18 results on '"Wesel, Richard D."'
Search Results
2. Design, Performance, and Complexity of CRC-Aided List Decoding of Convolutional and Polar Codes for Short Messages
- Author
-
King, Jacob, Yao, Hanwen, Ryan, William, and Wesel, Richard D.
- Subjects
FOS: Computer and information sciences ,Computer Science - Information Theory ,Information Theory (cs.IT) - Abstract
Motivated by the need to communicate short control messages in 5G and beyond, this paper carefully designs codes for cyclic redundancy check (CRC)-aided list decoding of tail-biting convolutional codes (TBCCs) and polar codes. Both codes send a 32-bit message using an 11-bit CRC and 512 transmitted bits. We aim to provide a careful, fair comparison of the error performance and decoding complexity of polar and TBCC techniques for a specific case. Specifically, a TBCC is designed to match the rate of a (512, 43) polar code, and optimal 11-bit CRCs for both codes are designed. The paper examines the distance spectra of the polar and TBCC codes, illuminating the different distance structures for the two code types. We consider both adaptive and non-adaptive CRC-aided list decoding schemes. For polar codes, an adaptive decoder must start with a larger list size to avoid an error floor. For rate-32/512 codes with an 11-bit CRC, the optimized CRC-TBCC design achieves a lower total failure rate than the optimized CRC-polar design. Simulations showed that the optimized CRC-TBCC design achieved significantly higher throughput than the optimized CRC-polar design, so that the TBCC solution achieved a lower total failure rate while requiring less computational complexity., Comment: First revision submitted to IEEE Transactions on Communications
- Published
- 2023
- Full Text
- View/download PDF
3. On CRC-Aided, Dual-Trellis, List Decoding for High-Rate Convolutional Codes with Short Blocklengths
- Author
-
Sui, Wenhui, Towell, Brendan, Asmani, Ava, Yang, Hengjie, and Wesel, Richard D.
- Subjects
FOS: Computer and information sciences ,Information Theory (cs.IT) ,Computer Science - Information Theory - Abstract
Recently, rate-1/n zero-terminated and tail-biting convolutional codes (ZTCCs and TBCCs) with cyclic-redundancy-check (CRC)-aided list decoding have been shown to closely approach the random-coding union (RCU) bound for short blocklengths. This paper designs CRCs for rate-(n-1)/n CCs with short blocklengths, considering both the ZT and TB cases. The CRC design seeks to optimize the frame error rate (FER) performance of the code resulting from the concatenation of the CRC and the CC. Utilization of the dual trellis proposed by Yamada et al. lowers the complexity of CRC-aided serial list Viterbi decoding (SLVD) of ZTCCs and TBCCs. CRC-aided SLVD of the TBCCs closely approaches the RCU bound at a blocklength of 128. This paper also explores the complexity-performance trade-off for three decoders: a multi-trellis approach, a single-trellis approach, and a modified single trellis approach with pre-processing using the Wrap Around Viterbi Algorithm (WAVA)., arXiv admin note: substantial text overlap with arXiv:2111.07929
- Published
- 2022
4. Variable-Length Stop-Feedback Codes With Finite Optimal Decoding Times for BI-AWGN Channels
- Author
-
Yang, Hengjie, Yavas, Recep Can, Kostina, Victoria, and Wesel, Richard D.
- Subjects
FOS: Computer and information sciences ,Information Theory (cs.IT) ,Computer Science - Information Theory - Abstract
In this paper, we are interested in the performance of a variable-length stop-feedback (VLSF) code with $m$ optimal decoding times for the binary-input additive white Gaussian noise channel. We first develop tight approximations on the tail probability of length-$n$ cumulative information density. Building on the work of Yavas \emph{et al.}, for a given information density threshold, we formulate the integer program of minimizing the upper bound on average blocklength over all decoding times subject to the average error probability, minimum gap and integer constraints. Eventually, minimization of locally minimum upper bounds over all thresholds will yield the globally minimum upper bound and this is called the two-step minimization. For the integer program, we present a greedy algorithm that yields possibly suboptimal integer decoding times. By allowing a positive real-valued decoding time, we develop the gap-constrained sequential differential optimization (SDO) procedure that sequentially produces the optimal, real-valued decoding times. We identify the error regime in which Polyanskiy's scheme of stopping at zero does not improve the achievability bound. In this error regime, the two-step minimization with the gap-constrained SDO shows that a finite $m$ suffices to attain Polyanskiy's bound for VLSF codes with $m = \infty$., 8 pages, 4 figures; fixed some errors in v1 and added some new results; a short version of this preprint was submitted to ISIT 2022
- Published
- 2022
5. High-Rate Convolutional Codes with CRC-Aided List Decoding for Short Blocklengths
- Author
-
Sui, Wenhui, Yang, Hengjie, Towell, Brendan, Asmani, Ava, and Wesel, Richard D.
