throbber
Proceedings
`1997 IEEE
`nal Symposium on
`Information Theory
`
`Mariitim Hotel and Congress Center
`Ulm, Germany
`June 29 - July 4,1997
`
`6ponsored by The information Theory Society of
`The Institute of Electrical and Electronics Engineers
`
`Page 1 of 23
`
`SAMSUNG EXHIBIT 1011
`
`

`

`Proceedings 1997 IEEE International Symposium on Information Theory
`
`Copyright and Reprint Permission: Abstracting is permitted with credit to the source. Libraries are
`permitted to photocopy beyond the limit of U.S. copyright law for private use of patrons those articles in
`this volume that carry a code at the bottom of the page, provided the per-copy fee indicated in the code is
`paid through Copyright Clearance Center, 222 RosewoQd Drive, Danvers, MA 01923. For other copying,
`reprint or republication permission, write to IEEE Cogyrights Manager, IEEE Service Center, 445 Hoes
`Lane, P.O. Box 1331, Piscataway, NJ 08855-1331. All rights reserved. Copyright 01997 by the Institute
`of Electrical and Electronics Engineers, Inc.
`
`IEEE Catalog Number:
`
`97CH36074
`
`ISBN:
`
`0-7803-3956-8
`0-7803-3957-6
`0-7803-3958-4
`
`Softbound Edition
`Casebound Edition
`Microfiche Edition
`
`Library of Congress:
`
`72- 179437
`
`Additional copies of this publication are available from
`
`IEEE Service Center
`445 Hoes Lane
`P.O. Box 1331
`Piscataway, NJ 88854- 133 1
`1 -800-678-IEEE
`
`Page 2 of 23
`
`

`

`Table of Contents
`
`1
`
`2
`
`3
`
`7
`
`Plenary Session I
`The Way to the Proof of Fermat’s Theorem . Frey. G ....................................................
`Shannon Lecture I
`Information Theoretic Methods in Probability and Statistics - Csiszir. I ..................................
`Plenary Session I1
`Practical Implementations of Cryptography - Landrock. P ...............................................
`Shannon Lecture I1
`Back from Infinity: A Constrained Resources Approach to Information Theory - Ziv . J ................... 4
`Plenary Session I11
`Source Coding in Multimedia - Rabiner, L.R. ........................................................... 5
`Session MOAMl
`Iterative Decoding
`A General Algorithm for Distributing Information in a Graph - Aji, S.M. and McEliece. R.J. ............. 6
`Soft-Input Soft-Output Building Blocks to Construct and Iteratively Decode Code Networks -
`Benedetto, S . and Montorsi, G ............................................................................
`Serial Concatenated Trellis Coded Modulation with Iterative Decoding -
`Benedetto. S., Divsalar, D., Montorsi, G., and Pollara, ET ..................................................
`8
`On the Performance of Recursive Decoding Schemes - Soljanin, E . and Urbanke, R .......................
`9
`Hybrid Concatenated Codes and Iterative Decoding - IDivsalar, D . and Pollara, F .......................
`10
`Simultaneous Decoding and Phase Synchronization Using Iterative ”Turbo” Decoding - Wiberg, N ...... 11
`Approaching Shannon’s Capacity Limit by 0.27 dB Usin Hamming Codes in a
`‘Turbo’-Decoding Scheme - Nickl. H., Hagenauer. J., and Burkert. P ....................................
`Session MOAMP Combinatorics and Sequences
`Modularity Properties of Graph Entropy - Korner. J . and Simonyi. G ...................................
`13
`Correlation Attacks on Stream Ciphers Using the Lempd-Ziv Algorithm - Penzhorn, W.T. .............. 14
`Pseudoredundant Measurements in Nonlinear Mappings - Arndt, C . and Loffeld. 0 ......................
`15
`On Higher Order Autocorrelation Properties of Golay Complementary Sequences - Braun, V ............ 16
`Design of Sequences of I.I.D. p a r y Random Variables -. Kohda, T . and Tsuneda, A ......................
`17
`Multiple Packing of Euclidean Sphere - Blinovsky, V ....................................................
`18
`Enumeration of Rare Events. Pyramid and Ball Cubic Lattices - Krichevskii. R.E. and Potapov, V.N. ... 19
`On Efficient Inversion in Tower Fields of Characteristic Two - Fan. J.L. and Paar, C ....................
`20
`Data-Punctuated Token Trees - Berlekamp, E . and Hekuis, P ...........................................
`21
`Session MOAM3 Multi-User Channels
`Arbitrarily Varying Multiple-Access Channels Part I . Ericscin’s Symmetrizability is Adequate,
`Gubner’s Conjecture is True . - Ahlswede, R . and Cai, N ................................................
`Arbitrarily Varying Multiple-Access Channels Part I1 . Correlated Sender’s Side Information,
`Correlated Messages, and Ambiguous Transmission - Ahlswede, R . and Cai, N ..........................
`23
`Approximating the Output of the Multiple Access Channel - Steinberg, Y ...............................
`24
`A New Perspective to AWGN Multi-Access Channels -. Shu, L ..........................................
`25
`Generalized Time Sharing for Multiple Access Channels - Rimoldi. B .................................. - 2 6
`Optimal Power Allocation over Parallel Gaussian Broadcast Channels - Tse, D.N. ......................
`27
`
`12
`
`22
`
`v1:1
`
`Page 3 of 23
`
`

