A Coordinate System for Gaussian Networks

Size: px
Start display at page:

Download "A Coordinate System for Gaussian Networks"

Transcription

1 A Coordinate System for Gaussian Networs The MIT Faculty has made this article oenly available. Please share how this access benefits you. Your story matters. Citation As Published Publisher Abbe, Emmanuel, and Lizhong Zheng. A Coordinate System for Gaussian Networs. IEEE Transactions on Information Theory ): htt://dx.doi.org/ /tit Institute of Electrical and Electronics Engineers IEEE) Version Author's final manuscrit Accessed Sat Oct 0 17:05:18 EDT 018 Citable Lin htt://hdl.handle.net/171.1/73671 Terms of Use Creative Commons Attribution-Noncommercial-Share Alie 3.0 Detailed Terms htt://creativecommons.org/licenses/by-nc-sa/3.0/

2 A Coordinate System for Gaussian Networs Emmanuel A. Abbe IPG, EPFL Lausanne, 1015 CH Lizhong Zheng RLE, MIT Cambridge, MA arxiv:100.71v1 [cs.it] 11 Feb 010 Abstract This aer studies networ information theory roblems where the external noise is Gaussian distributed. In articular, the Gaussian broadcast channel with coherent fading and the Gaussian interference channel are investigated. It is shown that in these roblems, non-gaussian code ensembles can achieve higher rates than the Gaussian ones. It is also shown that the strong Shamai-Laroia conjecture on the Gaussian ISI channel does not hold. In order to analyze non-gaussian code ensembles over Gaussian networs, a geometrical tool using the Hermite olynomials is roosed. This tool rovides a coordinate system to analyze a class of non-gaussian inut distributions that are invariant over Gaussian networs. I. INTRODUCTION Let a memoryless additive white Gaussian noise AWGN) channel be described by Y = X + Z, where Z N 0, v) is indeendent of X. If the inut is imosed an average ower constraint given by EX, the inut distribution maximizing the mutual information is Gaussian. This is due to the fact that under second moment constraint, the Gaussian distribution maximizes the entroy, hence arg max X:EX = hx + Z) N 0, ). 1) On the other hand, if we use a Gaussian inut distribution, i.e., X N 0, ), the worst noise that can occur, i.e., the noise minimizing the mutual information, among noises with bounded second moment, is again Gaussian distributed. This can be shown by using the entroy ower inequality EPI), cf. [11], which reduces in this setting to and imlies arg min hx + Z) N 0, v) ) Z: hz)= 1 log πev arg min Z:EZ =v hx + Z) hz) N 0, v). 3) Hence, in the single-user setting, when otimizing the mutual information as above, a Gaussian inut is the best inut for a Gaussian noise and a Gaussian noise is the worst noise for a Gaussian inut. This rovides a game equilibrium between user and nature, as defined in [7],. 63. With these results, many roblems in information theory dealing with Gaussian noise can be solved. However, in Gaussian networs, that is, in multi-user information theory roblems where the external noise is Gaussian distributed, several new henomena mae the search for the otimal inut ensemble more comlex. Besides for some secific cases of Gaussian networs, we still do not now how interference should be treated in general. Let us consider two users interfering on each other in addition to suffering from Gaussian external noise and say that the receivers treat interference as noise. Then, if the first user has drawn its code from a Gaussian ensemble, the second user faces a frustration henomenon: using a Gaussian ensemble maximizes its mutual information but minimizes the mutual information of the first user. It is an oen roblem to find the otimal inut distributions for this roblem. This is one illustration of the comlications aearing in the networ setting. Another examle is regarding the treatment of the fading. Over a single-user AWGN channel, whether the fading is deterministic or random, but nown at the receiver, does not affect the otimal inut distribution. From 1), it is clear that maximizing IX; X + Z) or IX; HX + Z H) under an average ower constraint is achieved by a Gaussian inut. However, the situation is different if we consider a Gaussian broadcast channel BC). When there is a deterministic fading, using 1) and 3), the otimal inut distribution can be shown to be Gaussian. However, it has been an oen roblem to show whether Gaussian inuts are otimal or not for a Gaussian BC with a random fading nown at the receiver, even if the fading is such that it is a degraded BC. A reason for these oen questions in the networ information theoretic framewor, is that Gaussian ensembles are roughly the only ensembles that can be analyzed over Gaussian networs, as non-gaussian ensembles have left most roblems in an intractable form. In this aer, a novel technique is develoed to analyze a class of non-gaussian inut distributions over Gaussian noise channels. This technique is efficient to analyze the cometitive situations occurring in the networ roblems described below. It allows in articular to find certain non-gaussian ensembles that outerform Gaussian ones on a Gaussian BC with coherent fading channel, a two user interference channel, and it allows to disrove the strong Shamai-Laroia conjecture on the Gaussian intersymbol interference channel. This tool rovides a new insight on Gaussian networs and confirms that non-gaussian ensembles do have a role to lay in these networs. We now introduce with more details the notion of cometitive situations. A. Cometitive Situations 1) Fading Broadcast Channel: Consider a degraded Gaussian BC with coherent memoryless fading, where the fading

3 is indeed the same for both receivers, i.e. Y 1 = HX + Z 1, Y = HX + Z but Z 1 N 0, v 1 ) and Z N 0, v ), with v 1 < v. The inut X is imosed a ower constraint denoted by. Because the fading is coherent, each receiver also nows the realization of H, at each channel use. The fading and the noises are memoryless iid) rocesses. Since this is a degraded broadcast channel, the caacity region is given by all rate airs IX; Y 1 U, H), IU; Y H)) with U X Y 1, Y ). The otimal inut distributions, i.e., the distributions of U, X) achieving the caacity region boundary, are given by the following otimization, where µ R, arg max IX; Y 1 U, H) + µiu; Y H). 4) U,X): U X Y 1,Y ) EX Note that the objective function in the above maximization is given by hy 1 U, H) hz 1 ) + µhy H) µhy U, H). Now, each term in this exression is individually maximized by a Gaussian distribution for U and X, but these terms are combined with different signs, so there is a cometitive situation and the maximizer is not obvious. When µ 1, one can show that Gaussian distributions are otimal. Also, if H is comactly suorted, and if v is small enough as to mae the suort of H and 1/vH non overlaing, the otimal distribution of U, X) is jointly Gaussian cf. [13]). However, in general the otimal distribution is unnown. We do not now if it because we need more theorems, or if it is really that with fading, non-gaussian codes can actually erform better than the Gaussian ones. ) Interference Channel: We consider the symmetric memoryless interference channel IC) with two users and white Gaussian noise. The average ower is denoted by, the interference coefficients by a, and the resective noise by Z 1 and Z indeendent standard Gaussian). We define the following exression ms a, X m 1, X m ) 5) = IX m 1 ; X m 1 + ax m + Z m 1 ) + IX m ; X m + ax m 1 + Z m ) = hx m 1 + ax m + Z m 1 ) hax m + Z m 1 ) + hx m + ax m 1 + Z m ) hax m 1 + Z m ), where X1 m and X m are indeendent random vectors of dimension m with a covariance having a trace bounded by m and Zi m, i = 1,, are iid standard Gaussian. For any dimension m and any distributions of X1 m and X m, S a, X1 m, X m ) is a lower bound to the sum-caacity. Moreover, it is tight by taing m arbitrarily large and X1 m and X m maximizing 5). Now, a similar cometitive situation as for the fading broadcast roblem taes lace: Gaussian distributions maximize each entroy term, but these terms are combined with different signs. Would we then refer to tae X 1 and X Gaussian or not? This should deend on the value of a. If a = 0, we have two arallel AWGN channels with no interference, and Gaussian inuts are otimal. We can then exect that this might still hold for small values of a. It has been roved recently in [], [8], [10], that the sum-caacity is achieved by treating interference as noise and with iid Gaussian inuts, as long as a 3 + a 1/ 0. Hence, in this regime, the iid Gaussian distribution maximizes 5) for any m. But if a is above that threshold and below 1, the roblem is oen. Let us now review the notion of treating interference as noise. For each user, we say that the decoder is treating interference as noise, if it does not require the nowledge of the other user s code boo. However, we allow such decoders to have the nowledge of the distribution, under which the other user s code boo may be drawn. This is for examle necessary to construct a sum-caacity achieving code 1 in [], [8], [10], where the decoder of each user treats interference as noise but uses the fact that the other user s code boo is drawn from an iid Gaussian distribution. But, if we allow this distribution to be of arbitrarily large dimension m in our definition of treating interference as noise, we can get a misleading definition. Indeed, no matter what a is, if we tae m large enough and a distribution of X m 1, X m maximizing 5), we can achieve rates arbitrarily close to the sum-caacity, yet, formally treating interference as noise. The roblem is that the maximizing distributions in 5) may not be iid for an arbitrary a, and nowing it at the receiver can be as much information as nowing the other user s code boo for examle, if the distribution is the uniform distribution over a code boo of small error robability). Hence, one has to be careful when taing m large. In this aer, we will only wor with situations that are not ambiguous with resect to our definition of treating interference as noise. It is indeed an interesting roblem to discuss what ind of m-dimensional distributions would cature the meaning of treating interference as noise that we want. This also oints out that studying the maximizers of 5) relates to studying the concet of treating interference as noise or information. Since for any chosen distributions of the inuts we can achieve 5), the maximizers of 5) must have a different structure when a grows. For a small enough, iid Gaussian are maximizing distributions, but for a 1, since we do not want to treat interference as noise, the maximizing distributions must have a heavy structure, whose characterization requires as much information as giving the entire code boo. This underlines that an encoder can be drawn from a distribution which does not maximize 5) for any value of m, but yet, a decoder may exist in order to have a caacity achieving code. This haens if a 1, iid Gaussian inuts will achieve the sum-caacity if the receiver decodes the message of both users one can show that the roblem is equivalent to having two MAC s). However, if a 1, the iid Gaussian distribution does not maximize S a, X 1, X ) for the dimension 1, hence for arbitrary dimensions). 1 in a low interference regime

