IEEE Transactions on Information Theory

Volume 62 Issue 6 • June 2016

Filter Results

Displaying Results 1 - 25 of 52
  • Table of contents

    Publication Year: 2016, Page(s):C1 - C4
    Request permission for commercial reuse | PDF file iconPDF (177 KB)
    Freely Available from IEEE
  • IEEE Transactions on Information Theory publication information

    Publication Year: 2016, Page(s): C2
    Request permission for commercial reuse | PDF file iconPDF (164 KB)
    Freely Available from IEEE
  • Polar Codes for Arbitrary DMCs and Arbitrary MACs

    Publication Year: 2016, Page(s):2917 - 2936
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (476 KB) | HTML iconHTML

    Polar codes are constructed for arbitrary channels by imposing an arbitrary quasi-group structure on the input alphabet. Just as with usual polar codes, the block error probability under successive cancellation decoding is o(2-N1/2ε), where N is the block length. Encoding and decoding for these codes can be implemented with a complexity of O(Nlog N). It is shown that the same tec... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Universal Polarization

    Publication Year: 2016, Page(s):2937 - 2946
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1010 KB) | HTML iconHTML

    A method to polarize channels universally is introduced. The method is based on combining channels of unequal capacities in each polarization step, as opposed to the standard method of combining identical channels. The locations of the good and bad channels that emerge upon polarization are only a function of the polar transform chosen, and are otherwise independent of the channel being polarized.... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • New Classes of Partial Geometries and Their Associated LDPC Codes

    Publication Year: 2016, Page(s):2947 - 2965
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1423 KB) | HTML iconHTML

    The use of partial geometries to construct parity-check matrices for binary low-density parity-check (LDPC) codes has resulted in the design of successful codes with a probability of error on the AWGN channel close to the Shannon capacity at bit error rate down to $10^{-15}$ . Such considerations have motivated this further investigation. A new and simple construction of a type of partial geometri... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The ADMM Penalized Decoder for LDPC Codes

    Publication Year: 2016, Page(s):2966 - 2984
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1936 KB) | HTML iconHTML

    Linear programming (LP) decoding for low-density parity-check codes was introduced by Feldman et al. and has been shown to have theoretical guarantees in several regimes. Furthermore, it has been reported in the literature-via simulation and via instanton analysis-that LP decoding displays better error rate performance at high signal-to-noise ratios (SNR) than does belief propagation (BP) decoding... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • ADMM LP Decoding of Non-Binary LDPC Codes in $ \mathbb {F}_{2^{m}}$

    Publication Year: 2016, Page(s):2985 - 3010
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1946 KB) | HTML iconHTML

    In this paper, we develop efficient decoders for non-binary low-density parity-check codes using the alternating direction method of multipliers (ADMM). We apply ADMM to two decoding problems. The first problem is linear programming (LP) decoding. In order to develop an efficient algorithm, we focus on non-binary codes in fields of characteristic two. This allows us to transform each constraint in... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the Information Loss of the Max-Log Approximation in BICM Systems

    Publication Year: 2016, Page(s):3011 - 3025
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1260 KB) | HTML iconHTML

    We present a comprehensive study of the information rate loss of the max-log approximation for M-ary pulse-amplitude modulation (PAM) in a bit-interleaved coded modulation (BICM) system. It is widely assumed that the calculation of L-values using the max-log approximation leads to an information loss. We prove that this assumption is correct for all M-PAM constellations and labelings with the exce... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Successive Segmentation-Based Coding for Broadcasting Over Erasure Channels

    Publication Year: 2016, Page(s):3026 - 3038
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (969 KB) | HTML iconHTML

    Motivated by error correction coding in multimedia applications, we study the problem of broadcasting a single common source to multiple receivers over heterogeneous erasure channels. Each receiver is required to partially reconstruct the source sequence by decoding a certain fraction of the source symbols. We propose a coding scheme that requires only off-the-shelf erasure codes and can be easily... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Convolutional Codes With Maximum Column Sum Rank for Network Streaming

    Publication Year: 2016, Page(s):3039 - 3052
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (603 KB) | HTML iconHTML

    The column Hamming distance of a convolutional code determines the error correction capability when streaming over a class of packet erasure channels. We introduce a metric known as the column sum rank that parallels the column Hamming distance when streaming over a network with link failures. We prove the rank analogues of several known column Hamming distance properties and introduce a new famil... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • BASIC Codes: Low-Complexity Regenerating Codes for Distributed Storage Systems

    Publication Year: 2016, Page(s):3053 - 3069
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (950 KB) | HTML iconHTML

    In distributed storage systems, regenerating codes can achieve the optimal tradeoff between storage capacity and repair bandwidth. However, a critical drawback of existing regenerating codes, in general, is the high coding and repair complexity, since the coding and repair processes involve expensive multiplication operations in finite field. In this paper, we present a design framework of regener... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Bounds on the Parameters of Locally Recoverable Codes

    Publication Year: 2016, Page(s):3070 - 3083
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (407 KB) | HTML iconHTML

    A locally recoverable code (LRC code) is a code over a finite alphabet, such that every symbol in the encoding is a function of a small number of other symbols that form a recovering set. In this paper, we derive new finite-length and asymptotic bounds on the parameters of LRC codes. For LRC codes with a single recovering set for every coordinate, we derive an asymptotic Gilbert-Varshamov type bou... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficient Non-Recursive Design of Second-Order Spectral-Null Codes

    Publication Year: 2016, Page(s):3084 - 3102
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (983 KB) | HTML iconHTML

    A new efficient design of second-order spectralnull (2-OSN) codes is presented. The new codes are obtained by applying the technique used to design parallel decoding balanced (i.e., 1-OSN) codes to the random walk method introduced by some of the authors for designing 2-OSN codes. This gives new non-recursive efficient code designs, which are less redundant than the code designs found in the liter... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On Optimal Nonlinear Systematic Codes