- Subjects
FOS: Computer and information sciences ,Computer Science - Information Theory ,Information Theory (cs.IT) - Abstract
Recently, rate-$1/\omega$ zero-terminated and tail-biting convolutional codes (ZTCCs and TBCCs) with cyclic-redundancy-check (CRC)-aided list decoding have been shown to closely approach the random-coding union (RCU) bound for short blocklengths. This paper designs CRCs for rate-$(\omega-1)/\omega$ CCs with short blocklengths, considering both the ZT and TB cases. The CRC design seeks to optimize the frame error rate (FER) performance of the code resulting from the concatenation of the CRC and the CC. Utilization of the dual trellis proposed by Yamada \emph{et al.} lowers the complexity of CRC-aided serial list Viterbi decoding (SLVD) of ZTCCs and TBCCs. CRC-aided SLVD of the TBCCs closely approaches the RCU bound at a blocklength of $128$., Comment: 6 pages; submitted to 2022 IEEE International Conference on Communications (ICC 2022)
- Published
- 2022
6. Incremental Redundancy With ACK/NACK Feedback at a Few Optimal Decoding Times
- Author
-
Yang, Hengjie, Yavas, Recep Can, Kostina, Victoria, and Wesel, Richard D.
- Subjects
FOS: Computer and information sciences ,Computer Science - Information Theory ,Information Theory (cs.IT) ,Computer Science::Information Theory - Abstract
Incremental redundancy with ACK/NACK feedback produces a variable-length stop-feedback (VLSF) code constrained to have $m$ decoding times, with an ACK/NACK feedback to the transmitter at each decoding time. This paper focuses on the numerical evaluation of the maximal achievable rate of random VLSF codes as a function of $m$ for the binary-input additive white Gaussian noise channel, binary symmetric channel, and binary erasure channel (BEC). Leveraging Edgeworth and Petrov expansions, we develop tight approximations to the tail probability of length-$n$ cumulative information density that are accurate for any blocklength $n$. We reduce Yavas et al.'s non-asymptotic achievability bound on VLSF codes with $m$ decoding times to an integer program of minimizing the upper bound on the average blocklength subject to the average error probability, minimum gap, and integer constraints. We develop two distinct methods to solve this program. Numerical evaluations show that Polyanskiy's achievability bound for VLSF codes, which assumes $m = \infty$, can be approached with a small $m$ for all three channels. For BEC, we consider systematic transmission followed by random linear fountain coding. This allows us to obtain a new achievability bound stronger than a previous bound and new VLSF codes whose rate further outperforms Polyanskiy's bound., Comment: 19 pages, 12 figures; submitted to IEEE Transactions on Communications. An earlier version of this work was published at ISIT 2022. Comments are welcome!
- Published
- 2022
- Full Text
- View/download PDF
7. CRC-Aided Short Convolutional Codes and RCU Bounds for Orthogonal Signaling
- Author
-
King, Jacob, Ryan, William, and Wesel, Richard D.
