Top 10 Arxiv Papers Today in Information Theory


2.041 Mikeys
#1. Error correcting codes from sub-exceeding fonction
Luc Rabefihavanana, Harinaivo Andriatahiny, Toussaint Rabeherimanana
In this paper, we present error-correcting codes which are the results of our research on the sub-exceeding functions. For a short and medium distance data transmission (wifi network, bluetooth, cable, ...), we see that these codes mentioned above present many advantages compared with the Hamming code which is a 1 correcting code.
more | pdf | html
Figures
None.
Tweets
mathITbot: Luc Rabefihavanana, Harinaivo Andriatahiny, Toussaint Rabeherimanana : Error correcting codes from sub-exceeding fonction https://t.co/XpGIY212Tp https://t.co/668PUcEFux
MathPaper: Error correcting codes from sub-exceeding fonction. https://t.co/4In4cTcJr9
Github
None.
Youtube
None.
Other stats
Sample Sizes : None.
Authors: 3
Total Words: 6226
Unqiue Words: 1427

2.01 Mikeys
#2. Information Theoretic Limits for Standard and One-Bit Compressed Sensing with Graph-Structured Sparsity
Adarsh Barik, Jean Honorio
In this paper, we analyze the information theoretic lower bound on the necessary number of samples needed for recovering a sparse signal under different compressed sensing settings. We focus on the weighted graph model, a model-based framework proposed by Hegde et al. (2015), for standard compressed sensing as well as for one-bit compressed sensing. We study both the noisy and noiseless regimes. Our analysis is general in the sense that it applies to any algorithm used to recover the signal. We carefully construct restricted ensembles for different settings and then apply Fano's inequality to establish the lower bound on the necessary number of samples. Furthermore, we show that our bound is tight for one-bit compressed sensing, while for standard compressed sensing, our bound is tight up to a logarithmic factor of the number of non-zero entries in the signal.
more | pdf | html
Figures
Tweets
mathITbot: Adarsh Barik, Jean Honorio : Information Theoretic Limits for Standard and One-Bit Compressed Sensing with Graph-Structured Sparsity https://t.co/jPkqP9iUUX https://t.co/cQZsasUEwS
Github
None.
Youtube
None.
Other stats
Sample Sizes : None.
Authors: 2
Total Words: 9267
Unqiue Words: 1808

1.998 Mikeys
#3. MIMO Beampattern and Waveform Design with Low Resolution DACs
Amine Mezghani, Robert W. Heath
Digital beamforming and waveform generation techniques in MIMO radar offer enormous advantages in terms of flexibility and performance compared to conventional radar systems based on analog implementations. To allow for such fully digital design with an efficient hardware complexity, we consider the use of low resolution analog-to-digital converters (DACs) while maintaining a separate radio-frequency chain per antenna. A sum of squared residuals (SSR) formulation for the beampattern and spectral shaping problem is solved based on the Generalized Approximate Message Passing (GAMP) algorithm. Numerical results demonstrate good performance in terms of spectral shaping as well as cross-correlation properties of the different probing waveforms even with just 2-bit resolution per antenna.
more | pdf | html
Figures
Tweets
mathITbot: Amine Mezghani, Robert W. Heath : MIMO Beampattern and Waveform Design with Low Resolution DACs https://t.co/wjpkR6M1j9 https://t.co/SxyzUzOpSo
ComputerPapers: MIMO Beampattern and Waveform Design with Low Resolution DACs. https://t.co/5zhLk5LOWO
Github
None.
Youtube
None.
Other stats
Sample Sizes : None.
Authors: 2
Total Words: 4083
Unqiue Words: 1508