`

`37
`38
`
`The Capacity Region of Broadcast Channels with Memory . Goldsmith, A . and Effros. M ............... 28
`A 2-D Weighing Procedure for Two-way Communication - Schalkwijk. J.P.M. and Meeuwissen. H.B. ... 29
`Iterative Multi-User Decoding for Asynchronous Users - Tarkoy. F ......................................
`30
`ession
`OAM4 Communication Networks
`Buffer Occupancy of Statistical Multiplexers with Periodic Interchangeable Traffic in ATM Networks -
`Yu. Z . and McEliece, R.J. ............................................................................... 31
`'Transmission of Messages Using Parallel Servers: Asymptotic Approach - Vvedenskaya, N.D. ........... 32
`Large Deviations Analysis of MMPP/D/l Queueing - Nakagawa. K .....................................
`33
`An Independent Window-Access Scheme for an Input-Buffered Fast Packet Switching Fabric -
`Eiu. Y.-S., Liu. Z.-J., and Nu. Z .........................................................................
`34
`A New Toroidal Multi-Dimensional Network - Lee. L.L. and Centeno Filho, A.J. ........................
`35
`A Distributed Optimal Routing Strategy Based on Estimation of the OD Matrix - Adibniya F .......... 36
`Events with Exponentially Vanishing Probability have Exponentially Growing Waiting Time -
`Algoet, P ................................................................................................
`Information Aging - Daneshgaran, F . and Mondin, M ...................................................
`Sequences
`ession MOAM5
`Greedy Algorithms for the Shortest Common Superstring That are Asymptotically Optimal -
`Frieze, A . and Szpankowski, W ..........................................................................
`39
`Large Linear Complexity Sequences over Z8 - Marhsen. H.M. .........................................
`40
`Periodic Binary Sequences with the "Trinomial Property" - Golomb. S.W. and Gong, G ................. 41
`On the Classification of Binary Sequences of Period 2" - 1 with Ideal Autocorrelation -
`No, 9.-S., Lee, B.-K., Chung. H., Yang, K., and Song. H.-Y. .............................................. 42
`On Cyclic Goppa Codes and Sequence Designs - Moreno, 0 .............................................
`43
`Correlations of Pseudo-Generalized Geometric Sequences - Sun, W . and Yang, Y.X. .....................
`44
`The Distribution of the Degree of Minimum-Degree Low-Weight Parity-Check Polynomials -
`Kiihn, G.J. .............................................................................................. 45
`Session MOAM6 CDMA I
`Carrier Suppressed RAKE Receiver Operation for CDMA Cellular Communications - Kong, N .......... 46
`Maximum Number of Users of a Random Signatures CDMA System with Adaptive Array Receivers
`over Multipath Fading Channel - Rapajic, P . and Kennedy R ...........................................
`On Coherent Reception of Up-link Transmitted Signals in the DS-CDMA System -
`Jimenez, A . and Zigangirov. K.Sh .......................................................................
`A Multistage Detector for Synchronous Code-Division Multiple-Access -
`Louichon. F . and Georghiades. C.N. .....................................................................
`Whitening Sequences in DS Spread Spectrum Communication -
`Hovakimyan, K.S. and Khachatrian, G.H. ...............................................................
`MMSE Reception of DS-CDMA for Frequency-Selective Fading Channels -
`Miller. S.L., Honig. M.L., Shensa. M.J., and Milstein, L.B. ...............................................
`Complexity-Constrained Maximum-Likelihood Detection in Multiuser CDMA -
`Rasmussen, L.K., Lim. T.J., and Aulin. T.M. ............................................................ 52
`(L, K) CDMA/ALOHA Multiple-Access System - Alrumaih. R.M. and Alsugair, A A ....................
`53
`
`47
`
`48
`
`49
`
`50
`
`51
`
`VI11
`
`Page 4 of 23
`
`

