A source coding (quantization) scheme is studied for the feedback of discrete-time and continuous-state cyber-physical systems (CPSs). It is formulated as a sequential coding optimization problem. The goal is to find ...
详细信息
A source coding (quantization) scheme is studied for the feedback of discrete-time and continuous-state cyber-physical systems (CPSs). It is formulated as a sequential coding optimization problem. The goal is to find a deterministic but adaptive policy, as a series of mappings from the historical information to the quantization strategy. In particular, an optimization problem is formulated, and then solved by the Bellman equation in dynamic programming (DP). To overcome the challenge of continuous state space, a practical solution is proposed by leveraging the approximate DP (ADP). The performance of the proposed strategy is examined for both scalar and vector dynamical systems in two practical applications. It shows that the designed policy can significantly outperform the simple fixed quantization strategies in CPSs and can be applied to the mobile/vehicle communication.
The purpose of this paper is threefold: 1) to acquaint the reader with the types of problems that have been considered in the area of source coding with a fidelity criterion;2) to survey results that have been obtaine...
详细信息
The purpose of this paper is threefold: 1) to acquaint the reader with the types of problems that have been considered in the area of source coding with a fidelity criterion;2) to survey results that have been obtained on these problems;and 3) to outline future research trends in the area.
The recently proposed set-up of source coding with a side information "vending machine" allows the decoder to select actions in order to control the quality of the side information. The actions can depend on...
详细信息
ISBN:
(纸本)9781479904464
The recently proposed set-up of source coding with a side information "vending machine" allows the decoder to select actions in order to control the quality of the side information. The actions can depend on the message received from the encoder and on the previously measured samples of the side information, and are cost constrained. Moreover, the final estimate of the source by the decoder is a function of the encoder's message and depends causally on the side information sequence. Previous work by Permuter and Weissman has characterized the rate-distortioncost function in the special case in which the source and the "vending machine" are memoryless. In this work, motivated by the related channel coding model introduced by Kramer, the ratedistortion- cost function characterization is extended to a model with in-block memory. Various special cases are studied including block-feedforward and side information repeat request models.
We consider the problem of source coding with side information ( SI) at the decoder only, when the joint distribution between the source and the SI is not perfectly known. Four parametric models for this joint distrib...
详细信息
ISBN:
(纸本)9784885522673
We consider the problem of source coding with side information ( SI) at the decoder only, when the joint distribution between the source and the SI is not perfectly known. Four parametric models for this joint distribution are considered, where uncertainty about the distribution is turned into uncertainty about the value of the parameters. More precisely, a prior distribution for the parameters may or may not be available. Moreover, the value of the parameters may either change at every symbol or remain constant for a while. This paper overviews the results on the performance of lossless source coding with SI at the decoder for the four models. The way LDPC-based encoding and decoding schemes should be designed to cope with model uncertainty is provided. Most of the proposed practical schemes perform close to the theoretical limits.
An encoder, subject to a rate constraint, wishes to describe a Gaussian source under squared-error distortion. The decoder, besides receiving the encoder's description, also observes side information consisting of...
详细信息
An encoder, subject to a rate constraint, wishes to describe a Gaussian source under squared-error distortion. The decoder, besides receiving the encoder's description, also observes side information consisting of uncompressed source symbol subject to slow fading and noise. The decoder knows the fading realization but the encoder knows only its distribution. The rate-distortion function that simultaneously satisfies the distortion constraints for all fading states was derived by Heegard and Berger. A layered encoding strategy is considered in which each codeword layer targets a given fading state. When the side-information channel has two discrete fading states, the expected distortion is minimized by optimally allocating the encoding rate between the two codeword layers. For multiple fading states, the minimum expected distortion is formulated as the solution of a convex optimization problem with linearly many variables and constraints. Through a limiting process on the primal and dual solutions, it is shown that single-layer rate allocation is optimal when the fading probability density function is continuous and quasiconcave (e.g., Rayleigh, Rician, Nakagami, and log-normal). In particular, under Rayleigh fading, the optimal single codeword layer targets the least favorable state as if the side information was absent.
We consider wiretap channels with uncertainty on the eavesdropper channel under (i) noisy blockwise type II, (ii) compound, or (iii) arbitrarily varying models. We present explicit wiretap codes that can handle these ...
