Semi- Markov Processes (GSMP) Geeralized Semi- Markov Processes (GSMP) Summary Some Defiitios Markov ad Semi-Markov Processes The Poisso Process Properties of the Poisso Process Iterarrival times Memoryless property ad the residual

More information

Resampling Methods. X (1/2), i.e., Pr (X i m) = 1/2. We order the data: X (1) X (2) X (n). Define the sample median: ( n.

Resampling Methods. X (1/2), i.e., Pr (X i m) = 1/2. We order the data: X (1) X (2) X (n). Define the sample median: ( n. Jauary 1, 2019 Resamplig Methods Motivatio We have so may estimators with the property θ θ d N 0, σ 2 We ca also write θ a N θ, σ 2 /, where a meas approximately distributed as Oce we have a cosistet estimator

More information

Advanced Stochastic Processes.

Advanced Stochastic Processes. Advaced Stochastic Processes. David Gamarik LECTURE 2 Radom variables ad measurable fuctios. Strog Law of Large Numbers (SLLN). Scary stuff cotiued... Outlie of Lecture Radom variables ad measurable fuctios.

More information

Binary codes from graphs on triples and permutation decoding

Binary codes from graphs on triples and permutation decoding Biary codes from graphs o triples ad permutatio decodig J. D. Key Departmet of Mathematical Scieces Clemso Uiversity Clemso SC 29634 U.S.A. J. Moori ad B. G. Rodrigues School of Mathematics Statistics

More information

Run-length & Entropy Coding. Redundancy Removal. Sampling. Quantization. Perform inverse operations at the receiver EEE

Run-length & Entropy Coding. Redundancy Removal. Sampling. Quantization. Perform inverse operations at the receiver EEE Geeral e Image Coder Structure Motio Video (s 1,s 2,t) or (s 1,s 2 ) Natural Image Samplig A form of data compressio; usually lossless, but ca be lossy Redudacy Removal Lossless compressio: predictive

More information

ECEN 655: Advanced Channel Coding Spring Lecture 7 02/04/14. Belief propagation is exact on tree-structured factor graphs.

ECEN 655: Advanced Channel Coding Spring Lecture 7 02/04/14. Belief propagation is exact on tree-structured factor graphs. ECEN 655: Advaced Chael Codig Sprig 014 Prof. Hery Pfister Lecture 7 0/04/14 Scribe: Megke Lia 1 4-Cycles i Gallager s Esemble What we already kow: Belief propagatio is exact o tree-structured factor graphs.

More information

It is always the case that unions, intersections, complements, and set differences are preserved by the inverse image of a function.

It is always the case that unions, intersections, complements, and set differences are preserved by the inverse image of a function. MATH 532 Measurable Fuctios Dr. Neal, WKU Throughout, let ( X, F, µ) be a measure space ad let (!, F, P ) deote the special case of a probability space. We shall ow begi to study real-valued fuctios defied

More information

Lecture 14: Graph Entropy

Lecture 14: Graph Entropy 15-859: Iformatio Theory ad Applicatios i TCS Sprig 2013 Lecture 14: Graph Etropy March 19, 2013 Lecturer: Mahdi Cheraghchi Scribe: Euiwoog Lee 1 Recap Bergma s boud o the permaet Shearer s Lemma Number

More information

Output Analysis and Run-Length Control

Output Analysis and Run-Length Control IEOR E4703: Mote Carlo Simulatio Columbia Uiversity c 2017 by Marti Haugh Output Aalysis ad Ru-Legth Cotrol I these otes we describe how the Cetral Limit Theorem ca be used to costruct approximate (1 α%

More information

Lecture Notes for Analysis Class

Lecture Notes for Analysis Class Lecture Notes for Aalysis Class Topological Spaces A topology for a set X is a collectio T of subsets of X such that: (a) X ad the empty set are i T (b) Uios of elemets of T are i T (c) Fiite itersectios

More information

OPTIMAL PIECEWISE UNIFORM VECTOR QUANTIZATION OF THE MEMORYLESS LAPLACIAN SOURCE

OPTIMAL PIECEWISE UNIFORM VECTOR QUANTIZATION OF THE MEMORYLESS LAPLACIAN SOURCE Joural of ELECTRICAL EGIEERIG, VOL. 56, O. 7-8, 2005, 200 204 OPTIMAL PIECEWISE UIFORM VECTOR QUATIZATIO OF THE MEMORYLESS LAPLACIA SOURCE Zora H. Perić Veljo Lj. Staović Alesadra Z. Jovaović Srdja M.

