# Computer Science - Information Theory Publications (50)

## Search

## Computer Science - Information Theory Publications

The training complexity of deep learning-based channel decoders scales exponentially with the codebook size and therefore with the number of information bits. Thus, neural network decoding (NND) is currently only feasible for very short block lengths. In this work, we show that the conventional iterative decoding algorithm for polar codes can be enhanced when sub-blocks of the decoder are replaced by neural network (NN) based components. Read More

This letter introduces a formalism for modeling time-variant channels for diffusive molecular communication systems. In particular, we consider a fluid environment where one transmitter nano-machine and one receiver nano-machine are subjected to Brownian motion in addition to the diffusive motion of the information molecules used for communication. Due to the stochastic movements of the transmitter and receiver nano-machines, the statistics of the channel impulse response change over time. Read More

Spectrally efficient multi-antenna wireless communications is a key challenge as service demands continue to increase. At the same time, powering up radio access networks increases $CO_2$ footprint. Hence, for an efficient radio access design, we design a directional modulation precoder for $M$-QAM modulation with $M=4,8,16,32$. Read More

In this paper, we develop new fast and efficient algorithms for designing single/multiple unimodular waveforms/codes with good auto- and cross-correlation or weighted correlation properties, which are highly desired in radar and communication systems. The waveform design is based on the minimization of the integrated sidelobe level (ISL) and weighted ISL (WISL) of waveforms. As the corresponding optimization problems can quickly grow to large scale with increasing the code length and number of waveforms, the main issue turns to be the development of fast large-scale optimization techniques. Read More

We consider the problem of determining the asymptotic order of the Gelfand numbers of mixed-(quasi-)norm embeddings $\ell^b_p(\ell^d_q) \hookrightarrow \ell^b_r(\ell^d_u)$ given that $p \leq r$ and $q \leq u$, with emphasis on cases with $p\leq 1$ and/or $q\leq 1$. These cases turn out to be related to structured sparsity. We obtain sharp bounds in a number of interesting parameter constellations. Read More

CSMA (Carrier Sense Multiple Access) algorithms based on Gibbs sampling can achieve throughput optimality if certain parameters called the fugacities are appropriately chosen. However, the problem of computing these fugacities is NP-hard. In this work, we derive estimates of the fugacities by using a framework called the regional free energy approximations. Read More

In this paper, we provide a comprehensive system model of a wireless-powered sensor network (WPSN) based on experimental results on a real-life testbed. In the WPSN, a sensor node is wirelessly powered by the RF energy transfer from a dedicated RF power source. We define the behavior of each component comprising the WPSN and analyze the interaction between these components to set up a realistic WPSN model from the systematic point of view. Read More

In this paper, we revisit the high-dimensional content identification with lossy recovery problem (Tuncel and G\"und\"uz, 2014). We first present a non-asymptotic converse bound. Invoking the non-asymptotic converse bound, we derive a lower bound on the exponent of the probability of correct decoding (the strong converse exponent) and show the lower bound is strictly positive if the rate-distortion tuple falls outside the rate-distortion region by Tuncel and G\"und\"uz. Read More

We consider the practical photon-counting receiver in optical scattering communication. In the receiver side, the detected signal can be characterized as discrete photoelectrons, a series of pulses is generated by photon-multiplier (PMT) detector, held by the pulse-holding circuits, sampled in analog-to-digit convertor (ADC) and then be counted by a rising-edge pulse detector. However, the pulse width incurs the dead time effect that may lead to the sub-Poisson characteristic. Read More

A number of fundamental quantities in statistical signal processing and information theory can be expressed as integral functions of two probability density functions. Such quantities are called density functionals as they map density functions onto the real line. For example, information divergence functions measure the dissimilarity between two probability density functions and are particularly useful in a number of applications. Read More

In this paper, we propose a method for acquiring accurate and timely channel state information (CSI) by leveraging full-duplex transmission. Specifically, we propose a mobile communication system in which base stations continuously transmit a pilot sequence in the uplink frequency band, while terminals use self-interference cancellation capabilities to obtain CSI at any time. Our proposal outperforms its half-duplex counterpart by at least 50% in terms of throughput while ensuring the same (or even lower) outage probability. Read More

Several new constructions of 3-dimensional optical orthogonal codes are presented here. In each case the codes have ideal autocorrelation $\mathbf{ \lambda_a=0} $, and in all but one case a cross correlation of $ \mathbf{\lambda_c=1} $. All codes produced are optimal with respect to the applicable Johnson bound either presented or developed here. Read More

