total 18504took 0.25s

Incentive Mechanisms for Motivating Mobile Data Offloading in Heterogeneous Networks: A Salary-Plus-Bonus ApproachFeb 08 2018In this paper, a salary-plus-bonus incentive mechanism is proposed to motivate WiFi Access Points (APs) to provide data offloading service for mobile network operators (MNOs). Under the proposed salary-plus-bonus scheme, WiFi APs are rewarded not only ... More

Online Decomposition of Compressive Streaming Data Using $n$-$\ell_1$ Cluster-Weighted MinimizationFeb 08 2018We consider a decomposition method for compressive streaming data in the context of online compressive Robust Principle Component Analysis (RPCA). The proposed decomposition solves an $n$-$\ell_1$ cluster-weighted minimization to decompose a sequence ... More

Some application of difference equations in Cryptography and Coding TheoryFeb 08 2018In this paper, we present some applications of a difference equation of degree k in Cryptography and Coding Theory.

On the Packet Decoding Delay of Linear Network Coded Wireless BroadcastFeb 08 2018We apply linear network coding (LNC) to broadcast a block of data packets from one sender to a set of receivers via lossy wireless channels, assuming each receiver already possesses a subset of these packets and wants the rest. We aim to characterize ... More

General Strong PolarizationFeb 08 2018Ar\i kan's exciting discovery of polar codes has provided an altogether new way to efficiently achieve Shannon capacity. Given a (constant-sized) invertible matrix $M$, a family of polar codes can be associated with this matrix and its ability to approach ... More

Coded Caching with Heterogeneous Cache Sizes and Link Qualities: The Two-User CaseFeb 08 2018The centralized coded caching problem is studied under heterogeneous cache sizes and channel qualities from the server to the users, focusing on the two-user case. More specifically, a server holding $N$ files is considered to be serving two users with ... More

On Capacity of Non-Coherent Diamond NetworksFeb 07 2018There is a vast body of work on the capacity bounds for a "coherent" wireless network, where the network channel gains are known, at least at the destination. However, there has been much less attention to the case where the network parameters (channel ... More

Minimizing Latency for Secure Coded Computing Using Secret Sharing via Staircase CodesFeb 07 2018We consider the setting of a Master server, M, who possesses confidential data (e.g., personal, genomic or medical data) and wants to run intensive computations on it, as part of a machine learning algorithm for example. The Master wants to distribute ... More

OTFS: A New Generation of Modulation Addressing the Challenges of 5GFeb 07 2018In this paper, we introduce a new 2D modulation scheme referred to as OTFS (Orthogonal Time Frequency & Space) that multiplexes information QAM symbols over new class of carrier waveforms that correspond to localized pulses in a signal representation ... More

Out-of-Band Radiation from Antenna Arrays ClarifiedFeb 07 2018Non-linearities in radio-frequency (RF) transceiver hardware, particularly in power amplifiers, cause distortion in-band and out-of-band. Contrary to claims made in recent literature, in a multiple-antenna system this distortion is correlated across the ... More

New Cramer-Rao-Type Bound for Constrained Parameter EstimationFeb 07 2018Non-Bayesian parameter estimation under parametric constraints is encountered in numerous applications in signal processing, communications, and control. Mean-squared-error (MSE) lower bounds are widely used as performance benchmarks and for system design. ... More

Spatial Modulation Assisted Multi-Antenna Non-Orthogonal Multiple AccessFeb 07 2018Multi-antenna non-orthogonal multiple access (NOMA) is a promising technique to significantly improve the spectral efficiency and support massive access, which has received considerable interests from academic and industry. This article first briefly ... More

Adaptive Coded Caching for Fair Delivery over Fading ChannelsFeb 07 2018The performance of existing \emph{coded caching} schemes is sensitive to the worst channel quality, a problem which is exacerbated when communicating over fading channels. In this paper, we address this limitation in the following manner: \emph{in short-term}, ... More

