Depth versus Breadth in Convolutional Polar Codes

Size: px
Start display at page:

Download "Depth versus Breadth in Convolutional Polar Codes"

Transcription

1 Depth versus Breadth in Convolutional Polar Codes Maxime Tremlay, Benjamin Bourassa and David Poulin,2 Département de physique & Institut quantique, Université de Sherrooke, Sherrooke, Quéec, Canada JK 2R 2 Canadian Institute for Advanced Research, Toronto, Ontario, Canada M5G Z8 maxime.tremlay9@usherrooke.ca arxiv: v [cs.it] 23 May 208 Astract Polar codes were introduced in 2009 y Arikan as the first efficient encoding and decoding scheme that is capacity achieving for symmetric inary-input memoryless channels. Recently, this code family was extended y replacing the lockstructured polarization step of polar codes y a convolutional structure. This article presents a numerical exploration of this so-called convolutional polar codes family to find efficient generalizations of polar codes, oth in terms of decoding speed and decoding error proaility. The main conclusion drawn from our study is that increasing the convolution depth is more efficient than increasing the polarization kernel s readth as previously explored. I. INTRODUCTION Polar codes uild on channels polarization to efficiently achieve the capacity of symmetric channels (refer to [], [2], [3], [4] for detailed presentations). Channel polarization is a method that takes two independent inary-input discrete memoryless channels W (y x) to a ad channel and a good channel, given y W (y u 2 ) = W (y 2 u 2 )W (y u u 2 ), () u 2 {0,} W (y 2, u u 2 ) = W (y 2 u 2 )W (y u u 2 ) (2) respectively, where x a = (x a, x a+... x ). These channels are otained y comining two copies of W (y x) with a CNOT gate (u, u 2 ) (u u 2, u 2 ) and then decoding successively its u and u 2. That is, output it u is decoded first assuming that u 2 is erased. Then it u 2 is decoded taking into account the previously decoded value of u. Polar codes are otained y recursing this process to otain 2 l different channels from the polarization of 2 l pair of channels (Fig. a). As the numer of polarization steps l goes to infinity, the fraction of channels for which the error proaility approaches 0 tends to I(W ) and the fraction of channels for which the error proaility approaches tends to I(W ), where I(W ) is the mutual information of the channel with uniform distriution of the inputs []. Thus, polar codes are capacity achieving for those channels. The aove construction can e generalized y replacing the CNOT transformation y a different polarization kernel [5]. See Sec. III-A for details. The kernel can generally take as input more than two copies of the channel W (y x) and the readth of a kernel is define as the numer of channels it comines. An increasing readth offers the possiility of a more efficient polarization (i.e. a lower decoding error proaility), ut has the drawack of an increased decoding (c) Fig.. Examples of regular (depth=) and convolutional (depth> ) polar code circuits. The parameters (readth, depth, polarization steps) are (2,,4), (3,,3), (c) (2,2,4) and (d) (3,3,3). Another possile generalization of polar codes is to replace the lock-structure polarization procedure y a convolutional structure. See Sec. III-B for details. Note indeed that each polarization step of a polar code consists of independent application of the polarization kernel on distinct locks of its (pairs of its in the aove example with = 2). Recently ([6], [7]), this idea was extended to a convolutional structure (see Fig. c and Fig. d), where each polarization step does not factor into a product of independent transformations on disjoint locks ut instead consists of d layers of shifted lock transformations. We refer to the numer of layers d as the depth of a code. An increasing depth offers the advantage of faster polarization and the drawack of an increased decoding The focus of the present work is to compare the trade-off etween readth and depth in terms of the speed at which the decoding error rate goes to zero and the decoding We focus on codes which have practically relevant sizes using Monte Carlo numerical simulations. II. DECODING In this section, the general successive cancellation decoding scheme is define in terms of tensor networks. This enales a straightforward extension to convolutional polar codes. A. Successive cancellation Define G as the reversile encoding circuit acting on N input its and N output its. K of these input its take (d)

2 Fig. 2. Schematic representation of the successive cancellation decoder. A composite channel is otain from an encoding circuit G and N copies of a channel W. Contracting this tensor network for given y N and un yields Eq. 3. An effective channel is otain from the composite channel y summing over all the values of its u N i+, graphically represented y the uniform tensor e = ( ), when decoding it ui. Contracting this tensor yields Eq. 4 up to a normalization factor. aritrary values u i while the N K others are frozen to the value u i = 0. From this input u N, the message x N = Gu N is transmitted. The channel produces the received message y N, resulting in a composite channel W G (y N u N ) = N W (y i (Gu N ) i ). (3) i= This composite channel induces a correlated distriution on the its u i and is represented graphically on Fig. 2a. Successive cancellation decoding converts this composite channel into N different channels given y W (i) G (yn, u i u i ) = W G (y N u N ), (4) u i+,u N for i =, 2,... N. Those channels are otain y decoding successively symols u through u N (i.e., from right to left on Fig. 2) y summing over all the its that are not yet decoded and fixing the value of all the its u i. Either to their frozen value, if the corresponding original input it was frozen, or to their previously decoded value. This effective channel is represented graphically on Fig. 2. Given W (i) G, u i is decoded y maximizing the likelihood of the acquired information: u i = argmax W (i) G (yn, u i ũ i ). (5) ũ i {0,} Applying this procedure for all its from right to left yield the so-called successive cancellation decoder. Equation 5 can e generalized straightforwardly y decoding not a single it u i at the time ut instead a w-it sequence jointly, collectively viewed as a single symol from a larger alphaet of size 2 w. To this effect, the decoding width w is defined as the numer of its that are decoded simultaneously. u i+w i B. Decoding with tensor networks Convolutional polar codes were largely inspired y tensor network methods used in quantum many-ody physics (see e.g. [8] and [9] for an introduction). Akin of the graphical tools used in information theory (Tanner graph, factor graph, etc.), tensor networks were introduced as compact graphical representation of proaility distriutions (or amplitudes in quantum mechanics) involving a large numer of correlated variales. Moreover, certain computational procedures are more easily cast using these graphical representations. It is the case of the successive cancellation decoding prolem descried aove, where the goal is to compute W (i) G (yn, u i u i ) given fixed values of y N, u i. While G is a F N 2 linear transformation, it is sometime convenient to view it as a linear transformation on the space of proaility over N-it sequences, i.e., the linear space R 2N whose asis vectors are laeled y all possile N-it strings. On this space, G acts as a permutation matrix mapping asis vector u N to asis vector x N = Gu N. A single it is represented in the state 0 y u = ( ( 0), in the state y u = 0 ) and a it string u N is represented y the 2 N dimensional vector u N = u u 2... u N. A single it channel is a 2 2 stochastic matrix and a CNOT gate is given y CNOT = , (6) ecause it permutes the inputs 0 and while leaving the other inputs 00 and 0 unchanged. In this representation W (i) G (yn, u i u i ) = Z [u... u i u i e (N i) ] T GW N y N, (7) where e = ( ) and Z = u W (i) i {0,} G (yn, u i u i ) is a normalization factor. Ignoring normalization, this quantity can e represented graphically as a tensor network (see Fig. 2), where each element of the network is a rank-r tensor, i.e., an element of R 2r. Specifically, a it u i is a rank-one tensor, a channel W is a rank-two tensor, and a two-it gate is a rankfour tensor (two input its and two output its). The CNOT gate is otained y reshaping Eq. 6 into a ( ) tensor. In this graphical representation, a rank-r tensor A µ,µ 2,µ r is represented y a degree-r vertex, with one edge associated to each index µ k. An edge connecting two vertices means that the shared index is summed over µ 2 µ A B 2 = X A µ µ 2 B 2 µ µ 2 = C µ µ 2 2 = C 2, (8) generalizing the notion of vector and matrix product to higher rank tensors. Tensors can e assemled into a network where edges represent input-output relations just like in an ordinary logical circuit representation. Evaluating Eq. 7 then amounts to summing over edge values. This computational task, named tensor contraction, generally scales exponentially with the tree-width of the tensor