1.998 Mikeys
#4. Fundamental Limits of Caching in Heterogeneous Networks with Uncoded Prefetching
Emanuele Parrinello, Ayse Unsal, Petros Elia
The work explores the fundamental limits of coded caching in heterogeneous networks where multiple ($N_0$) senders/antennas, serve different users which are associated (linked) to shared caches, where each such cache helps an arbitrary number of users. Under the assumption of uncoded cache placement, the work derives the exact optimal worst-case delay and DoF, for a broad range of user-to-cache association profiles where each such profile describes how many users are helped by each cache. This is achieved by presenting an information-theoretic converse based on index coding that succinctly captures the impact of the user-to-cache association, as well as by presenting a coded caching scheme that optimally adapts to the association profile by exploiting the benefits of encoding across users that share the same cache. The work reveals a powerful interplay between shared caches and multiple senders/antennas, where we can now draw the striking conclusion that, as long as each cache serves at least $N_0$ users, adding a single degree...
more | pdf | html
Figures
Tweets
mathITbot: Emanuele Parrinello, Ayse Unsal, Petros Elia : Fundamental Limits of Caching in Heterogeneous Networks with Uncoded Prefetching https://t.co/UprEDy3dt1 https://t.co/Y8GeD2MOyX
MathPaper: Fundamental Limits of Caching in Heterogeneous Networks with Uncoded Prefetching. https://t.co/opayQYfl2S
Github
None.
Youtube
None.
Other stats
Sample Sizes : None.
Authors: 3
Total Words: 13727
Unqiue Words: 2833

1.998 Mikeys
#5. Adaptive Full-Duplex Jamming Receiver for Secure D2D Links in Random Networks
Hui-Ming Wang, Bing-Qing Zhao, Tong-Xing Zheng
Device-to-device (D2D) communication raises new transmission secrecy protection challenges, since conventional physical layer security approaches, such as multiple antennas and cooperation techniques, are invalid due to its resource/size constraints. The full-duplex (FD) jamming receiver, which radiates jamming signals to confuse eavesdroppers when receiving the desired signal simultaneously, is a promising candidate. Unlike existing endeavors that assume the FD jamming receiver always improves the secrecy performance compared with the half-duplex (HD) receiver, we show that this assumption highly depends on the instantaneous residual self-interference cancellation level and may be invalid. We propose an adaptive jamming receiver operating in a switched FD/HD mode for a D2D link in random networks. Subject to the secrecy outage probability constraint, we optimize the transceiver parameters, such as signal/jamming powers, secrecy rates and mode switch criteria, to maximize the secrecy throughput. Most of the optimization operations...
more | pdf | html
Figures
Tweets
mathITbot: Hui-Ming Wang, Bing-Qing Zhao, Tong-Xing Zheng : Adaptive Full-Duplex Jamming Receiver for Secure D2D Links in Random Networks https://t.co/pgZKkJ7rLX https://t.co/Corp45HQw6
Github
None.
Youtube
None.
Other stats
Sample Sizes : None.
Authors: 3
Total Words: 12117
Unqiue Words: 2482

1.998 Mikeys
#6. Learning to Bound the Multi-class Bayes Error
Salimeh Yasaei Sekeh, Brandon Oselio, Alfred O. Hero
In the context of supervised learning, meta learning uses features, metadata and other information to learn about the difficulty, behavior, or composition of the problem. Using this knowledge can be useful to contextualize classifier results or allow for targeted decisions about future data sampling. In this paper, we are specifically interested in learning the Bayes error rate (BER) based on a labeled data sample. Providing a tight bound on the BER that is also feasible to estimate has been a challenge. Previous work [1] has shown that a pairwise bound based on the sum of Henze-Penrose (HP) divergence over label pairs can be directly estimated using a sum of Friedman-Rafsky (FR) multivariate run test statistics. However, in situations in which the dataset and number of classes are large, this bound is computationally infeasible to calculate and may not be tight. Other multi-class bounds also suffer from computationally complex estimation procedures. In this paper, we present a generalized HP divergence measure that allows us to...
more | pdf | html
Figures
Tweets
arxiv_org: Learning to Bound the Multi-class Bayes Error. https://t.co/8dg7QyTUEP https://t.co/UbyRtNXwva
BrundageBot: Learning to Bound the Multi-class Bayes Error. Salimeh Yasaei Sekeh, Brandon Oselio, and Alfred O. Hero https://t.co/0Yeg223nji
arxivml: "Learning to Bound the Multi-class Bayes Error", Salimeh Yasaei Sekeh, Brandon Oselio, Alfred O. Hero https://t.co/wJ50bEzmkS
nmfeeds: [O] https://t.co/bVgqVCXHKC Learning to Bound the Multi-class Bayes Error. In the context of supervised learning, meta lea...
mathITbot: Salimeh Yasaei Sekeh, Brandon Oselio, Alfred O. Hero : Learning to Bound the Multi-class Bayes Error https://t.co/W9ERB7nq0R https://t.co/3bdEcZO0bi
MathPaper: Learning to Bound the Multi-class Bayes Error. https://t.co/Rv8OcKTVZF
Github
None.
Youtube
None.
Other stats
Sample Sizes : None.
Authors: 3
Total Words: 10521
Unqiue Words: 2252

