Skip to main content

Showing 1–39 of 39 results for author: Wiese, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2405.01948  [pdf, ps, other

    cs.IT

    Common Randomness Generation from Sources with Infinite Polish Alphabet

    Authors: Wafa Labidi, Rami Ezzine, Moritz Wiese, Christian Deppe, Holger Boche

    Abstract: We investigate the problem of common randomness (CR) generation in the basic two-party communication setting in which a sender and a receiver aim to agree on a common random variable with high probability. The terminals observe independent and identically distributed (i.i.d.) samples of sources with an arbitrary distribution defined on a Polish alphabet and are allowed to communicate as little as… ▽ More

    Submitted 3 May, 2024; originally announced May 2024.

    Comments: arXiv admin note: text overlap with arXiv:2210.04556

  2. arXiv:2401.14323  [pdf, ps, other

    cs.IT

    Common Randomness Generation from Finite Compound Sources

    Authors: Rami Ezzine, Moritz Wiese, Christian Deppe, Holger Boche

    Abstract: We investigate the problem of generating common randomness (CR) from finite compound sources aided by unidirectional communication over rate-limited perfect channels. The two communicating parties, often referred to as terminals, observe independent and identically distributed (i.i.d.) samples of a finite compound source and aim to agree on a common random variable with a high probability for ever… ▽ More

    Submitted 25 January, 2024; originally announced January 2024.

    Comments: arXiv admin note: text overlap with arXiv:2305.05524

  3. arXiv:2310.16217  [pdf, other

    cs.IT

    Information-Theoretically Secret Reed-Muller Identification with Affine Designs

    Authors: Mattia Spandri, Roberto Ferrara, Christian Deppe, Moritz Wiese, Holger Boche

    Abstract: We consider the problem of information-theoretic secrecy in identification schemes rather than transmission schemes. In identification, large identities are encoded into small challenges sent with the sole goal of allowing at the receiver reliable verification of whether the challenge could have been generated by a (possibly different) identity of his choice. One of the reasons to consider identif… ▽ More

    Submitted 24 October, 2023; originally announced October 2023.

    Comments: 6 pages, 3 figures, accepted at European Wireless 2023

  4. arXiv:2307.09767  [pdf, other

    cs.LG cs.AI q-fin.CP q-fin.ST

    Sig-Splines: universal approximation and convex calibration of time series generative models

    Authors: Magnus Wiese, Phillip Murray, Ralf Korn

    Abstract: We propose a novel generative model for multivariate discrete-time time series data. Drawing inspiration from the construction of neural spline flows, our algorithm incorporates linear transformations and the signature transform as a seamless substitution for traditional neural networks. This approach enables us to achieve not only the universality property inherent in neural networks but also int… ▽ More

    Submitted 19 July, 2023; originally announced July 2023.

  5. arXiv:2307.05575  [pdf, other

    cs.SE

    Learning From Each Other: How Are Architectural Mistakes Communicated in Industry?

    Authors: Marion Wiese, Axel-Frederik Brand, André van Hoorn

    Abstract: Context. Own experiences and faulty decisions can be an important source of information for software architects. The experiences and mistakes of other architects can also be valuable information sources. Goal. Under the assumption that the knowledge about faulty decisions, i.e., mistakes, regarding software architecture is not shared adequately in practice, this work qualitatively investigates the… ▽ More

    Submitted 10 July, 2023; originally announced July 2023.

  6. arXiv:2306.04583  [pdf, ps, other

    math.CO cs.IT

    $\varepsilon$-Almost collision-flat universal hash functions and mosaics of designs

    Authors: Moritz Wiese, Holger Boche

    Abstract: We introduce, motivate and study $\varepsilon$-almost collision-flat (ACFU) universal hash functions $f:\mathcal X\times\mathcal S\to\mathcal A$. Their main property is that the number of collisions in any given value is bounded. Each $\varepsilon$-ACFU hash function is an $\varepsilon$-almost universal (AU) hash function, and every $\varepsilon$-almost strongly universal (ASU) hash function is an… ▽ More

    Submitted 31 October, 2023; v1 submitted 7 June, 2023; originally announced June 2023.

