Finite Block-Length Gains in Distributed Source Coding
|
|
- Julie Hutchinson
- 5 years ago
- Views:
Transcription
1 Decoder Fiite Block-Legth Gais i Distributed Source Codig Farhad Shirai EECS Departmet Uiversity of Michiga A Arbor,USA fshirai@umichedu S Sadeep Pradha EECS Departmet Uiversity of Michiga A Arbor,USA pradhav@umichedu Abstract A ew codig scheme for the distributed source codig problem for geeral discrete memoryless sources is preseted The scheme ivolves a two-layered codig strategy, the first layer code is of costat fiite block-legth whereas the secod layer cotais codes of block-legth approachig ifiity It is argued that small block-legth codes preserve correlatios betwee sources more efficietly, while sufferig rate-loss i a poit-to-poit compressio perspective Cosequetly, there is a sweet-spot for the legth of the code A achievable ratedistortio regio is characterized usig sigle-letter distributios It is show that this regio strictly cotais previous kow achievable rate-distortio regios for the distributed source codig problem I INTRODUCTION Due to the iheret difficulty i characterizatio of fudametal limits of reliable commuicatio, most of the works i iformatio theory have cosidered the aalysis of large block-legth codes, without ay costraits o memory ad computatioal complexity This allows operatig i the realm of the laws of large umbers ad thus sigificatly simplifies the aalysis However, codig theory deals with codes with short block-legths with computatioally efficiet ecodig ad decodig algorithms While there is iterest i applicatio of such small-legth commuicatios strategies, it is largely assumed that performace improves whe the block-legth icreases This turs out to be ot true i certai codig schemes used i distributed source codig as discussed below The two user distributed source-codig problem is depicted i figure 1 Two correlated discrete-memoryless-sources (DMS) are fed to the ecoders Each ecoder compresses its respective source ad trasmits the compressed versio to the decoder The decoder recostructs each of the sources with respect to a distortio criteriothere has bee a substatial effort to derive the optimal RD regio for this set-up, however the regio has bee characterized oly i special cases [2], [3] The best kow ier boud to the optimal rate-distortio (RD) regio for distributed codig of two correlated sources is the Berger-Tug (BT) boud [4] The BT boud is based o a codig strategy called quatize ad bi I this strategy the two sources are quatized usig two idepedet, ifiite legth radom vector quatizers ad the quatizers are bied to This work was supported by NSF grat CCF Fig 1 X 1 Ec 1 X 2 Ec 2 ˆX 1, ˆX2 The two-user distributed source codig problem reduce the trasmissio rate The idepedet quatizatio approach leads to the so-called log Markov chai The Markov chai implies that coditioed o the sources, the sigle-letter distributio of the quatized versios of the sources decompose ito the product of coditioal margial distributios I [5] it was poited out that i the presece of commo compoets, further correlatio ca be iduced betwee the quatized versios, i other words the Markov chai ca be relaxed usig the commo compoet (CC) Based o this observatio the authors i [5] propose a codig scheme which outperforms the BT strategy i the presece of commo compoets, but reduces to the latter i their absece The CC achievable RD regio shriks discotiuously i source probability distributio as commo compoets are replaced with highly correlated compoets From the cotiuity of the optimal RD regio, it was proved i [5] that the CC scheme is also sub-optimal sice it is discotiuous Hece the optimal RD regio strictly cotais the CC regio, however it was ot clear how to achieve poits outside of the CC ratedistortio regio Toward improvig the CC boud, we used two idetical radom quatizers istead of two idepedet oes We foud [1] that whe applied to the biary-oe-helpoe (BOHO) example of [5], as the block-legth is icreased, the performace improves iitially, reaches a plateau, ad the decreases after that So the best performace is achieved whe the legth of the code is at some fiite value Based o this observatio, a codig strategy was proposed for the BOHO example which improves the CC achievable RD regio The mai difficulty i aalyzig fiite block-legth codig strategies is that i the absece of simplifyig theorems such as laws of large umbers, the resultig characterizatios of achievable ier bouds are i terms of multi-letter prob-
2 Fig 2 ɛ X + E Q(X(1 : )) X Q((X + E)(1 :)) Quatizatio oises become idepedet at large block-legth ability distributios This makes the computatio of such ier bouds very complex I this paper we first preset a codig scheme for the distributed source codig problem i the geeral discrete, memoryless settig The scheme utilizes both small-legth codes ad codes with block-legth approachig ifiity A multi-letter characterizatio of the rate-distortio regio achievable usig this scheme is give, ad it is show that there is a approximatig sigle-letter characterizatio for the ier boud We prove that the resultig ier boud outperforms the previous kow codig schemes for this commuicatio settig The rest of the paper is orgaized as follows: I sectio II, we explai the ituitive reaso behid our codig scheme Sectio III icludes the ew codig strategy ad the resultig RD regio Sectio IV cocludes the paper II BINARY-ONE-HELP ONE EXAMPLE I [1] quatizatio of two highly correlated BSS s usig the same radomly geerated code was cosidered More specifically, let X be a BSS, ad E be a Be(ɛ) radom variable Defie the sources as X 1 = X ad X 2 = X +E We took a radomly chose -legth quatizer Q ad quatized X1 ad X2 As the legth of the quatizer approaches ifiity, the quatizatio oises become idepedet; this happes irrespective of the value of ɛ The ituitive reaso is that as the quatizer legth icreases, most of the vectors are cocetrated o the edges of the Vorooi regios Hece as the legth goes to ifiity, with high probability the two source vectors fall ito two differet quatizatio regios Sice codewords are pairwise idepedet, the quatizatio oises become idepedet This is illustrated i figure 2 Idepedet quatizatio oises prevet ecoders from refiig each other s quatizatios Whe the sources are exactly equal (ie commo compoets), the quatizatios would also be equal We argue that the