44,564 research outputs found

    Sign-Compute-Resolve for Random Access

    Get PDF
    We present an approach to random access that is based on three elements: physical-layer network coding, signature codes and tree splitting. Upon occurrence of a collision, physical-layer network coding enables the receiver to decode the sum of the information that was transmitted by the individual users. For each user this information consists of the data that the user wants to communicate as well as the user's signature. As long as no more than KK users collide, their identities can be recovered from the sum of their signatures. A splitting protocol is used to deal with the case that more than KK users collide. We measure the performance of the proposed method in terms of user resolution rate as well as overall throughput of the system. The results show that our approach significantly increases the performance of the system even compared to coded random access, where collisions are not wasted, but are reused in successive interference cancellation.Comment: Accepted for presentation at 52nd Annual Allerton Conference on Communication, Control, and Computin

    Sign-Compute-Resolve for Tree Splitting Random Access

    Get PDF
    We present a framework for random access that is based on three elements: physical-layer network coding (PLNC), signature codes and tree splitting. In presence of a collision, physical-layer network coding enables the receiver to decode, i.e. compute, the sum of the packets that were transmitted by the individual users. For each user, the packet consists of the user's signature, as well as the data that the user wants to communicate. As long as no more than K users collide, their identities can be recovered from the sum of their signatures. This framework for creating and transmitting packets can be used as a fundamental building block in random access algorithms, since it helps to deal efficiently with the uncertainty of the set of contending terminals. In this paper we show how to apply the framework in conjunction with a tree-splitting algorithm, which is required to deal with the case that more than K users collide. We demonstrate that our approach achieves throughput that tends to 1 rapidly as K increases. We also present results on net data-rate of the system, showing the impact of the overheads of the constituent elements of the proposed protocol. We compare the performance of our scheme with an upper bound that is obtained under the assumption that the active users are a priori known. Also, we consider an upper bound on the net data-rate for any PLNC based strategy in which one linear equation per slot is decoded. We show that already at modest packet lengths, the net data-rate of our scheme becomes close to the second upper bound, i.e. the overhead of the contention resolution algorithm and the signature codes vanishes.Comment: This is an extended version of arXiv:1409.6902. Accepted for publication in the IEEE Transactions on Information Theor

    Braids of entangled particle trajectories

    Full text link
    In many applications, the two-dimensional trajectories of fluid particles are available, but little is known about the underlying flow. Oceanic floats are a clear example. To extract quantitative information from such data, one can measure single-particle dispersion coefficients, but this only uses one trajectory at a time, so much of the information on relative motion is lost. In some circumstances the trajectories happen to remain close long enough to measure finite-time Lyapunov exponents, but this is rare. We propose to use tools from braid theory and the topology of surface mappings to approximate the topological entropy of the underlying flow. The procedure uses all the trajectory data and is inherently global. The topological entropy is a measure of the entanglement of the trajectories, and converges to zero if they are not entangled in a complex manner (for instance, if the trajectories are all in a large vortex). We illustrate the techniques on some simple dynamical systems and on float data from the Labrador sea.Comment: 24 pages, 21 figures. PDFLaTeX with RevTeX4 macros. Matlab code included with source. Fixed an inconsistent convention problem. Final versio

    Estimation under group actions: recovering orbits from invariants

    Full text link
    Motivated by geometric problems in signal processing, computer vision, and structural biology, we study a class of orbit recovery problems where we observe very noisy copies of an unknown signal, each acted upon by a random element of some group (such as Z/p or SO(3)). The goal is to recover the orbit of the signal under the group action in the high-noise regime. This generalizes problems of interest such as multi-reference alignment (MRA) and the reconstruction problem in cryo-electron microscopy (cryo-EM). We obtain matching lower and upper bounds on the sample complexity of these problems in high generality, showing that the statistical difficulty is intricately determined by the invariant theory of the underlying symmetry group. In particular, we determine that for cryo-EM with noise variance σ2\sigma^2 and uniform viewing directions, the number of samples required scales as σ6\sigma^6. We match this bound with a novel algorithm for ab initio reconstruction in cryo-EM, based on invariant features of degree at most 3. We further discuss how to recover multiple molecular structures from heterogeneous cryo-EM samples.Comment: 54 pages. This version contains a number of new result

    Fluctuations in the Site Disordered Traveling Salesman Problem

    Full text link
    We extend a previous statistical mechanical treatment of the traveling salesman problem by defining a discrete "site disordered'' problem in which fluctuations about saddle points can be computed. The results clarify the basis of our original treatment, and illuminate but do not resolve the difficulties of taking the zero temperature limit to obtain minimal path lengths.Comment: 17 pages, 3 eps figures, revte
    • …
    corecore