    Publication Year: 2016, Page(s):3103 - 3112
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (283 KB) | HTML iconHTML

    Most bounds on the size of codes hold for any code, whether linear or not. Notably, the Griesmer bound holds only in the linear case and so optimal linear codes are not necessarily optimal codes. In this paper, we identify code parameters (q, d, k), namely, field size, minimum distance, and combinatorial dimension, for which the Griesmer bound also holds in the (systematic) nonlinear case. Moreove... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Systematic Error-Correcting Codes for Permutations and Multi-Permutations

    Publication Year: 2016, Page(s):3113 - 3124
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (290 KB) | HTML iconHTML

    Multi-permutations and in particular permutations appear in various applications in an information theory. New applications, such as rank modulation for flash memories, have suggested the need to consider error-correcting codes for multi-permutations. In this paper, we study systematic error-correcting codes for multi-permutations in general and for permutations in particular. For a given number o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Codes for DNA Sequence Profiles

    Publication Year: 2016, Page(s):3125 - 3146
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1879 KB) | HTML iconHTML

    We consider the problem of storing and retrieving information from synthetic DNA media. We introduce the DNA storage channel and model the read process through the use of profile vectors. We provide an asymptotic analysis of the number of profile vectors and propose new asymmetric coding techniques to combat the effects of synthesis and sequencing noise. Furthermore, we construct two families of c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Variable-Rate Linear Network Error Correction MDS Codes

    Publication Year: 2016, Page(s):3147 - 3164
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (537 KB) | HTML iconHTML

    In network communication, the source often transmits messages at several different information rates within a session. How to deal with information transmission and network error correction simultaneously under different rates is introduced in this paper as a variable-rate network error correction problem. Apparently, linear network error correction maximum distance separable (MDS) codes are expec... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Single-Uniprior Index-Coding Problem: The Single-Sender Case and the Multi-Sender Extension

    Publication Year: 2016, Page(s):3165 - 3182
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2041 KB) | HTML iconHTML

    Index coding studies multiterminal source-coding problems where a set of receivers are required to decode multiple (possibly different) messages from a common broadcast, and they each know some messages a priori. In this paper, at the receiver end, we consider a special setting where each receiver knows only one message a priori, and each message is known to only one receiver. At the broadcasting ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Alignment-Based Network Coding for Two-Unicast-Z Networks

    Publication Year: 2016, Page(s):3183 - 3211
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1291 KB) | HTML iconHTML

    In this paper, we study the wireline two-unicast-Z communication network over directed acyclic graphs. The two-unicast-$Z$ network is a two-unicast network where the destination intending to decode the second message has a priori side information of the first message. We make three contributions in this paper. First, we describe a new linear network coding algorithm for two-unicast-Z networks over... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Hierarchical Coded Caching

    Publication Year: 2016, Page(s):3212 - 3229
    Cited by:  Papers (14)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (726 KB) | HTML iconHTML

    Caching of popular content during off-peak hours is a strategy to reduce network loads during peak hours. Recent work has shown significant benefits of designing such caching strategies not only to locally deliver the part of the content, but also to provide coded multicasting opportunities even among users with different demands. Exploiting both of these gains was shown to be approximately optima... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the Throughput-Delay Tradeoff in Georouting Networks

    Publication Year: 2016, Page(s):3230 - 3242
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1249 KB) | HTML iconHTML

    We study the scaling properties of a georouting scheme in a wireless multi-hop network of n mobile nodes. Our aim is to increase the network capacity quasi-linearly with n, while keeping the average delay bounded. In our model, we consider mobile nodes moving according to an independent identically distributed random walk with velocity v and transmitting packets to randomly chosen fixed and known ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Overhead Performance Tradeoffs—A Resource Allocation Perspective

    Publication Year: 2016, Page(s):3243 - 3269
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3176 KB) | HTML iconHTML

    A key aspect of many resource allocation problems is the need for the resource controller to compute a function, such as the max or arg max, of the competing users' metrics. Information must be exchanged between the competing users and the resource controller in order for this function to be computed. In many practical resource controllers, the competing users' metrics are communicated to the reso... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Successive Omniscience

    Publication Year: 2016, Page(s):3270 - 3289
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (628 KB) | HTML iconHTML

    Because the exchange of information among all the users in a large network can take a long time, a successive omniscience protocol is proposed. Namely, subgroups of users first recover the information of other users in the same subgroup at an earlier stage called local omniscience. Then, the users recover the information of all other users at a later stage called global omniscience. To facilitate ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Structural Information and Dynamical Complexity of Networks

    Publication Year: 2016, Page(s):3290 - 3339
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2531 KB) | HTML iconHTML

    In 1953, Shannon proposed the question of quantification of structural information to analyze communication systems. The question has become one of the longest great challenges in information science and computer science. Here, we propose the first metric for structural information. Given a graph G , we define the K-dimensional structural information of G (or structure entropy of G), denoted by H<... View full abstract»

    Open Access
  • Arbitrarily Tight Bounds on Differential Entropy of Gaussian Mixtures

    Publication Year: 2016, Page(s):3340 - 3354
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1209 KB) | HTML iconHTML

    A sequence of lower and upper bounds is derived on the differential entropy of a Gaussian mixture where the Gaussian components only differ in mean values. As the sequence index increases, the computational complexity of the bounds increases; however, the gap between the lower and upper bounds becomes vanishingly small. We address the applications of these bounds in several communication scenarios... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

IEEE Transactions on Information Theory publishes papers concerned with the transmission, processing, and utilization of information.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Prakash Narayan 

Department of Electrical and Computer Engineering