- Subjects
FOS: Computer and information sciences ,Computer Science - Information Theory ,Information Theory (cs.IT) - Abstract
We extend earlier work on the design of convolutional code-specific CRC codes to $Q$-ary alphabets, with an eye toward $Q$-ary orthogonal signaling. Starting with distance-spectrum optimal, zero-terminated, $Q$-ary convolutional codes, we design $Q$-ary CRC codes so that the CRC/convolutional concatenation is distance-spectrum optimal. The $Q$-ary code symbols are mapped to a $Q$-ary orthogonal signal set and sent over an AWGN channel with noncoherent reception. We focus on $Q = 4$, rate-1/2 convolutional codes in our designs. The random coding union bound and normal approximation are used in earlier works as benchmarks for performance for distance-spectrum optimal convolutional codes. We derive a saddlepoint approximation of the random coding union bound for the coded noncoherent signaling channel, as well as a normal approximation for this channel, and compare the performance of our codes to these limits. Our best design is within $0.6$ dB of the RCU bound at a frame error rate of $10^{-4}$., Comment: GLOBECOM 2022 camera-ready version
- Published
- 2022
- Full Text
- View/download PDF
8. Achieving Short-Blocklength RCU bound via CRC List Decoding of TCM with Probabilistic Shaping
- Author
-
Wang, Linfang, Song, Dan, Areces, Felipe, and Wesel, Richard D.
- Subjects
Signal Processing (eess.SP) ,FOS: Computer and information sciences ,Information Theory (cs.IT) ,Computer Science - Information Theory ,ComputingMethodologies_SYMBOLICANDALGEBRAICMANIPULATION ,FOS: Electrical engineering, electronic engineering, information engineering ,Data_CODINGANDINFORMATIONTHEORY ,Electrical Engineering and Systems Science - Signal Processing ,Computer Science::Information Theory - Abstract
This paper applies probabilistic amplitude shaping (PAS) to a cyclic redundancy check (CRC) aided trellis coded modulation (TCM) to achieve the short-blocklength random coding union (RCU) bound. In the transmitter, the equally likely message bits are first encoded by distribution matcher to generate amplitude symbols with the desired distribution. The binary representations of the distribution matcher outputs are then encoded by a CRC. Finally, the CRC-encoded bits are encoded and modulated by Ungerboeck's TCM scheme, which consists of a $\frac{k_0}{k_0+1}$ systematic tail-biting convolutional code and a mapping function that maps coded bits to channel signals with capacity-achieving distribution. This paper proves that, for the proposed transmitter, the CRC bits have uniform distribution and that the channel signals have symmetric distribution. In the receiver, the serial list Viterbi decoding (S-LVD) is used to estimate the information bits. Simulation results show that, for the proposed CRC-TCM-PAS system with 87 input bits and 65-67 8-AM coded output symbols, the decoding performance under additive white Gaussian noise channel achieves the RCU bound with properly designed CRC and convolutional codes.
- Published
- 2021
9. Finite-Support Capacity-Approaching Distributions for AWGN Channels
- Author
-
Xiao, Derek, Wang, Linfang, and Wesel, Richard D.
- Subjects
FOS: Computer and information sciences ,Information Theory (cs.IT) ,Computer Science - Information Theory - Abstract
In this paper, the Dynamic-Assignment Blahut-Arimoto (DAB) algorithm identifies finite-support probability mass functions (PMFs) with small cardinality that achieve capacity for amplitude-constrained (AC) Additive White Gaussian Noise (AWGN) Channels, or approach capacity to within less than 1% for power-constrained (PC) AWGN Channels. While a continuous Gaussian PDF is well-known to be a theoretical capacity-achieving distribution for the PC-AWGN channel, DAB identifies PMFs with small-cardinality that are, for practical purposes, indistinguishable in performance. We extend the results of Ozarow and Wyner that require a constellation cardinality of $2^{C+1}$ to approach capacity C to within the shaping loss. PMF's found by DAB approach capacity with essentially no shaping loss with constellation cardinality of $2^{C+1.2}$. For AC-AWGN channels, DAB characterizes the evolution of minimum-cardinality finite-support capacity-achieving PMFs., 6 pages, five figures, submitted to Globecom 2020
- Published
- 2020
10. Joint Design of Convolutional Code and CRC under Serial List Viterbi Decoding
- Author
-
Yang, Hengjie, Liang, Ethan, and Wesel, Richard D.
