1,655 research outputs found
Corporate influence and the academic computer science discipline. [4: CMU]
Prosopographical work on the four major centers for computer
research in the United States has now been conducted, resulting in big
questions about the independence of, so called, computer science
Achievable and Crystallized Rate Regions of the Interference Channel with Interference as Noise
The interference channel achievable rate region is presented when the
interference is treated as noise. The formulation starts with the 2-user
channel, and then extends the results to the n-user case. The rate region is
found to be the convex hull of the union of n power control rate regions, where
each power control rate region is upperbounded by a (n-1)-dimensional
hyper-surface characterized by having one of the transmitters transmitting at
full power. The convex hull operation lends itself to a time-sharing operation
depending on the convexity behavior of those hyper-surfaces. In order to know
when to use time-sharing rather than power control, the paper studies the
hyper-surfaces convexity behavior in details for the 2-user channel with
specific results pertaining to the symmetric channel. It is observed that most
of the achievable rate region can be covered by using simple On/Off binary
power control in conjunction with time-sharing. The binary power control
creates several corner points in the n-dimensional space. The crystallized rate
region, named after its resulting crystal shape, is hence presented as the
time-sharing convex hull imposed onto those corner points; thereby offering a
viable new perspective of looking at the achievable rate region of the
interference channel.Comment: 28 pages, 12 figures, to appear in IEEE Transactions of Wireless
Communicatio
Extrinsic Jensen-Shannon Divergence: Applications to Variable-Length Coding
This paper considers the problem of variable-length coding over a discrete
memoryless channel (DMC) with noiseless feedback. The paper provides a
stochastic control view of the problem whose solution is analyzed via a newly
proposed symmetrized divergence, termed extrinsic Jensen-Shannon (EJS)
divergence. It is shown that strictly positive lower bounds on EJS divergence
provide non-asymptotic upper bounds on the expected code length. The paper
presents strictly positive lower bounds on EJS divergence, and hence
non-asymptotic upper bounds on the expected code length, for the following two
coding schemes: variable-length posterior matching and MaxEJS coding scheme
which is based on a greedy maximization of the EJS divergence.
As an asymptotic corollary of the main results, this paper also provides a
rate-reliability test. Variable-length coding schemes that satisfy the
condition(s) of the test for parameters and , are guaranteed to achieve
rate and error exponent . The results are specialized for posterior
matching and MaxEJS to obtain deterministic one-phase coding schemes achieving
capacity and optimal error exponent. For the special case of symmetric
binary-input channels, simpler deterministic schemes of optimal performance are
proposed and analyzed.Comment: 17 pages (two-column), 4 figures, to appear in IEEE Transactions on
Information Theor
Instantly Decodable Network Coding: From Centralized to Device-to-Device Communications
From its introduction to its quindecennial, network coding has built a strong reputation for enhancing packet recovery and achieving maximum information flow in both wired and wireless networks. Traditional studies focused on optimizing the throughput of the system by proposing elaborate schemes able to reach the network capacity. With the shift toward distributed computing on mobile devices, performance and complexity become both critical factors that affect the efficiency of a coding strategy. Instantly decodable network coding presents itself as a new paradigm in network coding that trades off these two aspects. This paper review instantly decodable network coding schemes by identifying, categorizing, and evaluating various algorithms proposed in the literature. The first part of the manuscript investigates the conventional centralized systems, in which all decisions are carried out by a central unit, e.g., a base-station. In particular, two successful approaches known as the strict and generalized instantly decodable network are compared in terms of reliability, performance, complexity, and packet selection methodology. The second part considers the use of instantly decodable codes in a device-to-device communication network, in which devices speed up the recovery of the missing packets by exchanging network coded packets. Although the performance improvements are directly proportional to the computational complexity increases, numerous successful schemes from both the performance and complexity viewpoints are identified
The Rock, Fall 2011 (vol. 82, no. 1)
https://poetcommons.whittier.edu/rock/1197/thumbnail.jp
A review on the study of historical structures using integrated investigation activities for seismic safety assessment. Part I: Dynamic investigation
Assessment of seismic safety of historical structures is a challenging task because the information available about the assessed structure is usually limited. Therefore, it is often necessary to exploit a number of integrated investigation activities to increase the level of knowledge about the historical structure under consideration. Thus, in the case of any need for providing the structure with strengthening intervention, this intervention will be a minimal and any unnecessary strengthening operations will be avoided. This paper presents a literature review carried out to cover the current state-of-the-art of a number of investigation activities carried out integrally for the seismic safety assessment of historical structures. It is presented in two parts. In this first part, the covered topic is the dynamic investigation of historical structures which includes the dynamic identification tests, the dynamic monitoring, and the modal parameters identification methods with the classical and the advanced techniques like the peak picking and the stochastic subspace identification.Peer ReviewedPostprint (published version
- …