discotiuity i the CC scheme is caused by the discotiuity i the correlatio betwee quatizatio oises This implies applicatio of small-legth quatizers is beeficial sice they preserve correlatio betwee the sources, however there is also a rate-loss associated with usig small-legth quatizers The evidece suggests that the existece of a trade-off betwee avoidig rate-loss ad preservig correlatio It was show that there is a sweet-spot for the legth of the quatizer where the trade-off is optimized Based o these observatios a ew codig scheme for the special case of BOHO problem was preseted The scheme uses two layers of codes, the first layer cosists of a codebook with fiite legth (ie the codeword legth is ot take to ifiity), ad the secod codebook has large block-legth I this codig strategy the ecoders apply the fiite-legth quatizer i first layer to quatize the highly correlated compoets of the sources, ad these quatizatios are trasmitted to the decoder Sice the compressed sequeces are highly correlated, the ecoders are able to cooperate i trasmittig them I the ext step, the CC scheme is applied while cosiderig the previous quatizatios as side iformatio completely kow at the decoder ad partially kow at each ecoder III THE NEW CODING STRATEGY Let X 1 ad X 2 be two correlated DMS s Assume there exist fuctios f 1 : X 1 Zad f 2 : X 2 Z, such that P (f 1 (X 1 ) f 2 (X 2 )) ɛ,ɛ (0, 05) Here X i ad Z are the uderlyig alphabets for X i ad Z Let ɛ =1 (1 ɛ ) Also defie S i = f i (X i ),i {1, 2} The ext theorem presets the mai result of this paper: Theorem 1: The followig RD vectors are achievable: R 1 I(X 1 ; U 1 U 2 W )+E,ɛ +2 X 1 U 1 log( ɛ ) p 2 R 2 I(X 2 ; U 2 U 1 W )+2E,ɛ +2 X 2 U 2 log( p 2 ɛ ) R 1 + R 2 I(X 1 X 2 ; U 1 U 2 W )+3E,ɛ +2 X 1 U 1 log( ɛ )+θ D i E{d i hi (U 1,U 2,W),X i } For every distributio P X1,X 2,W,U 1,U 2 satisfyig the followig costraits: 1)U 1 (X 1,W) (X 2,W) U 2 2)W S 1 (X 1,X 2 ) 3)p i >ɛ,i=1, 2 Also p i ad E,ɛ are defied as follows: = mi ({P U1 X x 1,W,U 2 }, {P U1 W,U 2 }) 1,w,u 1,u 2 p 2 = mi ({P U2 X x 2,W,U 1 }, {P U2 W,U 1 }) 2,w,u 1,u 2 E,ɛ = h(ɛ) + ɛ log W I the above formulas, θ is a sequece approachig 0 which ca be bouded for a give P S,W Also U i ad W are the alphabets for U i ad W Remark 1: The above RD regio reduces to the CC regio whe ɛ =0(ie whe S 1 = S 2 ) Also if S 1 ad S 2 are take to be trivial, the boud reduces to the BT regio Remark 2: As becomes larger, ɛ icreases, which i tur causes E,ɛ to icrease O the other had, θ is a decreasig
3 fuctio of This illustrates the trade-off betwee rate-loss due to applicatio of small block-legth codes θ, ad the gais from preservatio of correlatio betwee the sources E,ɛ Remark 3: Note that fidig the achievable rate-distortio regio ivolves sweepig over all possible choices of f 1 ad f 2 However log( p1 p ) icreases as f 1 ɛ 1 ad f 2 become less correlated (ie as ɛ icreases) This suggests choosig highly correlated fuctios gives larger achievable regios Remark 4: The above ier boud is ot symmetric with respect to the two ecoders, oe ca symmetrize the regio by swappig the idices for ecoders 1 ad 2 i the theorem ad takig the uio of the two resultig regios To prove theorem 1, a achievable RD regio usig fiitelegth codig schemes is derived, the it is show that the regio cotais the ier boud i the theorem Let W 1 be a radom variable with alphabet W 1 Take a arbitrary probability distributio P S1,W 1 Also let I be a radom variable uiformly distributed o {1, 2, 3,,} Cosider Q, a -legth quatizer which quatizes S1 to W1 such that: P S1(I),W 1(I) = 1 P S1(i),W 1(i) = P S1,W 1 i [1:] By radom codig argumets Q exists with rate R = I PS1,W 1 (S 1 ; W 1 )+θ, where θ ca be bouded give the distributio P S1,W 1 ad approaches 0 as goes to ifiity [6] Let W2 = Q (S2 ) W2 ca be perceived as the secod ecoder s estimate of W1 Wehave: P X 1,X2,W 1,W 2 = P X 1,X2 P S 1,S S 2 1,S 2,W 1,W 2 s 1,s 2 Defie P X1,X 2,W 1,W 2 = P X1(I),X 2(I),W 1(I),W 2(I) Also defie P as the set of all probability distributios o X 1,X 2,W 1,W 2,U 1,U 2 such that P X1,X 2,W 1,W 2 is produced by the above process ad U 1 ad U 2 satisfy U 1 (X 1,W 1 ) (X 2,W 2 ) U 2 The esuig theorem states the -letter achievable boud for the ew codig strategy Theorem 2: RD vectors satisfyig the followig bouds are achievable: R 1 I(X 1 ; U 1 U 2 W 1 W 2 )+E,ɛ R 2 I(X 2 ; U 2 U 1 W 1 W 2 )+E,ɛ R 1 + R 2 I(W 1 ; S 1 )+I(X 1 ; U 1 W 1,W 2 )+ I(X 2 ; U 2 W 1,W 2 ) I(U 1 ; U 2 W 1 W 2 )+θ + E,ɛ D i E{d i hi (U 1,U 2,W 1,W 2 ),X i } For every probability distributio P X1,X 2,W 1,W 2,U 1,U 2 chose form P Here h i : W 1 W 2 U 1 U 2 X i are the recostructio fuctios at the decoder Remark 5: Q completely determies P X1,X 2,W 1,W 2, also from the Markov chai P U1 X 1,W 1, P U2 X 2,W 2 ad Q fix the iduced joit probability distributio P X1,X 2,W 1,W 2,U 1,U 2 Hece determiig the RD regio give i theorem 2 ivolves takig the uio of RD vectors satisfyig the above bouds for some give f i, h i, Q, P U1 X 1,W 1 ad P U2 X 2,W 2 Proof: First we preset a summary of the proof Fix f i, h i, Q, P U1 X 1,W ad P U2 X 2,W 2 Usig Q the ecoders quatize Si to Wi From radom codig argumets, if multiple realizatios of W1 s are available at the decoder, ecoder 2 ca trasmit the correspodig sequece of W2 1 s usig rate at most H(W 2 W1 ) So the ecoders trasmit the sequeces of W i s with sum-rate less tha R + 1 max{h(w 2 W1 ),H(W1 W2 )} Sice S i s are highly correlated, the vectors Si are almost always equal Cosequetly the quatizatios Wi are almost always equal, ad usig this the term 1 max{h(w 2 W1 ),H(W1 W2 )} ca be bouded I the ext step (W i,x i ) is trasformed ito a DMS by applyig the iterleavig method explaied i [1] The rest of the problem ca be viewed as distributed source codig with sources (W i,x i ) ad side-iformatio (W 1,W 2 ) available at the decoder A more rigorous proof is preseted ext Codebook Geeratio: Three codebooks are used for the quatizatio C is the uderlyig codebook for Q The other two codebooks Ci m, are costructed by choosig each of their elemets from U i based o distributio P Ui Ci m have rates I(X i,w i ; U i )+λ m where λ m 0 Let Q i,m be the quatizers associated with these codebooks Each of the codebooks Ci m are radomly bied at rate I(X i ; U i W 1,W 2 ) r i, where r 1 + r 2 = I(U 1 ; U 2 W 1,W 2 )Givet [0, 1], radomly ad uiformly bi the space of all