IEEE Transactions on Information Theory

Issue 7 • July 2002

Filter Results

Displaying Results 1 - 25 of 38
  • Contributors

    Publication Year: 2002, Page(s):2143 - 2150
    Request permission for commercial reuse | PDF file iconPDF (208 KB)
    Freely Available from IEEE
  • A note on robust hypothesis testing

    Publication Year: 2002, Page(s):2111 - 2114
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (291 KB) | HTML iconHTML

    We introduce a simple new hypothesis testing procedure, which, based on an independent sample drawn from a certain density, detects which of k nominal densities is the true density closest to, under the total variation (L1) distance. We obtain a density-free uniform exponential bound for the probability of false detection View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimal filter banks for multiple description coding: analysis and synthesis

    Publication Year: 2002, Page(s):2036 - 2052
    Cited by:  Papers (26)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (485 KB) | HTML iconHTML

    Multiple description (MD) coding is a source coding technique for information transmission over unreliable networks. In MD coding, the coder generates several different descriptions of the same signal and the decoder can produce a useful reconstruction of the source with any received subset of these descriptions. In this paper, we study the problem of MD coding of stationary Gaussian sources with ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Variance of the turbo code performance bound over the interleavers

    Publication Year: 2002, Page(s):2078 - 2086
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (558 KB) | HTML iconHTML

    We evaluate the variance of the union performance bound for a rate-1/3 turbo code over all possible interleavers of length N, under the assumption of a maximum-likelihood (ML) decoder. Theoretical and simulation results for turbo codes with two-memory component codes indicate that the coefficient of variation of the bound increases with the signal-to-noise ratio and decreases with the interleaver ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimal bi-level quantization of i.i.d. sensor observations for binary hypothesis testing

    Publication Year: 2002, Page(s):2105 - 2111
    Cited by:  Papers (46)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (337 KB) | HTML iconHTML

    We consider the problem of binary hypothesis testing using binary decisions from independent and identically distributed (i.i.d). sensors. Identical likelihood-ratio quantizers with threshold λ are used at the sensors to obtain sensor decisions. Under this condition, the optimal fusion rule is known to be a k-out-of-n rule with threshold k. For the Bayesian detection problem, we show that g... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Asymptotics of greedy algorithms for variable-to-fixed length coding of Markov sources

    Publication Year: 2002, Page(s):2022 - 2035
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (605 KB) | HTML iconHTML

    In this paper, alphabet extension for Markov sources is studied such that each extension tree is grown by splitting the node with the maximum value for a weight as a generalization of the leaf probability in Tunstall's (1967) algorithm. We show that the optimal asymptotic rate of convergence of the per-symbol code length to the entropy does not depend on an a priori selected proportional allocatio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The q-ary image of some qm-ary cyclic codes: permutation group and soft-decision decoding

    Publication Year: 2002, Page(s):2069 - 2078
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (528 KB) | HTML iconHTML

    Using a particular construction of generator matrices of the q-ary image of qm-ary cyclic codes, it is proved that some of these codes are invariant under the action of particular permutation groups. The equivalence of such codes with some two-dimensional (2-D) Abelian codes and cyclic codes is deduced from this property. These permutations are also used in the area of the soft-decision... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Maximum-likelihood binary shift-register synthesis from noisy observations

    Publication Year: 2002, Page(s):2096 - 2104
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (425 KB) | HTML iconHTML

    We consider the problem of estimating the feedback coefficients of a linear feedback shift register based on noisy observations. The problem of determining feedback coefficients in the absence of noise is now classical (Massey's (1969) algorithm). In the current approach to the problem of estimation with noisy observations, the coefficients are endowed with a probabilistic model. Gradient ascent u... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the rate-distortion region for multiple descriptions

    Publication Year: 2002, Page(s):2012 - 2021
    Cited by:  Papers (23)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (408 KB) | HTML iconHTML

