On mutual information, likelihood ratios, and estimation error for the additive Gaussian channel
This paper considers the model of an arbitrarily distributed signal x observed through an added independent white Gaussian noise w, y=x+w. New relations between the minimal mean-square error of the noncausal estimator and the likelihood ratio between y ...
On the high-SNR capacity of noncoherent networks
We obtain the first term in the high signal-to-noise ratio (SNR) asymptotic expansion of the sum-rate capacity of noncoherent fading networks, i.e., networks where the transmitters and receivers-while fully cognizant of the fading law-have no access to ...
Cooperative Strategies and Capacity Theorems for Relay Networks
Coding strategies that exploit node cooperation are developed for relay networks. Two basic schemes are studied: the relays decode-and-forward the source message to the destination, or they compress-and-forward their channel outputs to the destination. ...
Divergence Estimation of Continuous Distributions Based on Data-Dependent Partitions
We present a universal estimator of the divergence $D(P,Vert,Q)$ for two arbitrary continuous distributions $P$ and $Q$ satisfying certain regularity conditions. This algorithm, which observes independent and identically distributed (i.i.d.) samples ...
Capacity Analysis for Continuous-Alphabet Channels With Side Information, Part I: A General Framework
Capacity analysis for channels with side information at the receiver has been an active area of interest. This problem is well investigated for the case of finite-alphabet channels. However, the results are not easily generalizable to the case of ...
Capacity Analysis for Continuous Alphabet Channels With Side Information, Part II: MIMO Channels
In this second part of our two-part paper, we consider the capacity analysis for wireless mobile systems with multiple-antenna architectures. We apply the results of the first part to a commonly known baseband, discrete-time multiple-antenna system ...
Capacity Per Unit Energy of Fading Channels With a Peak Constraint
A discrete-time single-user scalar channel with temporally correlated Rayleigh fading is analyzed. There is no side information at the transmitter or the receiver. A simple expression is given for the capacity per unit energy, in the presence of a peak ...
General Capacity Bounds for Spatially Correlated Rician MIMO Channels
This paper considers the capacity of spatially correlated Rician multiple-input multiple-output (MIMO) channels. We consider the general case with double-sided correlation and arbitrary rank channel means. We derive tight upper and lower bounds on the ...
A Systematic Approach to Multistage Detectors in Multipath Fading Channels
We consider linear multistage detectors with universal (large system) weighting for synchronous code-division multiple access (CDMA) in multipath fading channels with many users. A convenient choice of the basis of the projection subspace allows a joint ...
Uncertainty, Monogamy, and Locking of Quantum Correlations
Squashed entanglement and entanglement of purification are quantum-mechanical correlation measures and are defined as certain minimizations of entropic quantities. In this paper, we present the first nontrivial calculations of both quantities. Our ...
On Joint Information Embedding and Lossy Compression in the Presence of a Stationary Memoryless Attack Channel
We consider the problem of optimum joint public information embedding and lossy compression with respect to a fidelity criterion. The decompressed composite sequence (stegotext) is distorted by a stationary memoryless attack, resulting in a forgery ...
Continuous-Time Equivalents of Welch Bound Equality Sequences
The theory developed on the sequence optimization for equal-power code-division multiple-access (CDMA) systems is generalized in this paper. Unlike previous works, where discrete-time or vector channel models are predominantly employed, the overloaded ...
Zero/Positive Capacities of Two-Dimensional Runlength-Constrained Arrays
A binary sequence satisfies a one-dimensional $(d_1, k_1, d_2, k_2)$ runlength constraint if every run of zeros has length at least $d_1$ and at most $k_1$ and every run of ones has length at least $d_2$ and at most $k_2$ . A two-dimensional binary ...
Improving the Gilbert-Varshamov bound for q-ary codes
Given positive integers q,n, and d, denote by Aq(n,d) the maximum size of a q-ary code of length n and minimum distance d. The famous Gilbert-Varshamov bound asserts that Aq(n,d+1)≥qn/Vq(n,d) where Vq(n,d)=Σi=0d (in)(q-1)i is the volume of a q-...
LDPC Codes Over Rings for PSK Modulation
This paper describes the design and analysis of low-density parity-check (LDPC) codes over rings and shows how these codes, when mapped onto appropriate signal constellations, can be used to effect bandwidth-efficient modulation. Specifically, LDPC ...