`

`59
`60
`
`Shannon-Based Capacity Estimations of Future Microcellular Wireless Communication Systems .
`Hammerschmidt, J.S., Hasholzner. R., and Drewes. C ....................................................
`54
`Session MOAM7 Quantization I
`Asymptotic Performance of Vector Quantizers with the Perceptual Distortion Measure -
`Li. J., Chaddha. N . and Gray. R.M. ..................................................................... 55
`Lattice Labeling Algorithms for Vector Quantization -- Wang. C., Cao. H.Q., Li. W., and Tzeng. K.K. ... 56
`Context-Based Entropy Coding of VQ Indexes - Wu. X., Wen. J., and NG. W ...........................
`57
`Entropy Coded Successively Refinable Uniform Threshold Quantizers -
`Brunk. H., Jafarkhani. H., and Farvardin. N .............................................................
`Quantization of Both Stationary and Nonstationary Gaussian Sources with Voronoi Constellations -
`PBpin. C., Belfiore. J.-C., and Boutros. J .................................................................
`Polar Quantization Revisited - Neuhoff. D.L. ...........................................................
`Low-Complexity Waveform Coding via Alphabet and Sample-Set Partitioning -
`Said. A . and Pearlman. W.A. ............................................................................ 61
`Structured Spherical Codes for Gaussian Quantization - Wamkins. J . and Zeger. K ......................
`62
`Session MOAMS Compaction Methods
`The Imaginary Sliding Window - Ryabko. B ............................................................
`Context-Tree Weighting for Text-Sources - Volf. P.A.J. .................................................
`Estimation of Escape Probabilities for PPM Based on Universal Source Coding Theory -
`b e r g . J., Shtarkov. Yu. M., and Smeets. B.J.M. ........................................................
`65
`Ordering the Probabilities of an Unknown Discrete Memouyless Source - Sayir. J . and Ernst. T .......... 66
`Two Results in Text Compression Algorithms - Won@.. L., Wei. V.K., and Yeung. R.W. ................. 67
`Live-and-Die Coding for Binary Piecewise I.I.D. Sources -. Willems. F . and Krom. M ....................
`68
`Lossless Volume Compression Using a Variation of Lempel- iv '77 - Chow. J . and Berger. T ............. 69
`Universal Probability Assignment in the Class of Two-Sided Geometric Distributions -
`Merhav. N., Seroussi. G., and Weinberger. M.J. ..........................................................
`Optimal Prefix Codes for Two-sided Geometric Distributions -
`Merhav. N., Seroussi. G., and Weinberger. M.J. .......................................................... 71
`Session MOPMl Signal Theory
`Error-Free Filtering of Entropy-Regular Process against a Background of Entropy-Singular Noise -
`Pinsker. M.S. and Prelov. V.V. ..........................................................................
`Sensitivity of the Rate-Distortion Function of Stationairy Continuos-Time Gaussian Processes to
`Non-Gaussian Contamination - Pinsker. M.S., Prelov., V.V., and Verdli. S ...............................
`Robust Estimation of Point Process Intensity Features Using k-minimal Spanning Trees -
`Hero. A.O. and Michel. 0 ...............................................................................
`Making MLSD-Decisions on Some Individual Symbols in a Sequence by Thresholding the
`Matched Filter Output - Odling. P., Eriksson. H.B., aind Borjesson. P.O. ................................
`75
`Limitations of the Gaussian Model for Radar Signals -. Nayebi. M.M. and Aref. M.R. ................... 76
`Nonlinear ECG Filtering by Group Normalized Wavelet Packets -
`Zhuoer. S., Zheng. B., Licheng. J., and Kun. M .......................................................... 77
`Estimation of Sampling Jitter Variance using Autocorrelation Function and Higher Order Statistics -
`Guerrero. A.P., Tourneret. J.-Y., and Aakvaag. N ........................................................
`
`74
`
`78
`
`1:x
`
`58
`
`63
`64
`
`70
`
`72
`
`73
`
`Page 5 of 23
`
`

