-
Multi-Group Proportional Representation
Authors:
Alex Oesterling,
Claudio Mayrink Verdun,
Carol Xuan Long,
Alex Glynn,
Lucas Monteiro Paes,
Sajani Vithana,
Martina Cardone,
Flavio P. Calmon
Abstract:
Image search and retrieval tasks can perpetuate harmful stereotypes, erase cultural identities, and amplify social disparities. Current approaches to mitigate these representational harms balance the number of retrieved items across population groups defined by a small number of (often binary) attributes. However, most existing methods overlook intersectional groups determined by combinations of g…
▽ More
Image search and retrieval tasks can perpetuate harmful stereotypes, erase cultural identities, and amplify social disparities. Current approaches to mitigate these representational harms balance the number of retrieved items across population groups defined by a small number of (often binary) attributes. However, most existing methods overlook intersectional groups determined by combinations of group attributes, such as gender, race, and ethnicity. We introduce Multi-Group Proportional Representation (MPR), a novel metric that measures representation across intersectional groups. We develop practical methods for estimating MPR, provide theoretical guarantees, and propose optimization algorithms to ensure MPR in retrieval. We demonstrate that existing methods optimizing for equal and proportional representation metrics may fail to promote MPR. Crucially, our work shows that optimizing MPR yields more proportional representation across multiple intersectional groups specified by a rich function class, often with minimal compromise in retrieval accuracy.
△ Less
Submitted 11 July, 2024;
originally announced July 2024.
-
On the Secrecy Capacity of 1-2-1 Atomic Networks
Authors:
Mohammad Milanian,
Minoh Jeong,
Martina Cardone
Abstract:
We consider the problem of secure communication over a noiseless 1-2-1 network, an abstract model introduced to capture the directivity characteristic of mmWave communications. We focus on structured networks, which we refer to as 1-2-1 atomic networks. Broadly speaking, these are characterized by a source, a destination, and three layers of intermediate nodes with sparse connections. The goal is…
▽ More
We consider the problem of secure communication over a noiseless 1-2-1 network, an abstract model introduced to capture the directivity characteristic of mmWave communications. We focus on structured networks, which we refer to as 1-2-1 atomic networks. Broadly speaking, these are characterized by a source, a destination, and three layers of intermediate nodes with sparse connections. The goal is for the source to securely communicate to the destination in the presence of an eavesdropper with unbounded computation capabilities, but limited network presence. We derive novel upper and lower bounds on the secrecy capacity of 1-2-1 atomic networks. These bounds are shown to be tighter than existing bounds in some regimes. Moreover, in such regimes, the bounds match and hence, they characterize the secrecy capacity of 1-2-1 atomic networks.
△ Less
Submitted 9 May, 2024;
originally announced May 2024.
-
A Comprehensive Study on Ziv-Zakai Lower Bounds on the MMSE
Authors:
Minoh Jeong,
Alex Dytso,
Martina Cardone
Abstract:
This paper explores Bayesian lower bounds on the minimum mean squared error (MMSE) that belong to the Ziv-Zakai (ZZ) family. The ZZ technique relies on connecting the bound to an M-ary hypothesis testing problem. Three versions of the ZZ bound (ZZB) exist: the first relies on the so-called valley-filling function (VFF), the second omits the VFF, and the third, i.e., the single-point ZZB (SZZB), us…
▽ More
This paper explores Bayesian lower bounds on the minimum mean squared error (MMSE) that belong to the Ziv-Zakai (ZZ) family. The ZZ technique relies on connecting the bound to an M-ary hypothesis testing problem. Three versions of the ZZ bound (ZZB) exist: the first relies on the so-called valley-filling function (VFF), the second omits the VFF, and the third, i.e., the single-point ZZB (SZZB), uses a single point maximization. The first part of this paper provides the most general version of the bounds. First, it is shown that these bounds hold without any assumption on the distribution of the estimand. Second, the SZZB bound is extended to an M-ary setting and a version of it for the multivariate case is provided. In the second part, general properties of the bounds are provided. First, it is shown that all the bounds tensorize. Second, a complete characterization of the high-noise asymptotic is provided, which is used to argue about the tightness of the bounds. Third, the low-noise asymptotic is provided for mixed-input distributions and Gaussian additive noise channels. Specifically, in the low-noise, it is shown that the SZZB is not always tight. In the third part, the tightness of the bounds is evaluated. First, it is shown that in the low-noise regime the ZZB bound without the VFF is tight for mixed-input distributions and Gaussian additive noise channels. Second, for discrete inputs, the ZZB with the VFF is shown to be always sub-optimal, and equal to zero without the VFF. Third, unlike for the ZZB, an example is shown for which the SZZB is tight to the MMSE for discrete inputs. Fourth, sufficient and necessary conditions for the tightness of the bounds are provided. Finally, some examples are shown in which the bounds in the ZZ family outperform other well-known Bayesian bounds, i.e., the Cramér-Rao bound and the maximum entropy bound.
△ Less
Submitted 5 April, 2024;
originally announced April 2024.
-
Sparsity-Constrained Community-Based Group Testing
Authors:
Sarthak Jain,
Martina Cardone,
Soheil Mohajer
Abstract:
In this work, we consider the sparsity-constrained community-based group testing problem, where the population follows a community structure. In particular, the community consists of $F$ families, each with $M$ members. A number $k_f$ out of the $F$ families are infected, and a family is said to be infected if $k_m$ out of its $M$ members are infected. Furthermore, the sparsity constraint allows a…
▽ More
In this work, we consider the sparsity-constrained community-based group testing problem, where the population follows a community structure. In particular, the community consists of $F$ families, each with $M$ members. A number $k_f$ out of the $F$ families are infected, and a family is said to be infected if $k_m$ out of its $M$ members are infected. Furthermore, the sparsity constraint allows at most $ρ_T$ individuals to be grouped in each test. For this sparsity-constrained community model, we propose a probabilistic group testing algorithm that can identify the infected population with a vanishing probability of error and we provide an upper-bound on the number of tests. When $k_m = Θ(M)$ and $M \gg \log(FM)$, our bound outperforms the existing sparsity-constrained group testing results trivially applied to the community model. If the sparsity constraint is relaxed, our achievable bound reduces to existing bounds for community-based group testing. Moreover, our scheme can also be applied to the classical dilution model, where it outperforms existing noise-level-independent schemes in the literature.
△ Less
Submitted 19 March, 2024;
originally announced March 2024.
-
Achieving Low Latency at Low Outage: Multilevel Coding for mmWave Channels
Authors:
Mine Gokce Dogan,
Jaimin Shah,
Martina Cardone,
Christina Fragouli,
Wei Mao,
Hosein Nikopour,
Rath Vannithamby
Abstract:
Millimeter-wave (mmWave) spectrum is expected to support data-intensive applications that require ultra-reliable low-latency communications (URLLC). However, mmWave links are highly sensitive to blockage, which may lead to disruptions in the communication. Traditional techniques that build resilience against such blockages (among which are interleaving and feedback mechanisms) incur delays that ar…
▽ More
Millimeter-wave (mmWave) spectrum is expected to support data-intensive applications that require ultra-reliable low-latency communications (URLLC). However, mmWave links are highly sensitive to blockage, which may lead to disruptions in the communication. Traditional techniques that build resilience against such blockages (among which are interleaving and feedback mechanisms) incur delays that are too large to effectively support URLLC. This calls for novel techniques that ensure resilient URLLC. In this paper, we propose to deploy multilevel codes over space and over time. These codes offer several benefits, such as they allow to control what information is received and they provide different reliability guarantees for different information streams based on their priority. We also show that deploying these codes leads to attractive trade-offs between rate, delay, and outage probability. A practically-relevant aspect of the proposed technique is that it offers resilience while incurring a low operational complexity.
△ Less
Submitted 10 February, 2024;
originally announced February 2024.