    We study the problem of source coding with multiple descriptions, which is described as follows. Let X be a discrete memoryless source. There are two encoders, Encoders 1 and 2, and three decoders, Decoders 0, 1, and 2. Encoders 1 and 2 describe the source X at respective rates R1 and R2. Decoder 1 receives the output of Encoder 1 only, and it can recover X with distortion D<... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improvement of Ashikhmin-Litsyn-Tsfasman bound for quantum codes

    Publication Year: 2002, Page(s):2122 - 2124
    Cited by:  Papers (22)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (245 KB) | HTML iconHTML

    We improve performance of the asymptotically good quantum codes constructed by Ashikhmin, Litsyn and Tsfasman (see Phys. Rev. A, vol.63, no.3, p.032311, 2001), by using more rational points on algebraic curves View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A simple upper bound on the redundancy of Huffman codes

    Publication Year: 2002, Page(s):2132 - 2138
    Cited by:  Papers (13)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (363 KB) | HTML iconHTML

    Upper bounds on the redundancy of Huffman codes have been extensively studied in the literature. Almost all of these bounds are in terms of the probability of either the most likely or the least likely source symbol. We prove a simple upper bound in terms of the probability of any source symbol View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On sequential strategies for loss functions with memory

    Publication Year: 2002, Page(s):1947 - 1958
    Cited by:  Papers (19)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (489 KB) | HTML iconHTML

    The problem of optimal sequential decision for individual sequences, relative to a class of competing off-line reference strategies, is studied for general loss functions with memory. This problem is motivated by applications in which actions may have "long-term" effects, or there is a cost for switching from one action to another. As a first step, we consider the case in which the reference strat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Quasi-cyclic codes over Z4 and some new binary codes

    Publication Year: 2002, Page(s):2065 - 2069
    Cited by:  Papers (23)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (325 KB) | HTML iconHTML

    Previously, (linear) codes over Z4 and quasi-cyclic (QC) codes (over fields) have been shown to yield useful results in coding theory. Combining these two ideas we study Z 4-QC codes and obtain new binary codes using the usual Gray map. Among the new codes, the lift of the famous Golay code to Z4 produces a new binary code, a (92, 22... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A class of traceability codes

    Publication Year: 2002, Page(s):2094 - 2096
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (230 KB) | HTML iconHTML

    Traceability codes are identifiable parent property (IPP) codes with the additional requirement that the Hamming distance can be used to trace a parent of a word. Traceability codes can be used for constructing digital fingerprints in order to deter users from illegally copying digital data. We construct a class of traceability codes and determine the exact parameters of some of the codes in this ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Iterative multiuser joint decoding: unified framework and asymptotic analysis

    Publication Year: 2002, Page(s):1772 - 1793
    Cited by:  Papers (213)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (798 KB) | HTML iconHTML

    We present a framework for iterative multiuser joint decoding of code-division multiple-access (CDMA) signals, based on the factor-graph representation and on the sum-product algorithm. In this framework, known parallel and serial, hard and soft interference cancellation algorithms are derived in a unified way. The asymptotic performance of these algorithms in the limit of large code block length ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Asymptotic analysis of blind cyclic correlation-based symbol-rate estimators

    Publication Year: 2002, Page(s):1922 - 1934
    Cited by:  Papers (70)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (616 KB) | HTML iconHTML

    This paper considers the problem of blind symbol rate estimation of signals linearly modulated by a sequence of unknown symbols. Oversampling the received signal generates cyclostationary statistics that are exploited to devise symbol-rate estimators by maximizing in the cyclic domain a (possibly weighted) sum of modulus squares of cyclic correlation estimates. Although quite natural, the asymptot... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Information-theoretic characterizations of conditional mutual independence and Markov random fields

    Publication Year: 2002, Page(s):1996 - 2011
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (557 KB) | HTML iconHTML

    We take the point of view that a Markov random field is a collection of so-called full conditional mutual independencies. Using the theory of I-measure, we have obtained a number of fundamental characterizations related to conditional mutual independence and Markov random fields. We show that many aspects of conditional mutual independence and Markov random fields have very simple set-theoretic de... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Asymptotic efficiency of two-stage disjunctive testing