vectors W tm W tm with rate E,ɛ, ad defie B 1 as the biig fuctio Also bi the space of all vectors W (1 t)m usig the same rate, let B 2 be the biig fuctio Fially choose m permutatios π j,j [1 : m] radomly ad uiformly from the set of all -legth permutatios S Ecodig: Commuicatio is carried out over blocks of legth m Deote the source sequece i oe block as the matrix X i (1:m, 1:) The ith ecoder calculates W i (j, 1:) = Q (S i (j, 1:)) for all j The ecoder wishes to utilize the codebooks Ci m for quatizig (X i,w i ), however the source (X i,w i ) is ot a DMS sice W i is produced by a fiite-legth quatizer To overcome this difficulty we use the method explaied i [1] Let Xi (j, 1:) =π j (X(j, 1:)), defie W i i the same maer As show i [1], ( X i, W i )(1:m, l) would behave like a DMS with probability distributio P Xi,W i Each ecoder calculates Ũi(1:m, l) =Q i,m (( X i, W i )(1:m, l)) For rows (1:tm), the first ecoder trasmits W 1 (j, 1:) while the secod ecoder seds the bi idex B 1 (W 2 (1 : tm, 1:)) For the rest of the rows ecoder 1 seds the bi idex B 2 (W 1 (tm +1:m, 1:)) while ecoder 2 seds W 2 (j, 1:) I other words the ecoders time-share betwee two strategies I the first strategy ecoder 1 trasmits W 1 while ecoder 2 oly seds the bi umber for the sequece of W 2,ithe secod strategy the ecoders reverse roles For every colum l, the i th ecoder also seds the bi idex of Ũi(1 : m, l) i
4 C m i The resultig rates are: Also: R 1 = tr +(1 t)e,ɛ + I(X 1 ; U 1 W 1 W 2 ) r 1 R 2 =(1 t)r + te,ɛ + I(X 2 ; U 2 W 1 W 2 ) r 2 If we prove that the above rates are achievable, the proof is complete, sice they iclude both corer poits of the regio i theorem 2 Decodig: The decoder first decodes W i (1 : m, 1:) For elemets (1 : tm, 1:), W1 tm are available, while oly the bi idex of W2 tm is available Sice m is goig to ifiity, by radom codig argumets W2 tm is losslessly recovered as log the biig rate is more tha 1 H(W 2 W1 ) By lemma 1 i the appedix we have 1 H(W 2 W1 ) E,ɛ By the same argumet (W 1,W 2 ) are recovered losslessly for the rest of the rows The bi size for each vector Ũ1(1:m, l) is: I(X 1,W 1 ; U 1 ) I(X 1 ; U 1 W 1,W 2 )+r 1 = I(X 1,W 1,W 2 ; U 1 ) I(X 1 ; U 1 W 1,W 2 )+r 1 = I(W 1,W 2 ; U 1 )+r 1 The log Markov chai is used i the secod equatio By the same calculatios the bi size for Ũ2 is I(W 1,W 2 ; U 2 )+r 2 Usig typicality argumets oe ca show that for these bi sizes, there is oly oe pair (U 1,U 2 )(1 : m, l), joitly typical with (W 1,W 2 )(1 : m, l) Due to space limitatios we oly preset a summary of the proof The decoder first creates two ambiguity sets L i from the sequeces of U i (1 : m, l) s i the correspodig bis Each of these sets cotais all sequeces U i (1 : m, l) i the bi, which are typical with (W 1,W 2 )(1:m, l) There is roughly oe such sequece i each 2 mi(w1,w2;ui) vectors So the size of L i is close to 2 mri The decoder fids a pair of vectors i the two ambiguity sets which are typical with each other Sice all these vectors are typical with W 1 ad W 2, as log as r 1 + r 2 I(U 1 ; U 2 W 1,W 2 ) there is o more tha oe pair (U 1,U 2 )(1 : m, l) typical with respect to P U1,U 2 W 1,W 2 This completes the proof From remark 3, calculatio of the RD regio i the theorem requires takig uio over all possible -legth quatizers This reders the characterizatio practically icomputable The ext proof shows that the RD regio i theorem 1 is cotaied i the oe i theorem 2, so it is achievable usig the fiitelegth codig scheme Proof: First we elimiate W 2 from the iequalities Restrictig the recostructio fuctios to oly use W 1,U 1,U 2 results i a achievable ier boud I the ext step, W 2 is removed from the mutual iformatio terms: I(X 1 ; U 1 U 2,W 1,W 2 ) = H(U 1 U 2,W 1,W 2 ) H(U 1 X 1,W 1,U 2 ) I(U 1 ; X 1 W 1,U 2 ) I(X 2 ; U 2 U 1,W 1,W 2 ) I(X 2 ; W 2,U 2 W 1,U 1 ) I(X 2 ; U 2 W 1,U 1 )+H(W 2 W 1 ) I(X 2 ; U 2 W 1,U 1 )+E,ɛ W 2 i the terms I(X 1 ; U 1 W 1,W 2 ) ad I(X 2 ; U 2 W 1,W 2 ) i the sum-rate boud ca be removed usig the same method For I(U 1 ; U 2 W 1,W 2 ) a upper-boud is ecessary: I(U 1 ; U 2 W 1,W 2 ) I(U 1 ; U 2 W 1 ) H(W 2 W 1 ) I(U 1 ; U 2 W 1 ) E,ɛ It is straightforward to show I(W 1 ; S 1 )=I(W 1 ; X 1 )Sofar we have the followig ier boud: Q R 1 I(X 1 ; U 1 W 1,U 2 )+E,ɛ R 2 I(X 2 ; U 2 W 1,U 1 )+2E,ɛ R 1 + R 2 I(W 1 ; X 1 )+3E,ɛ + I(X 1 ; U 1 W 1 ) + I(X 2 ; U 2 W 1 ) I(U 1 ; U 2 W 1 )+θ D i E{d i hi (U 1,U 2,W 1 ),X i } is still playig a role i the calculatio of the RD regio by determiig P X1,X 2,W 1,W 2, which i tur affects P U2 X 1,X 2,W 1 Lemma 2 i the appedix provides the meas to elimiate this depedecy o Q The lemma shows that for every probability distributio i theorem 1, there is a probability distributio i theorem 2, for which the above bouds are well-approximated whe calculated usig oe of the distributios istead of the other Hece we ca provide a ier boud for the above rates by cosiderig the distributios from the first theorem ad boudig the estimatio error usig lemma 2 Applyig the estimatio bouds gives the regio preseted i theorem 1 Fially, we show that the RD regio i theorem 1 strictly cotais the CC rate-distortio regio Theorem 3: For the BOHO problem i [1], the RD regio i theorem 2 achieves poits outside of the CC rate-distortio regio Proof: Take U 1 = φ, U 2 = Z + X + W + N δ0 ad W = X + N ɛ + N δ, where N δ is Be(δ),N δ0 is Be(δ 0 ), ad the quatizatio oises are idepedet of the sources ad each other The recostructio fuctio is U 2 + W = X + Z + N δ0 Cosider the corer poit where ecoder 1 is trasmittig W by itself ad ecoder 2 is biig its correlated quatizatio at rate E,ɛ The resultig RD vector approaches (R 1,R 2,D)= (1 h b (δ),h b (p δ) h b (δ 0 ),δ 0 ) as ɛ 0 ad I [5] it was show that these RD vectors are ot achievable by the CC scheme whe ɛ 0 By the same argumet as i [1], it ca be proved that there exist ad ɛ for which the resultig rates are ot achievable by the CC scheme There ca be highly correlated compoets betwee the sources give W 1 ad W 2 I this case, there must be several
