UNIVERSITY of CALIFORNIA SAN DIEGO Communication and Security in Cyber-Physical Systems a Dissertation Submitted in Partial Sati

Total Page:16

File Type:pdf, Size:1020Kb

UNIVERSITY of CALIFORNIA SAN DIEGO Communication and Security in Cyber-Physical Systems a Dissertation Submitted in Partial Sati UNIVERSITY OF CALIFORNIA SAN DIEGO Communication and security in cyber-physical systems A dissertation submitted in partial satisfaction of the requirements for the degree Doctor of Philosophy in Electrical Engineering (Intelligent Systems, Robotics, and Control) by Mohammad Javad Khojasteh Committee in charge: Professor Massimo Franceschetti, Chair Professor Jorge Cortes´ Professor Tara Javidi Professor Sonia Mart´ınez Professor Alon Orlitsky 2019 Copyright Mohammad Javad Khojasteh, 2019 All rights reserved. The dissertation of Mohammad Javad Khojasteh is approved, and it is acceptable in quality and form for publication on microfilm and electronically: Chair University of California San Diego 2019 iii DEDICATION To Sogoli iv EPIGRAPH Dr. Ford: You think it’s sabotage? Imagine someone’s been diddling with our creations? Bernard: It’s the simplest solution. Dr. Ford: Ah, Mr. Occam’s razor. The problem, Bernard, is that what you and I do is so complicated. We practice witchcraft. We speak the right words. Then we create life itself out of chaos. William of Occam was a 13th century monk. He can’t help us now, Bernard. He would have us burned at the stake. Westworld, Chestnut v TABLE OF CONTENTS Signature Page . iii Dedication . iv Epigraph . iv Table of Contents . vi List of Figures . ix List of Tables . xi Acknowledgements . xii Vita ............................................. xiv Abstract of the Dissertation . xv Chapter 1 Introduction . .1 1.1 Communication . .2 1.2 Security . .4 1.3 Dissertation Overview . .7 1.4 Notation . .9 Chapter 2 The value of timing information in event-triggered control . 12 2.1 Introduction . 12 2.2 Problem formulation . 15 2.2.1 System model . 15 2.2.2 Triggering strategy and controller dynamics . 16 2.2.3 Information transmission rate . 19 2.2.4 Information access rate . 21 2.3 Necessary condition on the access rate . 22 2.4 Necessary and sufficient conditions on the transmission rate . 25 2.4.1 Necessary condition on the transmission rate . 26 2.4.2 Phase transition behavior . 32 2.4.3 Sufficient condition on the transmission rate . 36 2.4.4 Simulation . 44 2.5 Extension to vector systems . 47 2.6 Time-triggering versus event-triggering control over communication channels . 60 2.7 Conclusions . 66 vi Chapter 3 Event-triggered stabilization over digital channels of systems with disturbances 68 3.1 Introduction . 68 3.2 Problem formulation . 72 3.3 Event-triggered design . 75 3.4 Sufficient and necessary conditions on the information transmission rate 79 3.4.1 Sufficient information transmission rate . 79 3.4.2 Necessary information transmission rate . 85 3.5 Extension to complex linear systems . 93 3.5.1 Event-triggered control for complex linear systems . 95 3.5.2 Sufficient information transmission rate . 96 3.6 Simulations . 102 3.6.1 Event-triggered control of diagonalizable systems with real eigenvalues . 102 3.6.2 Event-triggered control of complex systems . 107 3.7 Implementation . 108 3.7.1 Plant Dynamics . 109 3.7.2 Implementation and System Architecture . 111 3.7.3 Experimental results . 112 3.8 Extension to nonlinear systems . 114 3.9 Simulations for nonlinear systems . 124 3.10 Conclusion . 126 Chapter 4 Stabilizing a linear system using phone calls . 128 4.1 Introduction . 128 4.2 System and channel model . 132 4.2.1 The channel . 133 4.2.2 Source-channel encoder . 133 4.2.3 Anytime decoder . 134 4.2.4 Capacity of the channel . 