-
Data-Driven Estimation of the False Positive Rate of the Bayes Binary Classifier via Soft Labels
Authors:
Minoh Jeong,
Martina Cardone,
Alex Dytso
Abstract:
Classification is a fundamental task in many applications on which data-driven methods have shown outstanding performances. However, it is challenging to determine whether such methods have achieved the optimal performance. This is mainly because the best achievable performance is typically unknown and hence, effectively estimating it is of prime importance. In this paper, we consider binary class…
▽ More
Classification is a fundamental task in many applications on which data-driven methods have shown outstanding performances. However, it is challenging to determine whether such methods have achieved the optimal performance. This is mainly because the best achievable performance is typically unknown and hence, effectively estimating it is of prime importance. In this paper, we consider binary classification problems and we propose an estimator for the false positive rate (FPR) of the Bayes classifier, that is, the optimal classifier with respect to accuracy, from a given dataset. Our method utilizes soft labels, or real-valued labels, which are gaining significant traction thanks to their properties. We thoroughly examine various theoretical properties of our estimator, including its consistency, unbiasedness, rate of convergence, and variance. To enhance the versatility of our estimator beyond soft labels, we also consider noisy labels, which encompass binary labels. For noisy labels, we develop effective FPR estimators by leveraging a denoising technique and the Nadaraya-Watson estimator. Due to the symmetry of the problem, our results can be readily applied to estimate the false negative rate of the Bayes classifier.
△ Less
Submitted 27 January, 2024;
originally announced January 2024.
-
Uniform Distribution on $(n-1)$-Sphere: Rate-Distortion under Squared Error Distortion
Authors:
Alex Dytso,
Martina Cardone
Abstract:
This paper investigates the rate-distortion function, under a squared error distortion $D$, for an $n$-dimensional random vector uniformly distributed on an $(n-1)$-sphere of radius $R$. First, an expression for the rate-distortion function is derived for any values of $n$, $D$, and $R$. Second, two types of asymptotics with respect to the rate-distortion function of a Gaussian source are characte…
▽ More
This paper investigates the rate-distortion function, under a squared error distortion $D$, for an $n$-dimensional random vector uniformly distributed on an $(n-1)$-sphere of radius $R$. First, an expression for the rate-distortion function is derived for any values of $n$, $D$, and $R$. Second, two types of asymptotics with respect to the rate-distortion function of a Gaussian source are characterized. More specifically, these asymptotics concern the low-distortion regime (that is, $D \to 0$) and the high-dimensional regime (that is, $n \to \infty$).
△ Less
Submitted 8 January, 2024;
originally announced January 2024.
-
Supporting Passive Users in mmWave Networks
Authors:
Mine Gokce Dogan,
Martina Cardone,
Christina Fragouli
Abstract:
The interference from active to passive users is a well-recognized challenge in millimeter-wave (mmWave) communications. We propose a method that enables to limit the interference on passive users (whose presence may not be detected since they do not transmit) with a small penalty to the throughput of active users. Our approach abstracts away (in a simple, yet informative way) the physical layer c…
▽ More
The interference from active to passive users is a well-recognized challenge in millimeter-wave (mmWave) communications. We propose a method that enables to limit the interference on passive users (whose presence may not be detected since they do not transmit) with a small penalty to the throughput of active users. Our approach abstracts away (in a simple, yet informative way) the physical layer component and it leverages the directivity of mmWave links and the available network path diversity. We provide linear programming formulations, lower bounds on active users rates, numerical evaluations, and we establish a connection with the problem of (information theoretically) secure communication over mmWave networks.
△ Less
Submitted 27 August, 2023;
originally announced August 2023.
-
Probabilistic Group Testing in Distributed Computing with Attacked Workers
Authors:
Sarthak Jain,
Martina Cardone,
Soheil Mohajer
Abstract:
The problem of distributed matrix-vector product is considered, where the server distributes the task of the computation among $n$ worker nodes, out of which $L$ are compromised (but non-colluding) and may return incorrect results. Specifically, it is assumed that the compromised workers are unreliable, that is, at any given time, each compromised worker may return an incorrect and correct result…
▽ More
The problem of distributed matrix-vector product is considered, where the server distributes the task of the computation among $n$ worker nodes, out of which $L$ are compromised (but non-colluding) and may return incorrect results. Specifically, it is assumed that the compromised workers are unreliable, that is, at any given time, each compromised worker may return an incorrect and correct result with probabilities $α$ and $1-α$, respectively. Thus, the tests are noisy. This work proposes a new probabilistic group testing approach to identify the unreliable/compromised workers with $O\left(\frac{L\log(n)}α\right)$ tests. Moreover, using the proposed group testing method, sparse parity-check codes are constructed and used in the considered distributed computing framework for encoding, decoding and identifying the unreliable workers. This methodology has two distinct features: (i) the cost of identifying the set of $L$ unreliable workers at the server can be shown to be considerably lower than existing distributed computing methods, and (ii) the encoding and decoding functions are easily implementable and computationally efficient.
△ Less
Submitted 10 May, 2023;
originally announced May 2023.
-
Functional Properties of the Ziv-Zakai bound with Arbitrary Inputs
Authors:
Minoh Jeong,
Alex Dytso,
Martina Cardone
Abstract:
This paper explores the Ziv-Zakai bound (ZZB), which is a well-known Bayesian lower bound on the Minimum Mean Squared Error (MMSE). First, it is shown that the ZZB holds without any assumption on the distribution of the estimand, that is, the estimand does not necessarily need to have a probability density function. The ZZB is then further analyzed in the high-noise and low-noise regimes and shown…
▽ More
This paper explores the Ziv-Zakai bound (ZZB), which is a well-known Bayesian lower bound on the Minimum Mean Squared Error (MMSE). First, it is shown that the ZZB holds without any assumption on the distribution of the estimand, that is, the estimand does not necessarily need to have a probability density function. The ZZB is then further analyzed in the high-noise and low-noise regimes and shown to always tensorize. Finally, the tightness of the ZZB is investigated under several aspects, such as the number of hypotheses and the usefulness of the valley-filling function. In particular, a sufficient and necessary condition for the tightness of the bound with continuous inputs is provided, and it is shown that the bound is never tight for discrete input distributions with a support set that does not have an accumulation point at zero.
△ Less
Submitted 4 May, 2023;
originally announced May 2023.
-
Proactive Resilient Transmission and Scheduling Mechanisms for mmWave Networks
Authors:
Mine Gokce Dogan,
Martina Cardone,
Christina Fragouli
Abstract:
This paper aims to develop resilient transmission mechanisms to suitably distribute traffic across multiple paths in an arbitrary millimeter-wave (mmWave) network. The main contributions include: (a) the development of proactive transmission mechanisms that build resilience against network disruptions in advance, while achieving a high end-to-end packet rate; (b) the design of a heuristic path sel…
▽ More
This paper aims to develop resilient transmission mechanisms to suitably distribute traffic across multiple paths in an arbitrary millimeter-wave (mmWave) network. The main contributions include: (a) the development of proactive transmission mechanisms that build resilience against network disruptions in advance, while achieving a high end-to-end packet rate; (b) the design of a heuristic path selection algorithm that efficiently selects (in polynomial time in the network size) multiple proactively resilient paths with high packet rates; and (c) the development of a hybrid scheduling algorithm that combines the proposed path selection algorithm with a deep reinforcement learning (DRL) based online approach for decentralized adaptation to blocked links and failed paths. To achieve resilience to link failures, a state-of-the-art Soft Actor-Critic DRL algorithm, which adapts the information flow through the network, is investigated. The proposed scheduling algorithm robustly adapts to link failures over different topologies, channel and blockage realizations while offering a superior performance to alternative algorithms.
△ Less
Submitted 16 November, 2022;
originally announced November 2022.
-
An MMSE Lower Bound via Poincaré Inequality
Authors:
Ian Zieder,
Alex Dytso,
Martina Cardone
Abstract:
This paper studies the minimum mean squared error (MMSE) of estimating $\mathbf{X} \in \mathbb{R}^d$ from the noisy observation $\mathbf{Y} \in \mathbb{R}^k$, under the assumption that the noise (i.e., $\mathbf{Y}|\mathbf{X}$) is a member of the exponential family. The paper provides a new lower bound on the MMSE. Towards this end, an alternative representation of the MMSE is first presented, whic…
▽ More
This paper studies the minimum mean squared error (MMSE) of estimating $\mathbf{X} \in \mathbb{R}^d$ from the noisy observation $\mathbf{Y} \in \mathbb{R}^k$, under the assumption that the noise (i.e., $\mathbf{Y}|\mathbf{X}$) is a member of the exponential family. The paper provides a new lower bound on the MMSE. Towards this end, an alternative representation of the MMSE is first presented, which is argued to be useful in deriving closed-form expressions for the MMSE. This new representation is then used together with the Poincaré inequality to provide a new lower bound on the MMSE. Unlike, for example, the Cramér-Rao bound, the new bound holds for all possible distributions on the input $\mathbf{X}$. Moreover, the lower bound is shown to be tight in the high-noise regime for the Gaussian noise setting under the assumption that $\mathbf{X}$ is sub-Gaussian. Finally, several numerical examples are shown which demonstrate that the bound performs well in all noise regimes.
