-
Converse Techniques for Identification via Channels
Authors:
Larissa Brüche,
Marcel A. Mross,
Yaning Zhao,
Wafa Labidi,
Christian Deppe,
Eduard A. Jorswieck
Abstract:
There is a growing interest in models that extend beyond Shannon's classical transmission scheme, renowned for its channel capacity formula $C$. One such promising direction is message identification via channels, introduced by Ahlswede and Dueck. Unlike in Shannon's classical model, where the receiver aims to determine which message was sent from a set of $M$ messages, message identification focu…
▽ More
There is a growing interest in models that extend beyond Shannon's classical transmission scheme, renowned for its channel capacity formula $C$. One such promising direction is message identification via channels, introduced by Ahlswede and Dueck. Unlike in Shannon's classical model, where the receiver aims to determine which message was sent from a set of $M$ messages, message identification focuses solely on discerning whether a specific message $m$ was transmitted. The encoder can operate deterministically or through randomization, with substantial advantages observed particularly in the latter approach. While Shannon's model allows transmission of $M = 2^{nC}$ messages, Ahlswede and Dueck's model facilitates the identification of $M = 2^{2^{nC}}$ messages, exhibiting a double exponential growth in block length. In their seminal paper, Ahlswede and Dueck established the achievability and introduced a "soft" converse bound. Subsequent works have further refined this, culminating in a strong converse bound, applicable under specific conditions. Watanabe's contributions have notably enhanced the applicability of the converse bound. The aim of this survey is multifaceted: to grasp the formalism and proof techniques outlined in the aforementioned works, analyze Watanabe's converse, trace the evolution from earlier converses to Watanabe's, emphasizing key similarities and differences that underpin the enhancements. Furthermore, we explore the converse proof for message identification with feedback, also pioneered by Ahlswede and Dueck. By elucidating how their approaches were inspired by preceding proofs, we provide a comprehensive overview. This overview paper seeks to offer readers insights into diverse converse techniques for message identification, with a focal point on the seminal works of Hayashi, Watanabe, and, in the context of feedback, Ahlswede and Dueck.
△ Less
Submitted 5 July, 2024;
originally announced July 2024.
-
Worst-Case Per-User Error Bound for Asynchronous Unsourced Multiple Access
Authors:
Jyun-Sian Wu,
Pin-Hsun Lin,
Marcel A. Mross,
Eduard A. Jorswieck
Abstract:
This work considers an asynchronous $\textsf{K}_\text{a}$-active-user unsourced multiple access channel (AUMAC) with the worst-case asynchronicity. The transmitted messages must be decoded within $n$ channel uses, while some codewords are not completely received due to asynchronicities. We consider a constraint of the largest allowed delay of the transmission. The AUMAC lacks the permutation-invar…
▽ More
This work considers an asynchronous $\textsf{K}_\text{a}$-active-user unsourced multiple access channel (AUMAC) with the worst-case asynchronicity. The transmitted messages must be decoded within $n$ channel uses, while some codewords are not completely received due to asynchronicities. We consider a constraint of the largest allowed delay of the transmission. The AUMAC lacks the permutation-invariant property of the synchronous UMAC since different permutations of the same codewords with a fixed asynchronicity are distinguishable. Hence, the analyses require calculating all $2^{\textsf{K}_\text{a}}-1$ combinations of erroneously decoded messages. Moreover, transmitters cannot adapt the corresponding codebooks according to asynchronicity due to a lack of information on asynchronicities. To overcome this challenge, a uniform bound of the per-user probability of error (PUPE) is derived by investigating the worst-case of the asynchronous patterns with the delay constraint. Numerical results show the trade-off between the energy-per-bit and the number of active users for different delay constraints. In addition, although the asynchronous transmission reduces interference, the required energy-per-bit increases as the receiver decodes with incompletely received codewords, compared to the synchronous case.
△ Less
Submitted 30 January, 2024; v1 submitted 25 January, 2024;
originally announced January 2024.
-
Second-order Rate Analysis of a Two-user Gaussian Interference Channel with Heterogeneous Blocklength Constraints
Authors:
Kailun Dong,
Pin-Hsun Lin,
Marcel Mross,
Eduard A. Jorswieck
Abstract:
We consider a two-user Gaussian interference channel with heterogeneous blocklength constraints (HB-GIC), strong interference, and two private messages. We propose to apply the successive interference cancellation with early decoding, i.e., decoding a message with a number of received symbols less than the blocklength at the receiver. We determine the necessary number of received symbols to achiev…
▽ More
We consider a two-user Gaussian interference channel with heterogeneous blocklength constraints (HB-GIC), strong interference, and two private messages. We propose to apply the successive interference cancellation with early decoding, i.e., decoding a message with a number of received symbols less than the blocklength at the receiver. We determine the necessary number of received symbols to achieve successful decoding of the longer codeword that satisfies the input power constraints and target average error probability constraints.
To attain the results, we investigate the dependence testing bound analysis over an independent and identically distributed (i.i.d.) Gaussian input.