4 In any cases, if the Gaussian distribution does not maximize 5) for the dimension 1, it means that iid Gaussian inuts and treating interference as noise is not caacity achieving, since a code which treats interference as noise and whose encoder is drawn from a distribution can be caacity achieving only if the encoder is drawn from a distribution maximizing 5). Hence, understanding better how to resolve the cometitive situation of otimizing 5) is a consequent roblem for the interference channel. B. ISI channel and strong Shamai-Laroia Conjecture Conjecture 1: Let h,, v R +, X1 G N 0, ) and Z N 0, v) indeendent of X1 G ). For all X, X 1 i.i.d. with mean 0 and variance, we have IX; X + hx G 1 + Z) IX; X + hx 1 + Z). 6) This conjecture has been brought to our attention by Shlomo Shamai Shitz), who referred to the strong conjecture for a slightly more general statement, where an arbitrary memory for the interference term is allowed, i.e., where n i=1 h ix i stands for hx 1. The strong conjecture then claims that icing all X i s Gaussian gives a minimizer. However, we will show that even for the memory one case, the conjecture does not hold. The wea conjecture, also referred to as the Shamai-Laroia conjecture, corresonds to a secific choice of the h i s, which arises when using an MMSE decision feedbac equalizer on a Gaussian noise ISI channel, cf. [9]. This conjecture is investigated in a wor in rogress. There are many other examles in networ information theory where such cometitive situations occur. Our goal in this aer is to exlore the degree of freedom rovided by non- Gaussian inut distributions. We show that the neighborhood of Gaussian distributions can be arametrized in a secific way, as to simlify greatly the comutations arising in cometitive situations. We will be able to recisely quantify how much a certain amount of non-gaussianness, which we will characterize by means of the Hermite olynomials, affects or hels us in maximizing the cometitive entroic functional of reviously mentioned roblems. A. Fading BC II. PROBLEM STATEMENT For the fading BC roblem roblem described in I-A1, we want to determine if/when the distribution of U, X) maximizing 4) is Gaussian or not. B. IC For the interference channel roblem described in I-A, we now from [], [8], [10] that treating interference as noise and using iid Gaussian inuts is otimal when a 3 + a 1/ > 0. We question when this coding scheme is no longer otimal. More generally, we want to analyze the maximizers of 5). We distinguish the imlication of such a threshold in both the synchronized and asynchronized users setting, as there will be an interesting distinction between these two cases. We recall how the synch and asynch settings are defined here. In the synch setting, each user of the IC sends their code words of a common bloc length n simultaneously, i.e., at time 1, they both send the first comonent of their code word, at time the second comonent, etc. In the asynch setting, each user is still using code words of the same bloc length n, however, there might be a shift between the time at which the first and second users start sending their code words. We denote this shift by τ, and assume w.l.o.g. that 0 τ n. In the totally asynch setting, we assume that τ is drawn uniformly at random within {0,..., n}. We may also distinguish the cases where τ is not nown at the transmitter but at the receiver, and when τ is not nown at both. Note that if iid inut distributions are used to draw the code boos, and interference is treated as noise, whether the users are synch or asynch is not affecting the rate achievability. However, if the users want to time-share over the channel uses, such as to fully avoid their interference, they will need synchronization. Definition 1: Time sharing over a bloc length n assumed to be even) with Gaussian inuts refers to using X 1 Gaussian with covariance P În/ and X Gaussian with covariance P Îc n/, where În/ is a diagonal matrix with n/ 1 s and 0 s, and Îc n/ flis the 1 s and 0 s on the diagonal. C. ISI Channel and Strong Shamai-Laroia Conjecture We want to determine whether conjecture 1 holds or not. D. General Problem Our more general goal is to understand better the roblem osed by any cometitive situations. For this urose, we formulate the following mathematical roblem. We start by changing the notation and rewrite 1) and 3) as arg max hf g v) = g 7) f: m f)= arg min hf g v) hf) = g 8) f: m f)= where g denotes the Gaussian density with zero mean and variance, and the functions f are density functions on R, i.e., ositive functions integrating to 1, and having a welldefined entroy and second moment m f) = R x fx)dx. We consider the local geometry by looing at densities of the form f ε x) = g x)1 + εlx)), x R, 9) where L : R R satisfies inf Lx) > 10) x R Lx)g x)dx = 0. 11) R hence, 5) with an iid distribution for X 1 and X can still be defined for the totally asynch IC

5 With these two constraints on L, f ε is a valid density for ε sufficiently small. It is a erturbed Gaussian density, in a direction L. Observe that, m 1 f ε ) = 0 iff M 1 L) = xlx)g x)dx = 0 1) R m f ε ) = iff M L) = x Lx)g x)dx = 0. 13) We are now interested in analyzing how these erturbations affect the outut distributions through an AWGN channel. Note that, if the inut distribution is a Gaussian g erturbed in the direction L, the outut is a Gaussian g +v erturbed in the direction gl) gv g +v, since f ε g v = g +v 1 + ε g L) g v g +v ). Convention: g L g v refers to g L) g v, i.e., the multilicative oerator recedes the convolution one. For simlicity, let us assume in the following that the function L is a olynomial satisfying 10), 11). Lemma 1: We have where Df ε g ) = 1 ε L g + oε ) Df ε g v g g v ) = 1 ε g L g v g +v g +v + oε ). L g = R R L x)g x)dx. Moreover, note that for any density f, if m 1 f) = a and m f) = + a, we have hf) = hg a, ) Df g a, ). 14) Hence, the extremal entroic results of 7) and 8) are locally exressed as arg min g L g v g L: M L)=0 g +v = 0 15) +v arg max g L g v g L: M L)=0 g +v L g = 0, 16) +v where 0 denotes here the zero function. If 15) is obvious, 16) requires a roof which will be done in section V. Let us define the following maing, Γ +) : L L g ) g L g v g +v L g +v ; R), 17) where L g ) denotes the sace of real functions having a finite g norm. This linear maing gives, for a given erturbed direction L of a Gaussian inut g, the resulting erturbed direction of the outut through additive Gaussian noise g v. The norm of each direction in their resective saces, i.e., in L g ) and L g +v ), gives how far from the Gaussian distribution these erturbations are u to a scaling factor). Note that if L satisfies 10)-11), so does Γ +) L for the measure g +v. The result in 16) worst noise case) tells us that this maing is a contraction, but for our goal, what would be helful is a sectral analysis of this oerator, to allow more quantitative results than the extreme-case results of 15) and 16). In order to do so, one can exress Γ +) as an oerator defined and valued in the same sace, namely L with the Lebesgue measure λ, which is done by inserting the Gaussian measure in the oerator argument. We then roceed to a singular function/value analysis. Formally, let K = L g, which gives K λ = L g, and let g K g v Λ : K L λ) L λ) 18) g+v which gives Γ +) L g+v = ΛK λ. Denoting by Λ the adjoint oerator of Λ, we want to find the singular functions of Λ, i.e., the eigenfunctions K of Λ Λ: Λ ΛK = γk. III. RESULTS A. General Result: Local Geometry and Hermite Coordinates The following theorem gives the singular functions and values of the oerator Λ defined in revious section. Theorem 1: Λ ΛK = γk, K 0 holds for each air K, γ) { ) g H [], )} 0, + v where H [] x) = 1! H x/ ) H x) = 1) e x / d dx e x /, 0, x R. The olynomials H [] are the normalized Hermite olynomials for a Gaussian distribution having variance ) and g H [] are called the Hermite functions. For any > 0, {H [] } 0 is an orthonormal basis of L g ), this can be found in [1]. One can chec that H 1, resectively H erturb a Gaussian distribution into another Gaussian distribution, with a different first moment, resectively second moment. For 3, the H erturbations are not modifying the first two moments and are moving away from Gaussian distributions. Since H [] 0 = 1, the orthogonality roerty imlies that H [] satisfies 11) for any > 0. However, it is formally only for even values of that 13) is verified although we will see in section V that essentially any can be considered in our roblems). The following result contains the roerty of Hermite olynomials mostly used in our roblems, and exresses Theorem 1 with the Gaussian measures. The following result contains the roerty of Hermite olynomials mostly used in our roblems, and exresses Proosition 1 with the Gaussian measures.

6 Theorem : Γ +) H [] Γ ) H [+v] = g H [] g v = g +v = H [+v] g v = Last Theorem imlies Theorem 1, since for ) / H [+v], 19) + v ) / H [] + v. 0) Γ ) Γ +) L = γl Λ ΛK = γk K = L g. Comment: the results that we have just derived are related to roerties of the Ornstein-Uhlenhec rocess. Summary: In words, we just saw that H is an eigenfunction of the inut/outut erturbation oerator Γ +), in the sense ) / that Γ +) H [] = [+v] +v H. Hence, over an additive Gaussian noise channel g v, if we erturb the inut g in the direction H [] by an amount ε, we will erturb the outut +v ) / ε. Such g +v in the direction H [+v] by an amount a erturbation in H imlies that the outut entroy is reduced comared to not erturbing) by B. Fading BC Result +v ) ε if 3). The following result states that the caacity region of a degraded fading BC with Gaussian noise is not achieved by a Gaussian suerosition code in general. Theorem 3: Let Y 1 = HX + Z 1, Y = HX + Z with X such that EX, Z 1 N 0, v), 0 < v < 1, Z N 0, 1) and H, X, Z 1, Z mutually indeendent. There exists a fading distribution and a value of v for which the caacity achieving inut distribution is non-gaussian. More recisely, let U be any auxiliary random variable, with U X Y 1, Y ). Then, there exists, v, a distribution of H and µ such that U, X) IX; Y 1 U, H) + µiu; Y H) 1) is maximized by a non jointly Gaussian distribution. In the roof, we resent a counter-examle to Gaussian being otimal for H binary. In order to defeat Gaussian distributions, we construct inut distributions using the Hermite coordinates. The roof also gives a condition on the fading distribution and the noise variance v for which a non-gaussian distribution strictly imroves on the Gaussian one. C. IC Result Definition : Let [ F a, ) = lim lim Sa, δ 0 ε 0 ε X 1, X ) S a, X1 G, X G ) ], where X1 G, X G iid g, X 1 g 1 + ε H ) and X g 1 ε H ), with H defined in ) below as exlain in section IV, H is a formal modification of H to ensure the ositivity of the erturbed densities). In other words, F a, ) reresents the gain ositive or negative) of using X 1 erturbed along H and X erturbed along H with resect to using Gaussian distributions. Note that the distributions we chose for X 1 and X are not the most general ones, as we could have chosen arbitrary directions sanned by the Hermite basis to erturb the Gaussian densities. However, as exlained in the roof of the theorem 4, this choice is sufficient for our urose. Theorem 4: We have for [ a F a, ) = a + 1 ] a 1) a + + 1). For any fixed, the function F, ) has a unique ositive root, below which it is negative and above which it is ositive. Theorem 5: Treating interference as noise with iid Gaussian inuts does not achieve the sum-caacity of the symmetric IC synch or asynch) and is outerformed by X 1 g 1 + ε H 3 ) and X g 1 ε H 3 ), if F 3 a, ) > 0. This Theorem is a direct consequence of Theorem 4. Proosition 1: For the symmetric synch IC, time sharing imroves on treating interference as noise with iid Gaussian distribution if F a, ) > 0. We now introduce the following definition. Definition 3: Blind time sharing over a bloc length n assumed to be even) between two users, refers to sending non-zero ower symbols only at the instances mared with a 1 in 1, 0, 1, 0, 1, 0,... 1, 0) for the first user, and zero ower symbols only at the instances mared with a 1 in 1, 1,..., 1, 0, 0,..., 0) for the second user. Proosition : For the symmetric totally asynch IC, if the receivers but not transmitters) now the asynchronization delay, blind time sharing imroves on treating interference as noise with iid Gaussian distributions if B a, ) > 0, where B a, ) = 1 4 log1+)+log1+ 1+a )) log1+ 1+a ). If the receivers do not now the asynchronization delay, blind time sharing cannot imrove on treating interference as noise with iid Gaussian distributions if B a, ) 0. How to read these results: We have four thresholds to ee trac of: T 1 ) is when a 3 + a 1 = 0. If a T 1), we now from [], [8], [10] that iid Gaussian inuts and treating interference as noise is sum-caacity achieving. T ) is when F a, ) = 0. If a > T ), we now from Pro. 1 that, if synchronization is ermitted, time sharing imroves on treating interference as noise with iid

