Finite Block-Length Gains in Distributed Source Coding

Size: px
Start display at page:

Download "Finite Block-Length Gains in Distributed Source Coding"

Transcription

1 Decoder Fiite Block-Legth Gais i Distributed Source Codig Farhad Shirai EECS Departmet Uiversity of Michiga A Arbor,USA fshirai@umichedu S Sadeep Pradha EECS Departmet Uiversity of Michiga A Arbor,USA pradhav@umichedu Abstract A ew codig scheme for the distributed source codig problem for geeral discrete memoryless sources is preseted The scheme ivolves a two-layered codig strategy, the first layer code is of costat fiite block-legth whereas the secod layer cotais codes of block-legth approachig ifiity It is argued that small block-legth codes preserve correlatios betwee sources more efficietly, while sufferig rate-loss i a poit-to-poit compressio perspective Cosequetly, there is a sweet-spot for the legth of the code A achievable ratedistortio regio is characterized usig sigle-letter distributios It is show that this regio strictly cotais previous kow achievable rate-distortio regios for the distributed source codig problem I INTRODUCTION Due to the iheret difficulty i characterizatio of fudametal limits of reliable commuicatio, most of the works i iformatio theory have cosidered the aalysis of large block-legth codes, without ay costraits o memory ad computatioal complexity This allows operatig i the realm of the laws of large umbers ad thus sigificatly simplifies the aalysis However, codig theory deals with codes with short block-legths with computatioally efficiet ecodig ad decodig algorithms While there is iterest i applicatio of such small-legth commuicatios strategies, it is largely assumed that performace improves whe the block-legth icreases This turs out to be ot true i certai codig schemes used i distributed source codig as discussed below The two user distributed source-codig problem is depicted i figure 1 Two correlated discrete-memoryless-sources (DMS) are fed to the ecoders Each ecoder compresses its respective source ad trasmits the compressed versio to the decoder The decoder recostructs each of the sources with respect to a distortio criteriothere has bee a substatial effort to derive the optimal RD regio for this set-up, however the regio has bee characterized oly i special cases [2], [3] The best kow ier boud to the optimal rate-distortio (RD) regio for distributed codig of two correlated sources is the Berger-Tug (BT) boud [4] The BT boud is based o a codig strategy called quatize ad bi I this strategy the two sources are quatized usig two idepedet, ifiite legth radom vector quatizers ad the quatizers are bied to This work was supported by NSF grat CCF Fig 1 X 1 Ec 1 X 2 Ec 2 ˆX 1, ˆX2 The two-user distributed source codig problem reduce the trasmissio rate The idepedet quatizatio approach leads to the so-called log Markov chai The Markov chai implies that coditioed o the sources, the sigle-letter distributio of the quatized versios of the sources decompose ito the product of coditioal margial distributios I [5] it was poited out that i the presece of commo compoets, further correlatio ca be iduced betwee the quatized versios, i other words the Markov chai ca be relaxed usig the commo compoet (CC) Based o this observatio the authors i [5] propose a codig scheme which outperforms the BT strategy i the presece of commo compoets, but reduces to the latter i their absece The CC achievable RD regio shriks discotiuously i source probability distributio as commo compoets are replaced with highly correlated compoets From the cotiuity of the optimal RD regio, it was proved i [5] that the CC scheme is also sub-optimal sice it is discotiuous Hece the optimal RD regio strictly cotais the CC regio, however it was ot clear how to achieve poits outside of the CC ratedistortio regio Toward improvig the CC boud, we used two idetical radom quatizers istead of two idepedet oes We foud [1] that whe applied to the biary-oe-helpoe (BOHO) example of [5], as the block-legth is icreased, the performace improves iitially, reaches a plateau, ad the decreases after that So the best performace is achieved whe the legth of the code is at some fiite value Based o this observatio, a codig strategy was proposed for the BOHO example which improves the CC achievable RD regio The mai difficulty i aalyzig fiite block-legth codig strategies is that i the absece of simplifyig theorems such as laws of large umbers, the resultig characterizatios of achievable ier bouds are i terms of multi-letter prob-

2 Fig 2 ɛ X + E Q(X(1 : )) X Q((X + E)(1 :)) Quatizatio oises become idepedet at large block-legth ability distributios This makes the computatio of such ier bouds very complex I this paper we first preset a codig scheme for the distributed source codig problem i the geeral discrete, memoryless settig The scheme utilizes both small-legth codes ad codes with block-legth approachig ifiity A multi-letter characterizatio of the rate-distortio regio achievable usig this scheme is give, ad it is show that there is a approximatig sigle-letter characterizatio for the ier boud We prove that the resultig ier boud outperforms the previous kow codig schemes for this commuicatio settig The rest of the paper is orgaized as follows: I sectio II, we explai the ituitive reaso behid our codig scheme Sectio III icludes the ew codig strategy ad the resultig RD regio Sectio IV cocludes the paper II BINARY-ONE-HELP ONE EXAMPLE I [1] quatizatio of two highly correlated BSS s usig the same radomly geerated code was cosidered More specifically, let X be a BSS, ad E be a Be(ɛ) radom variable Defie the sources as X 1 = X ad X 2 = X +E We took a radomly chose -legth quatizer Q ad quatized X1 ad X2 As the legth of the quatizer approaches ifiity, the quatizatio oises become idepedet; this happes irrespective of the value of ɛ The ituitive reaso is that as the quatizer legth icreases, most of the vectors are cocetrated o the edges of the Vorooi regios Hece as the legth goes to ifiity, with high probability the two source vectors fall ito two differet quatizatio regios Sice codewords are pairwise idepedet, the quatizatio oises become idepedet This is illustrated i figure 2 Idepedet quatizatio oises prevet ecoders from refiig each other s quatizatios Whe the sources are exactly equal (ie commo compoets), the quatizatios would also be equal We argue that the discotiuity i the CC scheme is caused by the discotiuity i the correlatio betwee quatizatio oises This implies applicatio of small-legth quatizers is beeficial sice they preserve correlatio betwee the sources, however there is also a rate-loss associated with usig small-legth quatizers The evidece suggests that the existece of a trade-off betwee avoidig rate-loss ad preservig correlatio It was show that there is a sweet-spot for the legth of the quatizer where the trade-off is optimized Based o these observatios a ew codig scheme for the special case of BOHO problem was preseted The scheme uses two layers of codes, the first layer cosists of a codebook with fiite legth (ie the codeword legth is ot take to ifiity), ad the secod codebook has large block-legth I this codig strategy the ecoders apply the fiite-legth quatizer i first layer to quatize the highly correlated compoets of the sources, ad these quatizatios are trasmitted to the decoder Sice the compressed sequeces are highly correlated, the ecoders are able to cooperate i trasmittig them I the ext step, the CC scheme is applied while cosiderig the previous quatizatios as side iformatio completely kow at the decoder ad partially kow at each ecoder III THE NEW CODING STRATEGY Let X 1 ad X 2 be two correlated DMS s Assume there exist fuctios f 1 : X 1 Zad f 2 : X 2 Z, such that P (f 1 (X 1 ) f 2 (X 2 )) ɛ,ɛ (0, 05) Here X i ad Z are the uderlyig alphabets for X i ad Z Let ɛ =1 (1 ɛ ) Also defie S i = f i (X i ),i {1, 2} The ext theorem presets the mai result of this paper: Theorem 1: The followig RD vectors are achievable: R 1 I(X 1 ; U 1 U 2 W )+E,ɛ +2 X 1 U 1 log( ɛ ) p 2 R 2 I(X 2 ; U 2 U 1 W )+2E,ɛ +2 X 2 U 2 log( p 2 ɛ ) R 1 + R 2 I(X 1 X 2 ; U 1 U 2 W )+3E,ɛ +2 X 1 U 1 log( ɛ )+θ D i E{d i hi (U 1,U 2,W),X i } For every distributio P X1,X 2,W,U 1,U 2 satisfyig the followig costraits: 1)U 1 (X 1,W) (X 2,W) U 2 2)W S 1 (X 1,X 2 ) 3)p i >ɛ,i=1, 2 Also p i ad E,ɛ are defied as follows: = mi ({P U1 X x 1,W,U 2 }, {P U1 W,U 2 }) 1,w,u 1,u 2 p 2 = mi ({P U2 X x 2,W,U 1 }, {P U2 W,U 1 }) 2,w,u 1,u 2 E,ɛ = h(ɛ) + ɛ log W I the above formulas, θ is a sequece approachig 0 which ca be bouded for a give P S,W Also U i ad W are the alphabets for U i ad W Remark 1: The above RD regio reduces to the CC regio whe ɛ =0(ie whe S 1 = S 2 ) Also if S 1 ad S 2 are take to be trivial, the boud reduces to the BT regio Remark 2: As becomes larger, ɛ icreases, which i tur causes E,ɛ to icrease O the other had, θ is a decreasig