    Publication Year: 2002, Page(s):1741 - 1749
    Cited by:  Papers (19)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (404 KB) | HTML iconHTML

    We adapt methods originally developed in information and coding theory to solve some testing problems. The efficiency of two-stage pool testing of n items is characterized by the minimum expected number E(n, p) of tests for the Bernoulli p-scheme, where the minimum is taken over a matrix that specifies the tests that constitute the first stage. An information-theoretic bound implies that the natur... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance of blind and group-blind multiuser detectors

    Publication Year: 2002, Page(s):1849 - 1872
    Cited by:  Papers (35)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1180 KB) | HTML iconHTML

    In blind (or group-blind) linear multiuser detection, the detector is estimated from the received signals, with the prior knowledge of only the signature waveform of the desired user (or the signature waveforms of some but not all users). The performance of a number of such estimated linear detectors, including the direct-matrix-inversion (DMI) blind linear minimum mean square error (MMSE) detecto... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Linear MMSE multiuser receivers: MAI conditional weak convergence and network capacity

    Publication Year: 2002, Page(s):2114 - 2122
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (454 KB) | HTML iconHTML

    We explore the performance of minimum mean-square error (MMSE) multiuser receivers in wireless systems where the signatures are modeled as random and take values in complex space. First we study the conditional distribution of the output multiple-access interference (MAI) of the MMSE receiver. By appealing to the notion of conditional weak convergence, we find that the conditional distribution of ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Repeated use of codes for error detection five times is bad

    Publication Year: 2002, Page(s):2053 - 2060
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (423 KB) | HTML iconHTML

    The undetected error probabilities of codes when used repeatedly to transmit sequences of messages are studied. It is shown that for any code whose rate is greater than zero but less than one, the coding scheme obtained by the repeated use of the code is bad, if used five times or more, and improper if used four times or more. Furthermore, the repeated use of any linear code, over an alphabet grea... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the asymptotic eigenvalue distribution of concatenated vector-valued fading channels

    Publication Year: 2002, Page(s):2086 - 2091
    Cited by:  Papers (54)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (327 KB) | HTML iconHTML

    The linear vector-valued channel x |→ Πn Mnx + z with z and Mn denoting additive white Gaussian noise and independent random matrices, respectively, is analyzed in the asymptotic regime as the dimensions of the matrices and vectors involved become large. The asymptotic eigenvalue distribution of the channel's covariance matrix is given in terms of an implic... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimal binary one-ended codes

    Publication Year: 2002, Page(s):2125 - 2132
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (358 KB) | HTML iconHTML

    Binary prefix-free codes in which all codewords end with a "1" have been introduced by Berger and Yeung (1990). A recursive method is given here for the construction of all optimal "1"-ended codes with n codewords. It is shown that the set of codes obtained by the construction contains only optimal codes. We also compute recursively the number of essentially different optimal "1"-ended codes with ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An axiomatization of partition entropy

    Publication Year: 2002, Page(s):2138 - 2142
    Cited by:  Papers (20)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (320 KB) | HTML iconHTML

    The aim of this article is to present an axiomatization of a generalization of Shannon's entropy starting from partitions of finite sets. The proposed axiomatization defines a family of entropies depending on a real positive parameter that contains as a special case the Havrda-Charvat (1967) entropy, and thus, provides axiomatizations for the Shannon entropy, the Gini index, and for other types of... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On delayed prediction of individual sequences

    Publication Year: 2002, Page(s):1959 - 1976
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (658 KB) | HTML iconHTML

    Prediction of individual sequences is investigated for cases in which the decision maker observes a delayed version of the sequence, or is forced to issue his/her predictions a number of steps in advance, with incomplete information. For finite action and observation spaces, it is shown that the prediction strategy that minimizes the worst case regret with respect to the Bayes envelope is obtained... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

IEEE Transactions on Information Theory publishes papers concerned with the transmission, processing, and utilization of information.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Prakash Narayan 

Department of Electrical and Computer Engineering