7 Gaussian inuts. This regime matches with the so-called moderate regime defined in [5]. T 3 ) is when F 3 a, ) = 0. If a > T 3 ), we now from Pro. 5 that treating interference as noise with iid non- Gaussian distributions oosites in H 3 ) imroves on the iid Gaussian ones. T 4 ) is when B a, ) = 0. If a > T 4 ), we now from Pro. that, even if the users are totally asynchronized, but if the receivers now the asynchronization delay, blind time sharing imroves on treating interference as noise with iid Gaussian inuts. If the receivers do not now the delay, the threshold can only aear for larger values of a. The question is now, how are these thresholds raned. It turns out that 0 < T 1 ) < T ) < T 3 ) < T 4 ). And if = 1, the above inequality reads as 0.44 < < < This imlies the following for a decoder that treats interference as noise. Since T ) < T 3 ), it is first better to time share than using non-gaussian distributions along H 3. But this is useful only if time-sharing is ermitted, i.e., for the synch IC. However, for the asynchronized IC, since T 3 ) < T 4 ), we are better off using the non-gaussian distributions along H 3 before a Gaussian inut scheme, even with blind time-sharing, and even if the receiver could now the delay. We notice that there is still a ga between T 1 ) and T ), and we cannot say if, in this range, iid Gaussian inuts are still otimal, or if another class of non-gaussian inuts far away from Gaussians) can outerform them. In [4], another technique which is related to ours but not equivalent) is used to find regimes where non-gaussian inuts can imrove on Gaussian ones on the same roblem that we consider here. The threshold found in [4] is equal to 0.95 for = 1, which is looser than the value of found here. Finally, the following interesting and curious fact has also been noticed. In theorem 4, we require. Nevertheless, if we lug = 1 in the right hand side of theorem 4 and as for this exressions to be ositive, we recisely get a 3 + a 1 > 0, i.e., the comlement range delimited by T 1 ). However, the right hand side of theorem 4 for = 1 is not equal to F 1 a, ) this is exlained in more details in the roof of theorem 4). Indeed, it would not mae sense that moving along H 1, which changes the mean with a fixed second moment within Gaussians, would allow us to imrove on the iid Gaussian scheme. Yet, getting to the exact same condition, when woring on the roblem of imroving on the iid Gaussian scheme, seems to be a strange coincidence. D. Strong Shamai-Laroia Conjecture We show in Section V that conjecture 1 does not hold. We rovide counter-examles to the conjecture, ointing out that the range of h for which the conjecture does not hold increases with SNR. IV. HERMITE CODING: FORMALITIES The Hermite olynomial corresonding to = 0 is H [] 0 = 1 and is clearly not a valid direction as it violates 11). Using the orthogonality roerty of the Hermite basis and since H [] 0 = 1, we conclude that H [] satisfies 11) for any > 0. However, it is only for even that H [] satisfies 10). On the other hand, for any δ > 0, we have that H [] + δh[] 4 satisfies 10), whether is even or not we chose 4 instead of for reasons that will become clear later). Now, if we consider the direction H [], 10) is not satisfied for both even and odd. But again, for any δ > 0, we have that H [] +δh[] 4 satisfies 10). Hence, in order to ensure 10), we will often wor in the roofs with ±H [] +δh[] 4, although it will essentially allow us to reach the erformance achieved by any ±H [] odd or even), since we will then tae δ arbitrarily small and use continuity arguments. Convention: We dro the variance uer scrit in the Hermite terms whenever a Gaussian density with secified variance is erturbed, i.e., the density g 1 + εh ) always denotes g 1 + εh [] ), and g H always denotes g H [], no matter what is. Same treatment is done for g and. Now, in order to evaluate the entroy of a erturbation, i.e., hg 1 + εl)), we can exress it as the entroy of hg ) minus the divergence ga, as in 14), and then use Lemma 1 for the aroximation. But this is correct if g 1 + εl) has the same first two moments as g. Hence, if L contains only H s with 3, the revious argument can be used. But if L contains H 1 and/or H terms, the situation can be different. Next Lemma describes this. Lemma : Let δ, > 0 and { bh [] + δh[] 4 ), if b 0, [] b H = bh [] We have for any α R, 1, ε > 0 hg 1 + ε 1 α H )) = hg ) Dg 1 + ε 1 δh[] 4 ), if b < 0. ) α H ) g ) + εα. Finally, when we convolve two erturbed Gaussian distributions, we get g a 1 + εh j ) g b 1 + εh ) = g a+b + ε[g a H j g b + g a g b H ] + ε g a H j g b H. We already now from Theorem how to describe the terms in ε, what we still need is to describe the term in ε. We have the following. Lemma 3: We have g a H [a] g bh [b] l = Cg a+b H [a+b] +l, where C is a constant deending only on a, b, and l. In articular if = l = 1, we have C = ab a+b. V. PROOFS We start by reviewing the roof of 16), as it brings interesting facts. We then rove the main result. Proof of 16): We first assume that f ε has zero mean and variance. Using the Hermite basis, we exress L as L = 3 α H [] L must have such an exansion, since it must have a finite L g )

8 norm, to mae sense of the original exressions). Using 19), we can then exress 16) as ) α α 3) + v 3 3 which is clearly negative. Hence, we have roved that g L g v g +v g +v L g 4) and 16) is maximized by taing L = 0. Note that we can get tighter bounds than the one in revious inequality, indeed the tightest, holding for H 3, is given by g L g v g +v g +v + v ) 3 L g 5) this clearly holds if written as a series lie in 3)). Hence, locally the contraction roerty can be tightened, and locally, we have stronger EPI s, or worst noise case. Namely, if ν +v ) 3, we have arg min hf g v) νhf) = g 6) f: m 1f)=0,m f)= ) and if ν < 3, +v g is outerformed by non-gaussian distributions. Now, if we consider the constraint m f), which, in articular, allows to consider m 1 f) > 0 and m f) =, we get that if ν +v, arg min hf g v) νhf) = g 7) f: m f) and if ν < +v, g is outerformed by g δ for some δ > 0. It would then be interesting to study if these tighter results hold in a greater generality than for the local setting. Proof of Theorem : We want to show H [+v] g v = + v )/ H [], g H [] g v = + v )/ g +v H [+v], which is roved by an induction on, using the following roerties Aell sequence and recurrence relation) of Hermite olynomials: x H[] +1 x) = ) g x)h [] x x) = + 1 H[] x) + 1 g x)h [] +1 x). Proof of Theorem 3: We refer to 1) as the mu-rate. Let us first consider Gaussian codes, i.e., when U, X) is jointly Gaussian, and see what mu-rate they can achieve. Without loss of generality, we can assume that X = U + V, with U and V indeendent and Gaussian, with resective variance Q and R satisfying P = Q + R. Then, 1) becomes 1 RH E log1 + v ) + µ1 1 + P H E log 1 + RH. 8) Now, we ic a µ and loo for the otimal ower R that must be allocated to V in order to maximize the above exression. We are interested in cases for which the otimal R is not at the boundary but at an extremum of 8), and if the maxima is unique, the otimal R is found by the first derivative chec, which gives E H v+rh = µe H 1+RH. Since we will loo for µ, v, with R > 0, revious condition can be written as E RH v + RH = µe RH 1 + RH. 9) We now chec if we can imrove on 8) by moving away from the otimal jointly Gaussian U, X). There are several ways to erturb U, X), we consider first the following case. We ee U and V indeendent, but erturb them away from Gaussian s in the following way: Uε u) = g Q u)1 + εh [Q] 3 u) + δh 4 )) 30) Vε v) = g R v)1 εh [R] 3 v) δh 4)) 31) with ε, δ > 0 small enough. Note that these are valid density functions and that they reserve the first two moments of U and V. The reason why we add δh 4, is to ensure that 13) is satisfied, but we will see that for our urose, this can essentially be neglected. Then, using Lemma, the new distribution of X is given by Q X x) = g P x)1 + ε P ) 3 H [P ] 3 ε Q P ) 3 R [P ] H 3 ) + fδ) P ) 4 H [P ] 4 + ) 4 R P H [P ] 4 ), which where fδ) = δg P x)ε tends to zero when δ tends to zero. Now, by icing P = R, we have X x) = g P x) + fδ). 3) Hence, by taing δ arbitrarily small, the distribution of X is arbitrarily close to the Gaussian distribution with variance P. We now want to evaluate how these Hermite erturbations erform, given that we want to maximize 1), i.e., hy 1 U, H) hz 1 ) + µhy H) µhy U, H). 33) We wonder if, by moving away from Gaussian distributions, the gain achieved for the term hy U, H) is higher than the loss suffered from the other terms. Using Theorem, Lemma 1 and Lemma, we are able to recisely measure this and we get hy 1 U = u, H = h) ) 3 Rh = hg hu,v+rh 1 ε v + Rh H [hu,v+rh ] 3 )) = 1 ) log πev + Rh ) ε Rh 3 v + Rh + oε ) + oδ)