`

`79
`
`81
`
`New Results on the Expected Number of Maxima in the Normal Process Envelope .
`Nader.Esfahani, S . and Abdi. A .........................................................................
`Qn Algebraic Properties of Selfreciprocal Polynomials and of Daubechies Filters of Low Order -
`lappenecker, A ......................................................................................... 80
`OPM2 Bounds on Codes
`S i O n
`near Programming Bounds for Codes in Infinite Projective Spaces -
`yvalenkov, P., Danev. D., and Mitradjieva. M .........................................................
`An Improved Serre Bound for Elementary Abelian Extensions of Fp(z) and the Generalized
`Hamming Weights of Duals of BCH Codes - Moreno. O., Pedersen. J.P., and Polemi. D ................. 82
`Information-Theoretic Bounds on Trellis Complexity of Nonlinear Codes - Reuven. I . and Be'ery. Y . . . . . 83
`Ora Upper Bounds for the Distance of Codes of Small Size - Krasikov. I . and Litsyn. S ................... 84
`Improved Bounds' for Ternary Linear Codes of Dimension 7 - Gulliver. T.A. and Ostergird. P.R.J. ...... 85
`On the Minimal Words of the Primitive BCH Codes -. Borissov. Y . and Manev. N.L. ....................
`86
`Some New Bounds for Q-ary [n. IC. d] Codes - Ma. X . and Wang. X ......................................
`87
`M3 Cryptology I
`Session
`The Intrinsic Conditional Mutual Information and Perfect Secrecy - Maurer. U . and Wolf. S ............. 88
`The Optimal Linear Worst-case Information Rate - van Dijk. M ........................................
`89
`MDS Secret Sharing Schemes Secure against Cheaters - Okada. K . and Kurosawa. K ....................
`90
`Smoothing Probability Distributions and Smooth Entropy - Cachin. C . and Maurer. U .................. 91
`High Rate Reconciliation - van Dijk. M . and Koppelaar. A ..............................................
`92
`On the Entropy Bound for Optimum Homophonic Substitution - da Rocha Jr., V.C. and Massey. J.E. ... 93
`Decreasing Redundancy of Homophonic Coding - Ryabko. B . and Fionov. A ............................
`94
`New Authenticated Key Distribution Scheme and Secure Broadcast Scheme - Xu. §.-b. and Wang. X.-m. 95
`Session M PM4 Coded Modulation I
`Bit-Interleaved Coded Modulation - Caire. G., Taricco. G., and Biglieri. E ..............................
`Bandwidth-Efficient Trellis-Coded Modulation Schemes with Prescribed Decoding Delay -
`Li. & . and Rimoldi. B ...................................................................................
`97
`Trellis Matched Codes for Partial Response Channels - Uch6a Filho. B.F. and Herro. M.A. .............. 98
`Code Partial Response CPFSK with Ring Convolutional Codes - Remlein. P ............................
`99
`Analysis and Design of Trellis Codes Optimized for a Binary Symmetric Markov Source with
`MAP Detection - Kroll. J.M. and Phamdo. N .........................................................
`Unequal Error Protection Scheme Using Several Convolutional Codes -
`Matsunaga. M., Asano. D.K., and Kohno. R ............................................................
`101
`Performance of Coded Modulation Schemes Using Multiple Transmit Antennas - Ramksh. R ........... 102
`ultilevel Coding for Peak Power Limited Complex Gaussian Channels -
`Muller. R.R., Wachsmann. U., and Huber. J.B. .........................................................
`Session MOPM5 Parallel and Serial Concatenation
`On Optimal Power Allocation for Turbo Codes - Duman. T.M. and Salehi. M ..........................
`On the Ensemble Performance of Turbo Codes - Telatar. E . and Urbanke. R ...........................
`Serial Concatenation of Interleaved Codes: Performance Analysis. Design and Iterative Decoding -
`Benedetto. S., Divsalar. D., Montorsi. G., and Pollara. F ................................................ 106
`
`100
`
`96
`
`103
`
`104
`105
`
`X
`
`Page 6 of 23
`
`

