Computation of Real-Valued Functions Over the Channel in Wireless Sensor Networks

Total Page:16

File Type:pdf, Size:1020Kb

Computation of Real-Valued Functions Over the Channel in Wireless Sensor Networks Technische Universität München Lehrstuhl für Theoretische Informationstechnik Computation of Real-Valued Functions Over the Channel in Wireless Sensor Networks Mario Goldenbaum Vollständiger Abdruck der von der Fakultät für Elektrotechnik und Informations- technik der Technischen Universität München zur Erlangung des akademischen Grades eines Doktor-Ingenieurs (Dr. -Ing.) genehmigten Dissertation. Vorsitzender: Univ. -Prof. Dr. -Ing. habil. Dirk Wollherr Prüfer der Dissertation: 1. Univ. -Prof. Dr. -Ing. Dr. rer. nat. Holger Boche 2. Priv. -Doz. Dr. -Ing. habil. Sławomir Stańczak, Technische Universität Berlin Die Dissertation wurde am 11. 06. 2014 bei der Technischen Universität München eingereicht und durch die Fakultät für Elektrotechnik und Informationstechnik am 28. 10. 2014 angenommen. Zusammenfassung In einer Vielzahl von Sensornetzanwendungen steht nicht die Übertragung individu- eller Messwerte im Vordergrund, sondern die zuverlässige und effiziente Berechnung von Funktionen. Dabei kann es sich im Einzelnen um die Berechnung der maximalen Kohlenmonoxid-Konzentration innerhalb von Gebäuden aus Gründen der Brandschutz- überwachung handeln, um den mittleren Druck in einem Dampfkessel oder die min- imale Feuchtigkeit in einem Gewächshaus. Der klassische Ansatz zur Lösung dieser Probleme sieht vor, dass zunächst die gesamte Messwertinformation zu einem Aggrega- tionspunkt übertragen wird, der anschließend den gewünschten Funktionswert ermittelt. Um Kanalkollisionen während der Übertragung der Daten zu vermeiden, wird der Me- dienzugriff von Sensorknoten üblicherweise in der Zeit oder der Frequenz koordiniert. In der jüngeren Vergangenheit wurde gezeigt, dass diese Vorgehensweise in höchstem Maße ineffizient sein kann, da sie vollständig ignoriert, dass die primäre Aufgabe des Netzes eben nicht in der Übertragung einzelner Messwerte besteht. Insbesondere gilt, dass für die Berechnung linearer Funktionen die Ausnutzung der Interferenz anstelle deren Unterdrückung sogar zu erheblichen Performanzgewinnen führen kann. Die obi- gen Beispiele deuten jedoch bereits darauf hin, dass einige der vielversprechendsten Sensornetzanwendungen die effiziente Berechnung nichtlinearer Funktionen erfordern. Dementsprechend widmet sich die vorliegende Arbeit linearen und nichtlinearen Be- rechnungsproblemen in Sensornetzen. Der erste Teil behandelt zunächst einige grundle- gende Fragestellungen, wie etwa der welche Funktionen prinzipiell durch das Ausnutzen von Interferenz berechnet werden können und wie viele Kanalbenutzungen dafür not- wendig sind. Um diesbezüglich eine systematische Untersuchung zu ermöglichen werden Funkübertragungen als rauschfrei angenommen. Dabei stellt sich heraus, dass diese Überlegungen in enger Beziehung zu dem berühmten 13ten Hilbert-Problem stehen. Der zweite Teil der Arbeit schließt Empfängerrauschen in die Betrachtungen mit ein und stellt diesbezüglich ein Übertragungsverfahren vor, das eine neuartige Datenvor- und nachverarbeitung mit nested lattice codes kombiniert. Es wird gezeigt, dass diese Kombination die zuverlässige Berechnung einer Vielzahl linearer und nichtlinearer Funk- tionen erlaubt mit Raten die für klassische Verfahren weitgehend unerreichbar sind. Das gezielte Ausnutzen von Interferenz erfordert naturgemäß eine präzise Synchro- nisation. Dies zu gewährleisten kann in der Praxis einen unverhältnismäßig hohen Aufwand bedeuten, weshalb im letzten Teil der Arbeit ein einfaches analoges Übertra- gungsverfahren vorgeschlagen wird, das bereits mit einer groben Rahmensynchronisa- tion auskommt. Die Performanz des Verfahrens wird analysiert und es wird