5 fiite-legth codebooks super-imposed o each other, oe for each of the highly correlated compoets The ier boud preseted here ca be exteded to iclude these ew layers IV CONCLUSION A ew codig scheme for the distributed source codig problem was preseted The scheme used a combiatio of fiite legth ad large block-legth codes The applicatio of fiite legth quatizers was justified by showig that they preserve correlatio betwee sources more efficietly The achievable regio for the codig scheme was derived A sigleletter characterizatio of a ier boud to the achievable regio was preseted It was show the ier boud strictly cotais previous kow achievable RD regios APPENDIX Lemma 1: Let S 1 ad S 2 be two DMS s such that P (S 1 S 2 ) ɛ for some ɛ > 0 Also Let Wi = f i (Si ) be -letter fuctios of Si to alphabet W Let ɛ =1 (1 ɛ ) The the followig are true: 1) P (W1 W2 ) ɛ 2) 1 H(W 2 W1 ) h(ɛ) + ɛ log W 2 Proof: 1) P (W1 = W2 ) P (S1 = S2 )=1 ɛ The first iequality is true sice if S1 = S2, the W1 = W2 2) Let 1 A be the idicator fuctio of evet A Wehave: H(W2 W1 )=H(1 {W 1 =W2 },W2 W1 ) H(1 {W 1 =W2 } )+H(W2 W1, 1 {W 1 =W2 } ) h b (ɛ)+p(w1 W2 )H(W2 W1, 1 {W 1 =W2 } =0) h b (ɛ)+p(w1 W2 )H(W2 ) h b (ɛ)+ɛ log W 2 Lemma 2: Cosider a probability distributio P X1,X 2,W 1,U 1,U 2 satisfyig the Markov chais U 1 (X 1,W 1 ) (X 2,W 1 ) U 2 ad W 1 S 1 (X 1,X 2 ), where S 1 ad S 2 are as defied previously let P S1,W 1 be the margial distributio of (S 1,W 1 ), take a quatizer Q from Q PS,W Assume P X 1,X 2,W 1,W 2 is the probability distributio iduced by Q Let P U 1 X 1,W 1 = P U1 X 1,W 1 ad P U 2 X 2,W 2 = Defie: = P X 1,X 2,W 1,W 2 P U 1 X 1,W 1 P U 2 X 2,W 2 The followig hold: 1)P X 1,X 2,W 1,U 1,U 2 =P X1,X 2,W 1,U 1,U 2 ± ɛ 2)I P (X 1 ; U 1 W 1,U 2 ) =I P (X 1 ; U 1 W 1,U 2 ) ± 2 X 1 U 1 log ( ɛ ) 3)I P (X 2 ; U 2 W 2,U 1 ) =I P (X 2 ; U 2 W 2,U 1 ) p 2 ± 2 X 2 U 2 log ( p 2 ɛ ) I the above equatios, a =b ± ɛ meas a [b ɛ, b + ɛ] Also I P (A; B C) deotes the mutual iformatio with respect to P Proof: 1) P X 1,X 2,W 1,U 1,U 2 w 2 1 {W1=W 2} P U1 X 1,W 1 = P U1 X 1,W 1 w 2 a P U1 X 1,W 1 (P X1,X 2,W 1 ɛ) P X1,X 2,W 1,U 1,U 2 ɛ Where part (a) results from the followig: P X1,X 2,W 1 = P X 1,X 2,W 1 P X 1,X 2,W 1,W 2 w 2 + P (1 W1 W 2 ) Now we prove the other side of the iequality: P X 1,X 2,W 1,U 1,U 2 1 W1=W 2 + ɛ w 2 P X1,X 2,W 1 P U1 X 1,W 1 P U2 X 1,W 1 + ɛ = P X1,X 2,W 1,U 1,U 2 + ɛ 2) ad 3) follow from 1 i a straightforward maer by expadig the mutual iformatios, the maximum differece betwee the terms i the mutual iformatios is 2log for the sake of brevity we omit the proofs for these parts REFERENCES pi p, i ɛ [1] F Shirai, AG Sahebi, SS Pradha, Distributed source codig i absece of commo compoets, i IEEE Iteratioal Symp o Iformatio Theory IEEE, pp1362,1366, 7-12 July 2013 [2] D Slepia, J Wolf, Noiseless codig of correlated iformatio sources, IEEE Trasactios o Iformatio Theory, vol19, o4, pp , Jul 1973 [3] T Berger, R W Yeug, Multitermial source ecodig with oe distortio criterio,, IEEE Trasactios o Iformatio Theory, vol 35, o 2, pp , 1989 [4] S-Y Tug, Multitermial source codig, PhD Thesis, Corell Uiversity, Ithaca, NY, 1974 [5] AB Wager, BG Kelly, Y Altuğ, Distributed Rate-Distortio With Commo Compoets, IEEE Trasactios o Iformatio Theory, vol57, o7, pp , July 2011 [6] V Kostia, S Verdu, Fixed-Legth Lossy Compressio i the Fiite Blocklegth Regime, IEEE Trasactios o Iformatio Theory, vol58, o6, pp3309,3338, Jue 2012
THE interference channel problem describes a setup where multiple pairs of transmitters and receivers share a communication
Trade-off betwee Commuicatio ad Cooperatio i the Iterferece Chael Farhad Shirai EECS Departmet Uiversity of Michiga A Arbor,USA Email: fshirai@umich.edu S. Sadeep Pradha EECS Departmet Uiversity of Michiga
More informationMultiterminal source coding with complementary delivery
Iteratioal Symposium o Iformatio Theory ad its Applicatios, ISITA2006 Seoul, Korea, October 29 November 1, 2006 Multitermial source codig with complemetary delivery Akisato Kimura ad Tomohiko Uyematsu
More informationLecture 11: Channel Coding Theorem: Converse Part
EE376A/STATS376A Iformatio Theory Lecture - 02/3/208 Lecture : Chael Codig Theorem: Coverse Part Lecturer: Tsachy Weissma Scribe: Erdem Bıyık I this lecture, we will cotiue our discussio o chael codig
More informationA Partial Decode-Forward Scheme For A Network with N relays
A Partial Decode-Forward Scheme For A etwork with relays Yao Tag ECE Departmet, McGill Uiversity Motreal, QC, Caada Email: yaotag2@mailmcgillca Mai Vu ECE Departmet, Tufts Uiversity Medford, MA, USA Email:
More informationThe Maximum-Likelihood Decoding Performance of Error-Correcting Codes
The Maximum-Lielihood Decodig Performace of Error-Correctig Codes Hery D. Pfister ECE Departmet Texas A&M Uiversity August 27th, 2007 (rev. 0) November 2st, 203 (rev. ) Performace of Codes. Notatio X,
More informationUC Berkeley CS 170: Efficient Algorithms and Intractable Problems Handout 17 Lecturer: David Wagner April 3, Notes 17 for CS 170
UC Berkeley CS 170: Efficiet Algorithms ad Itractable Problems Hadout 17 Lecturer: David Wager April 3, 2003 Notes 17 for CS 170 1 The Lempel-Ziv algorithm There is a sese i which the Huffma codig was
More informationA Hybrid Random-Structured Coding Scheme for the Gaussian Two-Terminal Source Coding Problem Under a Covariance Matrix Distortion Constraint
A Hybrid Radom-Structured Codig Scheme for the Gaussia Two-Termial Source Codig Problem Uder a Covariace Matrix Distortio Costrait Yag Yag ad Zixiag Xiog Dept of Electrical ad Computer Egieerig Texas A&M
More informationThe Three-Terminal Interactive. Lossy Source Coding Problem
The Three-Termial Iteractive 1 Lossy Source Codig Problem Leoardo Rey Vega, Pablo Piataida ad Alfred O. Hero III arxiv:1502.01359v3 cs.it] 18 Ja 2016 Abstract The three-ode multitermial lossy source codig
More informationMultiterminal Source Coding with an Entropy-Based Distortion Measure
20 IEEE Iteratioal Symposium o Iformatio Theory Proceedigs Multitermial Source Codig with a Etropy-Based Distortio Measure Thomas A. Courtade ad Richard D. Wesel Departmet of Electrical Egieerig Uiversity
More informationInformation-based Feature Selection
Iformatio-based Feature Selectio Farza Faria, Abbas Kazeroui, Afshi Babveyh Email: {faria,abbask,afshib}@staford.edu 1 Itroductio Feature selectio is a topic of great iterest i applicatios dealig with
More informationEntropies & Information Theory
Etropies & Iformatio Theory LECTURE I Nilajaa Datta Uiversity of Cambridge,U.K. For more details: see lecture otes (Lecture 1- Lecture 5) o http://www.qi.damtp.cam.ac.uk/ode/223 Quatum Iformatio Theory
More informationOptimally Sparse SVMs