`

`Active Distances and Cascaded Convolutional Codes ..
`Host, S., Johannesson. R., Zigangirov. K.Sh., and Zyalblov. V.V. ........................................
`107
`On the Distribution of the Output Error Burst Lengths for Viterbi Decoding of Convolutional Codes -
`Host. S., Johannesson. R., Zigangirov. D.K., Zigangiralv. KSh., and Zyablov. V.V. ......................
`108
`New lhrbo-Like Codes - Loeliger. H.-A. ..............................................................
`109
`Serial Concatenation of Convolutional Code and Low Rate Orthogonal Convolutional Code -
`Li. J . and Imai. H ......................................................................................
`110
`Graph Theoretic Construction of Generalized Product Codes - Guinand. P.S. and Lodge. J.H. ......... 111
`Multilevel Turbo Coding with a Short Latency - Herzberg. H ..........................................
`112
`Session MOPM6 Code Constructions
`Good Error-Correcting Codes Based on Very Sparse Matrices - MacKay. D.J.C. .......................
`113
`Some Geometric Constructions of Optimal Quaternary Codes - Will. R . and Lizak. P ................... 114
`Error Correction for Semiconductor Memories - Tolhuizen. L . and Raggen. S ...........................
`115
`Some New Extrema1 Self-Dual Codes with Length 58 - Buyuklieva. S ..................................
`116
`Spectral Techniques for Expander Codes and Generalized Cyclic Codes -
`Lafferty. J.D. and Rockmore. D.N. .....................................................................
`Superimposed Codes are Almost Big Distance Ones -. Fbredi. Z . and Ruszink6. M ......................
`‘Three New Binary Linear Codes - Boukliev. I .........................................................
`Session MO M? Frequency Hopping and Mullticarrier Systems
`Forward Error Correction with Reduction of Peak to . 4verage Power Ratio of
`QPSK Multicarrier Signals - Ochiai. H . and Imai. H ................................................
`120
`%:me-Limited Waveforms for OFDM-CDMA in a hfultipa. th Fading Channel - Drakul. S.L. ............ 121
`F iqorithms for Carrier Acquisition for &AM Constellations - Preston. J . and Georghiades. C.N. ........ 122
`Two-Dimensional Pilot-Symbol-Aided Channel Estimation - Hoeher. P., Kaiser. S., and Robertson. P ... 123
`Soft H ~ n d ~ f f Technique fcr Mobile Multi-Carrier CDMA Systems - Atarashi. H . and Nakagawa. M . . . . . 124
`A Class of Frequency-Hop Patterns - Sarwate. D.V. and Losada. D.A. .................................
`125
`A Class of Frequency Hop Codes with Nearly Ideal Characteristics for Multiple-Target Recognition -
`Moreno. 0 . and Marie. S ...............................................................................
`A Class of Frequency Hop Codes Using Only Three Frequencies --
`Moreno. O., Marid. S., and Corrada. C.J. ...............................................................
`Mismatched Frequency Hopping Sequences for Radars and Sonars -
`Zejak. A.J., Simid. IS., and Dukid. M.L. ................................................................
`Session MOPMS Channels with Feedback
`Coding for Channels with Low Rate Noiseless Feedback - Bargh. M.S. and Schalkwijk. J.P.M. ......... 129
`On the Cover’s Conjecture of Gaussian Feedback Caplacity - Yanagi. K ................................
`130
`A Sequential Strategy for the Two-User Noiseless Binary Adder Channel with Feedback - Kramer. G ... 131
`The AVC with Noiseless Feedback and Maximal Error Probability: A Capacity Formula with a
`Trichotomy - Ahlswede. R . and Cai. N ................................................................
`132
`Fast Iterative Coding for Feedback Channels - Ooi. J.M. and Wornell. G.W. ...........................
`133
`Reliability and Throughput Analysis of ARQ Schemes in Burst Error Channels - Zepernick. H.-J. ...... 134
`The Value of Adaptive Questions in Generalized Mastermind - Roche. J.R. ............................
`135
`Experimental Study of Ants Numerical Aptitude Based on the Ideas of the Information Theory -
`
`117
`118
`119
`
`126
`
`127
`
`128
`
`XI
`
`Page 7 of 23
`
`