详细信息
We consider wiretap channels with uncertainty on the eavesdropper channel under (i) noisy blockwise type II, (ii) compound, or (iii) arbitrarily varying models. We present explicit wiretap codes that can handle these models in a unified manner and only rely on three primitives, namely source coding with side information, universal hashing, and distribution approximation. Our explicit wiretap codes achieve the best known single-letter achievable rates, previously obtained non-constructively, for the models considered. Our results are obtained for strong secrecy, do not require a pre-shared secret between the legitimate users, and do not require any symmetry properties on the channel. An extension of our results to compound main channels is also derived via new capacity-achieving polar coding schemes for compound settings.
We consider a lossless multi-terminal source coding problem with one transmitter, two receivers and side information. The achievable rate region of the problem is not well understood. In this paper, we characterise th...
详细信息
ISBN:
(纸本)9781467302234;9781467302241
We consider a lossless multi-terminal source coding problem with one transmitter, two receivers and side information. The achievable rate region of the problem is not well understood. In this paper, we characterise the rate region when the side information at one receiver is conditionally less noisy than the side information at the other, given this other receiver's desired source. The conditionally less noisy definition includes degraded side information and a common message as special cases, and it is motivated by the concept of less noisy broadcast channels. The key contribution of the paper is a new converse theorem employing a telescoping identity and the Csiszar sum identity.
This paper considers source coding problems with the requirements of perfect secrecy and zero error at receivers. In the problems considered in this paper, there is always one transmitter but there can be one or two r...
详细信息
ISBN:
(纸本)9781479904464
This paper considers source coding problems with the requirements of perfect secrecy and zero error at receivers. In the problems considered in this paper, there is always one transmitter but there can be one or two receivers. Two different scenarios depending on whether the receivers' side information are present at the transmitter or not are considered. By deriving bounds on the probability masses of the cipher-text and the key, the minimum transmission rate and key rate are characterized. Although zero-error capacities are typically difficult to characterize, the perfect secrecy constraint turns out to be the key that simplifies the problems considered in this paper and makes them analytically tractable.
We study error exponents for source coding with side information. Both achievable exponents and converse bounds are obtained for the following two cases: lossless source coding with coded information and lossy source ...
详细信息
We study error exponents for source coding with side information. Both achievable exponents and converse bounds are obtained for the following two cases: lossless source coding with coded information and lossy source coding with full side information (Wyner-Ziv). These results recover and extend several existing results on source-coding error exponents and are tight in some circumstances. Our bounds have a natural interpretation as a two-player game between nature and the code designer, with nature seeking to minimize the exponent and the code designer seeking to maximize it. In the Wyner-Ziv problem, our analysis exposes a tension in the choice of test channel with the optimal test channel balancing two competing error events. The Gaussian and binary-erasure cases are examined in detail.
Consider the problem of finite-rate filtering of a discrete memoryless process {X-i}(igreater than or equal to1) based on its noisy observation sequence {Z(i)}(igreater than or equal to1), which is the output of a dis...
详细信息
Consider the problem of finite-rate filtering of a discrete memoryless process {X-i}(igreater than or equal to1) based on its noisy observation sequence {Z(i)}(igreater than or equal to1), which is the output of a discrete memoryless channel (DMC) whose input is {X-i}(igreater than or equal to1). When the distribution of the pairs (X-i, Z(i)), P-X,P-Z, is known, and for a given distortion measure, the solution to this problem is well known to be given by classical rate-distortion theory upon the introduction of a modified distortion measure. In this work, we address the case where P-X,P-Z, rather than being completely specified, is only known to belong to some set Lambda. For a fixed encoding rate R, we look at the worst case, over all theta epsilon Lambda, of the difference between the expected distortion of a given scheme which is not allowed to depend on the active source theta epsilon Lambda and the value of the distortion-rate function at R corresponding to the noisy source theta. We study the minimum attainable value achievable by any scheme operating at rate R for this worst case quantity, denoted by D(Lambda, R). Linking this problem and that of source coding under several distortion measures, we prove a coding theorem for the latter problem and apply it to characterize D(Lambda, R) for the case where all members of Lambda share the same noisy marginal. For the case of a general Lambda, we obtain a single-letter characterization of D(Lambda, R) for the finite-alphabet case. This gives, in particular, a necessary and sufficient condition on the set Lambda for the existence of a coding scheme which is universally optimal for all members of Lambda and characterizes the approximation-estimation tradeoff for statistical modeling of noisy source coding problems. Finally, we obtain D(Lambda, R) in closed form for cases where Lambda consists of distributions on the (channel) input-output pair of a Bernoulli source corrupted by a binary-symmetric channel (BSC). In pa
暂无评论