3 = Fig. 3. Circuit identities. Any permutation acting on the uniform distriution return the uniform distriution. Any contraction of a permutation and asis vector x t gives another asis vector yt. network [0]. The graphical calculus ecomes valuale when using circuit identities that simplify the tensor network. Specifically, these identities encode two simple facts illustrated on Fig. 3: a permutation G acting on the uniform distriution returns the uniform distriution Ge t = e t, and a permutation acting on a asis vector returns another asis vector Gx N = y N. Once these circuit identities are applied to the evaluation of Eq. 7 in the specific case of polar codes, it was shown in [6], [7] that the resulting tensor network is a tree, so it can e efficiently evaluated. Convolutional polar codes were introduced ased on the oservation that Eq. 7 produces a tensor network of constant tree-width despite not eing a tree (see Fig. 4), an oservation first made in the context of quantum many-ody physics [], so they can also e decoded efficiently. = III. POLAR CODE GENERALIZATIONS In this section, two possile generalizations of polar codes are descried and their decoding complexity is analyzed. A. Breadth Channel polarization can e achieved using various kernels. In fact, as long as a kernel is not a permutation matrix on F 2, it achieves a non-trivial polarization transform [5]. The CNOT gate is one such example that acts on two its. However, a general kernel of readth can act on its, (see Fig. for an illustration with = 3). An increasing readth can produce faster polarization, i.e. a decoding error proaility which decreases faster with the numer of polarization steps. Indeed, in the asymptotic regime, Arikan [] showed that provided the code rate is elow the symmetric channel capacity and that the location of the frozen its are chosen optimally, the asymptotic decoding error proaility of the polar ( code under successive cancellation decoding is P e O 2 N /2). ( ) A different error scaling exponent P e O 2 N β can e achieved from a roader kernel, ut readth 6 is required to asymptotically surpass β = 2 [5]. Such a road polarization kernel has the drawack of a sustantially increased decoding Arikan [] showed that the decoding complexity of polar codes is O(N log 2 N). From a tensor network perspective, this complexity can e understood [7] y counting the numer of elementary contractions required to evaluate Eq. 7 and y noting that the tensor network corresponding to Eq. 7 for u i and for u i+ differ only on a fraction / log 2 N of locations, so most intermediate calculations can e recycled and incur no additional As discussed previously, a readth- polarization kernel can also e represented as a 2 2 permutation matrix that act on R 2. Applying such a matrix to a -it proaility distriution has complexity 2, and this dominates the complexity of each elementary tensor operation of the successive cancellation decoding algorithm. On the other hand, the total numer of its after l polarization steps with a readth- polarization kernel is N = l, so the overall decoding complexity in this setting is O ( 2 N log N ). B. Depth The previous section descried a natural generalization of polar codes which use a roader polarization kernel. A further generalization, first explored in [6], [7], is to use a polarization step whose circuit is composed of -local gates and has depth d > (see Fig. c), which results in a convolutional transformation. A CP,d code, that is, a convolutional polar code with kernel readth and circuit depth d, is define similarly to a polar code with a kernel of size where each polarization step is replace y a stack of d polarization layers each shifted relative to the previous layer. Fig. c and Fig. d illustrates two realizations of convolutional polar codes. To analyze the decoding complexity, it is useful to introduce the concept of a causal cone. Given a circuit and a w-it input sequence u i+w i, the associated causal cone is defined as the set of gates together with the set of edges of this circuit whose it value depends on the value of u i+w i. Figure 4 illustrates the causal cone of the sequence u 3 for the code CP 2,2. Given a convolutional code s readth and depth d, define m(d,, w) to e the maximum numer of gates in the causal cone of any w-it input sequence of a single polarization step. Because a single convolutional step counts d layers, define m s (d,, w) as the numer of those gates in the causal cone which are in the s-th layer (counting from the top) of the convolution. For the first layer, have m (d,, w) = w +. This numer can at most increase y one for each layer, i.e., m s+ (d,, w) m s (d,, w) +, leading to a total numer of gates in the causal cone of a single polarization step m(d,, w) = d m s (d,, w) dm (d,, w) + s= w = d + d(d ) 2 d(d + ). (9) 2 Similarly, define the optimal decoding width w (, d) as the smallest value of w for which the causal cone of any w it sequence after one step of polarization contains at most w output its. Figure 4 illustrates that w = 3 for a CP 2,2 code since any 3 consecutive input its affect at most 6 consecutive its after one polarization step. Choosing a decoding width w (, d) thus leads to a recursive decoding procedure which is identical at all polarization steps. Since the ottom layer counts m d (d,, w) w + d gates, each acting on its,

