Probability Bounds for Two-Dimensional Algebraic Lattice Codes
|
|
- Samantha Freeman
- 6 years ago
- Views:
Transcription
1 Noname manuscript No. (will be inserted by the editor) Probability Bounds for Two-Dimensional Algebraic Lattice Codes David A. Karpuk, Member, IEEE Camilla Hollanti, Member, IEEE Emanuele Viterbo, Fellow, IEEE the date of receipt and acceptance should be inserted later Abstract In this paper we provide easily computable probability bounds for the correct decision for an eavesdropper, over a fast fading channel, when coset coding using two-dimensional algebraic lattices is employed. These bounds are stated in terms of the group of units and Dedekind zeta function of the underlying number field. Keywords fading channel wiretap channel number fields lattices unit group Dedekind zeta function 1 Introduction Lattices and lattice codes provide an efficient and robust means for many applications in wireless communications [11]. In particular, number field lattice codes have been applied to Gaussian and fading wiretap channels [7, 9, 10, 4, 3], where number theoretic invariants allow one to perform analysis using algebraic data. In addition, lattice codes from totally real number fields exhibit full diversity. In [7], the authors estimate the probability of the correct decision of an eavesdropper, for lattice codes coming from number fields whose ring of integers is a principal ideal domain (PID). We improve on and generalize these The research of D. Karpuk and C. Hollanti is supported by the Emil Aaltonen Foundation s Young Researcher s Project, and by the Academy of Finland grant # Part of this work was performed at the Monash Software Defined Telecommunications Lab and was supported by the Monash Professional Fellowship and the Australian Research Council under Discovery grants ARC DP D. Karpuk and C. Hollanti are with the Department of Mathematics and System Analysis, P.O. Box 11100, FI Aalto University, Finland. davekarpuk@aalto.fi, camilla.hollanti@aalto.fi E. Viterbo is with the Department of Electrical and Computer System Engineering, Monash University, Clayton, VIC 3800, Australia. emanuele.viterbo@monash.edu
2 2 David A. Karpuk, Member, IEEE et al. results for two-dimensional number field lattice codes. In particular, we provide easily computable estimates for this probability for lattices coming from arbitrary degree two number fields, and compare these new estimates with those of [7], where the new estimates are shown to perform better. Similar purely number theoretic work has also been carried out in [6] and [5] on estimating the number of algebraic integers of bounded height. In the realm of information theory, related work has been done by Vehkalahti and Lu in [12 14], where a connection is demonstrated between the unit group and the diversity-multiplexing gain trade-off of division algebra-based spacetime codes via inverse determinant sums. Subsequent work in [15] explores this relation further, showing that the density of unit group completely determines the growth of the inverse determinant sum. Our estimates are similarly based on the growth of the unit group, but our goal is to make such estimates as explicit as possible, while providing theoretical tools which can ideally be used to generalize these results to higher dimensions. Lastly, we provide asymptotic analysis of the estimates of [7], and show that the estimates remain accurate as the size of the underlying constellation increases. Numerical data is provided for examples of number field lattice codes coming from number fields whose ring of integers is not a PID, for which the results of [7] do not apply. The reader can see the performance of our new bounds explicitly from the experimental results. 2 Lattices and Coset Coding A lattice Λ is a discrete abelian subgroup of a real vector space, and can be described as the set M Z n, where M M n (R) is the generator matrix for the lattice. The rank of the lattice is the rank of the matrix M. Lattices and lattice codes are ubiquitous in the study of fading channels; see [11]. In a wiretap channel, Alice is transmitting confidential data to the intended receiver Bob over a fading channel, while an eavesdropper Eve tries to intercept the data received over another fading channel. Following [2], we model this channel by the equations y b = H b x + z b, y e = H e x + z e (1) where y b R n is Bob s received vector, and z b is Bob s noise vector, assumed to be zero-mean Gaussian with variance σb 2. Bob s channel matrix is of the form H b = diag( h b,i ) for h b C n whose entries h b,i are complex zero-mean Gaussian random variables, so that the non-zero entries of H b are Rayleigh distributed fading coefficients. The quantities in the second equation are the corresponding variables for Eve s channel. The intended signal is x R n. We assume that both Bob and Eve have perfect channel state information, while Alice has none. The security of the fading wiretap channel is based on the assumption that Bob s SNR is sufficiently large compared to Eve s SNR, that is, that σb 2 >> σ2 e. Alice exploits these physical conditions by using a coset coding strategy [16] in order to confuse Eve. Alice s coding strategy begins by
3 Probability Bounds for Two-Dimensional Algebraic Lattice Codes 3 choosing a lattice Λ b containing information symbols intended for Bob, and a sublattice Λ e containing random information intended to confuse Eve. Alice s codebook consists cosets of Λ e in Λ b. To transmit, Alice chooses a codeword c and a random vector r Λ e and then sends the signal x = c + r c + Λ e, (2) where c contains the data bits and r embeds the random bits. Eve s SNR is assumed sufficiently large so that she can decode r perfectly. However, the codewords c belong to a finer lattice, and thus it is much more unlikely that Eve can correctly decode c. By [2] the expression P c,e for the average probability of Eve correctly decoding c over a fast fading channel is approximately ( ) n/2 1 P c,e Vol(Λ b ) 4γ 2 e n x Λ e i=1 x i 0 1 x i 3, (3) where γ e is Eve s average SNR over the n channels. Our goal is to approximate n 1 x Λ e i=1,x i 0 x i for algebraic lattices when n = Number Theoretic Background We assume the reader is familiar with basic algebraic structures such as fields, rings, and ideals. The definitions presented here generalize to arbitrary number fields, but for the purpose of eliminating unnecessary theoretical machinery we have simplified them for real quadratic number fields. We recommend [8] as a blanket reference for all necessary number theoretic results. A real quadratic number field is a field K = Q( d) = {a + b d : a, b Q} for a square-free positive integer d. The ring of integers O K of K is the set {a + bω : a, b Z}, where { (1 + d)/2 if d 1 mod 4 ω = (4) d otherwise. One can easily verify that O K has rank 2 as an abelian group. The discriminant D K of K is { d if d 1 mod 4 D = D K = (5) 4d otherwise. Given an ideal a of O K, it can be factored uniquely into prime ideals p i, in much the same way one factors integers: a = p e1 1 peg g. The ideal (p) of O K may no longer be prime, but it can be factored into prime ideals, and the possibilities for the factorization of (p) in O K are: (p) is prime iff (p, D) = 1, D y 2 (mod p), for any y Z (p) = pq, p q iff (p, D) = 1, D y 2 (mod p), for some y Z (6) iff p D. p 2
