6,279 research outputs found
Secure aggregation of distributed information: How a team of agents can safely share secrets in front of a spy
We consider the generic problem of Secure Aggregation of Distributed
Information (SADI), where several agents acting as a team have information
distributed among them, modeled by means of a publicly known deck of cards
distributed among the agents, so that each of them knows only her cards. The
agents have to exchange and aggregate the information about how the cards are
distributed among them by means of public announcements over insecure
communication channels, intercepted by an adversary "eavesdropper", in such a
way that the adversary does not learn who holds any of the cards. We present a
combinatorial construction of protocols that provides a direct solution of a
class of SADI problems and develop a technique of iterated reduction of SADI
problems to smaller ones which are eventually solvable directly. We show that
our methods provide a solution to a large class of SADI problems, including all
SADI problems with sufficiently large size and sufficiently balanced card
distributions
Optimized puncturing distributions for irregular non-binary LDPC codes
In this paper we design non-uniform bit-wise puncturing distributions for
irregular non-binary LDPC (NB-LDPC) codes. The puncturing distributions are
optimized by minimizing the decoding threshold of the punctured LDPC code, the
threshold being computed with a Monte-Carlo implementation of Density
Evolution. First, we show that Density Evolution computed with Monte-Carlo
simulations provides accurate (very close) and precise (small variance)
estimates of NB-LDPC code ensemble thresholds. Based on the proposed method, we
analyze several puncturing distributions for regular and semi-regular codes,
obtained either by clustering punctured bits, or spreading them over the
symbol-nodes of the Tanner graph. Finally, optimized puncturing distributions
for non-binary LDPC codes with small maximum degree are presented, which
exhibit a gap between 0.2 and 0.5 dB to the channel capacity, for punctured
rates varying from 0.5 to 0.9.Comment: 6 pages, ISITA1
Extended Non-Binary Low-Density Parity-Check Codes over Erasure Channels
Based on the extended binary image of non-binary LDPC codes, we propose a
method for generating extra redundant bits, such as to decreases the coding
rate of a mother code. The proposed method allows for using the same decoder,
regardless of how many extra redundant bits have been produced, which
considerably increases the flexibility of the system without significantly
increasing its complexity. Extended codes are also optimized for the binary
erasure channel, by using density evolution methods. Nevertheless, the results
presented in this paper can easily be extrapolated to more general channel
models.Comment: ISIT 2011, submitte
Analysis and Design of Finite Alphabet Iterative Decoders Robust to Faulty Hardware
This paper addresses the problem of designing LDPC decoders robust to
transient errors introduced by a faulty hardware. We assume that the faulty
hardware introduces errors during the message passing updates and we propose a
general framework for the definition of the message update faulty functions.
Within this framework, we define symmetry conditions for the faulty functions,
and derive two simple error models used in the analysis. With this analysis, we
propose a new interpretation of the functional Density Evolution threshold
previously introduced, and show its limitations in case of highly unreliable
hardware. However, we show that under restricted decoder noise conditions, the
functional threshold can be used to predict the convergence behavior of FAIDs
under faulty hardware. In particular, we reveal the existence of robust and
non-robust FAIDs and propose a framework for the design of robust decoders. We
finally illustrate robust and non-robust decoders behaviors of finite length
codes using Monte Carlo simulations.Comment: 30 pages, submitted to IEEE Transactions on Communication
Crossed products and twisted -graph algebras
An automorphism of a -graph induces a crossed product
which is isomorphic to a
-graph algebra . In this paper
we show how this process interacts with -graph -algebras which have
been twisted by an element of their second cohomology group. This analysis is
done using a long exact sequence in cohomology associated to this data. We
conclude with some examplesComment: 15 pages, 2 figure
Indicators of weed competition on Organic Winter Wheat
Organic winter wheat production is limited by climatic and agronomic factors, including weed competition. The incidence of weeds on yield limitation can be characterized through various early indicators to predict weed occurrence and competition. A network of 10 fields of organic winter wheat was implemented in the South East of France in 2005-2006. Results showed that weed density, dynamics and diversity are good indicators for weed occurrence and competition
Density Evolution and Functional Threshold for the Noisy Min-Sum Decoder
This paper investigates the behavior of the Min-Sum decoder running on noisy
devices. The aim is to evaluate the robustness of the decoder in the presence
of computation noise, e.g. due to faulty logic in the processing units, which
represents a new source of errors that may occur during the decoding process.
To this end, we first introduce probabilistic models for the arithmetic and
logic units of the the finite-precision Min-Sum decoder, and then carry out the
density evolution analysis of the noisy Min-Sum decoder. We show that in some
particular cases, the noise introduced by the device can help the Min-Sum
decoder to escape from fixed points attractors, and may actually result in an
increased correction capacity with respect to the noiseless decoder. We also
reveal the existence of a specific threshold phenomenon, referred to as
functional threshold. The behavior of the noisy decoder is demonstrated in the
asymptotic limit of the code-length -- by using "noisy" density evolution
equations -- and it is also verified in the finite-length case by Monte-Carlo
simulation.Comment: 46 pages (draft version); extended version of the paper with same
title, submitted to IEEE Transactions on Communication
- …