A. Proof of Lemma 3. We here prove a lower boud o the umber of support vectors to achieve geeralizatio bouds of the form which we cosider. Importatly, this result holds ot oly for liear classifiers, but
More informationMASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.436J/15.085J Fall 2008 Lecture 19 11/17/2008 LAWS OF LARGE NUMBERS II THE STRONG LAW OF LARGE NUMBERS
MASSACHUSTTS INSTITUT OF TCHNOLOGY 6.436J/5.085J Fall 2008 Lecture 9 /7/2008 LAWS OF LARG NUMBRS II Cotets. The strog law of large umbers 2. The Cheroff boud TH STRONG LAW OF LARG NUMBRS While the weak
More informationInfinite Sequences and Series
Chapter 6 Ifiite Sequeces ad Series 6.1 Ifiite Sequeces 6.1.1 Elemetary Cocepts Simply speakig, a sequece is a ordered list of umbers writte: {a 1, a 2, a 3,...a, a +1,...} where the elemets a i represet
More informationLecture 7: Channel coding theorem for discrete-time continuous memoryless channel
Lecture 7: Chael codig theorem for discrete-time cotiuous memoryless chael Lectured by Dr. Saif K. Mohammed Scribed by Mirsad Čirkić Iformatio Theory for Wireless Commuicatio ITWC Sprig 202 Let us first
More informationLecture 14: Graph Entropy
15-859: Iformatio Theory ad Applicatios i TCS Sprig 2013 Lecture 14: Graph Etropy March 19, 2013 Lecturer: Mahdi Cheraghchi Scribe: Euiwoog Lee 1 Recap Bergma s boud o the permaet Shearer s Lemma Number
More informationInequalities for Entropies of Sets of Subsets of Random Variables
Iequalities for Etropies of Sets of Subsets of Radom Variables Chao Tia AT&T Labs-Research Florham Par, NJ 0792, USA. tia@research.att.com Abstract Ha s iequality o the etropy rates of subsets of radom
More informationA New Achievability Scheme for the Relay Channel
A New Achievability Scheme for the Relay Chael Wei Kag Seur Ulukus Departmet of Electrical ad Computer Egieerig Uiversity of Marylad, College Park, MD 20742 wkag@umd.edu ulukus@umd.edu October 4, 2007
More informationVector Permutation Code Design Algorithm. Danilo SILVA and Weiler A. FINAMORE
Iteratioal Symposium o Iformatio Theory ad its Applicatios, ISITA2004 Parma, Italy, October 10 13, 2004 Vector Permutatio Code Desig Algorithm Dailo SILVA ad Weiler A. FINAMORE Cetro de Estudos em Telecomuicações
More informationOn Random Line Segments in the Unit Square
O Radom Lie Segmets i the Uit Square Thomas A. Courtade Departmet of Electrical Egieerig Uiversity of Califoria Los Ageles, Califoria 90095 Email: tacourta@ee.ucla.edu I. INTRODUCTION Let Q = [0, 1] [0,
More informationIncreasing timing capacity using packet coloring
003 Coferece o Iformatio Scieces ad Systems, The Johs Hopkis Uiversity, March 4, 003 Icreasig timig capacity usig packet colorig Xi Liu ad R Srikat[] Coordiated Sciece Laboratory Uiversity of Illiois e-mail:
More informationInformation Theory and Coding
Sol. Iformatio Theory ad Codig. The capacity of a bad-limited additive white Gaussia (AWGN) chael is give by C = Wlog 2 ( + σ 2 W ) bits per secod(bps), where W is the chael badwidth, is the average power
More informationLecture 27. Capacity of additive Gaussian noise channel and the sphere packing bound
Lecture 7 Ageda for the lecture Gaussia chael with average power costraits Capacity of additive Gaussia oise chael ad the sphere packig boud 7. Additive Gaussia oise chael Up to this poit, we have bee
More informationLecture 19: Convergence
Lecture 19: Covergece Asymptotic approach I statistical aalysis or iferece, a key to the success of fidig a good procedure is beig able to fid some momets ad/or distributios of various statistics. I may
More informationRandomized Algorithms I, Spring 2018, Department of Computer Science, University of Helsinki Homework 1: Solutions (Discussed January 25, 2018)
Radomized Algorithms I, Sprig 08, Departmet of Computer Sciece, Uiversity of Helsiki Homework : Solutios Discussed Jauary 5, 08). Exercise.: Cosider the followig balls-ad-bi game. We start with oe black
More informationModule 5 EMBEDDED WAVELET CODING. Version 2 ECE IIT, Kharagpur
Module 5 EMBEDDED WAVELET CODING Versio ECE IIT, Kharagpur Lesso 4 SPIHT algorithm Versio ECE IIT, Kharagpur Istructioal Objectives At the ed of this lesso, the studets should be able to:. State the limitatios
More informationOn Evaluating the Rate-Distortion Function of Sources with Feed-Forward and the Capacity of Channels with Feedback.
O Evaluatig the Rate-Distortio Fuctio of Sources with Feed-Forward ad the Capacity of Chaels with Feedback. Ramji Vekataramaa ad S. Sadeep Pradha Departmet of EECS, Uiversity of Michiga, A Arbor, MI 4805
More informationProblem Set 4 Due Oct, 12
EE226: Radom Processes i Systems Lecturer: Jea C. Walrad Problem Set 4 Due Oct, 12 Fall 06 GSI: Assae Gueye This problem set essetially reviews detectio theory ad hypothesis testig ad some basic otios
More informationThe Likelihood Encoder with Applications to Lossy Compression and Secrecy
The Likelihood Ecoder with Applicatios to Lossy Compressio ad Secrecy Eva C. Sog Paul Cuff H. Vicet Poor Dept. of Electrical Eg., Priceto Uiversity, NJ 8544 {csog, cuff, poor}@priceto.edu Abstract A likelihood
More informationAsymptotic Coupling and Its Applications in Information Theory
Asymptotic Couplig ad Its Applicatios i Iformatio Theory Vicet Y. F. Ta Joit Work with Lei Yu Departmet of Electrical ad Computer Egieerig, Departmet of Mathematics, Natioal Uiversity of Sigapore IMS-APRM
More informationSymmetric Two-User Gaussian Interference Channel with Common Messages
Symmetric Two-User Gaussia Iterferece Chael with Commo Messages Qua Geg CSL ad Dept. of ECE UIUC, IL 680 Email: geg5@illiois.edu Tie Liu Dept. of Electrical ad Computer Egieerig Texas A&M Uiversity, TX
More informationCS284A: Representations and Algorithms in Molecular Biology
CS284A: Represetatios ad Algorithms i Molecular Biology Scribe Notes o Lectures 3 & 4: Motif Discovery via Eumeratio & Motif Represetatio Usig Positio Weight Matrix Joshua Gervi Based o presetatios by
More informationProblem Set 2 Solutions
CS271 Radomess & Computatio, Sprig 2018 Problem Set 2 Solutios Poit totals are i the margi; the maximum total umber of poits was 52. 1. Probabilistic method for domiatig sets 6pts Pick a radom subset S
More informationEcon 325/327 Notes on Sample Mean, Sample Proportion, Central Limit Theorem, Chi-square Distribution, Student s t distribution 1.