135 4.3 Main results . 136 4.3.1 Necessary condition . 136 4.3.2 Sufficient condition . 137 4.4 The estimation problem . 138 4.4.1 Necessary condition . 138 4.4.2 Sufficient condition . 140 4.5 The stabilization problem . 141 4.5.1 Necessary condition . 141 4.5.2 Sufficient condition . 142 4.6 Comparison with previous work . 147 4.6.1 Comparison with stabilization over the erasure channel . 147 4.6.2 Comparison with event triggering strategies . 148 4.7 Numerical example . 149 4.8 Conclusions . 153 vii 4.9 Appendix: proofs of the estimation results . 155 4.9.1 Proof of Theorem 16 . 155 4.9.2 Proof of Theorem 17 . 161 Chapter 5 Learning-based attacks in cyber-physical systems . 171 5.1 Problem Setup . 174 5.1.1 Learning-based attacks . 176 5.1.2 Detection . 176 5.1.3 Performance Measures . 178 5.2 Statement of the results . 179 5.2.1 Lower Bound on the Deception Probability . 180 5.2.2 Upper Bound on the Deception Probability . 185 5.2.3 Privacy-enhancing signal . 190 5.3 Extension to vector systems . 193 5.3.1 Lower Bound on the Deception Probability . 197 5.4 Exploration vs. Exploitation . 205 5.4.1 Main results . 206 5.5 Conclusions . 220 Bibliography . 221 viii LIST OF FIGURES Figure 1.1: Cyber-physical systems . .1 Figure 1.2: Cloud robots and automation systems . .2 Figure 1.3: Dynamical system abstraction of CPS and cloud robots . .3 Figure 1.4: Representation of information transmission using data payload and transmis- sion time of the packet in a digital channel . .3 Figure 1.5: Architecture and components of the prototype. .4 Figure 1.6: Physical security in CPS . .5 Figure 1.7: The man in the middle attack . .5 Figure 2.1: System model . 15 Figure 2.2: Evolution of the state estimation error . 20 Figure 2.3: The phase transition behavior . 33 Figure 2.4: Illustration of the phase transition behavior for different values of ρ0 .... 34 Figure 2.5: Comparison between the sufficient and necessary conditions . 43 Figure 2.6: Illustration of the sufficient transmission rate versus the upper bound of delay for different values of ρ0 ........................... 44 Figure 2.7: An example realization of our design . 45 Figure 2.8: Information transmission rate in simulations versus the upper bound of the delay in the communication channel . 46 Figure 2.9: Time-triggering versus event-triggering control over communication channels 65 Figure 3.1: The inverted pendulum prototype . 71 Figure 3.2: The encoding-decoding algorithms in the proposed event-triggered control scheme . 81 Figure 3.3: Illustration of the sufficient and necessary transmission rates as functions of the delay upper bound . 93 Figure 3.4: The evolution of the state estimation error before and after an event . 96 Figure 3.5: Sufficient information transmission rate as a function of channel delay upper bound . 101 Figure 3.6: A pendulum mounted on a cart . 103 Figure 3.7: Simulation results . 106 Figure 3.8: Information transmission rate in simulations . 107 Figure 3.9: Simulation results . 108 Figure 3.10: Information transmission rate in experiments compared with the entropy rate of the system . 114 Figure 3.11: Experimental results for stabilizing the inverted pendulum over a digital channel with random upper bounded delay . 115 Figure 3.12: Robustness of the event-triggered control strategy against additional distur- bances. 115 Figure 3.13: Simulation results for stabilization of the nonlinear plant . 124 Figure 3.14: Information transmission rate in simulations for the nonlinear plant . 125 ix Figure 4.1: Model of a networked control system where the feedback loop is closed over a timining channel . 132 Figure 4.2: The timing channel . 134 Figure 4.3: The estimation.