Erasure correction of scalar codes in the presence of stragglersFeb 06 2018Recent advances in coding for distributed storage systems have reignited the interest in scalar codes over extension fields. In parallel, the rise of large-scale distributed systems has motivated the study of computing in the presence of stragglers, i.e., ... More

Asymptotic Analysis of Normalized SNR-Based Scheduling in Uplink Cellular Networks with Truncated Channel Inversion Power ControlFeb 06 2018This paper provides the signal-to-interference-plus-noise ratio (SINR) complimentary cumulative distribution function (CCDF) and average data rate of the normalized SNR-based scheduling in an uplink cellular network using stochastic geometry. The uplink ... More

Generalizing Multiple Access Wiretap and Wiretap II Channel Models: Achievable Rates and Cost of Strong SecrecyFeb 06 2018In this paper, new two-user multiple access wiretap channel models are studied. First, the multiple access wiretap channel II with a discrete memoryless main channel, under three different wiretapping scenarios, is introduced. The wiretapper, as in the ... More

Age-Minimal Online Policies for Energy Harvesting Sensors with Incremental Battery RechargesFeb 06 2018A sensor node that is sending measurement updates regarding some physical phenomenon to a destination is considered. The sensor relies on energy harvested from nature to transmit its updates, and is equipped with a finite $B$-sized battery to save its ... More

How to Mobilize mmWave: A Joint Beam and Channel Tracking ApproachFeb 06 2018Maintaining reliable millimeter wave (mmWave) connections to many fast-moving mobiles is a key challenge in the theory and practice of 5G systems. In this paper, we develop a new algorithm that can jointly track the direction and channel coefficient of ... More

Uplink Channel Estimation and Data Transmission in Millimeter-Wave CRAN with Lens Antenna ArraysFeb 06 2018Millimeter-wave (mmWave) communication and network densification hold great promise for achieving high-rate communication in next-generation wireless networks. Cloud radio access network (CRAN), in which low-complexity remote radio heads (RRHs) coordinated ... More

A Distance Between Channels: the average error of mismatched channelsFeb 06 2018Two channels are equivalent if their maximum likelihood (ML) decoders coincide for every code. We show that this equivalence relation partitions the space of channels into a generalized hyperplane arrangement. With this, we define a coding distance between ... More

Storage-Latency Trade-off in Cache-Aided Fog Radio Access NetworksFeb 06 2018A fog radio access network (F-RAN) is studied, in which $K_T$ edge nodes (ENs) connected to a cloud server via orthogonal fronthaul links, serve $K_R$ users through a wireless Gaussian interference channel. Both the ENs and the users have finite-capacity ... More

Supporting UAV Cellular Communications through Massive MIMOFeb 05 2018In this article, we provide a much-needed study of UAV cellular communications, focusing on the rates achievable for the UAV downlink command and control (C&C) channel. For this key performance indicator, we perform a realistic comparison between existing ... More

Covariance Matrix Estimation for Massive MIMOFeb 05 2018We propose a novel pilot structure for covariance matrix estimation in massive multiple-input multiple-output (MIMO) systems in which each user transmits two pilot sequences, with the second pilot sequence multiplied by a random phase-shift. The covariance ... More

Rate-Energy Region in Wireless Information and Power Transfer: New Receiver Architecture and Practical ModulationFeb 05 2018When simultaneous wireless information and power transfer is carried out, a fundamental tradeoff between achievable rate and harvested energy exists because the received power is used for two different purposes. The tradeoff is well characterized by the ... More

MIMO with Energy RecyclingFeb 05 2018Multiple input single output (MISO) point-to-point communication system is considered where the transmitter is designed such that, each antenna can transmit information or harvest energy at any given point in time. We evaluate the achievable rate by this ... More