9 hy U = u, H = h) = 1 log πe1 + Rh ) ε and because of 3) Rh 1 + Rh ) 3 + oε ) + oδ) hy H = h) = 1 log πe1 + P h ) + oε ) + oδ). Therefore, collecting all terms, we find that for U ε and V ε defined in 30) and 31), exression 41) reduces to ) I G ε RH 3 ) E v + RH + µ ε RH 3 E 1 + RH + oε ) + oδ) 34) where I G is equal to 8) and is the mu-rate obtained with Gaussian inuts). Hence, if for some distribution of H and some v, we have that ) RH ) RH µe 1 + RH E v + RH > 0, 35) when = 3 and R is otimal for µ, we can tae ε and δ small enough in order to mae 34) strictly larger than I G. We have shown how, if verified, inequality 35) leads to counter-examles of the Gaussian otimality, but with similar exansions, we would also get counter-examles if the following inequality holds for any ower instead of 3, as long as 3. Let us summarize what we obtained: Let R be otimal for µ, which means that 9) holds if there is only one maxima not at the boarder). Then, non-gaussian codes along Hermite s strictly outerforms Gaussian codes, if, for some 3, 35) holds. If the maxima is unique, this becomes where ET v) ET v) < ET 1) ET 1) T v) = RH v + RH. So we want the Jensen ga of T v) for the ower to be small enough comared to the Jensen ga of T 1). We now give an examle of a fading distribution for which the above conditions can be verified. Let H be binary, taing values 1 and 10 with robability half and let v = 1/4. Let µ = 5/4, then for any values of P, the maximizer of 8) is at R = , cf. Figure 1, which corresonds in this case to the unique value of R for which 9) is satisfied. Hence if P is larger than this value of R, there is a corresonding fading BC for which the best Gaussian code slits the ower on U and V with R = to achieve the best murate with µ = 5/4. To fit the counter-examles with the choice of Hermite erturbations made reviously, we ic P = R. Finally, for these values of µ and R, 35) can be verified for = 8, cf. Figure, and the corresonding Hermite code along H 8 ) strictly outerforms any Gaussian codes. Note that we can consider other non-gaussian encoders, such as when U and V are indeendent with U Gaussian and Fig. 1. Gaussian mu-rate, i.e., exression 8), lotted as a function of R for µ = 5/4, v = 1/4, P = and H binary {1; 10}. Maxima at R = Fig.. LHS of 35) as a function of R, for µ = 5/4, v = 1/4, = 8 and H binary {1; 10}, ositive at R = V non-gaussian along Hermite s. Then, we get the following condition. If for 3 and R otimal for µ, we have ) RH E v + RH 36) [ ) RH ) ) R P H ] < µ E 1 + RH E P 1 + P H, 37) then Gaussian encoders are not otimal. Notice that revious inequality is stronger than the one in 35) for fixed values of the arameters. Yet, it can still be verified for valid values of the arameters and there are also codes with U Gaussian and V non-gaussian that outerform Gaussian codes for some degraded fading BCs.

10 Proof of Theorem 4: Let ε, δ > 0 and let X 1 and X be resectively distributed as g 1 + ε[h + δh 4 ]) and g 1 ε[h δh 4 ]), where 1,. We have IX 1, X 1 + ax + Z 1 ) = hx 1 + ax + Z 1 ) hax + Z 1 ) where X G are indeendent Gaussian 0-mean and -variance random variables. Hence, we need to evaluate the contribution of each divergence aearing in revious exression, in order to now if the erturbations are imroving on the Gaussian distributions. Let us first analyze hx 1 + ax + Z 1 ). The density of X 1 + ax + Z 1 is given by g 1 + ε[h + δh 4 ]) g a 1 ε[h δh 4 ]) g 1, 38) which, from Theorem, is equal to g +a +11+ [ ε{ + a + 1 [ a + a + 1 where εl}) ) H + δ ) H δ ) + a H 4] + 1 a ) + a H 4] + 1 L = g [H + δh 4 ] g a [H δh 4 ] g 1. g +a +1 Note that each direction in each line of the bracet { } above, including L, satisfy 10) and 11). Using Lemma 3, we have ) g [H + δh 4 ] g a a +1[ a L = +1 H a = C 1 H [+a +1] + C H [+a +1] 5 g +a +1 a +1) δh4 ] + C 3 H [+a +1] 8, 39) where C 1, C, C 3 are constants. Therefore, the density of X 1 + ax +Z 1 is a Gaussian g +a +1 erturbed along the direction H in the order ε and several H l with l in the order ε and other directions but that have a δ order). So we can use Lemma and write hx 1 + ax + Z 1 ) = hx G 1 + ax G + Z 1 ) DX 1 + ax + Z 1 X G 1 + ax G + Z 1 ) Using Lemma 1, we have DX 1 + ax + Z 1 X1 G + ax G + Z 1 ) [ ) ) = ε H + a + δ a H 4] + 1 [ a ) a ) + a H δ a H 4] + 1 ) = ε 1 a ) + a + ε + 1 oδ). Hence hx 1 + ax + Z 1 ) = hx1 G + ax G + Z 1 ) ) ε 1 a ) + a + ε + 1 oδ). Similarly, we get and DaX + Z 1 ax G + Z 1 ) = ε a ) a + ε + 1 oδ) IX 1, X 1 + ax + Z 1 ) = IX1 G, X1 G + ax G + Z 1 ) [ + ε a ) ) ] a 1 a ) a + ε + 1 oδ). Finally, we have and IX, X + ax 1 + Z ) = IX 1, X 1 + ax + Z 1 ) IX 1, X 1 + ax + Z 1 ) + IX, X + ax 1 + Z ) = IX1 G, X1 G + ax G + Z 1 ) + IX G, X G + ax1 G + Z ) + ε [ a a + 1 ) 1 a ) + a + 1 Hence, if for some 3 we have ) a a 1) a + 1 ) ] + ε oδ). + a + 1) > 0 40) we can imrove on the iid Gaussian distributions g by using the resective Hermite erturbations. Now, we could have started with X 1 and X distributed as g 1 + εb H ) and g 1 + εc H ), where H is defined in ). With similar exansions, we would then get that we can imrove on the Gaussian distributions if for some some b, c and 1, we have [ a ) ] a a ) a + 1) b + c ) ) a 4 + a b c > But the quadratic function b, c) R γb + c ) δbc, with δ > 0, can be made ositive if and only if γ +δ > 0, and is made so by taing b = c. Hence, the initial choice we made about X 1 and X is otimal. Moreover, note that for this distribution of X 1 and X, we could have actually chosen = as well. Because, even if Lemma tells us that we must use correction terms, these correction terms will cancel out when we consider the sum-rate, since b = c and since the correction is in ε. There is however another roblem when using =, which is that g 1 + εh ) has a larger second moment than. However, if we use a scheme of bloc length

11 , we can comensate this excess on the first channel use with the second channel use, and because of the symmetry, we can achieve the desired rate. But this is allowed only with synchronization. We could also have used erturbations that are mixtures of Hermite s, such as g 1 + ε b H ). We would then get mixtures of revious equations as our condition. But in the current roblem this will not be helful. Finally, erturbing iid Gaussian inuts in a indeendent but non i.d. way, i.e., to erturb different comonents in different Hermite directions, cannot imrove on our scheme, from revious arguments. The only otion which is not investigated here but in a wor in rogress), is to erturb iid Gaussian inuts in a non indeendent manner. Finally, if we wor with = 1, the roof sees the following modification. In 39), we now have a term in H. However, even if this term is in the order ε, we can no longer neglect it, since from Lemma, a ε H term in the direction comes out as a ε term in the entroy. Hence, we do not get the above condition for = 1, but the one obtained by relacing a 1) with a +1), and the condition for ositivity can never be fulfilled. Proof of Proosition 1: From Theorem 4, we now that when treating interference as noise and when F a, ) > 0, it is better to use encoders drawn from the dimensional distributions X 1 and X, where X 1 ) 1 g 1 + ε H ), X ) 1 g 1 ε H ), X 1 ) g 1 ε H ) and X ) g 1 + ε H ), as oosed to using Gaussian distributions. But erturbations in H are changing the second moment of the inut distribution. Hence, this scheme is mimicing a time-sharing in our local setting. Moreover, a direct comutation also allows to show that, constraining each user to use Gaussian inuts of arbitrarily bloc length n, with arbitrary covariances having a trace bounded by np, the otimal covariances are I n if F a, ) 0, and otherwise, are given by a time-sharing scheme cf. Definition 1 for the definition of a Gaussian time-sharing scheme and covariance matrices). Proof of Proosition : Note that when using blind time-sharing, no matter what the delay in the asynchronization of each user is, the users are interfering in n/4 channel uses and have each a non-intefering channel in n/4 channel uses the rest of the n/4 channel uses are not used by any users). Hence, if the receiver have the nowledge of the asynchronization delay, the following sum-rate can be achieved: 1 4 log1 + ) + log1 + 1+a )). And if the delay is unnown to the receivers, the revious sum-rate can surely not be imroved on. Disroof of Conjecture 1: This roof uses similar stes as revious roofs. Using Lemma 14), we exress IX; X + hx G 1 + Z) IX; X + hx 1 + Z). as DX + hx G 1 + Z X G + hx G 1 + Z) DX + hx 1 + Z X G + hx G 1 + Z) + DhX 1 + Z hx G 1 + Z). 41) We then ic X, X 1 g 1+ε H ) and assume that is even for now. We then have and Similarly, and Finally, and X + hx1 G + Z g 1 + εh ) g h +v = g +h +v1 + ε + h + v )/ H ) DX + hx G 1 + Z X G + hx G 1 + Z) = ε + h + v ). X + hx 1 + Z g 1 + εh ) g h 1 + H ) g v h = g 1 + εh ) g h +v1 + h + v )/ H ) g +h +v1 + ε + h + v )/ H h + ε + h + v )/ H ) DX + hx 1 + Z X G + hx G 1 + Z) = ε + h + v ) 1 + h ). hx 1 + Z g h 1 + εh ) g v h = g h +v1 + ε h + v )/ H ) DhX 1 + Z hx G 1 + Z) = ε h h + v ), Therefore, 41) is given by ) + h + v ) ) h + h 1 + h ) + + v h + o1) + v and if ) ) + h 1 + h ) + v + h + v ) h h > 0 4) + v

