Loading...
Search for:
broadcasting
0.009 seconds
Total 126 records
The capacity region for broadcast channels with conditionally independent message sets
, Article 4th Advanced International Conference on Telecommunications, AICT 2008, Athens, 8 June 2008 through 13 June 2008 ; 2008 , Pages 283-286 ; 9780769531625 (ISBN) ; Sharif University of Technology
2008
Abstract
A more general class of broadcast channels with conditionally independent message sets is defined and its capacity region is determined using Marton's inner bound and the outer bound considered by Nair and El Gamal. The capacity region for this class of channels includes the capacity region for broadcast channels with degraded message sets, semi-deterministic broadcast channels, deterministic broadcast channels with and without common information, less noisy and (special) more capable broadcast channels. © 2008 IEEE
A path-based broadcast algorithm for wormhole hypercubes
, Article I-SPAN 2009 - The 10th International Symposium on Pervasive Systems, Algorithms, and Networks, 14 December 2009 through 16 December 2009, Kaohsiung ; 2009 , Pages 586-591 ; 9780769539089 (ISBN) ; Sarbazi Azad, H ; Sharif University of Technology
Abstract
When implementing some applications in multi-computer systems, broadcast operation is a necessity for efficient communication. Several broadcast algorithms have been proposed in the literature for hypercube networks. In this paper, we evaluate the performance of broadcast routing algorithms for hypercube networks, and propose a new approach by reducing the number of steps required to perform. © 2009 IEEE
Achievable rates for two interfering broadcast channels with a cognitive transmitter
, Article 2008 IEEE International Symposium on Information Theory, ISIT 2008, Toronto, ON, 6 July 2008 through 11 July 2008 ; 2008 , Pages 1358-1362 ; 21578101 (ISSN) ; 9781424422579 (ISBN) ; Nasiri Kenari, M ; Sharif University of Technology
2008
Abstract
We introduce a new communication model consisting of two interfering broadcast channels with one cognitive transmitter, who knows the message transmitted by the other non-cognitive transmitter, in a non-causal manner. An achievable rate region is derived for this model. The region is computed based on the Marton region for the general broadcast channel and its extension by Steinberg to the broadcast channel with the states known at the transmitter. By using the region evaluated, an achievable rate for the Gaussian broadcast channel is derived. © 2008 IEEE
The capacity region of a class of 3-receiver broadcast channels with two eavesdroppers
, Article IEEE International Symposium on Information Theory - Proceedings, 31 July 2011 through 5 August 2011 ; August , 2011 , Pages 968-972 ; 21578104 (ISSN) ; 9781457705953 (ISBN) ; Aref, M. R ; Sharif University of Technology
2011
Abstract
In this paper, we consider the 3-receiver broadcast channel with one common and two confidential messages. One of the confidential messages is sent to the first and second receivers and kept secret from the third receiver (eavesdropper). The other confidential message is sent to the first receiver and kept secret from the second and third receivers (eavesdroppers). The common message is decoded by all receivers. We study some special cases of the model and determine their secrecy capacity regions
The capacity region of the parallel partially cooperative relay broadcast channel with unmatched degraded subchannels
, Article 2009 IEEE International Symposium on Information Theory, ISIT 2009, Seoul, 28 June 2009 through 3 July 2009 ; 2009 , Pages 189-193 ; 21578102 (ISSN); 9781424443130 (ISBN) ; Mirmohseni, M ; Akhbari, B ; Firouzi, H ; Aref, M. R ; Sharif University of Technology
2009
Abstract
We investigate the parallel partially cooperative relay broadcast channel with unmatched degraded subchannels. We characterize the capacity region of this channel in the general setting that, transmitter sends a common message for both users and a private message for each of them. Our achievability result is based on the choosing appropriate parameters for the general achievable rate region of partially cooperative relay broadcast channel. We provide a converse proof for this achievable region as well, which establishes the capacity region.© 2009 IEEE
On marton's inner bound for the general broadcast channel
, Article IEEE Transactions on Information Theory ; Volume 60, Issue 7 , 2014 , Pages 3748-3762 ; ISSN: 00189448 ; Gamal, A. E ; Anantharam, V ; Sharif University of Technology
Abstract
We establish several new results on Marton's inner bound on the capacity region of the general broadcast channel. Inspired by the fact that Marton's coding scheme without superposition coding is optimal in the Gaussian case, we consider the class of binary input degraded broadcast channels with no common message that have the same property. We characterize this class. We also establish new properties of Marton's inner bound that help restrict the search space for computing the Marton sum rate. In particular, we establish an extension of the XOR case of the binary inequality of Nair, Wang, and Geng