3 fuctio of This illustrates the trade-off betwee rate-loss due to applicatio of small block-legth codes θ, ad the gais from preservatio of correlatio betwee the sources E,ɛ Remark 3: Note that fidig the achievable rate-distortio regio ivolves sweepig over all possible choices of f 1 ad f 2 However log( p1 p ) icreases as f 1 ɛ 1 ad f 2 become less correlated (ie as ɛ icreases) This suggests choosig highly correlated fuctios gives larger achievable regios Remark 4: The above ier boud is ot symmetric with respect to the two ecoders, oe ca symmetrize the regio by swappig the idices for ecoders 1 ad 2 i the theorem ad takig the uio of the two resultig regios To prove theorem 1, a achievable RD regio usig fiitelegth codig schemes is derived, the it is show that the regio cotais the ier boud i the theorem Let W 1 be a radom variable with alphabet W 1 Take a arbitrary probability distributio P S1,W 1 Also let I be a radom variable uiformly distributed o {1, 2, 3,,} Cosider Q, a -legth quatizer which quatizes S1 to W1 such that: P S1(I),W 1(I) = 1 P S1(i),W 1(i) = P S1,W 1 i [1:] By radom codig argumets Q exists with rate R = I PS1,W 1 (S 1 ; W 1 )+θ, where θ ca be bouded give the distributio P S1,W 1 ad approaches 0 as goes to ifiity [6] Let W2 = Q (S2 ) W2 ca be perceived as the secod ecoder s estimate of W1 Wehave: P X 1,X2,W 1,W 2 = P X 1,X2 P S 1,S S 2 1,S 2,W 1,W 2 s 1,s 2 Defie P X1,X 2,W 1,W 2 = P X1(I),X 2(I),W 1(I),W 2(I) Also defie P as the set of all probability distributios o X 1,X 2,W 1,W 2,U 1,U 2 such that P X1,X 2,W 1,W 2 is produced by the above process ad U 1 ad U 2 satisfy U 1 (X 1,W 1 ) (X 2,W 2 ) U 2 The esuig theorem states the -letter achievable boud for the ew codig strategy Theorem 2: RD vectors satisfyig the followig bouds are achievable: R 1 I(X 1 ; U 1 U 2 W 1 W 2 )+E,ɛ R 2 I(X 2 ; U 2 U 1 W 1 W 2 )+E,ɛ R 1 + R 2 I(W 1 ; S 1 )+I(X 1 ; U 1 W 1,W 2 )+ I(X 2 ; U 2 W 1,W 2 ) I(U 1 ; U 2 W 1 W 2 )+θ + E,ɛ D i E{d i hi (U 1,U 2,W 1,W 2 ),X i } For every probability distributio P X1,X 2,W 1,W 2,U 1,U 2 chose form P Here h i : W 1 W 2 U 1 U 2 X i are the recostructio fuctios at the decoder Remark 5: Q completely determies P X1,X 2,W 1,W 2, also from the Markov chai P U1 X 1,W 1, P U2 X 2,W 2 ad Q fix the iduced joit probability distributio P X1,X 2,W 1,W 2,U 1,U 2 Hece determiig the RD regio give i theorem 2 ivolves takig the uio of RD vectors satisfyig the above bouds for some give f i, h i, Q, P U1 X 1,W 1 ad P U2 X 2,W 2 Proof: First we preset a summary of the proof Fix f i, h i, Q, P U1 X 1,W ad P U2 X 2,W 2 Usig Q the ecoders quatize Si to Wi From radom codig argumets, if multiple realizatios of W1 s are available at the decoder, ecoder 2 ca trasmit the correspodig sequece of W2 1 s usig rate at most H(W 2 W1 ) So the ecoders trasmit the sequeces of W i s with sum-rate less tha R + 1 max{h(w 2 W1 ),H(W1 W2 )} Sice S i s are highly correlated, the vectors Si are almost always equal Cosequetly the quatizatios Wi are almost always equal, ad usig this the term 1 max{h(w 2 W1 ),H(W1 W2 )} ca be bouded I the ext step (W i,x i ) is trasformed ito a DMS by applyig the iterleavig method explaied i [1] The rest of the problem ca be viewed as distributed source codig with sources (W i,x i ) ad side-iformatio (W 1,W 2 ) available at the decoder A more rigorous proof is preseted ext Codebook Geeratio: Three codebooks are used for the quatizatio C is the uderlyig codebook for Q The other two codebooks Ci m, are costructed by choosig each of their elemets from U i based o distributio P Ui Ci m have rates I(X i,w i ; U i )+λ m where λ m 0 Let Q i,m be the quatizers associated with these codebooks Each of the codebooks Ci m are radomly bied at rate I(X i ; U i W 1,W 2 ) r i, where r 1 + r 2 = I(U 1 ; U 2 W 1,W 2 )Givet [0, 1], radomly ad uiformly bi the space of all vectors W tm W tm with rate E,ɛ, ad defie B 1 as the biig fuctio Also bi the space of all vectors W (1 t)m usig the same rate, let B 2 be the biig fuctio Fially choose m permutatios π j,j [1 : m] radomly ad uiformly from the set of all -legth permutatios S Ecodig: Commuicatio is carried out over blocks of legth m Deote the source sequece i oe block as the matrix X i (1:m, 1:) The ith ecoder calculates W i (j, 1:) = Q (S i (j, 1:)) for all j The ecoder wishes to utilize the codebooks Ci m for quatizig (X i,w i ), however the source (X i,w i ) is ot a DMS sice W i is produced by a fiite-legth quatizer To overcome this difficulty we use the method explaied i [1] Let Xi (j, 1:) =π j (X(j, 1:)), defie W i i the same maer As show i [1], ( X i, W i )(1:m, l) would behave like a DMS with probability distributio P Xi,W i Each ecoder calculates Ũi(1:m, l) =Q i,m (( X i, W i )(1:m, l)) For rows (1:tm), the first ecoder trasmits W 1 (j, 1:) while the secod ecoder seds the bi idex B 1 (W 2 (1 : tm, 1:)) For the rest of the rows ecoder 1 seds the bi idex B 2 (W 1 (tm +1:m, 1:)) while ecoder 2 seds W 2 (j, 1:) I other words the ecoders time-share betwee two strategies I the first strategy ecoder 1 trasmits W 1 while ecoder 2 oly seds the bi umber for the sequece of W 2,ithe secod strategy the ecoders reverse roles For every colum l, the i th ecoder also seds the bi idex of Ũi(1 : m, l) i