4 Fig. 4. Graphical representation of the causal cone of u 3 in the CP 2,2 code. Only the gates in the shaded region receive inputs that depend on the sequence u 3. Similarly, the edges contained in the shaded region represent its at intermediate polarization steps whose value depends on sequence u 3. This shows that decoding a CP 2,2 code amouts to contracting a constant treewidth graph. The optimal width w = 3 and at most m(2, 2, w ) = 5 gates are involved per polarization step. we see that there are at most w +d w+d output its in the causal cone of a single polarization step. The optimal decoding width w is chosen such that this numer does not exceed w, thus w (, d) d. (0) Using this optimal value in Eq. 9 ounds the numer of rank- tensors that are contracted at each polarization layer, and each contraction has complexity 2. Here again, only a fraction / log N of these contractions differ at each step of successive cancellation decoding, leading to an overall decoding complexity C,d (N) = 2 m(, d, w ) w N log N O(2 dn log N). () Ref. [7] provides analytical arguments that the resulting convolutional polar codes have a larger asymptotic error exponent β > 2, and present numerical results showing clear performance improvement over standard polar codes at finite code lengths. These advantages come at the cost of a small constant increased decoding complexity IV. SIMULATION RESULTS Numerical simulations were performed to analyze the performance of codes readth and depth up to 4. The readth-2 kernel used was the CNOT, while the readth-3 and readth-4 kernels were G 3 = 0, G 4 = , where these are given as representations over F 2. It can easily e verified that these transformations are not permutations, so they can in principle e used to polarize [5]. Also, we choose a convolutional structure where each layer of gates is identical ut shifted y one it to the right (from top to ottom), c.f. Fig. d. Many others kernel and convolutional structures have een simulated, ut those gave the est empirical results. The encoding circuit G is used to define the code, ut the complete definition of a polar code must also specify the set of frozen its F, i.e. the set of its that are fixed to u i = 0 at the input of the encoding circuit G. In general, for a given encoding circuit G, the set F will depend on the channel and is chosen to minimize the error proaility under successive cancellation decoding. Here, a simplified channel selection procedure which uses an error detection criteria descried in the next section was used. All the simulations presented focus on the inary symmetric memoryless channel. A. Error detection Considering an error detection setting enales an important simplification in which the channel selection and code simulation can e performed simultaneously without sampling. In this setting, it is consider that a transmission error x N y N = x N + e is not detected if there exists a non-frozen it u i, i F c which is flipped while none of the frozen its to its right u j, j < i, j F have een flipped. In other words, an error is considered not detected if its first error location (starting from the right) occurs on a non-frozen it. Note that this does not correspond to the usual definition of an undetectale error which would e conventionally defined as an error which affects no frozen locations. By considering only frozen its to the right of a given location, the notion used is tailored to the context of a sequential decoder. Empirically, it was oserved that this simple notion is a good proxy to compare the performance of different coding schemes under more common settings. Denote P U (i) the proaility that the symol u i is the first such undetected error. Then, given a frozen it set F, the proaility of an undetected error is P U = i F P c U (i). This can e evaluated efficiently using the representation of the encoding matrix over R 2N as aove. For e F N 2, denote P(e) the proaility of a it-flip pattern e, viewed as a vector on R 2N. At the output of the symmetric channels with error proaility p, P T = ( p, p) N. Then ( ) i P U (i) = ( p, p) N G 0 ( 0 ) e (i ), (2) where here again e = ( ). In terms of tensor networks, this corresponds to the evaluation of the network of Fig. 2 with u i = and all u j = 0 for all j < i. Thus, this can e accomplished with complexity given y Eq.. Because the evaluation of Eq. 2 is independent of the set of frozen its, it can e evaluate for all positions i, selecting the frozen locations as the N K locations i with the largest value of P U (i). Then, the total undetected error proaility is the sum of the P U (i) over the remaining locations. This is equivalently the sum of the K smallest values of P U (i). The results are shown on Fig. 5a for various cominations of kernel readths and convolutional depth d. The code rate was 3, meaning that the plotted quantity is the sum of the N/3 smallest values of P U (i). Fig. 5 presents a suset of

5 Undetected error proaility = 2, d = = 2, d = 2 = 2, d = 3 = 2, d = 4 = 3, d = = 3, d = 2 = 3, d = 3 = 3, d = 4 = 4, d = = 4, d = 2 = 4, d = 3 = 4, d = Numer of its Undetected error proaality = 2, l = 0 = 3, l = 7 = 3, l = 6 = 4, l = Numer of operations Bit error rate = 2, l = = 3, l = 5 = 4, l = Numer of operations Fig. 5. Numerical simulation results. Undetected error proaility under successive cancellation decoding for polar codes (d = ) and convolutional polar codes (d > ) for various kernel readths, plotted as a function of code size N = l y varying the numer of polarization steps l. The channel is BSC(/4) and the encoding rate is /3. Same thing as ut plotted as a function of their decoding complexity, c.f. Eq.. The numer of polarization steps l is chosen in such a way that all codes are roughly of equal size N(, l) = l 0 3. The dots connected y a line all have the same kernel readth ut show a progression of depth d =, 2, 3, 4, with d = appears on the left and corresponds to regular polar codes. (c) The it error rate for a BSC(/20) with an /3 encoding rate plotted as a function of the decoding The depth is specify similarly to y the connected dots. The numer of polarization steps is chosen to have roughly N 250 its. (c) the same data with parameters and l resulting in codes of roughly equal size N = l 0 3. This implies that codes with larger readth use fewer polarization steps. The undetected error proaility P U is then plotted against the decoding complexity, compute from Eq.. Notice that increasing the depth is a very efficient way of suppressing errors with a modest complexity increase. In contrast, increasing the readth actually deteriorates the performance of these finite-size code and increases the decoding B. Error correction For the symmetric channel, the frozen its were chosen using the error detection procedure descrie in the previous section. This is not optimal, ut it is sufficient for the sake of comparing different code constructions. Then, standard Monte Carlo simulations were done y transmitting the all 0 codeword sampling errors, using successive cancellation decoding and comparing the decoded message. The results are presented in Fig. 5c. The conclusions drawn from the error detection simulations all carry over to this more practically relevant setting. V. CONCLUSION We numerically explored a generalization of the polar code family ased on a convoluted polarization kernel given y a finite-depth local circuit. On practically relevant code sizes, it was found that these convoluted kernel offer a very interesting error-suppression vs decoding complexity trade-off compare to previously proposed polar code generalizations using road kernels. Empirically, no incentive were found to consider increasing oth the readth and the depth: an increasing depth alone offers a greater noise suppression at comparale complexity increase. It will e interesting to see what further gains can e achieved, for instance, from list decoding of convolutional polar codes. ACKNOWLEDGMENT This work was supported y Canada s NSERC and Quéec s FRQNT. Computations were done using Compute Canada and Calcul Quéec clusters. REFERENCES [] E. Arikan, Channel Polarization: A Method for Constructing Capacity- Achieving Codes for Symmetric Binary-Input Memoryless Channels, IEEE Transactions on Information Theory, vol. 55, no. 7, pp , Jul [2] E. Arikan and E. Telatar, On the rate of channel polarization, in 2009 IEEE International Symposium on Information Theory, Jun. 2009, pp [3] E. Şaşoğlu, E. Telatar, and E. Arikan, Polarization for aritrary discrete memoryless channels, in 2009 IEEE Information Theory Workshop, Oct. 2009, pp [4] S. B. Korada and R. L. Uranke, Polar Codes are Optimal for Lossy Source Coding, IEEE Transactions on Information Theory, vol. 56, no. 4, pp , Apr [5] S. B. Korada, E. Sasoglu, and R. Uranke, Polar Codes: Characterization of Exponent, Bounds, and Constructions, IEEE Transactions on Information Theory, vol. 56, no. 2, pp , Dec [6] A. J. Ferris and D. Poulin, Branching MERA codes: A natural extension of classical and quantum polar codes, in 204 IEEE International Symposium on Information Theory, Jun. 204, pp [7] A. J. Ferris, C. Hirche, and D. Poulin, Convolutional Polar Codes, arxiv: [cs, math], Apr [8] R. Orus, A Practical Introduction to Tensor Networks: Matrix Product States and Projected Entangled Pair States, Annals of Physics, vol. 349, pp. 7 58, Oct [9] J. C. Bridgeman and C. T. Chu, Hand-waving and Interpretive Dance: An Introductory Course on Tensor Networks, Journal of Physics A: Mathematical and Theoretical, vol. 50, no. 22, p , Jun [0] I. Arad and Z. Landau, Quantum Computation and the Evaluation of Tensor Networks, SIAM Journal on Computing, vol. 39, no. 7, pp , Jan [] G. Evenly and G. Vidal, Class of Highly Entangled Many-Body States that can e Efficiently Simulated, Physical Review Letters, vol. 2, no. 24, Jun. 204.