1.998 Mikeys
#7. Effects of Beamforming and Antenna Configurations on Mobility in 5G NR
Edgar Ramos, Antonino Orsino
The future 5G systems are getting closer to be a reality. It is envisioned, indeed, that the roll-out of first 5G network will happen around end of 2018 and beginning of 2019. However, there are still a number of issues and problems that have to be faces and new solutions and methods are needed to solve them. Along these lines, the effects that beamforming and antenna configurations may have on the mobility in 5G New Radio (NR) is still unclear. In fact, with the use of directive antennas and high frequencies (e.g., above 10 GHz), in order to meet the stringent requirements of 5G (e.g., support of 500km/h) it is crucial to understand how the envisioned 5G NR antenna configurations may impact mobility (and thus handovers). In this article, first we will briefly survey mobility enhancements and solution currently under discussion in 3GPP Release 15. In particular, we focus our analysis on the physical layer signals involved in the measurement reporting and the new radio measurement model used in 5G NR to filter the multiple beams...
more | pdf | html
Figures
Tweets
mathITbot: Edgar Ramos, Antonino Orsino : Effects of Beamforming and Antenna Configurations on Mobility in 5G NR https://t.co/bQ3Fw5HNws https://t.co/IywDCYrgre
MathPaper: Effects of Beamforming and Antenna Configurations on Mobility in 5G NR. https://t.co/V1njaArDlz
Github
None.
Youtube
None.
Other stats
Sample Sizes : None.
Authors: 2
Total Words: 4090
Unqiue Words: 1320

1.998 Mikeys
#8. On the Robustness of Information-Theoretic Privacy Measures and Mechanisms
Mario Diaz, Hao Wang, Flavio P. Calmon, Lalitha Sankar
Consider a data publishing setting for a dataset composed of non-private features correlated with a set of private features not necessarily present in the dataset. The objective of the publisher is to maximize the amount of information about the non-private features in a revealed dataset (utility), while keeping the information leaked about the private attributes bounded (privacy). Here, both privacy and utility are measured using information leakage measures that arise in adversarial settings. We consider a practical setting wherein the publisher uses an estimate of the joint distribution of the features to design the privacy mechanism. For any privacy mechanism, we provide probabilistic upper bounds for the discrepancy between the privacy guarantees for the empirical and true distributions, and similarly for utility. These bounds follow from our main technical results regarding the Lipschitz continuity of the considered information leakage measures. We also establish the statistical consistency of the notion of optimal privacy...
more | pdf | html
Figures
None.
Tweets
mathITbot: Mario Diaz, Hao Wang, Flavio P. Calmon, Lalitha Sankar : On the Robustness of Information-Theoretic Privacy Measures and Mechanisms https://t.co/hLcNwQ6int https://t.co/pfipkr3dlV
MathPaper: On the Robustness of Information-Theoretic Privacy Measures and Mechanisms. https://t.co/xPg7DMWiKh
Github
None.
Youtube
None.
Other stats
Sample Sizes : None.
Authors: 4
Total Words: 23220
Unqiue Words: 3818