On OTFS Modulation for High-Doppler Fading ChannelsFeb 03 2018Orthogonal time frequency space (OTFS) modulation is a 2-dimensional (2D) modulation scheme designed in the delay-Doppler domain, unlike traditional modulation schemes which are designed in the time-frequency domain. Through a series of 2D transformations, ... More

On the Minimax Misclassification Ratio of Hypergraph Community DetectionFeb 03 2018Community detection in hypergraphs is explored. Under a generative hypergraph model called "d-wise hypergraph stochastic block model" (d-hSBM) which naturally extends the Stochastic Block Model from graphs to d-uniform hypergraphs, the asymptotic minimax ... More

On taking advantage of multiple requests in error correcting codesFeb 02 2018In most notions of locality in error correcting codes -- notably locally recoverable codes (LRCs) and locally decodable codes (LDCs) -- a decoder seeks to learn a single symbol of a message while looking at only a few symbols of the corresponding codeword. ... More

Is Self-Interference in Full-Duplex Communications a Foe or a Friend?Feb 02 2018This paper studies the potential of harvesting energy from the self-interference of a full-duplex base station. The base station is equipped with a self-interference cancellation switch, which is turned-off for a fraction of the transmission period for ... More

From Clustering Supersequences to Entropy Minimizing Subsequences for Single and Double DeletionsFeb 02 2018A binary string transmitted via a memoryless i.i.d. deletion channel is received as a subsequence of the original input. From this, one obtains a posterior distribution on the channel input, corresponding to a set of candidate supersequences weighted ... More

Robust Sequential Detection in Distributed Sensor NetworksFeb 01 2018We consider the problem of sequential binary hypothesis testing with a distributed sensor network in a non-Gaussian noise environment. To this end, we present a general formulation of the Consensus + Innovations Sequential Probability Ratio Test (CISPRT). ... More

Interference Mitigation Methods for Unmanned Aerial Vehicles Served by Cellular NetworksFeb 01 2018A main challenge in providing connectivity to the low altitude unmanned aerial vehicles (UAVs) through existing cellular network arises due to the increased interference in the network. The increased altitude and favourable propagation condition cause ... More

How many weights can a linear code have?Feb 01 2018We study the combinatorial function $L(k,q),$ the maximum number of nonzero weights a linear code of dimension $k$ over $\F_q$ can have. We determine it completely for $q=2,$ and for $k=2,$ and provide upper and lower bounds in the general case when both ... More

Redundancy of unbounded memory Markov classes with continuity conditionsFeb 01 2018Feb 02 2018We study the redundancy of universally compressing strings $X_1,\dots, X_n$ generated by a binary Markov source $p$ without any bound on the memory. To better understand the connection between compression and estimation in the Markov regime, we consider ... More

Variational image compression with a scale hyperpriorFeb 01 2018We describe an end-to-end trainable model for image compression based on variational autoencoders. The model incorporates a hyperprior to effectively capture spatial dependencies in the latent representation. This hyperprior relates to side information, ... More

Analysis of Coded Selective-Repeat ARQ via Matrix Signal-Flow GraphsJan 31 2018We propose two schemes for selective-repeat ARQ protocols over packet erasure channels with unreliable feedback: (i) a hybrid ARQ protocol with soft combining at the receiver, and (ii) a coded ARQ protocol, by building on the uncoded baseline scheme for ... More

A New Interweave Cognitive Radio Scheme for Out-band Energy Harvesting SystemsJan 31 2018In this paper, a new interweave cognitive radio (CR) transmission scheme is analytically presented for energy harvesting (EH)-enabled transmitting nodes. EH is performed via a dedicated power beacon (PB) base station through wireless power transfer, which ... More

Hierarchical restricted isometry property for Kronecker product measurementsJan 31 2018Hierarchically sparse signals and Kronecker product structured measurements arise naturally in a variety of applications. The simplest example of a hierarchical sparsity structure is two-level $(s,\sigma)$-hierarchical sparsity which features $s$-block-sparse ... More