More information

Sieve Estimators: Consistency and Rates of Convergence

Sieve Estimators: Consistency and Rates of Convergence EECS 598: Statistical Learig Theory, Witer 2014 Topic 6 Sieve Estimators: Cosistecy ad Rates of Covergece Lecturer: Clayto Scott Scribe: Julia Katz-Samuels, Brado Oselio, Pi-Yu Che Disclaimer: These otes

More information

Regression with quadratic loss

Regression with quadratic loss Regressio with quadratic loss Maxim Ragisky October 13, 2015 Regressio with quadratic loss is aother basic problem studied i statistical learig theory. We have a radom couple Z = X,Y, where, as before,

More information

Problem Set 2 Solutions

Problem Set 2 Solutions CS271 Radomess & Computatio, Sprig 2018 Problem Set 2 Solutios Poit totals are i the margi; the maximum total umber of poits was 52. 1. Probabilistic method for domiatig sets 6pts Pick a radom subset S

More information

Lecture 3 The Lebesgue Integral

Lecture 3 The Lebesgue Integral Lecture 3: The Lebesgue Itegral 1 of 14 Course: Theory of Probability I Term: Fall 2013 Istructor: Gorda Zitkovic Lecture 3 The Lebesgue Itegral The costructio of the itegral Uless expressly specified

More information

Multiaccess Communication in the Finite Blocklength Regime

Multiaccess Communication in the Finite Blocklength Regime Multiaccess Commuicatio i the Fiite Blocklegth Regime Ebrahim MolaviaJazi ad J. Nicholas Laema Departmet of Electrical Egierrig Uiversity of Notre Dame Notre Dame IN 46556 USA Email: {emolaviajl}@d.edu

More information

4. Partial Sums and the Central Limit Theorem

4. Partial Sums and the Central Limit Theorem 1 of 10 7/16/2009 6:05 AM Virtual Laboratories > 6. Radom Samples > 1 2 3 4 5 6 7 4. Partial Sums ad the Cetral Limit Theorem The cetral limit theorem ad the law of large umbers are the two fudametal theorems

More information

Product measures, Tonelli s and Fubini s theorems For use in MAT3400/4400, autumn 2014 Nadia S. Larsen. Version of 13 October 2014.

Product measures, Tonelli s and Fubini s theorems For use in MAT3400/4400, autumn 2014 Nadia S. Larsen. Version of 13 October 2014. Product measures, Toelli s ad Fubii s theorems For use i MAT3400/4400, autum 2014 Nadia S. Larse Versio of 13 October 2014. 1. Costructio of the product measure The purpose of these otes is to preset the

More information

Lecture 19: Convergence

Lecture 19: Convergence Lecture 19: Covergece Asymptotic approach I statistical aalysis or iferece, a key to the success of fidig a good procedure is beig able to fid some momets ad/or distributios of various statistics. I may

More information

Refinement of Two Fundamental Tools in Information Theory

Refinement of Two Fundamental Tools in Information Theory Refiemet of Two Fudametal Tools i Iformatio Theory Raymod W. Yeug Istitute of Network Codig The Chiese Uiversity of Hog Kog Joit work with Siu Wai Ho ad Sergio Verdu Discotiuity of Shao s Iformatio Measures

More information

Distortion Bounds for Source Broadcast. Problem

Distortion Bounds for Source Broadcast. Problem Distortio Bouds for Source Broadcast 1 Problem Lei Yu, Houqiag Li, Seior Member, IEEE, ad Weipig Li, Fellow, IEEE Abstract This paper ivestigates the joit source-chael codig problem of sedig a memoryless

More information

Discrete Mathematics for CS Spring 2007 Luca Trevisan Lecture 22

Discrete Mathematics for CS Spring 2007 Luca Trevisan Lecture 22 CS 70 Discrete Mathematics for CS Sprig 2007 Luca Trevisa Lecture 22 Aother Importat Distributio The Geometric Distributio Questio: A biased coi with Heads probability p is tossed repeatedly util the first