  7. arXiv:2305.05524  [pdf, ps, other

    cs.IT

    A Lower and Upper Bound on the Epsilon-Uniform Common Randomness Capacity

    Authors: Rami Ezzine, Moritz Wiese, Christian Deppe, Holger Boche

    Abstract: We consider a standard two-source model for uniform common randomness (UCR) generation, in which Alice and Bob observe independent and identically distributed (i.i.d.) samples of a correlated finite source and where Alice is allowed to send information to Bob over an arbitrary single-user channel. We study the \(\boldsymbolε\)-UCR capacity for the proposed model, defined as the maximum common rand… ▽ More

    Submitted 9 May, 2023; originally announced May 2023.

    Comments: arXiv admin note: substantial text overlap with arXiv:2205.04594, arXiv:2210.11932

  8. arXiv:2210.11932  [pdf, ps, other

    cs.IT

    Message Transmission and Common Randomness Generation over MIMO Slow Fading Channels with Arbitrary Channel State Distribution

    Authors: Rami Ezzine, Moritz Wiese, Christian Deppe, Holger Boche

    Abstract: We investigate the problem of message transmission and the problem of common randomness (CR) generation over single-user multiple-input multiple-output (MIMO) slow fading channels with average input power constraint, additive white Gaussian noise (AWGN), arbitrary state distribution and with complete channel state information available at the receiver side (CSIR). First, we derive a lower and an u… ▽ More

    Submitted 21 October, 2022; originally announced October 2022.

    Comments: arXiv admin note: text overlap with arXiv:2105.06451

  9. arXiv:2210.04556  [pdf, ps, other

    cs.IT

    Common Randomness Generation from Sources with Countable Alphabet

    Authors: Wafa Labidi, Rami Ezzine, Christian Deppe, Moritz Wiese, Holger Boche

    Abstract: We study a standard two-source model for common randomness (CR) generation in which Alice and Bob generate a common random variable with high probability of agreement by observing independent and identically distributed (i.i.d.) samples of correlated sources on countably infinite alphabets. The two parties are additionally allowed to communicate as little as possible over a noisy memoryless channe… ▽ More

    Submitted 14 October, 2022; v1 submitted 10 October, 2022; originally announced October 2022.

    Comments: arXiv admin note: text overlap with arXiv:2201.11078

  10. arXiv:2207.13357  [pdf, ps, other

    cs.IT

    A Single-Letter Capacity Formula for MIMO Gauss-Markov Rayleigh Fading Channels

    Authors: Rami Ezzine, Moritz Wiese, Christian Deppe, Holger Boche

    Abstract: Over the past decades, the problem of communication over finite-state Markov channels (FSMCs) has been investigated in many researches and the capacity of FSMCs has been studied in closed form under the assumption of the availability of partial/complete channel state information at the sender and/or the receiver. In our work, we focus on infinite-state Markov channels by investigating the problem… ▽ More

    Submitted 27 July, 2022; originally announced July 2022.

    Comments: arXiv admin note: substantial text overlap with arXiv:2201.03400

  11. arXiv:2205.04594  [pdf, ps, other

    cs.IT

    A General Formula for Uniform Common Randomness Capacity

    Authors: Rami Ezzine, Moritz Wiese, Christian Deppe, Holger Boche

    Abstract: We generalize the uniform common randomness capacity formula, initially established by Ahslwede and Csiszár for a two-source model for common randomness generation from independent and identically distributed (i.i.d.) discrete sources with unidirectional communication over rate-limited discrete noiseless channels to the case when the one-way communication is over arbitrary single-user channels. In… ▽ More

    Submitted 9 September, 2022; v1 submitted 9 May, 2022; originally announced May 2022.