Besides, we derive the second-order achievable rate region of the considered HB-GIC. By numerical results based on the rate-profile approach, we compare the derived second-order rate region to the first-order one, which shows the rate back-off of the considered model due to the impact of finite blocklength.
△ Less
Submitted 16 November, 2023;
originally announced November 2023.
-
New Inner and Outer Bounds for Gaussian Broadcast Channels with Heterogeneous Blocklength Constraints
Authors:
Marcel Mross,
Pin-Hsun Lin,
Eduard A. Jorswieck
Abstract:
We investigate novel inner and outer bounds on the rate region of a 2-user Gaussian broadcast channel with finite, heterogeneous blocklength constraints (HB-GBC). In particular, we introduce a new, modified Sato-type outer bound that can be applied in the finite blocklength regime and which does not require the same marginal property. We then develop and analyze composite shell codes, which are su…
▽ More
We investigate novel inner and outer bounds on the rate region of a 2-user Gaussian broadcast channel with finite, heterogeneous blocklength constraints (HB-GBC). In particular, we introduce a new, modified Sato-type outer bound that can be applied in the finite blocklength regime and which does not require the same marginal property. We then develop and analyze composite shell codes, which are suitable for the HB-GBC. Especially, to achieve a lower decoding latency for the user with a shorter blocklength constraint when successive interference cancellation is used, we derive the number of symbols needed to successfully early decode the other user's message. We numerically compare our derived outer bound to the best known achievable rate regions. Numerical results show that the new early decoding performance in terms of latency reduction is significantly improved compared to the state of the art, and it performs very close to the asymptotic limit.
△ Less
Submitted 2 June, 2022; v1 submitted 4 February, 2022;
originally announced February 2022.
-
Gaussian Broadcast Channels under Heterogeneous Blocklength Constraints
Authors:
Pin-Hsun Lin,
Shih-Chun Lin,
Peng-Wei Chen,
Marcel Mross,
Eduard A. Jorswieck
Abstract:
Future wireless access networks aim to simultaneously support a large number of devices with heterogeneous service requirements, including data rates, error rates, and latencies. While achievable rate and capacity results exist for Gaussian broadcast channels in the asymptotic blocklength regime, the characterization of second-order achievable rate regions for heterogeneous blocklength constraints…
▽ More
Future wireless access networks aim to simultaneously support a large number of devices with heterogeneous service requirements, including data rates, error rates, and latencies. While achievable rate and capacity results exist for Gaussian broadcast channels in the asymptotic blocklength regime, the characterization of second-order achievable rate regions for heterogeneous blocklength constraints is not available. Therefore, we investigate a two-user Gaussian broadcast channel (GBC) with heterogeneous blocklength constraints, specified according to users' channel output signal-to-noise ratios (SNRs). We assume the user with higher output SNR has a shorter blocklength constraint. We show that with sufficiently large output SNR, the stronger user can perform the \textit{early decoding} (ED) technique to decode and subtract the interference via successive interference cancellation (SIC). To achieve it, we derive an explicit lower bound on the necessary number of received symbols for a successful ED, using an independent and identically distributed Gaussian input. A second-order rate of the weaker user who suffers from an SNR change due to the heterogeneous blocklength constraint, is also derived. Numerical results show that ED can outperform the hybrid non-orthogonal multiple access scheme when the stronger channel is sufficiently better than the weaker one. Under the considered setting, about 7-dB SNR gain can be achieved. These results shows that ED with SIC is a promising technique for the future wireless networks.
△ Less
Submitted 14 June, 2022; v1 submitted 16 September, 2021;
originally announced September 2021.
-
Improving Online Performance Prediction for Semantic Segmentation
Authors:
Marvin Klingner,
Andreas Bär,
Marcel Mross,
Tim Fingscheidt
Abstract:
In this work we address the task of observing the performance of a semantic segmentation deep neural network (DNN) during online operation, i.e., during inference, which is of high importance in safety-critical applications such as autonomous driving. Here, many high-level decisions rely on such DNNs, which are usually evaluated offline, while their performance in online operation remains unknown.…
▽ More
In this work we address the task of observing the performance of a semantic segmentation deep neural network (DNN) during online operation, i.e., during inference, which is of high importance in safety-critical applications such as autonomous driving. Here, many high-level decisions rely on such DNNs, which are usually evaluated offline, while their performance in online operation remains unknown. To solve this problem, we propose an improved online performance prediction scheme, building on a recently proposed concept of predicting the primary semantic segmentation task's performance. This can be achieved by evaluating the auxiliary task of monocular depth estimation with a measurement supplied by a LiDAR sensor and a subsequent regression to the semantic segmentation performance. In particular, we propose (i) sequential training methods for both tasks in a multi-task training setup, (ii) to share the encoder as well as parts of the decoder between both task's networks for improved efficiency, and (iii) a temporal statistics aggregation method, which significantly reduces the performance prediction error at the cost of a small algorithmic latency. Evaluation on the KITTI dataset shows that all three aspects improve the performance prediction compared to previous approaches.
△ Less
Submitted 12 April, 2021;
originally announced April 2021.