Recommended publications
  • Information Theory and Statistics: a Tutorial
    Foundations and Trends™ in Communications and Information Theory Volume 1 Issue 4, 2004 Editorial Board Editor-in-Chief: Sergio Verdú Department of Electrical Engineering Princeton University Princeton, New Jersey 08544, USA [email protected] Editors Venkat Anantharam (Berkeley) Amos Lapidoth (ETH Zurich) Ezio Biglieri (Torino) Bob McEliece (Caltech) Giuseppe Caire (Eurecom) Neri Merhav (Technion) Roger Cheng (Hong Kong) David Neuhoff (Michigan) K.C. Chen (Taipei) Alon Orlitsky (San Diego) Daniel Costello (NotreDame) Vincent Poor (Princeton) Thomas Cover (Stanford) Kannan Ramchandran (Berkeley) Anthony Ephremides (Maryland) Bixio Rimoldi (EPFL) Andrea Goldsmith (Stanford) Shlomo Shamai (Technion) Dave Forney (MIT) Amin Shokrollahi (EPFL) Georgios Giannakis (Minnesota) Gadiel Seroussi (HP-Palo Alto) Joachim Hagenauer (Munich) Wojciech Szpankowski (Purdue) Te Sun Han (Tokyo) Vahid Tarokh (Harvard) Babak Hassibi (Caltech) David Tse (Berkeley) Michael Honig (Northwestern) Ruediger Urbanke (EPFL) Johannes Huber (Erlangen) Steve Wicker (GeorgiaTech) Hideki Imai (Tokyo) Raymond Yeung (Hong Kong) Rodney Kennedy (Canberra) Bin Yu (Berkeley) Sanjeev Kulkarni (Princeton) Editorial Scope Foundations and Trends™ in Communications and Information Theory will publish survey and tutorial articles in the following topics: • Coded modulation • Multiuser detection • Coding theory and practice • Multiuser information theory • Communication complexity • Optical communication channels • Communication system design • Pattern recognition and learning • Cryptology
    [Show full text]
  • Network Information Theory
    Network Information Theory This comprehensive treatment of network information theory and its applications pro- vides the first unified coverage of both classical and recent results. With an approach that balances the introduction of new models and new coding techniques, readers are guided through Shannon’s point-to-point information theory, single-hop networks, multihop networks, and extensions to distributed computing, secrecy, wireless communication, and networking. Elementary mathematical tools and techniques are used throughout, requiring only basic knowledge of probability, whilst unified proofs of coding theorems are based on a few simple lemmas, making the text accessible to newcomers. Key topics covered include successive cancellation and superposition coding, MIMO wireless com- munication, network coding, and cooperative relaying. Also covered are feedback and interactive communication, capacity approximations and scaling laws, and asynchronous and random access channels. This book is ideal for use in the classroom, for self-study, and as a reference for researchers and engineers in industry and academia. Abbas El Gamal is the Hitachi America Chaired Professor in the School of Engineering and the Director of the Information Systems Laboratory in the Department of Electri- cal Engineering at Stanford University. In the field of network information theory, he is best known for his seminal contributions to the relay, broadcast, and interference chan- nels; multiple description coding; coding for noisy networks; and energy-efficient packet scheduling and throughput–delay tradeoffs in wireless networks. He is a Fellow of IEEE and the winner of the 2012 Claude E. Shannon Award, the highest honor in the field of information theory. Young-Han Kim is an Assistant Professor in the Department of Electrical and Com- puter Engineering at the University of California, San Diego.
    [Show full text]
  • Symposium in Remembrance of Rudolf Ahlswede
    in cooperation with Fakultät für Mathematik Department of Mathematics Symposium in Remembrance of Rudolf Ahlswede July 25 -26, 2011 Program and Booklet of Abstracts Symposium in Remembrance of Rudolf Ahlswede Bielefeld, Germany, July 25 -26, 2011 Program and Booklet of Abstracts Organizers: Harout Aydinian Ingo Alth¨ofer Ning Cai Ferdinando Cicalese Christian Deppe Gunter Dueck Ulrich Tamm Andreas Winter Contents 1 Program 1 2 Rudolf Ahlswede 1938-2010 5 Christian Deppe 3 Obituary of the ZIF 11 Manuela Lenzen 4 AZ-identity for regular posets 13 Harout Aydinian 5 Quantum information, the ambiguity of the past, and the complexity of the present 15 Charles Bennett 6 Local-global principles in discrete extremal problems 17 Sergei L. Bezrukov 7 Secure network coding 19 Ning Cai 8 Common randomness in information theory 21 Imre Csisz´ar 9 The deep impact of Rudolf Ahlswede on combinatorics 23 Gyula O. H. Katona 10 Common randomness and multiterminal secure computation 25 Prakash Narayan 11 String reconstruction from substring compositions 27 Alon Orlitsky 12 Stochastic search for locally clustered targets 29 K. R¨udigerReischuk 13 Information flows and bottle necks in dynamic communication networks 31 Soren Riis 14 On the complexity of families of binary sequences and lattices 33 Andras Sarkozy 15 Higher order extremal problems 35 L´aszl´oSz´ekely 16 A generalisation of the Gilbert-Varshamov bound and its asymptotic evaluation 37 Ludo Tolhuizen 17 Quantum channels and identification theory 39 Andreas Winter 18 List of Participants 41 iii Monday July 25, 2011 PROGRAM 10:15 Warm up: C. Bennett - Quantum information, the ambiguity of the past, and the complexity of the present 12:00 Welcome and registration at the ZiF - Chair C.