The capacity region of a class of relay-broadcast channels and relay channels with three parallel unmatched subchannels
, Article ISITA/ISSSTA 2010 - 2010 International Symposium on Information Theory and Its Applications, 17 October 2010 through 20 October 2010 ; October , 2010 , Pages 818-823 ; 9781424460175 (ISBN) ; Akhbari, B ; Aref, M. R ; Sharif University of Technology
2010
Abstract
The Partially Cooperative Relay-Broadcast Channel (PC-RBC) is a generalization of Relay Channel in which the relay node decodes its own private message. In this paper, we introduce a class of parallel PC-RBCs with three unmatched subchannels, in which the first component of the channel is assumed to be degraded, the second to be orthogonal and the third to be deterministic. We characterize the capacity region of this channel for the case where the source sends a private message for each of the users. We also investigate a class of parallel relay channels with three unmatched subchannels, in which the first component of the channel is degraded, the second is orthogonal and the third is...
Achievable rates for two interfering broadcast channels with a cognitive transmitter
, Article AEU - International Journal of Electronics and Communications ; Volume 63, Issue 12 , 2009 , Pages 1005-1011 ; 14348411 (ISSN) ; Nasiri Kenari, M ; Sharif University of Technology
Abstract
We introduce a new communication model consisting of two interfering broadcast channels with one cognitive transmitter, who knows the message transmitted by the other non-cognitive transmitter, in a non-causal manner. An achievable rate region is derived for this model. The region is computed based on the Marton region for the general broadcast channel and its extension by Steinberg to the broadcast channel with the states known at the transmitter. By using the region evaluated, an achievable rate for the Gaussian broadcast channel is derived
Performance evaluation of broadcast algorithms in all-port 2D mesh networks
, Article 2008 International Symposium on Parallel and Distributed Processing with Applications, ISPA 2008, Sydney, NSW, 10 December 2008 through 12 December 2008 ; December , 2008 , Pages 643-648 ; 9780769534718 (ISBN) ; Sarbazi Azad, H ; Sharif University of Technology
2008
Abstract
Broadcast is among the most primitive collective communication operations of any interconnection network. Broadcast algorithms for the mesh topology have been widely reported in the literature. However, most existing algorithms have been studied in one-port and within limited conditions, such as light traffic loads. In contrast, this study simulates the broadcast operations, taking into account a wide range of traffic loads. Also, the performance evaluation of meshes in the presence of unicast and broadcast traffic is presented in this paper. To the best of our knowledge, this study is the first to consider the issue of broadcast latency at both the network and node levels. A new model for...
Improved cardinality bounds on the auxiliary random variables in Marton's inner bound
, Article IEEE International Symposium on Information Theory - Proceedings ; 2013 , Pages 1272-1276 ; ISSN: 21578095 ; ISBN: 9781479904464 ; Gohari, A ; Nair, C ; Sharif University of Technology
2013
Abstract
Marton's region is the best known inner bound for a general discrete memoryless broadcast channel. We establish improved bounds on the cardinalities of the auxiliary random variables. We combine the perturbation technique along with a representation using concave envelopes to achieve this improvement. As a corollary of this result, we show that a randomized time division strategy achieves the entire Marton's region for binary input broadcast channels, extending the previously known result for the sum-rate and validating a previous conjecture due to the same authors
On the secrecy capacity of 3-receiver Broadcast Channel with causal states and conferencing
, Article IEEE International Symposium on Information Theory - Proceedings ; 2012 , Pages 1167-1171 ; 9781467325790 (ISBN) ; Aref, M. R ; Sharif University of Technology
IEEE
2012
Abstract
We investigate the secrecy capacity region of 2-receiver, 1-eavesdropper Broadcast Channel (BC) with two causal states and conferencing decoders. The encoder sends two messages, one of them for both legitimate receivers and the other one for the first legitimate receiver. It keeps these messages secret from the eavesdropper. Each state is causally available at the corresponding receiver, while both states are known causally at the encoder. Each receiver wishes to send the state which is not available at the other receiver, through a noiseless link with limited capacity. We find an inner bound on the secrecy capacity region of this channel. The achievability scheme employs block Markov coding...
