Материалы подготовлены лаб. 13

advertisement
Зарубежная периодика по тематике ИПИ РАН
Выпуск № 3, июль 2006 г.
Материалы подготовлены лаб. 13
Журнал IEEE Transactions on Automatic Control
Feb 2005, Vol. 50 Issue 2
Труды Института Инженеров по Электротехнике и Электронике (США)
«Автоматическое управление»
Том 50, вып. 2 (Февраль 2005 г.)
СТАТЬИ
1. Встраивания конечных автоматов при непараллельном обнаружении и идентификации
ошибок.
Finite-State Machine Embeddings for Nonconcurrent Error Detection and Identification.
By: Hadjicostis, Christoforos N.. p142-153, 12p
Ключевые слова: DIGITAL electronics, FAULT location (Engineering), MECHANICS, RELIABILITY
(Engineering), SPECIFICATIONS, TRANSIENTS (Dynamics)
Author-Supplied Keywords: fault tolerance, finite-state machines (FSMs), nonconcurrent error detection and
correction, transient faults, Error recovery
Abstract: In digital sequential systems that operate over several time steps, a state-transition fault at any lime
step during the operation of the system can corrupt its state and render its future functionality useless. Such
state-transition faults are usually handled by embedding the given sequential system into a larger one, in a way
that preserves the state evolution and properties of the original system while enabling an external mechanism to
perform checks to detect, identify and correct errors in the encoded state of this redundant system. Checking is
typically performed concurrently (i.e., at the end of each lime step) and can potentially cause high power
consumption or an overall slowdown in the system; more importantly, concurrent checking imposes significant
reliability requirements on the error-detection/identification mechanism. In this paper, we develop a
methodology for systematically constructing embeddings of finite-state machines so that the external
mechanism can capture transient state-transition faults via checks that are performed in a nonconcurrent manner
(e.g., periodically instead of every time step). More specifically, by characterizing nonconcurrent errordetecting/identifying capabilities in terms of state encoding constraints and redundant dynamics, the proposed
approach can be used to construct a redundant version of the given finite-state machine (FSM) that allows the
external mechanism to detect and identify errors due to past state-transition faults based on an analysis of the
current, possibly corrupted FSM state. As a result, the checker in such designs can operate at a slower speed
than the rest of the system which relaxes the stringent requirements on its reliability. [ABSTRACT FROM
AUTHOR]
2. Обзор тематики, связанной с системами последовательной обработки цифровой информации,
такими как контроллеры и микроконтроллеры.
Scanning the Issue. p143-143, 1p;
Ключевые слова: AUTOMATIC control, COMMUNICATION, CONVERGENCE, DIGITAL electronics,
ELECTRIC controllers, NONLINEAR systems
Abstract: The article presents information on topics on which articles of this issue of the periodical are
published. In digital sequential systems, such as embedded controllers and microcontrollers, a transient fault
can corrupt the system state. Detecting a corrupted system state and identifying the fault in a timely manner is
important for preventing the effects of the propagation of the fault. One of the paper introduces several
definitions of norm-observability for nonlinear systems and explores relationships among them. These
observability properties involve the existence of a bound on the norm of the state in terms of the norms of the
output and the input on some time interval. The focus of one of the paper is on the development and analysis of
a network model of multiple agents interacting via time-dependent communication links. In the model, each
1
agent updates its current state based upon the current information from neighboring agents. In one of the paper,
the authors develop new criteria for deriving uniform convergence in uniformly stable time-varying systems.
3. Нелинейные нормо-наблюдаемые представления и устойчивость систем маршрутизации.
Nonlinear Norm-Observability Notions and Stability of Switched Systems.
By: Hespanha, Joao P.; Liberzon, Daniel; Angeli, David; Sontag,p154-168, 15p;
Ключевые слова: AMPLIFIERS, Vacuum-tube, ELECTRONICS, FEEDBACK (Electronics), NONLINEAR
systems, SWITCHING power supplies, NONLINEAR models
Author-Supplied Keywords: nonlinear system, observability, switched system, LaSalle's stability theorem
Abstract: This paper proposes several definitions of "norm-observability" for nonlinear systems and explores
relationships among them. These observability properties involve the existence of a bound on the norm of the
state in terms of the norms of the output and the input on some time interval. A Lyapunov-like sufficient
condition for norm-observability is also obtained. As an application, we prove several variants of LaSalle's
stability theorem for switched nonlinear systems. These results are demonstrated to be useful for control design
in the presence of switching as well as for developing stability results of Popov type for switched feedback
systems. [ABSTRACT FROM AUTHOR]
4. Устойчивость мультиагентных систем с зависимыми по времени коммуникационными
связями.
Stability of Multiagent Systems With Time-Dependent Communication Links.
By: Moreau, Luc. p169-182, 14p;
Ключевые слова: COMMUNICATION, CONVERGENCE, LYAPUNOV functions, STRUCTURAL
stability, SYNCHRONIZATION, TIME measurements
Author-Supplied Keywords: set-valued Lyapunov theory, stability analysis, swarms, synchronization.
Abstract: We study a simple but compelling model of network of agents interacting via time-dependent
communication links. The model finds application in a variety of fields including synchronization, swarming
and distributed decision making. In the model, each agent updates his current state based upon the current
information received from neighboring agents. Necessary and/or sufficient conditions for the convergence of
the individual agents' states to a common value are presented, thereby extending recent results reported in the
literature. The stability analysis is based upon a blend of graph-theoretic and system-theoretic tools with the
notion of convexity playing a central role. The analysis is integrated within a formal framework of set-valued
Lyapunov theory, which may be of independent interest. Among others, it is observed that more
communication does not necessarily lead to faster convergence and may eventually even lead to a loss of
convergence, even for the simple models discussed in the present paper. [ABSTRACT FROM AUTHOR]
5. Встроенная теорема Матросова и существование возбуждения равномерной сходимости в
устойчивых неавтономных системах.
A Nested Matrosov Theorem and Persistency of Excitation for Uniform Convergence in Stable
Nonautonomous Systems.
By: Loria, Antonio; Panteley, Elena; Popovic, Dobrivoje; Teel, Andrew R.. p183-198, 16p;
Ключевые слова: ASYMPTOTES, BESSEL functions, CALCULUS, CURVES, Plane, DIFFERENTIAL
equations, LINEAR systems
Author-Supplied Keywords: nonholonomic systems, time- varying systems, uniform stability.
Abstract: A new infinitesimal sufficient condition is given for uniform global asymptotic stability (UGAS) for
time-varying non- linear systems. it is used to show that a certain relaxed persistency of excitation condition,
called uniform -persistency of excitation (U-PE), is sufficient for uniform global asymptotic stability in
certain situations. U-PE of the right-hand side of a time-varying differential equation is also shown to be
necessary under a uniform Lipschitz condition. The infinitesimal sufficient condition for UGAS involves the
inner products of the flow field with the gradients of a finite number of possibly sign-indefinite, locally
Lipschitz Lyapunov-like functions. These inner products are supposed to be bounded by functions that have a
2
certain nested, or triangular, negative semidefinite structure. This idea is reminiscent of a previous idea of
Matrosov who supplemented a Lyapunov function having a negative semidefinite derivative with an additional
function having a derivative that is "definitely nonzero" where the derivative of the Lyapunov function is zero.
For this reason, we call the main result a nested Matrosov theorem. The utility of our results on stability
analysis is illustrated through the well-known case-study of the nonholonomic integrator. [ABSTRACT FROM
AUTHOR]
6. Управление в Гамильтониановских системах с множественными задержками по входу\выходу
путем декомпозиции адобовских операторов.
H Control of Systems With Multiple I/O Delays via Decomposition to Adobe Problems.
By: Meinsma, Gjerrit; Mirkin, Leonid.Vol. p199-211, 13p;
Ключевые слова: AUTOMATIC control, AUTOMATION, DELAY differential equations, DELAY lines,
DISCRETE-time systems, FEEDBACK control systems
Author-Supplied Keywords: H control, time-delay systems. Dead-time compensation
Abstract: In this paper, the standard (four-block) H<sup></sup> control problem for systems with multiple
input-output delays in the feed- back loop is studied. The central idea is to see the multiple delay operator as a
special series connection of elementary delay operators, called the adobe delay operators. The adobe delay case
is solved and thereby the general case is solved as a nested set of solutions to adobe delay problems.
[ABSTRACT FROM AUTHOR]
7. Замечания по вопросу проектирования систем дескрипторов с ошибками и неизвестными
входами.
Technical Notes and Correspondence.
By: Koenig, D.. p212-217, 6p;
Ключевые слова: ALGEBRA, AUTOMATIC control, DIFFERENTIAL equations, Linear, LINEAR
systems, MATHEMATICAL analysis, SYSTEM theory
Author-Supplied Keywords: proportional-integral (PI) observer, robustness. Descriptor systems
Abstract: In this note, the problem of observer design for linear descriptor systems with faults and unknown
inputs is considered. First, it is considered that the fault vector function f is &ssline; times piecewise
continuously differentiable. If the &ssline;th time derivative of f is null, then a integral actions are included into
a Luenberger observer, which is designed such that it estimates simultaneously the state, the fault, and its finite
derivatives face to unknown inputs. Second, when the fault is not lime piecewise continuously differentiable
but bounded (like actuator noise) or &ssline;th lime derivative of fault is not null but bounded too, a high gain
observer is derived to attenuate the fault impact in estimation errors. The considered faults may be unbounded,
may not be determinist, and faults and unknown inputs may affect the state dynamic and plant outputs.
Sufficient conditions for the existence of such observer are given. Results are illustrated with a differential
algebraic power system. [ABSTRACT FROM AUTHOR]
8. Зависимая от величины задержки экспоненциальная устойчивость в стохастических системах с
переменной по времени задержкой, нелинейностью и марковской маршрутизацией.
Delay-Dependent Exponential Stability of Stochastic Systems With Time-Varying Delay, Nonlinearity, and
Markovian Switching.
By: Dong Yue; Qing-Long Han.p217-222, 6p;
Ключевые слова: DELAY differential equations, FUNCTIONAL differential equations, MATRICES,
STOCHASTIC analysis, STOCHASTIC processes, SYSTEM analysis
Author-Supplied Keywords: Markov chain, stability, Stochastic systems, time delay. Linear matrix inequality
(LMI)
Abstract: The problem of delay-dependent stability in the mean square sense for stochastic systems with timevarying delays, Markovian switching and nonlinearities is investigated. Both the slowly time-varying delays
and fast time-varying delays are considered. Based on a linear matrix inequality approach, delay-dependent
3
stability criteria are derived by introducing some relaxation matrices which can be chosen properly to lead to a
less conservative result. Numerical examples are given to illustrate the effectiveness of the method and
significant improvement of the estimate of stability limit over some existing results in the literature.
[ABSTRACT FROM AUTHOR]
9. Робастное управление по выходу в сингулярных нелинейных системах с помощью нелинейной
внутренней модели.
Robust Output Regulation of Singular Nonlinear Systems via a Nonlinear Internal Model. By: Sulin Pang; Jie
Huang; Yuanhuai Bai.p222-228, 7p;
Ключевые слова: ALGEBRA,
POLYNOMIALS, ROBUST control
AUTOMATIC
control,
EQUATIONS,
NONLINEAR
systems,
Author-Supplied Keywords: output regulation problem, robust control, singular systems.
