Timing Channel: Achievable Rate in the Finite Block-Length Regime
نویسندگان
چکیده
• Symbols denoting random variables are capitalized but symbols denoting their realization are not. • Bold face is used for vectors. • Blackboard bold or non-italic face are used for sets, calligraphic face for system of sets. • We use x̄ as a shorthand for the difference 1 − x for x ∈ [0, 1]. • Z is the set of all integers and Z+ = {z ∈ Z : z ≥ 0}. • 2 is the set {0, 1}. • [n] denotes the set {z ∈ Z : 1 ≤ z ≤ n}. • Given the input and output sets X and Y a channel is a function PY n|Xn(·|·) : A × X → [0, 1] such that for each x ∈ X PY n|Xn(·|x) is a probability measure on A. A is some σ-algebra over Y. • We define the finite sets X and Y to be Z+ × 2n−1 and 2, repectively, and associate the σ-algebras P(Xn) and P(Yn) with them. P indicates the power set. • Given a distribution PXn on X we define the distribution PY n = ∫ X PY n|Xn(y |x)PXn(dX) and the function i(x,y) = log PY n|Xn (y |x) PY n (y) for x ∈ X and y ∈ Y. This function is called the information density. • The expected value of a random variable X is denoted by E[X ]. • The mutual information between two random vectors X and Y n is E[i(x,y)]. • The capacity C(λ) of the channel is supPXn E[i(x ,y)] where PXn is such that the rate E[ ∑n−1 i=1 Xi]/(n−1) does not exceed λ. • The binary entropy function H(p) = −p log p− p̄ log p̄. • We drop subscripts whenever they are clear from the context. For example PY n|Xn(y|x) = P (yn|xn).
منابع مشابه
Diversity versus Channel Knowledge at Finite Block- Length Citation
We study the maximal achievable rate R∗(n, ) for a given block-length n and block error probability over Rayleigh block-fading channels in the noncoherent setting and in the finite block-length regime. Our results show that for a given blocklength and error probability, R∗(n, ) is not monotonic in the channel’s coherence time, but there exists a rate maximizing coherence time that optimally tra...
متن کاملPower Allocation Strategies in Block-Fading Two-Way Relay Networks
This paper aims at investigating the superiority of power allocation strategies, based on calculus of variations in a point-to-point two-way relay-assisted channel incorporating the amplify and forward strategy. Single and multilayer coding strategies for two cases of having and not having the channel state information (CSI) at the transmitters are studied, respectively. Using the notion of cal...
متن کاملAchievable Secrecy Rate Regions of State Dependent Causal Cognitive Interference Channel
In this paper, the secrecy problem in the state dependent causal cognitive interference channel is studied. The channel state is non-causally known at the cognitive encoder. The message of the cognitive encoder must be kept secret from the primary receiver. We use a coding scheme which is a combination of compress-and-forward strategy with Marton coding, Gel’fand-Pinsker coding and Wyner’s wire...
متن کاملThe Approximate Capacity Region of the Gaussian Z-Interference Channel with Conferencing Encoders
A two-user Gaussian Z-Interference Channel (GZIC) is considered, in which encoders are connected through noiseless links with finite capacities. In this setting, prior to each transmission block the encoders communicate with each other over the cooperative links. The capacity region and the sum-capacity of the channel are characterized within 1.71 bits per user and 2 bits in total, respectively...
متن کاملSpike timing dependent plasticity: mechanisms, significance, and controversies
Long-term modification of synaptic strength is one of the basic mechanisms of memory formation and activity-dependent refinement of neural circuits. This idea was purposed by Hebb to provide a basis for the formation of a cell assembly. Repetitive correlated activity of pre-synaptic and post-synaptic neurons can induce long-lasting synaptic strength modification, the direction and extent of whi...
متن کاملOn the Achievable Rate-Regions for the Gaussian Two-way Diamond Channels
In this channel,we study rate region of a Gaussian two-way diamond channel which operates in half-duplex mode. In this channel, two transceiver (TR) nodes exchange their messages with the help of two relay nodes. We consider a special case of the Gaussian two-way diamond channels which is called Compute-and-Forward Multiple Access Channel (CF-MAC). In the CF-MAC, the TR nodes transmit their mes...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- CoRR
دوره abs/1605.07905 شماره
صفحات -
تاریخ انتشار 2016