IEEE Transactions on Information Theory

Issue 2 • March 1993

Filter Results

Displaying Results 1 - 25 of 45
  • Trellis coding with multidimensional QAM signal sets

    Publication Year: 1993, Page(s):325 - 336
    Cited by:  Papers (41)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1132 KB)

    Trellis coding using multidimensional quadrature amplitude modulation (QAM) signal sets is investigated. Finite-size 2D signal sets are presented that have minimum average energy, are 90 degrees rotationally symmetric, and have from 16 to 1024 points. The best trellis codes using the finite 16-QAM signal set with two, four, six, and eight dimensions are found by computer search (the multidimension... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modifying real convolutional codes for protecting digital filtering systems

    Publication Year: 1993, Page(s):553 - 564
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (856 KB)

    A method is presented for protecting the overall realization of digital filters implemented with very dense high-speed electronic devices against both hard and soft errors at the data sample level using the error-detecting properties of real convolutional codes. The normal filter system is surrounded with parallel parity channels defined by a real systematic rate k/n convolutiona... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The input-output map of a monotone discrete-time quasireversible node [queueing theory]

    Publication Year: 1993, Page(s):543 - 552
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (812 KB)

    A class of discrete-time quasi-reversible nodes called monotone, which includes discrete-time analogs of the ./M/∞ and ./M/1 nodes, is considered. For stationary ergodic nonnegative integer valued arrival processes, the existence and uniqueness of stationary regimes are proven when a natural rate condition is met. Coupling is used to prove the contractiveness of the input-output map relative... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A new model of numerical computer data and its application for construction of minimum-redundancy codes

    Publication Year: 1993, Page(s):389 - 397
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (632 KB)

    Numerical computer data in many applications contain numerous leading and trailing zeros, and this data feature has been neglected in common source models and related data compression methods. A new approach to source modeling, consisting of the description of this data feature by probabilities pij of data values with i leading and j trailing zeros, is propose... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Super-exponential methods for blind deconvolution

    Publication Year: 1993, Page(s):504 - 519
    Cited by:  Papers (215)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1072 KB)

    A class of iterative methods for solving the blind deconvolution problem, i.e. for recovering the input of an unknown possibly nonminimum-phase linear system by observation of its output, is presented. These methods are universal do not require prior knowledge of the input distribution, are computationally efficient and statistically stable, and converge to the desired solution regardless of initi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Exploitation of cyclostationarity for identifying the Volterra kernels of nonlinear systems

    Publication Year: 1993, Page(s):535 - 542
    Cited by:  Papers (22)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (708 KB)

    A class of random time-series inputs for nonlinear time-invariant systems that permit the analytical specification of a set of operators on the input that are orthonormal over all time to the Volterra operators for all orders and all lag sets is introduced. The time series in this class are cyclostationary and complex valued. The orthonormal operators are used to obtain an input-output type of cro... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modified Gold codes

    Publication Year: 1993, Page(s):654 - 656
    Cited by:  Papers (15)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (288 KB)

    Large families of weakly correlated codes, much in the spirit of R. Gold (1967) and T. Kasami (1971), are constructed. More general codes than those of Gold and Kasami, generated in essentially the same way, and with a much simpler method of proof, are given View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Coding for skew-tolerant parallel asynchronous communications

    Publication Year: 1993, Page(s):379 - 388
    Cited by:  Papers (12)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (800 KB)

    A communication channel consisting of several subchannels transmitting simultaneously and asynchronously is considered, an example being a board with several chips, where the subchannels are wires connecting the chips and differences in the lengths of the wires can result in asynchronous reception. A scheme that allows transmission without an acknowledgment of the message, therefore permitting pip... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the reliability function of the ideal Poisson channel with noiseless feedback

    Publication Year: 1993, Page(s):491 - 503
    Cited by:  Papers (18)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (968 KB)

    A coding scheme for the channel under peak power and average power constraints on the input is presented, and its asymptotic error exponent is shown to coincide, at all rates below capacity, with the sphere packing error exponent, which, for the case at hand, is known to be unachievable without feedback for rates below the critical rate. An upper bound on the error exponent achievable with feedbac... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the minimum distance of ternary cyclic codes

    Publication Year: 1993, Page(s):409 - 422
    Cited by:  Papers (18)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (904 KB)

    There are many ways to find lower bounds for the minimum distance of a cyclic code, based on investigation of the defining set. Some new theorems are derived. These and earlier techniques are applied to find lower bounds for the minimum distance of ternary cyclic codes. Furthermore, the exact minimum distance of ternary cyclic codes of length less than 40 is computed numerically. A table is given ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysis of identified 2-D noncausal models

    Publication Year: 1993, Page(s):525 - 534
    Cited by:  Papers (12)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (592 KB)

    There are two approaches to the identification of noncausal autoregressive systems in two dimensions differing in the assumed noise model. For both approaches, the maximum likelihood estimator formulated in the frequency domain is presented. The Fisher information matrix is evaluated and found to be the sum of a block-Toeplitz and a block-Hankel matrix. The variance of the parameters, however, can... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An updated table of minimum-distance bounds for binary linear codes

    Publication Year: 1993, Page(s):662 - 677
    Cited by:  Papers (120)  |  Patents (31)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (860 KB)

    Tables with lower and upper bounds for dmax ( n,k), the maximum possible minimum distance of a binary linear code with word length n and dimension k, are shown View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Block-coded M-PSK modulation over GF(M)

    Publication Year: 1993, Page(s):337 - 346
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (680 KB)

