795,882 research outputs found

    Posterior Matching Scheme for Gaussian Multiple Access Channel with Feedback

    Full text link
    Posterior matching is a method proposed by Ofer Shayevitz and Meir Feder to design capacity achieving coding schemes for general point-to-point memoryless channels with feedback. In this paper, we present a way to extend posterior matching based encoding and variable rate decoding ideas for the Gaussian MAC with feedback, referred to as time-varying posterior matching scheme, analyze the achievable rate region and error probabilities of the extended encoding-decoding scheme. The time-varying posterior matching scheme is a generalization of the Shayevitz and Feder's posterior matching scheme when the posterior distributions of the input messages given output are not fixed over transmission time slots. It turns out that the well-known Ozarow's encoding scheme, which obtains the capacity of two-user Gaussian channel, is a special case of our extended posterior matching framework as the Schalkwijk-Kailath's scheme is a special case of the point-to-point posterior matching mentioned above. Furthermore, our designed posterior matching also obtains the linear-feedback sum-capacity for the symmetric multiuser Gaussian MAC. Besides, the encoding scheme in this paper is designed for the real Gaussian MAC to obtain that performance, which is different from previous approaches where encoding schemes are designed for the complex Gaussian MAC. More importantly, this paper shows potential of posterior matching in designing optimal coding schemes for multiuser channels with feedback.Comment: submitted to the IEEE Transactions on Information Theory. A shorter version has been accepted to IEEE Information Theory Workshop 201

    The asymptotic induced matching number of hypergraphs: balanced binary strings

    Get PDF
    We compute the asymptotic induced matching number of the kk-partite kk-uniform hypergraphs whose edges are the kk-bit strings of Hamming weight k/2k/2, for any large enough even number kk. Our lower bound relies on the higher-order extension of the well-known Coppersmith-Winograd method from algebraic complexity theory, which was proven by Christandl, Vrana and Zuiddam. Our result is motivated by the study of the power of this method as well as of the power of the Strassen support functionals (which provide upper bounds on the asymptotic induced matching number), and the connections to questions in tensor theory, quantum information theory and theoretical computer science. Phrased in the language of tensors, as a direct consequence of our result, we determine the asymptotic subrank of any tensor with support given by the aforementioned hypergraphs. In the context of quantum information theory, our result amounts to an asymptotically optimal kk-party stochastic local operations and classical communication (slocc) protocol for the problem of distilling GHZ-type entanglement from a subfamily of Dicke-type entanglement

    Assortative Matching and Reputation

    Get PDF
    Consider Becker's classic 1963 matching model, with unobserved fixed types and stochastic publicly observed output. If types are complementary, then matching is assortative in the known Bayesian posteriors (the 'reputations'). We discover a robust failure of Becker's result in the simplest dynamic two type version of this world. Assortative matching is generally neither efficient nor an equilibrium for high discount factors. In a labor theoretic rationale, we show that assortative matching fails around the highest (lowest) reputation agents for 'low-skill (high-skill) concealing' technologies. We then find that as the number of production outcomes grows, almost all technologies are of either form. Our theory implies the dynamic result that high-skill matches eventually break up. It also reveals that the induced information rents create discontinuities in the wage profile. This in turn produces life-cycle effects: young workers are paid less than their static marginal product, and old workers more.assortative matching, incomplete information, wages, Bayesian posterior, value function

    Information Compression, Intelligence, Computing, and Mathematics

    Full text link
    This paper presents evidence for the idea that much of artificial intelligence, human perception and cognition, mainstream computing, and mathematics, may be understood as compression of information via the matching and unification of patterns. This is the basis for the "SP theory of intelligence", outlined in the paper and fully described elsewhere. Relevant evidence may be seen: in empirical support for the SP theory; in some advantages of information compression (IC) in terms of biology and engineering; in our use of shorthands and ordinary words in language; in how we merge successive views of any one thing; in visual recognition; in binocular vision; in visual adaptation; in how we learn lexical and grammatical structures in language; and in perceptual constancies. IC via the matching and unification of patterns may be seen in both computing and mathematics: in IC via equations; in the matching and unification of names; in the reduction or removal of redundancy from unary numbers; in the workings of Post's Canonical System and the transition function in the Universal Turing Machine; in the way computers retrieve information from memory; in systems like Prolog; and in the query-by-example technique for information retrieval. The chunking-with-codes technique for IC may be seen in the use of named functions to avoid repetition of computer code. The schema-plus-correction technique may be seen in functions with parameters and in the use of classes in object-oriented programming. And the run-length coding technique may be seen in multiplication, in division, and in several other devices in mathematics and computing. The SP theory resolves the apparent paradox of "decompression by compression". And computing and cognition as IC is compatible with the uses of redundancy in such things as backup copies to safeguard data and understanding speech in a noisy environment

    Three-dimensional theory for interaction between atomic ensembles and free-space light

    Full text link
    Atomic ensembles have shown to be a promising candidate for implementations of quantum information processing by many recently-discovered schemes. All these schemes are based on the interaction between optical beams and atomic ensembles. For description of these interactions, one assumed either a cavity-QED model or a one-dimensional light propagation model, which is still inadequate for a full prediction and understanding of most of the current experimental efforts which are actually taken in the three-dimensional free space. Here, we propose a perturbative theory to describe the three-dimensional effects in interaction between atomic ensembles and free-space light with a level configuration important for several applications. The calculations reveal some significant effects which are not known before from the other approaches, such as the inherent mode-mismatching noise and the optimal mode-matching conditions. The three-dimensional theory confirms the collective enhancement of the signal-to-noise ratio which is believed to be one of the main advantage of the ensemble-based quantum information processing schemes, however, it also shows that this enhancement need to be understood in a more subtle way with an appropriate mode matching method.Comment: 16 pages, 9 figure

    A New Anomaly Matching Condition?

    Full text link
    We formulate ``Witten'' matching conditions for confining gauge theories. The conditions are analogous to 't Hooft's, but involve Witten's global SU(2) anomaly. Using a group theoretic result of Geng, Marshak, Zhao and Okubo, we show that if the fourth homotopy group of the flavor group HH is trivial (Π4(H)=0\Pi_4(H) = 0) then realizations of massless composite fermions that satisfy the 't Hooft conditions also satisfy the Witten conditions. If Π4(H)\Pi_4 (H) is nontrivial, the new matching conditions can yield additional information about the low energy spectrum of the theory. We give a simple physical proof of Geng, et. al.'s result.Comment: 11 pages, LaTex, all macros include
    corecore