Branching MERA codes: a natural extension of polar codes

Branching MERA codes: a natural extension of polar codes Branching MERA codes: a natural extension of polar codes Andrew James Ferris and David Poulin arxiv:32.4575v [quant-ph] 6 Dec 23 Abstract We introduce a new class of circuits for constructing efficiently

More information

Practical Polar Code Construction Using Generalised Generator Matrices

Practical Polar Code Construction Using Generalised Generator Matrices Practical Polar Code Construction Using Generalised Generator Matrices Berksan Serbetci and Ali E. Pusane Department of Electrical and Electronics Engineering Bogazici University Istanbul, Turkey E-mail:

More information

RCA Analysis of the Polar Codes and the use of Feedback to aid Polarization at Short Blocklengths

RCA Analysis of the Polar Codes and the use of Feedback to aid Polarization at Short Blocklengths RCA Analysis of the Polar Codes and the use of Feedback to aid Polarization at Short Blocklengths Kasra Vakilinia, Dariush Divsalar*, and Richard D. Wesel Department of Electrical Engineering, University

More information

On Bit Error Rate Performance of Polar Codes in Finite Regime

On Bit Error Rate Performance of Polar Codes in Finite Regime On Bit Error Rate Performance of Polar Codes in Finite Regime A. Eslami and H. Pishro-Nik Abstract Polar codes have been recently proposed as the first low complexity class of codes that can provably achieve

More information

Constructing Polar Codes Using Iterative Bit-Channel Upgrading. Arash Ghayoori. B.Sc., Isfahan University of Technology, 2011

Constructing Polar Codes Using Iterative Bit-Channel Upgrading. Arash Ghayoori. B.Sc., Isfahan University of Technology, 2011 Constructing Polar Codes Using Iterative Bit-Channel Upgrading by Arash Ghayoori B.Sc., Isfahan University of Technology, 011 A Thesis Submitted in Partial Fulfillment of the Requirements for the Degree

More information

Upper Bounds for Stern s Diatomic Sequence and Related Sequences

Upper Bounds for Stern s Diatomic Sequence and Related Sequences Upper Bounds for Stern s Diatomic Sequence and Related Sequences Colin Defant Department of Mathematics University of Florida, U.S.A. cdefant@ufl.edu Sumitted: Jun 18, 01; Accepted: Oct, 016; Pulished:

More information

Luis Manuel Santana Gallego 100 Investigation and simulation of the clock skew in modern integrated circuits. Clock Skew Model

Luis Manuel Santana Gallego 100 Investigation and simulation of the clock skew in modern integrated circuits. Clock Skew Model Luis Manuel Santana Gallego 100 Appendix 3 Clock Skew Model Xiaohong Jiang and Susumu Horiguchi [JIA-01] 1. Introduction The evolution of VLSI chips toward larger die sizes and faster clock speeds makes

More information

TIGHT BOUNDS FOR THE FIRST ORDER MARCUM Q-FUNCTION

TIGHT BOUNDS FOR THE FIRST ORDER MARCUM Q-FUNCTION TIGHT BOUNDS FOR THE FIRST ORDER MARCUM Q-FUNCTION Jiangping Wang and Dapeng Wu Department of Electrical and Computer Engineering University of Florida, Gainesville, FL 3611 Correspondence author: Prof.

More information

A vector version of Witsenhausen s counterexample: Towards convergence of control, communication and computation

A vector version of Witsenhausen s counterexample: Towards convergence of control, communication and computation A vector version of Witsenhausen s counterexample: Towards convergence of control, communication and computation Pulkit Grover and Anant Sahai Wireless Foundations, Department of EECS University of California

More information

On BCJR State Metric Quantization for Turbo Equalization

On BCJR State Metric Quantization for Turbo Equalization On BCJR State Metric Quantization for Turo Equalization Brian M. Kurkoski, Kazuhiko Yamaguchi and Kingo Koayashi Dept. of Information and Computer Engineering University of Electro-Communications Chofu,

More information

SUFFIX TREE. SYNONYMS Compact suffix trie

SUFFIX TREE. SYNONYMS Compact suffix trie SUFFIX TREE Maxime Crochemore King s College London and Université Paris-Est, http://www.dcs.kcl.ac.uk/staff/mac/ Thierry Lecroq Université de Rouen, http://monge.univ-mlv.fr/~lecroq SYNONYMS Compact suffix

More information

The Compound Capacity of Polar Codes

The Compound Capacity of Polar Codes The Compound Capacity of Polar Codes S. Hamed Hassani, Satish Babu Korada and Rüdiger Urbanke arxiv:97.329v [cs.it] 9 Jul 29 Abstract We consider the compound capacity of polar codes under successive cancellation

More information

Compound Polar Codes

Compound Polar Codes Compound Polar Codes Hessam Mahdavifar, Mostafa El-Khamy, Jungwon Lee, Inyup Kang Mobile Solutions Lab, Samsung Information Systems America 4921 Directors Place, San Diego, CA 92121 {h.mahdavifar, mostafa.e,

More information

Multi-Kernel Polar Codes: Proof of Polarization and Error Exponents

Multi-Kernel Polar Codes: Proof of Polarization and Error Exponents Multi-Kernel Polar Codes: Proof of Polarization and Error Exponents Meryem Benammar, Valerio Bioglio, Frédéric Gabry, Ingmar Land Mathematical and Algorithmic Sciences Lab Paris Research Center, Huawei

More information

Content Delivery in Erasure Broadcast. Channels with Cache and Feedback

Content Delivery in Erasure Broadcast. Channels with Cache and Feedback Content Delivery in Erasure Broadcast Channels with Cache and Feedack Asma Ghorel, Mari Koayashi, and Sheng Yang LSS, CentraleSupélec Gif-sur-Yvette, France arxiv:602.04630v [cs.t] 5 Fe 206 {asma.ghorel,

More information

Modifying Shor s algorithm to compute short discrete logarithms

Modifying Shor s algorithm to compute short discrete logarithms Modifying Shor s algorithm to compute short discrete logarithms Martin Ekerå Decemer 7, 06 Astract We revisit Shor s algorithm for computing discrete logarithms in F p on a quantum computer and modify

More information

where L(y) = P Y X (y 0) C PPM = log 2 (M) ( For n b 0 the expression reduces to D. Polar Coding (2)

where L(y) = P Y X (y 0) C PPM = log 2 (M) ( For n b 0 the expression reduces to D. Polar Coding (2) Polar-Coded Pulse Position odulation for the Poisson Channel Delcho Donev Institute for Communications Engineering Technical University of unich Email: delchodonev@tumde Georg Böcherer athematical and

More information

Example: Bipolar NRZ (non-return-to-zero) signaling

Example: Bipolar NRZ (non-return-to-zero) signaling Baseand Data Transmission Data are sent without using a carrier signal Example: Bipolar NRZ (non-return-to-zero signaling is represented y is represented y T A -A T : it duration is represented y BT. Passand

More information

Expansion formula using properties of dot product (analogous to FOIL in algebra): u v 2 u v u v u u 2u v v v u 2 2u v v 2

Expansion formula using properties of dot product (analogous to FOIL in algebra): u v 2 u v u v u u 2u v v v u 2 2u v v 2 Least squares: Mathematical theory Below we provide the "vector space" formulation, and solution, of the least squares prolem. While not strictly necessary until we ring in the machinery of matrix algera,

More information

Example: sending one bit of information across noisy channel. Effects of the noise: flip the bit with probability p.