Eco 325/327 Notes o Sample Mea, Sample Proportio, Cetral Limit Theorem, Chi-square Distributio, Studet s t distributio 1 Sample Mea By Hiro Kasahara We cosider a radom sample from a populatio. Defiitio
More informationSequences and Series of Functions
Chapter 6 Sequeces ad Series of Fuctios 6.1. Covergece of a Sequece of Fuctios Poitwise Covergece. Defiitio 6.1. Let, for each N, fuctio f : A R be defied. If, for each x A, the sequece (f (x)) coverges
More informationChapter 6 Infinite Series
Chapter 6 Ifiite Series I the previous chapter we cosidered itegrals which were improper i the sese that the iterval of itegratio was ubouded. I this chapter we are goig to discuss a topic which is somewhat
More informationConfidence interval for the two-parameter exponentiated Gumbel distribution based on record values
Iteratioal Joural of Applied Operatioal Research Vol. 4 No. 1 pp. 61-68 Witer 2014 Joural homepage: www.ijorlu.ir Cofidece iterval for the two-parameter expoetiated Gumbel distributio based o record values
More informationHashing and Amortization
Lecture Hashig ad Amortizatio Supplemetal readig i CLRS: Chapter ; Chapter 7 itro; Sectio 7.. Arrays ad Hashig Arrays are very useful. The items i a array are statically addressed, so that isertig, deletig,
More informationSensitivity Analysis of Daubechies 4 Wavelet Coefficients for Reduction of Reconstructed Image Error
Proceedigs of the 6th WSEAS Iteratioal Coferece o SIGNAL PROCESSING, Dallas, Texas, USA, March -4, 7 67 Sesitivity Aalysis of Daubechies 4 Wavelet Coefficiets for Reductio of Recostructed Image Error DEVINDER
More informationInformation Theory Tutorial Communication over Channels with memory. Chi Zhang Department of Electrical Engineering University of Notre Dame
Iformatio Theory Tutorial Commuicatio over Chaels with memory Chi Zhag Departmet of Electrical Egieerig Uiversity of Notre Dame Abstract A geeral capacity formula C = sup I(; Y ), which is correct for
More informationShannon s noiseless coding theorem
18.310 lecture otes May 4, 2015 Shao s oiseless codig theorem Lecturer: Michel Goemas I these otes we discuss Shao s oiseless codig theorem, which is oe of the foudig results of the field of iformatio
More informationConvergence of random variables. (telegram style notes) P.J.C. Spreij
Covergece of radom variables (telegram style otes).j.c. Spreij this versio: September 6, 2005 Itroductio As we kow, radom variables are by defiitio measurable fuctios o some uderlyig measurable space
More informationCooperative Communication Fundamentals & Coding Techniques
3 th ICACT Tutorial Cooperative commuicatio fudametals & codig techiques Cooperative Commuicatio Fudametals & Codig Techiques 0..4 Electroics ad Telecommuicatio Research Istitute Kiug Jug 3 th ICACT Tutorial
More informationCS322: Network Analysis. Problem Set 2 - Fall 2009
Due October 9 009 i class CS3: Network Aalysis Problem Set - Fall 009 If you have ay questios regardig the problems set, sed a email to the course assistats: simlac@staford.edu ad peleato@staford.edu.
More informationECEN 655: Advanced Channel Coding Spring Lecture 7 02/04/14. Belief propagation is exact on tree-structured factor graphs.
ECEN 655: Advaced Chael Codig Sprig 014 Prof. Hery Pfister Lecture 7 0/04/14 Scribe: Megke Lia 1 4-Cycles i Gallager s Esemble What we already kow: Belief propagatio is exact o tree-structured factor graphs.
More informationCEE 522 Autumn Uncertainty Concepts for Geotechnical Engineering
CEE 5 Autum 005 Ucertaity Cocepts for Geotechical Egieerig Basic Termiology Set A set is a collectio of (mutually exclusive) objects or evets. The sample space is the (collectively exhaustive) collectio
More informationDisjoint Systems. Abstract
Disjoit Systems Noga Alo ad Bey Sudaov Departmet of Mathematics Raymod ad Beverly Sacler Faculty of Exact Scieces Tel Aviv Uiversity, Tel Aviv, Israel Abstract A disjoit system of type (,,, ) is a collectio
More informationLecture 6: Source coding, Typicality, and Noisy channels and capacity
15-859: Iformatio Theory ad Applicatios i TCS CMU: Sprig 2013 Lecture 6: Source codig, Typicality, ad Noisy chaels ad capacity Jauary 31, 2013 Lecturer: Mahdi Cheraghchi Scribe: Togbo Huag 1 Recap Uiversal
More informationEmpirical Processes: Glivenko Cantelli Theorems
Empirical Processes: Gliveko Catelli Theorems Mouliath Baerjee Jue 6, 200 Gliveko Catelli classes of fuctios The reader is referred to Chapter.6 of Weller s Torgo otes, Chapter??? of VDVW ad Chapter 8.3
More informationBasics of Probability Theory (for Theory of Computation courses)
Basics of Probability Theory (for Theory of Computatio courses) Oded Goldreich Departmet of Computer Sciece Weizma Istitute of Sciece Rehovot, Israel. oded.goldreich@weizma.ac.il November 24, 2008 Preface.
More informationApplication to Random Graphs
A Applicatio to Radom Graphs Brachig processes have a umber of iterestig ad importat applicatios. We shall cosider oe of the most famous of them, the Erdős-Réyi radom graph theory. 1 Defiitio A.1. Let
More informationGeometry of LS. LECTURE 3 GEOMETRY OF LS, PROPERTIES OF σ 2, PARTITIONED REGRESSION, GOODNESS OF FIT
OCTOBER 7, 2016 LECTURE 3 GEOMETRY OF LS, PROPERTIES OF σ 2, PARTITIONED REGRESSION, GOODNESS OF FIT Geometry of LS We ca thik of y ad the colums of X as members of the -dimesioal Euclidea space R Oe ca
More informationAre Slepian-Wolf Rates Necessary for Distributed Parameter Estimation?