1.998 Mikeys
#9. The case for shifting the Renyi Entropy
Francisco José Valverde-Albacete, Carmen Peláez-Moreno
We introduce a variant of the R\'enyi entropy definition that aligns it with the well-known H\"older mean: in the new formulation, the r-th order R\'enyi Entropy is the logarithm of the inverse of the r-th order H\"older mean. This brings about new insights into the relationship of the R\'enyi entropy to quantities close to it, like the information potential and the partition function of statistical mechanics. We also provide expressions that allow us to calculate the R\'enyi entropies from the Shannon cross-entropy and the escort probabilities. Finally, we discuss why shifting the R\'enyi entropy is fruitful in some applications.
more | pdf | html
Figures
Tweets
mathITbot: Francisco José Valverde-Albacete, Carmen Peláez-Moreno : The case for shifting the Renyi Entropy https://t.co/edRsCLefa4 https://t.co/RQZsB4Grop
MathPaper: The case for shifting the Renyi Entropy. https://t.co/sweCKrqjAf
EvanWebbStuart: RT @MathPaper: The case for shifting the Renyi Entropy. https://t.co/sweCKrqjAf
Github
None.
Youtube
None.
Other stats
Sample Sizes : None.
Authors: 2
Total Words: 10164
Unqiue Words: 2161

1.998 Mikeys
#10. Oversampled Adaptive Sensing with Random Projections: Analysis and Algorithmic Approaches
Ralf R. Müller, Ali Bereyhi, Christoph F. Mecklenbräuker
Oversampled adaptive sensing (OAS) is a recently proposed Bayesian framework which sequentially adapts the sensing basis. In OAS, estimation quality is, in each step, measured by conditional mean squared errors (MSEs), and the basis for the next sensing step is adapted accordingly. For given average sensing time, OAS reduces the MSE compared to non-adaptive schemes, when the signal is sparse. This paper studies the asymptotic performance of Bayesian OAS, for unitarily invariant random projections. For sparse signals, it is shown that OAS with Bayesian recovery and hard adaptation significantly outperforms the minimum MSE bound for non-adaptive sensing. To address implementational aspects, two computationally tractable algorithms are proposed, and their performances are compared against the state-of-the-art non-adaptive algorithms via numerical simulations. Investigations depict that these low-complexity OAS algorithms, despite their suboptimality, outperform well-known non-adaptive schemes for sparse recovery, such as LASSO, with...
more | pdf | html
Figures
None.
Tweets
mathITbot: Ralf R. Müller, Ali Bereyhi, Christoph F. Mecklenbräuker : Oversampled Adaptive Sensing with Random Projections: Analysis and Algorithmic Approaches https://t.co/Icjxbkqb9d https://t.co/jl9dof91ME
MathPaper: Oversampled Adaptive Sensing with Random Projections: Analysis and Algorithmic Approaches. https://t.co/FhVitpoLuR
Github
None.
Youtube
None.
Other stats
Sample Sizes : None.
Authors: 3
Total Words: 4927
Unqiue Words: 1362

About

Assert is a website where the best academic papers on arXiv (computer science, math, physics), bioRxiv (biology), BITSS (reproducibility), EarthArXiv (earth science), engrXiv (engineering), LawArXiv (law), PsyArXiv (psychology), SocArXiv (social science), and SportRxiv (sport research) bubble to the top each day.

Papers are scored (in real-time) based on how verifiable they are (as determined by their Github repos) and how interesting they are (based on Twitter).

To see top papers, follow us on twitter @assertpub_ (arXiv), @assert_pub (bioRxiv), and @assertpub_dev (everything else).

To see beautiful figures extracted from papers, follow us on Instagram.

Tracking 58,338 papers.