△ Less
Submitted 11 May, 2022;
originally announced May 2022.
-
Entropic CLT for Order Statistics
Authors:
Martina Cardone,
Alex Dytso,
Cynthia Rush
Abstract:
It is well known that central order statistics exhibit a central limit behavior and converge to a Gaussian distribution as the sample size grows. This paper strengthens this known result by establishing an entropic version of the CLT that ensures a stronger mode of convergence using the relative entropy. In particular, an order $O(1/\sqrt{n})$ rate of convergence is established under mild conditio…
▽ More
It is well known that central order statistics exhibit a central limit behavior and converge to a Gaussian distribution as the sample size grows. This paper strengthens this known result by establishing an entropic version of the CLT that ensures a stronger mode of convergence using the relative entropy. In particular, an order $O(1/\sqrt{n})$ rate of convergence is established under mild conditions on the parent distribution of the sample generating the order statistics. To prove this result, ancillary results on order statistics are derived, which might be of independent interest.
△ Less
Submitted 9 May, 2022;
originally announced May 2022.
-
A General Derivative Identity for the Conditional Expectation with Focus on the Exponential Family
Authors:
Alex Dytso,
Martina Cardone
Abstract:
Consider a pair of random vectors $(\mathbf{X},\mathbf{Y}) $ and the conditional expectation operator $\mathbb{E}[\mathbf{X}|\mathbf{Y}=\mathbf{y}]$. This work studies analytic properties of the conditional expectation by characterizing various derivative identities. The paper consists of two parts. In the first part of the paper, a general derivative identity for the conditional expectation is de…
▽ More
Consider a pair of random vectors $(\mathbf{X},\mathbf{Y}) $ and the conditional expectation operator $\mathbb{E}[\mathbf{X}|\mathbf{Y}=\mathbf{y}]$. This work studies analytic properties of the conditional expectation by characterizing various derivative identities. The paper consists of two parts. In the first part of the paper, a general derivative identity for the conditional expectation is derived. Specifically, for the Markov chain $\mathbf{U} \leftrightarrow \mathbf{X} \leftrightarrow \mathbf{Y}$, a compact expression for the Jacobian matrix of $\mathbb{E}[\mathbf{U}|\mathbf{Y}=\mathbf{y}]$ is derived. In the second part of the paper, the main identity is specialized to the exponential family. Moreover, via various choices of the random vector $\mathbf{U}$, the new identity is used to recover and generalize several known identities and derive some new ones. As a first example, a connection between the Jacobian of $ \mathbb{E}[\mathbf{X}|\mathbf{Y}=\mathbf{y}]$ and the conditional variance is established. As a second example, a recursive expression between higher order conditional expectations is found, which is shown to lead to a generalization of the Tweedy's identity. Finally, as a third example, it is shown that the $k$-th order derivative of the conditional expectation is proportional to the $(k+1)$-th order conditional cumulant.
△ Less
Submitted 30 August, 2021; v1 submitted 11 May, 2021;
originally announced May 2021.
-
When an Energy-Efficient Scheduling is Optimal for Half-Duplex Relay Networks?
Authors:
Sarthak Jain,
Martina Cardone,
Soheil Mohajer
Abstract:
This paper considers a diamond network with $n$ interconnected relays, namely a network where a source communicates with a destination by hop** information through $n$ communicating/interconnected relays. Specifically, the main focus of the paper is on characterizing sufficient conditions under which the $n+1$ states (out of the $2^{n}$ possible ones) in which at most one relay is transmitting s…
▽ More
This paper considers a diamond network with $n$ interconnected relays, namely a network where a source communicates with a destination by hop** information through $n$ communicating/interconnected relays. Specifically, the main focus of the paper is on characterizing sufficient conditions under which the $n+1$ states (out of the $2^{n}$ possible ones) in which at most one relay is transmitting suffice to characterize the approximate capacity, that is the Shannon capacity up to an additive gap that only depends on $n$. Furthermore, under these sufficient conditions, closed form expressions for the approximate capacity and scheduling (that is, the fraction of time each relay should receive and transmit) are provided. A similar result is presented for the dual case, where in each state at most one relay is in receive mode.
△ Less
Submitted 12 August, 2021; v1 submitted 7 May, 2021;
originally announced May 2021.
-
Retrieving Data Permutations from Noisy Observations: High and Low Noise Asymptotics
Authors:
Minoh Jeong,
Alex Dytso,
Martina Cardone
Abstract:
This paper considers the problem of recovering the permutation of an n-dimensional random vector X observed in Gaussian noise. First, a general expression for the probability of error is derived when a linear decoder (i.e., linear estimator followed by a sorting operation) is used. The derived expression holds with minimal assumptions on the distribution of X and when the noise has memory. Second,…
▽ More
This paper considers the problem of recovering the permutation of an n-dimensional random vector X observed in Gaussian noise. First, a general expression for the probability of error is derived when a linear decoder (i.e., linear estimator followed by a sorting operation) is used. The derived expression holds with minimal assumptions on the distribution of X and when the noise has memory. Second, for the case of isotropic noise (i.e., noise with a diagonal scalar covariance matrix), the rates of convergence of the probability of error are characterized in the high and low noise regimes. In the low noise regime, for every dimension n, the probability of error is shown to behave proportionally to σ, where σ is the noise standard deviation. Moreover, the slope is computed exactly for several distributions and it is shown to behave quadratically in n. In the high noise regime, for every dimension n, the probability of correctness is shown to behave as 1/σ, and the exact expression for the rate of convergence is also provided.
△ Less
Submitted 6 May, 2021;
originally announced May 2021.
-
The Most Informative Order Statistic and its Application to Image Denoising
Authors:
Alex Dytso,
Martina Cardone,
Cynthia Rush
Abstract:
We consider the problem of finding the subset of order statistics that contains the most information about a sample of random variables drawn independently from some known parametric distribution. We leverage information-theoretic quantities, such as entropy and mutual information, to quantify the level of informativeness and rigorously characterize the amount of information contained in any subse…
▽ More
We consider the problem of finding the subset of order statistics that contains the most information about a sample of random variables drawn independently from some known parametric distribution. We leverage information-theoretic quantities, such as entropy and mutual information, to quantify the level of informativeness and rigorously characterize the amount of information contained in any subset of the complete collection of order statistics. As an example, we show how these informativeness metrics can be evaluated for a sample of discrete Bernoulli and continuous Uniform random variables. Finally, we unveil how our most informative order statistics framework can be applied to image processing applications. Specifically, we investigate how the proposed measures can be used to choose the coefficients of the L-estimator filter to denoise an image corrupted by random noise. We show that both for discrete (e.g., salt-pepper noise) and continuous (e.g., mixed Gaussian noise) noise distributions, the proposed method is competitive with off-the-shelf filters, such as the median and the total variation filters, as well as with wavelet-based denoising methods.
△ Less
Submitted 27 January, 2021;
originally announced January 2021.
-
Measuring Dependencies of Order Statistics: An Information Theoretic Perspective
Authors:
Alex Dytso,
Martina Cardone,
Cynthia Rush
Abstract:
Consider a random sample $X_1 , X_2 , ..., X_n$ drawn independently and identically distributed from some known sampling distribution $P_X$. Let $X_{(1)} \le X_{(2)} \le ... \le X_{(n)}$ represent the order statistics of the sample. The first part of the paper focuses on distributions with an invertible cumulative distribution function. Under this assumption, a distribution-free property is establ…
▽ More
Consider a random sample $X_1 , X_2 , ..., X_n$ drawn independently and identically distributed from some known sampling distribution $P_X$. Let $X_{(1)} \le X_{(2)} \le ... \le X_{(n)}$ represent the order statistics of the sample. The first part of the paper focuses on distributions with an invertible cumulative distribution function. Under this assumption, a distribution-free property is established, which shows that the $f$-divergence between the joint distribution of order statistics and the product distribution of order statistics does not depend on the original sampling distribution $P_X$. Moreover, it is shown that the mutual information between two subsets of order statistics also satisfies a distribution-free property; that is, it does not depend on $P_X$. Furthermore, the decoupling rates between $X_{(r)}$ and $X_{(m)}$ (i.e., rates at which the mutual information approaches zero) are characterized for various choices of $(r,m)$. The second part of the paper considers a family of discrete distributions, which does not satisfy the assumptions in the first part of the paper. In comparison to the results of the first part, it is shown that in the discrete setting, the mutual information between order statistics does depend on the sampling distribution $P_X$. Nonetheless, it is shown that the results of the first part can still be used as upper bounds on the decoupling rates.