4 C m i The resultig rates are: Also: R 1 = tr +(1 t)e,ɛ + I(X 1 ; U 1 W 1 W 2 ) r 1 R 2 =(1 t)r + te,ɛ + I(X 2 ; U 2 W 1 W 2 ) r 2 If we prove that the above rates are achievable, the proof is complete, sice they iclude both corer poits of the regio i theorem 2 Decodig: The decoder first decodes W i (1 : m, 1:) For elemets (1 : tm, 1:), W1 tm are available, while oly the bi idex of W2 tm is available Sice m is goig to ifiity, by radom codig argumets W2 tm is losslessly recovered as log the biig rate is more tha 1 H(W 2 W1 ) By lemma 1 i the appedix we have 1 H(W 2 W1 ) E,ɛ By the same argumet (W 1,W 2 ) are recovered losslessly for the rest of the rows The bi size for each vector Ũ1(1:m, l) is: I(X 1,W 1 ; U 1 ) I(X 1 ; U 1 W 1,W 2 )+r 1 = I(X 1,W 1,W 2 ; U 1 ) I(X 1 ; U 1 W 1,W 2 )+r 1 = I(W 1,W 2 ; U 1 )+r 1 The log Markov chai is used i the secod equatio By the same calculatios the bi size for Ũ2 is I(W 1,W 2 ; U 2 )+r 2 Usig typicality argumets oe ca show that for these bi sizes, there is oly oe pair (U 1,U 2 )(1 : m, l), joitly typical with (W 1,W 2 )(1 : m, l) Due to space limitatios we oly preset a summary of the proof The decoder first creates two ambiguity sets L i from the sequeces of U i (1 : m, l) s i the correspodig bis Each of these sets cotais all sequeces U i (1 : m, l) i the bi, which are typical with (W 1,W 2 )(1:m, l) There is roughly oe such sequece i each 2 mi(w1,w2;ui) vectors So the size of L i is close to 2 mri The decoder fids a pair of vectors i the two ambiguity sets which are typical with each other Sice all these vectors are typical with W 1 ad W 2, as log as r 1 + r 2 I(U 1 ; U 2 W 1,W 2 ) there is o more tha oe pair (U 1,U 2 )(1 : m, l) typical with respect to P U1,U 2 W 1,W 2 This completes the proof From remark 3, calculatio of the RD regio i the theorem requires takig uio over all possible -legth quatizers This reders the characterizatio practically icomputable The ext proof shows that the RD regio i theorem 1 is cotaied i the oe i theorem 2, so it is achievable usig the fiitelegth codig scheme Proof: First we elimiate W 2 from the iequalities Restrictig the recostructio fuctios to oly use W 1,U 1,U 2 results i a achievable ier boud I the ext step, W 2 is removed from the mutual iformatio terms: I(X 1 ; U 1 U 2,W 1,W 2 ) = H(U 1 U 2,W 1,W 2 ) H(U 1 X 1,W 1,U 2 ) I(U 1 ; X 1 W 1,U 2 ) I(X 2 ; U 2 U 1,W 1,W 2 ) I(X 2 ; W 2,U 2 W 1,U 1 ) I(X 2 ; U 2 W 1,U 1 )+H(W 2 W 1 ) I(X 2 ; U 2 W 1,U 1 )+E,ɛ W 2 i the terms I(X 1 ; U 1 W 1,W 2 ) ad I(X 2 ; U 2 W 1,W 2 ) i the sum-rate boud ca be removed usig the same method For I(U 1 ; U 2 W 1,W 2 ) a upper-boud is ecessary: I(U 1 ; U 2 W 1,W 2 ) I(U 1 ; U 2 W 1 ) H(W 2 W 1 ) I(U 1 ; U 2 W 1 ) E,ɛ It is straightforward to show I(W 1 ; S 1 )=I(W 1 ; X 1 )Sofar we have the followig ier boud: Q R 1 I(X 1 ; U 1 W 1,U 2 )+E,ɛ R 2 I(X 2 ; U 2 W 1,U 1 )+2E,ɛ R 1 + R 2 I(W 1 ; X 1 )+3E,ɛ + I(X 1 ; U 1 W 1 ) + I(X 2 ; U 2 W 1 ) I(U 1 ; U 2 W 1 )+θ D i E{d i hi (U 1,U 2,W 1 ),X i } is still playig a role i the calculatio of the RD regio by determiig P X1,X 2,W 1,W 2, which i tur affects P U2 X 1,X 2,W 1 Lemma 2 i the appedix provides the meas to elimiate this depedecy o Q The lemma shows that for every probability distributio i theorem 1, there is a probability distributio i theorem 2, for which the above bouds are well-approximated whe calculated usig oe of the distributios istead of the other Hece we ca provide a ier boud for the above rates by cosiderig the distributios from the first theorem ad boudig the estimatio error usig lemma 2 Applyig the estimatio bouds gives the regio preseted i theorem 1 Fially, we show that the RD regio i theorem 1 strictly cotais the CC rate-distortio regio Theorem 3: For the BOHO problem i [1], the RD regio i theorem 2 achieves poits outside of the CC rate-distortio regio Proof: Take U 1 = φ, U 2 = Z + X + W + N δ0 ad W = X + N ɛ + N δ, where N δ is Be(δ),N δ0 is Be(δ 0 ), ad the quatizatio oises are idepedet of the sources ad each other The recostructio fuctio is U 2 + W = X + Z + N δ0 Cosider the corer poit where ecoder 1 is trasmittig W by itself ad ecoder 2 is biig its correlated quatizatio at rate E,ɛ The resultig RD vector approaches (R 1,R 2,D)= (1 h b (δ),h b (p δ) h b (δ 0 ),δ 0 ) as ɛ 0 ad I [5] it was show that these RD vectors are ot achievable by the CC scheme whe ɛ 0 By the same argumet as i [1], it ca be proved that there exist ad ɛ for which the resultig rates are ot achievable by the CC scheme There ca be highly correlated compoets betwee the sources give W 1 ad W 2 I this case, there must be several

5 fiite-legth codebooks super-imposed o each other, oe for each of the highly correlated compoets The ier boud preseted here ca be exteded to iclude these ew layers IV CONCLUSION A ew codig scheme for the distributed source codig problem was preseted The scheme used a combiatio of fiite legth ad large block-legth codes The applicatio of fiite legth quatizers was justified by showig that they preserve correlatio betwee sources more efficietly The achievable regio for the codig scheme was derived A sigleletter characterizatio of a ier boud to the achievable regio was preseted It was show the ier boud strictly cotais previous kow achievable RD regios APPENDIX Lemma 1: Let S 1 ad S 2 be two DMS s such that P (S 1 S 2 ) ɛ for some ɛ > 0 Also Let Wi = f i (Si ) be -letter fuctios of Si to alphabet W Let ɛ =1 (1 ɛ ) The the followig are true: 1) P (W1 W2 ) ɛ 2) 1 H(W 2 W1 ) h(ɛ) + ɛ log W 2 Proof: 1) P (W1 = W2 ) P (S1 = S2 )=1 ɛ The first iequality is true sice if S1 = S2, the W1 = W2 2) Let 1 A be the idicator fuctio of evet A Wehave: H(W2 W1 )=H(1 {W 1 =W2 },W2 W1 ) H(1 {W 1 =W2 } )+H(W2 W1, 1 {W 1 =W2 } ) h b (ɛ)+p(w1 W2 )H(W2 W1, 1 {W 1 =W2 } =0) h b (ɛ)+p(w1 W2 )H(W2 ) h b (ɛ)+ɛ log W 2 Lemma 2: Cosider a probability distributio P X1,X 2,W 1,U 1,U 2 satisfyig the Markov chais U 1 (X 1,W 1 ) (X 2,W 1 ) U 2 ad W 1 S 1 (X 1,X 2 ), where S 1 ad S 2 are as defied previously let P S1,W 1 be the margial distributio of (S 1,W 1 ), take a quatizer Q from Q PS,W Assume P X 1,X 2,W 1,W 2 is the probability distributio iduced by Q Let P U 1 X 1,W 1 = P U1 X 1,W 1 ad P U 2 X 2,W 2 = Defie: = P X 1,X 2,W 1,W 2 P U 1 X 1,W 1 P U 2 X 2,W 2 The followig hold: 1)P X 1,X 2,W 1,U 1,U 2 =P X1,X 2,W 1,U 1,U 2 ± ɛ 2)I P (X 1 ; U 1 W 1,U 2 ) =I P (X 1 ; U 1 W 1,U 2 ) ± 2 X 1 U 1 log ( ɛ ) 3)I P (X 2 ; U 2 W 2,U 1 ) =I P (X 2 ; U 2 W 2,U 1 ) p 2 ± 2 X 2 U 2 log ( p 2 ɛ ) I the above equatios, a =b ± ɛ meas a [b ɛ, b + ɛ] Also I P (A; B C) deotes the mutual iformatio with respect to P Proof: 1) P X 1,X 2,W 1,U 1,U 2 w 2 1 {W1=W 2} P U1 X 1,W 1 = P U1 X 1,W 1 w 2 a P U1 X 1,W 1 (P X1,X 2,W 1 ɛ) P X1,X 2,W 1,U 1,U 2 ɛ Where part (a) results from the followig: P X1,X 2,W 1 = P X 1,X 2,W 1 P X 1,X 2,W 1,W 2 w 2 + P (1 W1 W 2 ) Now we prove the other side of the iequality: P X 1,X 2,W 1,U 1,U 2 1 W1=W 2 + ɛ w 2 P X1,X 2,W 1 P U1 X 1,W 1 P U2 X 1,W 1 + ɛ = P X1,X 2,W 1,U 1,U 2 + ɛ 2) ad 3) follow from 1 i a straightforward maer by expadig the mutual iformatios, the maximum differece betwee the terms i the mutual iformatios is 2log for the sake of brevity we omit the proofs for these parts REFERENCES pi p, i ɛ [1] F Shirai, AG Sahebi, SS Pradha, Distributed source codig i absece of commo compoets, i IEEE Iteratioal Symp o Iformatio Theory IEEE, pp1362,1366, 7-12 July 2013 [2] D Slepia, J Wolf, Noiseless codig of correlated iformatio sources, IEEE Trasactios o Iformatio Theory, vol19, o4, pp , Jul 1973 [3] T Berger, R W Yeug, Multitermial source ecodig with oe distortio criterio,, IEEE Trasactios o Iformatio Theory, vol 35, o 2, pp , 1989 [4] S-Y Tug, Multitermial source codig, PhD Thesis, Corell Uiversity, Ithaca, NY, 1974 [5] AB Wager, BG Kelly, Y Altuğ, Distributed Rate-Distortio With Commo Compoets, IEEE Trasactios o Iformatio Theory, vol57, o7, pp , July 2011 [6] V Kostia, S Verdu, Fixed-Legth Lossy Compressio i the Fiite Blocklegth Regime, IEEE Trasactios o Iformatio Theory, vol58, o6, pp3309,3338, Jue 2012