`

`136
`
`137
`
`138
`
`139
`
`140
`
`141
`142
`143
`
`Ryabko. B . and Reenikova. 2 ...........................................................................
`Session TUAMl Recording & Line Codes I
`Reduced Complexity MLSD Algorithms for Multi-Track Magnetic Recording Systems -
`Kurtas. E., Proakis. J.G., and Salehi. M ................................................................
`Multi-Track Codes for Magnetic Recording Systems with Servo Positioning Errors -
`Kurtas. E., Proakis. J.G., and Salehi. M ................................................................
`Channel Capacity of M-ary Multitrack Runlength Limited Channels -
`Vasic. B.V., McLaughlin. S.W., and Milenkovic. 0 ......................................................
`Lower Bounds on the Anticipation of Encoders for Input-Constrained Channels -
`Ruckenstein (Sadeh). G . and Roth. R.M. ...............................................................
`Effects of Finite-Precision Arithmetic in Enumerative Coding -
`Schouhamer Immink. K.A. and Janssen. A ..............................................................
`Power Spectral Density of Multitrack (0. G/I) Codes - Milenkovid. 0 . and Vasid. B .....................
`Enumerative Huffman Coding - van der Walt. W . and Ferreira. H.C. ..................................
`On the Construction of Constrained Codes Employing Sequence Replacement Techniques -
`van Wijngaarden. A.J. and Schouhamer Immink. K.A. ..................................................
`144
`The Approximate Eigenvector Associated with a Modulation Code - Hollmann. H.D.L. ................ 145
`Session TUAMZ Communication for Fading Channels I
`Space-Time Codes for Wireless Communication - Calderbank. A.R., Seshadri. N., and Tarokh. V ....... 146
`Decision Feedback MLD for CTDMA System - Wu. Y., Darnell. M., and Fan. P ........................
`147
`An Adaptive Projection Receiver for Asynchronous Coded CDMA -
`Schlegel. C., Alexander. P., and Roy. S ..................................................................
`Modeling and Undetected Error Performance of Diversity Channels -
`Swarts. F., Coetzee. C.S., and Ferreira. H.C. ...........................................................
`A Broadcast Strategy for the Gaussian Slowly Fading Channel - Shamai (Shitz). S .....................
`Performance of Joint Spatial and Temporal Multiuser Detection Using Adaptive Array Antenna in
`both Transmitter and Receiver for DS/CDMA - Kohno. R . and Ishii. N ................................
`A Two-Stage SPRT-Based Acquisition Scheme for CDMA Wireless Communication Systems -
`Lin. J.-C. and Wei. C.-H. .............................................................................. 152
`Multiple-Antenna Transmission with Partial Side Information - Narula. A . and Trott. M.D. ............ 153
`Cooperative Signal Reception and Down-Link Beam Forming in Cellular Mobile Communications -
`Asakura. H . and Matsumoto. T .........................................................................
`Session TUAMS
`Identification and Generation of Randomness
`On Maximum Number of Probability Measures on Finite Set Separated in L1 Metrics -
`Bassalygo. L.A. and Burnashev. M.V. ..................................................................
`155
`Identification of Messages and Identifying Zeroes of a Function - Kleinewaechter. C .................... 156
`Common Randomness and Secret Key Generation with a Helper - Csisz&r. 1 . and Narayan. P .......... 157
`Random Number Generation with Cost by an Interval Algorithm - Hoshi. M . and Han. T.S. ........... 158
`Some Estimates of the Average Number of Guesses to Determine a Random Variable -
`Dragomir. S.S. and Boztq. S ...........................................................................
`159
`Elementary Forward Error Control for Identification Codes - van der Meulen. E.C. and Csibi. S ........ 160
`Finite-Memory Hypothesis Testing with Semi-bounded Likelihood Ratio -
`
`148
`
`149
`150
`
`151
`
`154
`
`Page 8 of 23
`
`