△ Less
Submitted 25 September, 2020;
originally announced September 2020.
-
Recovering Data Permutations from Noisy Observations: The Linear Regime
Authors:
Minoh Jeong,
Alex Dytso,
Martina Cardone,
H. Vincent Poor
Abstract:
This paper considers a noisy data structure recovery problem. The goal is to investigate the following question: Given a noisy observation of a permuted data set, according to which permutation was the original data sorted? The focus is on scenarios where data is generated according to an isotropic Gaussian distribution, and the noise is additive Gaussian with an arbitrary covariance matrix. This…
▽ More
This paper considers a noisy data structure recovery problem. The goal is to investigate the following question: Given a noisy observation of a permuted data set, according to which permutation was the original data sorted? The focus is on scenarios where data is generated according to an isotropic Gaussian distribution, and the noise is additive Gaussian with an arbitrary covariance matrix. This problem is posed within a hypothesis testing framework. The objective is to study the linear regime in which the optimal decoder has a polynomial complexity in the data size, and it declares the permutation by simply computing a permutation-independent linear function of the noisy observations. The main result of the paper is a complete characterization of the linear regime in terms of the noise covariance matrix. Specifically, it is shown that this matrix must have a very flat spectrum with at most three distinct eigenvalues to induce the linear regime. Several practically relevant implications of this result are discussed, and the error probability incurred by the decision criterion in the linear regime is also characterized. A core technical component consists of using linear algebraic and geometric tools, such as Steiner symmetrization.
△ Less
Submitted 20 November, 2020; v1 submitted 15 May, 2020;
originally announced May 2020.
-
Gaussian 1-2-1 Networks with Imperfect Beamforming
Authors:
Yahya H. Ezzeldin,
Martina Cardone,
Christina Fragouli,
Giuseppe Caire
Abstract:
In this work, we study bounds on the capacity of full-duplex Gaussian 1-2-1 networks with imperfect beamforming. In particular, different from the ideal 1-2-1 network model introduced in [1], in this model beamforming patterns result in side-lobe leakage that cannot be perfectly suppressed. The 1-2-1 network model captures the directivity of mmWave network communications, where nodes communicate b…
▽ More
In this work, we study bounds on the capacity of full-duplex Gaussian 1-2-1 networks with imperfect beamforming. In particular, different from the ideal 1-2-1 network model introduced in [1], in this model beamforming patterns result in side-lobe leakage that cannot be perfectly suppressed. The 1-2-1 network model captures the directivity of mmWave network communications, where nodes communicate by pointing main-lobe "beams" at each other. We characterize the gap between the approximate capacities of the imperfect and ideal 1-2-1 models for the same channel coefficients and transmit power. We show that, under some conditions, this gap only depends on the number of nodes. Moreover, we evaluate the achievable rate of schemes that treat the resulting side-lobe leakage as noise, and show that they offer suitable solutions for implementation.
△ Less
Submitted 13 May, 2020;
originally announced May 2020.
-
Best Relay Selection in Gaussian Half-Duplex Diamond Networks
Authors:
Sarthak Jain,
Soheil Mohajer,
Martina Cardone
Abstract:
This paper considers Gaussian half-duplex diamond $n$-relay networks, where a source communicates with a destination by hop** information through one layer of $n$ non-communicating relays that operate in half-duplex. The main focus consists of investigating the following question: What is the contribution of a single relay on the approximate capacity of the entire network? In particular, approxi…
▽ More
This paper considers Gaussian half-duplex diamond $n$-relay networks, where a source communicates with a destination by hop** information through one layer of $n$ non-communicating relays that operate in half-duplex. The main focus consists of investigating the following question: What is the contribution of a single relay on the approximate capacity of the entire network? In particular, approximate capacity refers to a quantity that approximates the Shannon capacity within an additive gap which only depends on $n$, and is independent of the channel parameters. This paper answers the above question by providing a fundamental bound on the ratio between the approximate capacity of the highest-performing single relay and the approximate capacity of the entire network, for any number $n$. Surprisingly, it is shown that such a ratio guarantee is $f = 1/(2+2\cos(2π/(n+2)))$, that is a sinusoidal function of $n$, which decreases as $n$ increases. It is also shown that the aforementioned ratio guarantee is tight, i.e., there exist Gaussian half-duplex diamond $n$-relay networks, where the highest-performing relay has an approximate capacity equal to an $f$ fraction of the approximate capacity of the entire network.
△ Less
Submitted 9 January, 2020;
originally announced January 2020.
-
Estimating Noisy Order Statistics
Authors:
Alex Dytso,
Martina Cardone,
H. Vincent Poor
Abstract:
This paper proposes an estimation framework to assess the performance of sorting over perturbed/noisy data. In particular, the recovering accuracy is measured in terms of Minimum Mean Square Error (MMSE) between the values of the sorting function computed on data without perturbation and the estimator that operates on the sorted noisy data. It is first shown that, under certain symmetry conditions…
▽ More
This paper proposes an estimation framework to assess the performance of sorting over perturbed/noisy data. In particular, the recovering accuracy is measured in terms of Minimum Mean Square Error (MMSE) between the values of the sorting function computed on data without perturbation and the estimator that operates on the sorted noisy data. It is first shown that, under certain symmetry conditions, satisfied for example by the practically relevant Gaussian noise perturbation, the optimal estimator can be expressed as a linear combination of estimators on the unsorted data. Then, two suboptimal estimators are proposed and performance guarantees on them are derived with respect to the optimal estimator. Finally, some surprising properties on the MMSE of interest are discovered. For instance, it is shown that the MMSE grows sublinearly with the data size, and that commonly used MMSE lower bounds such as the Bayesian Cramér-Rao and the maximum entropy bounds either cannot be applied or are not suitable.
△ Less
Submitted 3 September, 2019; v1 submitted 18 January, 2019;
originally announced January 2019.
-
On Secure Capacity of Multiple Unicast Traffic over Separable Networks
Authors:
Gaurav Kumar Agarwal,
Martina Cardone,
Christina Fragouli
Abstract:
This paper studies the problem of information theoretic secure communication when a source has private messages to transmit to $m$ destinations, in the presence of a passive adversary who eavesdrops an unknown set of $k$ edges. The information theoretic secure capacity is derived over unit-edge capacity separable networks, for the cases when $k=1$ and $m$ is arbitrary, or $m=3$ and $k$ is arbitrar…
▽ More
This paper studies the problem of information theoretic secure communication when a source has private messages to transmit to $m$ destinations, in the presence of a passive adversary who eavesdrops an unknown set of $k$ edges. The information theoretic secure capacity is derived over unit-edge capacity separable networks, for the cases when $k=1$ and $m$ is arbitrary, or $m=3$ and $k$ is arbitrary. This is achieved by first showing that there exists a secure polynomial-time code construction that matches an outer bound over two-layer networks, followed by a deterministic map** between two-layer and arbitrary separable networks.
△ Less
Submitted 10 April, 2019; v1 submitted 10 January, 2019;
originally announced January 2019.
-
Polynomial-time Capacity Calculation and Scheduling for Half-Duplex 1-2-1 Networks
Authors:
Yahya H. Ezzeldin,
Martina Cardone,
Christina Fragouli,
Giuseppe Caire
Abstract:
This paper studies the 1-2-1 half-duplex network model, where two half-duplex nodes can communicate only if they point `beams' at each other; otherwise, no signal can be exchanged or interference can be generated. The main result of this paper is the design of two polynomial-time algorithms that: (i) compute the approximate capacity of the 1-2-1 half-duplex network and, (ii) find the network sched…
▽ More
This paper studies the 1-2-1 half-duplex network model, where two half-duplex nodes can communicate only if they point `beams' at each other; otherwise, no signal can be exchanged or interference can be generated. The main result of this paper is the design of two polynomial-time algorithms that: (i) compute the approximate capacity of the 1-2-1 half-duplex network and, (ii) find the network schedule optimal for the approximate capacity. The paper starts by expressing the approximate capacity as a linear program with an exponential number of constraints. A core technical component consists of building a polynomial-time separation oracle for this linear program, by using algorithmic tools such as perfect matching polytopes and Gomory-Hu trees.
△ Less
Submitted 9 January, 2019;
originally announced January 2019.