A Variable Density Sampling Scheme for Compressive Fourier Transform InterferometryJan 31 2018Fourier Transform Interferometry (FTI) is an appealing Hyperspectral (HS) imaging modality in the applications demanding high spectral-resolution, such as fluorescence microscopy. However, the effective resolution of FTI is indeed limited due to the durability ... More

Compressed Anomaly Detection with Multiple Mixed ObservationsJan 31 2018We consider a collection of independent random variables that are identically distributed, except for a small subset which follows a different, anomalous distribution. We study the problem of detecting which random variables in the collection are governed ... More

On Optimal Scheduling for Joint Spatial Division and Multiplexing Approach in FDD Massive MIMOJan 30 2018Massive MIMO is widely considered as a key enabler of the next generation 5G networks. With a large number of antennas at the Base Station, both spectral and energy efficiencies can be enhanced. Unfortunately, the downlink channel estimation overhead ... More

On the Interactive Communication Cost of the Distributed Nearest Lattice Point ProblemJan 30 2018We consider the problem of distributed computation of the nearest lattice point for a two dimensional lattice. An interactive two-party model of communication is considered. Algorithms with bounded, as well as unbounded, number of rounds of communication ... More

Communication-Efficient Search for an Approximate Closest Lattice PointJan 29 2018We consider the problem of finding the closest lattice point to a vector in n-dimensional Euclidean space when each component of the vector is available at a distinct node in a network. Our objectives are (i) minimize the communication cost and (ii) obtain ... More

Quantized Constant Envelope Precoding with PSK and QAM SignalingJan 29 2018Coarsely quantized massive Multiple-Input Multiple-Output (MIMO) systems are gaining more interest due to their power efficiency. We present a new precoding technique to mitigate the Multi-User Interference (MUI) and the quantization distortions in a ... More

Generalized Estimating Equation for the Student-t DistributionsJan 27 2018In \cite{KumarS15J2}, it was shown that a generalized maximum likelihood estimation problem on a (canonical) $\alpha$-power-law model ($\mathbb{M}^{(\alpha)}$-family) can be solved by solving a system of linear equations. This was due to an orthogonality ... More

Detecting Changes in Fully Polarimetric SAR Imagery with Statistical Information TheoryJan 26 2018Images obtained from coherent illumination processes are contaminated with speckle. A prominent example of such imagery systems is the polarimetric synthetic aperture radar (PolSAR). For such remote sensing tool the speckle interference pattern appears ... More

Event-triggered stabilization of disturbed linear systems over digital channelsJan 26 2018We present an event-triggered control strategy for stabilizing a scalar, continuous-time, time-invariant, linear system over a digital communication channel having bounded delay, and in the presence of bounded system disturbance. We propose an encoding-decoding ... More

Improved Finite Blocklength Converses for Slepian-Wolf Coding via Linear ProgrammingJan 26 2018A new finite blocklength converse for the Slepian- Wolf coding problem is presented which significantly improves on the best known converse for this problem, due to Miyake and Kanaya [2]. To obtain this converse, an extension of the linear programming ... More

Fast binary embeddings, and quantized compressed sensing with structured matricesJan 26 2018This paper deals with two related problems, namely distance-preserving binary embeddings and quantization for compressed sensing . First, we propose fast methods to replace points from a subset $\mathcal{X} \subset \mathbb{R}^n$, associated with the Euclidean ... More

Individual testing is optimal for nonadaptive group testing in the linear regimeJan 25 2018We consider nonadaptive probabilistic group testing in the linear regime, where each of n items is defective independently with probability p in (0,1), where p is a constant independent of n. We show that testing each item individually is optimal, in ... More

