### Top 10 Arxiv Papers Today in Information Theory

##### #1. Error correcting codes from sub-exceeding fonction
###### Luc Rabefihavanana, Harinaivo Andriatahiny, Toussaint Rabeherimanana
In this paper, we present error-correcting codes which are the results of our research on the sub-exceeding functions. For a short and medium distance data transmission (wifi network, bluetooth, cable, ...), we see that these codes mentioned above present many advantages compared with the Hamming code which is a 1 correcting code.
more | pdf | html
None.
###### Tweets
mathITbot: Luc Rabefihavanana, Harinaivo Andriatahiny, Toussaint Rabeherimanana : Error correcting codes from sub-exceeding fonction https://t.co/XpGIY212Tp https://t.co/668PUcEFux
MathPaper: Error correcting codes from sub-exceeding fonction. https://t.co/4In4cTcJr9
None.
None.
###### Other stats
Sample Sizes : None.
Authors: 3
Total Words: 6226
Unqiue Words: 1427

##### #2. Information Theoretic Limits for Standard and One-Bit Compressed Sensing with Graph-Structured Sparsity
###### Adarsh Barik, Jean Honorio
In this paper, we analyze the information theoretic lower bound on the necessary number of samples needed for recovering a sparse signal under different compressed sensing settings. We focus on the weighted graph model, a model-based framework proposed by Hegde et al. (2015), for standard compressed sensing as well as for one-bit compressed sensing. We study both the noisy and noiseless regimes. Our analysis is general in the sense that it applies to any algorithm used to recover the signal. We carefully construct restricted ensembles for different settings and then apply Fano's inequality to establish the lower bound on the necessary number of samples. Furthermore, we show that our bound is tight for one-bit compressed sensing, while for standard compressed sensing, our bound is tight up to a logarithmic factor of the number of non-zero entries in the signal.
more | pdf | html
###### Tweets
mathITbot: Adarsh Barik, Jean Honorio : Information Theoretic Limits for Standard and One-Bit Compressed Sensing with Graph-Structured Sparsity https://t.co/jPkqP9iUUX https://t.co/cQZsasUEwS
None.
None.
###### Other stats
Sample Sizes : None.
Authors: 2
Total Words: 9267
Unqiue Words: 1808

##### #3. MIMO Beampattern and Waveform Design with Low Resolution DACs
###### Amine Mezghani, Robert W. Heath
Digital beamforming and waveform generation techniques in MIMO radar offer enormous advantages in terms of flexibility and performance compared to conventional radar systems based on analog implementations. To allow for such fully digital design with an efficient hardware complexity, we consider the use of low resolution analog-to-digital converters (DACs) while maintaining a separate radio-frequency chain per antenna. A sum of squared residuals (SSR) formulation for the beampattern and spectral shaping problem is solved based on the Generalized Approximate Message Passing (GAMP) algorithm. Numerical results demonstrate good performance in terms of spectral shaping as well as cross-correlation properties of the different probing waveforms even with just 2-bit resolution per antenna.
more | pdf | html
###### Tweets
mathITbot: Amine Mezghani, Robert W. Heath : MIMO Beampattern and Waveform Design with Low Resolution DACs https://t.co/wjpkR6M1j9 https://t.co/SxyzUzOpSo
ComputerPapers: MIMO Beampattern and Waveform Design with Low Resolution DACs. https://t.co/5zhLk5LOWO
None.
None.
###### Other stats
Sample Sizes : None.
Authors: 2
Total Words: 4083
Unqiue Words: 1508

##### #4. Fundamental Limits of Caching in Heterogeneous Networks with Uncoded Prefetching
###### Emanuele Parrinello, Ayse Unsal, Petros Elia
The work explores the fundamental limits of coded caching in heterogeneous networks where multiple ($N_0$) senders/antennas, serve different users which are associated (linked) to shared caches, where each such cache helps an arbitrary number of users. Under the assumption of uncoded cache placement, the work derives the exact optimal worst-case delay and DoF, for a broad range of user-to-cache association profiles where each such profile describes how many users are helped by each cache. This is achieved by presenting an information-theoretic converse based on index coding that succinctly captures the impact of the user-to-cache association, as well as by presenting a coded caching scheme that optimally adapts to the association profile by exploiting the benefits of encoding across users that share the same cache. The work reveals a powerful interplay between shared caches and multiple senders/antennas, where we can now draw the striking conclusion that, as long as each cache serves at least $N_0$ users, adding a single degree...
more | pdf | html
###### Tweets
mathITbot: Emanuele Parrinello, Ayse Unsal, Petros Elia : Fundamental Limits of Caching in Heterogeneous Networks with Uncoded Prefetching https://t.co/UprEDy3dt1 https://t.co/Y8GeD2MOyX
MathPaper: Fundamental Limits of Caching in Heterogeneous Networks with Uncoded Prefetching. https://t.co/opayQYfl2S
None.
None.
###### Other stats
Sample Sizes : None.
Authors: 3
Total Words: 13727
Unqiue Words: 2833