Are Slepia-Wolf Rates Necessary for Distributed Parameter Estimatio? Mostafa El Gamal ad Lifeg Lai Departmet of Electrical ad Computer Egieerig Worcester Polytechic Istitute {melgamal, llai}@wpi.edu arxiv:1508.02765v2
More informationThe multiplicative structure of finite field and a construction of LRC
IERG6120 Codig for Distributed Storage Systems Lecture 8-06/10/2016 The multiplicative structure of fiite field ad a costructio of LRC Lecturer: Keeth Shum Scribe: Zhouyi Hu Notatios: We use the otatio
More information6.867 Machine learning, lecture 7 (Jaakkola) 1
6.867 Machie learig, lecture 7 (Jaakkola) 1 Lecture topics: Kerel form of liear regressio Kerels, examples, costructio, properties Liear regressio ad kerels Cosider a slightly simpler model where we omit
More informationRandom Variables, Sampling and Estimation
Chapter 1 Radom Variables, Samplig ad Estimatio 1.1 Itroductio This chapter will cover the most importat basic statistical theory you eed i order to uderstad the ecoometric material that will be comig
More informationEECS564 Estimation, Filtering, and Detection Hwk 2 Solns. Winter p θ (z) = (2θz + 1 θ), 0 z 1
EECS564 Estimatio, Filterig, ad Detectio Hwk 2 Sols. Witer 25 4. Let Z be a sigle observatio havig desity fuctio where. p (z) = (2z + ), z (a) Assumig that is a oradom parameter, fid ad plot the maximum
More informationLecture 15: Strong, Conditional, & Joint Typicality
EE376A/STATS376A Iformatio Theory Lecture 15-02/27/2018 Lecture 15: Strog, Coditioal, & Joit Typicality Lecturer: Tsachy Weissma Scribe: Nimit Sohoi, William McCloskey, Halwest Mohammad I this lecture,
More informationAn Introduction to Randomized Algorithms
A Itroductio to Radomized Algorithms The focus of this lecture is to study a radomized algorithm for quick sort, aalyze it usig probabilistic recurrece relatios, ad also provide more geeral tools for aalysis
More informationUniversal source coding for complementary delivery
SITA2006 i Hakodate 2005.2. p. Uiversal source codig for complemetary delivery Akisato Kimura, 2, Tomohiko Uyematsu 2, Shigeaki Kuzuoka 2 Media Iformatio Laboratory, NTT Commuicatio Sciece Laboratories,
More informationECE 564/645 - Digital Communication Systems (Spring 2014) Final Exam Friday, May 2nd, 8:00-10:00am, Marston 220
ECE 564/645 - Digital Commuicatio Systems (Sprig 014) Fial Exam Friday, May d, 8:00-10:00am, Marsto 0 Overview The exam cosists of four (or five) problems for 100 (or 10) poits. The poits for each part
More informationA Coding Theorem for f-separable Distortion Measures
A Codig Theorem for f-separable Distortio Measures Yaia Shkel Priceto Uiversity NJ 08544, USA Email: yshkel@priceto.edu Sergio Verdú Priceto Uiversity NJ 08544, USA Email: verdu@priceto.edu Abstract Rate-distortio
More informationAda Boost, Risk Bounds, Concentration Inequalities. 1 AdaBoost and Estimates of Conditional Probabilities
CS8B/Stat4B Sprig 008) Statistical Learig Theory Lecture: Ada Boost, Risk Bouds, Cocetratio Iequalities Lecturer: Peter Bartlett Scribe: Subhrasu Maji AdaBoost ad Estimates of Coditioal Probabilities We
More information6.895 Essential Coding Theory October 20, Lecture 11. This lecture is focused in comparisons of the following properties/parameters of a code:
6.895 Essetial Codig Theory October 0, 004 Lecture 11 Lecturer: Madhu Suda Scribe: Aastasios Sidiropoulos 1 Overview This lecture is focused i comparisos of the followig properties/parameters of a code:
More informationLecture 7: October 18, 2017
Iformatio ad Codig Theory Autum 207 Lecturer: Madhur Tulsiai Lecture 7: October 8, 207 Biary hypothesis testig I this lecture, we apply the tools developed i the past few lectures to uderstad the problem
More informationLossy Compression with Near-uniform Encoder Outputs
016 IEEE Iteratioal Symposium o Iformatio Theory Lossy Compressio with Near-uiform Ecoder Outputs Badri N. Vellambi, Jörg Kliewer New Jersey Istitute of Techology, Newar, NJ 0710 Email: badri..vellambi@ieee.org,
More informationEntropy and Ergodic Theory Lecture 5: Joint typicality and conditional AEP
Etropy ad Ergodic Theory Lecture 5: Joit typicality ad coditioal AEP 1 Notatio: from RVs back to distributios Let (Ω, F, P) be a probability space, ad let X ad Y be A- ad B-valued discrete RVs, respectively.
More informationRank Modulation with Multiplicity
Rak Modulatio with Multiplicity Axiao (Adrew) Jiag Computer Sciece ad Eg. Dept. Texas A&M Uiversity College Statio, TX 778 ajiag@cse.tamu.edu Abstract Rak modulatio is a scheme that uses the relative order
More informationSequences A sequence of numbers is a function whose domain is the positive integers. We can see that the sequence
Sequeces A sequece of umbers is a fuctio whose domai is the positive itegers. We ca see that the sequece 1, 1, 2, 2, 3, 3,... is a fuctio from the positive itegers whe we write the first sequece elemet
More informationChapter 3. Strong convergence. 3.1 Definition of almost sure convergence
Chapter 3 Strog covergece As poited out i the Chapter 2, there are multiple ways to defie the otio of covergece of a sequece of radom variables. That chapter defied covergece i probability, covergece i
More informationLossy Compression via Sparse Linear Regression: Computationally Efficient Encoding and Decoding
ossy Compressio via Sparse iear Regressio: Computatioally Efficiet Ecodig ad Decodig Ramji Vekataramaa Dept of Egieerig, Uiv of Cambridge ramjiv@egcamacuk Tuhi Sarkar Dept of EE, IIT Bombay tuhi91@gmailcom
More informationJournal of Multivariate Analysis. Superefficient estimation of the marginals by exploiting knowledge on the copula
Joural of Multivariate Aalysis 102 (2011) 1315 1319 Cotets lists available at ScieceDirect Joural of Multivariate Aalysis joural homepage: www.elsevier.com/locate/jmva Superefficiet estimatio of the margials
More informationSUCCESSIVE INTERFERENCE CANCELLATION DECODING FOR THE K -USER CYCLIC INTERFERENCE CHANNEL
Joural of Theoretical ad Applied Iformatio Techology 31 st December 212 Vol 46 No2 25-212 JATIT & LLS All rights reserved ISSN: 1992-8645 wwwatitorg E-ISSN: 1817-3195 SCCESSIVE INTERFERENCE CANCELLATION
More informationLecture 2. The Lovász Local Lemma
Staford Uiversity Sprig 208 Math 233A: No-costructive methods i combiatorics Istructor: Ja Vodrák Lecture date: Jauary 0, 208 Origial scribe: Apoorva Khare Lecture 2. The Lovász Local Lemma 2. Itroductio
More informationSince X n /n P p, we know that X n (n. Xn (n X n ) Using the asymptotic result above to obtain an approximation for fixed n, we obtain
Assigmet 9 Exercise 5.5 Let X biomial, p, where p 0, 1 is ukow. Obtai cofidece itervals for p i two differet ways: a Sice X / p d N0, p1 p], the variace of the limitig distributio depeds oly o p. Use the
More informationCS / MCS 401 Homework 3 grader solutions