On the Broadcast Rate of Index Coding Problems with Symmetric and Consecutive InterferenceJan 25 2018A single unicast index coding problem (SUICP) with symmetric and consecutive interference (SCI) has $K$ messages and $K$ receivers, the $k$th receiver $R_k$ wanting the $k$th message $x_k$ and having interference $\mathcal{I}_k= \{x_{k-U-m},\dots,x_{k-m-2},x_{k-m-1}\}\cup\{x_{k+m+1}, ... More

User Association and Resource Allocation in Unified Non-Orthogonal Multiple Access Enabled Heterogeneous Ultra Dense NetworksJan 24 2018Heterogeneous ultra dense networks (HUDNs) and non-orthogonal multiple access (NOMA) have been identified as two proposing techniques for the fifth generation (5G) mobile communication systems due to their great capabilities to enhance spectrum efficiency. ... More

Energy-constrained two-way assisted private and quantum capacities of quantum channelsJan 24 2018Jan 25 2018With the rapid growth of quantum technologies, knowing the fundamental characteristics of quantum systems and protocols is essential for their effective implementation. A particular communication setting that has received increased focus is related to ... More

Further Progress on the GM-MDS Conjecture for Reed-Solomon CodesJan 24 2018Designing good error correcting codes whose generator matrix has a support constraint, i.e., one for which only certain entries of the generator matrix are allowed to be non-zero, has found many recent applications, including in distributed coding and ... More

Random linear binary codes have smaller list sizes than uniformly random binary codesJan 24 2018There has been a great deal of work establishing that random linear codes are as list-decodable as uniformly random codes, in the sense that a random linear binary code of rate $1 - H(p) - \epsilon$ is $(p,O(1/\epsilon))$-list-decodable. In this work, ... More

From Centralized to Decentralized Coded CachingJan 23 2018We consider the problem of designing decentralized schemes for coded caching. In this problem there are $K$ users each caching $M$ files out of a library of $N$ total files. The question is to minimize $R$, the number of broadcast transmissions to satisfy ... More

System-Level Modeling and Optimization of the Energy Efficiency in Cellular Networks -- A Stochastic Geometry FrameworkJan 23 2018In this paper, we analyze and optimize the energy efficiency of downlink cellular networks. With the aid of tools from stochastic geometry, we introduce a new closed-form analytical expression of the potential spectral efficiency (bit/sec/m$^2$). In the ... More

Straggler Mitigation in Distributed Matrix Multiplication: Fundamental Limits and Optimal CodingJan 23 2018We consider the problem of massive matrix multiplication, which underlies many data analytic applications, in a large-scale distributed system comprising a group of worker nodes. We target the stragglers' delay performance bottleneck, which is due to ... More

Optimality of Simple Layered Superposition Coding in the 3 User MISO BC with Finite Precision CSITJan 23 2018We study the $K=3$ user multiple input single output (MISO) broadcast channel (BC) with $M=3$ antennas at the transmitter and $1$ antenna at each receiver, from the generalized degrees of freedom (GDoF) perspective, under the assumption that the channel ... More

Statistical Studies of Fading in Underwater Wireless Optical Channels in the Presence of Air Bubble, Temperature, and Salinity Random Variations (Long Version)Jan 23 2018Feb 05 2018Optical signal propagation through underwater channels is affected by three main degrading phenomena, namely absorption, scattering, and fading. In this paper, we experimentally study the statistical distribution of intensity fluctuations in underwater ... More

Code-Frequency Block Group Coding for Anti-Spoofing Pilot Authentication in Multi-Antenna OFDM SystemsJan 23 2018A pilot spoofer can paralyze the channel estimation in multi-user orthogonal frequency-division multiplexing (OFD- M) systems by using the same publicly-known pilot tones as legitimate nodes. This causes the problem of pilot authentication (PA). To solve ... More

MIMO Underlay Cognitive Radio: Optimized Power Allocation, Effective Number of Transmit Antennas and Harvest-Transmit TradeoffJan 22 2018In this paper, the performance of an underlay multiple-input multiple-output (MIMO) cognitive radio system is analytically studied. In particular, the secondary transmitter operates in a spatial multiplexing transmission mode, while a zero-forcing detector ... More

