Scheduled System Maintenance
On Tuesday, May 22, IEEE Xplore will undergo scheduled maintenance. Single article sales and account management will be unavailable
from 6:00am–5:00pm ET. There may be intermittent impact on performance from noon–6:00pm ET.
We apologize for the inconvenience.

IEEE Transactions on Information Theory

Volume 42 Issue 6  Part 2 • Nov. 1996

 This issue contains several parts.Go to:  Part 1 

Filter Results

Displaying Results 1 - 25 of 29
  • Discrete Stochastic Processes [Book Reviews]

    Publication Year: 1996, Page(s): 2273
    Request permission for commercial reuse | PDF file iconPDF (111 KB)
    Freely Available from IEEE
  • Index to references

    Publication Year: 1996, Page(s):2278 - 2344
    Request permission for commercial reuse | PDF file iconPDF (11589 KB)
    Freely Available from IEEE
  • 1994-1996 Index IEEE Transactions on Information Theory vol. 40-42

    Publication Year: 1996, Page(s):1 - 61
    Request permission for commercial reuse | PDF file iconPDF (8750 KB)
    Freely Available from IEEE
  • On periodicity properties of Costas arrays and a conjecture on permutation polynomials

    Publication Year: 1996, Page(s):2252 - 2253
    Cited by:  Papers (12)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (224 KB)

    Golomb and Taylor (1984) conjectured that single periodicity characterizes the Welch construction of Costas arrays. In this correspondence, we present a weakened version of this conjecture and partial results on it. Furthermore, we prove that our conjecture is equivalent to a conjecture concerning permutation polynomials and give partial results on the latter View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The relative value of labeled and unlabeled samples in pattern recognition with an unknown mixing parameter

    Publication Year: 1996, Page(s):2102 - 2117
    Cited by:  Papers (69)  |  Patents (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1456 KB)

    We observe a training set Q composed of l labeled samples {(X1,θ1),...,(Xl, θl )} and u unlabeled samples {X1',...,Xu'}. The labels θi are independent random variables satisfying Pr{θi=1}=η, Pr{θi=2}=1-η. The labeled observations Xi are independently ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Bounds on the weight distribution of cosets

    Publication Year: 1996, Page(s):2257 - 2260
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (320 KB)

    Upper and lower bounds on the weight distribution of a proper coset of a code are given View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Page test with nuisance parameter estimation

    Publication Year: 1996, Page(s):2242 - 2252
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (828 KB)

    The detection of the onset of a signal is a common and relevant problem in signal processing. The Page test [1954] using the log-likelihood ratio is optimal for minimizing the worst case average delay before detection (D¯) while constraining the average time between false alarms (T¯). Realistic problems typically include unknown parameters having the same value under signal-absent and si... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multiterminal source coding achievable rates and reliability

    Publication Year: 1996, Page(s):2094 - 2101
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (628 KB)

    Some open problems concerning classical multiterminal configuration in which two correlated sources {X} and {Y} are encoded separately and decoded by common decoder with respect to a fidelity criterion for messages of both sources are resolved. The results of Berger and Yeung (1989) are expanded in two directions. First, we determine the “rate-distortion” region R(Δ) of achievabl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the factor-of-two bound for Gaussian multiple-access channels with feedback

    Publication Year: 1996, Page(s):2231 - 2235
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (508 KB)

    It was shown by Pombra and Cover (1994) that the maximum achievable throughput (sum of rates of all users) of a Gaussian multiple-access channel with feedback is at most twice that achievable without feedback. We prove a somewhat stronger result which establishes the factor-of-two bound not only for the total throughput but for the entire capacity region as well. Specifically, we show that the cap... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A characterization of codes with extreme parameters

    Publication Year: 1996, Page(s):2255 - 2257
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (240 KB)

    Let C be an [n,k,d]-code over GP(q) with k⩾2. Let s=def(C)=n+1-k-d denote the defect of C. The Griesmer bound implies that d⩽q(s+1). If d>qs and s⩾2, then using a previous result of Faldum and Willems, k⩽q. Thus fixing s⩾2 the extreme parameters for a code with def(C)=s are d=q(s+1); k=q, and n=k+d+s-1=(q+1)(s+2)-3. In this correspondence we characterize the codes with such ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Bounds on the aliasing error in multidimensional Shannon sampling

    Publication Year: 1996, Page(s):2238 - 2241
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (408 KB)

    We present a pair of sharp lower and upper bounds on the 2-norm of the aliasing error in general multiband sampling representations for not necessarily bandlimited multidimensional functions. These bounds improve and generalize previous bounds. They also complement a uniform upper bound due to Higgins (1985) View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Coding for a binary independent piecewise-identically-distributed source

    Publication Year: 1996, Page(s):2210 - 2217
    Cited by:  Papers (50)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (716 KB)

    Two weighting procedures are presented for compaction of output sequences generated by binary independent sources whose unknown parameter may occasionally change. The resulting codes need no knowledge of the sequence length T, i.e., they are strongly sequential, and also the number of parameter changes is unrestricted. The additional-transition redundancy of the first method was shown to achieve t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Universal delay estimation for discrete channels

    Publication Year: 1996, Page(s):2085 - 2093
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (920 KB)

    The use of information theory concepts for universal estimation of delay for classes of discrete channels is discussed. The problem is presented as one of hypothesis testing. Although the channel statistics are not known, for large enough signal duration, the exponent of the average error probability is equal to that associated with the optimal maximum-likelihood (ML) decision procedure which util... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Tensor codes for the rank metric

    Publication Year: 1996, Page(s):2146 - 2157
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1060 KB)