Abstract: The robust output regulation problem for singular nonlinear systems has been studied recently under
a restrictive assumption that the solution of the regulator equations is polynomial. This assumption essentially
limits the nonlinear systems to contain only polynomial nonlinearities. In this note, we will further show that
the polynomial assumption can be replaced by a much milder condition. The new condition applies to a larger
class of nonpolynomial nonlinear systems, thus significantly improving the existing result. [ABSTRACT
FROM AUTHOR]
10. Линейные функциональные наблюдатели в системах с задержками в переменных состояния:
случай дискретного времени.
Linear Functional Observers for Systems With Delays in State Variables: The Discrete-Time Case.
By: Darouach, M.Vol. p228-233, 6p;
Ключевые слова: DIFFERENTIAL equations, Linear, FEEDBACK control systems, INEQUALITIES
(Mathematics), LINEAR systems, SYSTEM theory, TIME delay systems
Author-Supplied Keywords: discrete time-delay systems, functional observer, linear matrix inequality (LMI)
stability. Bilinear matrix inequality (BMI)
Abstract: This note extends to the discrete-time case the design of linear functional state observers, recently
developed for continuous-time delay systems. Sufficient conditions for the stability dependent of delays and
stability independent of delays are derived using linear and bilinear matrix inequalities [(LMIs) and (BMIs)]
formulations. [ABSTRACT FROM AUTHOR]
11. Отслеживание траектории в неминимально-фазовых системах, устраняющее пределы
эффективности.
Path-Following for Nonminimum Phase Systems Removes Performance Limitations.
By: Aguiar, A. Pedro; Hespanha, Joao P.; Kokotovic, Petar V.. p234-239, 6p
Ключевые слова: GEOMETRY, EUCLID'S Elements, MATHEMATICS, TIME measurements, TIMING
circuits, ANGLES (Geometry)
Author-Supplied Keywords: nonminimum phase systems, path-following, reference-tracking, Cheap-Control
Abstract: We highlight an essential difference between path-following and reference-tracking for nonminimum
phase systems. It is well known that in the reference-tracking, for nonminimuin phase systems, there exists a
fundamental performance limitation in terms of a lower bound on the L<sub>2</sub> -norm of the tracking
error, even when the control effort is free. We show that this is not the case for the less stringent path-following
problem, where the control objective is to force the output to follow a geometric path without a timing law
assigned to it. Furthermore, the same is true even when an additional desired speed assignment is imposed.
[ABSTRACT FROM AUTHOR]
12. Обнаружение ошибок в линейных периодических системах с дискретным временем.
Fault Detection of Linear Discrete-Time Periodic Systems.
By: Zhang, P.; Ding, S. X.; Wang, G. Z.; Zhou, D. H.. p239-244, 6p
4
Ключевые слова: DIFFERENTIAL equations, Linear, DYNAMIC testing, FAULT location (Engineering),
LINEAR systems, RICCATI equation, SYSTEM theory
Author-Supplied Keywords: linear discrete-time systems, periodic systems, residual generation, robustness,
Fault detection
Abstract: In this note, an approach to the design of optimal fault detection systems for linear discrete-time
periodic systems is proposed, which leads to an optimized compromise between robustness to unknown
disturbances and sensitivity to faults. The needed computation mainly consists in solving a difference periodic
Riccati system. The proposed approach is finally illustrated by a numerical example. [ABSTRACT FROM
AUTHOR]
13. Проблемы распределенного управления рулевым двигателем космического аппарата.
Spacecraft Thruster Control Allocation Problems. By: Servidia, Pablo A.; Pena, Ricardo Sanchez. p245-249,
5p;
Ключевые слова: ALGORITHMS, MATHEMATICAL analysis, MATHEMATICAL optimization,
MECHANICS, ROTATIONAL motion (Rigid dynamics), SPACE vehicles
Author-Supplied Keywords: spacecraft, thruster.Control allocation
Abstract: We consider the control allocation problem in a spacecraft thruster configuration. It consists on the
determination of the force command to be sent to each thruster in order to point the total torque and/or thrust
vectors. Here, we state four possible practical problems and propose a control allocation algorithm based on a
subgradient optimization, which is shown to be faster than existing allocators. [ABSTRACT FROM AUTHOR]
14. Обеспечение устойчивости линейных систем с дискретным временем за счет статической
обратной связи по выходу с Гамильтониановской эффективностью.
Static Output Feedback Stabilization With H Performance for Linear Discrete-Time Systems.
By: Bara, G. Iulia; Boutayeb, Mohamed. p250-254, 5p;
Ключевые слова: ALGEBRA, FEEDBACK (Electronics), LINEAR operators, MATHEMATICS,
MATRICES, STATICS
Author-Supplied Keywords: linear matrix inequality (LMI) approach, static output feedback (SOF). Discretetime systems
Abstract: This note presents a new sufficient condition for the static output feedback stabilization of linear
discrete-time systems. This new condition is expressed as a linear matrix inequality feasibility problem and
hence easily tractable numerically. An extension of this condition is given in order to incorporate
&hamlit;<sub>?</sub> performance objectives. The applicability of the proposed approach is shown through
numerical examples and compared to some recent methods. [ABSTRACT FROM AUTHOR]
15. Глобальная экспоненциальная устойчивость через обратную связь по выходу в классе
нелинейных систем.
Global Exponential Stabilization of a Class of Nonlinear Systems by Output Feedback.
By: Ho-Lim Choi; Jong-Tae Lim. p255-257, 3p;
Ключевые слова: EXPONENTIAL functions, FEEDBACK (Electronics), FEEDBACK control systems,
LOGARITHMS, NONLINEAR system, TRANSCENDENTAL functions
Author-Supplied Keywords: output feedback control, Global exponential stabilization
Abstract: This work extends the existing output feedback stabilization schemes for the systems in a "perturbed
chain-of-integrator" form. In particular, we further relax the triangular-type conditions imposed on the
perturbed terms and analyze the robust property of the linear output feedback control law using the newly
proposed condition. [ABSTRACT FROM AUTHOR]
16. Ограниченный алгоритм на основе модели управления с упреждением для систем с
неопределенными, изменяющимися во времени параметрами и задержками по состоянию.
Constrained MPC Algorithm for Uncertain Time-Varying Systems With State-Delay.
By: Seung Cheol Jeong; Park, PooGyeon. p257-263, 7p;
5
Ключевые слова: AUTOMATIC control, ALGORITHMS, AUTOMATION, FEEDBACK control systems,
MATHEMATICAL optimization, MATRICES
Author-Supplied Keywords: input constraint, model predictive control (MPC), state dela, uncertainty, Closedloop stability
Abstract: In this note, we present a model predictive control (MPC) algorithm for uncertain time-varying
systems with input constraints and state- delay. Uncertainty is assumed to be polytopic, and delay is assumed to
be, unknown but with a known upper bound. For a memoryless state-feedback MPC law, we define an
optimization problem that minimizes a cost function and relaxes it to two other optimization problems by
finding an upper bound of the cost function. One is solvable and the other is not. We prove equivalence and
feasibilities of the two optimization problems under a certain assumption on the weighting matrix. Based on
these properties and optimality, we show that feasible MPC from the optimization problems stabilizes the
closed-loop system. Then, we present an improved MPC algorithm that includes relaxation procedures of the
assumption on the weighting matrix and stabilizes the closed-loop system. Finally, a numerical example
illustrates the performance of the proposed algorithm. [ABSTRACT FROM AUTHOR]
17. Поддающиеся вычислению законы стохастического управления мощностью в беспроводных
системах коммуникации.
Computationally Tractable Stochastic Power Control Laws in Wireless Communications.
By: Minyi Huang; Malhanie, Roland P.; Caines, Peter E.. p263-268, 6p;
Ключевые слова: CALCULUS of variations, HAMILTON-Jacobi equations, MATHEMATICAL
optimization, MECHANICS, STOCHASTIC analysis, STOCHASTIC processes
Author-Supplied Keywords: lognormal fading channel, power control, Hamilton-Jacobi-Bellman (HJB)
equations
Abstract: This note considers uplink power control for lognormal fading channels by a stochastic control
approach. We seek approximate solutions to the Hamilton-Jacobi-Bellman (RIB) equation in terms of a local
polynomial approximation, and solve a two user system for illustration. An important issue for practical
systems is to reduce implementational complexity when operating in large population conditions; we show that
a single user based control design may be applied to such systems for partially decentralized optimization.
[ABSTRACT FROM AUTHOR]
18. Экспоненциальные оценки в запаздывающих системах временной задержки: подход,
основанный на линейной матрице неравенств.
Exponential Estimates for Retarded Time-Delay Systems: An LMI Approach.
By: Mondie, S.; Kharitonov, V. L.. p268-273, 6p;
Ключевые слова: CONTROL theory, DISTRIBUTION (Probability theory), EXPONENTIAL families
(Statistics), LINEAR systems, LYAPUNOV functions, LYAPUNOV stability
Author-Supplied Keywords: linear matrix inequalities (LMIs), Lyapunov-Krasovskii functiona, time-delay
system.Exponential estimate
Abstract: Exponential estimates and sufficient conditions for the exponential stability of linear time delay
systems are given. The proof make use of Lyapunov-Krasovskii functionals and the conditions are expressed in
terms of linear matrix inequalities. [ABSTRACT FROM AUTHOR]
19. Комментарии относительно модели приведения Рауса-Пейда для интервальных систем.
Comments on "On Routh -- Pade Model Reduction of Interval Systems.
By: Shih-Feng Yang. p273-274, 2p;
Ключевые слова: CONTROL theory, LYAPUNOV
MATHEMATICS, NUMERICAL analysis, STABILITY
stability,
MATHEMATICAL
models,
Author-Supplied Keywords: model reductio, Routh table, Interval systems
6
Abstract: A numerical example is given to show that the model reduction method of interval systems proposed
by Dolgin and Zeheb in the above paper cannot guarantee the stability of the reduced-order interval models.
[ABSTRACT FROM AUTHOR]
20. Замечания автора (модель приведения Рауса-Пейда для интервальных систем).
Author's Reply.
By: Dolgin, Yuri. p274-275, 2p;
Ключевые слова: ALGEBRA, APPROXIMATION theory, INTERVAL functions, POLYNOMIALS, SET
functions, GENERALIZATION
Author-Supplied Keywords: model reduction, Routh-Pade approximation, Interval systems
Abstract: The article reports that the existing generalization of the direct Routh table truncation method for
interval systems fails to produce a stable system. Additionally, it was shown how to extend the method to
ensure the stability of the resulting interval system. An omission in the proposed algorithm of building interval
Routh table-the newly calculated line in the table may be inconsistent with the last existing line. Two additional
conditions should be formulated to avoid this situation. To obtain the self-contained interval Routh table one
should replace the first column of the table. The aforementioned additional conditions ensure the stability of the
interval polynomial constructed from the truncated interval Routh table and at the same time argue the claim of
stating that it is impossible to ensure stability of the interval Routh approximants. The point-by-point property
holds only for pairs of rows and not for the span of three rows-and again it is not problematic.
21. Комментарии по вопросу квадратичной устойчивости и устойчивости динамических
интервальных систем.
Comments on "Quadratic Stability and Stabilization of Dynamic Interval Systems.".