Search
Sort results based on if they are interesting or reproducible.
Interesting
Reproducible
Categories
All
Astrophysics
Cosmology and Nongalactic Astrophysics
Earth and Planetary Astrophysics
Astrophysics of Galaxies
High Energy Astrophysical Phenomena
Instrumentation and Methods for Astrophysics
Solar and Stellar Astrophysics
Condensed Matter
Disordered Systems and Neural Networks
Mesoscale and Nanoscale Physics
Materials Science
Other Condensed Matter
Quantum Gases
Soft Condensed Matter
Statistical Mechanics
Strongly Correlated Electrons
Superconductivity
Computer Science
Artificial Intelligence
Hardware Architecture
Computational Complexity
Computational Engineering, Finance, and Science
Computational Geometry
Computation and Language
Cryptography and Security
Computer Vision and Pattern Recognition
Computers and Society
Databases
Distributed, Parallel, and Cluster Computing
Digital Libraries
Discrete Mathematics
Data Structures and Algorithms
Emerging Technologies
Formal Languages and Automata Theory
General Literature
Graphics
Computer Science and Game Theory
Human-Computer Interaction
Information Retrieval
Information Theory
Machine Learning
Logic in Computer Science
Multiagent Systems
Multimedia
Mathematical Software
Numerical Analysis
Neural and Evolutionary Computing
Networking and Internet Architecture
Other Computer Science
Operating Systems
Performance
Programming Languages
Robotics
Symbolic Computation
Sound
Software Engineering
Social and Information Networks
Systems and Control
Economics
Econometrics
General Economics
Theoretical Economics
Electrical Engineering and Systems Science
Audio and Speech Processing
Image and Video Processing
Signal Processing
General Relativity and Quantum Cosmology
General Relativity and Quantum Cosmology
High Energy Physics - Experiment
High Energy Physics - Experiment
High Energy Physics - Lattice
High Energy Physics - Lattice
High Energy Physics - Phenomenology
High Energy Physics - Phenomenology
High Energy Physics - Theory
High Energy Physics - Theory
Mathematics
Commutative Algebra
Algebraic Geometry
Analysis of PDEs
Algebraic Topology
Classical Analysis and ODEs
Combinatorics
Category Theory
Complex Variables
Differential Geometry
Dynamical Systems
Functional Analysis
General Mathematics
General Topology
Group Theory
Geometric Topology
History and Overview
Information Theory
K-Theory and Homology
Logic
Metric Geometry
Mathematical Physics
Numerical Analysis
Number Theory
Operator Algebras
Optimization and Control
Probability
Quantum Algebra
Rings and Algebras
Representation Theory
Symplectic Geometry
Spectral Theory
Statistics Theory
Mathematical Physics
Mathematical Physics
Nonlinear Sciences
Adaptation and Self-Organizing Systems
Chaotic Dynamics
Cellular Automata and Lattice Gases
Pattern Formation and Solitons
Exactly Solvable and Integrable Systems
Nuclear Experiment
Nuclear Experiment
Nuclear Theory
Nuclear Theory
Physics
Accelerator Physics
Atmospheric and Oceanic Physics
Applied Physics
Atomic and Molecular Clusters
Atomic Physics
Biological Physics
Chemical Physics
Classical Physics
Computational Physics
Data Analysis, Statistics and Probability
Physics Education
Fluid Dynamics
General Physics
Geophysics
History and Philosophy of Physics
Instrumentation and Detectors
Medical Physics
Optics
Plasma Physics
Popular Physics
Physics and Society
Space Physics
Quantitative Biology
Biomolecules
Cell Behavior
Genomics
Molecular Networks
Neurons and Cognition
Other Quantitative Biology
Populations and Evolution
Quantitative Methods
Subcellular Processes
Tissues and Organs
Quantitative Finance
Computational Finance
Economics
General Finance
Mathematical Finance
Portfolio Management
Pricing of Securities
Risk Management
Statistical Finance
Trading and Market Microstructure
Quantum Physics
Quantum Physics
Statistics
Applications
Computation
Methodology
Machine Learning
Other Statistics
Statistics Theory
Feedback
Online
Stats
Tracking 58,338 papers.