4 4 David A. Karpuk, Member, IEEE et al. In the first case we say that p is inert in K, in the second that p splits in K, and in the third that p ramifies in K. If a prime ideal p of O K appears in the factorization of (p), we say that p divides p, which we denote by p p. Example 1 Let K = Q( 10). The discriminant of K Is D = 40, thus the primes that ramify in K are p = 2, 5. In fact, we have the prime factorizations (2) = p 2 2, p 2 = (2, 10), and (7) (5) = p 2 5, p 5 = (5, 10). (8) If p = 13 we have (mod 13), hence the prime 13 splits in O K : (13) = pq, p = (13, ), q = (13, 6 10). (9) We can describe the structure of the group of units O K of the ring O K explicitly as follows. There is a unit ɛ O K such that O K = ±ɛ Z 2 Z, which is called a fundamental unit for K. The fundamental unit can be chosen (up to multiplication by ±1) such that among all u O K with the property that u > 1, ɛ is minimal. The regulator of K is defined to be ρ K = log ɛ. The regulator of K measures the density of the units of O K in R. Let σ : K K be the function σ(a + b d) = a b d. We use σ to define the field norm N : K Q, by N(x) = x σ(x). If x O K, then N(x) Z. One can use the field norm to classify units in O K, in that for x O K, we have N(x) = ±1 if and only if x O K. Example 2 Let us continue with the example of K = Q( 10). If ɛ = a + b 10 is a fundamental unit for K, we see by taking norms that a and b must satisfy ±1 = ɛ σ(ɛ) = (a + b 10)(a b 10) = a 2 b (10) From this equation, one can show that ɛ = is a fundamental unit for K. Therefore ρ K = log ɛ = Suppose that p is a prime ideal of O K such that p p for a prime number p Z. The ideal norm of p is { p N(p) = 2 if p is inert in K p otherwise (11) One can extend this definition to any ideal a of O K by using prime factorization. If a = p e1 1 peg g, then N(a) = N(p 1 ) e1 N(p g ) eg (12) The two definitions of norm coincide for principal ideals, in the sense that if a = (x) is principal, then N(a) = N(x). The Dedekind zeta function of a number field K is defined by ζ K (s) = a O K 1 N(a) s = k 1 a k k s, (13)
5 Probability Bounds for Two-Dimensional Algebraic Lattice Codes 5 where a runs over the nonzero ideals of O K, and a k denotes the number of ideals of O K of norm k. We will only be interested in values of ζ K (s) for s R, s > 1, where classical results guarantee convergence. The partial Dedekind zeta function of a number field K is defined by ζ 1 K(s) = 1 N(a ) s = a 1 k k s (14) a O K k 1 where a runs over the nonzero principal ideals of O K, and a 1 k denotes the number of principal ideals of O K of norm k. Again, classical results guarantee that this series converges for s R, s > 1. 4 Algebraic Lattice Codes Let K = Q( d) be a real quadratic field. The canonical embedding ψ : K R 2 is defined by ψ(x) = (x, σ(x)). The set ψ(o K ) is a lattice in R 2, which we call an algebraic lattice. We apply algebraic lattices to wiretap channels by setting Eve s lattice to be Λ = Λ e = ψ(o K ). We will carve a square constellation centered at the origin of R 2 from the lattice Λ, by using a bounding box B of side length 2R for some R > 0. In order to classify algebraic integers in B, we define the height of x O K to be H(x) = max{ x, σ(x) }. (15) Our constellation is then the set {ψ(x) Λ : H(x) R}. When using an algebraic lattice, one sees by (3) that the corresponding probability of Eve s correct decision is proportional to the inverse norm sum S K,R (s) = 0<H(x) R 1 N(x) s = k 1 b k,r k s (16) when s = 3, where we have truncated the inverse norm sum to reflect the fact that we are using a finite constellation. In the above expression b k,r denotes the number of algebraic integers with norm ±k and height bounded above by R. Note that for k > R 2, we have b k,r = 0 as N(x) = x σ(x) (max{ x, σ(x) }) 2 = H(x) 2. 5 Lower and Upper Bounds for S K,R (s) We present bounds for S K,R (s) when s > 1. These apply to the wiretap channel when s = 3, and to the pairwise error probability when s = 2 [11]. To obtain a lower bound for the value of S K,R (s), we truncate it after the first term. From (16) we see that S K,R (s) b 1,R, where b 1,R is the number of units of O K with height bounded above by R. As the main contribution to S K,R (s) comes from the units, it is beneficial to have a closed-form expression for b 1,R.
6 6 David A. Karpuk, Member, IEEE et al. Fig. 1 On the left, the points of the lattice ψ(o K ) for K = Q( 5) with a bounding box of side length 10, lying on the hyperbolas xy = ±k. On the right, the same lattice points after applying the transformation X = log x, Y = log y, lying on the lines X + Y = log k. To establish an explicit formula for b 1,R, we apply the 2-to-1 mapping X = log x, Y = log y to our lattice Λ. The image of O K is a 1-dimensional lattice in R 2 living on the line X + Y = 0, which we will call Λ log (see Fig. 1). The volume of the lattice Λ log is 2ρ K. We will denote by log B = (, log(r)] 2 the image of the bounding box under the log transformation. Proposition 1 For all s we have the lower bound log(r) b 1,R = S K,R (s). (17) ρ K Proof First, note that b 1,R /2 is the number of points of Λ log inside log B. By projecting Λ log onto the horizontal axis, one can see that b 1,R /2 is the number of multiples of ρ K in the interval [ log(r), log(r)]. Including the origin, this is equal to 2 log(r)/ρ K + 1, and the result follows. Proposition 2 For all s we have the upper bound b 1,R ζ 1 K(s) > S K,R (s). (18) Proof We have the trivial bound b k,r a 1 k b 1,R, hence S K,R (s) = k 1 b k,r k s b 1,R k 1 a 1 k k s = b 1,Rζ 1 K(s). (19) Note that the only term in b 1,R and b 1,R ζ 1 K (s) that depends on R is log(r), thus it is easy to measure how these bounds vary as the size of the constellation changes. In [7], bounds on S K,R (s) were presented in terms of bounded-height Dedekind zeta functions for number fields whose rings of integers are PIDs. However, the above bounds apply to all real quadratic number fields.
