1,969 research outputs found
MAC with Action-Dependent State Information at One Encoder
Problems dealing with the ability to take an action that affects the states
of state-dependent communication channels are of timely interest and
importance. Therefore, we extend the study of action-dependent channels, which
until now focused on point-to-point models, to multiple-access channels (MAC).
In this paper, we consider a two-user, state-dependent MAC, in which one of the
encoders, called the informed encoder, is allowed to take an action that
affects the formation of the channel states. Two independent messages are to be
sent through the channel: a common message known to both encoders and a private
message known only to the informed encoder. In addition, the informed encoder
has access to the sequence of channel states in a non-causal manner. Our
framework generalizes previously evaluated settings of state dependent
point-to-point channels with actions and MACs with common messages. We derive a
single letter characterization of the capacity region for this setting. Using
this general result, we obtain and compute the capacity region for the Gaussian
action-dependent MAC. The unique methods used in solving the Gaussian case are
then applied to obtain the capacity of the Gaussian action-dependent
point-to-point channel; a problem was left open until this work. Finally, we
establish some dualities between action-dependent channel coding and source
coding problems. Specifically, we obtain a duality between the considered MAC
setting and the rate distortion model known as "Successive Refinement with
Actions". This is done by developing a set of simple duality principles that
enable us to successfully evaluate the outcome of one problem given the other.Comment: 1. Parts of this paper appeared in the IEEE International Symposium
on Information Theory (ISIT 2012),Cambridge, MA, US, July 2012 and at the
IEEE 27th Convention of Electrical and Electronics Engineers in Israel (IEEEI
2012), Nov. 2012. 2. This work has been supported by the CORNET Consortium
Israel Ministry for Industry and Commerc
Lecture Notes on Network Information Theory
These lecture notes have been converted to a book titled Network Information
Theory published recently by Cambridge University Press. This book provides a
significantly expanded exposition of the material in the lecture notes as well
as problems and bibliographic notes at the end of each chapter. The authors are
currently preparing a set of slides based on the book that will be posted in
the second half of 2012. More information about the book can be found at
http://www.cambridge.org/9781107008731/. The previous (and obsolete) version of
the lecture notes can be found at http://arxiv.org/abs/1001.3404v4/
Adaptive data acquisition for communication networks
In an increasing number of communication systems, such as sensor networks or local area networks within medical, financial or military institutions, nodes communicate information sources (e.g., video, audio) over multiple hops. Moreover, nodes have, or can acquire, correlated information sources from the environment, e.g., from data bases or from measurements. Among the new design problems raised by the outlined scenarios, two key issues are addressed in this dissertation: 1) How to preserve the consistency of sensitive information across multiple hops; 2) How to incorporate the design of actuation in the form of data acquisition and network probing in the optimization of the communication network. These aspects are investigated by using information-theoretic (source and channel coding) models, obtaining fundamental insights that have been corroborated by various illustrative examples. To address point 1), the problem of cascade source coding with side information is investigated. The motivating observation is that, in this class of problems, the estimate of the source obtained at the decoder cannot be generally reproduced at the encoder if it depends directly on the side information. In some applications, such as the one mentioned above, this lack of consistency may be undesirable, and a so called Common Reconstruction (CR) requirement, whereby one imposes that the encoder be able to agree on the decoder’s estimate, may be instead in order. The rate-distortion region is here derived for some special cases of the cascade source coding problem and of the related Heegard-Berger (HB) problem under the CR constraint. As for point 2), the work is motivated by the fact that, in order to enable, or to facilitate, the exchange of information, nodes of a communication network routinely take various types of actions, such as data acquisition or network probing. For instance, sensor nodes schedule the operation of their sensing devices to measure given physical quantities of interest, and wireless nodes probe the state of the channel via training. The problem of optimal data acquisition is studied for a cascade source coding problem, a distributed source coding problem and a two-way source coding problem assuming that the side information sequences can be controlled via the selection of cost-constrained actions. It is shown that a joint design of the description of the source and of the control signals used to guide the selection of the actions at downstream nodes is generally necessary for an efficient use of the available communication links. Instead, the problem of optimal channel probing is studied for a broadcast channel and a point-to-point link in which the decoder is interested in estimating not only the message, but also the state sequence. Finally, the problem of embedding information on the actions is studied for both the source and the channel coding set-ups described above
Successive structuring of source coding algorithms for data fusion, buffering, and distribution in networks
Supervised by Gregory W. Wornell.Also issued as Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2002.Includes bibliographical references (p. 159-165).(cont.) We also explore the interactions between source coding and queue management in problems of buffering and distributing distortion-tolerant data. We formulate a general queuing model relevant to numerous communication scenarios, and develop a bound on the performance of any algorithm. We design an adaptive buffer-control algorithm for use in dynamic environments and under finite memory limitations; its performance closely approximates the bound. Our design uses multiresolution source codes that exploit the data's distortion-tolerance in minimizing end-to-end distortion. Compared to traditional approaches, the performance gains of the adaptive algorithm are significant - improving distortion, delay, and overall system robustness.by Stark Christiaan Draper
- …