On the List Decodability of Self-orthogonal Rank Metric CodesJan 22 2018V. Guruswami and N. Resch prove that the list decodability of $\mathbb{F}_q$-linear rank metric codes is as good as that of random rank metric codes in~\cite{venkat2017}. Due to the potential applications of self-orthogonal rank metric codes, we focus ... More

Channel Input Adaptation via Natural Type SelectionJan 21 2018For the model of communication through a discrete memoryless channel using i.i.d. random block codes, where the channel is changing slowly from block to block, we propose a stochastic algorithm for adaptation of the generating distribution of the code ... More

A Rate-Optimal Construction of Codes with Sequential Recovery with Low Block LengthJan 21 2018An erasure code is said to be a code with sequential recovery with parameters $r$ and $t$, if for any $s \leq t$ erased code symbols, there is an $s$-step recovery process in which at each step we recover exactly one erased code symbol by contacting at ... More

Double circulant self-dual and LCD codes over Galois ringsJan 20 2018This paper investigates the existence, enumeration and asymptotic performance of self-dual and LCD double circulant codes over Galois rings of characteristic $p^2$ and order $p^4$ with $p$ and odd prime. When $p \equiv 3 \pmod{4},$ we give an algorithm ... More

A Precise Analysis of PhaseMax in Phase RetrievalJan 20 2018Recovering an unknown complex signal from the magnitude of linear combinations of the signal is referred to as phase retrieval. We present an exact performance analysis of a recently proposed convex-optimization-formulation for this problem, known as ... More

Code Constructions for Distributed Storage With Low Repair Bandwidth and Low Repair ComplexityJan 18 2018We present the construction of a family of erasure correcting codes for distributed storage systems that achieve low repair bandwidth and low repair complexity. The construction is based on two classes of codes, where the primary goal of the first class ... More

The Utility Cost of Robust Privacy GuaranteesJan 18 2018Consider a data publishing setting for a data set with public and private features. The objective of the publisher is to maximize the amount of information about the public features in a revealed data set, while keeping the information leaked about the ... More

Rate-Optimal Streaming Codes for Channels with Burst and Isolated ErasuresJan 18 2018Recovery of data packets from packet erasures in a timely manner is critical for many streaming applications. An early paper by Martinian and Sundberg introduced a framework for streaming codes and designed rate-optimal codes that permit delay-constrained ... More

On the Direction of Discrimination: An Information-Theoretic Analysis of Disparate Impact in Machine LearningJan 16 2018In the context of machine learning, disparate impact refers to a form of systematic discrimination whereby the output distribution of a model depends on the value of a sensitive attribute (e.g., race or gender). In this paper, we present an information-theoretic ... More

On the Distribution of Random Geometric GraphsJan 15 2018Random geometric graphs (RGGs) are commonly used to model networked systems that depend on the underlying spatial embedding. We concern ourselves with the probability distribution of an RGG, which is crucial for studying its random topology, properties ... More

A Semi-Parametric Binning Approach to Quickest Change DetectionJan 15 2018Jan 16 2018The problem of quickest detection of a change in distribution is considered under the assumption that the pre-change distribution is known, and the post-change distribution is only known to belong to a family of distributions distinguishable from a discretized ... More

A Scalable Belief Propagation Algorithm for Radio Signal Based SLAMJan 13 2018Jan 30 2018We present a simultaneous localization and mapping (SLAM) algorithm that is based on radio signals and the association of specular multipath components (MPCs) with geometric features. Especially in indoor scenarios, localization from radio signals is ... More

Boolean functions: noise stability, non-interactive correlation, and mutual informationJan 13 2018Let $\epsilon\in[0, 1/2]$ be the noise parameter and $p>1$. We study the isoperimetric problem that for fixed mean $\E f$ which Boolean function $f$ maximizes the $p$-th moment $\E(T_\epsilon f)^p$ of the noise operator $T_{\epsilon}$ acting on Boolean ... More