    [Show full text]
  • Reflections on Compressed Sensing, by E
    itNL1208.qxd 11/26/08 9:09 AM Page 1 IEEE Information Theory Society Newsletter Vol. 58, No. 4, December 2008 Editor: Daniela Tuninetti ISSN 1059-2362 Source Coding and Simulation XXIX Shannon Lecture, presented at the 2008 IEEE International Symposium on Information Theory, Toronto Canada Robert M. Gray Prologue Source coding/compression/quantization A unique aspect of the Shannon Lecture is the daunting fact that the lecturer has a year to prepare for (obsess over?) a single lec- source reproduction ture. The experience begins with the comfort of a seemingly infi- { } - bits- - Xn encoder decoder {Xˆn} nite time horizon and ends with a relativity-like speedup of time as the date approaches. I early on adopted a few guidelines: I had (1) a great excuse to review my more than four decades of Simulation/synthesis/fake process information theoretic activity and historical threads extending simulation even further back, (2) a strong desire to avoid repeating the top- - - ics and content I had worn thin during 2006–07 as an interconti- random bits coder {X˜n} nental itinerant lecturer for the Signal Processing Society, (3) an equally strong desire to revive some of my favorite topics from the mid 1970s—my most active and focused period doing Figure 1: Source coding and simulation. unadulterated information theory, and (4) a strong wish to add something new taking advantage of hindsight and experience, The goal of source coding [1] is to communicate or transmit preferably a new twist on some old ideas that had not been pre- the source through a constrained, discrete, noiseless com- viously fully exploited.
    [Show full text]
  • IEEE Information Theory Society Newsletter
    IEEE Information Theory Society Newsletter Vol. 66, No. 3, September 2016 Editor: Michael Langberg ISSN 1059-2362 Editorial committee: Frank Kschischang, Giuseppe Caire, Meir Feder, Tracey Ho, Joerg Kliewer, Anand Sarwate, Andy Singer, Sergio Verdú, and Parham Noorzad President’s Column Alon Orlitsky ISIT in Barcelona was true joy. Like a Gaudi sion for our community along with extensive masterpiece, it was artfully planned and flaw- experience as board member, associate editor, lessly executed. Five captivating plenaries and a first-class researcher. Be-earlied con- covered the gamut from communication and gratulations, Madam President. coding to graphs and satisfiability, while Al- exander Holevo’s Shannon Lecture reviewed Other decisions and announcements con- the fascinating development of quantum cerned the society’s major awards, including channels from his early theoretical contribu- three Jack Wolf student paper awards and the tions to today’s near-practical innovations. James Massey Young Scholars Award that The remaining 620 talks were presented in 9 went to Andrea Montanari. Surprisingly, the parallel sessions and, extrapolating from those IT Paper Award was given to two papers, I attended, were all superb. Two records were “The Capacity Region of the Two-Receiver broken, with 888 participants this was the Gaussian Vector Broadcast Channel With Pri- largest ISIT outside the US, and at 540 Euro vate and Common Messages” by Yanlin Geng registration, the most economical in a decade. and Chandra Nair, and “Fundamental Limits of Caching” by Mohammad Maddah-Ali and Apropos records, and with the recent Rio Games, isn’t ISIT Urs Niesen. While Paper Awards were given to two related like the Olympics, except even better? As with the ultimate papers recently, not since 1972 were papers on different top- sports event, we convene to show our best results, further our ics jointly awarded.