    Comments: arXiv admin note: text overlap with arXiv:2105.06451

  12. Preventing technical debt with the TAP framework for Technical Debt Aware Management

    Authors: Marion Wiese, Paula Rachow, Matthias Riebisch, Julian Schwarze

    Abstract: Context. Technical Debt (TD) is a metaphor for technical problems that are not visible to users and customers but hinder developers in their work, making future changes more difficult. TD is often incurred due to tight project deadlines and can make future changes more costly or impossible. Project Management usually focuses on customer benefits and pays less attention to their IT systems' interna… ▽ More

    Submitted 20 April, 2022; originally announced April 2022.

    Comments: Accepted manuscript for "Information and Software Technology" - Special Issue on the TechDebt 2021 conference

    Journal ref: Information and Software Technology, 2022, 106926, ISSN 0950-5849

  13. arXiv:2202.13996  [pdf, other

    q-fin.CP cs.LG q-fin.GN q-fin.RM stat.ML

    Risk-Neutral Market Simulation

    Authors: Magnus Wiese, Phillip Murray

    Abstract: We develop a risk-neutral spot and equity option market simulator for a single underlying, under which the joint market process is a martingale. We leverage an efficient low-dimensional representation of the market which preserves no static arbitrage, and employ neural spline flows to simulate samples which are free from conditional drifts and are highly realistic in the sense that among all possi… ▽ More

    Submitted 28 February, 2022; originally announced February 2022.

    Journal ref: AAAI 2022 Workshop on AI in Financial Services: Adaptiveness, Resilience & Governance

  14. arXiv:2202.05314  [pdf, other

    cs.IT

    Mosaics of Combinatorial Designs for Semantic Security on Quantum Wiretap Channels

    Authors: Holger Boche, Minglai Cai, Moritz Wiese

    Abstract: We study semantic security for classical-quantum channels. Our security functions are functional forms of mosaics of combinatorial designs. We extend methods for classical channels to classical-quantum channels to demonstrate that mosaics of designs ensure semantic security for classical-quantum channels, and are also capacity achieving coding scheme. The legitimate channel users share an addition… ▽ More

    Submitted 10 February, 2022; originally announced February 2022.

  15. arXiv:2201.03400  [pdf, ps, other

    cs.IT

    A Rigorous Proof of the Capacity of MIMO Gauss-Markov Rayleigh Fading Channels

    Authors: Rami Ezzine, Moritz Wiese, Christian Deppe, Holger Boche

    Abstract: We investigate the problem of message transmission over time-varying single-user multiple-input multiple-output (MIMO) Rayleigh fading channels with average power constraint and with complete channel state information available at the receiver side (CSIR). To describe the channel variations over the time, we consider a first-order Gauss-Markov model. We completely solve the problem by giving a sin… ▽ More

    Submitted 13 April, 2022; v1 submitted 10 January, 2022; originally announced January 2022.

  16. arXiv:2112.06823  [pdf, other

    q-fin.CP cs.LG q-fin.MF q-fin.ST stat.ML

    Multi-Asset Spot and Option Market Simulation

    Authors: Magnus Wiese, Ben Wood, Alexandre Pachoud, Ralf Korn, Hans Buehler, Phillip Murray, Lianjun Bai

    Abstract: We construct realistic spot and equity option market simulators for a single underlying on the basis of normalizing flows. We address the high-dimensionality of market observed call prices through an arbitrage-free autoencoder that approximates efficient low-dimensional representations of the prices while maintaining no static arbitrage in the reconstructed surface. Given a multi-asset universe, w… ▽ More

    Submitted 13 December, 2021; originally announced December 2021.

  17. arXiv:2111.01207  [pdf, other

    cs.LG

    Sig-Wasserstein GANs for Time Series Generation

    Authors: Hao Ni, Lukasz Szpruch, Marc Sabate-Vidales, Baoren Xiao, Magnus Wiese, Shujian Liao

    Abstract: Synthetic data is an emerging technology that can significantly accelerate the development and deployment of AI machine learning pipelines. In this work, we develop high-fidelity time-series generators, the SigWGAN, by combining continuous-time stochastic models with the newly proposed signature $W_1$ metric. The former are the Logsig-RNN models based on the stochastic differential equations, wher… ▽ More

    Submitted 1 November, 2021; originally announced November 2021.