More information

Math 61CM - Solutions to homework 3

Math 61CM - Solutions to homework 3 Math 6CM - Solutios to homework 3 Cédric De Groote October 2 th, 208 Problem : Let F be a field, m 0 a fixed oegative iteger ad let V = {a 0 + a x + + a m x m a 0,, a m F} be the vector space cosistig

More information

HOMEWORK 2 SOLUTIONS

HOMEWORK 2 SOLUTIONS HOMEWORK SOLUTIONS CSE 55 RANDOMIZED AND APPROXIMATION ALGORITHMS 1. Questio 1. a) The larger the value of k is, the smaller the expected umber of days util we get all the coupos we eed. I fact if = k

More information

REGRESSION WITH QUADRATIC LOSS

REGRESSION WITH QUADRATIC LOSS REGRESSION WITH QUADRATIC LOSS MAXIM RAGINSKY Regressio with quadratic loss is aother basic problem studied i statistical learig theory. We have a radom couple Z = X, Y ), where, as before, X is a R d

More information

Lecture 2: April 3, 2013

Lecture 2: April 3, 2013 TTIC/CMSC 350 Mathematical Toolkit Sprig 203 Madhur Tulsiai Lecture 2: April 3, 203 Scribe: Shubhedu Trivedi Coi tosses cotiued We retur to the coi tossig example from the last lecture agai: Example. Give,

More information

INTRODUCTION ABSTRACT

INTRODUCTION ABSTRACT ABSTRACT mm INTRODUCTION Let us cosider the decisio theory problem of classifyig observatio X as comig from oe of the m possible classes (hypothesis) 0 = {01,02,..., 0 }. Let P; = Pr {0 = 0;}, i = 1,2,...,

More information

EECS564 Estimation, Filtering, and Detection Hwk 2 Solns. Winter p θ (z) = (2θz + 1 θ), 0 z 1

EECS564 Estimation, Filtering, and Detection Hwk 2 Solns. Winter p θ (z) = (2θz + 1 θ), 0 z 1 EECS564 Estimatio, Filterig, ad Detectio Hwk 2 Sols. Witer 25 4. Let Z be a sigle observatio havig desity fuctio where. p (z) = (2z + ), z (a) Assumig that is a oradom parameter, fid ad plot the maximum

More information

CHAPTER 10 INFINITE SEQUENCES AND SERIES

CHAPTER 10 INFINITE SEQUENCES AND SERIES CHAPTER 10 INFINITE SEQUENCES AND SERIES 10.1 Sequeces 10.2 Ifiite Series 10.3 The Itegral Tests 10.4 Compariso Tests 10.5 The Ratio ad Root Tests 10.6 Alteratig Series: Absolute ad Coditioal Covergece

More information

MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.265/15.070J Fall 2013 Lecture 21 11/27/2013

MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.265/15.070J Fall 2013 Lecture 21 11/27/2013 MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.265/15.070J Fall 2013 Lecture 21 11/27/2013 Fuctioal Law of Large Numbers. Costructio of the Wieer Measure Cotet. 1. Additioal techical results o weak covergece

More information

Lecture 2. The Lovász Local Lemma

Lecture 2. The Lovász Local Lemma Staford Uiversity Sprig 208 Math 233A: No-costructive methods i combiatorics Istructor: Ja Vodrák Lecture date: Jauary 0, 208 Origial scribe: Apoorva Khare Lecture 2. The Lovász Local Lemma 2. Itroductio

More information

The multiplicative structure of finite field and a construction of LRC

The multiplicative structure of finite field and a construction of LRC IERG6120 Codig for Distributed Storage Systems Lecture 8-06/10/2016 The multiplicative structure of fiite field ad a costructio of LRC Lecturer: Keeth Shum Scribe: Zhouyi Hu Notatios: We use the otatio

More information

Lecture 9: Expanders Part 2, Extractors

Lecture 9: Expanders Part 2, Extractors Lecture 9: Expaders Part, Extractors Topics i Complexity Theory ad Pseudoradomess Sprig 013 Rutgers Uiversity Swastik Kopparty Scribes: Jaso Perry, Joh Kim I this lecture, we will discuss further the pseudoradomess

More information

The source coding game with a cheating switcher

The source coding game with a cheating switcher The source codig game with a cheatig switcher Hari Palaiyaur hpalaiya@eecsberkeleyedu Cheg Chag cchag@eecsberkeleyedu Departmet of Electrical Egieerig ad Computer Scieces Uiversity of Califoria at Berkeley

More information