1,655 research outputs found

    Corporate influence and the academic computer science discipline. [4: CMU]

    Get PDF
    Prosopographical work on the four major centers for computer research in the United States has now been conducted, resulting in big questions about the independence of, so called, computer science

    Achievable and Crystallized Rate Regions of the Interference Channel with Interference as Noise

    Full text link
    The interference channel achievable rate region is presented when the interference is treated as noise. The formulation starts with the 2-user channel, and then extends the results to the n-user case. The rate region is found to be the convex hull of the union of n power control rate regions, where each power control rate region is upperbounded by a (n-1)-dimensional hyper-surface characterized by having one of the transmitters transmitting at full power. The convex hull operation lends itself to a time-sharing operation depending on the convexity behavior of those hyper-surfaces. In order to know when to use time-sharing rather than power control, the paper studies the hyper-surfaces convexity behavior in details for the 2-user channel with specific results pertaining to the symmetric channel. It is observed that most of the achievable rate region can be covered by using simple On/Off binary power control in conjunction with time-sharing. The binary power control creates several corner points in the n-dimensional space. The crystallized rate region, named after its resulting crystal shape, is hence presented as the time-sharing convex hull imposed onto those corner points; thereby offering a viable new perspective of looking at the achievable rate region of the interference channel.Comment: 28 pages, 12 figures, to appear in IEEE Transactions of Wireless Communicatio

    Extrinsic Jensen-Shannon Divergence: Applications to Variable-Length Coding

    Full text link
    This paper considers the problem of variable-length coding over a discrete memoryless channel (DMC) with noiseless feedback. The paper provides a stochastic control view of the problem whose solution is analyzed via a newly proposed symmetrized divergence, termed extrinsic Jensen-Shannon (EJS) divergence. It is shown that strictly positive lower bounds on EJS divergence provide non-asymptotic upper bounds on the expected code length. The paper presents strictly positive lower bounds on EJS divergence, and hence non-asymptotic upper bounds on the expected code length, for the following two coding schemes: variable-length posterior matching and MaxEJS coding scheme which is based on a greedy maximization of the EJS divergence. As an asymptotic corollary of the main results, this paper also provides a rate-reliability test. Variable-length coding schemes that satisfy the condition(s) of the test for parameters RR and EE, are guaranteed to achieve rate RR and error exponent EE. The results are specialized for posterior matching and MaxEJS to obtain deterministic one-phase coding schemes achieving capacity and optimal error exponent. For the special case of symmetric binary-input channels, simpler deterministic schemes of optimal performance are proposed and analyzed.Comment: 17 pages (two-column), 4 figures, to appear in IEEE Transactions on Information Theor

    Instantly Decodable Network Coding: From Centralized to Device-to-Device Communications

    Get PDF
    From its introduction to its quindecennial, network coding has built a strong reputation for enhancing packet recovery and achieving maximum information flow in both wired and wireless networks. Traditional studies focused on optimizing the throughput of the system by proposing elaborate schemes able to reach the network capacity. With the shift toward distributed computing on mobile devices, performance and complexity become both critical factors that affect the efficiency of a coding strategy. Instantly decodable network coding presents itself as a new paradigm in network coding that trades off these two aspects. This paper review instantly decodable network coding schemes by identifying, categorizing, and evaluating various algorithms proposed in the literature. The first part of the manuscript investigates the conventional centralized systems, in which all decisions are carried out by a central unit, e.g., a base-station. In particular, two successful approaches known as the strict and generalized instantly decodable network are compared in terms of reliability, performance, complexity, and packet selection methodology. The second part considers the use of instantly decodable codes in a device-to-device communication network, in which devices speed up the recovery of the missing packets by exchanging network coded packets. Although the performance improvements are directly proportional to the computational complexity increases, numerous successful schemes from both the performance and complexity viewpoints are identified

    The Rock, Fall 2011 (vol. 82, no. 1)

    Get PDF
    https://poetcommons.whittier.edu/rock/1197/thumbnail.jp

    A review on the study of historical structures using integrated investigation activities for seismic safety assessment. Part I: Dynamic investigation

    Get PDF
    Assessment of seismic safety of historical structures is a challenging task because the information available about the assessed structure is usually limited. Therefore, it is often necessary to exploit a number of integrated investigation activities to increase the level of knowledge about the historical structure under consideration. Thus, in the case of any need for providing the structure with strengthening intervention, this intervention will be a minimal and any unnecessary strengthening operations will be avoided. This paper presents a literature review carried out to cover the current state-of-the-art of a number of investigation activities carried out integrally for the seismic safety assessment of historical structures. It is presented in two parts. In this first part, the covered topic is the dynamic investigation of historical structures which includes the dynamic identification tests, the dynamic monitoring, and the modal parameters identification methods with the classical and the advanced techniques like the peak picking and the stochastic subspace identification.Peer ReviewedPostprint (published version
    • …
    corecore