12 Fig. 3. for some even and greater than 4, we have a counter examle to the strong conjecture. Note that, using the same tric as in revious roofs, that is, erturbing along H instead of H, we get that if 4) holds for any 3, we have a counter examle to the strong conjecture. Defining u := v/ = 1/SNR, 4) is equivalent to Gh, u, ) := 1 + h ) 1 + h + u) ) 1 h ) > 0. 43) 1 + h + u h + u As shown in Figure 3, this can indeed haen. An interesting observation is that the range where 43) holds is broader when u is larger, i.e., when SNR is smaller. Indeed, when u = v = 0, which corresonds to droing the additive noise Z, we do not get a counter-examle to the conjecture. But in the resence of Gaussian noise, the conjecture does not hold for some distributions of X, X 1. The conjecture had been numerically checed with binary inuts at low SNR, and in this regime, it could not be disroved. With the hint described above, we checed numerically the conjecture with binary inuts at high SNR, and there we found counter-examles. VI. DISCUSSION We have develoed a technique to analyze codes drawn from non-gaussian ensembles using the Hermite olynomials. If the erformance of non-gaussian inuts is usually hard to analyze, we showed how with this tool, it reduces to the analysis of analytic ower series. This allowed us to show that Gaussian inuts are in general not otimal for degraded fading Gaussian BC, although they might still be otimal for many fading distributions. For the IC roblem, we found that in the asynchronous setting and when treating interference as noise, using non-gaussian code ensembles H 3 erturbations) can strictly imrove on using Gaussian ones, when the interference coefficient is above a given threshold, which significantly imroves on the existing threshold cf. [4]). We have also recovered the threshold of the moderate regime by using H erturbations in the synch setting, showing that this global threshold is reflected in our local setting. We also met mysteriously in our local setting the other global threshold found in [], [8], [10], below which treating interference as noise with iid Gaussian inuts is otimal. It is worth noting that this two global thresholds moderate regime and noisy interference) are recovered with our tool from a common analytic function. We hoe to understand this better with a wor in rogress. The Hermite technique rovides not only counter-examles to the otimality of Gaussian inuts but it also gives insight on the cometitive situations in Gaussian networ roblems. For examle, in the fading BC roblem, the Hermite technique gives a condition on what ind of fading distributions and degradedness values of v) non-gaussian inuts must be used. It also oints out that the erturbation in H 3 are most effective when carried in an oosite manner for the two users, so as to mae the distribution of X close to Gaussian. Finally, in a different context, local results could be lifted to corresonding global results in [1]. There, the localization is made with resect to the channels and not the inut distribution, yet, it would be interesting to comare the local with the global behavior for the current roblem too. The fact that we have observed some global results locally, as mentioned reviously, gives hoe for ossible local to global extensions. A wor in rogress aims to use our tool beyond the local setting, in articular, by analyzing all sub-gaussian distributions. Moreover, there are interesting connections between the results develoed in this aer and the roerties of the Ornstein- Uhlenbec rocess. Indeed, some of these roerties have already been used in [3] to solve the long standing entroy monotonicity conjecture, and we are currently investigating these relations from closer. ACKNOWLEDGMENT The authors would lie to than Tie Liu and Shlomo Shamai for ointing out roblems relevant to the alication of the roosed tool, Daniel Strooc for discussions on Hermite olynomials, and Emre Telatar for stimulating discussions and helful comments. REFERENCES [1] E. Abbe and L. Zheng, Linear universal decoding: a local to global geometric aroach, Submitted IEEE Trans. Inform. Theory, 008. [] V.S. Annaureddy and V.V. Veeravalli, Gaussian Interference Networ: sum Caacity in the Low Interference Regime and New Outer Bounds on the Caacity Region, Submitted IEEE Trans. Inform. Theory, 008. [3] S. Artstein, K. Ball, F. Barthe and A. Naor, Solution of Shannon s Problem on the Monotonicity of Entroy, Journal of the American Mathematical Society 17, ). [4] E. Calvo, J. Fonollosa, and J. Vidal, The Totally Asynchronous Interference Channel with Single-User Receivers, ISIT 009, Seoul. [5] M. Costa, On the Gaussian interference channel, IEEE Trans. Inform. Theory, vol. IT-31, , Set [6] T. M. Cover, Comments on broadcast channel, IEEE Trans. on Inform. Theory vol. 44, n. 6, , Oct

13 [7] T. M. Cover and J. A. Thomas, Elements of Information Theory, John Wiley & Sons, New Yor, NY, [8] A. S. Motahari, A. K. Khandani, Caacity Bounds for the Gaussian Interference Channel, CoRR abs/ : 008). [9] S. Shamai Shitz) and R. Laroia, The intersymbol interference channel: Lower bounds on caacity and channel recoding loss, IEEE Trans. Inform. Theory, vol. 4, , Set [10] X. Shang, G. Kramer, B. Chen, Outer bound and noisy-interference sum-rate caacity for symmetric Gaussian interference channels, CISS 008: [11] A.J. Stam, Some inequalities satisfied by the quantities of information of Fisher and Shannon, Information and Control, : , [1] D. W. Strooc, A Concise Introduction to the Theory of Integration, Third Edition, Birhäuser, [13] D. Tuninetti and S. Shamai, On two-user fading Gaussian broadcast channels with erfect channel state information at the receivers, Int. Sym. on Inform. Theory ISIT), 003.

Coding Along Hermite Polynomials for Gaussian Noise Channels

Coding Along Hermite Polynomials for Gaussian Noise Channels Coding Along Hermite olynomials for Gaussian Noise Channels Emmanuel A. Abbe IG, EFL Lausanne, 1015 CH Email: emmanuel.abbe@efl.ch Lizhong Zheng LIDS, MIT Cambridge, MA 0139 Email: lizhong@mit.edu Abstract

More information

ECE 534 Information Theory - Midterm 2

ECE 534 Information Theory - Midterm 2 ECE 534 Information Theory - Midterm Nov.4, 009. 3:30-4:45 in LH03. You will be given the full class time: 75 minutes. Use it wisely! Many of the roblems have short answers; try to find shortcuts. You

More information

Improved Capacity Bounds for the Binary Energy Harvesting Channel

Improved Capacity Bounds for the Binary Energy Harvesting Channel Imroved Caacity Bounds for the Binary Energy Harvesting Channel Kaya Tutuncuoglu 1, Omur Ozel 2, Aylin Yener 1, and Sennur Ulukus 2 1 Deartment of Electrical Engineering, The Pennsylvania State University,

More information

On the capacity of the general trapdoor channel with feedback

On the capacity of the general trapdoor channel with feedback On the caacity of the general tradoor channel with feedback Jui Wu and Achilleas Anastasooulos Electrical Engineering and Comuter Science Deartment University of Michigan Ann Arbor, MI, 48109-1 email:

More information

Convex Optimization methods for Computing Channel Capacity

Convex Optimization methods for Computing Channel Capacity Convex Otimization methods for Comuting Channel Caacity Abhishek Sinha Laboratory for Information and Decision Systems (LIDS), MIT sinhaa@mit.edu May 15, 2014 We consider a classical comutational roblem

More information

MATH 2710: NOTES FOR ANALYSIS

MATH 2710: NOTES FOR ANALYSIS MATH 270: NOTES FOR ANALYSIS The main ideas we will learn from analysis center around the idea of a limit. Limits occurs in several settings. We will start with finite limits of sequences, then cover infinite

More information

Some Results on the Generalized Gaussian Distribution

Some Results on the Generalized Gaussian Distribution Some Results on the Generalized Gaussian Distribution Alex Dytso, Ronit Bustin, H. Vincent Poor, Daniela Tuninetti 3, Natasha Devroye 3, and Shlomo Shamai (Shitz) Abstract The aer considers information-theoretic

More information

Improving on the Cutset Bound via a Geometric Analysis of Typical Sets

Improving on the Cutset Bound via a Geometric Analysis of Typical Sets Imroving on the Cutset Bound via a Geometric Analysis of Tyical Sets Ayfer Özgür Stanford University CUHK, May 28, 2016 Joint work with Xiugang Wu (Stanford). Ayfer Özgür (Stanford) March 16 1 / 33 Gaussian

More information

4. Score normalization technical details We now discuss the technical details of the score normalization method.

4. Score normalization technical details We now discuss the technical details of the score normalization method. SMT SCORING SYSTEM This document describes the scoring system for the Stanford Math Tournament We begin by giving an overview of the changes to scoring and a non-technical descrition of the scoring rules

More information

Elementary Analysis in Q p

Elementary Analysis in Q p Elementary Analysis in Q Hannah Hutter, May Szedlák, Phili Wirth November 17, 2011 This reort follows very closely the book of Svetlana Katok 1. 1 Sequences and Series In this section we will see some

More information

Topic: Lower Bounds on Randomized Algorithms Date: September 22, 2004 Scribe: Srinath Sridhar

Topic: Lower Bounds on Randomized Algorithms Date: September 22, 2004 Scribe: Srinath Sridhar 15-859(M): Randomized Algorithms Lecturer: Anuam Guta Toic: Lower Bounds on Randomized Algorithms Date: Setember 22, 2004 Scribe: Srinath Sridhar 4.1 Introduction In this lecture, we will first consider

More information

Inequalities for the L 1 Deviation of the Empirical Distribution

Inequalities for the L 1 Deviation of the Empirical Distribution Inequalities for the L 1 Deviation of the Emirical Distribution Tsachy Weissman, Erik Ordentlich, Gadiel Seroussi, Sergio Verdu, Marcelo J. Weinberger June 13, 2003 Abstract We derive bounds on the robability

More information

On the Secrecy Capacity of the Z-Interference Channel

On the Secrecy Capacity of the Z-Interference Channel On the Secrecy Capacity of the Z-Interference Channel Ronit Bustin Tel Aviv University Email: ronitbustin@post.tau.ac.il Mojtaba Vaezi Princeton University Email: mvaezi@princeton.edu Rafael F. Schaefer

More information

On Code Design for Simultaneous Energy and Information Transfer

On Code Design for Simultaneous Energy and Information Transfer On Code Design for Simultaneous Energy and Information Transfer Anshoo Tandon Electrical and Comuter Engineering National University of Singaore Email: anshoo@nus.edu.sg Mehul Motani Electrical and Comuter

More information

Finite Mixture EFA in Mplus

Finite Mixture EFA in Mplus Finite Mixture EFA in Mlus November 16, 2007 In this document we describe the Mixture EFA model estimated in Mlus. Four tyes of deendent variables are ossible in this model: normally distributed, ordered

More information

Uniformly best wavenumber approximations by spatial central difference operators: An initial investigation

Uniformly best wavenumber approximations by spatial central difference operators: An initial investigation Uniformly best wavenumber aroximations by satial central difference oerators: An initial investigation Vitor Linders and Jan Nordström Abstract A characterisation theorem for best uniform wavenumber aroximations

More information

Convolutional Codes. Lecture 13. Figure 93: Encoder for rate 1/2 constraint length 3 convolutional code.