- Subjects
FOS: Computer and information sciences ,Computer Science - Information Theory ,Information Theory (cs.IT) ,Computer Science::Information Theory - Abstract
This paper studies the joint design of optimal convolutional codes (CCs) and CRC codes when serial list Viterbi algorithm (S-LVA) is employed in order to achieve the target frame error rate (FER). We first analyze the S-LVA performance with respect to SNR and list size, repsectively, and prove the convergence of the expected number of decoding attempts when SNR goes to the extreme. We then propose the coded channel capacity as the criterion to jointly design optimal CC-CRC pair and optimal list size and show that the optimal list size of S-LVA is always the cardinality of all possible CCs. With the maximum list size, we choose the design metric of optimal CC-CRC pair as the SNR gap to random coding union (RCU) bound and the optimal CC-CRC pair is the one that achieves a target SNR gap with the least complexity. Finally, we show that a weaker CC with a strong optimal CRC code could be as powerful as a strong CC with no CRC code., Comment: Portions of this work will be presented at the 2018 IEEE Global Communications Conference, Abu Dhabi, UAE
- Published
- 2018
- Full Text
- View/download PDF
11. Optimality and Rate-Compatibility for Erasure-Coded Packet Transmissions when Fading Channel Diversity Increases with Packet Length
- Author
-
Ranganathan, Sudarsan V. S., Mu, Tong, and Wesel, Richard D.
- Subjects
FOS: Computer and information sciences ,Computer Science - Information Theory ,Information Theory (cs.IT) ,Computer Science::Networking and Internet Architecture ,Data_CODINGANDINFORMATIONTHEORY ,Computer Science::Information Theory - Abstract
A message composed of packets is transmitted using erasure and channel coding over a fading channel with no feedback. For this scenario, the paper explores the trade-off between the redundancies allocated to the packet-level erasure code and the channel code, along with an objective of a low probability of failure to recover the message. To this end, we consider a fading model that we term proportional-diversity block fading (PD block fading). For a fixed overall code rate and transmit power, we formulate an optimization problem to numerically find the optimal channel-coding rate (and thus the optimal erasure-coding rate) that minimizes the probability of failure for various approximations of the problem. Furthermore, an interpretation of the results from an incremental redundancy point of view shows how rate-compatibility affects the possible trajectories of the failure probability as a function of the overall code rate. Our numerical results suggest that an optimal, rateless, hybrid coding scheme for a single-user wireless system over the PD block-fading channel should have the rate of the erasure code approach one., Comment: 6 pages, 4 figures
- Published
- 2016
- Full Text
- View/download PDF
12. Optimizing Transmission Lengths for Limited Feedback with Non-Binary LDPC Examples
- Author
-
Vakilinia, Kasra, Ranganathan, Sudarsan V. S., Divsalar, Dariush, and Wesel, Richard D.
- Subjects
FOS: Computer and information sciences ,Computer Science - Information Theory ,Information Theory (cs.IT) ,Data_CODINGANDINFORMATIONTHEORY ,Computer Science::Information Theory - Abstract
This paper presents a general approach for optimizing the number of symbols in increments (packets of incremental redundancy) in a feedback communication system with a limited number of increments. This approach is based on a tight normal approximation on the rate for successful decoding. Applying this approach to a variety of feedback systems using non-binary (NB) low-density parity-check (LDPC) codes shows that greater than 90% of capacity can be achieved with average blocklengths fewer than 500 transmitted bits. One result is that the performance with ten increments closely approaches the performance with an infinite number of increments. The paper focuses on binary- input additive-white Gaussian noise (BI-AWGN) channels but also demonstrates that the normal approximation works well on examples of fading channels as well as high-SNR AWGN channels that require larger QAM constellations. The paper explores both variable-length feedback codes with termination (VLFT) and the more practical variable length feedback (VLF) codes without termination that require no assumption of noiseless transmitter confirmation. For VLF we consider both a two-phase scheme and CRC-based scheme.