THE interference channel problem describes a setup where multiple pairs of transmitters and receivers share a communication

THE interference channel problem describes a setup where multiple pairs of transmitters and receivers share a communication Trade-off betwee Commuicatio ad Cooperatio i the Iterferece Chael Farhad Shirai EECS Departmet Uiversity of Michiga A Arbor,USA Email: fshirai@umich.edu S. Sadeep Pradha EECS Departmet Uiversity of Michiga

More information

Multiterminal source coding with complementary delivery

Multiterminal source coding with complementary delivery Iteratioal Symposium o Iformatio Theory ad its Applicatios, ISITA2006 Seoul, Korea, October 29 November 1, 2006 Multitermial source codig with complemetary delivery Akisato Kimura ad Tomohiko Uyematsu

More information

Lecture 11: Channel Coding Theorem: Converse Part

Lecture 11: Channel Coding Theorem: Converse Part EE376A/STATS376A Iformatio Theory Lecture - 02/3/208 Lecture : Chael Codig Theorem: Coverse Part Lecturer: Tsachy Weissma Scribe: Erdem Bıyık I this lecture, we will cotiue our discussio o chael codig

More information

A Partial Decode-Forward Scheme For A Network with N relays

A Partial Decode-Forward Scheme For A Network with N relays A Partial Decode-Forward Scheme For A etwork with relays Yao Tag ECE Departmet, McGill Uiversity Motreal, QC, Caada Email: yaotag2@mailmcgillca Mai Vu ECE Departmet, Tufts Uiversity Medford, MA, USA Email:

More information

The Maximum-Likelihood Decoding Performance of Error-Correcting Codes

The Maximum-Likelihood Decoding Performance of Error-Correcting Codes The Maximum-Lielihood Decodig Performace of Error-Correctig Codes Hery D. Pfister ECE Departmet Texas A&M Uiversity August 27th, 2007 (rev. 0) November 2st, 203 (rev. ) Performace of Codes. Notatio X,

More information

UC Berkeley CS 170: Efficient Algorithms and Intractable Problems Handout 17 Lecturer: David Wagner April 3, Notes 17 for CS 170

UC Berkeley CS 170: Efficient Algorithms and Intractable Problems Handout 17 Lecturer: David Wagner April 3, Notes 17 for CS 170 UC Berkeley CS 170: Efficiet Algorithms ad Itractable Problems Hadout 17 Lecturer: David Wager April 3, 2003 Notes 17 for CS 170 1 The Lempel-Ziv algorithm There is a sese i which the Huffma codig was

More information

A Hybrid Random-Structured Coding Scheme for the Gaussian Two-Terminal Source Coding Problem Under a Covariance Matrix Distortion Constraint

A Hybrid Random-Structured Coding Scheme for the Gaussian Two-Terminal Source Coding Problem Under a Covariance Matrix Distortion Constraint A Hybrid Radom-Structured Codig Scheme for the Gaussia Two-Termial Source Codig Problem Uder a Covariace Matrix Distortio Costrait Yag Yag ad Zixiag Xiog Dept of Electrical ad Computer Egieerig Texas A&M

More information

The Three-Terminal Interactive. Lossy Source Coding Problem

The Three-Terminal Interactive. Lossy Source Coding Problem The Three-Termial Iteractive 1 Lossy Source Codig Problem Leoardo Rey Vega, Pablo Piataida ad Alfred O. Hero III arxiv:1502.01359v3 cs.it] 18 Ja 2016 Abstract The three-ode multitermial lossy source codig

More information

Multiterminal Source Coding with an Entropy-Based Distortion Measure

Multiterminal Source Coding with an Entropy-Based Distortion Measure 20 IEEE Iteratioal Symposium o Iformatio Theory Proceedigs Multitermial Source Codig with a Etropy-Based Distortio Measure Thomas A. Courtade ad Richard D. Wesel Departmet of Electrical Egieerig Uiversity

More information

Information-based Feature Selection

Information-based Feature Selection Iformatio-based Feature Selectio Farza Faria, Abbas Kazeroui, Afshi Babveyh Email: {faria,abbask,afshib}@staford.edu 1 Itroductio Feature selectio is a topic of great iterest i applicatios dealig with

More information

Entropies & Information Theory

Entropies & Information Theory Etropies & Iformatio Theory LECTURE I Nilajaa Datta Uiversity of Cambridge,U.K. For more details: see lecture otes (Lecture 1- Lecture 5) o http://www.qi.damtp.cam.ac.uk/ode/223 Quatum Iformatio Theory

More information

Optimally Sparse SVMs

Optimally Sparse SVMs A. Proof of Lemma 3. We here prove a lower boud o the umber of support vectors to achieve geeralizatio bouds of the form which we cosider. Importatly, this result holds ot oly for liear classifiers, but

More information

MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.436J/15.085J Fall 2008 Lecture 19 11/17/2008 LAWS OF LARGE NUMBERS II THE STRONG LAW OF LARGE NUMBERS

MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.436J/15.085J Fall 2008 Lecture 19 11/17/2008 LAWS OF LARGE NUMBERS II THE STRONG LAW OF LARGE NUMBERS MASSACHUSTTS INSTITUT OF TCHNOLOGY 6.436J/5.085J Fall 2008 Lecture 9 /7/2008 LAWS OF LARG NUMBRS II Cotets. The strog law of large umbers 2. The Cheroff boud TH STRONG LAW OF LARG NUMBRS While the weak

More information

Infinite Sequences and Series

Infinite Sequences and Series Chapter 6 Ifiite Sequeces ad Series 6.1 Ifiite Sequeces 6.1.1 Elemetary Cocepts Simply speakig, a sequece is a ordered list of umbers writte: {a 1, a 2, a 3,...a, a +1,...} where the elemets a i represet

More information

Lecture 7: Channel coding theorem for discrete-time continuous memoryless channel

Lecture 7: Channel coding theorem for discrete-time continuous memoryless channel Lecture 7: Chael codig theorem for discrete-time cotiuous memoryless chael Lectured by Dr. Saif K. Mohammed Scribed by Mirsad Čirkić Iformatio Theory for Wireless Commuicatio ITWC Sprig 202 Let us first