erörtert wie viel Kanalinformation für akkurate Funktionswertberechnungen notwendig ist. Abstract A major challenge in many wireless sensor network applications consists in the reliable and efficient computation of some pre-defined function of the measurements taken by a set of spatially distributed sensor nodes. The function of interest can be, for instance, the maximum carbon-monoxide concentration in a building for fire detection, the av- erage pressure inside a steam boiler, or the minimum humidity in a greenhouse. The standard approach for solving such problems, the so-called separation-based approach, is to transmit all the sensor readings to a nearby fusion center that computes the de- sired function value afterwards. As a matter of fact, however, the wireless channel is a shared broadcast medium so that a concurrent access to the common frequency spectrum by distinct nodes results in interference. Since interference makes the reliable reconstruction of individual transmit signals difficult, the channel access of sensor nodes is typically coordinated in time or frequency in order to avoid channel collisions. It was recently shown that this approach can be highly inefficient as it ignores that the fusion center is not interested in individual sensor readings but rather in a function thereof. In particular, if the fusion center wishes to compute a linear function, exploiting interference rather than avoiding it can lead to huge performance gains. As the above mentioned examples indicate, however, many promising sensor network applications require the efficient computation of nonlinear functions. Therefore, this thesis is devoted to linear and nonlinear computation problems over sensor networks. The first part deals with some fundamental questions such as, for in- stance, which functions are essentially computable over a wireless channel by harnessing interference and how many channel uses are needed. In order to allow for a systematic and in-depth treatment of these issues, we assume transmissions between sensor nodes and fusion centers to be noise-free. It turns out that the considerations are closely related to the famous 13th Hilbert problem. In the second part of the thesis, we turn our attention to noisy networks and pro- pose a corresponding computation scheme that combines a novel signal pre- and post- processing strategy with nested lattice coding. We show that this particular combi- nation allows for the computation of a variety of linear and nonlinear functions at computation rates that are not achievable with separation-based methods. Harnessing interference typically requires the precise synchronization of sensor nodes. In practical networks, however, it may be unreasonably costly to ensure this. Therefore, we propose in the last part a simple analog computation scheme that requires only coarse frame synchronization. We then analyze its performance and determine how much channel state information is needed in order to obtain accurate function values. Acknowledgments Aber Motivation hat mit Wollen keine Berührung; sie läßt sich nicht “ nach dem Gegensatz von Zwang und Freiheit einteilen, sie ist tiefster Zwang und höchste Freiheit. ” Robert Musil, Der Mann ohne Eigenschaften (Aus dem Nachlass), 1930–1943 Throughout the course of my Ph.D. studies, I had the opportunity to meet many extraor- dinary people. First and foremost, I thank my advisors Prof. Dr. -Ing. Dr. rer. nat. Hol- ger Boche and PD Dr. -Ing. habil. Sławomir Stańczak for their guidance and invaluable support. Both are fascinating individuals and their energy, passion for research, vast knowledge, and enthusiasm were constant sources of inspiration and motivation, which will have a lasting effect on me. Furthermore, I would like to thank all my colleagues at Technische Universität Berlin, Fraunhofer Institute