- Published
- 2016
- Full Text
- View/download PDF
13. Resource-aware incremental redundancy in feedback and broadcast
- Author
-
Wesel, Richard D., Vakilinia, Kasra, Ranganathan, Sudarsan V.S., Divsalar, Dariush, Mu, Tong, Lapidoth, Amos, and Moser, Stefan M.
- Subjects
Electric engineering ,ddc:621.3 ,FOS: Mathematics ,ddc:510 ,Mathematics - Abstract
International Zurich Seminar on Communications - Proceedings
- Published
- 2016
- Full Text
- View/download PDF
14. Feedback Communication Systems with Limitations on Incremental Redundancy
- Author
-
Chen, Tsung-Yi, Williamson, Adam R., Seshadri, Nambi, and Wesel, Richard D.
- Subjects
FOS: Computer and information sciences ,Information Theory (cs.IT) ,Computer Science - Information Theory ,Computer Science::Information Theory - Abstract
This paper explores feedback systems using incremental redundancy (IR) with noiseless transmitter confirmation (NTC). For IR-NTC systems based on {\em finite-length} codes (with blocklength $N$) and decoding attempts only at {\em certain specified decoding times}, this paper presents the asymptotic expansion achieved by random coding, provides rate-compatible sphere-packing (RCSP) performance approximations, and presents simulation results of tail-biting convolutional codes. The information-theoretic analysis shows that values of $N$ relatively close to the expected latency yield the same random-coding achievability expansion as with $N = \infty$. However, the penalty introduced in the expansion by limiting decoding times is linear in the interval between decoding times. For binary symmetric channels, the RCSP approximation provides an efficiently-computed approximation of performance that shows excellent agreement with a family of rate-compatible, tail-biting convolutional codes in the short-latency regime. For the additive white Gaussian noise channel, bounded-distance decoding simplifies the computation of the marginal RCSP approximation and produces similar results as analysis based on maximum-likelihood decoding for latencies greater than 200. The efficiency of the marginal RCSP approximation facilitates optimization of the lengths of incremental transmissions when the number of incremental transmissions is constrained to be small or the length of the incremental transmissions is constrained to be uniform after the first transmission. Finally, an RCSP-based decoding error trajectory is introduced that provides target error rates for the design of rate-compatible code families for use in feedback communication systems., 23 pages, 15 figures
- Published
- 2013
15. Minimizing weighted sum download time for one-to-many file transfer in peer-to-peer networks
- Author
-
Xie, Bike, van der Schaar, Mihaela, and Wesel, Richard D.
- Subjects
Computer Science - Networking and Internet Architecture ,Networking and Internet Architecture (cs.NI) ,FOS: Computer and information sciences ,Optimization and Control (math.OC) ,Computer Science - Information Theory ,Information Theory (cs.IT) ,FOS: Mathematics ,Mathematics - Optimization and Control ,68M10, 90B18 - Abstract
This paper considers the problem of transferring a file from one source node to multiple receivers in a peer-to-peer (P2P) network. The objective is to minimize the weighted sum download time (WSDT) for the one-to-many file transfer. Previous work has shown that, given an order at which the receivers finish downloading, the minimum WSD can be solved in polynomial time by convex optimization, and can be achieved by linear network coding, assuming that node uplinks are the only bottleneck in the network. This paper, however, considers heterogeneous peers with both uplink and downlink bandwidth constraints specified. The static scenario is a file-transfer scheme in which the network resource allocation remains static until all receivers finish downloading. This paper first shows that the static scenario may be optimized in polynomial time by convex optimization, and the associated optimal static WSD can be achieved by linear network coding. This paper then presented a lower bound to the minimum WSDT that is easily computed and turns out to be tight across a wide range of parameterizations of the problem. This paper also proposes a static routing-based scheme and a static rateless-coding-based scheme which have almost-optimal empirical performances. The dynamic scenario is a file-transfer scheme which can re-allocate the network resource during the file transfer. This paper proposes a dynamic rateless-coding-based scheme, which provides significantly smaller WSDT than the optimal static scenario does., Comment: 67 pages, 21 figures
- Published
- 2010
- Full Text
- View/download PDF
16. The Single Source Two Terminal Network with Network Coding
- Author
-
Ramamoorthy, Aditya and Wesel, Richard D.
