44,564 research outputs found
Sign-Compute-Resolve for Random Access
We present an approach to random access that is based on three elements:
physical-layer network coding, signature codes and tree splitting. Upon
occurrence of a collision, physical-layer network coding enables the receiver
to decode the sum of the information that was transmitted by the individual
users. For each user this information consists of the data that the user wants
to communicate as well as the user's signature. As long as no more than
users collide, their identities can be recovered from the sum of their
signatures. A splitting protocol is used to deal with the case that more than
users collide. We measure the performance of the proposed method in terms
of user resolution rate as well as overall throughput of the system. The
results show that our approach significantly increases the performance of the
system even compared to coded random access, where collisions are not wasted,
but are reused in successive interference cancellation.Comment: Accepted for presentation at 52nd Annual Allerton Conference on
Communication, Control, and Computin
Sign-Compute-Resolve for Tree Splitting Random Access
We present a framework for random access that is based on three elements:
physical-layer network coding (PLNC), signature codes and tree splitting. In
presence of a collision, physical-layer network coding enables the receiver to
decode, i.e. compute, the sum of the packets that were transmitted by the
individual users. For each user, the packet consists of the user's signature,
as well as the data that the user wants to communicate. As long as no more than
K users collide, their identities can be recovered from the sum of their
signatures. This framework for creating and transmitting packets can be used as
a fundamental building block in random access algorithms, since it helps to
deal efficiently with the uncertainty of the set of contending terminals. In
this paper we show how to apply the framework in conjunction with a
tree-splitting algorithm, which is required to deal with the case that more
than K users collide. We demonstrate that our approach achieves throughput that
tends to 1 rapidly as K increases. We also present results on net data-rate of
the system, showing the impact of the overheads of the constituent elements of
the proposed protocol. We compare the performance of our scheme with an upper
bound that is obtained under the assumption that the active users are a priori
known. Also, we consider an upper bound on the net data-rate for any PLNC based
strategy in which one linear equation per slot is decoded. We show that already
at modest packet lengths, the net data-rate of our scheme becomes close to the
second upper bound, i.e. the overhead of the contention resolution algorithm
and the signature codes vanishes.Comment: This is an extended version of arXiv:1409.6902. Accepted for
publication in the IEEE Transactions on Information Theor
Braids of entangled particle trajectories
In many applications, the two-dimensional trajectories of fluid particles are
available, but little is known about the underlying flow. Oceanic floats are a
clear example. To extract quantitative information from such data, one can
measure single-particle dispersion coefficients, but this only uses one
trajectory at a time, so much of the information on relative motion is lost. In
some circumstances the trajectories happen to remain close long enough to
measure finite-time Lyapunov exponents, but this is rare. We propose to use
tools from braid theory and the topology of surface mappings to approximate the
topological entropy of the underlying flow. The procedure uses all the
trajectory data and is inherently global. The topological entropy is a measure
of the entanglement of the trajectories, and converges to zero if they are not
entangled in a complex manner (for instance, if the trajectories are all in a
large vortex). We illustrate the techniques on some simple dynamical systems
and on float data from the Labrador sea.Comment: 24 pages, 21 figures. PDFLaTeX with RevTeX4 macros. Matlab code
included with source. Fixed an inconsistent convention problem. Final versio
Estimation under group actions: recovering orbits from invariants
Motivated by geometric problems in signal processing, computer vision, and
structural biology, we study a class of orbit recovery problems where we
observe very noisy copies of an unknown signal, each acted upon by a random
element of some group (such as Z/p or SO(3)). The goal is to recover the orbit
of the signal under the group action in the high-noise regime. This generalizes
problems of interest such as multi-reference alignment (MRA) and the
reconstruction problem in cryo-electron microscopy (cryo-EM). We obtain
matching lower and upper bounds on the sample complexity of these problems in
high generality, showing that the statistical difficulty is intricately
determined by the invariant theory of the underlying symmetry group.
In particular, we determine that for cryo-EM with noise variance
and uniform viewing directions, the number of samples required scales as
. We match this bound with a novel algorithm for ab initio
reconstruction in cryo-EM, based on invariant features of degree at most 3. We
further discuss how to recover multiple molecular structures from heterogeneous
cryo-EM samples.Comment: 54 pages. This version contains a number of new result
Fluctuations in the Site Disordered Traveling Salesman Problem
We extend a previous statistical mechanical treatment of the traveling
salesman problem by defining a discrete "site disordered'' problem in which
fluctuations about saddle points can be computed. The results clarify the basis
of our original treatment, and illuminate but do not resolve the difficulties
of taking the zero temperature limit to obtain minimal path lengths.Comment: 17 pages, 3 eps figures, revte
- …