    [Show full text]
  • Multivariate Decoding of Reed-Solomon Codes
    UC San Diego UC San Diego Electronic Theses and Dissertations Title Algebraic list-decoding of error-correcting codes Permalink https://escholarship.org/uc/item/68q346tn Author Parvaresh, Farzad Publication Date 2007 Peer reviewed|Thesis/dissertation eScholarship.org Powered by the California Digital Library University of California UNIVERSITY OF CALIFORNIA, SAN DIEGO Algebraic List-Decoding of Error-Correcting Codes A dissertation submitted in partial satisfaction of the requirements for the degree Doctor of Philosophy in Electrical Engineering (Communications Theory and Systems) by Farzad Parvaresh Committee in charge: Professor Alexander Vardy, Chair Professor Ilya Dumer Professor Alon Orlitsky Professor Paul H. Siegel Professor Jack K. Wolf 2007 Copyright Farzad Parvaresh, 2007 All rights reserved. The dissertation of Farzad Parvaresh is approved, and it is acceptable in quality and form for publication on microfilm: Chair University of California, San Diego 2007 iii To my parents iv TABLE OF CONTENTS Signature Page . iii Dedication . iv Table of Contents . v List of Figures . vii Acknowledgements . viii Vita and Publications . xi Abstract of the Dissertation . xii Chapter 1 Introduction . 1 1.1 Contributions . 5 1.2 Waiting for a bus in front of a pub . 8 1.2.1 Reed-Solomon codes . 9 1.2.2 Guruswami-Sudan algorithm . 10 1.2.3 Multivariate interpolation decoding algorithm . 12 1.3 Waiting for a bus on an April Fool’s day . 15 1.4 A new kind of Tic-Tac-Toe with multiplicity . 18 Chapter 2 Multivariate decoding of Reed-Solomon codes . 21 2.1 Introduction . 22 2.2 Preliminaries . 27 2.3 Error-correction radius of the MID algorithm .
    [Show full text]
  • A Review of Source Coding and Quantization 7 1.1 Lossless Compression and Entropy Coding
    MASSACHUsErr~, INfr MASSACHUSETTS INWT TUTE OF TECH,'.L,: Functional Quantization NOV 13 2008 by Vinith Misra LIBRARIES Submitted to the Department of Electrical Engineering and Computer Science in partial fulfillment of the requirements for the degrees of Bachelor of Science and Master of Engineering in Electrical Science and Engineering at the MASSACHUSETTS INSTITUTE OF TECHNOLOGY May 2008 @ Massachusetts Institute of Technology 2008. All rights reserved. Author ............ Department of Electrical Engineering and Computer Science May 9, 2008 Certified by ............................... Vivek K Goyal Associate Professor Thesis Supervisor Accepted by .......... ... ...... ... Arthur C. Smith Chairman, Department Committee on Graduate Students ARCHIVES Functional Quantization by Vinith Misra Submitted to the Department of Electrical Engineering and Computer Science on May 9, 2008, in partial fulfillment of the requirements for the degrees of Bachelor of Science and Master of Engineering in Electrical Science and Engineering Abstract Data is rarely obtained for its own sake; oftentimes, it is a function of the data that we care about. Traditional data compression and quantization techniques, designed to recreate or approximate the data itself, gloss over this point. Are performance gains possible if source coding accounts for the user's function? How about when the encoders cannot themselves compute the function? We introduce the notion of functional quantization and use the tools of high-resolution analysis to get to the bottom of this question. Specifically, we consider real-valued raw data X N and scalar quantization of each component Xi of this data. First, under the constraints of fixed-rate quantization and variable-rate quantization, we obtain asymptotically optimal quantizer point densities and bit allocations.
    [Show full text]
  • Ieee-Level Awards
    IEEE-LEVEL AWARDS The IEEE currently bestows a Medal of Honor, fifteen Medals, thirty-three Technical Field Awards, two IEEE Service Awards, two Corporate Recognitions, two Prize Paper Awards, Honorary Memberships, one Scholarship, one Fellowship, and a Staff Award. The awards and their past recipients are listed below. Citations are available via the “Award Recipients with Citations” links within the information below. Nomination information for each award can be found by visiting the IEEE Awards Web page www.ieee.org/awards or by clicking on the award names below. Links are also available via the Recipient/Citation documents. MEDAL OF HONOR Ernst A. Guillemin 1961 Edward V. Appleton 1962 Award Recipients with Citations (PDF, 26 KB) John H. Hammond, Jr. 1963 George C. Southworth 1963 The IEEE Medal of Honor is the highest IEEE Harold A. Wheeler 1964 award. The Medal was established in 1917 and Claude E. Shannon 1966 Charles H. Townes 1967 is awarded for an exceptional contribution or an Gordon K. Teal 1968 extraordinary career in the IEEE fields of Edward L. Ginzton 1969 interest. The IEEE Medal of Honor is the highest Dennis Gabor 1970 IEEE award. The candidate need not be a John Bardeen 1971 Jay W. Forrester 1972 member of the IEEE. The IEEE Medal of Honor Rudolf Kompfner 1973 is sponsored by the IEEE Foundation. Rudolf E. Kalman 1974 John R. Pierce 1975 E. H. Armstrong 1917 H. Earle Vaughan 1977 E. F. W. Alexanderson 1919 Robert N. Noyce 1978 Guglielmo Marconi 1920 Richard Bellman 1979 R. A. Fessenden 1921 William Shockley 1980 Lee deforest 1922 Sidney Darlington 1981 John Stone-Stone 1923 John Wilder Tukey 1982 M.