7 Probability Bounds for Two-Dimensional Algebraic Lattice Codes 7 6 Approximating the Inverse Norm Power Sum In this section we recall the method of [7] for approximating the sum S K,R (s). Two elements of O K generate the same principal ideal if and only if they differ multiplicatively by a unit. It follows that the intersection of log ψ(o K ) and the line X + Y = log k is the union of a 1 k translates of Λ log. We also have vol (log B (X + Y = log k)) = 2 log(r 2 /k) (20) Following [7], we arrive at the approximation of b k,r by a quantity n k,r obtained by dividing this volume by the volume of Λ log (and multiplying by 2a 1 k ), as well as an approximation of the inverse norm sum by a quantity N K,R (s): b k,r n k,r := 2a 1 log(r 2 /k) k, S K,R (s) N K,R (s) := ρ K R 2 n k,r k s. (21) The main difficulty in computing n k,r lies in calculating a 1 k. Here we present an algorithm for listing all ideals of O K which have norm k, from which one can compute a 1 k by using a known algorithm to check whether these ideals are principal (such algorithms are implemented in SAGE [1]). Fix an integer k > 1 and factor it into primes as k = p e1 1 pen n. Suppose that a O K is an ideal such that N(a) = k, with unique factorization a = p f1 1 pfm m into prime ideals. Taking norms, we have p e1 1 pen n = k = N(p 1 ) f1 N(p m ) fm. (22) By unique factorization of integers, we see that every p appearing in the factorization of a divides some p appearing in the factorization of k. Suppose that p k and that p is inert in K, so that for p p we have N(p) = p 2. For a to exist, we must then have that p divides k an even number of times. If this condition holds, then p = (p) is obviously principal, hence it can be ignored in determining whether or not a is principal. Let us assume that all inert primes dividing k do so an even number of times. We now make a list of all possible ideals of O K which have norm k, by selecting from each split prime p si (counting multiplicities) one of the two prime ideals p si dividing it, and for each ramified prime p rj (counting multiplicities), the unique prime ideal p rj dividing it. We then compute whether or not the ideal p s1 p sn p r1 p rm is principal. The total number of principal ideals we obtain this way is a 1 k. Example 3 Let K = Q( 229), and let k = 225 = In K the ideals (3) and (5) both split, and we have factorizations ( ) ( ) (3) = p 3 q 3, p 3 = 3, (1 229)/2, q 3 = ( (5) = p 5 q 5, p 5 = 5, (7 ) 229)/2, q 5 = 3, ( )/2 ( 5, (7 + ) 229)/2 (23) (24)
8 8 David A. Karpuk, Member, IEEE et al. thus the list of all ideals of norm k is p 2 3p 2 5, p 3 q 3 p 2 5, q 2 3p 2 5, p 2 3p 5 q 5, p 3 q 3 p 5 q 5, q 2 3p 5 q 5, p 2 3q 2 5, p 3 q 3 q 2 5, q 2 3q 2 5. (25) Exactly three of these ideals are principal, so that a = 3. Specifically, p 2 3q 2 5 = (2 229), p 3 q 3 q 2 5 = ( ), p 3 q 3 p 5 q 5 = (15). (26) 7 Bounding the Error and Asymptotic Behavior In this section, we bound the absolute error of the estimate of the previous section, by providing a bound b k,r n k,r for all k. We then combine these estimates to provide a bound on S K,R (s) N K,R (s) independent of R. Proposition 3 We have the bound b k,r n k,r < 2a 1 k for all k and all R. Proof Let L k be the intersection of the line X + Y = log k and the image of the bounding box under the log transformation. Then we can find ε such that 0 < ε < vol(λ log ) and vol(l k ) (b k,r /2 a 1 k)vol(λ log ) + 2a 1 kε. (27) That is, L k can be written of a union of at most (b k,r a 1 k ) translates of the fundamental region of Λ log, and 2a 1 k smaller regions which appear at the boundary. Therefore n k,r = 2a 1 vol(l k ) k vol(λ log ) 2(b k,r/2 a 1 k )vol(λ log) + 2a 1 k ε vol(λ log ) (28) = b k,r 2a 1 k + 4a 1 kε/vol(λ log ) < b k,r + 2a 1 k (29) which implies that n k,r b k,r < 2a 1 k. Now, note that ( ) b k,r a 1 vol(lk ) k 2 vol(λ log ) + 1 = n k,r + a 1 2 k, (30) which one can see by counting how many lattice points can fit inside L k. Therefore b k,r n k,r < 2a 1 k, which implies that b k,r n k,r < 2a 1 k. Proposition 4 We have S K,R (s) N K,R (s) < 2ζ 1 K (s). Proof Using the previous proposition, we have R 2 R S K,R (s) N K,R (s) = b 2 k,r n k,r k s k s < 2 R 2 a 1 k k s < 2 R 2 b k,r n k,r k s (31) a 1 k k s = 2ζ1 K(s). (32)
9 Probability Bounds for Two-Dimensional Algebraic Lattice Codes 9 As the quantity ζk 1 (s) is independent of R, we see that S K,R (s) N K,R (s) S K,R (s) < 2ζ1 K (s) S K,R (s) 0 (33) as R. That is, the relative error of the approximation of [7] goes to zero as the size of the bounding box (i.e. constellation) increases. From the bounds b 1,R S K,R (s) b 1,R ζk 1 (s) one can conclude that S K,R (s) C ρ K log(r) + O(1) (34) as R, where C is an absolute constant, and the O(1) term depends only on K and s. In [14], it is shown that inverse determinant sums exhibit similar behavior, in that they are bounded above and below by terms of the form C log(r). However, we have made our constants explicit. 8 Experimental Results We now present examples to demonstrate the accuracy of the bounds b 1,R and b 1,R ζ 1 K (s), and the approximation N K,R(s) for s = 3 (the wiretap case), for the fields Q( 5), Q( 10), and Q( 229). As we have seen, the second and third fields both have the property that their rings of integers are not PIDs. K = Q( 5) : K = Q( 10) : K = Q( 229) : log(r) b 1,R S K,R (3) b 1,R ζk 1 (3) N K,R(3) log(r) b 1,R S K,R (3) b 1,R ζk 1 (3) N K,R(3) log(r) b 1,R S K,R (3) b 1,R ζk 1 (3) N K,R(3)
