151,968 research outputs found
Beyond Geometry : Towards Fully Realistic Wireless Models
Signal-strength models of wireless communications capture the gradual fading
of signals and the additivity of interference. As such, they are closer to
reality than other models. However, nearly all theoretic work in the SINR model
depends on the assumption of smooth geometric decay, one that is true in free
space but is far off in actual environments. The challenge is to model
realistic environments, including walls, obstacles, reflections and anisotropic
antennas, without making the models algorithmically impractical or analytically
intractable.
We present a simple solution that allows the modeling of arbitrary static
situations by moving from geometry to arbitrary decay spaces. The complexity of
a setting is captured by a metricity parameter Z that indicates how far the
decay space is from satisfying the triangular inequality. All results that hold
in the SINR model in general metrics carry over to decay spaces, with the
resulting time complexity and approximation depending on Z in the same way that
the original results depends on the path loss term alpha. For distributed
algorithms, that to date have appeared to necessarily depend on the planarity,
we indicate how they can be adapted to arbitrary decay spaces.
Finally, we explore the dependence on Z in the approximability of core
problems. In particular, we observe that the capacity maximization problem has
exponential upper and lower bounds in terms of Z in general decay spaces. In
Euclidean metrics and related growth-bounded decay spaces, the performance
depends on the exact metricity definition, with a polynomial upper bound in
terms of Z, but an exponential lower bound in terms of a variant parameter phi.
On the plane, the upper bound result actually yields the first approximation of
a capacity-type SINR problem that is subexponential in alpha
The Trapping Redundancy of Linear Block Codes
We generalize the notion of the stopping redundancy in order to study the
smallest size of a trapping set in Tanner graphs of linear block codes. In this
context, we introduce the notion of the trapping redundancy of a code, which
quantifies the relationship between the number of redundant rows in any
parity-check matrix of a given code and the size of its smallest trapping set.
Trapping sets with certain parameter sizes are known to cause error-floors in
the performance curves of iterative belief propagation decoders, and it is
therefore important to identify decoding matrices that avoid such sets. Bounds
on the trapping redundancy are obtained using probabilistic and constructive
methods, and the analysis covers both general and elementary trapping sets.
Numerical values for these bounds are computed for the [2640,1320] Margulis
code and the class of projective geometry codes, and compared with some new
code-specific trapping set size estimates.Comment: 12 pages, 4 tables, 1 figure, accepted for publication in IEEE
Transactions on Information Theor
On (t,r) Broadcast Domination Numbers of Grids
The domination number of a graph is the minimum cardinality of
any subset such that every vertex in is in or adjacent to
an element of . Finding the domination numbers of by grids was an
open problem for nearly 30 years and was finally solved in 2011 by Goncalves,
Pinlou, Rao, and Thomass\'e. Many variants of domination number on graphs have
been defined and studied, but exact values have not yet been obtained for
grids. We will define a family of domination theories parameterized by pairs of
positive integers where which generalize domination
and distance domination theories for graphs. We call these domination numbers
the broadcast domination numbers. We give the exact values of
broadcast domination numbers for small grids, and we identify upper bounds for
the broadcast domination numbers for large grids and conjecture that
these bounds are tight for sufficiently large grids.Comment: 28 pages, 43 figure
On the Security of Index Coding with Side Information
Security aspects of the Index Coding with Side Information (ICSI) problem are
investigated. Building on the results of Bar-Yossef et al. (2006), the
properties of linear index codes are further explored. The notion of weak
security, considered by Bhattad and Narayanan (2005) in the context of network
coding, is generalized to block security. It is shown that the linear index
code based on a matrix , whose column space code has length ,
minimum distance and dual distance , is -block secure
(and hence also weakly secure) if the adversary knows in advance
messages, and is completely insecure if the adversary knows in advance more
than messages. Strong security is examined under the conditions that
the adversary: (i) possesses messages in advance; (ii) eavesdrops at most
transmissions; (iii) corrupts at most transmissions. We prove
that for sufficiently large , an optimal linear index code which is strongly
secure against such an adversary has length . Here
is a generalization of the min-rank over of the side
information graph for the ICSI problem in its original formulation in the work
of Bar- Yossef et al.Comment: 14 page
Minimax Structured Normal Means Inference
We provide a unified treatment of a broad class of noisy structure recovery
problems, known as structured normal means problems. In this setting, the goal
is to identify, from a finite collection of Gaussian distributions with
different means, the distribution that produced some observed data. Recent work
has studied several special cases including sparse vectors, biclusters, and
graph-based structures. We establish nearly matching upper and lower bounds on
the minimax probability of error for any structured normal means problem, and
we derive an optimality certificate for the maximum likelihood estimator, which
can be applied to many instantiations. We also consider an experimental design
setting, where we generalize our minimax bounds and derive an algorithm for
computing a design strategy with a certain optimality property. We show that
our results give tight minimax bounds for many structure recovery problems and
consider some consequences for interactive sampling
Interleaving schemes for multidimensional cluster errors
We present two-dimensional and three-dimensional interleaving techniques for correcting two- and three-dimensional bursts (or clusters) of errors, where a cluster of errors is characterized by its area or volume. Correction of multidimensional error clusters is required in holographic storage, an emerging application of considerable importance. Our main contribution is the construction of efficient two-dimensional and three-dimensional interleaving schemes. The proposed schemes are based on t-interleaved arrays of integers, defined by the property that every connected component of area or volume t consists of distinct integers. In the two-dimensional case, our constructions are optimal: they have the lowest possible interleaving degree. That is, the resulting t-interleaved arrays contain the smallest possible number of distinct integers, hence minimizing the number of codewords required in an interleaving scheme. In general, we observe that the interleaving problem can be interpreted as a graph-coloring problem, and introduce the useful special class of lattice interleavers. We employ a result of Minkowski, dating back to 1904, to establish both upper and lower bounds on the interleaving degree of lattice interleavers in three dimensions. For the case t≡0 mod 6, the upper and lower bounds coincide, and the Minkowski lattice directly yields an optimal lattice interleaver. For t≠0 mod 6, we construct efficient lattice interleavers using approximations of the Minkowski lattice
Adaptive Compressed Sensing for Support Recovery of Structured Sparse Sets
This paper investigates the problem of recovering the support of structured
signals via adaptive compressive sensing. We examine several classes of
structured support sets, and characterize the fundamental limits of accurately
recovering such sets through compressive measurements, while simultaneously
providing adaptive support recovery protocols that perform near optimally for
these classes. We show that by adaptively designing the sensing matrix we can
attain significant performance gains over non-adaptive protocols. These gains
arise from the fact that adaptive sensing can: (i) better mitigate the effects
of noise, and (ii) better capitalize on the structure of the support sets.Comment: to appear in IEEE Transactions on Information Theor
- …