The construction of permutation trinomials over finite fields attracts people's interest recently due to their simple form and some additional properties. Motivated by some results on the construction of permutation trinomials with Niho exponents, by constructing some new fractional polynomials that permute the set of the $(q+1)$-th roots of unity in $\mathbb F_{q^2}$, we present several classes of permutation trinomials with Niho exponents over $\mathbb F_{q^2}$, where $q=5^k$. Read More

Sampling in shift-invariant spaces is a realistic model for signals with smooth spectrum. In this paper, we consider phaseless sampling and reconstruction of real-valued signals in a shift-invariant space from their magnitude measurements on the whole Euclidean space and from their phaseless samples taken on a discrete set with finite sampling density. We introduce an undirected graph to a signal and use connectivity of the graph to characterize whether the signal can be determined, up to a sign, from its magnitude measurements on the whole Euclidean space. Read More

We study a spectral initialization method that serves as a key ingredient in recent work on using efficient iterative algorithms for estimating signals in nonconvex settings. Unlike previous analysis in the literature, which is restricted to the phase retrieval setting and which provides only performance bounds, we consider arbitrary generalized linear sensing models and present a precise asymptotic characterization of the performance of the spectral method in the high-dimensional regime. Our analysis reveals a phase transition phenomenon that depends on the sampling ratio. Read More

In this paper, energy-efficient transmission schemes achieving maximal throughput over a finite time interval are studied in a problem setting including energy harvests, data arrivals and channel variation. The goal is to express the offline optimal policy in a way that facilitates a good online solution. We express any throughput maximizing energy efficient offline schedule (EE-TM-OFF) explicitly in terms of water levels. Read More

We propose an intelligent proactive content caching scheme to reduce the energy consumption in wireless downlink. We consider an online social network (OSN) setting where new contents are generated over time, and remain \textit{relevant} to the user for a random lifetime. Contents are downloaded to the user equipment (UE) through a time-varying wireless channel at an energy cost that depends on the channel state and the number of contents downloaded. Read More

This paper considers the channel estimation (CE) and multi-user detection (MUD) problems in cloud radio access network (C-RAN). Assuming that active users are sparse in the network, we solve CE and MUD problems with compressed sensing (CS) technology to greatly reduce the long identification pilot overhead. A mixed L{2,1}-regularization functional for extended sparse group-sparsity recovery is proposed to exploit the inherently sparse property existing both in user activities and remote radio heads (RRHs) that active users are attached to. Read More

We analyze and optimize a wireless system with energy transfer in the downlink and information transfer in the uplink, under quasi-static Nakagami-m fading. We consider ultra-reliable communication scenarios representative of the fifth-generation of wireless systems, with strict error and latency requirements. The error probability and delay are investigated, and an approximation for the former is given and validated through simulations. Read More

We introduce an inequality which may be viewed as a generalization of both the Brascamp-Lieb inequality and its reverse (Barthe's inequality), and prove its information-theoretic (i.e.\ entropic) formulation. Read More

We obtain the first polynomial-time algorithm for exact tensor completion that improves over the bound implied by reduction to matrix completion. The algorithm recovers an unknown 3-tensor with $r$ incoherent, orthogonal components in $\mathbb R^n$ from $r\cdot \tilde O(n^{1.5})$ randomly observed entries of the tensor. Read More

Existing works on building a soliton transmission system only encode information using the imaginary part of the eigenvalue, which fails to make full use of the signal degree-of-freedoms. Motivated by this observation, we make the first step of encoding information using (discrete) spectral amplitudes by proposing analytical noise models for the spectral amplitudes of $N$-solitons ($N\geq 1$). To our best knowledge, this is the first work in building an analytical noise model for spectral amplitudes, which leads to many interesting information theoretic questions, such as channel capacity analysis, and has a potential of increasing the transmission rate. Read More

**Authors:**Mahdi Soltanolkotabi

This paper concerns the problem of recovering an unknown but structured
signal $x \in R^n$ from $m$ quadratic measurements of the form
$y_r=|

Millimeter wave communications rely on narrow-beam transmissions to cope with the strong signal attenuation at these frequencies, thus demanding precise beam alignment between transmitter and receiver. The communication overhead incurred to achieve beam alignment may become a severe impairment in mobile networks. This paper addresses the problem of optimizing beam alignment acquisition, with the goal of maximizing throughput. Read More

An inequality is derived for the correlation of two univariate functions operating on symmetric bivariate normal random variables. The inequality is a simple consequence of the Cauchy-Schwarz inequality. Read More