Convolutional Codes. Lecture 13. Figure 93: Encoder for rate 1/2 constraint length 3 convolutional code. Convolutional Codes Goals Lecture Be able to encode using a convolutional code Be able to decode a convolutional code received over a binary symmetric channel or an additive white Gaussian channel Convolutional

More information

Analysis of some entrance probabilities for killed birth-death processes

Analysis of some entrance probabilities for killed birth-death processes Analysis of some entrance robabilities for killed birth-death rocesses Master s Thesis O.J.G. van der Velde Suervisor: Dr. F.M. Sieksma July 5, 207 Mathematical Institute, Leiden University Contents Introduction

More information

Combining Logistic Regression with Kriging for Mapping the Risk of Occurrence of Unexploded Ordnance (UXO)

Combining Logistic Regression with Kriging for Mapping the Risk of Occurrence of Unexploded Ordnance (UXO) Combining Logistic Regression with Kriging for Maing the Risk of Occurrence of Unexloded Ordnance (UXO) H. Saito (), P. Goovaerts (), S. A. McKenna (2) Environmental and Water Resources Engineering, Deartment

More information

HetNets: what tools for analysis?

HetNets: what tools for analysis? HetNets: what tools for analysis? Daniela Tuninetti (Ph.D.) Email: danielat@uic.edu Motivation Seven Ways that HetNets are a Cellular Paradigm Shift, by J. Andrews, IEEE Communications Magazine, March

More information

ON THE LEAST SIGNIFICANT p ADIC DIGITS OF CERTAIN LUCAS NUMBERS

ON THE LEAST SIGNIFICANT p ADIC DIGITS OF CERTAIN LUCAS NUMBERS #A13 INTEGERS 14 (014) ON THE LEAST SIGNIFICANT ADIC DIGITS OF CERTAIN LUCAS NUMBERS Tamás Lengyel Deartment of Mathematics, Occidental College, Los Angeles, California lengyel@oxy.edu Received: 6/13/13,

More information

Formal Modeling in Cognitive Science Lecture 29: Noisy Channel Model and Applications;

Formal Modeling in Cognitive Science Lecture 29: Noisy Channel Model and Applications; Formal Modeling in Cognitive Science Lecture 9: and ; ; Frank Keller School of Informatics University of Edinburgh keller@inf.ed.ac.uk Proerties of 3 March, 6 Frank Keller Formal Modeling in Cognitive

More information

2-D Analysis for Iterative Learning Controller for Discrete-Time Systems With Variable Initial Conditions Yong FANG 1, and Tommy W. S.

2-D Analysis for Iterative Learning Controller for Discrete-Time Systems With Variable Initial Conditions Yong FANG 1, and Tommy W. S. -D Analysis for Iterative Learning Controller for Discrete-ime Systems With Variable Initial Conditions Yong FANG, and ommy W. S. Chow Abstract In this aer, an iterative learning controller alying to linear

More information

Upper Bounds on the Capacity of Binary Intermittent Communication

Upper Bounds on the Capacity of Binary Intermittent Communication Upper Bounds on the Capacity of Binary Intermittent Communication Mostafa Khoshnevisan and J. Nicholas Laneman Department of Electrical Engineering University of Notre Dame Notre Dame, Indiana 46556 Email:{mhoshne,

More information

Robustness of classifiers to uniform l p and Gaussian noise Supplementary material

Robustness of classifiers to uniform l p and Gaussian noise Supplementary material Robustness of classifiers to uniform l and Gaussian noise Sulementary material Jean-Yves Franceschi Ecole Normale Suérieure de Lyon LIP UMR 5668 Omar Fawzi Ecole Normale Suérieure de Lyon LIP UMR 5668

More information

On the Optimality of Treating Interference as Noise in Competitive Scenarios

On the Optimality of Treating Interference as Noise in Competitive Scenarios On the Optimality of Treating Interference as Noise in Competitive Scenarios A. DYTSO, D. TUNINETTI, N. DEVROYE WORK PARTIALLY FUNDED BY NSF UNDER AWARD 1017436 OUTLINE CHANNEL MODEL AND PAST WORK ADVANTAGES

More information

arxiv: v1 [physics.data-an] 26 Oct 2012

arxiv: v1 [physics.data-an] 26 Oct 2012 Constraints on Yield Parameters in Extended Maximum Likelihood Fits Till Moritz Karbach a, Maximilian Schlu b a TU Dortmund, Germany, moritz.karbach@cern.ch b TU Dortmund, Germany, maximilian.schlu@cern.ch

More information

An Introduction to Information Theory: Notes

An Introduction to Information Theory: Notes An Introduction to Information Theory: Notes Jon Shlens jonshlens@ucsd.edu 03 February 003 Preliminaries. Goals. Define basic set-u of information theory. Derive why entroy is the measure of information

More information

New Information Measures for the Generalized Normal Distribution

New Information Measures for the Generalized Normal Distribution Information,, 3-7; doi:.339/info3 OPEN ACCESS information ISSN 75-7 www.mdi.com/journal/information Article New Information Measures for the Generalized Normal Distribution Christos P. Kitsos * and Thomas

More information

LDPC codes for the Cascaded BSC-BAWGN channel

LDPC codes for the Cascaded BSC-BAWGN channel LDPC codes for the Cascaded BSC-BAWGN channel Aravind R. Iyengar, Paul H. Siegel, and Jack K. Wolf University of California, San Diego 9500 Gilman Dr. La Jolla CA 9093 email:aravind,siegel,jwolf@ucsd.edu

More information

VARIANTS OF ENTROPY POWER INEQUALITY

VARIANTS OF ENTROPY POWER INEQUALITY VARIANTS OF ENTROPY POWER INEQUALITY Sergey G. Bobkov and Arnaud Marsiglietti Abstract An extension of the entroy ower inequality to the form N α r (X + Y ) N α r (X) + N α r (Y ) with arbitrary indeendent

More information

MATHEMATICAL MODELLING OF THE WIRELESS COMMUNICATION NETWORK

MATHEMATICAL MODELLING OF THE WIRELESS COMMUNICATION NETWORK Comuter Modelling and ew Technologies, 5, Vol.9, o., 3-39 Transort and Telecommunication Institute, Lomonosov, LV-9, Riga, Latvia MATHEMATICAL MODELLIG OF THE WIRELESS COMMUICATIO ETWORK M. KOPEETSK Deartment

More information

A Note on Guaranteed Sparse Recovery via l 1 -Minimization

A Note on Guaranteed Sparse Recovery via l 1 -Minimization A Note on Guaranteed Sarse Recovery via l -Minimization Simon Foucart, Université Pierre et Marie Curie Abstract It is roved that every s-sarse vector x C N can be recovered from the measurement vector

More information

The Graph Accessibility Problem and the Universality of the Collision CRCW Conflict Resolution Rule

The Graph Accessibility Problem and the Universality of the Collision CRCW Conflict Resolution Rule The Grah Accessibility Problem and the Universality of the Collision CRCW Conflict Resolution Rule STEFAN D. BRUDA Deartment of Comuter Science Bisho s University Lennoxville, Quebec J1M 1Z7 CANADA bruda@cs.ubishos.ca

More information

Participation Factors. However, it does not give the influence of each state on the mode.

Participation Factors. However, it does not give the influence of each state on the mode. Particiation Factors he mode shae, as indicated by the right eigenvector, gives the relative hase of each state in a articular mode. However, it does not give the influence of each state on the mode. We

More information

On Z p -norms of random vectors

On Z p -norms of random vectors On Z -norms of random vectors Rafa l Lata la Abstract To any n-dimensional random vector X we may associate its L -centroid body Z X and the corresonding norm. We formulate a conjecture concerning the

More information

HENSEL S LEMMA KEITH CONRAD

HENSEL S LEMMA KEITH CONRAD HENSEL S LEMMA KEITH CONRAD 1. Introduction In the -adic integers, congruences are aroximations: for a and b in Z, a b mod n is the same as a b 1/ n. Turning information modulo one ower of into similar

More information

LINEAR SYSTEMS WITH POLYNOMIAL UNCERTAINTY STRUCTURE: STABILITY MARGINS AND CONTROL

LINEAR SYSTEMS WITH POLYNOMIAL UNCERTAINTY STRUCTURE: STABILITY MARGINS AND CONTROL LINEAR SYSTEMS WITH POLYNOMIAL UNCERTAINTY STRUCTURE: STABILITY MARGINS AND CONTROL Mohammad Bozorg Deatment of Mechanical Engineering University of Yazd P. O. Box 89195-741 Yazd Iran Fax: +98-351-750110

More information

State Estimation with ARMarkov Models

State Estimation with ARMarkov Models Deartment of Mechanical and Aerosace Engineering Technical Reort No. 3046, October 1998. Princeton University, Princeton, NJ. State Estimation with ARMarkov Models Ryoung K. Lim 1 Columbia University,

More information

Homework Set #3 Rates definitions, Channel Coding, Source-Channel coding

Homework Set #3 Rates definitions, Channel Coding, Source-Channel coding Homework Set # Rates definitions, Channel Coding, Source-Channel coding. Rates (a) Channels coding Rate: Assuming you are sending 4 different messages using usages of a channel. What is the rate (in bits

More information

Elements of Asymptotic Theory. James L. Powell Department of Economics University of California, Berkeley

Elements of Asymptotic Theory. James L. Powell Department of Economics University of California, Berkeley Elements of Asymtotic Theory James L. Powell Deartment of Economics University of California, Berkeley Objectives of Asymtotic Theory While exact results are available for, say, the distribution of the

More information

Radial Basis Function Networks: Algorithms

Radial Basis Function Networks: Algorithms Radial Basis Function Networks: Algorithms Introduction to Neural Networks : Lecture 13 John A. Bullinaria, 2004 1. The RBF Maing 2. The RBF Network Architecture 3. Comutational Power of RBF Networks 4.