10 10 David A. Karpuk, Member, IEEE et al. If u O K and u ±1, then the four distinct elements ±u, ±σ(u) all have the same height. As the main contribution to the sum S K,R (s) comes from the group O K, this explains why the value of S K,R(s) jumps by approximately 4 as R increases. 9 Conclusions and Future Work We have provided probability bounds for the correct decision of an eavesdropper over a fast fading channel, when two-dimensional number field lattice codes are used. We have shown via experiment that these bounds outperform the previous estimate of [7]. Furthermore, we have generalized this approximation to arbitrary two-dimensional algebraic lattice codes, by providing an algorithm for calculating the number of principal ideals of a fixed norm. Lastly, we have provided asymptotic analysis of the estimate of the inverse norm sum presented in [7]. Future work will involve generalizing the calculation of a 1 k and providing analogous estimates for higher-dimensional totally real number fields. We also hope to generalize these results to fading MIMO wiretap channels, where a similar analysis of the group of units in a central simple algebra will be necessary. References 1. Sage open source mathematics software system. URL 2. Belfiore, J.C., Oggier, F.: Lattice code design for the rayleigh fading wiretap channel. In: ICC 2011 (2011). Arxiv.org/pdf/ Belfiore, J.C., Oggier, F.E.: Secrecy gain: A wiretap lattice code design. In: ISITA, pp (2010) 4. Belfiore, J.C., Solé, P.: Unimodular lattices for the gaussian wiretap channel. CoRR, abs/ , Everest, G., Loxton, J.: Counting algebraic units with bounded height. J. Number Theory 44, (1993) 6. Everest, G.R.: On the solution of the norm-form equation. Amer. J. Math. 114(3), (1992) 7. Hollanti, C., Viterbo, E., Karpuk, D.: Nonasymptotic Probability Bounds for Fading Channels Exploiting Dedekind Zeta Functions (2012). Submitted 8. Lang, S.: Algebraic number theory. Springer-Verlag New York Inc. (1986) 9. Leung-Yan-Cheong, S., Hellman, M.: The gaussian wire-tap channel. Information Theory, IEEE Transactions on 24(4), (1978). DOI /TIT Oggier, F., Solé, P., Belfiore, J.C.: Lattice codes for the wiretap gaussian channel: Construction and analysis Submitted to IEEE Trans. Inf. Theory, 2011, arxiv.org/abs/ Oggier, F., Viterbo, E.: Algebraic number theory and code design for rayleigh fading channels. Commun. Inf. Theory 1(3), (2004). DOI Vehkalahti, R., Lu, H.F.F.: An algebraic look into MAC-DMT of lattice space-time codes. In: Proc. IEEE ISIT Vehkalahti, R., Lu, H.F.F.: Diversity-multiplexing gain tradeoff: a tool in algebra? In: IEEE ITW (2011) 14. Vehkalahti, R., Lu, H.F.F.: Inverse determinant sums and connections between fading channel information theory and algebra. IEEE Trans. Inf. Theory (2011). Submitted
11 Probability Bounds for Two-Dimensional Algebraic Lattice Codes Vehkalahti, R., Luzzi, L.: Connecting dmt of division algebra space-time codes and point counting in lie groups. In: Proc. IEEE ISIT 2011 (2012) 16. Wyner, A.: The wire-tap channel. Bell. Syst. Tech. Journal 54 (1975)
Probability Bounds for Two-Dimensional Algebraic Lattice Codes
Probability Bounds for Two-Dimensional Algebraic Lattice Codes David Karpuk Aalto University April 16, 2013 (Joint work with C. Hollanti and E. Viterbo) David Karpuk (Aalto University) Probability Bounds
More informationFULL rate and full diversity codes for the coherent
1432 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 51, NO. 4, APRIL 2005 The Golden Code: A 2 2 Full-Rate Space Time Code With Nonvanishing Determinants Jean-Claude Belfiore, Member, IEEE, Ghaya Rekaya,
More informationLattices for Communication Engineers
Lattices for Communication Engineers Jean-Claude Belfiore Télécom ParisTech CNRS, LTCI UMR 5141 February, 22 2011 Nanyang Technological University - SPMS Part I Introduction Signal Space The transmission
More informationLattices and Lattice Codes
Lattices and Lattice Codes Trivandrum School on Communication, Coding & Networking January 27 30, 2017 Lakshmi Prasad Natarajan Dept. of Electrical Engineering Indian Institute of Technology Hyderabad
More informationOn the Robustness of Algebraic STBCs to Coefficient Quantization
212 Australian Communications Theory Workshop (AusCTW) On the Robustness of Algebraic STBCs to Coefficient Quantization J. Harshan Dept. of Electrical and Computer Systems Engg., Monash University Clayton,
More informationConstruction of Barnes-Wall Lattices from Linear Codes over Rings
01 IEEE International Symposium on Information Theory Proceedings Construction of Barnes-Wall Lattices from Linear Codes over Rings J Harshan Dept of ECSE, Monh University Clayton, Australia Email:harshanjagadeesh@monhedu
More informationFuchsian codes with arbitrary rates. Iván Blanco Chacón, Aalto University
20-09-2013 Summary Basic concepts in wireless channels Arithmetic Fuchsian groups: the rational case Arithmetic Fuchsian groups: the general case Fundamental domains and point reduction Fuchsian codes
More informationAlgebraic Methods for Wireless Coding
Algebraic Methods for Wireless Coding Frédérique Oggier frederique@systems.caltech.edu California Institute of Technology UC Davis, Mathematics Department, January 31st 2007 Outline The Rayleigh fading
More informationApplications of Lattices in Telecommunications
Applications of Lattices in Telecommunications Dept of Electrical and Computer Systems Engineering Monash University amin.sakzad@monash.edu Oct. 2013 1 Sphere Decoder Algorithm Rotated Signal Constellations
More informationOn the Performance of. Golden Space-Time Trellis Coded Modulation over MIMO Block Fading Channels
On the Performance of 1 Golden Space-Time Trellis Coded Modulation over MIMO Block Fading Channels arxiv:0711.1295v1 [cs.it] 8 Nov 2007 Emanuele Viterbo and Yi Hong Abstract The Golden space-time trellis
More informationSecure Degrees of Freedom of the MIMO Multiple Access Wiretap Channel
Secure Degrees of Freedom of the MIMO Multiple Access Wiretap Channel Pritam Mukherjee Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland, College Park, MD 074 pritamm@umd.edu
More informationError control of line codes generated by finite Coxeter groups
Error control of line codes generated by finite Coxeter groups Ezio Biglieri Universitat Pompeu Fabra, Barcelona, Spain Email: e.biglieri@ieee.org Emanuele Viterbo Monash University, Melbourne, Australia
More informationOn the Use of Division Algebras for Wireless Communication
On the Use of Division Algebras for Wireless Communication frederique@systems.caltech.edu California Institute of Technology AMS meeting, Davidson, March 3rd 2007 Outline A few wireless coding problems
More informationInverse Determinant Sums and Connections. Between Fading Channel Information Theory and Algebra
Inverse Determinant Sums and Connections Between Fading Channel Information Theory and Algebra Roope Vehkalahti, Hsiao-feng (Francis) Lu, Member, IEEE, Laura Luzzi, Member, IEEE arxiv:.6289v4 [cs.it] 0
More informationAlgebraic Multiuser Space Time Block Codes for 2 2 MIMO
Algebraic Multiuser Space Time Bloc Codes for 2 2 MIMO Yi Hong Institute of Advanced Telecom. University of Wales, Swansea, UK y.hong@swansea.ac.u Emanuele Viterbo DEIS - Università della Calabria via
More informationThis document is downloaded from DR-NTU, Nanyang Technological University Library, Singapore.