By: Guang-Hong Yang; Kai-Yew Lum. p276-277, 2p;
Ключевые слова: INEQUALITIES (Mathematics),
MATHEMATICS, SET functions, STABILITY
INTERVAL
functions,
LINEAR
systems,
Author-Supplied Keywords: linear matrix inequality (LMI, quadratic stability, quadratic stabilization, Interval
systems
Abstract: In the above paper, it was claimed that the necessary and sufficient conditions for the quadratic
stability and stabilization of dynamic interval systems are given in terms of linear matrix inequalities (LMIs). In
this note, numerical examples are presented to show that the necessity of the conditions given in [1] does not
hold. [ABSTRACT FROM AUTHOR]
22. Сингулярные траектории и их роль в теории управления – Бернард Боннар и Моник Чиба.
Singular Trajectories and Their Role in Control Theory -- Bernard Bonnard and Monique Chyba.
By: Sussmann, Hector J.. p278-279, 2p;
BOOKS -- Reviews
Ключевые слова:*NONFICTION
Reviews & Products: SINGULAR Trajectories & Their Role in Control Theory (Book), People: BONNARD,
Bernard CHYBA, Monique
Abstract: Reviews the book "Singular Trajectories and Their Role in Control Theory," by Bernard Bonnard
and Monique Chyba.
7
Журнал IEEE Transactions on Computers, Feb2005, Vol. 54 Issue 2
Труды Института Инженеров по Электротехнике и Электронике (США)
«Вычислительная техника»
Том 54, вып. 2 (Февраль 2005 г.)
1. Редакционная статья.
Editor's Note.
By: Prasanna, Viktor K.; Lombardi, Fabrizio. p97-97, 1p;
Ключевые слова: INFORMATION technology, INTEGRATED circuits
Abstract: Presents an introduction to the February 2005 issue of the periodical "IEEE Transactions on
Computers."
2. Последовательный многоразрядный множитель нормального базиса невысокой сложности.
Low Complexity Word-Level Sequential Normal Basis MultipIier's.
By: Reyhani-Masoleh, Arash; Hasan, M. Anwar. P. 98-110, 13p;
Ключевые слова: COMPUTER input-output equipment, CRYPTOGRAPHY, FINITE fields (Algebra),
MULTIPLIERS (Mathematical analysis), RESEARCH, COMPUTER systems
Abstract: For efficient hardware implementation of finite field arithmetic units, the use of a normal basis is
advantageous. In this paper, two classes of architectures for multipliers over the finite field
GF(2<sup>m</sup>) are proposed. These multipliers are of sequential type, i.e., after receiving the coordinates
of the two input field elements, they go through k, 1  k  in, iterations (i.e., clock cycles) to finally yield all the
coordinates of the product in parallel. The value of k depends on the word size to For =[m/k] 1, these
multipliers are highly area efficient and require fewer number of logic gates even when compared with the most
area efficient multipliers available in the open literature. This makes the proposed multipliers suitable for
applications where the value of m is large but space is of concern, e.g., resource constrained cryptographic
systems. Additionally, if the field dimension in is composite, i.e., m = kn, then the extension of one class of the
architectures yields a highly efficient multiplier over composite fields. [ABSTRACT FROM AUTHOR]
3. Вторичное декодирование системы счисления для множителя высшего разряда.
Secondary Radix Recodings for Higher Radix Multipliers.
By: Seidel, Peter-Michael; McFearin, Lee D.; Matula, David W.. p111-123, 13p;
Ключевые слова: COST, METHODOLOGY, MULTIPLIERS (Mathematical analysis), PROBLEM solving,
RESEARCH, THEORY
Abstract: For progressively higher radices, the reduction in partial products obtained by the well-known
modified Booth multiplier recoding is offset by the need to precompute a rapidly increasing store of odd
multiples of the multiplicand as inputs to each partial product generator (PPG). We propose secondary radix
multiplier recoding schemes reducing the number of odd multiples required in the store for very high radix
recodings (e.g., radix 2<sup>r</sup> for 5  r  16). The proposed recoding schemes allow reduction of the
number of partial products in the implementation by factors between and beyond the reduction factors of 2, 3,
and 4 that can be achieved by traditional Booth recodings to radices 4, 8, and 16, respectively. We develop the
theory of these recodings and provide methodology for secondary radix selection. Finally, we summarize
latency and cost evaluations of selected implementations indicating potential cost and performance/cost
advantages for practical operand sizes. [ABSTRACT FROM AUTHOR]
4. Оптимальное двоичное представление пары целых чисел при обходе слева-направо.
Left-to-Right Optimal Signed-Binary Representation of a Pair of Integers.
By: Xiaoyu Ruan; Katti, Rajendra S.. p124-131, 8p;
Ключевые слова: BINARY system
METHODOLOGY, RESEARCH, THEORY
(Mathematics),
CRYPTOGRAPHY,
CURVES,
Elliptic,
Abstract: The common computation in elliptic curve cryptography (ECC), aP + bQ, is performed by extending
Shamir's method for the computation of the product of powers of two elements in a group. The complexity of
computing aP + bQ is dependent on the joint weight of the binary expansion of positive integers a and b. in this
8
paper, we give a method of finding a minimum joint weight signed- binary representation of a pair of integers.
Our method examines the integers a and b from left to right, thereby making the conversion to signed-binary
form compatible with Shamir's method. This reduces the memory required to perform the computation of aP +
bQ. [ABSTRACT FROM AUTHOR]
5. Повышение производительности монопроцессора путем адаптивного управления частотой
часов.
Uniprocessor Performance Enhancement through Adaptive Clock Frequency Control.
By: Uht, Augustus K.. p132-140, 9p;
Ключевые слова: COMPUTER input-output equipment, COST,
METHODOLOGY, MOTHERBOARDS (Microcomputers), RESEARCH
EXPERIMENTAL
design,
Abstract: Uniprocessor designs have always assumed worst-case operating conditions to set the operating
clock frequency and, hence, performance. However, much more performance can be obtained under typical
operating conditions through experimentation, but such increased frequency operation is subject to the
possibility of system failure and, hence, data loss/corruption. Further, mobile CPUs such as those in cell
phones/internet browsers do not adapt to their current surroundings (varying temperature conditions, etc.) so as
to increase or decrease operating frequency to maximize performance and/or allow operation under extreme
conditions. We present a digital hardware design technique realizing adaptive clock-frequency performanceenhancing digital hardware; the technique can be tuned to approximate performance maximization. The cost is
low and the design is straightforward. Experiments are presented evaluating such a design in a pipelined
uniprocessor realized in a Field programmable Gate Array (FPGA). [ABSTRACT FROM AUTHOR]
6. Локальное и системное воздействие часов на производите
ьность многопроцессорных чипов в режиме одновременной многопотоковой обработки.
Area and System Clock Effects on SMT/CMP Throughput.
By: Burns, James; Gaudiot, Jean-Luc. p141-152, 12p;
Ключевые слова: COMPUTER input-output equipment, EXPERIMENTAL design, METHODOLOGY,
PARALLEL processing (Electronic computers), TECHNOLOGY, COMPUTER systems, SIMULTANEOUS
multithreading processors
Abstract: Two approaches to high throughput processors are Chip Multi-Processing (CMP) and Simultaneous
Multi-Threading (SMI). CMP increases layout efficiency, which allows more functional units and a faster clock
rate. However, CMP suffers from hardware partitioning of functional resources. SMT increases functional unit
utilization by issuing instructions simultaneously from multiple threads. However, a wide-issue SMT suffers
from layout and technology implementation problems. We use silicon resources as our basis for comparison
and find that area and system clock have a large effect on the optimal SMT/CMP design trade. We show the
area overhead of SMT on each processor and how it scales with the width of the processor pipeline and the
number of SMT threads. The wide issue SMT delivers the highest single-thread performance with improved
multithread throughput. However, multiple smaller cores deliver the highest throughput. Also, alternate
processor configurations are explored that trade off SMT threads for other microarchitecture features. The
result is a small increase to single-thread performance, but a fairly large reduction in throughput. [ABSTRACT
FROM AUTHOR]
7. Дешевая и быстродействующая встроенная программа проверки парафазного кода.
Low Cost and High Speed Embedded Two-Rail Code Checker.
By: Omana, Martin; Rossi, Daniele; Metra, Cecilia. p153-164, 10p;
Ключевые слова: COST, ERROR, EXPERIMENTAL design, METHODOLOGY, RESEARCH,
SIMULATION methods
Abstract: In this paper, we propose a compact, high-speed, and highly testable parallel two-rail code checker,
particularly suitable to implementing embedded checkers. In fact, it requires only two input codewords to
satisfy the Totally-self-checking or Strongly code- Disjoint property with respect to a wide set of realistic
internal faults. Our checker can be employed to check the correct operation of a connected functional block
using the two-rail code, to implement the output two-rail code checker of "normal" checkers for unordered
9
codes, or to join together the error messages produced by various checkers (possibly using different codes)
present within the same self-checking system. The behavior of our checker has been verified by means of
electrical level simulations (performed using HSPICE), considering both nominal values and statistical
variations of electrical parameters. We also propose a possible modification to our checker internal structure
that makes it able to provide an output error indication remaining latched until the application of a proper reset
signal. Depending on the considered application and recovery technique to be employed upon the generation of
an error indication at the checker output, one proposed solution or the other may be preferable. [ABSTRACT
FROM AUTHOR]
8. Условные меры диагностируемости больших многопроцессорных систем.
Conditional Diagnosability Measures for Large Multiprocessor Systems.
By: Pao-Lien Lai; Jimmy J.M. Tan; Chien-Ping Chang; Lih-Hsing Hsu. p165-175, 11p;
Ключевые слова: COMPUTER networks, CONCEPTS, ELECTRONIC digital computers, GRAPHIC
methods, INFORMATION technology, MULTIPROCESSORS
Abstract: Diagnosability, has played an important role in the reliability of an interconnection network. The
classical problem of fault diagnosis is discussed widely and the diagnosability of many well-known networks
have been explored. In this paper, we introduce a new measure of diagnosability, called conditional
diagnosability, by restricting that any faulty set cannot contain all the neighbors of any vertex in the graph.
Based on this requirement, the conditional diagnosability of the n-dimensional hypercube is shown to be 4(n 2) + 1, which is about four times as large as the classical diagnosability. Besides, we propose some useful
conditions for verifying if a system is t-diagnosable and introduce a new concept, called a strongly idiagnosable system, under the PMC model. Applying these concepts and conditions, we investigate some tdiagnosable networks which are also strongly t-diagnosable. [ABSTRACT FROM AUTHOR]
9. t/k-диагностируемость ВС графа.
The t/k-Diagnosability of the BC Graphs.
By: Jianxi Fan; Xiaoia Lin. p176-184, 9p; (AN 15956869)
Ключевые слова: ALGORITHMS, COMPUTER security, ELECTRONIC data processing, FAULT-tolerant
computing, MULTIPROCESSORS, RESEARCH, COMPUTER system failures
Abstract: Processor fault diagnosis takes an important role in fault-tolerant computing on multiprocessor
systems. There are two classical diagnosis strategies-the precise strategy and the pessimistic strategy, both of
which are based on the well-known PMC diagnostic model. Nevertheless, the degree of diagnosability of the
system is limited under these two strategies. A better method, called the t/k-diagnosis strategy, is proposed by
Somani and Peleg, in which the identified fault-set is allowed to contain at most k fault-free processors. Using
this diagnosis strategy, the degree of diagnosability of the hypercube increases greatly as the number of the
fault-free processors in the fault-set increases. In this paper, we study the t/k-diagnosability of so-called BC
graphs that include hypercubes crossed cubes, Mabius cubes, and twisted cubes, etc. We show that any ndimensional BC graph is t(n, k)/k-diagnosable when n  4 and 0  k  it, where t(n, k) = (k + 1)n –1/2 (k + 1)(k
+2) + 1. Therefore, the crossed cube, the Mabius cube, and the twisted cube all have the same t/k-diagnosability
as the hypercube. As a result, the algorithms developed for diagnosis on the hypercube may also be used to
diagnose multiprocessor systems whose network topologies are based on BC graphs. [ABSTRACT FROM
AUTHOR]
10. Анализ адаптивности размера строки при параметризированном прямом вложении прямо
отображаемого кэша данных.