##### #5. Adaptive Full-Duplex Jamming Receiver for Secure D2D Links in Random Networks
###### Hui-Ming Wang, Bing-Qing Zhao, Tong-Xing Zheng
Device-to-device (D2D) communication raises new transmission secrecy protection challenges, since conventional physical layer security approaches, such as multiple antennas and cooperation techniques, are invalid due to its resource/size constraints. The full-duplex (FD) jamming receiver, which radiates jamming signals to confuse eavesdroppers when receiving the desired signal simultaneously, is a promising candidate. Unlike existing endeavors that assume the FD jamming receiver always improves the secrecy performance compared with the half-duplex (HD) receiver, we show that this assumption highly depends on the instantaneous residual self-interference cancellation level and may be invalid. We propose an adaptive jamming receiver operating in a switched FD/HD mode for a D2D link in random networks. Subject to the secrecy outage probability constraint, we optimize the transceiver parameters, such as signal/jamming powers, secrecy rates and mode switch criteria, to maximize the secrecy throughput. Most of the optimization operations...
more | pdf | html
###### Tweets
mathITbot: Hui-Ming Wang, Bing-Qing Zhao, Tong-Xing Zheng : Adaptive Full-Duplex Jamming Receiver for Secure D2D Links in Random Networks https://t.co/pgZKkJ7rLX https://t.co/Corp45HQw6
None.
None.
###### Other stats
Sample Sizes : None.
Authors: 3
Total Words: 12117
Unqiue Words: 2482

##### #6. Learning to Bound the Multi-class Bayes Error
###### Salimeh Yasaei Sekeh, Brandon Oselio, Alfred O. Hero
In the context of supervised learning, meta learning uses features, metadata and other information to learn about the difficulty, behavior, or composition of the problem. Using this knowledge can be useful to contextualize classifier results or allow for targeted decisions about future data sampling. In this paper, we are specifically interested in learning the Bayes error rate (BER) based on a labeled data sample. Providing a tight bound on the BER that is also feasible to estimate has been a challenge. Previous work [1] has shown that a pairwise bound based on the sum of Henze-Penrose (HP) divergence over label pairs can be directly estimated using a sum of Friedman-Rafsky (FR) multivariate run test statistics. However, in situations in which the dataset and number of classes are large, this bound is computationally infeasible to calculate and may not be tight. Other multi-class bounds also suffer from computationally complex estimation procedures. In this paper, we present a generalized HP divergence measure that allows us to...
more | pdf | html
###### Tweets
arxiv_org: Learning to Bound the Multi-class Bayes Error. https://t.co/8dg7QyTUEP https://t.co/UbyRtNXwva
BrundageBot: Learning to Bound the Multi-class Bayes Error. Salimeh Yasaei Sekeh, Brandon Oselio, and Alfred O. Hero https://t.co/0Yeg223nji
arxivml: "Learning to Bound the Multi-class Bayes Error", Salimeh Yasaei Sekeh, Brandon Oselio, Alfred O． Hero https://t.co/wJ50bEzmkS
nmfeeds: [O] https://t.co/bVgqVCXHKC Learning to Bound the Multi-class Bayes Error. In the context of supervised learning, meta lea...
mathITbot: Salimeh Yasaei Sekeh, Brandon Oselio, Alfred O. Hero : Learning to Bound the Multi-class Bayes Error https://t.co/W9ERB7nq0R https://t.co/3bdEcZO0bi
MathPaper: Learning to Bound the Multi-class Bayes Error. https://t.co/Rv8OcKTVZF
None.
None.
###### Other stats
Sample Sizes : None.
Authors: 3
Total Words: 10521
Unqiue Words: 2252

##### #7. Effects of Beamforming and Antenna Configurations on Mobility in 5G NR
###### Edgar Ramos, Antonino Orsino
The future 5G systems are getting closer to be a reality. It is envisioned, indeed, that the roll-out of first 5G network will happen around end of 2018 and beginning of 2019. However, there are still a number of issues and problems that have to be faces and new solutions and methods are needed to solve them. Along these lines, the effects that beamforming and antenna configurations may have on the mobility in 5G New Radio (NR) is still unclear. In fact, with the use of directive antennas and high frequencies (e.g., above 10 GHz), in order to meet the stringent requirements of 5G (e.g., support of 500km/h) it is crucial to understand how the envisioned 5G NR antenna configurations may impact mobility (and thus handovers). In this article, first we will briefly survey mobility enhancements and solution currently under discussion in 3GPP Release 15. In particular, we focus our analysis on the physical layer signals involved in the measurement reporting and the new radio measurement model used in 5G NR to filter the multiple beams...
more | pdf | html
###### Tweets
mathITbot: Edgar Ramos, Antonino Orsino : Effects of Beamforming and Antenna Configurations on Mobility in 5G NR https://t.co/bQ3Fw5HNws https://t.co/IywDCYrgre
MathPaper: Effects of Beamforming and Antenna Configurations on Mobility in 5G NR. https://t.co/V1njaArDlz
None.
None.
###### Other stats
Sample Sizes : None.
Authors: 2
Total Words: 4090
Unqiue Words: 1320