Example: sending one bit of information across noisy channel. Effects of the noise: flip the bit with probability p. Lecture 20 Page 1 Lecture 20 Quantum error correction Classical error correction Modern computers: failure rate is below one error in 10 17 operations Data transmission and storage (file transfers, cell

More information

Power Control for Discrete-Input Block-Fading Channels. K. D. Nguyen, A. Guillén i Fàbregas and L. K. Rasmussen

Power Control for Discrete-Input Block-Fading Channels. K. D. Nguyen, A. Guillén i Fàbregas and L. K. Rasmussen Power Control for Discrete-Input Block-Fading Channels K. D. Nguyen, A. Guillén i Fàregas and L. K. Rasmussen CUED / F-INFENG / TR 582 August 2007 Power Control for Discrete-Input Block-Fading Channels

More information

Polar Code Construction for List Decoding

Polar Code Construction for List Decoding 1 Polar Code Construction for List Decoding Peihong Yuan, Tobias Prinz, Georg Böcherer arxiv:1707.09753v1 [cs.it] 31 Jul 2017 Abstract A heuristic construction of polar codes for successive cancellation

More information

Minimum-Distance Based Construction of Multi-Kernel Polar Codes

Minimum-Distance Based Construction of Multi-Kernel Polar Codes Minimum-Distance Based Construction of Multi-Kernel Polar Codes Valerio Bioglio, Frédéric Gabry, Ingmar Land, Jean-Claude Belfiore Mathematical and Algorithmic Sciences Lab France Research Center, Huawei

More information

SU(N) representations

SU(N) representations Appendix C SU(N) representations The group SU(N) has N 2 1 generators t a which form the asis of a Lie algera defined y the commutator relations in (A.2). The group has rank N 1 so there are N 1 Casimir

More information

Construction of Polar Codes with Sublinear Complexity

Construction of Polar Codes with Sublinear Complexity 1 Construction of Polar Codes with Sublinear Complexity Marco Mondelli, S. Hamed Hassani, and Rüdiger Urbanke arxiv:1612.05295v4 [cs.it] 13 Jul 2017 Abstract Consider the problem of constructing a polar

More information

Binary Dirty MAC with Common State Information

Binary Dirty MAC with Common State Information Binary Dirty MAC with Common State Information Anatoly Khina Email: anatolyk@eng.tau.ac.il Tal Philosof Email: talp@eng.tau.ac.il Ram Zamir Email: zamir@eng.tau.ac.il Uri Erez Email: uri@eng.tau.ac.il

More information

Instantaneous Measurement of Nonlocal Variables

Instantaneous Measurement of Nonlocal Variables Instantaneous Measurement of Nonlocal Variales Richard A. Low richard@wentnet.com August 006 Astract We ask the question: is it possile to measure nonlocal properties of a state instantaneously? Relativistic

More information

1Number ONLINE PAGE PROOFS. systems: real and complex. 1.1 Kick off with CAS

1Number ONLINE PAGE PROOFS. systems: real and complex. 1.1 Kick off with CAS 1Numer systems: real and complex 1.1 Kick off with CAS 1. Review of set notation 1.3 Properties of surds 1. The set of complex numers 1.5 Multiplication and division of complex numers 1.6 Representing

More information

Optimal Routing in Chord

Optimal Routing in Chord Optimal Routing in Chord Prasanna Ganesan Gurmeet Singh Manku Astract We propose optimal routing algorithms for Chord [1], a popular topology for routing in peer-to-peer networks. Chord is an undirected

More information

CS 4120 Lecture 3 Automating lexical analysis 29 August 2011 Lecturer: Andrew Myers. 1 DFAs

CS 4120 Lecture 3 Automating lexical analysis 29 August 2011 Lecturer: Andrew Myers. 1 DFAs CS 42 Lecture 3 Automating lexical analysis 29 August 2 Lecturer: Andrew Myers A lexer generator converts a lexical specification consisting of a list of regular expressions and corresponding actions into

More information

FinQuiz Notes

FinQuiz Notes Reading 9 A time series is any series of data that varies over time e.g. the quarterly sales for a company during the past five years or daily returns of a security. When assumptions of the regression

More information

1 Introduction to information theory

1 Introduction to information theory 1 Introduction to information theory 1.1 Introduction In this chapter we present some of the basic concepts of information theory. The situations we have in mind involve the exchange of information through

More information

The Capacity Region of 2-Receiver Multiple-Input Broadcast Packet Erasure Channels with Channel Output Feedback

The Capacity Region of 2-Receiver Multiple-Input Broadcast Packet Erasure Channels with Channel Output Feedback IEEE TRANSACTIONS ON INFORMATION THEORY, ONLINE PREPRINT 2014 1 The Capacity Region of 2-Receiver Multiple-Input Broadcast Packet Erasure Channels with Channel Output Feedack Chih-Chun Wang, Memer, IEEE,

More information

Motivation: Can the equations of physics be derived from information-theoretic principles?

Motivation: Can the equations of physics be derived from information-theoretic principles? 10. Physics from Fisher Information. Motivation: Can the equations of physics e derived from information-theoretic principles? I. Fisher Information. Task: To otain a measure of the accuracy of estimated

More information

Belief propagation decoding of quantum channels by passing quantum messages

Belief propagation decoding of quantum channels by passing quantum messages Belief propagation decoding of quantum channels by passing quantum messages arxiv:67.4833 QIP 27 Joseph M. Renes lempelziv@flickr To do research in quantum information theory, pick a favorite text on classical

More information

Finite Automata and Regular Languages (part II)

Finite Automata and Regular Languages (part II) Finite Automata and Regular Languages (part II) Prof. Dan A. Simovici UMB 1 / 25 Outline 1 Nondeterministic Automata 2 / 25 Definition A nondeterministic finite automaton (ndfa) is a quintuple M = (A,

More information

The variance for partial match retrievals in k-dimensional bucket digital trees

The variance for partial match retrievals in k-dimensional bucket digital trees The variance for partial match retrievals in k-dimensional ucket digital trees Michael FUCHS Department of Applied Mathematics National Chiao Tung University January 12, 21 Astract The variance of partial

More information

Performance Bounds for Bi-Directional Coded Cooperation Protocols

Performance Bounds for Bi-Directional Coded Cooperation Protocols 1 Performance Bounds for Bi-Directional Coded Cooperation Protocols Sang Joon Kim, Patrick Mitran, and Vahid Tarokh arxiv:cs/0703017v4 [cs.it] 5 Jun 2008 Astract In coded i-directional cooperation, two

More information

Shannon s noisy-channel theorem

Shannon s noisy-channel theorem Shannon s noisy-channel theorem Information theory Amon Elders Korteweg de Vries Institute for Mathematics University of Amsterdam. Tuesday, 26th of Januari Amon Elders (Korteweg de Vries Institute for

More information

Pseudo-automata for generalized regular expressions

Pseudo-automata for generalized regular expressions Pseudo-automata for generalized regular expressions B. F. Melnikov A. A. Melnikova Astract In this paper we introduce a new formalism which is intended for representing a special extensions of finite automata.