    [Show full text]
  • IEEE Information Theory Society
    IEEE Information Theory Society The 2021 IEEE International Symposium on Information Theory Melbourne, Victoria, Australia Awards Ceremony July 2021 IEEE Medals & Technical Field Awards 2021 IEEE Medal of Honor The IEEE Medal of Honor, established in 1917, is the highest IEEE award. It is presented when a candidate is identified as having made a particular contribution that forms a clearly exceptional addition to the science and technology of concern to IEEE. Jacob Ziv For fundamental contributions to information theory and data compression technology, and for distinguished research leadership. 2021 IEEE Richard E. Hamming Medal Recognizes exceptional contributions to information sciences, systems, and technology, sponsored by Qualcomm. Raymond W. Yeung For fundamental contributions to information theory and pioneering network coding and its applications. 2021 IEEE Jack S. Kilby Signal Processing Medal Recognizes outstanding achievements in signal processing, sponsored by The Kilby Medal Fund. Emmanuel Candès For groundbreaking contributions to compressed sensing. 2021 IEEE Leon K. Kirchmayer Graduate Teaching Award Recognizes inspirational teaching of graduate students in the IEEE fields of interest, sponsored by the Leon K. Kirchmayer Memorial Fund. Andrea Goldsmith For educating, developing, guiding, and energizing generations of highly successful students and postdoctoral fellows. 2021 Eric E. Sumner Award Recognizes outstanding contributions to communications technology, sponsored by Nokia Bell Labs. En-hui Yang For contributions to the theory and practice of source coding. 1 2021 Claude E. Shannon Award Recognizes consistent and profound contributions to the field of information theory. Alon Orlitsky received B.Sc. degrees in Mathematics and Electrical Engineering from Ben Gurion University in 1980 and 1981, and M.Sc.
    [Show full text]
  • Report on the First Iran Workshop on Communication and Information Theory (IWCIT 2013)
    IEEE Information Theory Society Newsletter Vol. 63, No. 4, December 2013 Editor: Tara Javidi ISSN 1059-2362 Editorial committee: Frank Kschischang, Giuseppe Caire, Meir Feder, Tracey Ho, Joerg Kliewer, Anand Sarwate, Andy Singer, and Sergio Verdú President’s Column Gerhard Kramer The 2013 Information Theory Workshop was nominate outstanding dissertations by held in Sevilla, Spain, in mid-September. Be- Jan. 15, 2014. Instructions can be found at fore the Workshop began, the Board of Gov- www.itsoc.org. ernors held their third and final meeting of the year to discuss and vote on a variety of 3) The ISIT Student Paper Award was issues concerning our Society. I would like renamed the IEEE Jack Keil Wolf ISIT to thank the members of the “core” team for Student Paper Award. I appreciate Paul their support during this eventful year: past Siegel’s efforts in managing the change. and future presidents Giuseppe Caire, Mu- riel Médard, Abbas El Gamal, Michelle Eff- 4) A Shannon stamp initiative was started ros, and Alon Orlitsky, treasurer Aylin Yener, at the suggestion of Sergio Verdú, and secretary Edmund Yeh, conference commit- Michelle Effros kindly agreed to orga- tee chair Elza Erkip, and editors-in-chief nize a web page with electronic signa- Helmut Bölcskei and Yiannis Kontoyiannis. tures. If you have not done so already, please add your support at http:// The December column gives opportunity to list some of the www.itsoc.org/about/shannons-centenary-us- important changes that the Board deemed useful and neces- postal-stamp sary for 2014. These changes were thoroughly discussed by an active and supportive Board, and I appreciate their con- 5) Two new Annual Schools of Information Theory were structive comments, criticisms, and suggestions throughout founded in Australia and East Asia.