More information

Numerical Linear Algebra

Numerical Linear Algebra Numerical Linear Algebra Numerous alications in statistics, articularly in the fitting of linear models. Notation and conventions: Elements of a matrix A are denoted by a ij, where i indexes the rows and

More information

Some Unitary Space Time Codes From Sphere Packing Theory With Optimal Diversity Product of Code Size

Some Unitary Space Time Codes From Sphere Packing Theory With Optimal Diversity Product of Code Size IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 5, NO., DECEMBER 4 336 Some Unitary Sace Time Codes From Shere Packing Theory With Otimal Diversity Product of Code Size Haiquan Wang, Genyuan Wang, and Xiang-Gen

More information

A Social Welfare Optimal Sequential Allocation Procedure

A Social Welfare Optimal Sequential Allocation Procedure A Social Welfare Otimal Sequential Allocation Procedure Thomas Kalinowsi Universität Rostoc, Germany Nina Narodytsa and Toby Walsh NICTA and UNSW, Australia May 2, 201 Abstract We consider a simle sequential

More information

Distributed K-means over Compressed Binary Data

Distributed K-means over Compressed Binary Data 1 Distributed K-means over Comressed Binary Data Elsa DUPRAZ Telecom Bretagne; UMR CNRS 6285 Lab-STICC, Brest, France arxiv:1701.03403v1 [cs.it] 12 Jan 2017 Abstract We consider a networ of binary-valued

More information

Towards understanding the Lorenz curve using the Uniform distribution. Chris J. Stephens. Newcastle City Council, Newcastle upon Tyne, UK

Towards understanding the Lorenz curve using the Uniform distribution. Chris J. Stephens. Newcastle City Council, Newcastle upon Tyne, UK Towards understanding the Lorenz curve using the Uniform distribution Chris J. Stehens Newcastle City Council, Newcastle uon Tyne, UK (For the Gini-Lorenz Conference, University of Siena, Italy, May 2005)

More information

Estimation of the large covariance matrix with two-step monotone missing data

Estimation of the large covariance matrix with two-step monotone missing data Estimation of the large covariance matrix with two-ste monotone missing data Masashi Hyodo, Nobumichi Shutoh 2, Takashi Seo, and Tatjana Pavlenko 3 Deartment of Mathematical Information Science, Tokyo

More information

Approximating min-max k-clustering

Approximating min-max k-clustering Aroximating min-max k-clustering Asaf Levin July 24, 2007 Abstract We consider the roblems of set artitioning into k clusters with minimum total cost and minimum of the maximum cost of a cluster. The cost

More information

GOOD MODELS FOR CUBIC SURFACES. 1. Introduction

GOOD MODELS FOR CUBIC SURFACES. 1. Introduction GOOD MODELS FOR CUBIC SURFACES ANDREAS-STEPHAN ELSENHANS Abstract. This article describes an algorithm for finding a model of a hyersurface with small coefficients. It is shown that the aroach works in

More information

Multi-Operation Multi-Machine Scheduling

Multi-Operation Multi-Machine Scheduling Multi-Oeration Multi-Machine Scheduling Weizhen Mao he College of William and Mary, Williamsburg VA 3185, USA Abstract. In the multi-oeration scheduling that arises in industrial engineering, each job

More information

RANDOM WALKS AND PERCOLATION: AN ANALYSIS OF CURRENT RESEARCH ON MODELING NATURAL PROCESSES

RANDOM WALKS AND PERCOLATION: AN ANALYSIS OF CURRENT RESEARCH ON MODELING NATURAL PROCESSES RANDOM WALKS AND PERCOLATION: AN ANALYSIS OF CURRENT RESEARCH ON MODELING NATURAL PROCESSES AARON ZWIEBACH Abstract. In this aer we will analyze research that has been recently done in the field of discrete

More information

Cryptanalysis of Pseudorandom Generators

Cryptanalysis of Pseudorandom Generators CSE 206A: Lattice Algorithms and Alications Fall 2017 Crytanalysis of Pseudorandom Generators Instructor: Daniele Micciancio UCSD CSE As a motivating alication for the study of lattice in crytograhy we

More information

Positive decomposition of transfer functions with multiple poles

Positive decomposition of transfer functions with multiple poles Positive decomosition of transfer functions with multile oles Béla Nagy 1, Máté Matolcsi 2, and Márta Szilvási 1 Deartment of Analysis, Technical University of Budaest (BME), H-1111, Budaest, Egry J. u.

More information

Amin, Osama; Abediseid, Walid; Alouini, Mohamed-Slim. Institute of Electrical and Electronics Engineers (IEEE)

Amin, Osama; Abediseid, Walid; Alouini, Mohamed-Slim. Institute of Electrical and Electronics Engineers (IEEE) KAUST Reository Outage erformance of cognitive radio systems with Imroer Gaussian signaling Item tye Authors Erint version DOI Publisher Journal Rights Conference Paer Amin Osama; Abediseid Walid; Alouini

More information

Lecture 21: Quantum Communication

Lecture 21: Quantum Communication CS 880: Quantum Information Processing 0/6/00 Lecture : Quantum Communication Instructor: Dieter van Melkebeek Scribe: Mark Wellons Last lecture, we introduced the EPR airs which we will use in this lecture

More information

For q 0; 1; : : : ; `? 1, we have m 0; 1; : : : ; q? 1. The set fh j(x) : j 0; 1; ; : : : ; `? 1g forms a basis for the tness functions dened on the i

For q 0; 1; : : : ; `? 1, we have m 0; 1; : : : ; q? 1. The set fh j(x) : j 0; 1; ; : : : ; `? 1g forms a basis for the tness functions dened on the i Comuting with Haar Functions Sami Khuri Deartment of Mathematics and Comuter Science San Jose State University One Washington Square San Jose, CA 9519-0103, USA khuri@juiter.sjsu.edu Fax: (40)94-500 Keywords:

More information

On Wald-Type Optimal Stopping for Brownian Motion

On Wald-Type Optimal Stopping for Brownian Motion J Al Probab Vol 34, No 1, 1997, (66-73) Prerint Ser No 1, 1994, Math Inst Aarhus On Wald-Tye Otimal Stoing for Brownian Motion S RAVRSN and PSKIR The solution is resented to all otimal stoing roblems of

More information

The inverse Goldbach problem

The inverse Goldbach problem 1 The inverse Goldbach roblem by Christian Elsholtz Submission Setember 7, 2000 (this version includes galley corrections). Aeared in Mathematika 2001. Abstract We imrove the uer and lower bounds of the

More information

Complex Analysis Homework 1

Complex Analysis Homework 1 Comlex Analysis Homework 1 Steve Clanton Sarah Crimi January 27, 2009 Problem Claim. If two integers can be exressed as the sum of two squares, then so can their roduct. Proof. Call the two squares that

More information

Asymptotically Optimal Simulation Allocation under Dependent Sampling

Asymptotically Optimal Simulation Allocation under Dependent Sampling Asymtotically Otimal Simulation Allocation under Deendent Samling Xiaoing Xiong The Robert H. Smith School of Business, University of Maryland, College Park, MD 20742-1815, USA, xiaoingx@yahoo.com Sandee

More information

s v 0 q 0 v 1 q 1 v 2 (q 2) v 3 q 3 v 4

s v 0 q 0 v 1 q 1 v 2 (q 2) v 3 q 3 v 4 Discrete Adative Transmission for Fading Channels Lang Lin Λ, Roy D. Yates, Predrag Sasojevic WINLAB, Rutgers University 7 Brett Rd., NJ- fllin, ryates, sasojevg@winlab.rutgers.edu Abstract In this work

More information

arxiv:cond-mat/ v2 25 Sep 2002

arxiv:cond-mat/ v2 25 Sep 2002 Energy fluctuations at the multicritical oint in two-dimensional sin glasses arxiv:cond-mat/0207694 v2 25 Se 2002 1. Introduction Hidetoshi Nishimori, Cyril Falvo and Yukiyasu Ozeki Deartment of Physics,

More information

Model checking, verification of CTL. One must verify or expel... doubts, and convert them into the certainty of YES [Thomas Carlyle]

Model checking, verification of CTL. One must verify or expel... doubts, and convert them into the certainty of YES [Thomas Carlyle] Chater 5 Model checking, verification of CTL One must verify or exel... doubts, and convert them into the certainty of YES or NO. [Thomas Carlyle] 5. The verification setting Page 66 We introduce linear

More information

On a Markov Game with Incomplete Information

On a Markov Game with Incomplete Information On a Markov Game with Incomlete Information Johannes Hörner, Dinah Rosenberg y, Eilon Solan z and Nicolas Vieille x{ January 24, 26 Abstract We consider an examle of a Markov game with lack of information

More information

Sums of independent random variables

Sums of independent random variables 3 Sums of indeendent random variables This lecture collects a number of estimates for sums of indeendent random variables with values in a Banach sace E. We concentrate on sums of the form N γ nx n, where

More information

Generalized Writing on Dirty Paper

Generalized Writing on Dirty Paper Generalized Writing on Dirty Paper Aaron S. Cohen acohen@mit.edu MIT, 36-689 77 Massachusetts Ave. Cambridge, MA 02139-4307 Amos Lapidoth lapidoth@isi.ee.ethz.ch ETF E107 ETH-Zentrum CH-8092 Zürich, Switzerland

More information

Interactive Hypothesis Testing Against Independence

Interactive Hypothesis Testing Against Independence 013 IEEE International Symosium on Information Theory Interactive Hyothesis Testing Against Indeendence Yu Xiang and Young-Han Kim Deartment of Electrical and Comuter Engineering University of California,

More information

Training sequence optimization for frequency selective channels with MAP equalization

Training sequence optimization for frequency selective channels with MAP equalization 532 ISCCSP 2008, Malta, 12-14 March 2008 raining sequence otimization for frequency selective channels with MAP equalization Imed Hadj Kacem, Noura Sellami Laboratoire LEI ENIS, Route Sokra km 35 BP 3038

More information

Improved Bounds on Bell Numbers and on Moments of Sums of Random Variables

Improved Bounds on Bell Numbers and on Moments of Sums of Random Variables Imroved Bounds on Bell Numbers and on Moments of Sums of Random Variables Daniel Berend Tamir Tassa Abstract We rovide bounds for moments of sums of sequences of indeendent random variables. Concentrating

More information

Uniform Law on the Unit Sphere of a Banach Space

Uniform Law on the Unit Sphere of a Banach Space Uniform Law on the Unit Shere of a Banach Sace by Bernard Beauzamy Société de Calcul Mathématique SA Faubourg Saint Honoré 75008 Paris France Setember 008 Abstract We investigate the construction of a

More information

Research Article An iterative Algorithm for Hemicontractive Mappings in Banach Spaces

Research Article An iterative Algorithm for Hemicontractive Mappings in Banach Spaces Abstract and Alied Analysis Volume 2012, Article ID 264103, 11 ages doi:10.1155/2012/264103 Research Article An iterative Algorithm for Hemicontractive Maings in Banach Saces Youli Yu, 1 Zhitao Wu, 2 and