    Comments: This paper is accepted by the 2nd ACM International Conference on AI in Finance 2021

    MSC Class: 60L10 ACM Class: I.6; G.3

  18. arXiv:2105.06451  [pdf, ps, other

    cs.IT

    Outage Common Randomness Capacity Characterization of Multiple-Antenna Slow Fading Channels

    Authors: Rami Ezzine, Moritz Wiese, Christian Deppe, Holger Boche

    Abstract: We investigate the problem of common randomness (CR) generation from discrete correlated sources aided by one-way communication over single-user multiple-input multiple-output (MIMO) slow fading channels with additive white Gaussian noise (AWGN), arbitrary state distribution and with channel state information available at the receiver side (CSIR). We completely solve the problem by first character… ▽ More

    Submitted 18 October, 2021; v1 submitted 13 May, 2021; originally announced May 2021.

    Comments: arXiv admin note: text overlap with arXiv:2102.01197

  19. arXiv:2103.11705  [pdf, other

    cs.SE

    Exploring Web Search Engines to Find Architectural Knowledge

    Authors: Mohamed Soliman, Marion Wiese, Yikun Li, Matthias Riebisch, Paris Avgeriou

    Abstract: Software engineers need relevant and up-to-date architectural knowledge (AK), in order to make well-founded design decisions. However, finding such AK is quite challenging. One pragmatic approach is to search for AK on the web using traditional search engines (e.g. Google); this is common practice among software engineers. Still, we know very little about what AK is retrieved, from where, and how… ▽ More

    Submitted 22 March, 2021; originally announced March 2021.

  20. arXiv:2103.10317  [pdf, other

    cs.SE

    Preventing Technical Debt by Technical Debt Aware Project Management

    Authors: Marion Wiese, Matthias Riebisch, Julian Schwarze

    Abstract: Technical Debts (TD) are problems of the internal software quality. They are often contracted due to tight project deadlines, for example quick fixes and workarounds, and can make future changes more costly or impossible. TD prevention should be more important than TD repayment, because subsequent refactoring and reengineering is usually more expensive than building the right solution from the beg… ▽ More

    Submitted 9 April, 2021; v1 submitted 18 March, 2021; originally announced March 2021.

  21. arXiv:2102.01198  [pdf, ps, other

    cs.IT

    Identification over Additive Noise Channels in the Presence of Feedback

    Authors: Moritz Wiese, Wafa Labidi, Christian Deppe, Holger Boche

    Abstract: We analyze deterministic message identification via channels with non-discrete additive white noise and with a noiseless feedback link under both average power and peak power constraints. The identification task is part of Post Shannon Theory. The consideration of communication systems beyond Shannon's approach is useful in order to increase the efficiency of information transmission for certain a… ▽ More

    Submitted 17 February, 2022; v1 submitted 1 February, 2021; originally announced February 2021.

  22. arXiv:2102.01197  [pdf, ps, other

    cs.IT

    Common Randomness Generation over Slow Fading Channels

    Authors: Rami Ezzine, Moritz Wiese, Christian Deppe, Holger Boche

    Abstract: This paper analyzes the problem of common randomness (CR) generation from correlated discrete sources aided by unidirectional communication over Single-Input Single-Output (SISO) slow fading channels with additive white Gaussian noise (AWGN) and arbitrary state distribution. Slow fading channels are practically relevant for wireless communications. We completely solve the SISO slow fading case b… ▽ More

    Submitted 7 June, 2021; v1 submitted 1 February, 2021; originally announced February 2021.

  23. Mosaics of combinatorial designs for information-theoretic security

    Authors: Moritz Wiese, Holger Boche

    Abstract: We study security functions which can serve to establish semantic security for the two central problems of information-theoretic security: the wiretap channel, and privacy amplification for secret key generation. The security functions are functional forms of mosaics of combinatorial designs, more precisely, of group divisible designs and balanced incomplete block designs. Every member of a mosaic… ▽ More

    Submitted 8 December, 2021; v1 submitted 1 February, 2021; originally announced February 2021.