- Subjects
Computer Science - Networking and Internet Architecture ,Networking and Internet Architecture (cs.NI) ,FOS: Computer and information sciences ,Computer Science - Information Theory ,Information Theory (cs.IT) - Abstract
We consider a communication network with a single source that has a set of messages and two terminals where each terminal is interested in an arbitrary subset of messages at the source. A tight capacity region for this problem is demonstrated. We show by a simple graph-theoretic procedure that any such problem can be solved by performing network coding on the subset of messages that are requested by both the terminals and that routing is sufficient for transferring the remaining messages., Comment: 4 pages, appeared at the Canadian Workshop on Information Theory (CWIT), 2005
- Published
- 2009
- Full Text
- View/download PDF
17. Optimal Encoding Schemes for Several Classes of Discrete Degraded Broadcast Channels
- Author
-
Xie, Bike, Courtade, Thomas, and Wesel, Richard D.
- Subjects
FOS: Computer and information sciences ,Computer Science - Information Theory ,Information Theory (cs.IT) ,Data_CODINGANDINFORMATIONTHEORY ,Computer Science::Information Theory - Abstract
Consider a memoryless degraded broadcast channel (DBC) in which the channel output is a single-letter function of the channel input and the channel noise. As examples, for the Gaussian broadcast channel (BC) this single-letter function is regular Euclidian addition and for the binary-symmetric BC this single-letter function is Galois-Field-two addition. This paper identifies several classes of discrete memoryless DBCs for which a relatively simple encoding scheme, which we call natural encoding, achieves capacity. Natural Encoding (NE) combines symbols from independent codebooks (one for each receiver) using the same single-letter function that adds distortion to the channel. The alphabet size of each NE codebook is bounded by that of the channel input. Inspired by Witsenhausen and Wyner, this paper defines the conditional entropy bound function $F^*$, studies its properties, and applies them to show that NE achieves the boundary of the capacity region for the multi-receiver broadcast Z channel. Then, this paper defines the input-symmetric DBC, introduces permutation encoding for the input-symmetric DBC, and proves its optimality. Because it is a special case of permutation encoding, NE is capacity achieving for the two-receiver group-operation DBC. Combining the broadcast Z channel and group-operation DBC results yields a proof that NE is also optimal for the discrete multiplication DBC. Along the way, the paper also provides explicit parametric expressions for the two-receiver binary-symmetric DBC and broadcast Z channel., Comment: 50 pages, 18 figures
- Published
- 2008
- Full Text
- View/download PDF
18. Analytical Framework for Optimizing Weighted Average Download Time in Peer-to-Peer Networks
- Author
-
Xie, Bike, van der Schaar, Mihaela, and Wesel, Richard D.
- Subjects
Computer Science - Networking and Internet Architecture ,Networking and Internet Architecture (cs.NI) ,FOS: Computer and information sciences ,Computer Science::Multimedia ,Computer Science::Networking and Internet Architecture ,Computer Science::Digital Libraries - Abstract
This paper proposes an analytical framework for peer-to-peer (P2P) networks and introduces schemes for building P2P networks to approach the minimum weighted average download time (WADT). In the considered P2P framework, the server, which has the information of all the download bandwidths and upload bandwidths of the peers, minimizes the weighted average download time by determining the optimal transmission rate from the server to the peers and from the peers to the other peers. This paper first defines the static P2P network, the hierarchical P2P network and the strictly hierarchical P2P network. Any static P2P network can be decomposed into an equivalent network of sub-peers that is strictly hierarchical. This paper shows that convex optimization can minimize the WADT for P2P networks by equivalently minimizing the WADT for strictly hierarchical networks of sub-peers. This paper then gives an upper bound for minimizing WADT by constructing a hierarchical P2P network, and lower bound by weakening the constraints of the convex problem. Both the upper bound and the lower bound are very tight. This paper also provides several suboptimal solutions for minimizing the WADT for strictly hierarchical networks, in which peer selection algorithms and chunk selection algorithm can be locally designed., Comment: 12 pages, 16 figures
- Published
- 2008
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.