for Telecommunications Heinrich Hertz Institute, and Technische Universität München for providing a friendly and stimulating research environment. Especially, I thank Jörg Bühler (a.k.a. Fokker), Michał Kaliszan, and Rafael F. Schaefer for the countless conversations about science and life in general. It was always a great pleasure and they have become more to me than just colleagues. A special thanks goes to Prof. Dr. -Ing. Dieter Kraus from the Bremen University of Applied Sciences, who is mainly responsible for my path to academia as he piqued my interest in communication theory, signal theory, and mathematics already at a very early stage of my undergraduate studies. Without those who are closest to me, I would not be where I am today. Therefore, I would like to express my sincere gratitude to my family and friends for their steady encouragement and unquestioning support. My deepest gratitude, however, goes to Sabine. This thesis would have never been possible without her endless patience and love. Contents 1 Introduction 1 1.1 Motivation .................................. 1 1.2 Contribution and Outline of the Thesis . .... 3 2 Communication Versus Computation 7 2.1 The Wireless Multiple-Access Channel . .... 7 2.2 TheCommunicationProblem . 10 2.3 TheComputationProblem . .. .. .. .. .. .. .. 13 2.4 TwoInsightfulExamples. 14 3 Computation Over the Wireless Channel – Fundamental Limits 19 3.1 ComputationOverIdealWMACs. 21 3.1.1 Computation With a Single Channel Use . 22 3.1.2 Approximation With a Single Channel Use . 29 3.1.3 Computation With Multiple Channel Uses . 31 3.2 Computation Over Clustered Networks . 35 3.2.1 Continuous Pre- and Post-Processing Functions . ..... 37 3.2.2 Arbitrary Pre- and Post-Processing Functions . ..... 40 3.2.3 PerformanceComparison . 40 3.2.4 A Short Note About Additional Interference . 42 3.3 Robustness Against Changes in Topology . 43 3.3.1 DroppedOutNodes ......................... 44 3.3.2 AdditionalNodes........................... 44 3.4 SummaryandConclusions.. .. .. .. .. .. .. .. 45 3.A Proofs ..................................... 47 4 Reliable
Recommended publications
  • Digital Communication Systems 2.2 Optimal Source Coding
    Digital Communication Systems EES 452 Asst. Prof. Dr. Prapun Suksompong [email protected] 2. Source Coding 2.2 Optimal Source Coding: Huffman Coding: Origin, Recipe, MATLAB Implementation 1 Examples of Prefix Codes Nonsingular Fixed-Length Code Shannon–Fano code Huffman Code 2 Prof. Robert Fano (1917-2016) Shannon Award (1976 ) Shannon–Fano Code Proposed in Shannon’s “A Mathematical Theory of Communication” in 1948 The method was attributed to Fano, who later published it as a technical report. Fano, R.M. (1949). “The transmission of information”. Technical Report No. 65. Cambridge (Mass.), USA: Research Laboratory of Electronics at MIT. Should not be confused with Shannon coding, the coding method used to prove Shannon's noiseless coding theorem, or with Shannon–Fano–Elias coding (also known as Elias coding), the precursor to arithmetic coding. 3 Claude E. Shannon Award Claude E. Shannon (1972) Elwyn R. Berlekamp (1993) Sergio Verdu (2007) David S. Slepian (1974) Aaron D. Wyner (1994) Robert M. Gray (2008) Robert M. Fano (1976) G. David Forney, Jr. (1995) Jorma Rissanen (2009) Peter Elias (1977) Imre Csiszár (1996) Te Sun Han (2010) Mark S. Pinsker (1978) Jacob Ziv (1997) Shlomo Shamai (Shitz) (2011) Jacob Wolfowitz (1979) Neil J. A. Sloane (1998) Abbas El Gamal (2012) W. Wesley Peterson (1981) Tadao Kasami (1999) Katalin Marton (2013) Irving S. Reed (1982) Thomas Kailath (2000) János Körner (2014) Robert G. Gallager (1983) Jack KeilWolf (2001) Arthur Robert Calderbank (2015) Solomon W. Golomb (1985) Toby Berger (2002) Alexander S. Holevo (2016) William L. Root (1986) Lloyd R. Welch (2003) David Tse (2017) James L.