    Journal ref: Designs, Codes and Cryptography (2022) 90:593-632

  24. arXiv:2006.05421  [pdf, other

    cs.LG stat.ML

    Conditional Sig-Wasserstein GANs for Time Series Generation

    Authors: Shujian Liao, Hao Ni, Lukasz Szpruch, Magnus Wiese, Marc Sabate-Vidales, Baoren Xiao

    Abstract: Generative adversarial networks (GANs) have been extremely successful in generating samples, from seemingly high dimensional probability measures. However, these methods struggle to capture the temporal dependence of joint probability distributions induced by time-series data. Furthermore, long time-series data streams hugely increase the dimension of the target space, which may render generative… ▽ More

    Submitted 11 October, 2023; v1 submitted 9 June, 2020; originally announced June 2020.

    Comments: This paper has been accepted for Mathematical Finance Special Issue on Machine Learning in Finance

  25. arXiv:2001.05719  [pdf, other

    quant-ph cs.IT

    Semantic Security for Quantum Wiretap Channels

    Authors: Holger Boche, Minglai Cai, Christian Deppe, Roberto Ferrara, Moritz Wiese

    Abstract: We consider the problem of semantic security via classical-quantum and quantum wiretap channels and use explicit constructions to transform a non-secure code into a semantically secure code, achieving capacity by means of biregular irreducible functions. Explicit parameters in finite regimes can be extracted from theorems. We also generalize the semantic security capacity theorem, which shows that… ▽ More

    Submitted 16 November, 2022; v1 submitted 16 January, 2020; originally announced January 2020.

    Comments: v2: published version; v1: 38 pages, 2 figures

  26. arXiv:2001.03035  [pdf, ps, other

    cs.IT

    Arbitrarily Varying Wiretap Channels with Non-Causal Side Information at the Jammer

    Authors: Carsten Rudolf Janda, Moritz Wiese, Eduard A. Jorswieck, Holger Boche

    Abstract: Secure communication in a potentially malicious environment becomes more and more important. The arbitrarily varying wiretap channel (AVWC) provides information theoretical bounds on how much information can be exchanged even in the presence of an active attacker. If the active attacker has non-causal side information, situations in which a legitimate communication system has been hacked, can be m… ▽ More

    Submitted 14 April, 2022; v1 submitted 9 January, 2020; originally announced January 2020.

  27. arXiv:1911.01700  [pdf, other

    q-fin.CP cs.LG q-fin.MF q-fin.ST stat.ML

    Deep Hedging: Learning to Simulate Equity Option Markets

    Authors: Magnus Wiese, Lianjun Bai, Ben Wood, Hans Buehler

    Abstract: We construct realistic equity option market simulators based on generative adversarial networks (GANs). We consider recurrent and temporal convolutional architectures, and assess the impact of state compression. Option market simulators are highly relevant because they allow us to extend the limited real-world data sets available for the training and evaluation of option trading strategies. We sho… ▽ More

    Submitted 5 November, 2019; originally announced November 2019.

    Journal ref: NeurIPS 2019 Workshop on Robust AI in Financial Services: Data, Fairness, Explainability, Trustworthiness, and Privacy

  28. arXiv:1907.06673  [pdf, other

    q-fin.MF cs.LG q-fin.CP stat.ML

    Quant GANs: Deep Generation of Financial Time Series

    Authors: Magnus Wiese, Robert Knobloch, Ralf Korn, Peter Kretschmer

    Abstract: Modeling financial time series by stochastic processes is a challenging task and a central area of research in financial mathematics. As an alternative, we introduce Quant GANs, a data-driven model which is inspired by the recent success of generative adversarial networks (GANs). Quant GANs consist of a generator and discriminator function, which utilize temporal convolutional networks (TCNs) and… ▽ More

    Submitted 21 December, 2019; v1 submitted 15 July, 2019; originally announced July 2019.