This document is downloaded from DR-NTU, Nanyang Technological University Library, Singapore. Title A family of fast-decodable MIDO codes from crossedproduct algebras over Authors Luzzi, Laura; Oggier,
More informationAN INTRODUCTION TO SECRECY CAPACITY. 1. Overview
AN INTRODUCTION TO SECRECY CAPACITY BRIAN DUNN. Overview This paper introduces the reader to several information theoretic aspects of covert communications. In particular, it discusses fundamental limits
More informationOn the diversity of the Naive Lattice Decoder
On the diversity of the Naive Lattice Decoder Asma Mejri, Laura Luzzi, Ghaya Rekaya-Ben Othman To cite this version: Asma Mejri, Laura Luzzi, Ghaya Rekaya-Ben Othman. On the diversity of the Naive Lattice
More informationConstruction of MIMO MAC Codes Achieving the Pigeon Hole Bound
Construction of MIMO MAC Codes Achieving the Pigeon Hole Bound Toni Ernvall and Roope Vehkalahti Turku Center for Computer Science and Department of Mathematics, University of Turku, Finland e-mails: {tmernv,
More informationSoft Covering with High Probability
Soft Covering with High Probability Paul Cuff Princeton University arxiv:605.06396v [cs.it] 20 May 206 Abstract Wyner s soft-covering lemma is the central analysis step for achievability proofs of information
More informationAchieving the Full MIMO Diversity-Multiplexing Frontier with Rotation-Based Space-Time Codes
Achieving the Full MIMO Diversity-Multiplexing Frontier with Rotation-Based Space-Time Codes Huan Yao Lincoln Laboratory Massachusetts Institute of Technology Lexington, MA 02420 yaohuan@ll.mit.edu Gregory
More informationOn the Secrecy Capacity of Fading Channels
On the Secrecy Capacity of Fading Channels arxiv:cs/63v [cs.it] 7 Oct 26 Praveen Kumar Gopala, Lifeng Lai and Hesham El Gamal Department of Electrical and Computer Engineering The Ohio State University
More informationPhase Precoded Compute-and-Forward with Partial Feedback
Phase Precoded Compute-and-Forward with Partial Feedback Amin Sakzad, Emanuele Viterbo Dept. Elec. & Comp. Sys. Monash University, Australia amin.sakzad,emanuele.viterbo@monash.edu Joseph Boutros, Dept.
More informationFORMAL GROUPS OF CERTAIN Q-CURVES OVER QUADRATIC FIELDS
Sairaiji, F. Osaka J. Math. 39 (00), 3 43 FORMAL GROUPS OF CERTAIN Q-CURVES OVER QUADRATIC FIELDS FUMIO SAIRAIJI (Received March 4, 000) 1. Introduction Let be an elliptic curve over Q. We denote by ˆ
More informationarxiv: v1 [cs.it] 11 Apr 2017
Noname manuscript No. (will be inserted by the editor) Enhancement of Physical Layer Security Using Destination Artificial Noise Based on Outage Probability Ali Rahmanpour Vahid T. Vakili S. Mohammad Razavizadeh
More informationSome algebraic number theory and the reciprocity map
Some algebraic number theory and the reciprocity map Ervin Thiagalingam September 28, 2015 Motivation In Weinstein s paper, the main problem is to find a rule (reciprocity law) for when an irreducible
More informationAchieving Shannon Capacity Region as Secrecy Rate Region in a Multiple Access Wiretap Channel
Achieving Shannon Capacity Region as Secrecy Rate Region in a Multiple Access Wiretap Channel Shahid Mehraj Shah and Vinod Sharma Department of Electrical Communication Engineering, Indian Institute of
More informationUnderstanding hard cases in the general class group algorithm
Understanding hard cases in the general class group algorithm Makoto Suwama Supervisor: Dr. Steve Donnelly The University of Sydney February 2014 1 Introduction This report has studied the general class
More informationTOTALLY RAMIFIED PRIMES AND EISENSTEIN POLYNOMIALS. 1. Introduction
TOTALLY RAMIFIED PRIMES AND EISENSTEIN POLYNOMIALS KEITH CONRAD A (monic) polynomial in Z[T ], 1. Introduction f(t ) = T n + c n 1 T n 1 + + c 1 T + c 0, is Eisenstein at a prime p when each coefficient
More informationGolden Space-Time Block Coded Modulation
Golden Space-Time Block Coded Modulation Laura Luzzi Ghaya Rekaya-Ben Othman Jean-Claude Belfiore and Emanuele Viterbo Télécom ParisTech- École Nationale Supérieure des Télécommunications 46 Rue Barrault
More informationEfficient Bounded Distance Decoders for Barnes-Wall Lattices
Efficient Bounded Distance Decoders for Barnes-Wall Lattices Daniele Micciancio Antonio Nicolosi April 30, 2008 Abstract We describe a new family of parallelizable bounded distance decoding algorithms
More information(1) A frac = b : a, b A, b 0. We can define addition and multiplication of fractions as we normally would. a b + c d
The Algebraic Method 0.1. Integral Domains. Emmy Noether and others quickly realized that the classical algebraic number theory of Dedekind could be abstracted completely. In particular, rings of integers
More informationMINKOWSKI THEORY AND THE CLASS NUMBER
MINKOWSKI THEORY AND THE CLASS NUMBER BROOKE ULLERY Abstract. This paper gives a basic introduction to Minkowski Theory and the class group, leading up to a proof that the class number (the order of the
More informationPerfect Space Time Block Codes
Perfect Space Time Block Codes Frédérique Oggier, Ghaya Rekaya, Student Member IEEE, Jean-Claude Belfiore, Member IEEE and Emanuele Viterbo, Member IEEE Abstract arxiv:cs/0604093v1 [cs.it] 24 Apr 2006
More informationOn the Secrecy Capacity of the Z-Interference Channel
On the Secrecy Capacity of the Z-Interference Channel Ronit Bustin Tel Aviv University Email: ronitbustin@post.tau.ac.il Mojtaba Vaezi Princeton University Email: mvaezi@princeton.edu Rafael F. Schaefer
More informationThese warmup exercises do not need to be written up or turned in.