    [Show full text]
  • Principles of Communications ECS 332
    Principles of Communications ECS 332 Asst. Prof. Dr. Prapun Suksompong (ผศ.ดร.ประพันธ ์ สขสมปองุ ) [email protected] 1. Intro to Communication Systems Office Hours: Check Google Calendar on the course website. Dr.Prapun’s Office: 6th floor of Sirindhralai building, 1 BKD 2 Remark 1 If the downloaded file crashed your device/browser, try another one posted on the course website: 3 Remark 2 There is also three more sections from the Appendices of the lecture notes: 4 Shannon's insight 5 “The fundamental problem of communication is that of reproducing at one point either exactly or approximately a message selected at another point.” Shannon, Claude. A Mathematical Theory Of Communication. (1948) 6 Shannon: Father of the Info. Age Documentary Co-produced by the Jacobs School, UCSD- TV, and the California Institute for Telecommunic ations and Information Technology 7 [http://www.uctv.tv/shows/Claude-Shannon-Father-of-the-Information-Age-6090] [http://www.youtube.com/watch?v=z2Whj_nL-x8] C. E. Shannon (1916-2001) Hello. I'm Claude Shannon a mathematician here at the Bell Telephone laboratories He didn't create the compact disc, the fax machine, digital wireless telephones Or mp3 files, but in 1948 Claude Shannon paved the way for all of them with the Basic theory underlying digital communications and storage he called it 8 information theory. C. E. Shannon (1916-2001) 9 https://www.youtube.com/watch?v=47ag2sXRDeU C. E. Shannon (1916-2001) One of the most influential minds of the 20th century yet when he died on February 24, 2001, Shannon was virtually unknown to the public at large 10 C.
    [Show full text]
  • IEEE Information Theory Society Newsletter
    IEEE Information Theory Society Newsletter Vol. 63, No. 3, September 2013 Editor: Tara Javidi ISSN 1059-2362 Editorial committee: Ioannis Kontoyiannis, Giuseppe Caire, Meir Feder, Tracey Ho, Joerg Kliewer, Anand Sarwate, Andy Singer, and Sergio Verdú Annual Awards Announced The main annual awards of the • 2013 IEEE Jack Keil Wolf ISIT IEEE Information Theory Society Student Paper Awards were were announced at the 2013 ISIT selected and announced at in Istanbul this summer. the banquet of the Istanbul • The 2014 Claude E. Shannon Symposium. The winners were Award goes to János Körner. the following: He will give the Shannon Lecture at the 2014 ISIT in 1) Mohammad H. Yassaee, for Hawaii. the paper “A Technique for Deriving One-Shot Achiev - • The 2013 Claude E. Shannon ability Results in Network Award was given to Katalin János Körner Daniel Costello Information Theory”, co- Marton in Istanbul. Katalin authored with Mohammad presented her Shannon R. Aref and Amin A. Gohari Lecture on the Wednesday of the Symposium. If you wish to see her slides again or were unable to attend, a copy of 2) Mansoor I. Yousefi, for the paper “Integrable the slides have been posted on our Society website. Communication Channels and the Nonlinear Fourier Transform”, co-authored with Frank. R. Kschischang • The 2013 Aaron D. Wyner Distinguished Service Award goes to Daniel J. Costello. • Several members of our community became IEEE Fellows or received IEEE Medals, please see our web- • The 2013 IT Society Paper Award was given to Shrinivas site for more information: www.itsoc.org/honors Kudekar, Tom Richardson, and Rüdiger Urbanke for their paper “Threshold Saturation via Spatial Coupling: The Claude E.
    [Show full text]
  • Network Information Theory
    Network Information Theory This comprehensive treatment of network information theory and its applications pro- vides the first unified coverage of both classical and recent results. With an approach that balances the introduction of new models and new coding techniques, readers are guided through Shannon’s point-to-point information theory, single-hop networks, multihop networks, and extensions to distributed computing, secrecy, wireless communication, and networking. Elementary mathematical tools and techniques are used throughout, requiring only basic knowledge of probability, whilst unified proofs of coding theorems are based on a few simple lemmas, making the text accessible to newcomers. Key topics covered include successive cancellation and superposition coding, MIMO wireless com- munication, network coding, and cooperative relaying. Also covered are feedback and interactive communication, capacity approximations and scaling laws, and asynchronous and random access channels. This book is ideal for use in the classroom, for self-study, and as a reference for researchers and engineers in industry and academia. Abbas El Gamal is the Hitachi America Chaired Professor in the School of Engineering and the Director of the Information Systems Laboratory in the Department of Electri- cal Engineering at Stanford University. In the field of network information theory, he is best known for his seminal contributions to the relay, broadcast, and interference chan- nels; multiple description coding; coding for noisy networks; and energy-efficient packet scheduling and throughput–delay tradeoffs in wireless networks. He is a Fellow of IEEE and the winner of the 2012 Claude E. Shannon Award, the highest honor in the field of information theory. Young-Han Kim is an Assistant Professor in the Department of Electrical and Com- puter Engineering at the University of California, San Diego.