More information

Lecture 14: Graph Entropy

Lecture 14: Graph Entropy 15-859: Iformatio Theory ad Applicatios i TCS Sprig 2013 Lecture 14: Graph Etropy March 19, 2013 Lecturer: Mahdi Cheraghchi Scribe: Euiwoog Lee 1 Recap Bergma s boud o the permaet Shearer s Lemma Number

More information

Inequalities for Entropies of Sets of Subsets of Random Variables

Inequalities for Entropies of Sets of Subsets of Random Variables Iequalities for Etropies of Sets of Subsets of Radom Variables Chao Tia AT&T Labs-Research Florham Par, NJ 0792, USA. tia@research.att.com Abstract Ha s iequality o the etropy rates of subsets of radom

More information

A New Achievability Scheme for the Relay Channel

A New Achievability Scheme for the Relay Channel A New Achievability Scheme for the Relay Chael Wei Kag Seur Ulukus Departmet of Electrical ad Computer Egieerig Uiversity of Marylad, College Park, MD 20742 wkag@umd.edu ulukus@umd.edu October 4, 2007

More information

Vector Permutation Code Design Algorithm. Danilo SILVA and Weiler A. FINAMORE

Vector Permutation Code Design Algorithm. Danilo SILVA and Weiler A. FINAMORE Iteratioal Symposium o Iformatio Theory ad its Applicatios, ISITA2004 Parma, Italy, October 10 13, 2004 Vector Permutatio Code Desig Algorithm Dailo SILVA ad Weiler A. FINAMORE Cetro de Estudos em Telecomuicações

More information

On Random Line Segments in the Unit Square

On Random Line Segments in the Unit Square O Radom Lie Segmets i the Uit Square Thomas A. Courtade Departmet of Electrical Egieerig Uiversity of Califoria Los Ageles, Califoria 90095 Email: tacourta@ee.ucla.edu I. INTRODUCTION Let Q = [0, 1] [0,

More information

Increasing timing capacity using packet coloring

Increasing timing capacity using packet coloring 003 Coferece o Iformatio Scieces ad Systems, The Johs Hopkis Uiversity, March 4, 003 Icreasig timig capacity usig packet colorig Xi Liu ad R Srikat[] Coordiated Sciece Laboratory Uiversity of Illiois e-mail:

More information

Information Theory and Coding

Information Theory and Coding Sol. Iformatio Theory ad Codig. The capacity of a bad-limited additive white Gaussia (AWGN) chael is give by C = Wlog 2 ( + σ 2 W ) bits per secod(bps), where W is the chael badwidth, is the average power

More information

Lecture 27. Capacity of additive Gaussian noise channel and the sphere packing bound

Lecture 27. Capacity of additive Gaussian noise channel and the sphere packing bound Lecture 7 Ageda for the lecture Gaussia chael with average power costraits Capacity of additive Gaussia oise chael ad the sphere packig boud 7. Additive Gaussia oise chael Up to this poit, we have bee

More information

Lecture 19: Convergence

Lecture 19: Convergence Lecture 19: Covergece Asymptotic approach I statistical aalysis or iferece, a key to the success of fidig a good procedure is beig able to fid some momets ad/or distributios of various statistics. I may

More information

Randomized Algorithms I, Spring 2018, Department of Computer Science, University of Helsinki Homework 1: Solutions (Discussed January 25, 2018)

Randomized Algorithms I, Spring 2018, Department of Computer Science, University of Helsinki Homework 1: Solutions (Discussed January 25, 2018) Radomized Algorithms I, Sprig 08, Departmet of Computer Sciece, Uiversity of Helsiki Homework : Solutios Discussed Jauary 5, 08). Exercise.: Cosider the followig balls-ad-bi game. We start with oe black

More information

Module 5 EMBEDDED WAVELET CODING. Version 2 ECE IIT, Kharagpur

Module 5 EMBEDDED WAVELET CODING. Version 2 ECE IIT, Kharagpur Module 5 EMBEDDED WAVELET CODING Versio ECE IIT, Kharagpur Lesso 4 SPIHT algorithm Versio ECE IIT, Kharagpur Istructioal Objectives At the ed of this lesso, the studets should be able to:. State the limitatios

More information

On Evaluating the Rate-Distortion Function of Sources with Feed-Forward and the Capacity of Channels with Feedback.

On Evaluating the Rate-Distortion Function of Sources with Feed-Forward and the Capacity of Channels with Feedback. O Evaluatig the Rate-Distortio Fuctio of Sources with Feed-Forward ad the Capacity of Chaels with Feedback. Ramji Vekataramaa ad S. Sadeep Pradha Departmet of EECS, Uiversity of Michiga, A Arbor, MI 4805

More information

Problem Set 4 Due Oct, 12

Problem Set 4 Due Oct, 12 EE226: Radom Processes i Systems Lecturer: Jea C. Walrad Problem Set 4 Due Oct, 12 Fall 06 GSI: Assae Gueye This problem set essetially reviews detectio theory ad hypothesis testig ad some basic otios

More information

The Likelihood Encoder with Applications to Lossy Compression and Secrecy

The Likelihood Encoder with Applications to Lossy Compression and Secrecy The Likelihood Ecoder with Applicatios to Lossy Compressio ad Secrecy Eva C. Sog Paul Cuff H. Vicet Poor Dept. of Electrical Eg., Priceto Uiversity, NJ 8544 {csog, cuff, poor}@priceto.edu Abstract A likelihood

More information

Asymptotic Coupling and Its Applications in Information Theory

Asymptotic Coupling and Its Applications in Information Theory Asymptotic Couplig ad Its Applicatios i Iformatio Theory Vicet Y. F. Ta Joit Work with Lei Yu Departmet of Electrical ad Computer Egieerig, Departmet of Mathematics, Natioal Uiversity of Sigapore IMS-APRM

More information

Symmetric Two-User Gaussian Interference Channel with Common Messages

Symmetric Two-User Gaussian Interference Channel with Common Messages Symmetric Two-User Gaussia Iterferece Chael with Commo Messages Qua Geg CSL ad Dept. of ECE UIUC, IL 680 Email: geg5@illiois.edu Tie Liu Dept. of Electrical ad Computer Egieerig Texas A&M Uiversity, TX

More information

CS284A: Representations and Algorithms in Molecular Biology

CS284A: Representations and Algorithms in Molecular Biology CS284A: Represetatios ad Algorithms i Molecular Biology Scribe Notes o Lectures 3 & 4: Motif Discovery via Eumeratio & Motif Represetatio Usig Positio Weight Matrix Joshua Gervi Based o presetatios by

More information

Problem Set 2 Solutions

Problem Set 2 Solutions CS271 Radomess & Computatio, Sprig 2018 Problem Set 2 Solutios Poit totals are i the margi; the maximum total umber of poits was 52. 1. Probabilistic method for domiatig sets 6pts Pick a radom subset S

More information

Econ 325/327 Notes on Sample Mean, Sample Proportion, Central Limit Theorem, Chi-square Distribution, Student s t distribution 1.

