Skip to main content

Showing 1–14 of 14 results for author: Maric, I

Searching in archive cs. Search in all archives.
.
  1. Retrieving sinusoids from nonuniformly sampled data using recursive formulation

    Authors: Ivan Maric

    Abstract: A heuristic procedure based on novel recursive formulation of sinusoid (RFS) and on regression with predictive least-squares (LS) enables to decompose both uniformly and nonuniformly sampled 1-d signals into a sparse set of sinusoids (SSS). An optimal SSS is found by Levenberg-Marquardt (LM) optimization of RFS parameters of near-optimal sinusoids combined with common criteria for the estimation o… ▽ More

    Submitted 12 April, 2017; v1 submitted 14 December, 2016; originally announced December 2016.

    Comments: 16 pages, 17 figures, Expert Systems with Applications - published

    Journal ref: I.Maric Expert Systems With Applications 72 (2017) 245-257

  2. arXiv:1611.01199  [pdf, ps, other

    cs.IT

    Capacity-Achieving Rate-Compatible Polar Codes for General Channels

    Authors: Marco Mondelli, S. Hamed Hassani, Ivana Marić, Dennis Hui, Song-Nam Hong

    Abstract: We present a rate-compatible polar coding scheme that achieves the capacity of any family of channels. Our solution generalizes the previous results [1], [2] that provide capacity-achieving rate-compatible polar codes for a degraded family of channels. The motivation for our extension comes from the fact that in many practical scenarios, e.g., MIMO systems and non-Gaussian interference, the channe… ▽ More

    Submitted 20 January, 2017; v1 submitted 3 November, 2016; originally announced November 2016.

    Comments: 7 pages, 2 figures, accepted at WCNC'17 workshop on polar coding

  3. arXiv:1510.01776  [pdf, other

    cs.IT

    Capacity-Achieving Rate-Compatible Polar Codes

    Authors: Song-Nam Hong, Dennis Hui, Ivana Marić

    Abstract: We present a method of constructing rate-compatible polar codes that are capacity-achieving with low-complexity sequential decoders. The proposed code construction allows for incremental retransmissions at different rates in order to adapt to channel conditions. The main idea of the construction exploits the common characteristics of polar codes optimized for a sequence of successively degraded ch… ▽ More

    Submitted 27 January, 2016; v1 submitted 6 October, 2015; originally announced October 2015.

    Comments: Presented at the 8th North American School of Information Theory (NASIT 2015), UCSD, La Jolla, CA, Aug. 10-14

  4. arXiv:1508.00077  [pdf, other

    cs.IT

    A Novel Cooperative Strategy for Wireless Multihop Backhaul Networks

    Authors: Song-Nam Hong, Ivana Maric, Dennis Hui

    Abstract: The 5G wireless network architecture will bring dense deployments of base stations called {\em small cells} for both outdoors and indoors traffic. The feasibility of their dense deployments depends on the existence of a high data-rate transport network that can provide high-data backhaul from an aggregation node where data traffic originates and terminates, to every such small cell. Due to the lim… ▽ More

    Submitted 1 August, 2015; originally announced August 2015.

    Comments: Parts of this paper will be presented at GLOBECOM 2015. arXiv admin note: text overlap with arXiv:1003.5966 by other authors

  5. arXiv:1501.06440  [pdf, other

    cs.IT

    On the Achievable Rates of Multihop Virtual Full-Duplex Relay Channels

    Authors: Song-Nam Hong, Ivana Maric, Dennis Hui, Giuseppe Caire

    Abstract: We study a multihop "virtual" full-duplex relay channel as a special case of a general multiple multicast relay network. For such channel, quantize-map-and-forward (QMF) (or noisy network coding (NNC)) achieves the cut-set upper bound within a constant gap where the gap grows {\em linearly} with the number of relay stages $K$. However, this gap may not be negligible for the systems with multihop t… ▽ More

    Submitted 23 April, 2015; v1 submitted 26 January, 2015; originally announced January 2015.

    Comments: To be presented at ISIT 2015

  6. Diversity-Multiplexing Tradeoff for the Interference Channel with a Relay

    Authors: Daniel Zahavi, Lili Zhang, Ivana Maric, Ron Dabora, Andrea J. Goldsmith, Shuguang Cui

    Abstract: We study the diversity-multiplexing tradeoff (DMT) for the slow fading interference channel with a relay (ICR). We derive four inner bounds on the DMT region: the first is based on the compress-and-forward (CF) relaying scheme, the second is based on the decode-and-forward (DF) relaying scheme, and the last two bounds are based on the half-duplex (HD) and full-duplex (FD) amplify-and-forward (AF)… ▽ More

    Submitted 15 December, 2014; originally announced December 2014.

    Comments: Accepted to the IEEE Transactions on Information Theory

  7. arXiv:1404.0061  [pdf, other

    cs.IT

    Short Message Noisy Network Coding with Rate Splitting

    Authors: Ivana Maric, Dennis Hui

    Abstract: Short message noisy network coding with rate splitting (SNNC-RS) encoding strategy is presented. It has been shown by Hou and Kramer that mixed cooperative strategies in which relays in favorable positions perform decode-and-forward (DF) and the rest of the relays perform short message noisy network coding (SNNC) can outperform noisy network coding (NNC). Our proposed strategy further improves the… ▽ More

    Submitted 18 December, 2014; v1 submitted 31 March, 2014; originally announced April 2014.