-
On Secure Network Coding for Multiple Unicast Traffic
Authors:
Gaurav Kumar Agarwal,
Martina Cardone,
Christina Fragouli
Abstract:
This paper investigates the problem of secure communication in a wireline noiseless scenario where a source wishes to communicate to a number of destinations in the presence of a passive external adversary. Different from the multicast scenario, where all destinations are interested in receiving the same message, in this setting different destinations are interested in different messages. The main…
▽ More
This paper investigates the problem of secure communication in a wireline noiseless scenario where a source wishes to communicate to a number of destinations in the presence of a passive external adversary. Different from the multicast scenario, where all destinations are interested in receiving the same message, in this setting different destinations are interested in different messages. The main focus of this paper is on characterizing the secure capacity region, when the adversary has unbounded computational capabilities, but limited network presence. First, an outer bound on the secure capacity region is derived for arbitrary network topologies and general number of destinations. Then, secure transmission schemes are designed and analyzed in terms of achieved rate performance. In particular, for the case of two destinations, it is shown that the designed scheme matches the outer bound, hence characterizing the secure capacity region. It is also numerically verified that the designed scheme matches the outer bound for a special class of networks with general number of destinations, referred to as combination network. Finally, for an arbitrary network topology with general number of destinations, a two-phase polynomial time in the network size scheme is designed and its rate performance {is} compared with the capacity-achieving scheme for networks with two destinations.
△ Less
Submitted 9 January, 2019;
originally announced January 2019.
-
Privacy in Index Coding: $k$-Limited-Access Schemes
Authors:
Mohammed Karmoose,
Linqi Song,
Martina Cardone,
Christina Fragouli
Abstract:
In the traditional index coding problem, a server employs coding to send messages to $n$ clients within the same broadcast domain. Each client already has some messages as side information and requests a particular unknown message from the server. All clients learn the coding matrix so that they can decode and retrieve their requested data. Our starting observation is that, learning the coding mat…
▽ More
In the traditional index coding problem, a server employs coding to send messages to $n$ clients within the same broadcast domain. Each client already has some messages as side information and requests a particular unknown message from the server. All clients learn the coding matrix so that they can decode and retrieve their requested data. Our starting observation is that, learning the coding matrix can pose privacy concerns: it may enable a client to infer information about the requests and side information of other clients. In this paper, we mitigate this privacy concern by allowing each client to have limited access to the coding matrix. In particular, we design coding matrices so that each client needs only to learn some of (and not all) the rows to decode her requested message. By means of two different privacy metrics, we first show that this approach indeed increases the level of privacy. Based on this, we propose the use of $k$-limited-access schemes: given an index coding scheme that employs $T$ transmissions, we create a $k$-limited-access scheme with $T_k\geq T$ transmissions, and with the property that each client needs at most $k$ transmissions to decode her message. We derive upper and lower bounds on $T_k$ for all values of $k$, and develop deterministic designs for these schemes, which are universal, i.e., independent of the coding matrix. We show that our schemes are order-optimal when either $k$ or $n$ is large. Moreover, we propose heuristics that complement the universal schemes for the case when both $n$ and $k$ are small.
△ Less
Submitted 21 September, 2018;
originally announced September 2018.
-
Privacy in Index Coding: Improved Bounds and Coding Schemes
Authors:
Mohammed Karmoose,
Linqi Song,
Martina Cardone,
Christina Fragouli
Abstract:
It was recently observed in [1], that in index coding, learning the coding matrix used by the server can pose privacy concerns: curious clients can extract information about the requests and side information of other clients. One approach to mitigate such concerns is the use of $k$-limited-access schemes [1], that restrict each client to learn only part of the index coding matrix, and in particula…
▽ More
It was recently observed in [1], that in index coding, learning the coding matrix used by the server can pose privacy concerns: curious clients can extract information about the requests and side information of other clients. One approach to mitigate such concerns is the use of $k$-limited-access schemes [1], that restrict each client to learn only part of the index coding matrix, and in particular, at most $k$ rows. These schemes transform a linear index coding matrix of rank $T$ to an alternate one, such that each client needs to learn at most $k$ of the coding matrix rows to decode its requested message. This paper analyzes $k$-limited-access schemes. First, a worst-case scenario, where the total number of clients $n$ is $2^T-1$ is studied. For this case, a novel construction of the coding matrix is provided and shown to be order-optimal in the number of transmissions. Then, the case of a general $n$ is considered and two different schemes are designed and analytically and numerically assessed in their performance. It is shown that these schemes perform better than the one designed for the case $n=2^T-1$.
△ Less
Submitted 11 January, 2018;
originally announced January 2018.
-
Secure Communication over 1-2-1 Networks
Authors:
Gaurav Kumar Agarwal,
Yahya H. Ezzeldin,
Martina Cardone,
Christina Fragouli
Abstract:
This paper starts by assuming a 1-2-1 network, the abstracted noiseless model of mmWave networks that was shown to closely approximate the Gaussian capacity in [1], and studies secure communication. First, the secure capacity is derived for 1-2-1 networks where a source is connected to a destination through a network of unit capacity links. Then, lower and upper bounds on the secure capacity are d…
▽ More
This paper starts by assuming a 1-2-1 network, the abstracted noiseless model of mmWave networks that was shown to closely approximate the Gaussian capacity in [1], and studies secure communication. First, the secure capacity is derived for 1-2-1 networks where a source is connected to a destination through a network of unit capacity links. Then, lower and upper bounds on the secure capacity are derived for the case when source and destination have more than one beam, which allow them to transmit and receive in multiple directions at a time. Finally, secure capacity results are presented for diamond 1-2-1 networks when edges have different capacities.
△ Less
Submitted 12 January, 2018; v1 submitted 9 January, 2018;
originally announced January 2018.
-
Gaussian 1-2-1 Networks: Capacity Results for mmWave Communications
Authors:
Yahya H. Ezzeldin,
Martina Cardone,
Christina Fragouli,
Giuseppe Caire
Abstract:
This paper proposes a new model for wireless relay networks referred to as "1-2-1 network", where two nodes can communicate only if they point "beams" at each other, while if they do not point beams at each other, no signal can be exchanged or interference can be generated. This model is motivated by millimeter wave communications where, due to the high path loss, a link between two nodes can exis…
▽ More
This paper proposes a new model for wireless relay networks referred to as "1-2-1 network", where two nodes can communicate only if they point "beams" at each other, while if they do not point beams at each other, no signal can be exchanged or interference can be generated. This model is motivated by millimeter wave communications where, due to the high path loss, a link between two nodes can exist only if beamforming gain at both sides is established, while in the absence of beamforming gain the signal is received well below the thermal noise floor. The main result in this paper is that the 1-2-1 network capacity can be approximated by routing information along at most $2N+2$ paths, where $N$ is the number of relays connecting a source and a destination through an arbitrary topology.
△ Less
Submitted 17 June, 2018; v1 submitted 8 January, 2018;
originally announced January 2018.
-
Half-Duplex Routing is NP-hard
Authors:
Yahya H. Ezzeldin,
Martina Cardone,
Christina Fragouli,
Daniela Tuninetti
Abstract:
Routing is a widespread approach to transfer information from a source node to a destination node in many deployed wireless ad-hoc networks. Today's implemented routing algorithms seek to efficiently find the path/route with the largest Full-Duplex (FD) capacity, which is given by the minimum among the point-to-point link capacities in the path. Such an approach may be suboptimal if then the nodes…
▽ More
Routing is a widespread approach to transfer information from a source node to a destination node in many deployed wireless ad-hoc networks. Today's implemented routing algorithms seek to efficiently find the path/route with the largest Full-Duplex (FD) capacity, which is given by the minimum among the point-to-point link capacities in the path. Such an approach may be suboptimal if then the nodes in the selected path are operated in Half-Duplex (HD) mode. Recently, the capacity (up to a constant gap that only depends on the number of nodes in the path) of an HD line network i.e., a path) has been shown to be equal to half of the minimum of the harmonic means of the capacities of two consecutive links in the path. This paper asks the questions of whether it is possible to design a polynomial-time algorithm that efficiently finds the path with the largest HD capacity in a relay network. This problem of finding that path is shown to be NP-hard in general. However, if the number of cycles in the network is polynomial in the number of nodes, then a polynomial-time algorithm can indeed be designed.
△ Less
Submitted 10 August, 2017;
originally announced August 2017.