More information

Lecture 8: Channel and source-channel coding theorems; BEC & linear codes. 1 Intuitive justification for upper bound on channel capacity

Lecture 8: Channel and source-channel coding theorems; BEC & linear codes. 1 Intuitive justification for upper bound on channel capacity 5-859: Information Theory and Applications in TCS CMU: Spring 23 Lecture 8: Channel and source-channel coding theorems; BEC & linear codes February 7, 23 Lecturer: Venkatesan Guruswami Scribe: Dan Stahlke

More information

Low-Complexity Puncturing and Shortening of Polar Codes

Low-Complexity Puncturing and Shortening of Polar Codes Low-Complexity Puncturing and Shortening of Polar Codes Valerio Bioglio, Frédéric Gabry, Ingmar Land Mathematical and Algorithmic Sciences Lab France Research Center, Huawei Technologies Co. Ltd. Email:

More information

SC-Fano Decoding of Polar Codes

SC-Fano Decoding of Polar Codes SC-Fano Decoding of Polar Codes Min-Oh Jeong and Song-Nam Hong Ajou University, Suwon, Korea, email: {jmo0802, snhong}@ajou.ac.kr arxiv:1901.06791v1 [eess.sp] 21 Jan 2019 Abstract In this paper, we present

More information

Research Article BitErrorRatePerformanceofaMIMO-CDMA System Employing Parity-Bit-Selected Spreading in Frequency Nonselective Rayleigh Fading

Research Article BitErrorRatePerformanceofaMIMO-CDMA System Employing Parity-Bit-Selected Spreading in Frequency Nonselective Rayleigh Fading Antennas and Propagation Volume 0, Article ID 5699, pages doi:055/0/5699 Research Article BitErrorRatePerformanceofaMIMO-CDMA System Employing Parity-Bit-Selected Spreading in Frequency Nonselective Rayleigh

More information

CSCI 2570 Introduction to Nanocomputing

CSCI 2570 Introduction to Nanocomputing CSCI 2570 Introduction to Nanocomputing Information Theory John E Savage What is Information Theory Introduced by Claude Shannon. See Wikipedia Two foci: a) data compression and b) reliable communication

More information

Travel Grouping of Evaporating Polydisperse Droplets in Oscillating Flow- Theoretical Analysis

Travel Grouping of Evaporating Polydisperse Droplets in Oscillating Flow- Theoretical Analysis Travel Grouping of Evaporating Polydisperse Droplets in Oscillating Flow- Theoretical Analysis DAVID KATOSHEVSKI Department of Biotechnology and Environmental Engineering Ben-Gurion niversity of the Negev

More information

Lecture 12: Grover s Algorithm

Lecture 12: Grover s Algorithm CPSC 519/619: Quantum Computation John Watrous, University of Calgary Lecture 12: Grover s Algorithm March 7, 2006 We have completed our study of Shor s factoring algorithm. The asic technique ehind Shor

More information

Representation theory of SU(2), density operators, purification Michael Walter, University of Amsterdam

Representation theory of SU(2), density operators, purification Michael Walter, University of Amsterdam Symmetry and Quantum Information Feruary 6, 018 Representation theory of S(), density operators, purification Lecture 7 Michael Walter, niversity of Amsterdam Last week, we learned the asic concepts of

More information

Lecture 9 Polar Coding

Lecture 9 Polar Coding Lecture 9 Polar Coding I-Hsiang ang Department of Electrical Engineering National Taiwan University ihwang@ntu.edu.tw December 29, 2015 1 / 25 I-Hsiang ang IT Lecture 9 In Pursuit of Shannon s Limit Since

More information

arxiv: v1 [hep-ex] 20 Jan 2013

arxiv: v1 [hep-ex] 20 Jan 2013 Heavy-Flavor Results from CMS arxiv:.69v [hep-ex] Jan University of Colorado on ehalf of the CMS Collaoration E-mail: keith.ulmer@colorado.edu Heavy-flavor physics offers the opportunity to make indirect

More information

Long non-crossing configurations in the plane

Long non-crossing configurations in the plane Long non-crossing configurations in the plane Adrian Dumitrescu Csaa D. Tóth July 4, 00 Astract We revisit some maximization prolems for geometric networks design under the non-crossing constraint, first

More information

Joint Write-Once-Memory and Error-Control Codes

Joint Write-Once-Memory and Error-Control Codes 1 Joint Write-Once-Memory and Error-Control Codes Xudong Ma Pattern Technology Lab LLC, U.S.A. Email: xma@ieee.org arxiv:1411.4617v1 [cs.it] 17 ov 2014 Abstract Write-Once-Memory (WOM) is a model for many

More information

10 Lorentz Group and Special Relativity

10 Lorentz Group and Special Relativity Physics 129 Lecture 16 Caltech, 02/27/18 Reference: Jones, Groups, Representations, and Physics, Chapter 10. 10 Lorentz Group and Special Relativity Special relativity says, physics laws should look the

More information

Implementation of Galois Field Arithmetic. Nonbinary BCH Codes and Reed-Solomon Codes

Implementation of Galois Field Arithmetic. Nonbinary BCH Codes and Reed-Solomon Codes BCH Codes Wireless Information Transmission System La. Institute of Communications Engineering g National Sun Yat-sen University Outline Binary Primitive BCH Codes Decoding of the BCH Codes Implementation

More information

Maximum Likelihood Decoding of Codes on the Asymmetric Z-channel

Maximum Likelihood Decoding of Codes on the Asymmetric Z-channel Maximum Likelihood Decoding of Codes on the Asymmetric Z-channel Pål Ellingsen paale@ii.uib.no Susanna Spinsante s.spinsante@univpm.it Angela Barbero angbar@wmatem.eis.uva.es May 31, 2005 Øyvind Ytrehus

More information

Lecture 6 January 15, 2014

Lecture 6 January 15, 2014 Advanced Graph Algorithms Jan-Apr 2014 Lecture 6 January 15, 2014 Lecturer: Saket Sourah Scrie: Prafullkumar P Tale 1 Overview In the last lecture we defined simple tree decomposition and stated that for

More information

SIDDHARTH GROUP OF INSTITUTIONS :: PUTTUR Siddharth Nagar, Narayanavanam Road UNIT I

SIDDHARTH GROUP OF INSTITUTIONS :: PUTTUR Siddharth Nagar, Narayanavanam Road UNIT I SIDDHARTH GROUP OF INSTITUTIONS :: PUTTUR Siddharth Nagar, Narayanavanam Road 517583 QUESTION BANK (DESCRIPTIVE) Subject with Code : CODING THEORY & TECHNIQUES(16EC3810) Course & Branch: M.Tech - DECS

More information

Performance of Polar Codes for Channel and Source Coding

Performance of Polar Codes for Channel and Source Coding Performance of Polar Codes for Channel and Source Coding Nadine Hussami AUB, Lebanon, Email: njh03@aub.edu.lb Satish Babu Korada and üdiger Urbanke EPFL, Switzerland, Email: {satish.korada,ruediger.urbanke}@epfl.ch

More information

From Single-Bit to Multi-Bit Public-Key Encryption via Non-Malleable Codes

From Single-Bit to Multi-Bit Public-Key Encryption via Non-Malleable Codes An extended astract of this paper is pulished in the proceedings of the twelfth IACR Theory of Cryptography Conference TCC 2015. This is the full version. rom Single-Bit to Multi-Bit Pulic-Key Encryption