If we assume line-of-sight propagation and perfect channel state information at the base station -- consistent with slow moving terminals -- then a direct performance comparison between single-cell Massive MIMO at PCS and mmWave frequency bands is straightforward and highly illuminating. Line-of-sight propagation is considered favorable for mmWave because of minimal attenuation, and its facilitation of hybrid beamforming to reduce the required number of active transceivers. We quantify the number of mmWave (60 GHz) service antennas that are needed to duplicate the performance of a specified number of PCS (1. Read More

Redundancy is abundant in Fog networks (i.e., many computing and storage points) and grows linearly with network size. Read More

We propose a family of coherence monotones, named the \emph{generalized coherence concurrence} (or coherence $k$-concurrence), which has a close relation with the generalized entanglement concurrence. The coherence $k$-concurrence of a state is nonzero if and only if the coherence number (a recently introduced discrete coherence monotone) of the state is not smaller than $k$, and a state can be converted to a state with nonzero entanglement $k$-concurrence via incoherent operations if and only if the state has nonzero coherence $k$-concurrence. The generalized coherence concurrence can be considered as the entanglement-based coherence monotone. Read More

Dynamic time-division duplexing (TDD) is considered a promising solution to deal with fast-varying traffic often found in ultra-densely deployed networks. At the same time, it generates more interference which may degrade the performance of some user equipment (UE). When base station (BS) utilization is low, some BSs may not have an UE to serve. Read More

With the latest technology of vectoring, DSL data rates in the order of 100Mbps have become a reality that is under field deployment. The key is to cancel crosstalk from other lines, which is also known as multiuser MIMO cancellation for wireless communications. During the DSL system upgrade phase of field deployment, mix of legacy and vectoring-enabled VDSL lines is inevitable and a channel estimation solution for the entire mix is needed before vectoring can be enforced. Read More

**Affiliations:**

^{1}IMT,

^{2}IMT,

^{3}GREGH

We extend Fano's inequality, which controls the average probability of (disjoint) events in terms of the average of some Kullback-Leibler divergences, to work with arbitrary [0,1]-valued random variables. Our simple two-step methodology is general enough to cover the case of an arbitrary (possibly continuously infinite) family of distributions as well as [0,1]-valued random variables not necessarily summing up to 1. Several novel applications are provided, in which the consideration of random variables is particularly handy. Read More

To increase the spectral efficiency of wireless networks without requiring full-duplex capability of user devices, a potential solution is the recently proposed three-node full-duplex mode. To realize this potential, networks employing three-node full-duplex transmissions must deal with self-interference and user-to-user interference, which can be managed by frequency channel and power allocation techniques. Whereas previous works investigated either spectral efficient or fair mechanisms, a scheme that balances these two metrics among users is investigated in this paper. Read More

Long linear codes constructed from toric varieties over finite fields, their multiplicative structure and decoding. The main theme is the inherent multiplicative structure on toric codes. The multiplicative structure allows for \emph{decoding}, resembling the decoding of Reed-Solomon codes and aligns with decoding by error correcting pairs. Read More

In this paper, we study the physical layer multicasting to multiple co-channel groups in large-scale antenna systems. The users within each group are interested in a common message and different groups have distinct messages. In particular, we aim at designing the precoding vectors solving the so-called quality of service (QoS) and weighted max-min fairness (MMF) problems, assuming that the channel state information is available at the base station (BS). Read More

The rapid growth in the number and variety of connected devices requires 5G wireless systems to cope with a very heterogeneous traffic mix. As a consequence, the use of a fixed TTI during transmission is not necessarily the most efficacious method when heterogeneous traffic types need to be simultaneously serviced.This work analyzes the benefits of scheduling based on exploiting scalable TTI, where the channel assignment and the TTI duration are adapted to the deadlines and requirements of different services. Read More

Caching at mobile devices, accompanied by device-to-device (D2D) communications, is one promising technique to accommodate the exponentially increasing mobile data traffic. While most previous works ignored user mobility, there are some recent works taking it into account. However, the duration of user contact times has been ignored, making it difficult to explicitly characterize the effect of mobility. Read More

Binary Sidel'nikov-Lempel-Cohn-Eastman sequences (or SLCE sequences) over F 2 have even period and almost perfect autocorrelation. However, the evaluation of the linear complexity of these sequences is really difficult. In this paper, we continue the study of [1]. Read More

In this paper, we first propose interference alignment (IA) scheme for uplink transmission of multiple-input-mulitple-output (MIMO) cellular network with a help of relay which operates in halfduplex mode. The proposed scheme only requires global channel state information (CSI) knowledge at relay and no transmitter beamforming and time extension is required at user equipment (UE), which differs from the conventional IA schemes for cellular network. We derive the feasibility condition of the proposed scheme for the general network configuration and analyze the degrees-of-freedom (DoF) performance of the proposed IA scheme. Read More