-
Preserving Privacy while Broadcasting: $k$-Limited-Access Schemes
Authors:
Mohammed Karmoose,
Linqi Song,
Martina Cardone,
Christina Fragouli
Abstract:
Index coding employs coding across clients within the same broadcast domain. This typically assumes that all clients learn the coding matrix so that they can decode and retrieve their requested data. However, learning the coding matrix can pose privacy concerns: it may enable clients to infer information about the requests and side information of other clients [1]. In this paper, we formalize the…
▽ More
Index coding employs coding across clients within the same broadcast domain. This typically assumes that all clients learn the coding matrix so that they can decode and retrieve their requested data. However, learning the coding matrix can pose privacy concerns: it may enable clients to infer information about the requests and side information of other clients [1]. In this paper, we formalize the intuition that the achieved privacy can increase by decreasing the number of rows of the coding matrix that a client learns. Based on this, we propose the use of $k$-limited-access schemes: given an index coding scheme that employs $T$ transmissions, we create a $k$-limited-access scheme with $T_k\geq T$ transmissions, and with the property that each client learns at most $k$ rows of the coding matrix to decode its message. We derive upper and lower bounds on $T_k$ for all values of $k$, and develop deterministic designs for these schemes for which $T_k$ has an order-optimal exponent for some regimes.
△ Less
Submitted 23 May, 2017;
originally announced May 2017.
-
Private Broadcasting: an Index Coding Approach
Authors:
Mohammed Karmoose,
Linqi Song,
Martina Cardone,
Christina Fragouli
Abstract:
Using a broadcast channel to transmit clients' data requests may impose privacy risks. In this paper, we address such privacy concerns in the index coding framework. We show how a malicious client can infer some information about the requests and side information of other clients by learning the encoding matrix used by the server. We propose an information-theoretic metric to measure the level of…
▽ More
Using a broadcast channel to transmit clients' data requests may impose privacy risks. In this paper, we address such privacy concerns in the index coding framework. We show how a malicious client can infer some information about the requests and side information of other clients by learning the encoding matrix used by the server. We propose an information-theoretic metric to measure the level of privacy and show how encoding matrices can be designed to achieve specific privacy guarantees. We then consider a special scenario for which we design a transmission scheme and derive the achieved levels of privacy in closed-form. We also derive upper bounds and we compare them to the levels of privacy achieved by our scheme, highlighting that an inherent trade-off exists between protecting privacy of the request and of the side information of the clients.
△ Less
Submitted 22 January, 2017; v1 submitted 18 January, 2017;
originally announced January 2017.
-
Efficiently Finding Simple Schedules in Gaussian Half-Duplex Relay Line Networks
Authors:
Yahya H. Ezzeldin,
Martina Cardone,
Christina Fragouli,
Daniela Tuninetti
Abstract:
The problem of operating a Gaussian Half-Duplex (HD) relay network optimally is challenging due to the exponential number of listen/transmit network states that need to be considered. Recent results have shown that, for the class of Gaussian HD networks with N relays, there always exists a simple schedule, i.e., with at most N +1 active states, that is sufficient for approximate (i.e., up to a con…
▽ More
The problem of operating a Gaussian Half-Duplex (HD) relay network optimally is challenging due to the exponential number of listen/transmit network states that need to be considered. Recent results have shown that, for the class of Gaussian HD networks with N relays, there always exists a simple schedule, i.e., with at most N +1 active states, that is sufficient for approximate (i.e., up to a constant gap) capacity characterization. This paper investigates how to efficiently find such a simple schedule over line networks. Towards this end, a polynomial-time algorithm is designed and proved to output a simple schedule that achieves the approximate capacity. The key ingredient of the algorithm is to leverage similarities between network states in HD and edge coloring in a graph. It is also shown that the algorithm allows to derive a closed-form expression for the approximate capacity of the Gaussian line network that can be evaluated distributively and in linear time. Additionally, it is shown using this closed-form that the problem of Half-Duplex routing is NP-Hard.
△ Less
Submitted 21 June, 2017; v1 submitted 16 January, 2017;
originally announced January 2017.
-
Network Simplification in Half-Duplex: Building on Submodularity
Authors:
Martina Cardone,
Yahya H. Ezzeldin,
Christina Fragouli,
Daniela Tuninetti
Abstract:
This paper explores the {\it network simplification} problem in the context of Gaussian Half-Duplex (HD) diamond networks. Specifically, given an $N$-relay diamond network, this problem seeks to derive fundamental guarantees on the capacity of the best $k$-relay subnetwork, as a function of the full network capacity. The main focus of this work is on the case when $k=N-1$ relays are selected out o…
▽ More
This paper explores the {\it network simplification} problem in the context of Gaussian Half-Duplex (HD) diamond networks. Specifically, given an $N$-relay diamond network, this problem seeks to derive fundamental guarantees on the capacity of the best $k$-relay subnetwork, as a function of the full network capacity. The main focus of this work is on the case when $k=N-1$ relays are selected out of the $N$ possible ones. First, a simple algorithm, which removes the relay with the minimum capacity (i.e., the worst relay), is analyzed and it is shown that the remaining $(N-1)$-relay subnetwork has an approximate (i.e., optimal up to a constant gap) HD capacity that is at least half of the approximate HD capacity of the full network. This fraction guarantee is shown to be tight if only the single relay capacities are known, i.e., there exists a class of Gaussian HD diamond networks with $N$ relays where, by removing the worst relay, the subnetwork of the remaining $k=N-1$ relays has an approximate capacity equal to half of the approximate capacity of the full network. Next, this work proves a fundamental guarantee, which improves over the previous fraction: there always exists a subnetwork of $k=N-1$ relays that achieves at least a fraction $\frac{N-1}{N}$ of the approximate capacity of the full network. This fraction is proved to be tight and it is shown that any optimal schedule of the full network can be used by at least one of the $N$ subnetworks of $N-1$ relays to achieve a worst-case performance guarantee of $\frac{N-1}{N}$. Additionally, these results are extended to derive lower bounds on the fraction guarantee for general $k \in [1:N]$. The key steps in the proofs lie in the derivation of properties of submodular functions, which provide a combinatorial handle on the network simplification problem in Gaussian HD diamond networks.
△ Less
Submitted 7 July, 2017; v1 submitted 5 July, 2016;
originally announced July 2016.
-
On (Secure) Information flow for Multiple-Unicast Sessions: Analysis with Butterfly Network
Authors:
Gaurav Kumar Agarwal,
Martina Cardone,
Christina Fragouli
Abstract:
This paper considers a class of wireline networks, derived from the well-known butterfly network, over which two independent unicast sessions take place simultaneously. The main objectives are to understand when network coding type of operations are beneficial with and without security considerations and to derive the ultimate gains that cooperation among sources and sinks can bring. Towards these…
▽ More
This paper considers a class of wireline networks, derived from the well-known butterfly network, over which two independent unicast sessions take place simultaneously. The main objectives are to understand when network coding type of operations are beneficial with and without security considerations and to derive the ultimate gains that cooperation among sources and sinks can bring. Towards these goals, the capacity region of the butterfly network with arbitrary edge capacities is first derived. It is then shown that no rate can be guaranteed over this network under security considerations, when an eavesdropper wiretaps any of the links. Three variants of the butterfly network, such as the case of co-located sources, are analyzed as well and their secure and non-secure capacity regions are characterized. By using the butterfly network and its variants as building blocks, these results can be used to design high-throughput achieving transmission schemes for general multiple-unicast networks.
△ Less
Submitted 24 June, 2016;
originally announced June 2016.
-
On Network Simplification for Gaussian Half-Duplex Diamond Networks
Authors:
Martina Cardone,
Christina Fragouli,
Daniela Tuninetti
Abstract:
This paper investigates the simplification problem in Gaussian Half-Duplex (HD) diamond networks. The goal is to answer the following question: what is the minimum (worst-case) fraction of the total HD capacity that one can always achieve by smartly selecting a subset of $k$ relays, out of the $N$ possible ones? We make progress on this problem for $k=1$ and $k=2$ and show that for…
▽ More
This paper investigates the simplification problem in Gaussian Half-Duplex (HD) diamond networks. The goal is to answer the following question: what is the minimum (worst-case) fraction of the total HD capacity that one can always achieve by smartly selecting a subset of $k$ relays, out of the $N$ possible ones? We make progress on this problem for $k=1$ and $k=2$ and show that for $N=k+1, \ k \in \{1,2\}$ at least $\frac{k}{k+1}$ of the total HD capacity is always {approximately (i.e., up to a constant gap)} achieved. Interestingly, and differently from the Full-Duplex (FD) case, the ratio in HD depends on $N$, and decreases as $N$ increases. For all values of $N$ and $k$ for which we derive worst case fractions, we also show these to be {approximately} tight. This is accomplished by presenting $N$-relay Gaussian HD diamond networks for which the best $k$-relay subnetwork has {an approximate} HD capacity equal to the worst-case fraction of the total {approximate} HD capacity. Moreover, we provide additional comparisons between the performance of this simplification problem for HD and FD networks, which highlight their different natures.