CS / MCS 401 Homework 3 grader solutios assigmet due July 6, 016 writte by Jāis Lazovskis maximum poits: 33 Some questios from CLRS. Questios marked with a asterisk were ot graded. 1 Use the defiitio of
More informationReport on Private Information Retrieval over Unsynchronized Databases
Report o Private Iformatio Retrieval over Usychroized Databases Lembit Valgma Supervised by Vitaly Skachek May 25, 217 1 Problem Statemet There are may challeges cocerig olie privacy. Private iformatio
More informationInformation Theory and Statistics Lecture 4: Lempel-Ziv code
Iformatio Theory ad Statistics Lecture 4: Lempel-Ziv code Łukasz Dębowski ldebowsk@ipipa.waw.pl Ph. D. Programme 203/204 Etropy rate is the limitig compressio rate Theorem For a statioary process (X i)
More informationSingular Continuous Measures by Michael Pejic 5/14/10
Sigular Cotiuous Measures by Michael Peic 5/4/0 Prelimiaries Give a set X, a σ-algebra o X is a collectio of subsets of X that cotais X ad ad is closed uder complemetatio ad coutable uios hece, coutable
More informationAlgebra of Least Squares
October 19, 2018 Algebra of Least Squares Geometry of Least Squares Recall that out data is like a table [Y X] where Y collects observatios o the depedet variable Y ad X collects observatios o the k-dimesioal
More informationAxioms of Measure Theory
MATH 532 Axioms of Measure Theory Dr. Neal, WKU I. The Space Throughout the course, we shall let X deote a geeric o-empty set. I geeral, we shall ot assume that ay algebraic structure exists o X so that
More informationLecture 4: April 10, 2013
TTIC/CMSC 1150 Mathematical Toolkit Sprig 01 Madhur Tulsiai Lecture 4: April 10, 01 Scribe: Haris Agelidakis 1 Chebyshev s Iequality recap I the previous lecture, we used Chebyshev s iequality to get a
More information1 Review of Probability & Statistics
1 Review of Probability & Statistics a. I a group of 000 people, it has bee reported that there are: 61 smokers 670 over 5 960 people who imbibe (drik alcohol) 86 smokers who imbibe 90 imbibers over 5
More informationFrequentist Inference
Frequetist Iferece The topics of the ext three sectios are useful applicatios of the Cetral Limit Theorem. Without kowig aythig about the uderlyig distributio of a sequece of radom variables {X i }, for
More informationFeedback in Iterative Algorithms
Feedback i Iterative Algorithms Charles Byre (Charles Byre@uml.edu), Departmet of Mathematical Scieces, Uiversity of Massachusetts Lowell, Lowell, MA 01854 October 17, 2005 Abstract Whe the oegative system
More informationRun-length & Entropy Coding. Redundancy Removal. Sampling. Quantization. Perform inverse operations at the receiver EEE
Geeral e Image Coder Structure Motio Video (s 1,s 2,t) or (s 1,s 2 ) Natural Image Samplig A form of data compressio; usually lossless, but ca be lossy Redudacy Removal Lossless compressio: predictive
More informationLinear Regression Demystified
Liear Regressio Demystified Liear regressio is a importat subject i statistics. I elemetary statistics courses, formulae related to liear regressio are ofte stated without derivatio. This ote iteds to
More informationDistortion Bounds for Source Broadcast. Problem
Distortio Bouds for Source Broadcast 1 Problem Lei Yu, Houqiag Li, Seior Member, IEEE, ad Weipig Li, Fellow, IEEE Abstract This paper ivestigates the joit source-chael codig problem of sedig a memoryless
More informationAdvanced Analysis. Min Yan Department of Mathematics Hong Kong University of Science and Technology
Advaced Aalysis Mi Ya Departmet of Mathematics Hog Kog Uiversity of Sciece ad Techology September 3, 009 Cotets Limit ad Cotiuity 7 Limit of Sequece 8 Defiitio 8 Property 3 3 Ifiity ad Ifiitesimal 8 4
More informationBeurling Integers: Part 2
Beurlig Itegers: Part 2 Isomorphisms Devi Platt July 11, 2015 1 Prime Factorizatio Sequeces I the last article we itroduced the Beurlig geeralized itegers, which ca be represeted as a sequece of real umbers
More informationACO Comprehensive Exam 9 October 2007 Student code A. 1. Graph Theory
1. Graph Theory Prove that there exist o simple plaar triagulatio T ad two distict adjacet vertices x, y V (T ) such that x ad y are the oly vertices of T of odd degree. Do ot use the Four-Color Theorem.
More informationNon-Asymptotic Achievable Rates for Gaussian Energy-Harvesting Channels: Best-Effort and Save-and-Transmit
No-Asymptotic Achievable Rates for Gaussia Eergy-Harvestig Chaels: Best-Effort ad Save-ad-Trasmit Silas L. Fog, Jig Yag, ad Ayli Yeer arxiv:805.089v [cs.it] 30 May 08 Abstract A additive white Gaussia
More informationCHAPTER 10 INFINITE SEQUENCES AND SERIES
CHAPTER 10 INFINITE SEQUENCES AND SERIES 10.1 Sequeces 10.2 Ifiite Series 10.3 The Itegral Tests 10.4 Compariso Tests 10.5 The Ratio ad Root Tests 10.6 Alteratig Series: Absolute ad Coditioal Covergece
More informationEnd-of-Year Contest. ERHS Math Club. May 5, 2009
Ed-of-Year Cotest ERHS Math Club May 5, 009 Problem 1: There are 9 cois. Oe is fake ad weighs a little less tha the others. Fid the fake coi by weighigs. Solutio: Separate the 9 cois ito 3 groups (A, B,
More informationON POINTWISE BINOMIAL APPROXIMATION
Iteratioal Joural of Pure ad Applied Mathematics Volume 71 No. 1 2011, 57-66 ON POINTWISE BINOMIAL APPROXIMATION BY w-functions K. Teerapabolar 1, P. Wogkasem 2 Departmet of Mathematics Faculty of Sciece
More informationSection 1.1. Calculus: Areas And Tangents. Difference Equations to Differential Equations
Differece Equatios to Differetial Equatios Sectio. Calculus: Areas Ad Tagets The study of calculus begis with questios about chage. What happes to the velocity of a swigig pedulum as its positio chages?
More informationStochastic Simulation
Stochastic Simulatio 1 Itroductio Readig Assigmet: Read Chapter 1 of text. We shall itroduce may of the key issues to be discussed i this course via a couple of model problems. Model Problem 1 (Jackso
More informationA statistical method to determine sample size to estimate characteristic value of soil parameters
A statistical method to determie sample size to estimate characteristic value of soil parameters Y. Hojo, B. Setiawa 2 ad M. Suzuki 3 Abstract Sample size is a importat factor to be cosidered i determiig
More informationVector Quantization: a Limiting Case of EM
. Itroductio & defiitios Assume that you are give a data set X = { x j }, j { 2,,, }, of d -dimesioal vectors. The vector quatizatio (VQ) problem requires that we fid a set of prototype vectors Z = { z
More informationCALCULATING FIBONACCI VECTORS
THE GENERALIZED BINET FORMULA FOR CALCULATING FIBONACCI VECTORS Stuart D Aderso Departmet of Physics, Ithaca College 953 Daby Road, Ithaca NY 14850, USA email: saderso@ithacaedu ad Dai Novak Departmet
More information