18.785 Number Theory Fall 2017 Problem Set #3 Description These problems are related to the material in Lectures 5 7. Your solutions should be written up in latex and submitted as a pdf-file via e-mail
More information15 Dirichlet s unit theorem
18.785 Number theory I Fall 2017 Lecture #15 10/30/2017 15 Dirichlet s unit theorem Let K be a number field. The two main theorems of classical algebraic number theory are: The class group cl O K is finite.
More informationCover Page. The handle holds various files of this Leiden University dissertation.
Cover Page The handle http://hdl.handle.net/1887/20310 holds various files of this Leiden University dissertation. Author: Jansen, Bas Title: Mersenne primes and class field theory Date: 2012-12-18 Chapter
More informationDISCRETE SUBGROUPS, LATTICES, AND UNITS.
DISCRETE SUBGROUPS, LATTICES, AND UNITS. IAN KIMING 1. Discrete subgroups of real vector spaces and lattices. Definitions: A lattice in a real vector space V of dimension d is a subgroup of form: Zv 1
More informationLemma 1.1. The field K embeds as a subfield of Q(ζ D ).
Math 248A. Quadratic characters associated to quadratic fields The aim of this handout is to describe the quadratic Dirichlet character naturally associated to a quadratic field, and to express it in terms
More informationPrecoded Integer-Forcing Universally Achieves the MIMO Capacity to Within a Constant Gap
Precoded Integer-Forcing Universally Achieves the MIMO Capacity to Within a Constant Gap Or Ordentlich Dept EE-Systems, TAU Tel Aviv, Israel Email: ordent@engtauacil Uri Erez Dept EE-Systems, TAU Tel Aviv,
More informationRINGS: SUMMARY OF MATERIAL
RINGS: SUMMARY OF MATERIAL BRIAN OSSERMAN This is a summary of terms used and main results proved in the subject of rings, from Chapters 11-13 of Artin. Definitions not included here may be considered
More informationSecret Key Agreement Using Asymmetry in Channel State Knowledge
Secret Key Agreement Using Asymmetry in Channel State Knowledge Ashish Khisti Deutsche Telekom Inc. R&D Lab USA Los Altos, CA, 94040 Email: ashish.khisti@telekom.com Suhas Diggavi LICOS, EFL Lausanne,
More informationLecture 7 MIMO Communica2ons
Wireless Communications Lecture 7 MIMO Communica2ons Prof. Chun-Hung Liu Dept. of Electrical and Computer Engineering National Chiao Tung University Fall 2014 1 Outline MIMO Communications (Chapter 10
More informationMath 259: Introduction to Analytic Number Theory How small can disc(k) be for a number field K of degree n = r 1 + 2r 2?
Math 59: Introduction to Analytic Number Theory How small can disck be for a number field K of degree n = r + r? Let K be a number field of degree n = r + r, where as usual r and r are respectively the
More informationA BRIEF INTRODUCTION TO LOCAL FIELDS
A BRIEF INTRODUCTION TO LOCAL FIELDS TOM WESTON The purpose of these notes is to give a survey of the basic Galois theory of local fields and number fields. We cover much of the same material as [2, Chapters
More informationOn the Impact of Quantized Channel Feedback in Guaranteeing Secrecy with Artificial Noise
On the Impact of Quantized Channel Feedback in Guaranteeing Secrecy with Artificial Noise Ya-Lan Liang, Yung-Shun Wang, Tsung-Hui Chang, Y.-W. Peter Hong, and Chong-Yung Chi Institute of Communications
More informationAlgebraic number theory
Algebraic number theory F.Beukers February 2011 1 Algebraic Number Theory, a crash course 1.1 Number fields Let K be a field which contains Q. Then K is a Q-vector space. We call K a number field if dim
More informationPERFECTLY secure key agreement has been studied recently
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 45, NO. 2, MARCH 1999 499 Unconditionally Secure Key Agreement the Intrinsic Conditional Information Ueli M. Maurer, Senior Member, IEEE, Stefan Wolf Abstract
More informationNumber Theory Fall 2016 Problem Set #6
18.785 Number Theory Fall 2016 Problem Set #6 Description These problems are related to the material covered in Lectures 10-12. Your solutions are to be written up in latex (you can use the latex source
More information4184 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 51, NO. 12, DECEMBER Pranav Dayal, Member, IEEE, and Mahesh K. Varanasi, Senior Member, IEEE
4184 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 51, NO. 12, DECEMBER 2005 An Algebraic Family of Complex Lattices for Fading Channels With Application to Space Time Codes Pranav Dayal, Member, IEEE,
More informationSecrecy Outage Performance of Cooperative Relay Network With Diversity Combining
Secrecy Outage erformance of Cooperative Relay Network With Diversity Combining Khyati Chopra Dept. of lectrical ngineering Indian Institute of Technology, Delhi New Delhi-110016, India mail: eez148071@ee.iitd.ac.in
More informationNumber Theory Fall 2016 Problem Set #3
18.785 Number Theory Fall 2016 Problem Set #3 Description These problems are related to the material covered in Lectures 5-7. Your solutions are to be written up in latex and submitted as a pdf-file via
More informationGALOIS GROUPS AS PERMUTATION GROUPS
GALOIS GROUPS AS PERMUTATION GROUPS KEITH CONRAD 1. Introduction A Galois group is a group of field automorphisms under composition. By looking at the effect of a Galois group on field generators we can
More informationUpper Bounds on the Capacity of Binary Intermittent Communication
Upper Bounds on the Capacity of Binary Intermittent Communication Mostafa Khoshnevisan and J. Nicholas Laneman Department of Electrical Engineering University of Notre Dame Notre Dame, Indiana 46556 Email:{mhoshne,
More informationSpectrum Leasing via Cooperation for Enhanced. Physical-Layer Secrecy
Spectrum Leasing via Cooperation for Enhanced 1 Physical-Layer Secrecy Keonkook Lee, Member, IEEE, Chan-Byoung Chae, Senior Member, IEEE, Joonhyuk Kang, Member, IEEE arxiv:1205.0085v1 [cs.it] 1 May 2012
More informationAlgebraic Number Theory
TIFR VSRP Programme Project Report Algebraic Number Theory Milind Hegde Under the guidance of Prof. Sandeep Varma July 4, 2015 A C K N O W L E D G M E N T S I would like to express my thanks to TIFR for
More informationLecture 7.5: Euclidean domains and algebraic integers