`

`168
`
`1’90
`
`175.
`
`163
`
`Koplowitz. J . and Kulkarni. S.R. ....................................................................... 161
`Joint Source-Channel Coding and Guessing - Arikan. E . and Merhav. N ...............................
`162
`Information Reconstruction Using Minimum Number of Erroneous Patterns and Optimization
`Problems of Multiple Transmission - Levenshtein. V.I. ................................................
`Session TUAM4 Coded Modulation XI
`Approaching the Capacity of the AWGN Channel with Coset Codes and Multilevel Coset Codes -
`Forney Jr., G.D. .......................................................................................
`164
`Analysis of Power Densib Spectra for Coded Modulatilon .- Eier. R . and Kratochwil, K ................. 165
`Trellis Code Construction for the Joint Source-Channel Problem - Belfiore, J.-C. and Guisantes, J.R. * 166
`Performance of High Diversity Multidimensional Constellations - Taricco, G . and Viterbo. E ........... 167
`Concordant and Partially Concordant Ring Convolutional Codes for CPFSK -
`Ugrelidze, N., Shavgulidze, S., and Chachua, L ..........................................................
`A New Signal Constellation for the Hierarchical Transmission of Two Equally Sized Data Streams -
`Seeger. A ............................................................................................... 1139
`Block Coded Modulation Using Two-Level Group Codes over Generalized Quaternion Groups -
`Selvakumaran, T.V. and Sundar Rajan, B ..............................................................
`Block Coded Asymmetric PSK Modulation Using Two-Level Group Codes over Dihedral Groups --
`Bali, J . and Sundar Rajan, B ...........................................................................
`Session TUAMS Cryptology XI
`Aspects of Authentication and Cryptology - Baumer. L ............................................... 172
`Codes Combining Error Detection and Authentication - Johansson. T .................................
`173
`Hash Codes - Bassalygo. L.A., Burmester, M., Dyachlcov. A., and KahstianskEI. G .....................
`174
`Fast Authentication Codes Based on Random Polynomial Ressdue Classes -
`Afanassiev, V., Smeets, B., and Gehrmann, C .......................................................... 175
`Large Deviations for Performance Analysis of Signature Authentication -
`O’Sullivan, J.A. and Ryleeva, N ........................................................................
`176
`Large S-Box Design Using a Converging Method - Hendessi, F., Gulliver, T.A., and Sheikh, A.U.H. .... 177
`Reconfigurable Feedback Shift Registers - Chan, A.H. and MQdard, M .................................
`178
`An Algebraic Geometric Single Key Cryptosystem Using Stream Ciphers - Dawson. E . and Polemi. D . . 179
`Cryptographic Design Based on Cellular Automata - (de la Guia.Martinez. D . and Flister.Sabater, A . . . 180
`Session TUAMG Rate Distortion Theory
`Spectral Entropy, Equivalent Bandwidth and Minimum Coefficient Rate - Yang, W . and Gibson, J.D. .. 181
`An Information-Spectrum Approach to Source Coding Theorems with a Fidelity Criterion - Han, T.S. . 182
`A Universal Data Compression with Common Side Information - Muramatsu, J . and Kanaya. F ........ 183
`Fixed-Normal Lossy Lempel-Ziv Algorithm - Finamore, W.A. and Pinho. M.S. ........................
`184
`A Simplistic. Universal Lossy Source Code - Neuhoff. D.L. and Shields. P.C. ...........................
`185
`A Type Generator Model for Adaptive Lossy Compression - Zamir. R . and Rose. K ....................
`186
`High-Resolution Source Coding for Non-Difference Distortion Measures: The Rate Distortion
`Function - Linder, T . and Zamir, R ...................................................................
`Complexity Distortion Theory - Sow, D . and Eleftheriadis. A ..........................................
`Data Compression with Noise Suppression: A New Approach -
`Torokhti, A., Wowlett, P., Moran, W., Gray, D., and Elhay. S ...........................................
`
`187
`188
`
`189
`
`XI111
`
`Page 9 of 23
`
`