Line Size Adaptivity Analysis of Parameterized Loop Nests for Direct Mapped Data Cache.
By: D'Alberto, Paolo; Nicolau, Alexandru; Veidenbaum, Alexander; Gupta, Rajesh. p185-197, 13p;
Ключевые слова: COMPUTER input-output equipment, COMPUTER software, COMPUTER storage
devices, DATABASES, ELECTRONIC data processing, COMPUTER systems
Abstract: Caches are crucial components of modern processors; they allow high-performance processors to
access data fast and, due to their small sizes, they enable low-power processors to save energy-by
circumventing memory accesses. We examine efficient utilization of data caches in an adaptive memory
hierarchy. We exploit data reuse through the static analysis of cache-line size adaptivity. We present an
approach that enables the quantification of data misses with respect to cache-line size at compile-time using
10
(parametric) equations, which model interference. Our approach aims at the analysis of perfect loop nests in
scientific applications; it is applied to direct mapped cache and it is an extension and generalization of the
Cache Miss Equation (CME) proposed by Ghosh et al. (1999). Part of this analysis is implemented in a
software package, STAMINA. We present analytical results in comparison with simulation-based methods and
we show evidence of both the expressiveness and the practicability of the analysis. [ABSTRACT FROM
AUTHOR]
11. Эффективное восстановление в системе резервирования реального времени с переменным
временем исполнения.
Efficient Reclaiming in Reservation-Based Real-Time Systems with Variable Execution Times.
By: Caccamo, Marco; Buttazzo, Giorgio C.; Thomas, Deepu C.. p198-213, 16p;
Ключевые слова: ALGORITHMS, BROADBAND communication
SCHEDULING, SIMULATION methods, COMPUTER systems
systems,
METHODOLOGY,
Abstract: In this paper, we present a general CPU scheduling methodology for managing overruns in a realtime environment, where tasks may have different criticality, flexible timing constraints, shared resources, and
variable execution times. The proposed method enhances the Constant Bandwidth Server (CBS) by providing
two important extensions. First, it includes an efficient bandwidth sharing mechanism that reclaims the unused
bandwidth to enhance task responsiveness, it is proven that the reclaiming mechanism does not violate the
isolation property of the CBS and can be safely adopted to achieve temporal protection even when resource
reservations are not precisely assigned. Second, the proposed method allows the CBS to work in the presence of
shared resources. The enhancements achieved by the proposed approach turned out to be very effective with
respect to classical CPU reservation schemes. The algorithm complexity is O(lnN), where N is the number of
real-time tasks in the system, and its performance has been experimentally evaluated by extensive simulations.
[ABSTRACT FROM AUTHOR]
12. Новое высокоразрядное дерево для многоадресного управления ключами.
A Novel High-Order Tree for Secure Multicast Key Management.
By: Haibin Lu. p214-224, 11p;
Ключевые слова: ALGORITHMS, COMPUTER networks, DATA protection, ELECTRONIC surveillance,
SECURITY systems, MULTICASTING (Computer networks)
Abstract: Multicast is used to deliver packets to a group of users. To prevent users outside the group from
eavesdropping, a group key is maintained to encrypt the group communication, and the group key is changed
(rekeying) when a new. member joins the group or an existing member leaves the group. Re keying costs could
be as high as n a group with n members. The hierarchical key-tree approach is widely used to achieve
logarithmic rekeying costs. However, the key tree has to be kept balanced in order to keep logarithmic rekeying
costs. Goshi and Ladner [8] propose the height-balanced 2-3 tree (a B-tree of order in 3) and found that it has
the best performance among the balancing strategies tested. However, balancing a B-tree [8] after member
joining involves splitting oversized tree nodes and results in (in +2)h worst-Case rekeying cost, where h is the
tree height. We propose an NSBHO (Non-Split Balancing High-Order) tree in which balancing tree after
member joining does not involve node splitting, thus having 2h worst-case rekeying cost. An NSBHO tree is
always balanced and its nodes may not satisfy the node properties of a standard B-tree. Our proposed NSBHO
tree has the same worst- case rekeying cost incurred by a member removing as a B-tree [8] does. Our
experiments show that the NSBHO tree has better average- case rekeying performance and far superior worstcase rekeying performance than a B-tree. [ABSTRACT FROM AUTHOR]
13. Краткая статья по проблеме двоичного вложения.
Brief Contributions.
By: Dimitrakopoulos, Giorgos; Nikolos, Dimitris. p225-231, 7p;
Ключевые слова: EQUATIONS, EXPERIMENTAL design, INTEGRATED circuits -- Very large scale
integration, PROBLEM solving, RESEARCH, COMPUTER systems
11
Abstract: Parallel-prefix adders offer a highly efficient solution to the binary addition problem and are wellsuited for VLSI implementations. In this paper, a novel framework is introduced, which allows the design of
parallel-prefix Ling adders. The proposed approach saves one-logic level of implementation compared to the
parallel -prefix structures proposed for the traditional definition of carry lookahead equations and reduces the
fanout requirements of the design. Experimental results reveal that the proposed adders achieve delay
reductions of up to 14 percent when compared to the fastest parallel-prefix architectures presented for the
traditional definition of carry equations. [ABSTRACT FROM AUTHOR]
14. Ограничения пропускной способности однонаправленных каналов.
Bounds on the Capacity of the Unidirectional Channels.
By: Tallini, Luca G.. p232-235, 4p;
Ключевые слова: COMPUTER storage devices, ERRORS, INFORMATION technology, INTEGRATED
circuits, RESEARCH, COMPUTER systems
Abstract: In the usual binary symmetric channel, both 1 > 0 and 0 > 1 types of errors can occur. in the binary
asymmetric channel, only 1 > 0 type of errors can occur, whereas, in the unidirectional channel, both 1 > 0 and
0 > 1 types of errors can occur, but, unlike the binary symmetric channel, for any particular transmitted word of
length n, all the errors are of the same type. In general, a symmetric/unidirectional channel is a channel which
shows the behavior of both the symmetric and unidirectional channel. Many practical systems, such as
semiconductor memories and circuits, can be modeled as a unidirectional and/or symmetric/unidirectional
channels. This paper gives the formal definition of these last two channels and shows some interesting simple
bounds on their information capacities. [ABSTRACT FROM AUTHOR]
15. Установление связей, сохраняющих упорядочение переменных ROB DD, может быть
неоптимальным.
Bound-Set Preserving ROB DD Variable Orderings May Not Be Optimum.
By: Teslenko, Maxim; Martinelli, Andres; Dubrova, Elena. p236-237, 2p;
Ключевые слова: ALGEBRA, Boolean, FUNCTIONS, METHODOLOGY, RESEARCH, VARIABLES
(Mathematics), COMPUTER systems
Abstract: This paper reports a result concerning the relation between the best variable orderings of an FIOBDD
Gj and the decomposition structure of the Boolean function f represented by Gj. It was stated in [1] that, if f has
a decomposition of type f(X) = g(h<sub>1</sub>(Y<sub>1</sub>), h<sub>2</sub>(Y<sub>2</sub>), … ,
h<sub>k</sub>(Y<sub>k</sub>)), where (Y<sub>1</sub>), i ? (1, 2, … ,k), is a partition of X, then one of the
orderings which keeps the variables within the sets (Y<sub>i</sub>) adjacent is a best ordering for Gj. Using a
counterexample, we show that this statement is incorrect. [ABSTRACT FROM AUTHOR]
16. Предотвращение «взрыва» таблицы маршрутизации в пакете углубленной инспекции.
Preventing Session Table Explosion in Packet inspection Computers.
By: Hyogon Kim; Jin-Ho Kim; Inhye Kang; Saewooflg Bahk. p238-240, 3p;
Ключевые слова: COMPUTER networks, COMPUTER security, DATA protection, INTERNET,
MEMORY management (Computer science), SECURITY systems
Abstract: In this paper, we first show that various network attacks can cause fatal inflation of dynamic memory
usage on packet processing computers. Considering Transmission Control Protocol (TCP) is utilized by most of
these attacks as well as legitimate traffic, we propose a parsimonious memory management guideline based on
the design of the TCP and the analysis of real-life Internet traces. In particular, we demonstrate that, for all
practical purposes, one should not allocate memory for an embryonic TCP connection with roughly more than
10 seconds of inactivity. [ABSTRACT FROM AUTHOR]
12
Журнал IEEE Transactions on Information Theory, Jan 2005, Vol. 51 Issue 1,
Труды Института Инженеров по Электротехнике и Электронике (США)
«Теория информации»
Том 51, вып. 1 (Январь 2005 г.)
1. Награды победителям конкурса на лучшие публикации в Трудах Института Инженеров по
Электротехнике и Электронике «Теория информации» 2004 года
2004 IEEE Information Theory Society Paper Award. p2-3, 2p;
By KOETTER, Ral, VARDY, Alexander
Ключевые слова: ASSOCIATIONS, institutions, etc., DECODERS (Electronics), INFORMATION theory,
INFORMATION technology, AWARDS
Abstract: The article presents information about the 2004 IEEE Information Theory Society Paper Award. The
award was given to Ralf Koetter and Alexander Vardy for their paper "Algebraic Soft-Decision Decoding of
Reed-Solomon Codes," which appeared in the IEEE Transactions on Information Theory, vol. 49, pp. 28092825, November 2003. The IEEE Information Theory Society Paper award, consisting of a plaque and an
honorarium, is given annually for an outstanding publication in the field of information theory published
anywhere during the preceding two-year period. Its purpose is to recognize exceptional publications in the field
and to stimulate interest in, and encourage contributions to, the discipline. The award winner Ralf Koetter
received the diploma degree in electrical engineering from the Technical University of Darmstadt, Germany, in
1990 and the Ph.D. degree from Sweden. Another winner Alexander Vardy was born in Moscow in 1963. He
received the B.Sc. degree from the Technion, Haifa, Israel, in 1985 and the Ph.D. degree from the Tel-Aviv
University, Israel, in 1991.
2. Награды победителям конкурса на лучшие общие публикации общества по коммуникациям и
общества по теории информации IEEE за 2004 год.
2004 IEEE Communications Society and Information Theory Society Joint Paper Award.
By CAIRE, Giusepp, SHAMAI, Shlomo
Ключевые слова: ASSOCIATIONS,
INFORMATION theory, AWARDS
institutions,
etc.,
COMMUNICATION,
PUBLICATIONS,
Abstract: The article presents information about the 2004 IEEE Communications Society and Information
Theory Society Joint Paper Award. The award was presented to Giuseppe Caire and Shlomo Shamai for their
paper "On the Achievable Throughput of a Multiantenna Gaussian Broadcast Channel," which appeared in the
IEEE Transactions on Information Theory's July 2003 issue. The award consisting of a plaque and an
honorarium, is given annually for an outstanding paper that appeared in any of the two societies' publications
during the preceding year. The purpose of the award, established in 1999, is to recognize exceptional published
works in research areas of common interest to the two societies. The award winner Guseppe Caire was born in
Torino in Italy in 1965. He received the B.Sc. degree in electrical engineering from the Princeton University in
1992. He did his Ph.D.degree from Politecnino di Torino in 1994. The other winner Shlomo Shamai received
the B.Sc., M.Sc. and Ph.D. degrees in electrical engineering from the Tecnion-Israel Institute of Technology,
Haifa, 1975, 1981 and 1986 respectively.