##### #8. On the Robustness of Information-Theoretic Privacy Measures and Mechanisms
###### Mario Diaz, Hao Wang, Flavio P. Calmon, Lalitha Sankar
Consider a data publishing setting for a dataset composed of non-private features correlated with a set of private features not necessarily present in the dataset. The objective of the publisher is to maximize the amount of information about the non-private features in a revealed dataset (utility), while keeping the information leaked about the private attributes bounded (privacy). Here, both privacy and utility are measured using information leakage measures that arise in adversarial settings. We consider a practical setting wherein the publisher uses an estimate of the joint distribution of the features to design the privacy mechanism. For any privacy mechanism, we provide probabilistic upper bounds for the discrepancy between the privacy guarantees for the empirical and true distributions, and similarly for utility. These bounds follow from our main technical results regarding the Lipschitz continuity of the considered information leakage measures. We also establish the statistical consistency of the notion of optimal privacy...
more | pdf | html
None.
###### Tweets
mathITbot: Mario Diaz, Hao Wang, Flavio P. Calmon, Lalitha Sankar : On the Robustness of Information-Theoretic Privacy Measures and Mechanisms https://t.co/hLcNwQ6int https://t.co/pfipkr3dlV
MathPaper: On the Robustness of Information-Theoretic Privacy Measures and Mechanisms. https://t.co/xPg7DMWiKh
None.
None.
###### Other stats
Sample Sizes : None.
Authors: 4
Total Words: 23220
Unqiue Words: 3818

##### #9. The case for shifting the Renyi Entropy
###### Francisco José Valverde-Albacete, Carmen Peláez-Moreno
We introduce a variant of the R\'enyi entropy definition that aligns it with the well-known H\"older mean: in the new formulation, the r-th order R\'enyi Entropy is the logarithm of the inverse of the r-th order H\"older mean. This brings about new insights into the relationship of the R\'enyi entropy to quantities close to it, like the information potential and the partition function of statistical mechanics. We also provide expressions that allow us to calculate the R\'enyi entropies from the Shannon cross-entropy and the escort probabilities. Finally, we discuss why shifting the R\'enyi entropy is fruitful in some applications.
more | pdf | html
###### Tweets
mathITbot: Francisco José Valverde-Albacete, Carmen Peláez-Moreno : The case for shifting the Renyi Entropy https://t.co/edRsCLefa4 https://t.co/RQZsB4Grop
MathPaper: The case for shifting the Renyi Entropy. https://t.co/sweCKrqjAf
EvanWebbStuart: RT @MathPaper: The case for shifting the Renyi Entropy. https://t.co/sweCKrqjAf
None.
None.
###### Other stats
Sample Sizes : None.
Authors: 2
Total Words: 10164
Unqiue Words: 2161

##### #10. Oversampled Adaptive Sensing with Random Projections: Analysis and Algorithmic Approaches
###### Ralf R. Müller, Ali Bereyhi, Christoph F. Mecklenbräuker
Oversampled adaptive sensing (OAS) is a recently proposed Bayesian framework which sequentially adapts the sensing basis. In OAS, estimation quality is, in each step, measured by conditional mean squared errors (MSEs), and the basis for the next sensing step is adapted accordingly. For given average sensing time, OAS reduces the MSE compared to non-adaptive schemes, when the signal is sparse. This paper studies the asymptotic performance of Bayesian OAS, for unitarily invariant random projections. For sparse signals, it is shown that OAS with Bayesian recovery and hard adaptation significantly outperforms the minimum MSE bound for non-adaptive sensing. To address implementational aspects, two computationally tractable algorithms are proposed, and their performances are compared against the state-of-the-art non-adaptive algorithms via numerical simulations. Investigations depict that these low-complexity OAS algorithms, despite their suboptimality, outperform well-known non-adaptive schemes for sparse recovery, such as LASSO, with...
more | pdf | html
None.
###### Tweets
mathITbot: Ralf R. Müller, Ali Bereyhi, Christoph F. Mecklenbräuker : Oversampled Adaptive Sensing with Random Projections: Analysis and Algorithmic Approaches https://t.co/Icjxbkqb9d https://t.co/jl9dof91ME
MathPaper: Oversampled Adaptive Sensing with Random Projections: Analysis and Algorithmic Approaches. https://t.co/FhVitpoLuR
None.
None.
###### Other stats
Sample Sizes : None.
Authors: 3
Total Words: 4927
Unqiue Words: 1362

Assert is a website where the best academic papers on arXiv (computer science, math, physics), bioRxiv (biology), BITSS (reproducibility), EarthArXiv (earth science), engrXiv (engineering), LawArXiv (law), PsyArXiv (psychology), SocArXiv (social science), and SportRxiv (sport research) bubble to the top each day.

Papers are scored (in real-time) based on how verifiable they are (as determined by their Github repos) and how interesting they are (based on Twitter).

To see top papers, follow us on twitter @assertpub_ (arXiv), @assert_pub (bioRxiv), and @assertpub_dev (everything else).

To see beautiful figures extracted from papers, follow us on Instagram.

Tracking 58,338 papers.

###### Search
Sort results based on if they are interesting or reproducible.
Interesting
Reproducible
Online
###### Stats
Tracking 58,338 papers.