    [Show full text]
  • Information Theory and Network Coding Information Technology: Transmission, Processing, and Storage
    Information Theory and Network Coding Information Technology: Transmission, Processing, and Storage Series Editors: Robert Gallager Massachusetts Institute of Technology Cambridge, Massachusetts Jack Keil Wolf University of California at San Diego La Jolla, California Information Theory and Network Coding Raymond W. Yeung Networks and Grids: Technology and Theory Thomas G. Robertazzi CDMA Radio with Repeaters Joseph Shapira and Shmuel Miller Digital Satellite Communications Giovanni Corazza, ed. Immersive Audio Signal Processing Sunil Bharitkar and Chris Kyriakakis Digital Signal Processing for Measurement Systems: Theory and Applications Gabriele D’Antona and Alessandro Ferrero Coding for Wireless Channels Ezio Biglieri Wireless Networks: Multiuser Detection in Cross-Layer Design Christina Comaniciu, Narayan B. Mandayam and H. Vincent Poor The Multimedia Internet Stephen Weinstein MIMO Signals and Systems Horst J. Bessai Multi-Carrier Digital Communications: Theory and Applications of OFDM, 2nd Ed Ahmad R.S. Bahai, Burton R. Saltzberg and Mustafa Ergen Performance Analysis and Modeling of Digital Transmission Systems William Turin Wireless Communications Systems and Networks Mohsen Guizani Interference Avoidance Methods for Wireless Systems Dimitrie C. Popescu and Christopher Rose Stochastic Image Processing Chee Sun Won and Robert M. Gray Coded Modulation Systems John B. Anderson and Arne Svensson Communication System Design Using DSP Algorithms: With Laboratory Experiments for the TMS320C6701 and TMS320C6711 Steven A. Tretter (continued
    [Show full text]
  • IEEE Information Theory Society Board of Governors Meeting Minutes Boston Marriott Cambridge, Cambridge, 07.01.2012, 1-6Pm Natasha Devroye
    IEEE Information Theory Society Board of Governors meeting minutes Boston Marriott Cambridge, Cambridge, 07.01.2012, 1-6pm Natasha Devroye Present: Muriel Medard, Gerhard Kramer, Natasha Devroye, Frank Kschischang, Helmut Boelcskei, Emanuele Viterbo, Amin Shokrollahi, Michelle Effros, Alon Orlitsky, Max Costa, Jayne Cerone (IEEE), Alex Vardy, Giuseppe Caire, Urbashi Mitra, Paul Siegel, Abbas El Gamal, Bruce Hajek, Matthieu Bloch, Nicholas Laneman, Edmund Yeh, Rolf Johannesson, Alex Dimakis Prakash Narayan, Sriram Vishwanath, Aylin Yener, David Tse, Hans-Andrea Loeliger, Dave Forney, Sergio Verdu The meeting was called to order at 12:54pm by the Information Theory Society (ITsoc) President, Muriel Medard, who welcomed the Board of Governors (BoG). Everyone introduced themselves, including Jayne Cerone (guest) from IEEE. Jayne explained that she attends / observes BoG meetings and conferences of various societies. 1. Motion: The minutes of the BoG Meeting at ITA 2012 held at Catamaran Resort, La Jolla, were approved. 2. Motion: The agenda was approved. 3. Muriel presented the President's report. Committee activity updates were presented: Natasha Devroye stepping down as secretary, and Edmund Yeh is taking over. Negar Kiyavash will be taking over as WithITS coordinator from Christina Fragouli. The mentoring committee led by Joerg Kliewer and joined by Bobak Nazer and Elza Erkip is alive and well. The external nomination committee members are: Max Costa, Muriel Medard (ex officio), Prakash Narayan (chair), Alon Orlitsky, Han Vinck. Various ad hoc committee memberships were outlined, including the active ad-hoc committees on the Transactions. We are currently undergoing a Society review (occurs every 5 years). This February, Transactions were reviewed at the TAB meeting in Arizona; the rest of the Society review will take place in the November TAB meeting.
    [Show full text]