3. Универсальный дискретный алгоритм шумоподавления: определяемый канал.
Universal Discrete Denoising: Known Channel.
By: Weissman, Tsachy; Ordentlich, Erik; Seroussi, Gadiel; Verdu, Sergio; Weinberger, Marcelo J.. p5-28, 24p
Ключевые слова: ALGEBRA, ALGORITHMS, ARITHMETIC -- Foundations, FORECASTING,
RECONSTRUCTION, SOUND
Abstract: A discrete denoising algorithm estimates the input sequence to a discrete memoryless channel
(DMC) based on the observation of the entire output sequence. For the case in which the DMC is known and
the quality of the reconstruction is evaluated with a given single-letter fidelity criterion, we propose a discrete
denoising algorithm that does not assume knowledge of statistical properties of the input sequence. Yet, the
algorithm is universal in the sense of asymptotically performing as well as the optimum denoiser that knows the
input sequence distribution, which is only assumed to be stationary. Moreover, the algorithm is universal also in
a semi-stochastic setting, in which the input is an individual sequence, and the randomness is due solely to the
13
channel noise. The proposed denoising algorithm is practical, requiring a linear number of register-level
operations and sublinear working storage size relative to the input data length. [ABSTRACT FROM
AUTHOR]
4. О пропускной способности гауссовых релейных каналов (MIMO).
On the Capacity of MIMO Relay Channels.
By: Wang, Bo; Zhang, Junshan; Host-Madsen, Anders. p29-43, 15p;
Ключевые слова: ALGORITHMS, ARITHMETIC -- Foundations, ECONOMICS, Mathematical,
EQUATIONS, MATHEMATICS, NUMERALS, RELAY control systems
Abstract: We study the capacity of multiple-input multiple- output (MIMO) relay channels. We first consider
the Gaussian MIMO relay channel with fixed channel conditions, and derive upper bounds and lower bounds
that can be obtained numerically by convex programming. We present algorithms to compute the bounds. Next,
we generalize the study to the Rayleigh fading case. We find an upper bound and a lower bound on the ergodic
capacity. It is somewhat surprising that the upper bound can meet the lower bound under certain regularity
conditions (not necessarily degradedness), and therefore the capacity can be characterized exactly; previously
this has been proven only for the degraded Gaussian relay channel. We investigate sufficient conditions for
achieving the ergodic capacity; and in particular, for the case where all nodes have the same number of
antennas, the capacity can be achieved under certain signal-to-noise ratio (SNR) conditions. Numerical results
are also provided to illustrate the bounds on the ergodic capacity of the MIMO relay channel over Rayleigh
fading. Finally, we present a potential application of the MIMO relay channel for cooperative communications
in ad hoc networks. [ABSTRACT FROM AUTHOR]
5. Классическая пропускная способность и квантовая пропускная способность квантового
канала.
The Private Classical Capacity and Quantum Capacity of a Quantum Channel.
By: Devetak, Igor. p44-55, 12p;
Ключевые слова: ALGEBRA, ARITHMETIC, MATHEMATICIANS, MATHEMATICS, QUANTUM
theory, STATISTICS
Abstract: A formula for the capacity of a quantum channel for transmitting private classical information is
derived. This is shown to be equal to the capacity of the channel for generating a secret key, and neither
capacity is enhanced by forward public classical communication. Motivated by the work of Schumacher and
Westmoreland on quantum privacy and quantum coherence, parallels between private classical information and
quantum information are exploited to obtain an expression for the capacity of a quantum channel for generating
pure bipartite entanglement. The latter implies a new proof of the quantum channel coding theorem and a
simple proof of the converse. The coherent information plays a role in all of the above mentioned capacities.
[ABSTRACT FROM AUTHOR]
6. Дистанционная подготовка квантуемых состояний.
Remote Preparation of Quantum States.
By: Bennett, Charles H.; Hayden, Patrick; Leung, Debbie W.; Shor, Peter W.; Winter, Andreas. p56-74, 19p;
Ключевые слова: DATA compression (Telecommunication), DATA transmission systems, DIGITAL
communications, MATHEMATICS, QUANTUM theory, SPECIFICATIONS
Abstract: Remote state preparation is the variant of quantum state teleportation in which the sender knows the
quantum state to be communicated. The original paper introducing teleportation established minimal
requirements for classical communication and entanglement but the corresponding limits for remote state
preparation have remained unknown until now: previous work has shown, however, that it not only requires
less classical communication but also gives rise to a tradeoff between these two resources in the appropriate
setting. We discuss this problem from first principles, including the various chokes one may follow in the
definitions of the actual resources. Our main result is a general method of remote state preparation for arbitrary
states of many qubits, at a cost of 1 bit of classical communication and 1 bit of entanglement per qubit sent. In
this "universal" formulation, these ebit and chit requirements are shown to be simultaneously optimal by
exhibiting a dichotomy. Our protocol then yields the exact tradeoff curve for memoryless sources of pure states
14
(including the case of incomplete knowledge of the ensemble probabilities), based on the recently established
quantum-classical tradeoff for visible quantum data compression. A variation of that method allows us to solve
the even more general problem of preparing entangled states between sender and receiver (i.e., purifications of
mixed state ensembles). The paper includes an extensive discussion of our results, including the impact of the
choice of model on the resources, the topic of obliviousness, and an application to private quantum channels
and quantum data hiding. [ABSTRACT FROM AUTHOR]
7. О существовании катализаторов преобразования квантовых состояний.
The Existence of Quantum Entanglement Catalysts.
By: Xiaoming Sun; Runyao Duan; Mingsheng Ying. p75-80, 6p;
Ключевые слова: ALGEBRA, ALGORITHMS, ARITHMETIC -- Foundations, CATALYSTS, CHEMICAL
inhibitors, MATHEMATICS, QUANTUM theory
Abstract: Without additional resources, it is often impossible to transform one entangled quantum state into
another with local quantum operations and classical communication. Jonathan and Plenio (Phys. Rev. Left., vol.
83, p. 3566, 1999) presented an interesting example showing that the presence of another state, called a catalyst,
enables such a transformation without changing the catalyst. They also pointed out that in general it is very hard
to find an analytical condition under which a catalyst exists. In this paper, we study the existence of catalysts
for two incomparable quantum states. For the simplest case of 2 2 catalysts for transformations from one 4  4
state to another, a necessary and sufficient condition for existence is found. For the general case, we give an
efficient polynomial time algorithm to decide whether a k  k catalyst exists for two n  n incomparable states,
where k is treated as a constant. [ABSTRACT FROM AUTHOR]
8. Стохастический анализ турбо-декодирования.
Stochastic Analysis of Turbo Decoding.
By: Minyue Fu. p81-100, 20p
Ключевые слова: CALCULUS, MATHEMATICAL analysis, PROGRAMMING languages (Electronic
computers), RANDOM operators, STOCHASTIC analysis, TURBO (Computer program language)
Abstract: This paper proposes a stochastic framework for dynamic modeling and analysis of turbo decoding.
By modeling the input and output signals of a turbo decoder as random processes, we prove that these signals
become ergodic when the block size of the code becomes very large. This basic result allows us to easily model
and compute the statistics of the signals in a turbo decoder. Using the ergodicity result and the fact that a sum of
lognormal distributions is well approximated using a lognormal distribution, we show that the input-output
signals in a turbo decoder, when ex- pressed using log-likelihood ratios (LLR5), are well approximated using
Gaussian distributions. Combining the two results above, we can model a turbo decoder using two input
parameters and two output parameters (corresponding to the means and variances of the input and output
signals). Using this model, we are able to re- veal the whole dynamics of a decoding process. We have
discovered that a typical decoding process is much more intricate than previously known, involving two regions
of attraction, several fixed points, and a stable equilibrium manifold at which all decoding trajectories converge.
Some applications of the stochastic framework are also discussed, including a fast decoding scheme.
[ABSTRACT FROM AUTHOR]
9. Перемеживатели турбо-кодов, использующие перестановочные полиномы в целочисленных
кольцах.
Interleavers for Turbo Codes Using Permutation Polynomials Over Integer Rings.
By: Jing Sun; Takeshita, Oscar Y.. p101-119, 19p;
Ключевые слова: COMBINATORIAL analysis, GROUP theory, MATHEMATICS, PROGRAMMING
(Mathematics), PROGRAMMING languages (Electronic computers), TURBO (Computer program language)
Abstract: In this paper, a class of deterministic interleavers for turbo codes (TCs) based on permutation
Polynomials over Z<sub>N</sub> is introduced. The main characteristic of this class of interleavers is that they
can be algebraically designed to 'fit a given component code. Moreover, since the interleaver can be generated
by a few simple computations, storage of the interleayer tables can be avoided. By using the permutation
polynomial-based interleavers, the design of the interleavers reduces to the selection of the coefficients of the
15
polynomials. it is observed that the performance of the TCs using these permutation polynomial-based
interleavers is usually dominated by a subset of input weight 2m error events. The minimum distance and its
multiplicity (or the first few spectrum lines) of this subset are used as design criterion to select good
permutation polynomials. A simple method to enumerate these error events for small m is presented. Searches
for good interleavers are performed. The decoding performance of these interleavers is close to S-random
interleavers for long frame sizes. For short frame sizes, the new interleavers outs perform S-random
interleavers. [ABSTRACT FROM AUTHOR]
10. Декодирование, основанное на верификации, в пакетных кодах проверки четности низкой
плотности
Verification-Based Decoding for Packet-Based Low-Density Parity-Check Codes.
By: Luby, Michael G.; Mitzenmacher, Michael. p120-127, 8p
Ключевые слова: ALGEBRA, CIPHERS, LOGIC, MATHEMATICS, PACKET switching (Data
transmission), PROGRAMMING (Mathematics), DECODERS & decoding
Abstract: We introduce and analyze verification-based decoding for low-density parity-check (LDPC) codes,
an approach specifically designed to manipulate data in packet-sized units. Verification-based decoding
requires only linear time for both encoding and decoding and succeeds with high probability under random
errors. We describe how to utilize code scrambling to extend our results to channels with errors controlled by
an oblivious adversary. [ABSTRACT FROM AUTHOR]
11. Совместимость поддержки векторных машин и остальных регуляризованных сортировщиков
ядра.
Consistency of Support Vector Machines and Other Regularized Kernel Classifiers.
By: Steinwart, Ingo. p128-142, 15p;
Ключевые слова: ALGEBRAS, Linear, CLASSIFICATION, MATHEMATICS, STATISTICS, VECTOR
algebra, VECTOR analysis
Abstract: It is shown that various classifiers that are based on minimization of a regularized risk are
universally consistent, i.e., they can asymptotically learn in every classification task. The role of the loss
functions used in these algorithms is considered in detail. As an application of our general framework, several
types of support vector machines (SVMs) as well as regularization networks are treated. Our methods combine
techniques from stochastics, approximation theory, and functional analysis. [ABSTRACT FROM AUTHOR]
12. Условная важность выборочных оценок.