An $(n,k,r)$ \emph{locally repairable code} (LRC) is an $[n,k,d]$ linear code where every code symbol can be repaired from at most $r$ other code symbols. An LRC is said to be optimal if the minimum distance attains the Singleton-like bound $d \le n-k-\lceil k/r \rceil +2$. The \emph{generalized Hamming weights} (GHWs) of linear codes are fundamental parameters which have many useful applications. Read More

The Interference Channels (ICs) represent fundamental building blocks of wireless communication networks. Despite considerable progress in network information theory, available capacity results for ICs, specifically those with more than two users, are still very limited. One of the main difficulties in the analysis of these networks is how to establish useful capacity outer bounds for them. Read More

Millimeter-wave (mmWave) radar is widely used in vehicles for applications such as adaptive cruise control and collision avoidance. In this paper, we propose an IEEE 802.11ad-based radar for long-range radar (LRR) applications at the 60 GHz unlicensed band. Read More

We present a detailed study of the applications of factor graphs and the belief propagation (BP) algorithm to the state estimation (SE) problem. Our methodology starts with the BP solution for the linearized DC model, and use insights obtained therein to derive the BP algorithm for the non-linear AC model. Then, we make a key further step, where we present the solution in which the BP is applied sequentially over the AC model, akin to what is done by the Gauss-Newton method. Read More

In distributed storage systems, locally repairable codes (LRCs) are introduced to realize low disk I/O and repair cost. In order to tolerate multiple node failures, the LRCs with \emph{$(r, \delta)$-locality} are further proposed. Since hot data is not uncommon in a distributed storage system, both Zeh \emph{et al. Read More

In an $[n,k,d]$ linear code, a code symbol is said to have locality $r$ if it can be repaired by accessing at most $r$ other code symbols. For an $(n,k,r)$ \emph{locally repairable code} (LRC), the minimum distance satisfies the well-known Singleton-like bound $d\le n-k-\lceil k/r\rceil +2$. In this paper, we study optimal ternary LRCs meeting this Singleton-like bound by employing a parity-check matrix approach. Read More

The purpose of this paper is to point out a new connection between information theory and dynamical systems. In the information theory side, we consider rate distortion theory, which studies lossy data compression of stochastic processes under distortion constraints. In the dynamical systems side, we consider mean dimension theory, which studies how many parameters per second we need to describe a dynamical system. Read More

We study a two-player zero-sum game in which one of the players is restricted to mixed strategies with limited randomness. More precisely, we consider the maximum payoff that the maximizer (Alice) can secure with limited randomness $\mathsf{h}$. This problem finds an operational interpretation in the context of repeated games with non-ideal sources of randomness as shown by Gossner and Vieille, and Neyman and Okada. Read More

The growing complexity of heterogeneous cellular networks (HetNets) has necessitated the need to consider variety of user and base station (BS) configurations for realistic performance evaluation and system design. This is directly reflected in the HetNet simulation models considered by standardization bodies, such as the third generation partnership project (3GPP). Complementary to these simulation models, stochastic geometry based approach modeling the user and BS locations as independent and homogeneous Poisson point processes (PPPs) has gained prominence in the past few years. Read More

Joint allocation of spectrum and user association is considered for a large cellular network. The objective is to optimize a network utility function such as average delay given traffic statistics collected over a slow timescale. A key challenge is scalability: given $n$ Access Points (APs), there are $O(2^n)$ ways in which the APs can share the spectrum. Read More

This paper studies energy-efficient coordinated beamforming in multi-cell multi-user multigroup multicast multiple-input single-output systems. We aim at maximizing the network energy efficiency by taking into account the fact that some of the radio frequency chains can be switched off in order to save power. We consider the antenna specific maximum power constraints to avoid non-linear distortion in power amplifiers and user-specific quality of service (QoS) constraints to guarantee a certain QoS levels. Read More

This paper considers wireless-powered cooperative jamming (CJ) to secure communication between a transmitter (Tx) and an information receiver (IR), in the presence of an energy receiver (ER) which is termed as a potential eavesdropper. The full-duplex jammer harvests energy from the Tx's information signal and transmits jamming signal at the same time, where the jamming signal not only confounds the ER (potential eavesdropper) but also charges the ER. Our goal is to maximize the secrecy information rate by jointly optimizing the power allocation at the Tx and jammer while maintaining the harvested energy requirement of the ER. Read More