Improving on the Cutset Bound via a Geometric Analysis of Typical Sets

نویسنده

  • Ayfer Ozgur
چکیده

The cut-set bound developed by Cover and El Gamal in 1979 has since remained the best known upper bound on the capacity of the Gaussian relay channel. We develop a new explicit upper bound on the capacity of the Gaussian primitive relay channel which is tighter than the cut-set bound. Combined with a simple tensorization argument, this result also implies that the current capacity approximations for Gaussian relay networks, which have linear gap to the cut-set bound in the number of nodes, are order-optimal and leads to a lower bound on the pre-constant. Our approach significantly differs from the standard information-theoretic approach for proving upper bounds on the capacity of multi-user channels. We use measure concentration to analyze the probabilistic geometric relations between the typical sets of the n-letter random variables associated with a reliable code, which translate to new entropy inequalities between the random variables involved in the problem. Our approach can be extended to the discrete memoryless relay channel, and in particular, can be used to obtain surprising insights on a long-standing open problem posed by (Cover, 1987), namely, what is the minimum required relay-to-destination communication rate in order for the capacity of the relay channel to be equal to that of the broadcast cut. Biography Ayfer Ozgur is an Assistant Professor in the Information Systems Laboratory at Stanford University since 2012. Before joining Stanford, she was a postdoctoral researcher and a Ph.D. student at EPFL, Switzerland. She received her Ph.D. degree from EPFL in 2009 and B.Sc. and M.Sc. degrees in electrical engineering and physics from Middle East Technical University, Turkey in 2001 and 2004 respectively. From 2001 to 2004, she worked as a hardware design engineer for the Defense Industries Research and Development Institute in Turkey. She received the EPFL Best Ph.D. Thesis Award in 2010 and the NSF CAREER Award in 2013. Her research interests are in wireless and network communication, information and coding theory. ** ALL ARE WELCOME ** Host: Professor Raymond W. Yeung (Tel: 3943-8375, Email: [email protected]) Enquiries: Department of Information Engineering, CUHK (Tel.: 3943-8388)

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Uncertainty analysis of hierarchical granular structures for multi-granulation typical hesitant fuzzy approximation space

Hierarchical structures and uncertainty measures are two main aspects in granular computing, approximate reasoning and cognitive process. Typical hesitant fuzzy sets, as a prime extension of fuzzy sets, are more flexible to reflect the hesitance and ambiguity in knowledge representation and decision making. In this paper, we mainly investigate the hierarchical structures and uncertainty measure...

متن کامل

Some Edge Cut Sets and an Upper bound for Edge Tenacity of Organic Compounds CnH2n+2

The graphs play an important role in our daily life. For example, the urban transport network can be represented by a graph, as the intersections are the vertices and the streets are the edges of the graph. Suppose that some edges of the graph are removed, the question arises, how damaged the graph is. There are some criteria for measuring the vulnerability of graph; the...

متن کامل

BPLS: Cutset-Driven Local Search For MPE and Improved Bounds for Minimal Cutsets in Grids

BPLS: Cutset-Driven Local Search For MPE and Improved Bounds for Minimal Cutsets in Grids by Alon Milchgrub Master of Science in Computer Science The problem of finding an optimum of a multivariate function described as a sum of potentials over (small) subsets of variables is one of fundamental interest both in probabilistic inference and other fields. In this thesis we present a cycle-cutset d...

متن کامل

MAXIMAL INDEPENDENT SETS FOR THE PIXEL EXPANSION OF GRAPH ACCESS STRUCTURE

Given a graph G, a visual cryptography scheme based on the graph G is a method to distribute a secret image among the vertices of G, the participants, so that a subset of participants can recover the secret image if they contain an edge of G, by stacking their shares, otherwise they can obtain no information regarding the secret image. In this paper we apply maximal independent sets of the grap...

متن کامل

Maximal Independent Sets for the Pixel Expansion of Graph Access Structure

 Abstract : A visual cryptography scheme based on a given graph G is a method to distribute a secret image among the vertices of G, the participants, so that a subset of participants can recover the secret image if they contain an edge of G, by stacking their shares, otherwise they can obtain no information regarding the secret image. In this paper a maximal independent sets of the graph G was ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016