Tight bounds for LDPC and LDGM codes under MAP decoding
A new method for analyzing low-density parity-check (LDPC) codes and low-density generator-matrix (LDGM) codes under bit maximum a posteriori probability (MAP) decoding is introduced. The method is based on a rigorous approach to spin glasses developed ...
An Analysis of the Orthogonality Structures of Convolutional Codes for Iterative Decoding
The structures of convolutional self-orthogonal codes and convolutional self-doubly-orthogonal codes for both belief propagation and threshold iterative decoding algorithms are analyzed on the basis of difference sets and computation tree. It is shown ...
An analysis on optimal rates of BDB encoders for RLL and MTR systems
In most recording channels, modulation codes are employed to transform user data to sequences that satisfy some desirable constraint. Run-length-limited (RLL(d,k)) and maximum transition run (MTR(j,k)) systems are examples of constraints that improve ...
Gaussian Orthogonal Relay Channels: Optimal Resource Allocation and Capacity
A Gaussian orthogonal relay model is investigated, where the source transmits to the relay and destination in channel 1, and the relay transmits to the destination in channel 2, with channels 1 and 2 being orthogonalized in the time–frequency plane in ...
A New Bound for the Zero-Error Capacity Region of the Two-User Binary Adder Channel
A new uniquely decodable (UD) code pair for the two-user binary adder channel (BAC) is presented. This code pair leads to an improved bound for the zero-error capacity region of such a channel. The highest known rate for a UD code pair for the two-user ...
Design and Analysis of Password-Based Key Derivation Functions
A password-based key derivation function (KDF)—a function that derives cryptographic keys from a password—is necessary in many security applications. Like any password-based schemes, such KDFs are subject to key search attacks (often called dictionary ...
Toward a General Correlation Theorem
In 2001, Nyberg proved three important correlation theorems and applied them to several cryptanalytic contexts. We continue the work of Nyberg in a more theoretical direction. We consider a general functional form and obtain its Walsh transform. Two of ...
On the Autocorrelation Distributions of Sidel'nikov Sequences
For a prime $p$ and positive integers $M$ and $n$ such that $Mvert p^n - 1$ , Sidel'nikov introduced $M$ -ary sequences (called Sidel'nikov sequences) of period $p^n -1$ , the out-of-phase autocorrelation magnitude of which is upper bounded by $4$ . In ...
Matched Filtering for Generalized Stationary Processes
The methods for solving optimal filtering problems in the case of the classical stationary processes have been well known since the late 1940s. Practice often gives rise to what is not a classical stationary process but a generalized one, and white ...
Strong Consistency of the Over- and Underdetermined LSE of 2-D Exponentials in White Noise
We consider the problem of least squares estimation of the parameters of two–dimensional (2-D) exponential signals observed in the presence of an additive noise field, when the assumed number of exponentials is incorrect. We consider both the case where ...
On the Existence and Characterization of the Maxent Distribution Under General Moment Inequality Constraints
A broad set of sufficient conditions that guarantees the existence of the maximum entropy (maxent) distribution consistent with specified bounds on certain generalized moments is derived. Most results in the literature are either focused on the minimum ...
On the Jensen–Shannon Divergence and Variational Distance
We study the distance measures between two probability distributions via two different distance metrics, a new metric induced from Jensen–Shannon divergence, and the well known $L_1$ metric. We show that several important results and constructions in ...
Multidimensional Mappings for Iteratively Decoded BICM on Multiple-Antenna Channels
Multidimensional binary mappings for bit-interleaved coded modulations (BICMs) on ergodic multiple-antenna channels with iterative decoding are presented. After derivation of a closed-form expression for the pairwise error probability under ideal ...
Iterative Decoding of Linear Block Codes: A Parity-Check Orthogonalization Approach
It is widely accepted that short cycles in Tanner graphs deteriorate the performance of message-passing algorithms. This discourages the use of these algorithms on Tanner graphs (TGs) of well-known algebraic codes such as Hamming codes, Bose–Chaudhuri–...
Convergence Analysis and Optimal Scheduling for Multiple Concatenated Codes
An interesting practical consideration for decoding of serial or parallel concatenated codes with more than two components is the determination of the lowest complexity component decoder schedule which results in convergence. This correspondence ...