Lecture 7.5: Euclidean domains and algebraic integers Matthew Macauley Department of Mathematical Sciences Clemson University http://www.math.clemson.edu/~macaule/ Math 4120, Modern Algebra M. Macauley
More informationInterference Alignment at Finite SNR for TI channels
Interference Alignment at Finite SNR for Time-Invariant channels Or Ordentlich Joint work with Uri Erez EE-Systems, Tel Aviv University ITW 20, Paraty Background and previous work The 2-user Gaussian interference
More informationA Coding Strategy for Wireless Networks with no Channel Information
A Coding Strategy for Wireless Networks with no Channel Information Frédérique Oggier and Babak Hassibi Abstract In this paper, we present a coding strategy for wireless relay networks, where we assume
More informationSecure Computation in a Bidirectional Relay
Secure Computation in a Bidirectional Relay Navin Kashyap and Shashank V Dept. of Electrical Communication Engineering Indian Institute of Science, Bangalore, India Email: nkashyap,shashank}@ece.iisc.ernet.in
More informationDiversity-Multiplexing Tradeoff in MIMO Channels with Partial CSIT. ECE 559 Presentation Hoa Pham Dec 3, 2007
Diversity-Multiplexing Tradeoff in MIMO Channels with Partial CSIT ECE 559 Presentation Hoa Pham Dec 3, 2007 Introduction MIMO systems provide two types of gains Diversity Gain: each path from a transmitter
More informationw d : Y 0 (N) Y 0 (N)
Upper half-plane formulas We want to explain the derivation of formulas for two types of objects on the upper half plane: the Atkin- Lehner involutions and Heegner points Both of these are treated somewhat
More informationChapter 14: Divisibility and factorization
Chapter 14: Divisibility and factorization Matthew Macauley Department of Mathematical Sciences Clemson University http://www.math.clemson.edu/~macaule/ Math 4120, Summer I 2014 M. Macauley (Clemson) Chapter
More informationTHE HALF-FACTORIAL PROPERTY IN INTEGRAL EXTENSIONS. Jim Coykendall Department of Mathematics North Dakota State University Fargo, ND.
THE HALF-FACTORIAL PROPERTY IN INTEGRAL EXTENSIONS Jim Coykendall Department of Mathematics North Dakota State University Fargo, ND. 58105-5075 ABSTRACT. In this paper, the integral closure of a half-factorial
More informationInformation Hiding and Covert Communication
Information Hiding and Covert Communication Andrew Ker adk @ comlab.ox.ac.uk Royal Society University Research Fellow Oxford University Computing Laboratory Foundations of Security Analysis and Design
More informationReverse Edge Cut-Set Bounds for Secure Network Coding
Reverse Edge Cut-Set Bounds for Secure Network Coding Wentao Huang and Tracey Ho California Institute of Technology Michael Langberg University at Buffalo, SUNY Joerg Kliewer New Jersey Institute of Technology
More informationLeech Constellations of Construction-A Lattices
Leech Constellations of Construction-A Lattices Joseph J. Boutros Talk at Nokia Bell Labs, Stuttgart Texas A&M University at Qatar In collaboration with Nicola di Pietro. March 7, 2017 Thanks Many Thanks
More informationMulti-Input Multi-Output Systems (MIMO) Channel Model for MIMO MIMO Decoding MIMO Gains Multi-User MIMO Systems
Multi-Input Multi-Output Systems (MIMO) Channel Model for MIMO MIMO Decoding MIMO Gains Multi-User MIMO Systems Multi-Input Multi-Output Systems (MIMO) Channel Model for MIMO MIMO Decoding MIMO Gains Multi-User
More informationTHE UNIT GROUP OF A REAL QUADRATIC FIELD
THE UNIT GROUP OF A REAL QUADRATIC FIELD While the unit group of an imaginary quadratic field is very simple the unit group of a real quadratic field has nontrivial structure Its study involves some geometry
More information2. The center of G, denoted by Z(G), is the abelian subgroup which commutes with every elements of G. The center always contains the unit element e.
Chapter 2 Group Structure To be able to use groups in physics, or mathematics, we need to know what are the important features distinguishing one group from another. This is under the heading of group
More informationDiversity-Fidelity Tradeoff in Transmission of Analog Sources over MIMO Fading Channels
Diversity-Fidelity Tradeo in Transmission o Analog Sources over MIMO Fading Channels Mahmoud Taherzadeh, Kamyar Moshksar and Amir K. Khandani Coding & Signal Transmission Laboratory www.cst.uwaterloo.ca
More informationHigher Ramification Groups
COLORADO STATE UNIVERSITY MATHEMATICS Higher Ramification Groups Dean Bisogno May 24, 2016 1 ABSTRACT Studying higher ramification groups immediately depends on some key ideas from valuation theory. With
More informationImplementation of Automatic Invertible Matrix Mechanism in NTRU Matrix Formulation Algorithm
Implementation of Automatic Invertible Matrix Mechanism in NTRU Matrix Formulation Algorithm Mohan Rao Mamdikar, Vinay Kumar & D. Ghosh National Institute of Technology, Durgapur E-mail : Mohanrao.mamdikar@gmail.com,
More informationON 3-CLASS GROUPS OF CERTAIN PURE CUBIC FIELDS. Frank Gerth III
Bull. Austral. ath. Soc. Vol. 72 (2005) [471 476] 11r16, 11r29 ON 3-CLASS GROUPS OF CERTAIN PURE CUBIC FIELDS Frank Gerth III Recently Calegari and Emerton made a conjecture about the 3-class groups of
More informationCopyrighted Material. Type A Weyl Group Multiple Dirichlet Series
Chapter One Type A Weyl Group Multiple Dirichlet Series We begin by defining the basic shape of the class of Weyl group multiple Dirichlet series. To do so, we choose the following parameters. Φ, a reduced
More informationCODING schemes for overloaded synchronous Code Division
IEEE TRANSACTIONS ON COMMUNICATIONS, VOL 60, NO, NOVEM 0 345 Transactions Letters Uniquely Decodable Codes with Fast Decoder for Overloaded Synchronous CDMA Systems Omid Mashayekhi, Student Member, IEEE,
More informationx mv = 1, v v M K IxI v = 1,
18.785 Number Theory I Fall 2017 Problem Set #7 Description These problems are related to the material covered in Lectures 13 15. Your solutions are to be written up in latex (you can use the latex source
More informationGALOIS GROUPS OF CUBICS AND QUARTICS (NOT IN CHARACTERISTIC 2)
GALOIS GROUPS OF CUBICS AND QUARTICS (NOT IN CHARACTERISTIC 2) KEITH CONRAD We will describe a procedure for figuring out the Galois groups of separable irreducible polynomials in degrees 3 and 4 over
More informationARITHMETIC IN PURE CUBIC FIELDS AFTER DEDEKIND.