More information

Feedback Capacity of a Class of Symmetric Finite-State Markov Channels

Feedback Capacity of a Class of Symmetric Finite-State Markov Channels Feedback Capacity of a Class of Symmetric Finite-State Markov Channels Nevroz Şen, Fady Alajaji and Serdar Yüksel Department of Mathematics and Statistics Queen s University Kingston, ON K7L 3N6, Canada

More information

An Alternative Proof of Channel Polarization for Channels with Arbitrary Input Alphabets

An Alternative Proof of Channel Polarization for Channels with Arbitrary Input Alphabets An Alternative Proof of Channel Polarization for Channels with Arbitrary Input Alphabets Jing Guo University of Cambridge jg582@cam.ac.uk Jossy Sayir University of Cambridge j.sayir@ieee.org Minghai Qin

More information

Reversibility of Turing Machine Computations

Reversibility of Turing Machine Computations Reversiility of Turing Machine Coputations Zvi M. Kede NYU CS Technical Report TR-2013-956 May 13, 2013 Astract Since Bennett s 1973 seinal paper, there has een a growing interest in general-purpose, reversile

More information

THE BALANCED DECOMPOSITION NUMBER AND VERTEX CONNECTIVITY

THE BALANCED DECOMPOSITION NUMBER AND VERTEX CONNECTIVITY THE BALANCED DECOMPOSITION NUMBER AND VERTEX CONNECTIVITY SHINYA FUJITA AND HENRY LIU Astract The alanced decomposition numer f(g) of a graph G was introduced y Fujita and Nakamigawa [Discr Appl Math,

More information

4 An Introduction to Channel Coding and Decoding over BSC

4 An Introduction to Channel Coding and Decoding over BSC 4 An Introduction to Channel Coding and Decoding over BSC 4.1. Recall that channel coding introduces, in a controlled manner, some redundancy in the (binary information sequence that can be used at the

More information

Time-invariant LDPC convolutional codes

Time-invariant LDPC convolutional codes Time-invariant LDPC convolutional codes Dimitris Achlioptas, Hamed Hassani, Wei Liu, and Rüdiger Urbanke Department of Computer Science, UC Santa Cruz, USA Email: achlioptas@csucscedu Department of Computer

More information

The price of certainty: waterslide curves and the gap to capacity

The price of certainty: waterslide curves and the gap to capacity The price of certainty: waterslide curves and the to capacity Anant Sahai and ulkit Grover Wireless Foundations, Department of EECS University of California at Berkeley, CA-9470, USA {sahai, pulkit}@eecs.erkeley.edu

More information

Improved Successive Cancellation Flip Decoding of Polar Codes Based on Error Distribution

Improved Successive Cancellation Flip Decoding of Polar Codes Based on Error Distribution Improved Successive Cancellation Flip Decoding of Polar Codes Based on Error Distribution Carlo Condo, Furkan Ercan, Warren J. Gross Department of Electrical and Computer Engineering, McGill University,

More information

On the Expected Rate of Slowly Fading Channels with Quantized Side Information

On the Expected Rate of Slowly Fading Channels with Quantized Side Information On the Expected Rate of Slowly Fading Channels with Quantized Side Information Thanh Tùng Kim and Mikael Skoglund 2005-10-30 IR S3 KT 0515 c 2005 IEEE. Personal use of this material is permitted. However,

More information

The Poisson Channel with Side Information

The Poisson Channel with Side Information The Poisson Channel with Side Information Shraga Bross School of Enginerring Bar-Ilan University, Israel brosss@macs.biu.ac.il Amos Lapidoth Ligong Wang Signal and Information Processing Laboratory ETH

More information

Polar Codes: Construction and Performance Analysis

Polar Codes: Construction and Performance Analysis Master Project Polar Codes: Construction and Performance Analysis Ramtin Pedarsani ramtin.pedarsani@epfl.ch Supervisor: Prof. Emre Telatar Assistant: Hamed Hassani Information Theory Laboratory (LTHI)

More information

Characterization of the Burst Aggregation Process in Optical Burst Switching.

Characterization of the Burst Aggregation Process in Optical Burst Switching. See discussions, stats, and author profiles for this pulication at: http://www.researchgate.net/pulication/221198381 Characterization of the Burst Aggregation Process in Optical Burst Switching. CONFERENCE

More information

Polar Codes are Optimal for Lossy Source Coding

Polar Codes are Optimal for Lossy Source Coding Polar Codes are Optimal for Lossy Source Coding Satish Babu Korada and Rüdiger Urbanke EPFL, Switzerland, Email: satish.korada,ruediger.urbanke}@epfl.ch Abstract We consider lossy source compression of

More information

Reversal of regular languages and state complexity

Reversal of regular languages and state complexity Reversal of regular languages and state complexity Juraj Šeej Institute of Computer Science, Faculty of Science, P. J. Šafárik University Jesenná 5, 04001 Košice, Slovakia juraj.seej@gmail.com Astract.

More information

Compactness vs Collusion Resistance in Functional Encryption

Compactness vs Collusion Resistance in Functional Encryption Compactness vs Collusion Resistance in Functional Encryption Baiyu Li Daniele Micciancio April 10, 2017 Astract We present two general constructions that can e used to comine any two functional encryption

More information

Performance Analysis for Transmission of Correlated Sources over Non-Orthogonal MARCs

Performance Analysis for Transmission of Correlated Sources over Non-Orthogonal MARCs 1 Performance Analysis for Transmission of Correlated Sources over Non-Orthogonal MARCs Jiguang He, Iqal Hussain, Valtteri Tervo, Markku Juntti, Tad Matsumoto Centre for Wireless Communications, FI-914,

More information

Fast inverse for big numbers: Picarte s iteration

Fast inverse for big numbers: Picarte s iteration Fast inverse for ig numers: Picarte s iteration Claudio Gutierrez and Mauricio Monsalve Computer Science Department, Universidad de Chile cgutierr,mnmonsal@dcc.uchile.cl Astract. This paper presents an

More information

arxiv: v1 [cs.fl] 24 Nov 2017

arxiv: v1 [cs.fl] 24 Nov 2017 (Biased) Majority Rule Cellular Automata Bernd Gärtner and Ahad N. Zehmakan Department of Computer Science, ETH Zurich arxiv:1711.1090v1 [cs.fl] 4 Nov 017 Astract Consider a graph G = (V, E) and a random

More information

A Sufficient Condition for Optimality of Digital versus Analog Relaying in a Sensor Network

A Sufficient Condition for Optimality of Digital versus Analog Relaying in a Sensor Network A Sufficient Condition for Optimality of Digital versus Analog Relaying in a Sensor Network Chandrashekhar Thejaswi PS Douglas Cochran and Junshan Zhang Department of Electrical Engineering Arizona State

More information

X b s t w t t dt b E ( ) t dt

X b s t w t t dt b E ( ) t dt Consider the following correlator receiver architecture: T dt X si () t S xt () * () t Wt () T dt X Suppose s (t) is sent, then * () t t T T T X s t w t t dt E t t dt w t dt E W t t T T T X s t w t t dt

More information

On the structure of a reversible entanglement generating set for three partite states

On the structure of a reversible entanglement generating set for three partite states On the structure of a reversile entanglement generating set for three partite states A. Acín 1, G. Vidal and J. I. Cirac 3 1 GAP-Optique, University of Geneva, 0, Rue de l École de Médecine, CH-111 Geneva

