18 research outputs found

    Conventional and manipulated growth of Cu-Cu(111)

    Get PDF
    Molecular beam epitaxy of Cu on Cu(111) was studied using thermal energy He scattering, in the temperature range between 100 and 450 K. Three-dimensional growth was observed in the whole temperature range. To determine the onset of various diffusion processes, submonolayer films formed by deposition at low temperature were annealed. Annealing proceeds in two steps. The first step is interpreted as a change in island shape, the second as Ostwald-ripening. A comparison with homoepitaxy on Pt(111) and Ag(111) is made. Growth manipulation was carried out by artificially increasing the island number density via intervention in the nucleation stage of each layer. The procedures applied were temperature reduction during nucleation as well as pulsed ion bombardment. These techniques enabled the convenient growth of good quality films consisting of a large number of monolayers. Finally, the use of oxygen as a surfactant modifying the growth mode was investigated. Under some growth conditions, pre-exposure of the surface to oxygen was found to induce weak He-intensity oscillations during deposition. The quality of the films grown in this way was, however, low

    Efficient Computation of EXIT Functions for Nonbinary Iterative Decoding

    No full text
    The calculation of nonbinary extrinsic information transfer charts for the iterative decoding of concatenated index-based codes is addressed. We show that the extrinsic information at the output of a constituent a posteriori probability decoder can be calculated with very low complexity, where expensive histogram measurements are not required anymore. An example for turbo trellis-coded modulation demonstrates the capabilities of the proposed approach

    Near-capacity turbo trellis coded modulation design based on EXIT charts and union bounds

    No full text
    Bandwidth efficient parallel-concatenated Turbo Trellis Coded Modulation (TTCM) schemes were designed for communicating over uncorrelated Rayleigh fading channels. A symbol-based union bound was derived for analysing the error floor of the proposed TTCM schemes. A pair of In-phase (I) and Quadrature-phase (Q) interleavers were employed for interleaving the I and Q components of the TTCM coded symbols, in order to attain an increased diversity gain. The decoding convergence of the IQ-TTCM schemes was analysed using symbol-based EXtrinsic Information Transfer (EXIT) charts. The best TTCM component codes were selected with the aid of both the symbol-based union bound and non-binary EXIT charts, for designing capacity-approaching IQ-TTCM schemes in the context of 8PSK, 16QAM, 32QAM and 64QAM modulation schemes

    Private and Secure Distributed Matrix Multiplication with Flexible Communication Load

    Get PDF
    Large matrix multiplications are central to large-scale machine learning applications. These operations are often carried out on a distributed computing platform with a master server and multiple workers in the cloud operating in parallel. For such distributed platforms, it has been recently shown that coding over the input data matrices can reduce the computational delay, yielding a trade-off between recovery threshold, i.e., the number of workers required to recover the matrix product, and communication load, i.e., the total amount of data to be downloaded from the workers. In this paper, in addition to exact recovery requirements, we impose security and privacy constraints on the data matrices, and study the recovery threshold as a function of the communication load. We first assume that both matrices contain private information and that workers can collude to eavesdrop on the content of these data matrices. For this problem, we introduce a novel class of secure codes, referred to as secure generalized PolyDot (SGPD) codes, that generalize state-of-the-art non-secure codes for matrix multiplication. SGPD codes allow a flexible trade-off between recovery threshold and communication load for a fixed maximum number of colluding workers while providing perfect secrecy for the two data matrices. We then study a connection between secure matrix multiplication and private information retrieval. We specifically assume that one of the data matrices is taken from a public set known to all the workers. In this setup, the identity of the matrix of interest should be kept private from the workers. For this model, we present a variant of generalized PolyDot codes that can guarantee both secrecy of one matrix and privacy for the identity of the other matrix for the case of no colluding servers.Comment: 12 pages, 9 figures, this submission subsumes arXiv:1901.07705. This work has been submitted to the IEEE for possible publicatio

    Strong Converses are Just Edge Removal Properties

    No full text

    Distributed and Private Coded Matrix Computation with Flexible Communication Load

    No full text

    LDPC Coded Multiuser Shaping for the Gaussian Multiple Access Channel

    No full text
    The joint design of input constellation and low-density parity-check (LDPC) codes to approach the symmetric capacity of the two-user Gaussian multiple access channel is studied. More specifically, multilevel coding is employed at each user to construct a high-order input constellation and the constellations of the users are jointly designed so as to maximize the multiuser shaping gain. At the receiver, each layer of the multilevel coding is jointly decoded among users, while successive cancellation is employed across layers. The LDPC code employed by each user in each layer is designed using EXIT charts to support joint decoding among users for the prescribed per-layer rate and SNR. Numerical simulations are provided to validate the proposed constellation and LDPC code designs

    Coded Computation Against Straggling Channel Decoders in the Cloud for Gaussian Channels

    No full text
    corecore