An achievable rate region for a class of broadcast-relay networks
, Article IEEE Information Theory Workshop 2010, ITW 2010, 6 January 2010 through 8 January 2010, Cairo ; 2010 ; 9781424463725 (ISBN) ; Ghabeli, L ; Aref, M ; Sharif University of Technology
2010
Abstract
In this paper we define Broadcast Relay Networks (BRN) with two relays. There are a transmitter, two relays and two receivers in the network. We find an achievable rate region for it by considering full cooperation between relays. We use symmetric relaying method at relays and Marton's broadcast code construction for the transmitter.We will show that Kramer's rate region for Broadcast Relay Channel (BRC), Ghabeli's rate for symmetric two-relay network, and Marton's rate region for Broadcast Channel are special cases of our achievable rate region
A multi sender attribute-based broadcast authentication scheme
, Article 2016 8th International Symposium on Telecommunications, IST 2016, 27 September 2016 through 29 September 2016 ; 2017 , Pages 78-83 ; 9781509034345 (ISBN) ; Ameri, M. H ; Mohajeri, J ; Sharif University of Technology
Institute of Electrical and Electronics Engineers Inc
2017
Abstract
Multi sender attribute-based broadcast authentication scheme for the network containing resource constrained nodes is the main focus of this research. In this paper, we proposed a framework in which each element of a set of authorized users whose attributes satisfy a special sign control policy can generate a valid signature. In this framework, there exists a trusted server who receives and verifies the validity of the generated attribute-based signatures and broadcast the intended message through the nodes of the network in an efficient and authenticated manner. We also proposed a new symmetric-based broadcast authentication scheme which is used for broadcasting the authenticated messages...
Key agreement over a generalized multiple access channel using noiseless and noisy feedback
, Article IEEE Journal on Selected Areas in Communications ; Volume 31, Issue 9 , 2013 , Pages 1765-1778 ; 07338716 (ISSN) ; Skoglund, M ; Golic, J. D ; Salmasizadeh, M ; Aref, M. R ; Sharif University of Technology
2013
Abstract
A secret key agreement framework involving three users is considered in which each of the users 1 and 2 intends to share a secret key with user 3 and users 1 and 2 are eavesdroppers with respect to each other. There is a generalized discrete memoryless multiple access channel (GDMMAC) from users 1 and 2 to user 3 where the three users receive outputs from the channel. Furthermore, there is a feedback channel from user 3 to users 1 and 2 through which user 3 sends information extracted from the received output from the GDMMAC to increase the key rates. We consider both noiseless and noisy feedback. In the case of noiseless feedback, a public channel of unlimited capacity from user 3 to users...
Secrecy capacity of wiretap channel for a new scenario and designing code for wiretap channel
, Article Proceedings - 2010 18th Iranian Conference on Electrical Engineering, ICEE 2010, 11 May 2010 through 13 May 2010 ; 2010 , Pages 183-187 ; 9781424467600 (ISBN) ; Salimi, S ; Salmasizadeh, M ; Sharif University of Technology
Abstract
The concept of information theoretic security is introduced. Secrecy capacity of two receiver broadcast channel for a new scenario is derived in which it is assumed that the legitimate receiver has access to a noisy version of eavesdroppers channel outputs. Also the ideas of code designing to achieve zero error on main channel and perfect secrecy on the eavesdropper's channel, without invoking complicated capacity achieving codes are provided
Modeling routing protocols in ad hoc networks
, Article 13th International Computer Society of Iran Computer Conference on Advances in Computer Science and Engineering, CSICC 2008, Kish Island, 9 March 2008 through 11 March 2008 ; Volume 6 CCIS , 2008 , Pages 419-426 ; 18650929 (ISSN); 3540899847 (ISBN); 9783540899846 (ISBN) ; Movaghar, A ; Sharif University of Technology
2008
Abstract
Regarding increasing popularity of Ad hoc networks, the routing protocols employed in these networks should be validated before deployment. Formal methods are used nowadays to find defects in protocols specification. In this paper, we explain different methods of formal modeling and verification of routing protocols of ad hoc networks. We derive the key concepts that are vital in modeling ad hoc network protocols and then modify process algebra, appropriate for verifying protocols at network layer. This process algebra implements mobility behaviors of underlying infrastructure implicitly in the semantics of broadcasting. The semantics of broadcast communication also abstracts away the...