    Comments: Corrected typos. Added section 2 as an overview of existing literature. Added section 5.3 to clarify the modeling assumptions. Appendix B now contains more details on the neural network architectures used. Changed latex template

    Journal ref: Quantitative Finance, 2020

  29. arXiv:1907.03361  [pdf, other

    cs.LG stat.ML

    Copula & Marginal Flows: Disentangling the Marginal from its Joint

    Authors: Magnus Wiese, Robert Knobloch, Ralf Korn

    Abstract: Deep generative networks such as GANs and normalizing flows flourish in the context of high-dimensional tasks such as image generation. However, so far exact modeling or extrapolation of distributional properties such as the tail asymptotics generated by a generative network is not available. In this paper, we address this issue for the first time in the deep learning literature by making two nove… ▽ More

    Submitted 7 July, 2019; originally announced July 2019.

  30. Semantic Security via Seeded Modular Coding Schemes and Ramanujan Graphs

    Authors: Moritz Wiese, Holger Boche

    Abstract: A novel type of functions called biregular irreducible functions is introduced and applied as security components (instead of, e.g., universal hash functions) in seeded modular wiretap coding schemes, whose second component is an error-correcting code. These schemes are called modular BRI schemes. An upper bound on the semantic security information leakage of modular BRI schemes in a one-shot sett… ▽ More

    Submitted 21 August, 2020; v1 submitted 19 November, 2018; originally announced November 2018.

    Journal ref: IEEE Trans. Inf. Theory, vol. 67, no. 1, pp. 52-80, 2021

  31. arXiv:1612.05552  [pdf, other

    eess.SY cs.IT

    Secure Estimation and Zero-Error Secrecy Capacity

    Authors: Moritz Wiese, Tobias J. Oechtering, Karl Henrik Johansson, Panos Papadimitratos, Henrik Sandberg, Mikael Skoglund

    Abstract: We study the problem of securely estimating the states of an unstable dynamical system subject to nonstochastic disturbances. The estimator obtains all its information through an uncertain channel which is subject to nonstochastic disturbances as well, and an eavesdropper obtains a disturbed version of the channel inputs through a second uncertain channel. An encoder observes and block-encodes the… ▽ More

    Submitted 14 July, 2017; v1 submitted 16 December, 2016; originally announced December 2016.

    Comments: Submitted to IEEE Transactions on Automatic Control

  32. arXiv:1605.00274  [pdf, ps, other

    eess.SY cs.IT

    Uncertain Wiretap Channels and Secure Estimation

    Authors: Moritz Wiese, Karl Henrik Johansson, Tobias J. Oechtering, Panos Papadimitratos, Henrik Sandberg, Mikael Skoglund

    Abstract: Uncertain wiretap channels are introduced. Their zero-error secrecy capacity is defined. If the sensor-estimator channel is perfect, it is also calculated. Further properties are discussed. The problem of estimating a dynamical system with nonstochastic disturbances is studied where the sensor is connected to the estimator and an eavesdropper via an uncertain wiretap channel. The estimator should… ▽ More

    Submitted 1 May, 2016; originally announced May 2016.

    Comments: Long version of a paper to be presented at ISIT 2016

  33. arXiv:1512.06645  [pdf, ps, other

    cs.IT

    Frequency hop** does not increase anti-jamming resilience of wireless channels

    Authors: Moritz Wiese, Panos Papadimitratos

    Abstract: The effectiveness of frequency hop** for anti-jamming protection of wireless channels is analyzed from an information-theoretic perspective. The sender can input its symbols into one of several frequency subbands at a time. Each subband channel is modeled as an additive noise channel. No common randomness between sender and receiver is assumed. It is shown that capacity is positive, and then equ… ▽ More

    Submitted 21 December, 2015; originally announced December 2015.

    Comments: A shorter version of this will be presented at the 2016 International Zurich Seminar on Communications

  34. arXiv:1501.07439  [pdf, ps, other

    cs.IT

    The Arbitrarily Varying Wiretap Channel - Secret Randomness, Stability and Super-Activation

    Authors: Janis Nötzel, Moritz Wiese, Holger Boche

    Abstract: We define the common randomness assisted capacity of an arbitrarily varying channel (AVWC) when the Eavesdropper is kept ignorant about the common randomness. We prove a multi-letter capacity formula for this model. We prove that, if enough common randomness is used, the capacity formula can be given a single-shot form again. We then consider the opposite extremal case, where no common randomness… ▽ More

    Submitted 1 April, 2016; v1 submitted 29 January, 2015; originally announced January 2015.