ARITHMETIC IN PURE CUBIC FIELDS AFTER DEDEKIND. IAN KIMING We will study the rings of integers and the decomposition of primes in cubic number fields K of type K = Q( 3 d) where d Z. Cubic number fields
More informationSome Goodness Properties of LDA Lattices
Some Goodness Properties of LDA Lattices Shashank Vatedka and Navin Kashyap {shashank,nkashyap}@eceiiscernetin Department of ECE Indian Institute of Science Bangalore, India Information Theory Workshop
More informationImproved Perfect Space-Time Block Codes
Improved Perfect Space-Time Block Codes K. Pavan Srinath and B. Sundar Rajan, Senior Member, IEEE Dept of ECE, The Indian Institute of Science, Bangalore-500, India Email:pavan,bsrajan}@ece.iisc.ernet.in
More informationTHE SPLITTING FIELD OF X 3 7 OVER Q
THE SPLITTING FIELD OF X 3 7 OVER Q KEITH CONRAD In this note, we calculate all the basic invariants of the number field K = Q( 3 7, ω), where ω = ( 1 + 3)/2 is a primitive cube root of unity. Here is
More information8. Prime Factorization and Primary Decompositions
70 Andreas Gathmann 8. Prime Factorization and Primary Decompositions 13 When it comes to actual computations, Euclidean domains (or more generally principal ideal domains) are probably the nicest rings
More informationMaximum Achievable Diversity for MIMO-OFDM Systems with Arbitrary. Spatial Correlation
Maximum Achievable Diversity for MIMO-OFDM Systems with Arbitrary Spatial Correlation Ahmed K Sadek, Weifeng Su, and K J Ray Liu Department of Electrical and Computer Engineering, and Institute for Systems
More informationMath 429/581 (Advanced) Group Theory. Summary of Definitions, Examples, and Theorems by Stefan Gille
Math 429/581 (Advanced) Group Theory Summary of Definitions, Examples, and Theorems by Stefan Gille 1 2 0. Group Operations 0.1. Definition. Let G be a group and X a set. A (left) operation of G on X is
More informationComplex Reflection Group Coding
Complex Reflection Group Coding Hye Jung Kim Thesis Committee: Dr. J.B. Nation, Adviser Dr. Ralph Freese Graduate Committee: Dr. Michelle Manes Dr. Monique Chyba Dr. Robert Little 1 Acknowledgements I
More informationTHE DIFFERENT IDEAL. Then R n = V V, V = V, and V 1 V 2 V KEITH CONRAD 2 V
THE DIFFERENT IDEAL KEITH CONRAD. Introduction The discriminant of a number field K tells us which primes p in Z ramify in O K : the prime factors of the discriminant. However, the way we have seen how
More informationOn Source-Channel Communication in Networks
On Source-Channel Communication in Networks Michael Gastpar Department of EECS University of California, Berkeley gastpar@eecs.berkeley.edu DIMACS: March 17, 2003. Outline 1. Source-Channel Communication
More informationHomework 4 Solutions
Homework 4 Solutions November 11, 2016 You were asked to do problems 3,4,7,9,10 in Chapter 7 of Lang. Problem 3. Let A be an integral domain, integrally closed in its field of fractions K. Let L be a finite
More informationFACTORIZATION OF IDEALS
FACTORIZATION OF IDEALS 1. General strategy Recall the statement of unique factorization of ideals in Dedekind domains: Theorem 1.1. Let A be a Dedekind domain and I a nonzero ideal of A. Then there are
More informationQuantization Index Modulation using the E 8 lattice
1 Quantization Index Modulation using the E 8 lattice Qian Zhang and Nigel Boston Dept of Electrical and Computer Engineering University of Wisconsin Madison 1415 Engineering Drive, Madison, WI 53706 Email:
More informationOptimal Power Allocation for Achieving Perfect Secrecy Capacity in MIMO Wire-Tap Channels
Optimal Power Allocation for Achieving Perfect Secrecy Capacity in MIMO Wire-Tap Channels Jia Liu, Y. Thomas Hou, and Hanif D. Sherali Bradley Department of Electrical and Computer Engineering Grado Department
More informationTiming errors in distributed space-time communications
Timing errors in distributed space-time communications Emanuele Viterbo Dipartimento di Elettronica Politecnico di Torino Torino, Italy viterbo@polito.it Yi Hong Institute for Telecom. Research University
More informationMorning Session Capacity-based Power Control. Department of Electrical and Computer Engineering University of Maryland
Morning Session Capacity-based Power Control Şennur Ulukuş Department of Electrical and Computer Engineering University of Maryland So Far, We Learned... Power control with SIR-based QoS guarantees Suitable
More informationNorm-Euclidean Ideals in Galois Cubic Fields
Norm-Euclidean Ideals in Galois Cubic Fields Kelly Emmrich and Clark Lyons University of Wisconsin-La Crosse, University of California, Berkeley 2017 West Coast Number Theory Conference December 18, 2017
More informationLocal corrections of discriminant bounds and small degree extensions of quadratic base fields
January 29, 27 21:58 WSPC/INSTRUCTION FILE main International Journal of Number Theory c World Scientific Publishing Company Local corrections of discriminant bounds and small degree extensions of quadratic
More informationIntroduction to Arithmetic Geometry Fall 2013 Lecture #7 09/26/2013
18.782 Introduction to Arithmetic Geometry Fall 2013 Lecture #7 09/26/2013 In Lecture 6 we proved (most of) Ostrowski s theorem for number fields, and we saw the product formula for absolute values on
More informationADVANCED TOPICS IN ALGEBRAIC GEOMETRY
ADVANCED TOPICS IN ALGEBRAIC GEOMETRY DAVID WHITE Outline of talk: My goal is to introduce a few more advanced topics in algebraic geometry but not to go into too much detail. This will be a survey of
More informationNOTES Edited by Ed Scheinerman
NOTES Edited by Ed Scheinerman Why is PSL(2, 7) = GL(3, 2)? Ezra Brown and Nicholas Loehr 1. INTRODUCTION. The groups of invertible matrices over finite fields are among the first groups we meet in a beginning
More information