    [Show full text]
  • President's Column
    IEEE Information Theory Society Newsletter Vol. 53, No. 3, September 2003 Editor: Lance C. Pérez ISSN 1059-2362 President’s Column Han Vinck This message is written after re- tion of the electronic library, many turning from an exciting Informa- universities and companies make tion Theory Symposium in this product available to their stu- Yokohama, Japan. Our Japanese dents and staff members. For these colleagues prepared an excellent people there is no direct need to be technical program in the beautiful an IEEE member. IEEE member- and modern setting of Yokohama ship reduced in general by about city. The largest number of contri- 10% and the Society must take ac- butions was in the field of LDPC tions to make the value of member- coding, followed by cryptography. ship visible to you and potential It is interesting to observe that new members. This is an impor- quantum information theory gets tant task for the Board and the more and more attention. The Jap- Membership Development com- anese hospitality contributed to IT Society President Han Vinck playing mittee. The Educational Commit- the general success of this year’s traditional Japanese drums. tee, chaired by Ivan Fair, will event. In spite of all the problems contribute to the value of member- with SARS, the Symposium attracted approximately 650 ship by introducing new activities. The first action cur- participants. At the symposium we announced Bob rently being undertaken by this committee is the McEliece to be the winner of the 2004 Shannon Award. creation of a web site whose purpose is to make readily The Claude E.
    [Show full text]
  • Information Theory: Coding Theorems for Discrete Memoryless Systems Imre Csiszár and János Körner Frontmatter More Information
    Cambridge University Press 978-0-521-19681-9 - Information Theory: Coding Theorems for Discrete Memoryless Systems Imre Csiszár and János Körner Frontmatter More information Information Theory Coding Theorems for Discrete Memoryless Systems This book is widely regarded as a classic in the field of information theory, providing deep insights and expert treatment of the key theoretical issues. It includes in-depth coverage of the mathematics of reliable information transmission, both in two-terminal and multi-terminal network scenarios. Updated and considerably expanded, this new edition presents unique discussions of information-theoretic secrecy and of zero-error information theory, including substantial connections of the latter with extremal com- binatorics. The presentations of all core subjects are self-contained, even the advanced topics, which helps readers to understand the important connections between seemingly different problems. Finally, 320 end-of-chapter problems, together with helpful solving hints, allow readers to develop a full command of the mathematical techniques. This is an ideal resource for graduate students and researchers in electrical and electronic engineering, computer science, and applied mathematics. Imre Csiszár is a Research Professor at the Alfréd Rényi Institute of Mathematics of the Hungarian Academy of Sciences, where he has worked since 1961. He is also Pro- fessor Emeritus of the University of Technology and Economics, Budapest, a Fellow of the IEEE, and former President of the Hungarian Mathematical Society. He has received numerous awards, including the Shannon Award of the IEEE Information Theory Society (1996). János Körner is a Professor of Computer Science at the Sapienza University of Rome, Italy, where he has worked since 1992.
    [Show full text]
  • Concentration of Measure Inequalities in Information Theory, Communications, and Coding
    Full text available at: http://dx.doi.org/10.1561/0100000064 Concentration of Measure Inequalities in Information Theory, Communications, and Coding Maxim Raginsky Department of Electrical and Computer Engineering Coordinated Science Laboratory University of Illinois at Urbana-Champaign Urbana, IL 61801, USA [email protected] Igal Sason Department of Electrical Engineering Technion – Israel Institute of Technology Haifa 32000, Israel [email protected] Boston — Delft Full text available at: http://dx.doi.org/10.1561/0100000064 Foundations and Trends R in Communications and Information Theory Published, sold and distributed by: now Publishers Inc. PO Box 1024 Hanover, MA 02339 United States Tel. +1-781-985-4510 www.nowpublishers.com [email protected] Outside North America: now Publishers Inc. PO Box 179 2600 AD Delft The Netherlands Tel. +31-6-51115274 The preferred citation for this publication is M. Raginsky and I. Sason. Concentration of Measure Inequalities in Information Theory, Communications, and Coding. Foundations and Trends R in Communications and Information Theory, vol. 10, no. 1-2, pp. 1–247, 2013. R This Foundations and Trends issue was typeset in LATEX using a class file designed by Neal Parikh. Printed on acid-free paper. ISBN: 978-1-60198-725-9 c 2013 M. Raginsky and I. Sason All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, mechanical, photocopying, recording or otherwise, without prior written permission of the publishers. Photocopying. In the USA: This journal is registered at the Copyright Clearance Cen- ter, Inc., 222 Rosewood Drive, Danvers, MA 01923.