    Comments: Presented at the 2014 Asilomar Conference on Signals, Systems and Computers, Nov. 2014

  8. arXiv:1302.5662  [pdf, ps, other

    cs.IT

    Low Latency Communications

    Authors: Ivana Maric

    Abstract: Numerous applications demand communication schemes that minimize the transmission delay while achieving a given level of reliability. An extreme case is high-frequency trading whereby saving a fraction of millisecond over a route between Chicago and New York can be a game-changer. While such communications are often carried by fiber, microwave links can reduce transmission delays over large distan… ▽ More

    Submitted 22 February, 2013; originally announced February 2013.

    Comments: Presented at the Information Theory and Applications Workshop (ITA 2013), Feb 10-15, 2013, San Diego, CA

  9. arXiv:1112.2483   

    cs.IT

    Capacity Bounds and Exact Results for the Cognitive Z-interference Channel

    Authors: Nan Liu, Ivana Maric, Yinghui Cheng, Andrea J. Goldsmith, Shlomo Shamai

    Abstract: We study the discrete memoryless Z-interference channel (ZIC) where the transmitter of the pair that suffers from interference is cognitive. We first provide an upper bound on the capacity of this channel. We then show that, when the channel of the transmitter-receiver pair that does not experience interference is deterministic, our proposed upper bound matches the known lower bound provided by Ca… ▽ More

    Submitted 15 February, 2012; v1 submitted 12 December, 2011; originally announced December 2011.

    Comments: This paper has been withdrawn due to the incorrectness of Theorem 2

  10. arXiv:1007.1811  [pdf, ps, other

    cs.IT

    On the Capacity of a Class of Cognitive Z-interference Channels

    Authors: **hua Jiang, Ivana Maric, Andrea Goldsmith, Shlomo Shamai, Shuguang Cui

    Abstract: We study a special class of the cognitive radio channel in which the receiver of the cognitive pair does not suffer interference from the primary user. Previously developed general encoding schemes for this channel are complex as they attempt to cope with arbitrary channel conditions, which leads to rate regions that are difficult to evaluate. The focus of our work is to derive simple rate regions… ▽ More

    Submitted 20 September, 2010; v1 submitted 11 July, 2010; originally announced July 2010.

    Comments: 6 pages, 5 figures, submitted to ICC2011

  11. arXiv:0812.0617  [pdf, ps, other

    cs.IT

    The Capacity Region of the Cognitive Z-interference Channel with One Noiseless Component

    Authors: Nan Liu, Ivana Maric, Andrea Goldsmith, Shlomo Shamai

    Abstract: We study the discrete memoryless Z-interference channel (ZIC) where the transmitter of the pair that suffers from interference is cognitive. We first provide upper and lower bounds on the capacity of this channel. We then show that, when the channel of the transmitter-receiver pair that does not face interference is noiseless, the two bounds coincide and therefore yield the capacity region. The… ▽ More

    Submitted 2 December, 2008; originally announced December 2008.

    Comments: The conference version has been submitted to ISIT 2009

  12. arXiv:0710.3375  [pdf, ps, other

    cs.IT

    On the Capacity of Interference Channels with One Cooperating Transmitter

    Authors: I. Maric, A. Goldsmith, G. Kramer, S. Shamai

    Abstract: Inner and outer bounds are established on the capacity region of two-sender, two-receiver interference channels where one transmitter knows both messages. The transmitter with extra knowledge is referred to as being cognitive. The inner bound is based on strategies that generalize prior work, and include rate-splitting, Gel'fand-Pinsker coding and cooperative transmission. A general outer bound… ▽ More

    Submitted 21 October, 2007; v1 submitted 17 October, 2007; originally announced October 2007.

    Comments: 11 pages, 8 figures, 1 table

  13. Discrete Memoryless Interference and Broadcast Channels with Confidential Messages: Secrecy Rate Regions

    Authors: Ruoheng Liu, Ivana Maric, Predrag Spasojevic, Roy D. Yates

    Abstract: We study information-theoretic security for discrete memoryless interference and broadcast channels with independent confidential messages sent to two receivers. Confidential messages are transmitted to their respective receivers with information-theoretic secrecy. That is, each receiver is kept in total ignorance with respect to the message intended for the other receiver. The secrecy level is… ▽ More

    Submitted 11 December, 2007; v1 submitted 17 February, 2007; originally announced February 2007.

    Comments: to appear Special Issue of IEEE Transactions on Information Theory on Information Theoretic Security

  14. arXiv:cs/0605005  [pdf, ps, other

    cs.IT

    The Discrete Memoryless Multiple Access Channel with Confidential Messages

    Authors: Ruoheng Liu, Ivana Maric, Roy D. Yates, Predrag Spasojevic

    Abstract: A multiple-access channel is considered in which messages from one encoder are confidential. Confidential messages are to be transmitted with perfect secrecy, as measured by equivocation at the other encoder. The upper bounds and the achievable rates for this communication situation are determined.

    Submitted 17 February, 2007; v1 submitted 1 May, 2006; originally announced May 2006.

    Comments: 1 figure, accepted by ISIT 2006 conference