More information

1 Hoeffding s Inequality

1 Hoeffding s Inequality Proailistic Method: Hoeffding s Inequality and Differential Privacy Lecturer: Huert Chan Date: 27 May 22 Hoeffding s Inequality. Approximate Counting y Random Sampling Suppose there is a ag containing

More information

Efficient Compression of Monotone and m-modal Distributions

Efficient Compression of Monotone and m-modal Distributions Efficient Compression of Monotone and m-modal Distriutions Jayadev Acharya, Ashkan Jafarpour, Alon Orlitsky, and Ananda Theertha Suresh ECE Department, UCSD {jacharya, ashkan, alon, asuresh}@ucsd.edu Astract

More information

ERASMUS UNIVERSITY ROTTERDAM Information concerning the Entrance examination Mathematics level 2 for International Business Administration (IBA)

ERASMUS UNIVERSITY ROTTERDAM Information concerning the Entrance examination Mathematics level 2 for International Business Administration (IBA) ERASMUS UNIVERSITY ROTTERDAM Information concerning the Entrance examination Mathematics level 2 for International Business Administration (IBA) General information Availale time: 2.5 hours (150 minutes).

More information

Upper Bounds on the Capacity of Binary Intermittent Communication

Upper Bounds on the Capacity of Binary Intermittent Communication Upper Bounds on the Capacity of Binary Intermittent Communication Mostafa Khoshnevisan and J. Nicholas Laneman Department of Electrical Engineering University of Notre Dame Notre Dame, Indiana 46556 Email:{mhoshne,

More information

The price of certainty: "waterslide curves" and the gap to capacity

The price of certainty: waterslide curves and the gap to capacity The price of certainty: "waterslide curves" and the to capacity Anant Sahai ulkit Grover Electrical Engineering and Computer Sciences University of California at Berkeley Technical Report No. UCB/EECS-008-

More information

Module 9: Further Numbers and Equations. Numbers and Indices. The aim of this lesson is to enable you to: work with rational and irrational numbers

Module 9: Further Numbers and Equations. Numbers and Indices. The aim of this lesson is to enable you to: work with rational and irrational numbers Module 9: Further Numers and Equations Lesson Aims The aim of this lesson is to enale you to: wor with rational and irrational numers wor with surds to rationalise the denominator when calculating interest,

More information

Polar codes for the m-user MAC and matroids

Polar codes for the m-user MAC and matroids Research Collection Conference Paper Polar codes for the m-user MAC and matroids Author(s): Abbe, Emmanuel; Telatar, Emre Publication Date: 2010 Permanent Link: https://doi.org/10.3929/ethz-a-005997169

More information

Chapter 9 Fundamental Limits in Information Theory

Chapter 9 Fundamental Limits in Information Theory Chapter 9 Fundamental Limits in Information Theory Information Theory is the fundamental theory behind information manipulation, including data compression and data transmission. 9.1 Introduction o For

More information

Genetic Algorithms applied to Problems of Forbidden Configurations

Genetic Algorithms applied to Problems of Forbidden Configurations Genetic Algorithms applied to Prolems of Foridden Configurations R.P. Anstee Miguel Raggi Department of Mathematics University of British Columia Vancouver, B.C. Canada V6T Z2 anstee@math.uc.ca mraggi@gmail.com

More information

QR FACTORIZATIONS USING A RESTRICTED SET OF ROTATIONS

QR FACTORIZATIONS USING A RESTRICTED SET OF ROTATIONS QR FACTORIZATIONS USING A RESTRICTED SET OF ROTATIONS DIANNE P. O LEARY AND STEPHEN S. BULLOCK Dedicated to Alan George on the occasion of his 60th birthday Abstract. Any matrix A of dimension m n (m n)

More information

Estimation of Hottest Spot Temperature in Power Transformer Windings with NDOF and DOF Cooling

Estimation of Hottest Spot Temperature in Power Transformer Windings with NDOF and DOF Cooling Transactions D: Computer Science & Engineering and Electrical Engineering Vol. 16, No. 2, pp. 163{170 c Sharif University of Technology, Decemer 2009 Research Note Estimation of Hottest Spot Temperature

More information

1 Systems of Differential Equations

1 Systems of Differential Equations March, 20 7- Systems of Differential Equations Let U e an open suset of R n, I e an open interval in R and : I R n R n e a function from I R n to R n The equation ẋ = ft, x is called a first order ordinary

More information

On the Optimal Performance in Asymmetric Gaussian Wireless Sensor Networks With Fading

On the Optimal Performance in Asymmetric Gaussian Wireless Sensor Networks With Fading 436 IEEE TRANSACTIONS ON SIGNA ROCESSING, O. 58, NO. 4, ARI 00 [9] B. Chen and. K. Willett, On the optimality of the likelihood-ratio test for local sensor decision rules in the presence of nonideal channels,

More information

Universal A Posteriori Metrics Game

Universal A Posteriori Metrics Game 1 Universal A Posteriori Metrics Game Emmanuel Abbe LCM, EPFL Lausanne, 1015, Switzerland emmanuel.abbe@epfl.ch Rethnakaran Pulikkoonattu Broadcom Inc, Irvine, CA, USA, 92604 rethna@broadcom.com arxiv:1004.4815v1

More information

Sharp estimates of bounded solutions to some semilinear second order dissipative equations

Sharp estimates of bounded solutions to some semilinear second order dissipative equations Sharp estimates of ounded solutions to some semilinear second order dissipative equations Cyrine Fitouri & Alain Haraux Astract. Let H, V e two real Hilert spaces such that V H with continuous and dense

More information

arxiv: v1 [stat.ml] 10 Apr 2017

arxiv: v1 [stat.ml] 10 Apr 2017 Integral Transforms from Finite Data: An Application of Gaussian Process Regression to Fourier Analysis arxiv:1704.02828v1 [stat.ml] 10 Apr 2017 Luca Amrogioni * and Eric Maris Radoud University, Donders

More information

Structuring Unreliable Radio Networks

Structuring Unreliable Radio Networks Structuring Unreliale Radio Networks Keren Censor-Hillel Seth Gilert Faian Kuhn Nancy Lynch Calvin Newport March 29, 2011 Astract In this paper we study the prolem of uilding a connected dominating set

More information

Polar Codes for Sources with Finite Reconstruction Alphabets

Polar Codes for Sources with Finite Reconstruction Alphabets Polar Codes for Sources with Finite Reconstruction Alphabets Aria G. Sahebi and S. Sandeep Pradhan Department of Electrical Engineering and Computer Science, University of Michigan, Ann Arbor, MI 4809,

More information

Lecture 12. Block Diagram

Lecture 12. Block Diagram Lecture 12 Goals Be able to encode using a linear block code Be able to decode a linear block code received over a binary symmetric channel or an additive white Gaussian channel XII-1 Block Diagram Data

More information

1 Caveats of Parallel Algorithms

1 Caveats of Parallel Algorithms CME 323: Distriuted Algorithms and Optimization, Spring 2015 http://stanford.edu/ reza/dao. Instructor: Reza Zadeh, Matroid and Stanford. Lecture 1, 9/26/2015. Scried y Suhas Suresha, Pin Pin, Andreas

More information