Conditional Importance Sampling Estimators.
By: Bucklew, James A.. p143-153, 11p;
Ключевые слова: ARITHMETIC, MATHEMATICAL statistics,
SAMPLING (Statistics), STATISTICS
MATHEMATICS,
SAMPLING,
Abstract: We give a unified presentation of the conditional importance sampling estimators. We show that they
are always better than their noncoditional counterparts. We then present the large diviation theory associated
with these estimators. In particular, we give conditional simulation distributions that are optimal in the sense
that they are efficient. Interestingly enough, these distributions will not in general be the usual exponential
shifts. We give examples showing how to use the theory developed. [ABSTRACT FROM AUTHOR]
13. Равно-диагональная декомпозиция и ее применение в проектировании устройства
предварительного кодирования при последовательно-компенсационном детектировании.
Equal-Diagonal QR Decomposition and its Application to Precoder Design for Successive-Cancellation
Detection.
By: Jian-Kang Zhang; Aleksandar Kavcic; Kon Max Wong. p154-172, 19p;
Ключевые слова: DECOMPOSITION (Mathematics), DETECTORS, MATHEMATICS, MULTIPLEXING,
ORTHOGONAL decompositions, PROBABILITIES
16
Abstract: In multiple-input multiple-output (MIMO) multi- user detection theory, the QR decomposition of the
channel matrix H can be used to form the back-cancellation detector. In this paper, we propose an optimal QR
decomposition, which we call the equal-diagonal QR decomposition, or briefly the QRS decomposition. We
apply the decomposition to precoded successive-cancellation detection, where we assume that both the
transmitter and the receiver have perfect channel knowledge. We show that, for any channel matrix H, there
exists a unitary precoder matrix S, such that HS = QR, where the nonzero diagonal entries of the upper
triangular matrix H in the QR decomposition of HR are all equal to each other. The precoder and the resulting
successive-cancellation detector have the following properties. a) The minimum Euclidean distance between
two signal points at the channel output is equal to the minimum Euclidean distance between two constellation
points at the precoder input up to a multiplicative factor that equals the diagonal entry in the R-factor. b) The
superchannel HS naturally exhibits an optimally ordered column permutation, i.e., the optimal detection order
for the vertical Bell Labs layered space-time (V-BLAST) detector is the natural order. c) The precoder S
minimizes the block error probability of the QR successive cancellation detector. d) A lower and an upper
bound for the free distance at the channel output is expressible in terms Of the diagonal entries of the H-factor
in the QR decomposition of a channel matrix. e) The precoder S maximizes, the lower bound of the channel's
free distance subject to a power constraint. 1) For the optimal precoder 5, the performance of the QR detector is
asymptotically (at large signal-to-noise ratios (SNRs)) equivalent to that of the maximum-likelihood detector
(MLD) that uses the same precoder. Further, in this paper we consider two multiplexing schemes: time-division
multiple access (TDMA) and orthogonal frequency-division... [ABSTRACT FROM AUTHOR]
14. Информационно-теоретический подход к определению канонических приемников с
решающей обратной связью в гауссовых каналах.
An Information-Theoretic Framework for Deriving Canonical Decision-Feedback Receivers in Gaussian
Channels.
By: Guess, Tommy; Varanasi, Mahesh K.. p173-187, 15p;
Ключевые слова: DISTRIBUTION (Probability theory), GAUSSIAN measures, GAUSSIAN processes,
INFORMATION theory, MATHEMATICS, MEASURE theory
Abstract: A framework is presented that allows a number of known results relating feedback equalization,
linear prediction, and mutual information to be easily understood. A lossless, additive decomposition of mutual
information in a general class of Gaussian channels is introduced and shown to produce an informationpreserving canonical decision -feedback receiver. The approach is applied to intersymbol interference (ISI)
channels to derive the well-known minimum mean-square error (MMSE) decision-feedback equalizer (DFE).
When applied to the synchronous code-division multiple-access (CDMA) channel, the result is the MMSE (or
signal-to-interference ratio (SIR) maximizing) decision-feedback detector, which is shown to achieve the
channel sum-capacity at the vertices of the capacity region. Finally, in the case of the asynchronous CDMA
channel we are able to give new connections between information theory, decision-feedback receivers, and
structured factorizations of multivariate spectra. [ABSTRACT FROM AUTHOR]
15. Проектирование структурированного тесного кадрирования с помощью метода переменных
проекций.
Designing Structured Tight Frames Via an Alternating Projection Method.
By: Tropp, Joel A.; Dhillon, Inderjit S.; Heath Jr., Robert W.; Strohmer, Thomas. p188-209, 22p;
Ключевые слова: ALGORITHMS, GEOMETRY, Descriptive, MATHEMATICS, PROJECTION,
SPECIFICATIONS, DECODERS & decoding
Abstract: Tight frames, also known as general Welch-bound-equality sequences, generalize orthonormal
systems. Numerous applications-including communications, coding, and sparse approximation-require finitedimensional tight frames that possess additional structural properties. This paper proposes an alternating
projection method that is versatile enough to solve a huge class of inverse eigenvalue problems (IEPs), which
includes the frame design problem. To apply this method, one needs only to solve a matrix nearness problem
that arises naturally from the design specifications. Therefore, it is the fast and easy to develop versions of the
algorithm that target new design problems. Alternating projection will often succeed even if algebraic
constructions are unavailable. To demonstrate that alternating projection is an effective tool for frame design,
the paper studies some important structural properties in detail. First, it addresses the most basic design
17
problem: constructing tight frames with prescribed vector norms. Then, it discusses equiangular tight frames,
which are natural dictionaries for sparse approximation. Finally, it examines tight frames whose individual
vectors have low peak-to-average-power ratio (PAR), which is a valuable property for code-division multipleaccess (CDMA) applications. Numerical experiments show that the proposed algorithm succeeds in each of
these three cases. The appendices investigate the convergence properties of the algorithm. [ABSTRACT FROM
AUTHOR]
16. Принципы кодирования для обеспечения отказоустойчивости линейных динамических
систем.
Coding Approaches to Fault Tolerance in Linear Dynamic Systems.
By: Hadjicostis, Christoforos N.; Verghese, George C.. p210-228, 19p;
Ключевые слова: ALGEBRAS, Linear, DIFFERENTIAL equations, Linear, LINEAR systems,
MATHEMATICS, SYSTEM theory, DECODERS & decoding
Abstract: This paper discusses fault tolerance in discrete-time dynamic systems, such as finite-state controllers
or computer simulations, with focus on the use of coding techniques to efficiently provide fault tolerance to
linear finite-state machines (LFSMs). Unlike traditional fault tolerance schemes, which rely heavily-particularly
for dynamic systems operating over extended time horizons-on the assumption that the error-correcting
mechanism is fault free, we are interested in the case when all components of the implementation are fault
prone. The paper starts with a paradigmatic fault tolerance scheme that systematically adds redundancy into a
discrete-time dynamic system in a way that achieves tolerance to transient faults in both the state transition and
the error-correcting mechanisms. By combining this methodology with low-complexity error-correcting coding,
we then obtain an efficient way of providing fault tolerance to k identical unreliable LFSMs that operate in
parallel on distinct input sequences. The overall construction requires only a constant amount of redundant
hardware per machine (but sufficiently large k) to achieve an arbitrarily small probability of overall failure for
any prespecified (finite) lime interval, leading in this way to a lower bound on the computational capacity of
unreliable LFSMs. [ABSTRACT FROM AUTHOR]
17. Коды для пространственно-частотного канала, характеризуемого полной загрузкой и полным
разнесением частот, при оптимальном кодировании информации.
Full-Rate Full-Diversity Space-Frequency Codes With Optimum Coding Advantage.
By: Weifeng Su; Safar, Zoltan; Ray Liu, K. J.. p229-249, 21p;
Ключевые слова: CODING theory, DIFFERENTIAL equations,
MATHEMATICS, SOUND -- Transmission, DECODERS & decoding
Linear,
ELECTRIC
lines,
Abstract: In this paper, a general space-frequency (SF) block code structure is proposed that can guarantee
full-rate (one channel symbol per subcarrier) and full-diversity transmission in multiple-input multiple-outputorthogon frequency-division multiplexing (MIMO-OFDM) systems. The proposed method can be used to
construct SF codes for an arbitrary number of transmit antennas, any memoryless modulation and arbitrary
power-delay profiles. Moreover, assuming that the power-delay profile is known at the transmitter, we devise
an interleaving method to maximize the overall performance of the code. We show that the diversity product
can be decomposed as the product of the "intrinsic" diversity product, which depends only on the used signal
constellation and the code design, and the "extrinsic" diversity product, which depends only on the applied
interleaving method and the power delay profile of the channel. Based on this decomposition, we pro- pose an
interleaving strategy to maximize the "extrinsic" diversity product. Extensive simulation results show that the
proposed SF codes outperform the previously existing codes by about 3-5 dB, and that the proposed
interleaving method results in about 1-3-dR performance improvement compared to random interleaving.
[ABSTRACT FROM AUTHOR]
18. Границы пространственного распределения в кодах определенной разрядности.
Bounds on Distance Distributions in Codes of Known Size.
By: Ashikhmin, Alexei E.; Cohen, Gerard D.; Krivelevich, Michael; Litsyn, Simon N.. p250-258, 9p;
Ключевые слова: CODING theory, ELECTRIC lines, MATHEMATICAL analysis, MATHEMATICAL
statistics, SOUND -- Transmission, TIME-series analysis, DECODERS & decoding
18
Abstract: We treat the problem of bounding components of the possible distance distributions of codes given
the knowledge of their size and possibly minimum distance. Using the Beckner inequality from harmonic
analysis, we derive upper bounds on distance distribution components which are sometimes better than earlier
ones due to Ashikhmin, Barg, and Litsyn. We use an alternative approach to derive upper bounds on distance
distributions in linear codes. As an application of the suggested estimates we get an upper bound on the
undetected error probability for an arbitrary code of given size. We also use the new bounds to derive better
upper estimates on the covering radius, as well as a lower bound on the error-probability threshold, as a
function of the code's size and minimum distance. [ABSTRACT FROM AUTHOR]
19. Геометрические коды Гоппа, соответствующие ограничению Гильберта-Варшамова.
Goppa Geometric Codes Achieving the Gilbert -- Varshamov Bound.
By: Chaoping Xing. p259-264, 6p;
Ключевые слова: GEOMETRICAL constructions, GEOMETRY, MATHEMATICS, GEOMETRIC
dissections, ANGLES (Geometry), DECODERS & decoding
Abstract: Based on 8 -zeta-functions of curves over finite fields, we show that Goppa geometry codes achieve
the q-ary Gilbert- Varshamoy bound for all prime powers q (including q = 2).
[ABSTRACT FROM AUTHOR] 20.
20. Уточнение границ вероятности ошибки в слове в кодах RA(2) при декодировании, основанном
на методе линейного программирования.
Improved Bounds on the Word Error Probability of RA(2) Codes With Linear-Programming-Based Decoding.
