41 research outputs found

    Opportunistic Interference Management for Multicarrier systems

    Full text link
    We study opportunistic interference management when there is bursty interference in parallel 2-user linear deterministic interference channels. A degraded message set communication problem is formulated to exploit the burstiness of interference in M subcarriers allocated to each user. We focus on symmetric rate requirements based on the number of interfered subcarriers rather than the exact set of interfered subcarriers. Inner bounds are obtained using erasure coding, signal-scale alignment and Han-Kobayashi coding strategy. Tight outer bounds for a variety of regimes are obtained using the El Gamal-Costa injective interference channel bounds and a sliding window subset entropy inequality. The result demonstrates an application of techniques from multilevel diversity coding to interference channels. We also conjecture outer bounds indicating the sub-optimality of erasure coding across subcarriers in certain regimes.Comment: 8 pages, 5 figures, a shorter version of this work will appear in the proceedings of ISIT 201

    Harnessing Bursty Interference in Multicarrier Systems with Feedback

    Full text link
    We study parallel symmetric 2-user interference channels when the interference is bursty and feedback is available from the respective receivers. Presence of interference in each subcarrier is modeled as a memoryless Bernoulli random state. The states across subcarriers are drawn from an arbitrary joint distribution with the same marginal probability for each subcarrier and instantiated i.i.d. over time. For the linear deterministic setup, we give a complete characterization of the capacity region. For the setup with Gaussian noise, we give outer bounds and a tight generalized degrees of freedom characterization. We propose a novel helping mechanism which enables subcarriers in very strong interference regime to help in recovering interfered signals for subcarriers in strong and weak interference regimes. Depending on the interference and burstiness regime, the inner bounds either employ the proposed helping mechanism to code across subcarriers or treat the subcarriers separately. The outer bounds demonstrate a connection to a subset entropy inequality by Madiman and Tetali.Comment: A shorter version of this work will appear in the proceedings of ISIT 201

    Secure State Estimation: Optimal Guarantees against Sensor Attacks in the Presence of Noise

    Get PDF
    Motivated by the need to secure cyber-physical systems against attacks, we consider the problem of estimating the state of a noisy linear dynamical system when a subset of sensors is arbitrarily corrupted by an adversary. We propose a secure state estimation algorithm and derive (optimal) bounds on the achievable state estimation error. In addition, as a result of independent interest, we give a coding theoretic interpretation for prior work on secure state estimation against sensor attacks in a noiseless dynamical system.Comment: A shorter version of this work will appear in the proceedings of ISIT 201

    ΠŸΡ€ΠΎΡ„Π΅ΡΡΠΎΡ€ Π‘. Π‘. Π‘ΡƒΠ»Π°ΠΊΡˆΠΈΠ½ (1919-2011)

    Get PDF
    УшСл ΠΈΠ· ΠΆΠΈΠ·Π½ΠΈ ΠΎΡΠ½ΠΎΠ²Π°Ρ‚Π΅Π»ΡŒ ΠΊΠ°Ρ„Π΅Π΄Ρ€Ρ‹ бурСния скваТин, Π΄ΠΎΠΊΡ‚ΠΎΡ€ тСхничСских Π½Π°ΡƒΠΊ, профСссор, ЗаслуТСнный Π΄Π΅ΡΡ‚Π΅Π»ΡŒ Π½Π°ΡƒΠΊΠΈ ΠΈ Ρ‚Π΅Ρ…Π½ΠΈΠΊΠΈ Российской Π€Π΅Π΄Π΅Ρ€Π°Ρ†ΠΈΠΈ, Π›Π°ΡƒΡ€Π΅Π°Ρ‚ ΠΏΡ€Π΅ΠΌΠΈΠΈ Π‘ΠΎΠ²Π΅Ρ‚Π° ΠœΠΈΠ½ΠΈΡΡ‚Ρ€ΠΎΠ² Π‘Π‘Π‘Π , ΠŸΠΎΡ‡Ρ‘Ρ‚Π½Ρ‹ΠΉ Ρ€Π°Π·Π²Π΅Π΄Ρ‡ΠΈΠΊ Π½Π΅Π΄Ρ€, ΠžΡ‚Π»ΠΈΡ‡Π½ΠΈΠΊ Ρ€Π°Π·Π²Π΅Π΄ΠΊΠΈ Π½Π΅Π΄Ρ€, ΠŸΠΎΡ‡Ρ‘Ρ‚Π½Ρ‹ΠΉ Π°ΠΊΠ°Π΄Π΅ΠΌΠΈΠΊ АЕН Π Π€, "ΠŸΠΎΡ‡Π΅Ρ‚Π½Ρ‹ΠΉ Ρ€Π°Π±ΠΎΡ‚Π½ΠΈΠΊ ΠΏΡ€ΠΎΡ„Π΅ΡΡΠΈΠΎΠ½Π°Π»ΡŒΠ½ΠΎΠ³ΠΎ образования Российской Π€Π΅Π΄Π΅Ρ€Π°Ρ†ΠΈΠΈ" - Π‘Ρ‚Π΅ΠΏΠ°Π½ Π‘Ρ‚Π΅ΠΏΠ°Π½ΠΎΠ²ΠΈΡ‡ Π‘ΡƒΠ»Π°ΠΊΡˆΠΈΠ½
    corecore