    Channel codes where the redundancy is obtained not from parity symbols, but from expanding the channel signal-set, are addressed. They were initially proposed by G. Ungerboeck (1982) using a convolutional code. Here, a block coding approach is given. Rate m/(m+1) coded 2m+1-ary phase-shift keying (PSK) is considered. The expanded signal-set is given the structure of a ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Decentralized sequential detection with a fusion center performing the sequential test

    Publication Year: 1993, Page(s):433 - 442
    Cited by:  Papers (102)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (736 KB)

    A decentralized sequential detection problem is considered in which each one of a set of sensors receives a sequence of observations about the hypothesis. Each sensor sends a sequence of summary messages to the fusion center where a sequential test is carried out to determine the true hypothesis. A Bayesian framework for this problem is introduced, and for the case when the information structure i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Minimum support weights of binary codes

    Publication Year: 1993, Page(s):648 - 654
    Cited by:  Papers (20)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (452 KB)

    Some relations between the minimum support weights are discussed. In particular, the possible weight hierarchies of codes of dimension 4 are determined View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Avoiding decoder malfunction in the Peterson-Gorenstein-Zierler decoder

    Publication Year: 1993, Page(s):640 - 643
    Cited by:  Papers (2)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (328 KB)

    BCH decoders based on the Peterson-Gorenstein-Zierler algorithm can malfunction and produce output vectors that are no codewords. To avoid this malfunction a simple additional check is proposed that can be performed before the computation of the error locations. The additional check consists of the minimum number of algebraic equations in the syndrome components that are necessary over a general f... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Robust multiple classification of known signals in additive noise-an asymptotic weak signal approach

    Publication Year: 1993, Page(s):594 - 608
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (960 KB)

    The problem of extracting one out of a finite number of possible signals of known form given observations in an additive noise model is considered. Two approaches are studied: either the signal with shortest distance to the observed data or the signal having maximal correlation with some transformation of the observed data is chosen. With a weak signal approach, the limiting error probability is a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Phased burst error-correcting array codes

    Publication Year: 1993, Page(s):684 - 693
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (856 KB)

    Various aspects of single-phased burst-error-correcting array codes are explored. These codes are composed of two-dimensional arrays with row and column parities with a diagonally cyclic readout order; they are capable of correcting a single burst error along one diagonal. Optimal codeword sizes are found to have dimensions n1 ×n2 such that n<... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Some results on the covering radii of Reed-Muller codes

    Publication Year: 1993, Page(s):366 - 378
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (728 KB)

    Let R(r,m) be the rth-order Reed-Muller code of length 2m and let ρ(r,m ) be its covering radius. R(2,7), R(2,8), R (3,7), and R(4,8) are among those smallest Reed-Muller codes whose covering radii are not known. New bounds for the covering radii of these four codes are obtained. The results ar... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Uniform switching system by families of switching sets

    Publication Year: 1993, Page(s):479 - 490
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (876 KB)

    A new mathematical method in coding theory that is applicable to various practical problems in communication systems is introduced. The uniform switching system based on k-sets is defined, and its cardinalities, an index system, and error correctabilities are studied. The cardinalities of a uniform switching system based on general families of switching sets are discussed. The asymptotic ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the asymptotic efficiency of importance sampling techniques

    Publication Year: 1993, Page(s):710 - 715
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (500 KB)

    The asymptotic efficiency of importance sampling (IS) techniques for the simulation of rare events in a multidimensional nonlinear setting was studied by J.S. Sadowsky and J.A. Bucklew (see ibid., vol.36, p.579-88, 1990). Fundamental results on the asymptotic efficiency of the mean-value modification (MM) technique were derived. Additionally, a statement was made that other IS techniques cannot be... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the converse theorem in statistical hypothesis testing for Markov chains

    Publication Year: 1993, Page(s):629 - 633
    Cited by:  Papers (15)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (356 KB)

    Hypothesis testing for two Markov chains is considered. Under the constraint that the error probability of the first kind is less than or equal to exp(-rn), the error probability of the second kind is minimized. The geodesic that connects the two Markov chains is defined. By analyzing the geodesic, the power exponents are calculated and then represented in terms of Kullback-Leibler diverg... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Vector quantizers with direct sum codebooks

    Publication Year: 1993, Page(s):565 - 580
    Cited by:  Papers (65)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1076 KB)

    The use of direct sum codebooks to minimize the memory requirements of vector quantizers is investigated. Assuming arbitrary fixed partitions, necessary conditions for minimum distortion codebooks are derived, first for scalar codebooks, assuming mean-squared error distortion, and then for vector codebooks and a broader class of distortion measures. An iterative procedure is described for designin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Deterministic prediction in progressive coding

    Publication Year: 1993, Page(s):398 - 408
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1076 KB)

    Deterministic prediction in progressive coding of images is investigated. Progressive coding first creates a sequence of resolution layers by beginning with an original image and reducing its resolution several times by factors of some natural number M. The resultant layers are losslessly encoded, beginning with the lowest-resolution layer and, then encoding each higher resolution image i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Universal redundancy rates do not exist

    Publication Year: 1993, Page(s):520 - 524
    Cited by:  Papers (30)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (388 KB)

    The expected redundancy per symbol of an n-block prefix code Cn on a source μ measures how far the code is from being optimal for that source. The existence of sequences of codes with expected redundancy per symbol of O((log n)/n) for `nice' classes of sources, such as Markov sources of a given order, is well known. It is shown that some restrictio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

IEEE Transactions on Information Theory publishes papers concerned with the transmission, processing, and utilization of information.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Prakash Narayan 

Department of Electrical and Computer Engineering