△ Less
Submitted 4 July, 2016; v1 submitted 19 January, 2016;
originally announced January 2016.
-
On Secure Network Coding for Two Unicast Sessions
Authors:
Gaurav Kumar Agarwal,
Martina Cardone,
Christina Fragouli
Abstract:
This paper characterizes the secret message capacity of three networks where two unicast sessions share some of the communication resources. Each network consists of erasure channels with state feedback. A passive eavesdropper is assumed to wiretap any one of the links. The capacity achieving schemes as well as the outer bounds are formulated as linear programs. The proposed strategies are then nu…
▽ More
This paper characterizes the secret message capacity of three networks where two unicast sessions share some of the communication resources. Each network consists of erasure channels with state feedback. A passive eavesdropper is assumed to wiretap any one of the links. The capacity achieving schemes as well as the outer bounds are formulated as linear programs. The proposed strategies are then numerically evaluated and shown to achieve higher rate performances (up to a double single- or sum-rate) with respect to alternative strategies, where the network resources are time-shared among the two sessions. These results represent a step towards the secure capacity characterization for general networks. They also show that, even in configurations for which network coding does not offer benefits in absence of security, it can become beneficial under security constraints.
△ Less
Submitted 14 May, 2016; v1 submitted 19 January, 2016;
originally announced January 2016.
-
Simplifying Wireless Social Caching
Authors:
Mohammed Karmoose,
Martina Cardone,
Christina Fragouli
Abstract:
Social groups give the opportunity for a new form of caching. In this paper, we investigate how a social group of users can jointly optimize bandwidth usage, by each caching parts of the data demand, and then opportunistically share these parts among themselves upon meeting. We formulate this problem as a Linear Program (LP) with exponential complexity. Based on the optimal solution, we propose a…
▽ More
Social groups give the opportunity for a new form of caching. In this paper, we investigate how a social group of users can jointly optimize bandwidth usage, by each caching parts of the data demand, and then opportunistically share these parts among themselves upon meeting. We formulate this problem as a Linear Program (LP) with exponential complexity. Based on the optimal solution, we propose a simple heuristic inspired by the bipartite set-cover problem that operates in polynomial time. Furthermore, we prove a worst case gap between the heuristic and the LP solutions. Finally, we assess the performance of our algorithm using real-world mobility traces from the MIT Reality Mining project dataset and two mobility traces that were synthesized using the SWIM model. Our heuristic performs closely to the optimal in most cases, showing a better performance with respect to alternative solutions.
△ Less
Submitted 12 May, 2016; v1 submitted 19 January, 2016;
originally announced January 2016.
-
The Two-user Causal Cognitive Interference Channel: Novel Outer Bounds and Constant Gap Result for the Symmetric Gaussian Noise Channel in Weak Interference
Authors:
Martina Cardone,
Daniela Tuninetti,
Raymond Knopp
Abstract:
This paper studies the two-user Causal Cognitive Interference Channel (CCIC), where two transmitters aim to communicate independent messages to two different receivers via a common channel. One source, referred to as the cognitive, is capable of overhearing the other source, referred to as the primary, through a noisy in-band link and thus can assist in sending the primary's data. Two novel outer…
▽ More
This paper studies the two-user Causal Cognitive Interference Channel (CCIC), where two transmitters aim to communicate independent messages to two different receivers via a common channel. One source, referred to as the cognitive, is capable of overhearing the other source, referred to as the primary, through a noisy in-band link and thus can assist in sending the primary's data. Two novel outer bounds of the type $2R_p+R_c$ and $R_p+2R_c$ are derived for the class of injective semi-deterministic CCICs where the noises at the different source-destination pairs are independent. An achievable rate region is derived based on Gelfand-Pinsker binning, superposition coding and simultaneous decoding at the receivers.
The lower and outer bounds are then specialized to the practically relevant Gaussian noise case. The authors of this paper recently characterized to within a constant gap the capacity of the symmetric Gaussian CCIC in (a) the strong interference regime, and (b) for a subset of the weak interference regime when the cooperation link is larger than a given threshold. This work characterizes to within a constant gap the capacity for the symmetric Gaussian CCIC in the regime that was still open. In particular, it is shown that the novel outer bounds are necessary to characterize the capacity to within a constant gap when the cooperation link is weaker than the direct links, that is, in this regime unilateral cooperation leaves some system resources underutilized.
△ Less
Submitted 25 March, 2015;
originally announced March 2015.
-
On the Optimality of Simple Schedules for Networks with Multiple Half-Duplex Relays
Authors:
Martina Cardone,
Daniela Tuninetti,
Raymond Knopp
Abstract:
This paper studies networks with N half-duplex relays assisting the communication between a source and a destination. In ISIT'12 Brahma, Özgür and Fragouli conjectured that in Gaussian half-duplex diamond networks (i.e., without a direct link between the source and the destination, and with N non-interfering relays) an approximately optimal relay scheduling policy (i.e., achieving the cut-set uppe…
▽ More
This paper studies networks with N half-duplex relays assisting the communication between a source and a destination. In ISIT'12 Brahma, Özgür and Fragouli conjectured that in Gaussian half-duplex diamond networks (i.e., without a direct link between the source and the destination, and with N non-interfering relays) an approximately optimal relay scheduling policy (i.e., achieving the cut-set upper bound to within a constant gap) has at most N+1 active states (i.e., at most N+1 out of the $2^N$ possible relay listen-transmit states have a strictly positive probability). Such relay scheduling policies were referred to as simple. In ITW'13 we conjectured that simple approximately optimal relay scheduling policies exist for any Gaussian half-duplex multi-relay network irrespectively of the topology. This paper formally proves this more general version of the conjecture and shows it holds beyond Gaussian noise networks. In particular, for any memoryless half-duplex N-relay network with independent noises and for which independent inputs are approximately optimal in the cut-set upper bound, an approximately optimal simple relay scheduling policy exists. A convergent iterative polynomial-time algorithm, which alternates between minimizing a submodular function and maximizing a linear program, is proposed to find the approximately optimal simple relay schedule. As an example, for N-relay Gaussian networks with independent noises, where each node in equipped with multiple antennas and where each antenna can be configured to listen or transmit irrespectively of the others, the existence of an approximately optimal simple relay scheduling policy with at most N+1 active states is proved. Through a line-network example it is also shown that independently switching the antennas at each relay can provide a strictly larger multiplexing gain compared to using the antennas for the same purpose.
△ Less
Submitted 5 December, 2014;
originally announced December 2014.
-
The Approximate Optimality of Simple Schedules for Half-Duplex Multi-Relay Networks
Authors:
Martina Cardone,
Daniela Tuninetti,
Raymond Knopp
Abstract:
In ISIT'12 Brahma, Özgür and Fragouli conjectured that in a half-duplex diamond relay network (a Gaussian noise network without a direct source-destination link and with $N$ non-interfering relays) an approximately optimal relay scheduling (achieving the cut-set upper bound to within a constant gap uniformly over all channel gains) exists with at most $N+1$ active states (only $N+1$ out of the…
▽ More
In ISIT'12 Brahma, Özgür and Fragouli conjectured that in a half-duplex diamond relay network (a Gaussian noise network without a direct source-destination link and with $N$ non-interfering relays) an approximately optimal relay scheduling (achieving the cut-set upper bound to within a constant gap uniformly over all channel gains) exists with at most $N+1$ active states (only $N+1$ out of the $2^N$ possible relay listen-transmit configurations have a strictly positive probability). Such relay scheduling policies are said to be simple. In ITW'13 we conjectured that simple relay policies are optimal for any half-duplex Gaussian multi-relay network, that is, simple schedules are not a consequence of the diamond network's sparse topology. In this paper we formally prove the conjecture beyond Gaussian networks. In particular, for any memoryless half-duplex $N$-relay network with independent noises and for which independent inputs are approximately optimal in the cut-set upper bound, an optimal schedule exists with at most $N+1$ active states. The key step of our proof is to write the minimum of a submodular function by means of its Lovász extension and use the greedy algorithm for submodular polyhedra to highlight structural properties of the optimal solution. This, together with the saddle-point property of min-max problems and the existence of optimal basic feasible solutions in linear programs, proves the claim.