    [Show full text]
  • Ieee-Level Awards
    IEEE-LEVEL AWARDS The IEEE currently bestows a Medal of Honor, fifteen Medals, thirty-three Technical Field Awards, two IEEE Service Awards, two Corporate Recognitions, two Prize Paper Awards, Honorary Memberships, one Scholarship, one Fellowship, and a Staff Award. The awards and their past recipients are listed below. Citations are available via the “Award Recipients with Citations” links within the information below. Nomination information for each award can be found by visiting the IEEE Awards Web page www.ieee.org/awards or by clicking on the award names below. Links are also available via the Recipient/Citation documents. MEDAL OF HONOR Ernst A. Guillemin 1961 Edward V. Appleton 1962 Award Recipients with Citations (PDF, 26 KB) John H. Hammond, Jr. 1963 George C. Southworth 1963 The IEEE Medal of Honor is the highest IEEE Harold A. Wheeler 1964 award. The Medal was established in 1917 and Claude E. Shannon 1966 Charles H. Townes 1967 is awarded for an exceptional contribution or an Gordon K. Teal 1968 extraordinary career in the IEEE fields of Edward L. Ginzton 1969 interest. The IEEE Medal of Honor is the highest Dennis Gabor 1970 IEEE award. The candidate need not be a John Bardeen 1971 Jay W. Forrester 1972 member of the IEEE. The IEEE Medal of Honor Rudolf Kompfner 1973 is sponsored by the IEEE Foundation. Rudolf E. Kalman 1974 John R. Pierce 1975 E. H. Armstrong 1917 H. Earle Vaughan 1977 E. F. W. Alexanderson 1919 Robert N. Noyce 1978 Guglielmo Marconi 1920 Richard Bellman 1979 R. A. Fessenden 1921 William Shockley 1980 Lee deforest 1922 Sidney Darlington 1981 John Stone-Stone 1923 John Wilder Tukey 1982 M.
    [Show full text]
  • IEEE Information Theory Society Newsletter
    IEEE Information Theory Society Newsletter Vol. 66, No. 4, December 2016 Editor: Michael Langberg ISSN 1059-2362 Editorial committee: Frank Kschischang, Giuseppe Caire, Meir Feder, Tracey Ho, Joerg Kliewer, Parham Noorzad, Anand Sarwate, Andy Singer, and Sergio Verdú President’s Column Alon Orlitsky One should never start with a cliche. So let me that would bring and curate information the- end with one: where did 2016 go? It seems like oretic lectures for large audiences. yesterday that I wrote my first column, and it’s already time to reflect on a year gone by? • Jeff Andrews and Elza Erkip are heading a BoG ad-hoc committee exploring the cre- And a remarkable year it was! Each of earth’s ation of a new publication connecting corners and all of life’s walks were abuzz with information theory to other topics and activity and change, and information theory communities, with two main formats con- followed suit. Adding to our society’s regu- sidered: a special topics journal, and a larly hectic conference meeting/publication popular magazine. calendar, we also celebrated Shannon’s 100th anniversary with fifty worldwide centennials, • Christina Fragouli and Anna Scaglione are numerous write-ups in major journals and co-authoring a children’s book on informa- magazines, and a coveted Google Doodle on tion theory, the first chapter is completed Shannon’s birthday. For the last time let me and the rest are expected next year. thank Christina Fragouli and Rudi Urbanke for co-chairing the hyperactive Centennials Committee. As the holidays ushered in, twelve-shy-one society members received jolly good tidings.