More information

On split sample and randomized confidence intervals for binomial proportions

On split sample and randomized confidence intervals for binomial proportions On slit samle and randomized confidence intervals for binomial roortions Måns Thulin Deartment of Mathematics, Usala University arxiv:1402.6536v1 [stat.me] 26 Feb 2014 Abstract Slit samle methods have

More information

General Linear Model Introduction, Classes of Linear models and Estimation

General Linear Model Introduction, Classes of Linear models and Estimation Stat 740 General Linear Model Introduction, Classes of Linear models and Estimation An aim of scientific enquiry: To describe or to discover relationshis among events (variables) in the controlled (laboratory)

More information

On Isoperimetric Functions of Probability Measures Having Log-Concave Densities with Respect to the Standard Normal Law

On Isoperimetric Functions of Probability Measures Having Log-Concave Densities with Respect to the Standard Normal Law On Isoerimetric Functions of Probability Measures Having Log-Concave Densities with Resect to the Standard Normal Law Sergey G. Bobkov Abstract Isoerimetric inequalities are discussed for one-dimensional

More information

Feedback-error control

Feedback-error control Chater 4 Feedback-error control 4.1 Introduction This chater exlains the feedback-error (FBE) control scheme originally described by Kawato [, 87, 8]. FBE is a widely used neural network based controller

More information

IMPROVED BOUNDS IN THE SCALED ENFLO TYPE INEQUALITY FOR BANACH SPACES

IMPROVED BOUNDS IN THE SCALED ENFLO TYPE INEQUALITY FOR BANACH SPACES IMPROVED BOUNDS IN THE SCALED ENFLO TYPE INEQUALITY FOR BANACH SPACES OHAD GILADI AND ASSAF NAOR Abstract. It is shown that if (, ) is a Banach sace with Rademacher tye 1 then for every n N there exists

More information

Research Article Controllability of Linear Discrete-Time Systems with Both Delayed States and Delayed Inputs

Research Article Controllability of Linear Discrete-Time Systems with Both Delayed States and Delayed Inputs Abstract and Alied Analysis Volume 203 Article ID 97546 5 ages htt://dxdoiorg/055/203/97546 Research Article Controllability of Linear Discrete-Time Systems with Both Delayed States and Delayed Inuts Hong

More information

AI*IA 2003 Fusion of Multiple Pattern Classifiers PART III

AI*IA 2003 Fusion of Multiple Pattern Classifiers PART III AI*IA 23 Fusion of Multile Pattern Classifiers PART III AI*IA 23 Tutorial on Fusion of Multile Pattern Classifiers by F. Roli 49 Methods for fusing multile classifiers Methods for fusing multile classifiers

More information

On Doob s Maximal Inequality for Brownian Motion

On Doob s Maximal Inequality for Brownian Motion Stochastic Process. Al. Vol. 69, No., 997, (-5) Research Reort No. 337, 995, Det. Theoret. Statist. Aarhus On Doob s Maximal Inequality for Brownian Motion S. E. GRAVERSEN and G. PESKIR If B = (B t ) t

More information

TRACES OF SCHUR AND KRONECKER PRODUCTS FOR BLOCK MATRICES

TRACES OF SCHUR AND KRONECKER PRODUCTS FOR BLOCK MATRICES Khayyam J. Math. DOI:10.22034/kjm.2019.84207 TRACES OF SCHUR AND KRONECKER PRODUCTS FOR BLOCK MATRICES ISMAEL GARCÍA-BAYONA Communicated by A.M. Peralta Abstract. In this aer, we define two new Schur and

More information

Brownian Motion and Random Prime Factorization

Brownian Motion and Random Prime Factorization Brownian Motion and Random Prime Factorization Kendrick Tang June 4, 202 Contents Introduction 2 2 Brownian Motion 2 2. Develoing Brownian Motion.................... 2 2.. Measure Saces and Borel Sigma-Algebras.........

More information

Introduction to MVC. least common denominator of all non-identical-zero minors of all order of G(s). Example: The minor of order 2: 1 2 ( s 1)

Introduction to MVC. least common denominator of all non-identical-zero minors of all order of G(s). Example: The minor of order 2: 1 2 ( s 1) Introduction to MVC Definition---Proerness and strictly roerness A system G(s) is roer if all its elements { gij ( s)} are roer, and strictly roer if all its elements are strictly roer. Definition---Causal

More information

COMMUNICATION BETWEEN SHAREHOLDERS 1

COMMUNICATION BETWEEN SHAREHOLDERS 1 COMMUNICATION BTWN SHARHOLDRS 1 A B. O A : A D Lemma B.1. U to µ Z r 2 σ2 Z + σ2 X 2r ω 2 an additive constant that does not deend on a or θ, the agents ayoffs can be written as: 2r rθa ω2 + θ µ Y rcov

More information

Lecture 10: Hypercontractivity

Lecture 10: Hypercontractivity CS 880: Advanced Comlexity Theory /15/008 Lecture 10: Hyercontractivity Instructor: Dieter van Melkebeek Scribe: Baris Aydinlioglu This is a technical lecture throughout which we rove the hyercontractivity

More information

Various Proofs for the Decrease Monotonicity of the Schatten s Power Norm, Various Families of R n Norms and Some Open Problems

Various Proofs for the Decrease Monotonicity of the Schatten s Power Norm, Various Families of R n Norms and Some Open Problems Int. J. Oen Problems Comt. Math., Vol. 3, No. 2, June 2010 ISSN 1998-6262; Coyright c ICSRS Publication, 2010 www.i-csrs.org Various Proofs for the Decrease Monotonicity of the Schatten s Power Norm, Various

More information

1 Extremum Estimators

1 Extremum Estimators FINC 9311-21 Financial Econometrics Handout Jialin Yu 1 Extremum Estimators Let θ 0 be a vector of k 1 unknown arameters. Extremum estimators: estimators obtained by maximizing or minimizing some objective

More information

Statics and dynamics: some elementary concepts

Statics and dynamics: some elementary concepts 1 Statics and dynamics: some elementary concets Dynamics is the study of the movement through time of variables such as heartbeat, temerature, secies oulation, voltage, roduction, emloyment, rices and

More information

Evaluating Circuit Reliability Under Probabilistic Gate-Level Fault Models

Evaluating Circuit Reliability Under Probabilistic Gate-Level Fault Models Evaluating Circuit Reliability Under Probabilistic Gate-Level Fault Models Ketan N. Patel, Igor L. Markov and John P. Hayes University of Michigan, Ann Arbor 48109-2122 {knatel,imarkov,jhayes}@eecs.umich.edu

More information

Elements of Asymptotic Theory. James L. Powell Department of Economics University of California, Berkeley

Elements of Asymptotic Theory. James L. Powell Department of Economics University of California, Berkeley Elements of Asymtotic Theory James L. Powell Deartment of Economics University of California, Berkeley Objectives of Asymtotic Theory While exact results are available for, say, the distribution of the

More information

The non-stochastic multi-armed bandit problem

The non-stochastic multi-armed bandit problem Submitted for journal ublication. The non-stochastic multi-armed bandit roblem Peter Auer Institute for Theoretical Comuter Science Graz University of Technology A-8010 Graz (Austria) auer@igi.tu-graz.ac.at

More information

Additive results for the generalized Drazin inverse in a Banach algebra

Additive results for the generalized Drazin inverse in a Banach algebra Additive results for the generalized Drazin inverse in a Banach algebra Dragana S. Cvetković-Ilić Dragan S. Djordjević and Yimin Wei* Abstract In this aer we investigate additive roerties of the generalized

More information

MA3H1 TOPICS IN NUMBER THEORY PART III

MA3H1 TOPICS IN NUMBER THEORY PART III MA3H1 TOPICS IN NUMBER THEORY PART III SAMIR SIKSEK 1. Congruences Modulo m In quadratic recirocity we studied congruences of the form x 2 a (mod ). We now turn our attention to situations where is relaced

More information

Infinite Number of Twin Primes

Infinite Number of Twin Primes dvances in Pure Mathematics, 06, 6, 95-97 htt://wwwscirorg/journal/am ISSN Online: 60-08 ISSN Print: 60-068 Infinite Number of Twin Primes S N Baibeov, Durmagambetov LN Gumilyov Eurasian National University,

More information

THE 2D CASE OF THE BOURGAIN-DEMETER-GUTH ARGUMENT

THE 2D CASE OF THE BOURGAIN-DEMETER-GUTH ARGUMENT THE 2D CASE OF THE BOURGAIN-DEMETER-GUTH ARGUMENT ZANE LI Let e(z) := e 2πiz and for g : [0, ] C and J [0, ], define the extension oerator E J g(x) := g(t)e(tx + t 2 x 2 ) dt. J For a ositive weight ν

More information

Topic 7: Using identity types

Topic 7: Using identity types Toic 7: Using identity tyes June 10, 2014 Now we would like to learn how to use identity tyes and how to do some actual mathematics with them. By now we have essentially introduced all inference rules

More information

A Proof of the Converse for the Capacity of Gaussian MIMO Broadcast Channels

A Proof of the Converse for the Capacity of Gaussian MIMO Broadcast Channels A Proof of the Converse for the Capacity of Gaussian MIMO Broadcast Channels Mehdi Mohseni Department of Electrical Engineering Stanford University Stanford, CA 94305, USA Email: mmohseni@stanford.edu

More information

1 Gambler s Ruin Problem

1 Gambler s Ruin Problem Coyright c 2017 by Karl Sigman 1 Gambler s Ruin Problem Let N 2 be an integer and let 1 i N 1. Consider a gambler who starts with an initial fortune of $i and then on each successive gamble either wins

More information

System Reliability Estimation and Confidence Regions from Subsystem and Full System Tests

System Reliability Estimation and Confidence Regions from Subsystem and Full System Tests 009 American Control Conference Hyatt Regency Riverfront, St. Louis, MO, USA June 0-, 009 FrB4. System Reliability Estimation and Confidence Regions from Subsystem and Full System Tests James C. Sall Abstract

More information

MATH 361: NUMBER THEORY EIGHTH LECTURE

MATH 361: NUMBER THEORY EIGHTH LECTURE MATH 361: NUMBER THEORY EIGHTH LECTURE 1. Quadratic Recirocity: Introduction Quadratic recirocity is the first result of modern number theory. Lagrange conjectured it in the late 1700 s, but it was first

More information