    Linear spaces of n×n×n tensors over finite fields are investigated where the rank of every nonzero tensor in the space is bounded from below by a prescribed number μ. Such linear spaces can recover any n×n×n error tensor of rank ⩽ (μ-1)/2, and, as such, they can be used to correct three-way crisscross errors. Bounds on the dimensions of such spaces are given for &... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The error probability, entropy, and equivocation when the number of input messages increases

    Publication Year: 1996, Page(s):2228 - 2231
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (380 KB)

    We derive an inequality for the minimum error probability which shows that in many situations this quantity converges to its supremum as the number of possible values of the input signal increases. The asymptotic behavior of this probability is related to the behavior of the equivocation. Implications for asymptotic rates of certain codes and for perfect secrecy of cryptosystems are mentioned View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On classes of rate k/(k+1) convolutional codes and their decoding techniques

    Publication Year: 1996, Page(s):2181 - 2193
    Cited by:  Papers (13)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1180 KB)

    For the class of rate k/(k+1) convolutional codes, Yamada et al. (1983) proposed an efficient maximum-likelihood decoding algorithm called the YHM algorithm. In order to reduce the complexity of the YHM algorithm, this paper presents two techniques for simplifying the trellis diagram used in the YHM algorithm. We further observe that the proposed techniques effectively reduce the complexity of the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Redundancy rates for renewal and other processes

    Publication Year: 1996, Page(s):2065 - 2072
    Cited by:  Papers (27)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (784 KB)

    Upper and lower bounds, both of order √n, are obtained on minimax redundancy of universal lossless codes for the class of renewal processes. This is the first example of an interesting model class with strong redundancy rate o(n) but not O(log n). For the same class, the nonexistence of weak-rate bounds of smaller order than √n is also shown. The methods extend to provide upper and low... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Trace representation of Legendre sequences of Mersenne prime period

    Publication Year: 1996, Page(s):2254 - 2255
    Cited by:  Papers (36)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (180 KB)

    In this correspondence, it is shown that Legendre sequences of period p can be explicitly represented using the trace function defined on the finite field with 2n elements, whenever p=2n-1 is prime for some n⩾3 View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficient agnostic learning of neural networks with bounded fan-in

    Publication Year: 1996, Page(s):2118 - 2132
    Cited by:  Papers (47)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1256 KB)

    We show that the class of two-layer neural networks with bounded fan-in is efficiently learnable in a realistic extension to the probably approximately correct (PAC) learning model. In this model, a joint probability distribution is assumed to exist on the observations and the learner is required to approximate the neural network which minimizes the expected quadratic error. As special cases, the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • New optimal quaternary linear codes of dimension 5

    Publication Year: 1996, Page(s):2260 - 2265
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (568 KB)

    In this correspondence, new optimal quaternary linear codes of dimension 5 are presented which extend previously known results. These codes belong to the class of quasi-twisted (QT) codes, and have been obtained using a greedy local search algorithm. Other codes are also given which provide a lower bound on the maximum possible minimum distance. The generator polynomials for these codes are tabula... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the capacity of the asynchronous T-user M-frequency noiseless multiple-access channel without intensity information

    Publication Year: 1996, Page(s):2235 - 2238
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (416 KB)

    We discuss an achievable rate region for the asynchronous T-user M-frequency multiple-access channel without intensity information. The problem is formulated in terms of frequencies, but the results are also applicable to pulse position modulation (PPM) schemes. It is shown that the achievable sum rate for T users reduces from (M-1) bits per channel use in the synchronous multiple-access situation... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fault-tolerant cube graphs and coding theory

    Publication Year: 1996, Page(s):2217 - 2221
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (556 KB)

    Hypercubes, meshes, tori, and Omega networks are well-known interconnection networks for parallel computers. The structure of those graphs can be described in a more general framework called cube graphs. The idea is to assume that every node in a graph with ql nodes is represented by a unique string of l symbols over GF(q). The edges are specified by a set of offsets, those are vectors ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the construction of maximal prefix-synchronized codes

    Publication Year: 1996, Page(s):2158 - 2166
    Cited by:  Papers (24)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (792 KB)

    We present a systematic procedure for mapping data sequences into codewords of a prefix-synchronized code (PS-code), as well as for performing the inverse mapping. A PS-code, proposed by Gilbert (1960), belongs to a subclass of comma-free codes and is useful to recover word synchronization when errors have occurred in the stream of codewords. A PS-code is defined as a set of codewords with the pro... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The permutation group of affine-invariant extended cyclic codes

    Publication Year: 1996, Page(s):2194 - 2209
    Cited by:  Papers (18)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1580 KB)

    The extended cyclic codes of length pm, p is a prime, which are invariant under the affine-group acting on Fpm, are called affine-invariant codes. Following results of Berger (1996, 1994), we present the formal expression of the permutation group of these codes. Afterwards we give several tools in order to determine effectively the group of a given code or of some infinite cl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The rate loss in the Wyner-Ziv problem

    Publication Year: 1996, Page(s):2073 - 2084
    Cited by:  Papers (120)  |  Patents (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1060 KB)

    The rate-distortion function for source coding with side information at the decoder (the “Wyner-Ziv problem”) is given in terms of an auxiliary random variable, which forms a Markov chain with the source and the side information. This Markov chain structure, typical to the solution of multiterminal source coding problems, corresponds to a loss in coding rate with respect to the conditi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

IEEE Transactions on Information Theory publishes papers concerned with the transmission, processing, and utilization of information.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Prakash Narayan 

Department of Electrical and Computer Engineering