A Capacity-Achieving PIR Protocol for Distributed Storage Using an Arbitrary Linear CodeJan 13 2018We propose a private information retrieval (PIR) protocol for distributed storage systems (DSSs) with noncolluding nodes where data is stored using an arbitrary linear code. An expression for the PIR rate, i.e., the ratio of the amount of retrieved stored ... More

On Partly Overloaded Spreading Sequences with Variable Spreading FactorJan 12 2018Future wireless communications systems are expected to support multi-service operation, i.e. especially multi-rate as well as multi-level quality of service (QoS) requirements. This evolution is mainly driven by the success of the Internet of Things (IoT) ... More

Minimax Optimal Additive Functional Estimation with Discrete Distribution: Slow Divergence Speed CaseJan 12 2018This paper addresses an estimation problem of an additive functional of $\phi$, which is defined as $\theta(P;\phi)=\sum_{i=1}^k\phi(p_i)$, given $n$ i.i.d. random samples drawn from a discrete distribution $P=(p_1,...,p_k)$ with alphabet size $k$. We ... More

On Locally Decodable Index CodesJan 11 2018Index coding achieves bandwidth savings by jointly encoding the messages demanded by all the clients in a broadcast channel. The encoding is performed in such a way that each client can retrieve its demanded message from its side information and the broadcast ... More

A Monetary Mechanism for Stabilizing Cooperative Data Exchange with Selfish UsersJan 11 2018This paper considers the problem of stabilizing cooperative data exchange with selfish users. In this setting, each user has a subset of packets in the ground set $X$, and wants all other packets in $X$. The users can exchange their packets by broadcasting ... More

On Maximally Recoverable Codes for Product TopologiesJan 10 2018Given a topology of local parity-check constraints, a maximally recoverable code (MRC) can correct all erasure patterns that are information-theoretically correctable. In a grid-like topology, there are $a$ local constraints in every column forming a ... More

Distribution of the absolute indicator of random Boolean functionsJan 10 2018The absolute indicator is one of the measures used to determine the resistance offered by a Boolean function when used in the design of a symmetric cryptosystem. It was proposed along with the sum of square indicator to evaluate the quality of the diffusion ... More

Asymptotic bounds for spherical codesJan 04 2018The set of all error-correcting codes C over a fixed finite alphabet F of cardinality q determines the set of code points in the unit square with coordinates (R(C), delta (C)):= (relative transmission rate, relative minimal distance). The central problem ... More

A New Design Paradigm for Secure Full-Duplex Multiuser SystemsJan 03 2018Jan 27 2018We consider a full-duplex (FD) multiuser system where an FD base station (BS) is designed to simultaneously serve both downlink (DL) and uplink (UL) users in the presence of half-duplex eavesdroppers (Eves). The problem is to maximize the minimum (max-min) ... More

Ultra-Reliable Cooperative Short-Packet Communications with Wireless Energy TransferJan 01 2018We analyze a cooperative wireless communication system with finite block length and finite battery energy, under quasi-static Rayleigh fading. Source and relay nodes are powered by a wireless energy transfer (WET) process, while using the harvested energy ... More

Arrow of time and its reversal on IBM quantum computerDec 28 2017Uncovering the origin of the arrow of time remains a fundamental scientific challenge. Within the framework of statistical physics, this problem was inextricably associated with the Second Law of Thermodynamics, which declares that entropy growth proceeds ... More

The information bottleneck and geometric clusteringDec 27 2017The information bottleneck (IB) approach to clustering takes a joint distribution $P\!\left(X,Y\right)$ and maps the data $X$ to cluster labels $T$ which retain maximal information about $Y$ (Tishby et al., 1999). This objective results in an algorithm ... More