    [Show full text]
  • The Method of Types
    IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 44, NO. 6, OCTOBER 1998 2505 The Method of Types Imre Csiszar,´ Fellow, IEEE (Invited Paper) Abstract— The method of types is one of the key technical the “random coding” upper bound and the “sphere packing” tools in Shannon Theory, and this tool is valuable also in other lower bound to the error probability of the best code of a given fields. In this paper, some key applications will be presented in rate less than capacity (Fano [44], Gallager [46], Shannon, sufficient detail enabling an interested nonspecialist to gain a working knowledge of the method, and a wide selection of fur- Gallager, and Berlekamp [74]). These bounds exponentially ther applications will be surveyed. These range from hypothesis coincide for rates above a “critical rate” and provide the exact testing and large deviations theory through error exponents for error exponent of a DMC for such rates. These results could discrete memoryless channels and capacity of arbitrarily varying not be obtained via typical sequences, and their first proofs channels to multiuser problems. While the method of types is suitable primarily for discrete memoryless models, its extensions used analytic techniques that gave little insight. to certain models with memory will also be discussed. It turned out in the 1970’s that a simple refinement of the typical sequence approach is effective—at least in the discrete Index Terms—Arbitrarily varying channels, choice of decoder, counting approach, error exponents, extended type concepts, memoryless context—also for error exponents, as well as for hypothesis testing, large deviations, multiuser problems, universal situations where the probabilistic model is partially unknown.
    [Show full text]
  • Universal Source Coding for Multiple Decoders with Side
    2010 IEEE International Symposium on Information Theory Proceedings (ISIT 2010) Austin, Texas, USA 13 – 18 June 2010 Pages 1-908 IEEE Catalog Number: CFP10SIF-PRT ISBN: 978-1-4244-7890-3 1/3 TABLE OF CONTENTS Plenary Sessions Monday 8:30 – 9:30 — Completely Random Measures for Bayesian Nonparametrics .........................................................................xlv Michael I. Jordan Tuesday 8:30 – 9:30 — Coding for Noisy Networks .................................................................................................................................xlv Abbas El Gamal Wednesday 8:30 – 9:30 — THE AUDACITY OF THROUGHPUT – A Trilogy of Rates – ........................................................................xlv Anthony Ephremides Thursday 8:30 – 9:30 — Musing upon Information Theory ......................................................................................................................xliv Te Sun Han Friday 8:30 – 9:30 — Can Structure Beat Shannon? — The Secrets of Lattice-codes ...............................................................................xlv Ram Zamir S-Mo-1: MULTI-TERMINAL SOURCE CODING S-Mo-1.1: UNIVERSAL SOURCE CODING FOR MULTIPLE DECODERS WITH SIDE ............................................................................... 1 INFORMATION Shigeaki Kuzuoka, Akisato Kimura, Tomohiko Uyematsu S-Mo-1.2: ROBUST MULTIRESOLUTION CODING WITH HAMMING DISTORTION ............................................................................ 6 MEASURE Jun Chen, Sorina Dumitrescu, Ying Zhang,
    [Show full text]
  • IEEE Information Theory Society Newsletter
    IEEE Information Theory Society Newsletter Vol. 70, No. 3, September 2020 EDITOR: Salim El Rouayheb ISSN 1059-2362 President’s Column Aylin Yener We are quickly approaching the end of sum- experience from these reputed information mer and the reopening of campuses at least theorists. I am pleased to report that our Dis- across the US. As I write this, I find myself tinguished Lecturer program, is gearing up looking at the same view as I was when writ- to be back on, but with virtual lectures. The ing the previous columns, with perhaps a Board of Governors has extended the terms slight change (for the better) in the tempera- of the current lecturers by a year so that when ture and a new end-of-the summer breeze traveling resumes, the lecturers will have the that makes sitting in my balcony so much bet- opportunity to re-coupe the lost year in in- ter. I feel lucky once again to have an outdoor person chapter visits. For now, all chapters space; one I came to treasure much more than should consider inviting the lecturers for on- I did in BC (Before COVID). I realize I have line lectures, which can be facilitated on zoom forgotten the view from the office I got to sit or webex. I hope that the chapters and our in no more than ten days before the closure members will find this resource useful. in March and try to recall -to no avail- if any part of the city skyline was visible. I should We are continuing to live our lives online (al- have taken pictures I conclude.
    [Show full text]