    Comments: Significant changes again: now 53 pages, 2 figures. Modified and corrected Lemma 3. Added insightful example related to Lemma 3. Extended proof of Theorem 2

  35. A channel under simultaneous jamming and eavesdrop** attack---correlated random coding capacities under strong secrecy criteria

    Authors: Moritz Wiese, Janis Nötzel, Holger Boche

    Abstract: We give a complete characterization of the correlated random coding secrecy capacity of arbitrarily varying wiretap channels (AVWCs). We apply two alternative strong secrecy criteria, which both lead to the same multi-letter formula. The difference of these criteria lies in the treatment of correlated randomness, they coincide in the case of uncorrelated codes. On the basis of the derived formula,… ▽ More

    Submitted 18 December, 2015; v1 submitted 29 October, 2014; originally announced October 2014.

    Comments: 32 pages. With slight differences in Remarks 7-4) and Remark 17 submitted to IEEE Transactions on Information Theory

  36. Strong Secrecy for Multiple Access Channels

    Authors: Moritz Wiese, Holger Boche

    Abstract: We show strongly secret achievable rate regions for two different wiretap multiple-access channel coding problems. In the first problem, each encoder has a private message and both together have a common message to transmit. The encoders have entropy-limited access to common randomness. If no common randomness is available, then the achievable region derived here does not allow for the secret tran… ▽ More

    Submitted 20 September, 2012; originally announced September 2012.

    Comments: 55 pages

    Journal ref: Ahlswede Festschrift, LNCS 7777, pp. 71-122, Springer-Verlag Berlin Heidelberg, 2013

  37. arXiv:1208.5281  [pdf, ps, other

    cs.IT

    Expected Supremum of a Random Linear Combination of Shifted Kernels

    Authors: Holger Boche, Brendan Farrell, Michel Ledoux, Moritz Wiese

    Abstract: We address the expected supremum of a linear combination of shifts of the sinc kernel with random coefficients. When the coefficients are Gaussian, the expected supremum is of order \sqrt{\log n}, where n is the number of shifts. When the coefficients are uniformly bounded, the expected supremum is of order \log\log n. This is a noteworthy difference to orthonormal functions on the unit interval,… ▽ More

    Submitted 26 August, 2012; originally announced August 2012.

    Comments: To appear in the Journal of Fourier Analysis and Applications

  38. The Arbitrarily Varying Multiple-Access Channel with Conferencing Encoders

    Authors: Moritz Wiese, Holger Boche

    Abstract: We derive the capacity region of arbitrarily varying multiple-access channels with conferencing encoders for both deterministic and random coding. For a complete description it is sufficient that one conferencing capacity is positive. We obtain a dichotomy: either the channel's deterministic capacity region is zero or it equals the two-dimensional random coding region. We determine exactly when ei… ▽ More

    Submitted 13 November, 2012; v1 submitted 2 May, 2011; originally announced May 2011.

    Comments: 12 pages, accepted for publication in IEEE Transaction on Information Theory

    Journal ref: IEEE Transactions on Information Theory, 2012

  39. arXiv:1005.0291  [pdf, ps, other

    cs.IT

    The Compound Multiple Access Channel with Partially Cooperating Encoders

    Authors: Moritz Wiese, Holger Boche, Igor Bjelaković, Volker Jungnickel

    Abstract: The goal of this paper is to provide a rigorous information-theoretic analysis of subnetworks of interference networks. We prove two coding theorems for the compound multiple-access channel with an arbitrary number of channel states. The channel state information at the transmitters is such that each transmitter has a finite partition of the set of states and knows which element of the partition t… ▽ More

    Submitted 1 February, 2011; v1 submitted 3 May, 2010; originally announced May 2010.

    Comments: accepted for publication in IEEE Transactions on Information Theory, Special Issue on Interference Networks