41 research outputs found
Opportunistic Interference Management for Multicarrier systems
We study opportunistic interference management when there is bursty
interference in parallel 2-user linear deterministic interference channels. A
degraded message set communication problem is formulated to exploit the
burstiness of interference in M subcarriers allocated to each user. We focus on
symmetric rate requirements based on the number of interfered subcarriers
rather than the exact set of interfered subcarriers. Inner bounds are obtained
using erasure coding, signal-scale alignment and Han-Kobayashi coding strategy.
Tight outer bounds for a variety of regimes are obtained using the El
Gamal-Costa injective interference channel bounds and a sliding window subset
entropy inequality. The result demonstrates an application of techniques from
multilevel diversity coding to interference channels. We also conjecture outer
bounds indicating the sub-optimality of erasure coding across subcarriers in
certain regimes.Comment: 8 pages, 5 figures, a shorter version of this work will appear in the
proceedings of ISIT 201
Harnessing Bursty Interference in Multicarrier Systems with Feedback
We study parallel symmetric 2-user interference channels when the
interference is bursty and feedback is available from the respective receivers.
Presence of interference in each subcarrier is modeled as a memoryless
Bernoulli random state. The states across subcarriers are drawn from an
arbitrary joint distribution with the same marginal probability for each
subcarrier and instantiated i.i.d. over time. For the linear deterministic
setup, we give a complete characterization of the capacity region. For the
setup with Gaussian noise, we give outer bounds and a tight generalized degrees
of freedom characterization. We propose a novel helping mechanism which enables
subcarriers in very strong interference regime to help in recovering interfered
signals for subcarriers in strong and weak interference regimes. Depending on
the interference and burstiness regime, the inner bounds either employ the
proposed helping mechanism to code across subcarriers or treat the subcarriers
separately. The outer bounds demonstrate a connection to a subset entropy
inequality by Madiman and Tetali.Comment: A shorter version of this work will appear in the proceedings of ISIT
201
Secure State Estimation: Optimal Guarantees against Sensor Attacks in the Presence of Noise
Motivated by the need to secure cyber-physical systems against attacks, we
consider the problem of estimating the state of a noisy linear dynamical system
when a subset of sensors is arbitrarily corrupted by an adversary. We propose a
secure state estimation algorithm and derive (optimal) bounds on the achievable
state estimation error. In addition, as a result of independent interest, we
give a coding theoretic interpretation for prior work on secure state
estimation against sensor attacks in a noiseless dynamical system.Comment: A shorter version of this work will appear in the proceedings of ISIT
201
ΠΡΠΎΡΠ΅ΡΡΠΎΡ Π‘. Π‘. Π‘ΡΠ»Π°ΠΊΡΠΈΠ½ (1919-2011)
Π£ΡΠ΅Π» ΠΈΠ· ΠΆΠΈΠ·Π½ΠΈ ΠΎΡΠ½ΠΎΠ²Π°ΡΠ΅Π»Ρ ΠΊΠ°ΡΠ΅Π΄ΡΡ Π±ΡΡΠ΅Π½ΠΈΡ ΡΠΊΠ²Π°ΠΆΠΈΠ½, Π΄ΠΎΠΊΡΠΎΡ ΡΠ΅Ρ
Π½ΠΈΡΠ΅ΡΠΊΠΈΡ
Π½Π°ΡΠΊ, ΠΏΡΠΎΡΠ΅ΡΡΠΎΡ, ΠΠ°ΡΠ»ΡΠΆΠ΅Π½Π½ΡΠΉ Π΄Π΅ΡΡΠ΅Π»Ρ Π½Π°ΡΠΊΠΈ ΠΈ ΡΠ΅Ρ
Π½ΠΈΠΊΠΈ Π ΠΎΡΡΠΈΠΉΡΠΊΠΎΠΉ Π€Π΅Π΄Π΅ΡΠ°ΡΠΈΠΈ, ΠΠ°ΡΡΠ΅Π°Ρ ΠΏΡΠ΅ΠΌΠΈΠΈ Π‘ΠΎΠ²Π΅ΡΠ° ΠΠΈΠ½ΠΈΡΡΡΠΎΠ² Π‘Π‘Π‘Π , ΠΠΎΡΡΡΠ½ΡΠΉ ΡΠ°Π·Π²Π΅Π΄ΡΠΈΠΊ Π½Π΅Π΄Ρ, ΠΡΠ»ΠΈΡΠ½ΠΈΠΊ ΡΠ°Π·Π²Π΅Π΄ΠΊΠΈ Π½Π΅Π΄Ρ, ΠΠΎΡΡΡΠ½ΡΠΉ Π°ΠΊΠ°Π΄Π΅ΠΌΠΈΠΊ ΠΠΠ Π Π€, "ΠΠΎΡΠ΅ΡΠ½ΡΠΉ ΡΠ°Π±ΠΎΡΠ½ΠΈΠΊ ΠΏΡΠΎΡΠ΅ΡΡΠΈΠΎΠ½Π°Π»ΡΠ½ΠΎΠ³ΠΎ ΠΎΠ±ΡΠ°Π·ΠΎΠ²Π°Π½ΠΈΡ Π ΠΎΡΡΠΈΠΉΡΠΊΠΎΠΉ Π€Π΅Π΄Π΅ΡΠ°ΡΠΈΠΈ" - Π‘ΡΠ΅ΠΏΠ°Π½ Π‘ΡΠ΅ΠΏΠ°Π½ΠΎΠ²ΠΈΡ Π‘ΡΠ»Π°ΠΊΡΠΈΠ½