Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Irregular repetition slotted ALOHA is a random access scheme where users transmit multiple copies of a packet to the receiver to provide time-domain diversity; then, the receiver attempts to iteratively decode packets and cancel their interference contribution in other time slots, increasing the chance of resolving collisions and decoding more packets. This scheme was shown to support larger system...
This paper proposes a new fingerprinting decoder based on the Markov Chain Monte Carlo (MCMC) method. A Gibbs sampler generates groups of users according to the posterior probability that these users could have forged the sequence extracted from the pirated content. The marginal probability that a given user pertains to the collusion is then estimated by a Monte Carlo method. The users having the...
We present an optimization-based approach to stochastic control problems with nonclassical information structures. We cast these problems equivalently as optimization problems on joint distributions. The resulting problems are necessarily nonconvex. Our approach to solving them is through convex relaxation. We solve the instance solved by Bansal and Başar [1] with a particular application of this...
This paper extends a recently proposed theory of nonstochastic maximin information to study feedback systems with erroneous channels. The concepts of conditional and directed maximin information are introduced, without assuming any statistical structure. It is proved that the zero-error feedback capacity of a stationary memoryless channel coincides with the largest rate of directed maximin information...
The spectral efficiency of cellular communication systems is limited by inter-cell interference. Especially cell edge users will experience bad performance. A potential remedy to inter-cell interference is joint signal processing on the base station (BS) side. In the cellular uplink the received signals of multiple BSs can be processed at a central node, referred to as joint detection (JD). Field...
This work studies joint base station (BS) selection and distributed compression for the uplink of a cloud radio access network. Multiple multi-antenna BSs are connected to a central unit, also referred to as cloud decoder, via capacity-constrained backhaul links. Since the signals received at different BSs are correlated, distributed source coding strategies for communication to the cloud decoder...
Cooperative communication has been shown that it is an effective way to achieve spatial diversity in order to combat the user-outage caused by effects fading channel. Except for amplify-and-forward (AF) and decode-and-forward (DF), compressed-and-forward (CF) is also an efficient forwarding strategy. In the existing CF protocol, the relay will switch to the DF mode when the source transmitted signal...
Interference alignment (IA) in uplink coordinated multipoint (CoMP) has been proved to be able to improve the performance in next generation mobile cellular systems. In this paper, an efficient codebook-based Max-SINR IA aided uplink (UL) CoMP scheme with full cooperation at the receiver is proposed. Compared to conventional IA, codebook-based IA requires less feedback information and maintains the...
The demand for high data rate and uniform throughput for cellular user terminals in the cell coverage leads to a new uplink coordinated multipoint (CoMP) transmission/reception technique proposed by the 3GPP LTE-A system. In this paper, we incorporate the recently proposed interference alignment (IA) techniques in uplink CoMP to improve system capacity by leveraging the full cooperation and information...
We bring together two research topics which have been the focus of significant research individually: modulation classification and iterative receiver design. In this work, these topics are joined within the framework of factor graphs which provide a unified approach to representing a variety of algorithms, especially iterative algorithms. Specifically, in this paper we present a factor graph which...
Wireless sensor networks have gained considerable interest in the research community during the last decade. In this paper, we target the lower layers in the protocol stack of wireless sensor networks, for the aim of providing a reliable backbone for multimedia applications where error propagation and relatively high error rates are a major concern. Decoding and fusion techniques are developed and...
This paper proposes the application of the stochastic decoding approach for joint decoding of Low-Density Parity-Check (LDPC) codes and Partial-Response (PR) channels. It shows how the computationally-intensive operations required in the PR channel detection can be performed using simple circuitry in the stochastic domain. Performance results of the stochastic approach are compared against conventional...
We revisit the dilemma of whether one should or should not code when operating under delay constraints. In those curious cases when the source and the channel are probabilistically matched so that symbol-by-symbol coding is optimal in terms of the average distortion achieved, we show that it also achieves the dispersion of joint source-channel coding. Moreover, even in the absence of such probabilistic...
This work considers the definition of the excess-distortion exponent, used to measure the asymptotic finite blocklength behavior of joint source-channel coding. We arrive at the conclusion that it is not a meaningful measure for the operational tradeoffs of a scheme. We propose a new definition, which makes a distinction between the processing block of the coding scheme (which implies delay and may...
We study the two-user discrete memoryless compound multiple access channel (MAC) with common message and two specially correlated channel states each known non-causally by one of the encoders. Two channel states are correlated in the sense of Slepian-Wolf (SW) in which two correlated states are modeled by three independent states: a common state and two private states. By using superposition coding,...
The model of a side information “vending machine” accounts for scenarios in which acquiring side information is costly and thus should be done efficiently. In this paper, the three-node cascade source coding problem is studied under the assumption that a side information vending machine is available either at the intermediate or at the end node. In both cases, a single-letter characterization of the...
This paper focuses on a new framework for scalable coding of information based on principles derived from common information of two dependent random variables. In the conventional successive refinement setting, the encoder generates two layers of information called the base layer and the enhancement layer. The first decoder, which receives only the base layer, produces a coarse reconstruction of the...
Recent results by Chen et al. and Polyanskiy et al. explore using feedback to approach capacity with short blocklengths. This paper explores Chernoff bounding techniques to extend the rate-compatible sphere-packing (RCSP) analysis proposed by Chen et al. to scenarios involving numerous retransmissions and different step sizes in each incremental retransmission. Williamson et al. employ exact RCSP...
This paper addresses the L-channel multiple descriptions problem for a Gaussian source under mean squared error (MSE) distortion metric. We focus on particular cross-sections of the general rate-distortion region where a subset the 2L - 1 distortion constraints are not imposed. Specifically, we assume that certain descriptions are never received simultaneously at the decoder and thereby the transmitted...
H.264 is widely used in recently years and has achieved a significant improvement in coding efficiency. The entropy coding methods used in H.264 are CAVLC and CABAC. Although these two variable length code methods can achieve high compression, they are very sensitive to channel errors. In this paper, An iterative joint source channel decoder which combines the variable length code and low density...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.