Econ 325/327 Notes on Sample Mean, Sample Proportion, Central Limit Theorem, Chi-square Distribution, Student s t distribution 1. Eco 325/327 Notes o Sample Mea, Sample Proportio, Cetral Limit Theorem, Chi-square Distributio, Studet s t distributio 1 Sample Mea By Hiro Kasahara We cosider a radom sample from a populatio. Defiitio

More information

Sequences and Series of Functions

Sequences and Series of Functions Chapter 6 Sequeces ad Series of Fuctios 6.1. Covergece of a Sequece of Fuctios Poitwise Covergece. Defiitio 6.1. Let, for each N, fuctio f : A R be defied. If, for each x A, the sequece (f (x)) coverges

More information

Chapter 6 Infinite Series

Chapter 6 Infinite Series Chapter 6 Ifiite Series I the previous chapter we cosidered itegrals which were improper i the sese that the iterval of itegratio was ubouded. I this chapter we are goig to discuss a topic which is somewhat

More information

Confidence interval for the two-parameter exponentiated Gumbel distribution based on record values

Confidence interval for the two-parameter exponentiated Gumbel distribution based on record values Iteratioal Joural of Applied Operatioal Research Vol. 4 No. 1 pp. 61-68 Witer 2014 Joural homepage: www.ijorlu.ir Cofidece iterval for the two-parameter expoetiated Gumbel distributio based o record values

More information

Hashing and Amortization

Hashing and Amortization Lecture Hashig ad Amortizatio Supplemetal readig i CLRS: Chapter ; Chapter 7 itro; Sectio 7.. Arrays ad Hashig Arrays are very useful. The items i a array are statically addressed, so that isertig, deletig,

More information

Sensitivity Analysis of Daubechies 4 Wavelet Coefficients for Reduction of Reconstructed Image Error

Sensitivity Analysis of Daubechies 4 Wavelet Coefficients for Reduction of Reconstructed Image Error Proceedigs of the 6th WSEAS Iteratioal Coferece o SIGNAL PROCESSING, Dallas, Texas, USA, March -4, 7 67 Sesitivity Aalysis of Daubechies 4 Wavelet Coefficiets for Reductio of Recostructed Image Error DEVINDER

More information

Information Theory Tutorial Communication over Channels with memory. Chi Zhang Department of Electrical Engineering University of Notre Dame

Information Theory Tutorial Communication over Channels with memory. Chi Zhang Department of Electrical Engineering University of Notre Dame Iformatio Theory Tutorial Commuicatio over Chaels with memory Chi Zhag Departmet of Electrical Egieerig Uiversity of Notre Dame Abstract A geeral capacity formula C = sup I(; Y ), which is correct for

More information

Shannon s noiseless coding theorem

Shannon s noiseless coding theorem 18.310 lecture otes May 4, 2015 Shao s oiseless codig theorem Lecturer: Michel Goemas I these otes we discuss Shao s oiseless codig theorem, which is oe of the foudig results of the field of iformatio

More information

Convergence of random variables. (telegram style notes) P.J.C. Spreij

Convergence of random variables. (telegram style notes) P.J.C. Spreij Covergece of radom variables (telegram style otes).j.c. Spreij this versio: September 6, 2005 Itroductio As we kow, radom variables are by defiitio measurable fuctios o some uderlyig measurable space

More information

Cooperative Communication Fundamentals & Coding Techniques

Cooperative Communication Fundamentals & Coding Techniques 3 th ICACT Tutorial Cooperative commuicatio fudametals & codig techiques Cooperative Commuicatio Fudametals & Codig Techiques 0..4 Electroics ad Telecommuicatio Research Istitute Kiug Jug 3 th ICACT Tutorial

More information

CS322: Network Analysis. Problem Set 2 - Fall 2009

CS322: Network Analysis. Problem Set 2 - Fall 2009 Due October 9 009 i class CS3: Network Aalysis Problem Set - Fall 009 If you have ay questios regardig the problems set, sed a email to the course assistats: simlac@staford.edu ad peleato@staford.edu.

More information

ECEN 655: Advanced Channel Coding Spring Lecture 7 02/04/14. Belief propagation is exact on tree-structured factor graphs.

ECEN 655: Advanced Channel Coding Spring Lecture 7 02/04/14. Belief propagation is exact on tree-structured factor graphs. ECEN 655: Advaced Chael Codig Sprig 014 Prof. Hery Pfister Lecture 7 0/04/14 Scribe: Megke Lia 1 4-Cycles i Gallager s Esemble What we already kow: Belief propagatio is exact o tree-structured factor graphs.

More information

CEE 522 Autumn Uncertainty Concepts for Geotechnical Engineering

CEE 522 Autumn Uncertainty Concepts for Geotechnical Engineering CEE 5 Autum 005 Ucertaity Cocepts for Geotechical Egieerig Basic Termiology Set A set is a collectio of (mutually exclusive) objects or evets. The sample space is the (collectively exhaustive) collectio

More information

Disjoint Systems. Abstract

Disjoint Systems. Abstract Disjoit Systems Noga Alo ad Bey Sudaov Departmet of Mathematics Raymod ad Beverly Sacler Faculty of Exact Scieces Tel Aviv Uiversity, Tel Aviv, Israel Abstract A disjoit system of type (,,, ) is a collectio

More information

Lecture 6: Source coding, Typicality, and Noisy channels and capacity

Lecture 6: Source coding, Typicality, and Noisy channels and capacity 15-859: Iformatio Theory ad Applicatios i TCS CMU: Sprig 2013 Lecture 6: Source codig, Typicality, ad Noisy chaels ad capacity Jauary 31, 2013 Lecturer: Mahdi Cheraghchi Scribe: Togbo Huag 1 Recap Uiversal

More information

Empirical Processes: Glivenko Cantelli Theorems

Empirical Processes: Glivenko Cantelli Theorems Empirical Processes: Gliveko Catelli Theorems Mouliath Baerjee Jue 6, 200 Gliveko Catelli classes of fuctios The reader is referred to Chapter.6 of Weller s Torgo otes, Chapter??? of VDVW ad Chapter 8.3

More information

Basics of Probability Theory (for Theory of Computation courses)

Basics of Probability Theory (for Theory of Computation courses) Basics of Probability Theory (for Theory of Computatio courses) Oded Goldreich Departmet of Computer Sciece Weizma Istitute of Sciece Rehovot, Israel. oded.goldreich@weizma.ac.il November 24, 2008 Preface.

More information

Application to Random Graphs

Application to Random Graphs A Applicatio to Radom Graphs Brachig processes have a umber of iterestig ad importat applicatios. We shall cosider oe of the most famous of them, the Erdős-Réyi radom graph theory. 1 Defiitio A.1. Let

More information

Geometry of LS. LECTURE 3 GEOMETRY OF LS, PROPERTIES OF σ 2, PARTITIONED REGRESSION, GOODNESS OF FIT

Geometry of LS. LECTURE 3 GEOMETRY OF LS, PROPERTIES OF σ 2, PARTITIONED REGRESSION, GOODNESS OF FIT OCTOBER 7, 2016 LECTURE 3 GEOMETRY OF LS, PROPERTIES OF σ 2, PARTITIONED REGRESSION, GOODNESS OF FIT Geometry of LS We ca thik of y ad the colums of X as members of the -dimesioal Euclidea space R Oe ca

More information

Are Slepian-Wolf Rates Necessary for Distributed Parameter Estimation?

Are Slepian-Wolf Rates Necessary for Distributed Parameter Estimation? Are Slepia-Wolf Rates Necessary for Distributed Parameter Estimatio? Mostafa El Gamal ad Lifeg Lai Departmet of Electrical ad Computer Egieerig Worcester Polytechic Istitute {melgamal, llai}@wpi.edu arxiv:1508.02765v2

More information

The multiplicative structure of finite field and a construction of LRC

The multiplicative structure of finite field and a construction of LRC IERG6120 Codig for Distributed Storage Systems Lecture 8-06/10/2016 The multiplicative structure of fiite field ad a costructio of LRC Lecturer: Keeth Shum Scribe: Zhouyi Hu Notatios: We use the otatio

More information

6.867 Machine learning, lecture 7 (Jaakkola) 1

6.867 Machine learning, lecture 7 (Jaakkola) 1 6.867 Machie learig, lecture 7 (Jaakkola) 1 Lecture topics: Kerel form of liear regressio Kerels, examples, costructio, properties Liear regressio ad kerels Cosider a slightly simpler model where we omit

More information

Random Variables, Sampling and Estimation

Random Variables, Sampling and Estimation Chapter 1 Radom Variables, Samplig ad Estimatio 1.1 Itroductio This chapter will cover the most importat basic statistical theory you eed i order to uderstad the ecoometric material that will be comig

More information

EECS564 Estimation, Filtering, and Detection Hwk 2 Solns. Winter p θ (z) = (2θz + 1 θ), 0 z 1

EECS564 Estimation, Filtering, and Detection Hwk 2 Solns. Winter p θ (z) = (2θz + 1 θ), 0 z 1 EECS564 Estimatio, Filterig, ad Detectio Hwk 2 Sols. Witer 25 4. Let Z be a sigle observatio havig desity fuctio where. p (z) = (2z + ), z (a) Assumig that is a oradom parameter, fid ad plot the maximum

