Âé¶¹´«Ã½AV

Source Coding for Markov Sources With Partial Memoryless Side Information at the Decoder

Submitted by admin on Mon, 11/11/2024 - 19:45

We consider the one helper source coding problem posed and investigated by Ahlswede, Körner, and Wyner for a class of information sources with memory. For this class of information sources we give explicit inner and outer bounds of the admissible rate region. We also give a certain nontrivial class of information sources where the inner and outer bounds match.

Quantum Sensing and Communication via Non-Gaussian States

Submitted by admin on Mon, 11/11/2024 - 19:45

Quantum sensing and communication (QSC) is pivotal for developing next-generation networks with unprecedented performance. Many implementations of existing QSC systems employ Gaussian states as they can be easily realized using current technologies. However, Gaussian states lack non-classical properties necessary to unleash the full potential of QSC. This motivates the use of non-Gaussian states, which have non-classical properties beneficial for QSC. This paper establishes a theoretical foundation for QSC employing photon-varied Gaussian states (PVGSs).

Deviation From Maximal Entanglement for Mid-Spectrum Eigenstates of Local Hamiltonians

Submitted by admin on Thu, 10/31/2024 - 20:45

In a spin chain governed by a local Hamiltonian, we consider a microcanonical ensemble in the middle of the energy spectrum and a contiguous subsystem whose length is a constant fraction of the system size. We prove that if the bandwidth of the ensemble is greater than a certain constant, then the average entanglement entropy (between the subsystem and the rest of the system) of eigenstates in the ensemble deviates from the maximum entropy by at least a positive constant.

Rate-Constrained Remote Contextual Bandits

Submitted by admin on Mon, 10/28/2024 - 01:24

We consider a rate-constrained contextual multi-armed bandit (RC-CMAB) problem, in which a group of agents are solving the same contextual multi-armed bandit (CMAB) problem. However, the contexts are observed by a remotely connected entity, i.e., the decision-maker, that updates the policy to maximize the returned rewards, and communicates the arms to be sampled by the agents to a controller over a rate-limited communications channel.

On the Rate-Distortion-Perception Function

Submitted by admin on Mon, 10/28/2024 - 01:24

Rate-distortion-perception theory extends Shannon’s rate-distortion theory by introducing a constraint on the perceptual quality of the output. The perception constraint complements the conventional distortion constraint and aims to enforce distribution-level consistencies. In this new theory, the information-theoretic limit is characterized by the rate-distortion-perception function.

Optimality of Huffman Code in the Class of 1-Bit Delay Decodable Codes

Submitted by admin on Mon, 10/28/2024 - 01:24

For a given independent and identically distributed (i.i.d.) source, Huffman code achieves the optimal average codeword length in the class of instantaneous codes with a single code table. However, it is known that there exist time-variant encoders, which achieve a shorter average codeword length than the Huffman code, using multiple code tables and allowing at most $k$ -bit decoding delay for $k = 2, 3, 4, \ldots $ .