On marton's inner bound and its optimality for classes of product broadcast channels
, Article IEEE Transactions on Information Theory ; Vol. 60, Issue. 1 , 2014 , pp. 22-41 ; ISSN: 0018-9448 ; Gohari, A ; Nair, C ; Yu, Y ; Sharif University of Technology
Abstract
Marton's inner bound is the tightest known inner bound on the capacity region of the broadcast channel. It is not known, however, if this bound is tight in general. One approach to settle this key open problem in network information theory is to investigate the multiletter extension of Marton's bound, which is known to be tight in general. This approach has become feasible only recently through the development of a new method for bounding cardinalities of auxiliary random variables by Gohari and Anantharam. This paper undertakes this long overdue approach to establish several new results, including 1) establishing the optimality of Marton's bound for new classes of product broadcast...
A technique for deriving one-shot achievability results in network information theory
, Article IEEE International Symposium on Information Theory - Proceedings ; 2013 , Pages 1287-1291 ; ISSN: 21578095 ; ISBN: 9781479904464 ; Aref, M. R ; Gohari, A ; IEEE; IEEE Information Theory Society ; Sharif University of Technology
2013
Abstract
This paper proposes a novel technique to prove a one-shot version of achievability results in network information theory. The technique is not based on covering and packing lemmas. In this technique, we use a stochastic encoder and decoder with a particular structure for coding that resembles both the ML and the joint-typicality coders. Although stochastic encoders and decoders do not usually enhance the capacity region, their use simplifies the analysis. The Jensen inequality lies at the heart of error analysis, which enables us to deal with the expectation of many terms coming from stochastic encoders and decoders at once. The technique is illustrated via four examples: point-to-point...
Key agreement over a state-dependent 3-receiver broadcast channel
, Article 2013 Iran Workshop on Communication and Information Theory ; 2013 ; 9781467350235 (ISBN) ; Bereyhi, A ; Salehkalaibar, S ; Aref, M. R ; Sharif University of Technology
2013
Abstract
In this paper, we consider the problem of secret key agreement in state-dependent 3-receiver broadcast channels. In the proposed model, there are two legitimate receivers, an eavesdropper and a transmitter where the channel state information is non-causally available at the transmitter. We consider two setups. In the first setup, the transmitter tries to agree on a common key with the legitimate receivers while keeping it concealed from the eavesdropper. Simultaneously, the transmitter agrees on a private key with each of the legitimate receivers that needs to be kept secret from the other legitimate receiver and the eavesdropper. For this setup, we derive inner and outer bounds on the...
One-receiver two-eavesdropper broadcast channel with degraded message sets
, Article IEEE Transactions on Information Forensics and Security ; Volume 8, Issue 7 , 2013 , Pages 1162-1172 ; 15566013 (ISSN) ; Mirmohseni, M ; Aref, M. R ; Sharif University of Technology
2013
Abstract
In this paper, we study the one-receiver two-eavesdropper Broadcast Channel (BC) with three degraded message sets. A common message is sent to three receivers. Another message is sent to the first and second receivers and needs to be kept secret from the third receiver (second eavesdropper). The third message is sent to the first receiver and needs to be kept secret from the second and third receivers (first and second eavesdroppers). First, we consider perfect secrecy conditions at the eavesdroppers, where we find an achievable perfect secrecy region. In the achievability scheme, we use superposition coding which divides the available randomness into different levels. These levels are used...