By: Halabi, Nissim; Even, Guy. p265-280, 16p;
Ключевые слова: ALGORITHMS, CIPHERS, COMPLEXES, GEOMETRY, Algebraic, LINEAR models
(Statistics), MATHEMATICS, DECODERS & decoding
Abstract: This paper deals with the linear-programming-based decoding algorithm of Feldman and Karger for
repeat-accumulate "turbo-like" codes. We present a new structural characterization that captures the event that
decoding fails. Based on this structural characterization, we develop polynomial algorithms that, given an RA
(2) code, compute upper and lower bounds on the word error probability P<sub>w</sub> for the binarysymmetric and the additive white Gaussian noise (AWGN) channels. Our experiments with an implementation
of these algorithms for bounding P<sub>w</sub> demonstrate in many interesting cases an improvement in the
upper bound on the word error probability by a factor of over 1000 compared to the bounds by Feldman et al..
The experiments also indicate that the improvement in upper bound increases as the codeword length increase
and the channel noise decrease. The computed lower bounds on the word error probability in our experiments
are roughly ten times smaller than the upper bound. [ABSTRACT FROM AUTHOR]
21. Р-адические величины весов в Абелевых кодах выше Z<sub>p</sub><sup>d</sup>.
P-Adic Valuation of Weights in Abelian Codes Over Z<sub>p</sub><sup>d</sup>.
By: Katz, Daniel J.. p281-305, 25p;
Ключевые слова: APPROXIMATION theory, LINEAR operators, MATHEMATICS, MENSURATION,
OPERATOR theory, WEIGHTS & measures
Abstract: Counting polynomial techniques introduced by Wilson are used to provide analogs of a theorem of
McEliece. McEliece's original theorem relates the greatest power of p dividing the Hamming weights of words
in cyclic codes over GF (p) to the length of the smallest unity-product sequence of nonzeroes of the code.
Calderbank, Li, and Poonen presented analogs for cyclic codes over Z<sub>2<sup>d</sup></sub> using
various weight functions (Hamming, Lee, and Eudidean weight as well as count of occurrences of a particular
symbol). Some of these results were strengthened by Wilson, who also considered the alphabet
Z<sub>p<sup>d</sup></sub> for p an arbitrary prime. These previous results, new strengthened versions, and
generalizations are proved here in a unified and comprehensive fashion for the larger class of Abelian codes
over Z<sub>p<sup>d</sup></sub> with p any prime. For Abelian codes over Z<sub>4</sub>, combinatorial
methods for use with counting polynomials are developed. These show that the analogs of McEliece's theorem
obtained by Wilson (for Hamming weight, Lee weight, and symbol counts) and the analog obtained here for
19
Euclidean weight are sharp in the sense that they give the maximum power of 2 that divides the weights of all
the codewords whose Fourier transforms have a specified support. [ABSTRACT FROM AUTHOR]
22. Обнаружение и оценка ошибочных сложных случайных сигналов.
Detection and Estimation of Improper Complex Random Signals.
By: Schreier, Peter J.; Scharf, Louis L.; Mullis, Clifford T.. p306-312, 7p;
Ключевые слова: ALGEBRA, Abstract, COMMUNICATION, ESTIMATION theory, MATHEMATICAL
analysis, MATHEMATICS, SIGNALS & signaling
Abstract: Nonstationary complex random signals are in general improper (not circularly symmetric), which
means that their complementary covariance is nonzero. Since the Karhunen-Loeve (K-L) expansion in its
known form is only valid for proper processes, we derive the improper version of this expansion. it produces
two sets of eigenvalues and improper observable coordinates. We then use the K-L expansion to solve the
problems of detection and estimation of improper complex random signal in additive white Gaussian noise. We
derive a general result comparing the performance of conventional processing, which ignores complementary
covariances, with processing that takes these into account in particular, for the detection and estimation
problems considered, we find that the performance gain, as measured by deflection and mean-squared error
(MSE), respectively, can be as large as a factor of 2 In a communications example, we show how this finding
generalizes the result that coherent processing enjoys a 3-dB gain over noncoherent processing. [ABSTRACT
FROM AUTHOR]
23. Об адаптации минимального расхождения к заданным маргинальным значениям в
дискретном двумерном распределении.
On Minimum Divergence Adaptation of Discrete Bivariate Distributions to Given Marginals.
By: Vajda, Igor; van der Meulen, Edward C.. p313-320, 8p;
Ключевые слова: DISTRIBUTION (Probability theory), LOGIC, MATHEMATICS, STATISTICS,
DIFFERENCES
Abstract: This correspondence considers the class P of discrete bivariate distributions p with marginals a(p),
b(p) and the subclass P<sub>a,b</sub>  P of distribution with given marginals a and b. For an arbitrary q  P
we study the distributions &ptilde;  P<sub>a,b</sub> minimizing on P<sub>a,b</sub> various -divergences
D<sub>?</sub>(p,q) for convex  with finite (0). [ABSTRACT FROM AUTHOR]
24. Об обратной связи и классической пропускной способности зашумленного квантового канала.
On Feedback and the Classical Capacity of a Noisy Quantum Channel.
By: Bowen, Garry; Nagarajan, Rajagopal. p320-324, 5p;
Ключевые слова: CHANNELS (Hydraulic engineering), COMMUNICATION, MATHEMATICS,
QUANTUM theory, APPROACH channels (Hydraulic engineering)
Abstract: In Shannon information theory, the capacity of a memoryless communication channel cannot be
increased by the use of feedback from receiver to sender. In this correspondence, the use of classical feedback
is shown to provide no increase in the unassisted classical capacity of a memoryless quantum channel when
feedback is used across nonentangled input states, or when the channel is an entanglement-breaking channel.
This gives a generalization of the Shannon theory for certain classes of feedback protocols when transmitting
through noisy quantum communication channels. [ABSTRACT FROM AUTHOR]
25. Алгебраическая идентификация в оптимальных неортогональных комплексных
пространственно-временных блочных кодах 44 с использованием тензорного произведения на
кватернионах.
Algebraic Identification for Optimal Nonorthogonality 4  4 Complex Space-Time Block Codes Using Tensor
Product on Quaternions.
By: Ming-Yang Chen; Hua-Chieh Li; Soo-Chang Pei. p324-330, 7p;
Ключевые слова: ALGEBRA, ALGEBRAIC fields, CURVES, MATHEMATICS, QUATERNIONS,
VECTOR analysis
20
Abstract: The design potential of using quaternionic numbers to identify a 4  4 real orthogonal space-time
block code has been exploited in various communication articles. Although it has been shown that orthogonal
codes in full-rate exist only for 2 Tx-antennas in complex constellations, a series of complex quasi-orthogonal
codes for 4 Tx-antennas is still proposed to have good performance recently. This quasi-orthogonal scheme
enables the codes to reach the optimal nonorthogonality, which can be measured by taking the expectation over
all transmit signals of the ratios between the powers of the off-diagonal and diagonal components. This
correspondence extends the quaternionic identification to the above encoding methods. Based upon tensor
product for giving the quaternionic space a linear extension, a complete necessary and sufficient condition for
identifying any given complex quasi-orthogonal code with the extended space is generalized by considering
every possible two-dimensional R-algebra. [ABSTRACT FROM AUTHOR]
26. Звездная пространственная инвариантность ортогональных пространственно-временных
блочных кодов.
Constellation Space Invariance of Orthogonal Space --Time Block Codes.
By: Gharavi-Alkhansari, Mohammad; Gershman, Alex B.. p331-334, 4p;
Ключевые слова: CALCULUS of variations, CODING theory, COMBINATORIAL designs &
configurations, CURVES, Orthogonal, FUNCTIONAL equations, MATHEMATICS
Abstract: In this correspondence, we prove an interesting property of orthogonal space-time block codes
(OSTBCs). For flat block-fading channels, it is shown that the internal structure of the vector space of the input
constellation remains invariant to the effects of both the OSTBC and the channel except for certain scaling
factors. This property sheds light on the mechanism of maximum-likelihood (ML) decoding of OSTBCs and, in
particular, provides an alternative explanation of why optimal decoding can be reduced to symbol-by-symbol
decoding. New simple expressions for the ML decoder are obtained which clarify its intrinsic structure.
[ABSTRACT FROM AUTHOR]
27. Использование управляемого поиска экстремума для геометрического построения множеств
треугольников разностей.
Using Directed Hill-Climbing for the Construction of Difference Triangle Sets.
By: Koubi, Sharon; Mata-Montero, Mannque; Shalaby, Nabil. p335-339, 5p;
Ключевые слова: ALGEBRA, ALGORITHMS, GEOMETRY, Plane, MATHEMATICS, TRIANGLE,
SHAPES
Abstract: This correspondence describes the use of the directed hill-climbing algorithm for finding improved
upper bounds of difference triangle sets. [ABSTRACT FROM AUTHOR]
28. Улучшенное построение нелинейных эластичных узлов замен (S-Boxes).
Improved Construction of Nonlinear Resilient S-Boxes.
By: Gupta, Kishan Chand; Sarkar, Palash. p339-348, 10p;
Ключевые слова: LGEBRA, BOXES, CONTAINERS, MATHEMATICS, NONLINEAR control theory,
TRIANGLE, SHAPES
Abstract: We provide two new construction methods for nonlinear resilient functions. The first method is a
simple modification of a construction due to Zhang and Zheng and constructs n-input, m-output resilient Sboxes with degree d > m. We prove by an application of the Griesnier bound for linear error-correcting codes
that the modified Zhang-Zheng construction is superior to the previous method of Cheon in Crypto 2001. Our
second construction uses a sharpened version of the Maiorana-McFar- land technique to construct nonlinear
resilient functions. The nonlinearity obtained by our second construction is better than previously known
construction methods. [ABSTRACT FROM AUTHOR]
29. Максимальная квадратичная корреляция, общий размер и общая асимптотическая
эффективность минимальной общей квадратичной корреляции множеств бинарных сигнатур.
The Maximum Squared Correlation, Sum Capacity, and Total Asymptotic Efficiency of Minimum TotalSquared-Correlation Binary Signature Sets.
By: Karystinos, George N.; Pados, Dimitris A.. p348-355, 8p;
21
Ключевые слова: INARY system (Mathematics), CORRELATION (Statistics), MATHEMATICAL
statistics, MATHEMATICS, NUMERATION, STATISTICS
Abstract: The total squared correlation (TSC), maximum squared correlation (MSC), sum capacity (C/sum),
and total asymptotic efficiency (TAE) of underloaded signature sets, as well as the TSC and C<sub>sum</sub>
of over- loaded signature sets are metrics that are optimized simultaneously over the real/complex field. In this
present work, closed-form expressions are derived for the MSC, C<sub>sum</sub>, and TAE of minimumTSC binary signature sets. The expressions disprove the general equivalence of these performance metrics over
the binary field and establish conditions on the number of signatures and signature length under which
simultaneous optimization can or cannot be possible. The sum-capacity loss of the recently designed minimumTSC binary sets is found to be rather negligible in comparison with minimum-TSC real/complex-valued
(Welch-bound-equality) sets. [ABSTRACT FROM AUTHOR]
30. Контр- пример к открытой проблеме минимального запаздывания в ортогональной
конструкции с наибольшей скоростью передачи данных.
A Counterexample for the Open Problem on the Minimal Delays of Orthogonal Designs With Maximal Rates.