△ Less
Submitted 27 October, 2014;
originally announced October 2014.
-
New Outer Bounds for the Interference Channel with Unilateral Source Cooperation
Authors:
Martina Cardone,
Daniela Tuninetti,
Raymond Knopp,
Umer Salim
Abstract:
This paper studies the two-user interference channel with unilateral source cooperation, which consists of two source-destination pairs that share the same channel and where one full-duplex source can overhear the other source through a noisy in-band link. Novel outer bounds of the type 2Rp+Rc/Rp+2Rc are developed for the class of injective semi-deterministic channels with independent noises at th…
▽ More
This paper studies the two-user interference channel with unilateral source cooperation, which consists of two source-destination pairs that share the same channel and where one full-duplex source can overhear the other source through a noisy in-band link. Novel outer bounds of the type 2Rp+Rc/Rp+2Rc are developed for the class of injective semi-deterministic channels with independent noises at the different source-destination pairs. The bounds are then specialized to the Gaussian noise case. Interesting insights are provided about when these types of bounds are active, or in other words, when unilateral cooperation is too weak and leaves "holes" in the system resources.
△ Less
Submitted 7 February, 2014;
originally announced February 2014.
-
Gaussian Half-Duplex Relay Networks: improved constant gap and connections with the assignment problem
Authors:
Martina Cardone,
Daniela Tuninetti,
Raymond Knopp,
Umer Salim
Abstract:
This paper considers a general Gaussian relay network where a source transmits a message to a destination with the help of N half-duplex relays. It proves that the information theoretic cut-set upper bound to the capacity can be achieved to within 2:021(N +2) bits with noisy network coding, thereby reducing the previously known gap. Further improved gap results are presented for more structured ne…
▽ More
This paper considers a general Gaussian relay network where a source transmits a message to a destination with the help of N half-duplex relays. It proves that the information theoretic cut-set upper bound to the capacity can be achieved to within 2:021(N +2) bits with noisy network coding, thereby reducing the previously known gap. Further improved gap results are presented for more structured networks like diamond networks. It is then shown that the generalized Degrees-of-Freedom of a general Gaussian half-duplex relay network is the solution of a linear program, where the coefficients of the linear inequality constraints are proved to be the solution of several linear programs, known in graph theory as the assignment problem, for which efficient numerical algorithms exist. The optimal schedule, that is, the optimal value of the 2^N possible transmit-receive configurations/states for the relays, is investigated and known results for diamond networks are extended to general relay networks. It is shown, for the case of 2 relays, that only 3 out of the 4 possible states have strictly positive probability. Extensive experimental results show that, for a general N-relay network with N<9, the optimal schedule has at most N +1 states with strictly positive probability. As an extension of a conjecture presented for diamond networks, it is conjectured that this result holds for any HD relay network and any number of relays. Finally, a 2-relay network is studied to determine the channel conditions under which selecting the best relay is not optimal, and to highlight the nature of the rate gain due to multiple relays.
△ Less
Submitted 31 May, 2013; v1 submitted 21 April, 2013;
originally announced April 2013.
-
On the Gaussian Interference Channel with Half-Duplex Causal Cognition
Authors:
Martina Cardone,
Daniela Tuninetti,
Raymond Knopp,
Umer Salim
Abstract:
This paper studies the two-user Gaussian interference channel with half-duplex causal cognition. This channel model consists of two source-destination pairs sharing a common wireless channel. One of the sources, referred to as the cognitive, overhears the other source, referred to as the primary, through a noisy link and can therefore assist in sending the primary's data. Due to practical constrai…
▽ More
This paper studies the two-user Gaussian interference channel with half-duplex causal cognition. This channel model consists of two source-destination pairs sharing a common wireless channel. One of the sources, referred to as the cognitive, overhears the other source, referred to as the primary, through a noisy link and can therefore assist in sending the primary's data. Due to practical constraints, the cognitive source is assumed to work in half-duplex mode, that is, it cannot simultaneously transmit and receive. This model is more relevant for practical cognitive radio systems than the classical information theoretic cognitive channel model, where the cognitive source is assumed to have a non-causal knowledge of the primary's message. Different network topologies are considered, corresponding to different interference scenarios: (i) the interference-symmetric scenario, where both destinations are in the coverage area of the two sources and hence experience interference, and (ii) the interference-asymmetric scenario, where one destination does not suffer from interference. For each topology the sum-rate performance is studied by first deriving the generalized Degrees of Freedom (gDoF), or "sum-capacity pre-log" in the high-SNR regime, and then showing relatively simple coding schemes that achieve a sum-rate upper bound to within a constant number of bits for any SNR. Finally, the gDoF of the channel is compared to that of the non-cooperative interference channel and to that of the non-causal cognitive channel to identify the parameter regimes where half-duplex causal cognition is useless in practice or attains its ideal ultimate limit, respectively.
△ Less
Submitted 7 February, 2014; v1 submitted 2 April, 2013;
originally announced April 2013.
-
On Gaussian Half-Duplex Relay Networks
Authors:
Martina Cardone,
Daniela Tuninetti,
Raymond Knopp,
Umer Salim
Abstract:
This paper considers Gaussian relay networks where a source transmits a message to a sink terminal with the help of one or more relay nodes. The relays work in half-duplex mode, in the sense that they can not transmit and receive at the same time. For the case of one relay, the generalized Degrees-of-Freedom is characterized first and then it is shown that capacity can be achieved to within a cons…
▽ More
This paper considers Gaussian relay networks where a source transmits a message to a sink terminal with the help of one or more relay nodes. The relays work in half-duplex mode, in the sense that they can not transmit and receive at the same time. For the case of one relay, the generalized Degrees-of-Freedom is characterized first and then it is shown that capacity can be achieved to within a constant gap regardless of the actual value of the channel parameters. Different achievable schemes are presented with either deterministic or random switch for the relay node. It is shown that random switch in general achieves higher rates than deterministic switch. For the case of K relays, it is shown that the generalized Degrees-of-Freedom can be obtained by solving a linear program and that capacity can be achieved to within a constant gap of K/2log(4K). This gap may be further decreased by considering more structured networks such as, for example, the diamond network.
△ Less
Submitted 23 January, 2013;
originally announced January 2013.
-
On the Capacity of the Two-user Gaussian Causal Cognitive Interference Channel
Authors:
Martina Cardone,
Daniela Tuninetti,
Raymond Knopp,
Umer Salim
Abstract:
This paper considers the two-user Gaussian Causal Cognitive Interference Channel (GCCIC), which consists of two source-destination pairs that share the same channel and where one full-duplex cognitive source can causally learn the message of the primary source through a noisy link. The GCCIC is an interference channel with unilateral source cooperation that better models practical cognitive radio…
▽ More
This paper considers the two-user Gaussian Causal Cognitive Interference Channel (GCCIC), which consists of two source-destination pairs that share the same channel and where one full-duplex cognitive source can causally learn the message of the primary source through a noisy link. The GCCIC is an interference channel with unilateral source cooperation that better models practical cognitive radio networks than the commonly used model which assumes that one source has perfect non-causal knowledge of the other source's message. First the sum-capacity of the symmetric GCCIC is determined to within a constant gap. Then, the insights gained from the derivation of the symmetric sum-capacity are extended to characterize the whole capacity region to within a constant gap for more general cases. In particular, the capacity is determined (a) to within 2 bits for the fully connected GCCIC when, roughly speaking, the interference is not weak at both receivers, (b) to within 2 bits for the Z-channel, i.e., when there is no interference from the primary user, and (c) to within 2 bits for the S-channel, i.e., when there is no interference from the secondary user. The parameter regimes where the GCCIC is equivalent, in terms of generalized degrees-of-freedom, to the noncooperative interference channel (i.e., unilateral causal cooperation is not useful), to the non-causal cognitive interference channel (i.e., causal cooperation attains the ultimate limit of cognitive radio technology), and to bilateral source cooperation are identified. These comparisons shed lights into the parameter regimes and network topologies that in practice might provide an unbounded throughput gain compared to currently available (non cognitive) technologies.
△ Less
Submitted 30 September, 2013; v1 submitted 23 July, 2012;
originally announced July 2012.