More information

Lecture 15: Strong, Conditional, & Joint Typicality

Lecture 15: Strong, Conditional, & Joint Typicality EE376A/STATS376A Iformatio Theory Lecture 15-02/27/2018 Lecture 15: Strog, Coditioal, & Joit Typicality Lecturer: Tsachy Weissma Scribe: Nimit Sohoi, William McCloskey, Halwest Mohammad I this lecture,

More information

An Introduction to Randomized Algorithms

An Introduction to Randomized Algorithms A Itroductio to Radomized Algorithms The focus of this lecture is to study a radomized algorithm for quick sort, aalyze it usig probabilistic recurrece relatios, ad also provide more geeral tools for aalysis

More information

Universal source coding for complementary delivery

Universal source coding for complementary delivery SITA2006 i Hakodate 2005.2. p. Uiversal source codig for complemetary delivery Akisato Kimura, 2, Tomohiko Uyematsu 2, Shigeaki Kuzuoka 2 Media Iformatio Laboratory, NTT Commuicatio Sciece Laboratories,

More information

ECE 564/645 - Digital Communication Systems (Spring 2014) Final Exam Friday, May 2nd, 8:00-10:00am, Marston 220

ECE 564/645 - Digital Communication Systems (Spring 2014) Final Exam Friday, May 2nd, 8:00-10:00am, Marston 220 ECE 564/645 - Digital Commuicatio Systems (Sprig 014) Fial Exam Friday, May d, 8:00-10:00am, Marsto 0 Overview The exam cosists of four (or five) problems for 100 (or 10) poits. The poits for each part

More information

A Coding Theorem for f-separable Distortion Measures

A Coding Theorem for f-separable Distortion Measures A Codig Theorem for f-separable Distortio Measures Yaia Shkel Priceto Uiversity NJ 08544, USA Email: yshkel@priceto.edu Sergio Verdú Priceto Uiversity NJ 08544, USA Email: verdu@priceto.edu Abstract Rate-distortio

More information

Ada Boost, Risk Bounds, Concentration Inequalities. 1 AdaBoost and Estimates of Conditional Probabilities

Ada Boost, Risk Bounds, Concentration Inequalities. 1 AdaBoost and Estimates of Conditional Probabilities CS8B/Stat4B Sprig 008) Statistical Learig Theory Lecture: Ada Boost, Risk Bouds, Cocetratio Iequalities Lecturer: Peter Bartlett Scribe: Subhrasu Maji AdaBoost ad Estimates of Coditioal Probabilities We

More information

6.895 Essential Coding Theory October 20, Lecture 11. This lecture is focused in comparisons of the following properties/parameters of a code:

6.895 Essential Coding Theory October 20, Lecture 11. This lecture is focused in comparisons of the following properties/parameters of a code: 6.895 Essetial Codig Theory October 0, 004 Lecture 11 Lecturer: Madhu Suda Scribe: Aastasios Sidiropoulos 1 Overview This lecture is focused i comparisos of the followig properties/parameters of a code:

More information

Lecture 7: October 18, 2017

Lecture 7: October 18, 2017 Iformatio ad Codig Theory Autum 207 Lecturer: Madhur Tulsiai Lecture 7: October 8, 207 Biary hypothesis testig I this lecture, we apply the tools developed i the past few lectures to uderstad the problem

More information

Lossy Compression with Near-uniform Encoder Outputs

Lossy Compression with Near-uniform Encoder Outputs 016 IEEE Iteratioal Symposium o Iformatio Theory Lossy Compressio with Near-uiform Ecoder Outputs Badri N. Vellambi, Jörg Kliewer New Jersey Istitute of Techology, Newar, NJ 0710 Email: badri..vellambi@ieee.org,

More information

Entropy and Ergodic Theory Lecture 5: Joint typicality and conditional AEP

Entropy and Ergodic Theory Lecture 5: Joint typicality and conditional AEP Etropy ad Ergodic Theory Lecture 5: Joit typicality ad coditioal AEP 1 Notatio: from RVs back to distributios Let (Ω, F, P) be a probability space, ad let X ad Y be A- ad B-valued discrete RVs, respectively.

More information

Rank Modulation with Multiplicity

Rank Modulation with Multiplicity Rak Modulatio with Multiplicity Axiao (Adrew) Jiag Computer Sciece ad Eg. Dept. Texas A&M Uiversity College Statio, TX 778 ajiag@cse.tamu.edu Abstract Rak modulatio is a scheme that uses the relative order

More information

Sequences A sequence of numbers is a function whose domain is the positive integers. We can see that the sequence

Sequences A sequence of numbers is a function whose domain is the positive integers. We can see that the sequence Sequeces A sequece of umbers is a fuctio whose domai is the positive itegers. We ca see that the sequece 1, 1, 2, 2, 3, 3,... is a fuctio from the positive itegers whe we write the first sequece elemet

More information

Chapter 3. Strong convergence. 3.1 Definition of almost sure convergence

Chapter 3. Strong convergence. 3.1 Definition of almost sure convergence Chapter 3 Strog covergece As poited out i the Chapter 2, there are multiple ways to defie the otio of covergece of a sequece of radom variables. That chapter defied covergece i probability, covergece i

More information

Lossy Compression via Sparse Linear Regression: Computationally Efficient Encoding and Decoding

Lossy Compression via Sparse Linear Regression: Computationally Efficient Encoding and Decoding ossy Compressio via Sparse iear Regressio: Computatioally Efficiet Ecodig ad Decodig Ramji Vekataramaa Dept of Egieerig, Uiv of Cambridge ramjiv@egcamacuk Tuhi Sarkar Dept of EE, IIT Bombay tuhi91@gmailcom

More information

Journal of Multivariate Analysis. Superefficient estimation of the marginals by exploiting knowledge on the copula

Journal of Multivariate Analysis. Superefficient estimation of the marginals by exploiting knowledge on the copula Joural of Multivariate Aalysis 102 (2011) 1315 1319 Cotets lists available at ScieceDirect Joural of Multivariate Aalysis joural homepage: www.elsevier.com/locate/jmva Superefficiet estimatio of the margials

More information

SUCCESSIVE INTERFERENCE CANCELLATION DECODING FOR THE K -USER CYCLIC INTERFERENCE CHANNEL

SUCCESSIVE INTERFERENCE CANCELLATION DECODING FOR THE K -USER CYCLIC INTERFERENCE CHANNEL Joural of Theoretical ad Applied Iformatio Techology 31 st December 212 Vol 46 No2 25-212 JATIT & LLS All rights reserved ISSN: 1992-8645 wwwatitorg E-ISSN: 1817-3195 SCCESSIVE INTERFERENCE CANCELLATION

More information

Lecture 2. The Lovász Local Lemma

Lecture 2. The Lovász Local Lemma Staford Uiversity Sprig 208 Math 233A: No-costructive methods i combiatorics Istructor: Ja Vodrák Lecture date: Jauary 0, 208 Origial scribe: Apoorva Khare Lecture 2. The Lovász Local Lemma 2. Itroductio

More information

Since X n /n P p, we know that X n (n. Xn (n X n ) Using the asymptotic result above to obtain an approximation for fixed n, we obtain

Since X n /n P p, we know that X n (n. Xn (n X n ) Using the asymptotic result above to obtain an approximation for fixed n, we obtain Assigmet 9 Exercise 5.5 Let X biomial, p, where p 0, 1 is ukow. Obtai cofidece itervals for p i two differet ways: a Sice X / p d N0, p1 p], the variace of the limitig distributio depeds oly o p. Use the

More information

CS / MCS 401 Homework 3 grader solutions

CS / MCS 401 Homework 3 grader solutions CS / MCS 401 Homework 3 grader solutios assigmet due July 6, 016 writte by Jāis Lazovskis maximum poits: 33 Some questios from CLRS. Questios marked with a asterisk were ot graded. 1 Use the defiitio of

More information

Report on Private Information Retrieval over Unsynchronized Databases

Report on Private Information Retrieval over Unsynchronized Databases Report o Private Iformatio Retrieval over Usychroized Databases Lembit Valgma Supervised by Vitaly Skachek May 25, 217 1 Problem Statemet There are may challeges cocerig olie privacy. Private iformatio