A Low-Cost Robust Distributed Linearly Constrained Beamformer for Wireless Acoustic Sensor Networks with Arbitrary TopologyDec 23 2017We propose a new robust distributed linearly constrained beamformer (BF) which utilizes a set of linear equality constraints to reduce the cross power spectral density matrix to a block-diagonal form. The proposed BF has a convenient objective function ... More

Probabilistic Eigenvalue Shaping for Nonlinear Fourier Transform TransmissionDec 22 2017We consider a nonlinear Fourier transform (NFT)-based transmission scheme, where data is embedded into the imaginary part of the nonlinear discrete spectrum. Inspired by probabilistic amplitude shaping, we propose a probabilistic eigenvalue shaping (PES) ... More

Block-Diagonal and LT Codes for Distributed Computing With Straggling ServersDec 21 2017We propose two coded schemes for the distributed computing problem of multiplying a matrix by a set of vectors. The first scheme is based on partitioning the matrix into submatrices and applying maximum distance separable (MDS) codes to each submatrix. ... More

Graph-based Transform Coding with Application to Image CompressionDec 18 2017Dec 28 2017In this paper, we propose a new graph-based coding framework and illustrate its application to image compression. Our approach relies on the careful design of a graph that optimizes the overall rate-distortion performance through an effective graph-based ... More

Wireless Energy Beamforming Using Signal Strength FeedbackDec 10 2017Multiple antenna techniques, that allow energy beamforming, have been looked upon as a possible candidate for increasing the efficiency of the transfer process between the energy transmitter (ET) and the energy receiver (ER) in wireless energy transfer. ... More

Maximum entropy low-rank matrix recoveryDec 08 2017We propose a novel, information-theoretic method, called MaxEnt, for efficient data requisition for low-rank matrix recovery. This proposed method has important applications to a wide range of problems in image processing, text document indexing and system ... More

Parameter-free $\ell_p$-Box Decoding of LDPC CodesNov 29 2017The Alternating Direction Method of Multipliers (ADMM) decoding of Low Density Parity Check (LDPC) codes has received many attentions due to its excellent performance at the error floor region. In this paper, we develop a parameter-free decoder based ... More

Link Selection in Hybrid RF/VLC Systems under Statistical Queueing ConstraintsNov 22 2017The co-deployment of radio frequency (RF) and visible light communications (VLC) technologies has been investigated in indoor environments to enhance network performances and to address specific quality-of-service (QoS) constraints. In this paper, we ... More

Deceptiveness of internet data for disease surveillanceNov 16 2017Quantifying how many people are or will be sick, and where, is a critical ingredient in reducing the burden of disease because it helps the public health system plan and implement effective outbreak response. This process of disease surveillance is currently ... More

Achievable Rates and Training Overheads for a Measured LOS Massive MIMO ChannelNov 09 2017This paper presents achievable uplink (UL) sumrate predictions for a measured line-of-sight (LOS) massive multiple-input, multiple-output (MIMO) (MMIMO) scenario and illustrates the trade-off between spatial multiplexing performance and channel de-coherence ... More

Asymptotic Signal Detection Rates with 1-bit Array MeasurementsNov 02 2017This work considers detecting the presence of a band-limited random radio source using an antenna array featuring a low-complexity digitization process with single-bit output resolution. In contrast to high-resolution analog-to-digital conversion, such ... More

A Framework for Over-the-air Reciprocity Calibration for TDD Massive MIMO SystemsOct 30 2017One of the biggest challenges in operating massive multiple-input multiple-output systems is the acquisition of accurate channel state information at the transmitter. To take up this challenge, time division duplex is more favorable thanks to its channel ... More

Individuals, Institutions, and Innovation in the Debates of the French RevolutionOct 18 2017The French Revolution brought principles of "liberty, equality, and brotherhood" to bear on the day-to-day challenges of governing what was then the largest country in Europe. Its experiments provided a model for future revolutions and democracies across ... More