By: Haibin Kan; Hong Shen. p355-359, 5p;
Ключевые слова: CIRCLE, COMBINATORIAL designs & configurations, CURVES, Orthogonal,
GEOMETRY, MATHEMATICS, TRIANGLE
Abstract: X. Liang systematically investigated orthogonal designs with maximal rates, gave the. maximal rates
of complex orthogonal designs and a concrete construction procedure for complex orthogonal designs with the
maximal rates. He also posed an open problem on the minimal decoding delays of complex orthogonal designs
with maximal rates, and proved that the problem is correct for less than or equal to six transmit antennas. In this
correspondence, we give a counterexample for the open problem for n = 8 and prove that the minimal delay for
complex orthogonal designs with eight columns is 56. Hence, we give a negative answer for the open problem.
[ABSTRACT FROM AUTHOR]
31. Зависимое от расстояния отображение двоичных векторов в перестановки.
Distance-Increasing Mappings From Binary Vectors to Permutations.
By: Jen-Chun Chang. p359-363, 5p;
Ключевые слова: BINARY system (Mathematics), FORMS, Binary, FUNCTIONS, Continuous,
MAPPINGS (Mathematics), MATHEMATICS, PERMUTATIONS, TRANSFORMATIONS (Mathematics)
Abstract: Mappings from the set of binary vectors of a fixed length to the set of permutations of the same
length that strictly increase Hamming distances except when that is obviously not possible are useful for the
construction of permutation codes. In this correspondence, we propose recursive and explicit constructions of
such mappings. Some comparisons show that the new mappings have better distance expansion distributions
than other known distance-preserving mappings (DPMs). We also give some examples to illustrate the
applications of these mappings to permutation arrays (PAs). [ABSTRACT FROM AUTHOR]
32. Экспоненциальная ошибка достижимости в пуассоновском широковещательном канале с
неполными множествами сообщений.
Attainable Error Exponents for the Poisson Broadcast Channel With Degraded Message Sets.
By: Sokolovsky, Alexander; Bross, Shraga I.. p364-374, 11p;
Ключевые слова: ROADCASTING, CODING theory, DATA compression (Computer science), DATA
transmission systems, DIGITAL communications, COMPUTER programming
Abstract: The Poisson broadcast channel with degraded message sets models a bandwidth unlimited optical
broadcast network over which a sender communicates a common message to a pair of terminals and a private
message to just one of them. The capacity region for this communication model is determined by the KornerMarton result, which in the Poisson regime Is shown to coincide with the capacity region of the degraded
broadcast channel. We present explicit code construction and practical decoding rules which attain the
corresponding capacity region, while attempting to maximize the attainable error exponents at the two distinct
terminals. This is accomplished by computing the error exponents attainable by the suggested decoding rules,
22
using the technique developed by Wyner and further extended by Bross and Shamai. [ABSTRACT FROM
AUTHOR]
33. Логарифмическая выпуклость минимальной общей мощности в системах коллективного
доступа с кодовым разделением каналов (CDMA) при фиксированном значении критерия
качества обслуживания.
Log-Convexity of the Minimum Total Power in CDMA Systems With Certain Quality-of-Service Guaranteed.
By: Boche, Holger; Stanczak, S&lslash;awomir. p374-381, 8p;
Ключевые слова: HANNELS (Hydraulic engineering), CODING theory, DATA compression (Computer
science), DATA transmission systems, DIGITAL communications, SPECIFICATION, WAVE mechanics
Abstract: In this correspondence, we consider a code-division multiple- access (CDMA) channel with a linear
receiver structure whose inputs are subject to a total power constraint. Each user is required to satisfy a certain
quality-of-service (QoS) requirement expressed, for instance, in terms of data rate or delay. The set of all
feasible QoS requirements is called the feasibility region. It is shown that if the signal-to-interference ratio
(SIR) at the output of each linear receiver is a bijective and log-convex function of the QoS parameter of
interest, the minimum total power needed to satisfy the QoS requirements is a jointly log-convex function of the
QoS parameters. Furthermore, in two special cases of practical Interest, we show that the minimum total power
is strictly log-convex. These results imply that the corresponding feasibility regions are convex sets. The
convexity property is a key ingredient in the development of access control strategies for wireless
communications systems. [ABSTRACT FROM AUTHOR]
34. Коэффициент производительности и потерь кодирования источника.
Coefficient Rate and Lossy Source Coding.
By: Wenye Yang; Gibson, Jerry D.; Tao He. p381-386, 6p;
Ключевые слова: BINOMIAL coefficients, CHANNELS (Hydraulic engineering), CODING theory, DATA
compression (Computer science), DATA transmission systems, DIGITAL communications, WAVE mechanics
Abstract: Campbell derived and defined a quantity called the coefficient rate of a random process that involves
the process spectral entropy. In this correspondence, his interpretation is substantiated with two new
derivations. One derivation tightens the connection to source bandwidth, while the second derivation implies a
specific approach to adaptive coefficient selection in realization-adaptive approaches to compression. After a
discussion on the role the coefficient rate plays in adaptive source coding, a quantity called Campbell
bandwidth is defined based on its connection to source bandwidth and Is contrasted with Fourier bandwidth and
Shannon band- width. The connection between coefficient rate and reverse water-filling from rate distortion
theory is also demonstrated. [ABSTRACT FROM AUTHOR]
35. Регулярные и нерегулярные прогрессирующие с прирастающими ребрами графы Таннера.
Regular and Irregular Progressive Edge-Growth Tanner Graphs.
By: Xiao-Yu Hu; Eleftheriou, Evangelos; Arnold, Dieter M.. p386-398, 13p;
Ключевые слова: LGEBRA, ALGORITHMS, ARITHMETIC, GRAPH theory, MATHEMATICS, GRAPH
algorithms
Abstract: We propose a general method for constructing Tanner graphs having a large girth by establishing
edges or connections between symbol and check nodes in an edge-by-edge manner, called progressive edgegrowth (PEG) algorithm. Lower bounds on the girth of PEG Tanner graphs and on the minimum distance of the
resulting low-density parity-check (LDPC) codes are derived in terms of parameters of the graphs. Simple
variations of the PEG algorithm can also be applied to generate linear-time encodeable LDPC codes. Regular
and irregular LDPC codes using PEG Tanner graphs and allowing symbol nodes to take values over GF(q) (q >
2) are investigated. Simulation results show that the PEG algorithm is a powerful algorithm to generate good
short-block-length LDPC codes. [ABSTRACT FROM AUTHOR]
36. Об эквивалентности двух ключевых уравнений Вэлча-Берлекакампа и их оценщиках ошибок.
On the Equivalence of Two Welch -- Berlekamp Key Equations and Their Error Evaluators.
By: Moon, Todd K.; Gunther, Jacob H.. p399-401, 3p;
23
Ключевые слова: ALGEBRA, ALGEBRA -- Graphic methods, ALGORITHMS, CIPHERS, EQUATIONS,
EQUATIONS -- Numerical solutions, MATHEMATICS
Abstract: We present two lemmas relating polynomials occurring in the derivations of the Welch-Berlekamp
(WB) key equation for Reed- Solomon codes. The lemma provides the connection between the conventional
Welch-Berlekamp form of the key equation and the nulispace-based derivation of Dabiri and Blake. The second
lemma allows the error values for the Dahiri Blake formulation to be computed based on the error values for the
Welch-Berlekamp form. [ABSTRACT FROM AUTHOR]
37. О весовых энумераторах дуадиковых и квадратичных кодов в остатках.
On the Weight Enumerators of Duadic and Quadratic Residue Codes.
Carmen-Simona; Wassermann, Alfred. p402-407, 6p;
By: Gabont, Philippe; Nedeloaia,
Ключевые слова: ALGEBRA, ALGEBRA -- Graphic methods, ALGORITHMS, CIPHERS, EQUATIONS - Numerical solutions, MATHEMATICS
Abstract: In this correspondence, we compute the weight enumerators of various quadratic residue codes over
F<sub>2</sub> and F<sub>3</sub>, together with certain codes of related families like the duadic and the
quadratic double circulant codes. We use a parallel algorithm to find the number of codewords of a given (not
too high) weight, from which we deduce by usual classical methods for self-dual and formally self-dual codes
over F<sub>2</sub> and F<sub>3</sub> their associated, previously unknown, weight enumerators. We
compute weight enumerators for lengths as high as 152 for binary codes and 96 for ternary codes. [ABSTRACT
FROM AUTHOR]
38. О двух дважды четных самодвойственных бинарных кодах длиной 160 и минимальным весом
24.
On Two Doubly Even Self-Dual Binary Codes of Length 160 and Minimum Weight 24.
By: van Dijk, Marten; Egner, Sebastian; Greferath, Marcus; Wassermann, Alfred. p408-411, 4p;
Ключевые слова: BINARY system (Mathematics), BINARY-coded decimal system, CIPHERS, CODING
theory, DECIMAL system, MATHEMATICS
Abstract: This correspondence revisits the idea of constructing a binary [m n, mk] code from an [n, k] code
over F<sub>2<sup>m</sup></sub> by concatenating the code with a suitable basis representation of
F<sub>2<sup>m</sup></sub> over F<sub>2</sub>. We construct two nonequivalent examples of doubly even
self-dual binary codes of length 160 which turn out to be of minimum distance 24. This improves the lower
bound for this class of codes, whereas the upper bound Is given by 28. The construction at hand seems to be of
interest beyond this particular example. [ABSTRACT FROM AUTHOR]
39. Декодирование списков обобщённых кодов Рида-Соломона с использованием коммутативных
колец.
List Decoding of Generalized Reed -- Solomon Codes Over Commutative Rings.
By: Armand, Marc A.. p411-419, 9p;
Ключевые слова:*ALGORITHMS, BINARY system (Mathematics), BINARY-coded decimal system,
CIPHERS, CODING theory, MATHEMATICS
Abstract: We show that the list decoding procedure of Guruswami and Sudan may be used to decode
generalized Reed-Solomon (RS) codes defined over commutative rings with identity. An algorithm for
performing the first of the two phases of this decoding procedure is also given. In particular, we show that for
generalized RS codes over chain rings, the probability of picking an incorrect codeword from a given list can be
reduced by increasing the size of the code alphabet while keeping the length and minimum (Hamming) distance
of the code constant. [ABSTRACT FROM AUTHOR]
40. Элементарная конструкция кодов из групп единиц, принадлежащих к остаточным кольцам
полиномов.
An Elementary Construction of Codes From the Groups of Units of Residue Rings of Polynomials.
By: Reid, Les; Wickham, Cameron. p419-420, 2p;
24
Ключевые слова: ALGEBRA, BINARY system (Mathematics), BINARY-coded decimal system. CIPHERS,
CODING theory, MATHEMATICS
Abstract: In this note, we present an elementary verification of the minimum distance of some codes
constructed by Xing. We show that the codes obtained from this construction are subsets of cosets of linear
codes with a given parity-check matrix. [ABSTRACT FROM AUTHOR]
41.
Correction to "On the Asymptotic Performance of the Decorrelator" and "An Optimal Whitening Approach to
Linear Multiuser Detection". p421-421, 1p;
Ключевые слова: ALGEBRA, ERRATA
Abstract: Presents a correction to the articles "On the Asymptotic Performance of the Decorrelator" and "An
Optimal Whitening Approach to Linear Multiuser Detection."
42. Алгоритмы сжатия и кодирования.
Compression and Coding Algorithms.
By: Kieffer, John C.. p422-422, 1p;
Ключевые слова: ALGORITHMS, BOOKS -- Reviews, NONFICTION
Abstract: Reviews the book "Compression and Coding Algorithms," by Alistair Moffat and Andrew Turpin.
25
Download