More information

Information Theory and Statistics Lecture 4: Lempel-Ziv code

Information Theory and Statistics Lecture 4: Lempel-Ziv code Iformatio Theory ad Statistics Lecture 4: Lempel-Ziv code Łukasz Dębowski ldebowsk@ipipa.waw.pl Ph. D. Programme 203/204 Etropy rate is the limitig compressio rate Theorem For a statioary process (X i)

More information

Singular Continuous Measures by Michael Pejic 5/14/10

Singular Continuous Measures by Michael Pejic 5/14/10 Sigular Cotiuous Measures by Michael Peic 5/4/0 Prelimiaries Give a set X, a σ-algebra o X is a collectio of subsets of X that cotais X ad ad is closed uder complemetatio ad coutable uios hece, coutable

More information

Algebra of Least Squares

Algebra of Least Squares October 19, 2018 Algebra of Least Squares Geometry of Least Squares Recall that out data is like a table [Y X] where Y collects observatios o the depedet variable Y ad X collects observatios o the k-dimesioal

More information

Axioms of Measure Theory

Axioms of Measure Theory MATH 532 Axioms of Measure Theory Dr. Neal, WKU I. The Space Throughout the course, we shall let X deote a geeric o-empty set. I geeral, we shall ot assume that ay algebraic structure exists o X so that

More information

Lecture 4: April 10, 2013

Lecture 4: April 10, 2013 TTIC/CMSC 1150 Mathematical Toolkit Sprig 01 Madhur Tulsiai Lecture 4: April 10, 01 Scribe: Haris Agelidakis 1 Chebyshev s Iequality recap I the previous lecture, we used Chebyshev s iequality to get a

More information

1 Review of Probability & Statistics

1 Review of Probability & Statistics 1 Review of Probability & Statistics a. I a group of 000 people, it has bee reported that there are: 61 smokers 670 over 5 960 people who imbibe (drik alcohol) 86 smokers who imbibe 90 imbibers over 5

More information

Frequentist Inference

Frequentist Inference Frequetist Iferece The topics of the ext three sectios are useful applicatios of the Cetral Limit Theorem. Without kowig aythig about the uderlyig distributio of a sequece of radom variables {X i }, for

More information

Feedback in Iterative Algorithms

Feedback in Iterative Algorithms Feedback i Iterative Algorithms Charles Byre (Charles Byre@uml.edu), Departmet of Mathematical Scieces, Uiversity of Massachusetts Lowell, Lowell, MA 01854 October 17, 2005 Abstract Whe the oegative system

More information

Run-length & Entropy Coding. Redundancy Removal. Sampling. Quantization. Perform inverse operations at the receiver EEE

Run-length & Entropy Coding. Redundancy Removal. Sampling. Quantization. Perform inverse operations at the receiver EEE Geeral e Image Coder Structure Motio Video (s 1,s 2,t) or (s 1,s 2 ) Natural Image Samplig A form of data compressio; usually lossless, but ca be lossy Redudacy Removal Lossless compressio: predictive

More information

Linear Regression Demystified

Linear Regression Demystified Liear Regressio Demystified Liear regressio is a importat subject i statistics. I elemetary statistics courses, formulae related to liear regressio are ofte stated without derivatio. This ote iteds to

More information

Distortion Bounds for Source Broadcast. Problem

Distortion Bounds for Source Broadcast. Problem Distortio Bouds for Source Broadcast 1 Problem Lei Yu, Houqiag Li, Seior Member, IEEE, ad Weipig Li, Fellow, IEEE Abstract This paper ivestigates the joit source-chael codig problem of sedig a memoryless

More information

Advanced Analysis. Min Yan Department of Mathematics Hong Kong University of Science and Technology

Advanced Analysis. Min Yan Department of Mathematics Hong Kong University of Science and Technology Advaced Aalysis Mi Ya Departmet of Mathematics Hog Kog Uiversity of Sciece ad Techology September 3, 009 Cotets Limit ad Cotiuity 7 Limit of Sequece 8 Defiitio 8 Property 3 3 Ifiity ad Ifiitesimal 8 4

More information

Beurling Integers: Part 2

Beurling Integers: Part 2 Beurlig Itegers: Part 2 Isomorphisms Devi Platt July 11, 2015 1 Prime Factorizatio Sequeces I the last article we itroduced the Beurlig geeralized itegers, which ca be represeted as a sequece of real umbers

More information

ACO Comprehensive Exam 9 October 2007 Student code A. 1. Graph Theory

ACO Comprehensive Exam 9 October 2007 Student code A. 1. Graph Theory 1. Graph Theory Prove that there exist o simple plaar triagulatio T ad two distict adjacet vertices x, y V (T ) such that x ad y are the oly vertices of T of odd degree. Do ot use the Four-Color Theorem.

More information

Non-Asymptotic Achievable Rates for Gaussian Energy-Harvesting Channels: Best-Effort and Save-and-Transmit

Non-Asymptotic Achievable Rates for Gaussian Energy-Harvesting Channels: Best-Effort and Save-and-Transmit No-Asymptotic Achievable Rates for Gaussia Eergy-Harvestig Chaels: Best-Effort ad Save-ad-Trasmit Silas L. Fog, Jig Yag, ad Ayli Yeer arxiv:805.089v [cs.it] 30 May 08 Abstract A additive white Gaussia

More information

CHAPTER 10 INFINITE SEQUENCES AND SERIES

CHAPTER 10 INFINITE SEQUENCES AND SERIES CHAPTER 10 INFINITE SEQUENCES AND SERIES 10.1 Sequeces 10.2 Ifiite Series 10.3 The Itegral Tests 10.4 Compariso Tests 10.5 The Ratio ad Root Tests 10.6 Alteratig Series: Absolute ad Coditioal Covergece

More information

End-of-Year Contest. ERHS Math Club. May 5, 2009

End-of-Year Contest. ERHS Math Club. May 5, 2009 Ed-of-Year Cotest ERHS Math Club May 5, 009 Problem 1: There are 9 cois. Oe is fake ad weighs a little less tha the others. Fid the fake coi by weighigs. Solutio: Separate the 9 cois ito 3 groups (A, B,

More information

ON POINTWISE BINOMIAL APPROXIMATION

ON POINTWISE BINOMIAL APPROXIMATION Iteratioal Joural of Pure ad Applied Mathematics Volume 71 No. 1 2011, 57-66 ON POINTWISE BINOMIAL APPROXIMATION BY w-functions K. Teerapabolar 1, P. Wogkasem 2 Departmet of Mathematics Faculty of Sciece

More information

Section 1.1. Calculus: Areas And Tangents. Difference Equations to Differential Equations

Section 1.1. Calculus: Areas And Tangents. Difference Equations to Differential Equations Differece Equatios to Differetial Equatios Sectio. Calculus: Areas Ad Tagets The study of calculus begis with questios about chage. What happes to the velocity of a swigig pedulum as its positio chages?

More information

Stochastic Simulation

Stochastic Simulation Stochastic Simulatio 1 Itroductio Readig Assigmet: Read Chapter 1 of text. We shall itroduce may of the key issues to be discussed i this course via a couple of model problems. Model Problem 1 (Jackso

More information

A statistical method to determine sample size to estimate characteristic value of soil parameters

A statistical method to determine sample size to estimate characteristic value of soil parameters A statistical method to determie sample size to estimate characteristic value of soil parameters Y. Hojo, B. Setiawa 2 ad M. Suzuki 3 Abstract Sample size is a importat factor to be cosidered i determiig

More information

Vector Quantization: a Limiting Case of EM

Vector Quantization: a Limiting Case of EM . Itroductio & defiitios Assume that you are give a data set X = { x j }, j { 2,,, }, of d -dimesioal vectors. The vector quatizatio (VQ) problem requires that we fid a set of prototype vectors Z = { z

More information

CALCULATING FIBONACCI VECTORS

CALCULATING FIBONACCI VECTORS THE GENERALIZED BINET FORMULA FOR CALCULATING FIBONACCI VECTORS Stuart D Aderso Departmet of Physics, Ithaca College 953 Daby Road, Ithaca NY 14850, USA email: saderso@ithacaedu ad Dai Novak Departmet

More information