`

`190
`
`191
`
`192
`
`Session TUAM? Detection Theory I
`A New Method for the Computation of Relative Efficiency (RE) of Detectors .
`Seyfe, B., Nikoofar. H.R., and Kahrizi. M ...............................................................
`Adaptive Reception in Impulsive Noise -
`Gonzalez. J.G., Griffith. D.W., Cooper 111. A.B., and Arce. G.R. ........................................
`Pipelined Sequential Probability Ratio Tests for Hybrid Serial Search -
`Hosangadi. G.S. and Baum. C.W. ......................................................................
`Comparison of Several Receiver Structures for Trellis-Coded GMSK Signals: Analytical and Simulation
`Results - Tyczka. P . and Holubowicz. W ..............................................................
`193
`Aspects on Detection of Binary Signals on the Rayleigh Fading Channel - Hansson. U . and Aulin. T ... 194
`Turbo-Based Multiuser Detection - Moher. M.L. ......................................................
`195
`Weak-Signal Diversity Detection in Narrowband Non-Gaussian Noise - Izzo. L . and Tanda. M .......... 196
`On the Equivalence of Single- and Multicarrier Modulation: A New View -
`Fischer. R.F.H. and Huber. J.B. ........................................................................
`197
`M . L . Estimation of Phase and Frequency of MPSK Signals - Taich. D . and Bar.David. I ............... 198
`Session TUAMS Codes over Z4
`Type I1 Codes over 24 - Bonnecaze. A., Sold. P., Bachoc. C., and Mourrain. B .........................
`199
`Cyclic Self-Dual Z4-Codes - Pless. V., SOM. P., and Qian. Z ............................................
`200
`All Z4 Codes of Type I1 and Length 16 are Known - Pless. V., Leon. J.S., and Fields. J ................ 201
`All Self-Dual 24 Codes of Length 15 or Less are Known - Fields. J., Pless. V., and Leon. J.S. .......... 202
`Generalized Lee Weights for Codes over 24 - Hove. B ..................................................
`203
`On the Minimum Support Weights of Goethals Codes over 2 4 - Yang. K . and Helleseth. T ............. 204
`On the Generalized Hamming Weights for Preparata Codes over 2 4 - Yang. K . and Helleseth. T ........ 205
`Algebraic-Geometric Codes over 24 - Shanbhag. A.G. and Kumar. P.V. ................................
`206
`Type I1 Self-Dual Codes over Finite Rings and Even Unimodular Lattices -
`Dougherty. S.T., Gulliver. T.A., and Harada. M ......................................................... 207
`Session TUPMl Neural Networks & Game Theory
`Convergence Analysis of Stochastic Pseudo-Gradient Algorithms and Application to Learning in
`Feedforward Neural Networks - Tadit. V . and Stankovit. S ............................................
`Utilisation of an Adaptive Resonance Theory Neural Network as a Genetic Algorithm Fitness
`Evaluator - Burton. A.R. and Vladimirova. T .........................................................
`Cantonese Phonemes Recognition using Modular Neural Network Approach -
`Hui. W.M., Liu. P.C.K., and Li. K.C. ..................................................................
`210
`State Clustering Method for Solving a Dynamic Jamming Game - Mallik. R.K. ........................
`211
`Handwritten Numeral Recognition Using a Sequential Classifier - Lee. L.L. and Gomes. N.R. .......... 212
`New Improvements on the Real-Time Recurrent Learning Algorithm - Coelho. P.H.G. ................. 213
`On Grid Solutions of a Dynamic Jamming Game - Mallik. R.K. and Scholtz. R.A. .....................
`214
`On Associative Nets - D’yachkov. A.G. and Rykov. V.V. ..............................................
`215
`Session TUBMZl Recording & Line Codes I1
`Irreducible Components of Canonica

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket