Skip to main content

Showing 1–46 of 46 results for author: Cardone, M

.
  1. arXiv:2407.08571  [pdf, other

    cs.AI cs.IR cs.IT cs.LG stat.ML

    Multi-Group Proportional Representation

    Authors: Alex Oesterling, Claudio Mayrink Verdun, Carol Xuan Long, Alex Glynn, Lucas Monteiro Paes, Sajani Vithana, Martina Cardone, Flavio P. Calmon

    Abstract: Image search and retrieval tasks can perpetuate harmful stereotypes, erase cultural identities, and amplify social disparities. Current approaches to mitigate these representational harms balance the number of retrieved items across population groups defined by a small number of (often binary) attributes. However, most existing methods overlook intersectional groups determined by combinations of g… ▽ More

    Submitted 11 July, 2024; originally announced July 2024.

    Comments: 35 pages, 24 figures. Under review

  2. arXiv:2405.05823  [pdf, ps, other

    cs.IT

    On the Secrecy Capacity of 1-2-1 Atomic Networks

    Authors: Mohammad Milanian, Minoh Jeong, Martina Cardone

    Abstract: We consider the problem of secure communication over a noiseless 1-2-1 network, an abstract model introduced to capture the directivity characteristic of mmWave communications. We focus on structured networks, which we refer to as 1-2-1 atomic networks. Broadly speaking, these are characterized by a source, a destination, and three layers of intermediate nodes with sparse connections. The goal is… ▽ More

    Submitted 9 May, 2024; originally announced May 2024.

    Comments: Accepted to ISIT 2024

  3. arXiv:2404.04366  [pdf, other

    cs.IT eess.SP

    A Comprehensive Study on Ziv-Zakai Lower Bounds on the MMSE

    Authors: Minoh Jeong, Alex Dytso, Martina Cardone

    Abstract: This paper explores Bayesian lower bounds on the minimum mean squared error (MMSE) that belong to the Ziv-Zakai (ZZ) family. The ZZ technique relies on connecting the bound to an M-ary hypothesis testing problem. Three versions of the ZZ bound (ZZB) exist: the first relies on the so-called valley-filling function (VFF), the second omits the VFF, and the third, i.e., the single-point ZZB (SZZB), us… ▽ More

    Submitted 5 April, 2024; originally announced April 2024.

    Comments: Comments are welcome. arXiv admin note: substantial text overlap with arXiv:2305.02970

  4. arXiv:2403.12419  [pdf, ps, other

    cs.IT

    Sparsity-Constrained Community-Based Group Testing

    Authors: Sarthak Jain, Martina Cardone, Soheil Mohajer

    Abstract: In this work, we consider the sparsity-constrained community-based group testing problem, where the population follows a community structure. In particular, the community consists of $F$ families, each with $M$ members. A number $k_f$ out of the $F$ families are infected, and a family is said to be infected if $k_m$ out of its $M$ members are infected. Furthermore, the sparsity constraint allows a… ▽ More

    Submitted 19 March, 2024; originally announced March 2024.

  5. arXiv:2402.06941  [pdf, other

    cs.IT

    Achieving Low Latency at Low Outage: Multilevel Coding for mmWave Channels

    Authors: Mine Gokce Dogan, Jaimin Shah, Martina Cardone, Christina Fragouli, Wei Mao, Hosein Nikopour, Rath Vannithamby

    Abstract: Millimeter-wave (mmWave) spectrum is expected to support data-intensive applications that require ultra-reliable low-latency communications (URLLC). However, mmWave links are highly sensitive to blockage, which may lead to disruptions in the communication. Traditional techniques that build resilience against such blockages (among which are interleaving and feedback mechanisms) incur delays that ar… ▽ More

    Submitted 10 February, 2024; originally announced February 2024.

  6. arXiv:2401.15500  [pdf, ps, other

    cs.LG cs.IT stat.ML

    Data-Driven Estimation of the False Positive Rate of the Bayes Binary Classifier via Soft Labels

    Authors: Minoh Jeong, Martina Cardone, Alex Dytso

    Abstract: Classification is a fundamental task in many applications on which data-driven methods have shown outstanding performances. However, it is challenging to determine whether such methods have achieved the optimal performance. This is mainly because the best achievable performance is typically unknown and hence, effectively estimating it is of prime importance. In this paper, we consider binary class… ▽ More

    Submitted 27 January, 2024; originally announced January 2024.

  7. arXiv:2401.04248  [pdf, ps, other

    cs.IT

    Uniform Distribution on $(n-1)$-Sphere: Rate-Distortion under Squared Error Distortion

    Authors: Alex Dytso, Martina Cardone

    Abstract: This paper investigates the rate-distortion function, under a squared error distortion $D$, for an $n$-dimensional random vector uniformly distributed on an $(n-1)$-sphere of radius $R$. First, an expression for the rate-distortion function is derived for any values of $n$, $D$, and $R$. Second, two types of asymptotics with respect to the rate-distortion function of a Gaussian source are characte… ▽ More

    Submitted 8 January, 2024; originally announced January 2024.

  8. arXiv:2308.14071  [pdf, other

    cs.IT

    Supporting Passive Users in mmWave Networks

    Authors: Mine Gokce Dogan, Martina Cardone, Christina Fragouli

    Abstract: The interference from active to passive users is a well-recognized challenge in millimeter-wave (mmWave) communications. We propose a method that enables to limit the interference on passive users (whose presence may not be detected since they do not transmit) with a small penalty to the throughput of active users. Our approach abstracts away (in a simple, yet informative way) the physical layer c… ▽ More

    Submitted 27 August, 2023; originally announced August 2023.

  9. arXiv:2305.06526  [pdf, ps, other

    cs.IT cs.DC

    Probabilistic Group Testing in Distributed Computing with Attacked Workers

    Authors: Sarthak Jain, Martina Cardone, Soheil Mohajer

    Abstract: The problem of distributed matrix-vector product is considered, where the server distributes the task of the computation among $n$ worker nodes, out of which $L$ are compromised (but non-colluding) and may return incorrect results. Specifically, it is assumed that the compromised workers are unreliable, that is, at any given time, each compromised worker may return an incorrect and correct result… ▽ More

    Submitted 10 May, 2023; originally announced May 2023.

  10. arXiv:2305.02970  [pdf, ps, other

    cs.IT eess.SP math.ST

    Functional Properties of the Ziv-Zakai bound with Arbitrary Inputs

    Authors: Minoh Jeong, Alex Dytso, Martina Cardone

    Abstract: This paper explores the Ziv-Zakai bound (ZZB), which is a well-known Bayesian lower bound on the Minimum Mean Squared Error (MMSE). First, it is shown that the ZZB holds without any assumption on the distribution of the estimand, that is, the estimand does not necessarily need to have a probability density function. The ZZB is then further analyzed in the high-noise and low-noise regimes and shown… ▽ More

    Submitted 4 May, 2023; originally announced May 2023.

    Comments: Full version of "Functional Properties of the Ziv-Zakai bound with Arbitrary Inputs" in 2023 IEEE International Symposium on Information Theory (ISIT)

  11. arXiv:2211.09307  [pdf, other

    cs.IT cs.LG

    Proactive Resilient Transmission and Scheduling Mechanisms for mmWave Networks

    Authors: Mine Gokce Dogan, Martina Cardone, Christina Fragouli

    Abstract: This paper aims to develop resilient transmission mechanisms to suitably distribute traffic across multiple paths in an arbitrary millimeter-wave (mmWave) network. The main contributions include: (a) the development of proactive transmission mechanisms that build resilience against network disruptions in advance, while achieving a high end-to-end packet rate; (b) the design of a heuristic path sel… ▽ More

    Submitted 16 November, 2022; originally announced November 2022.

    Comments: arXiv admin note: text overlap with arXiv:2108.00548

  12. arXiv:2205.05848  [pdf, ps, other

    cs.IT eess.SP stat.ML

    An MMSE Lower Bound via Poincaré Inequality

    Authors: Ian Zieder, Alex Dytso, Martina Cardone

    Abstract: This paper studies the minimum mean squared error (MMSE) of estimating $\mathbf{X} \in \mathbb{R}^d$ from the noisy observation $\mathbf{Y} \in \mathbb{R}^k$, under the assumption that the noise (i.e., $\mathbf{Y}|\mathbf{X}$) is a member of the exponential family. The paper provides a new lower bound on the MMSE. Towards this end, an alternative representation of the MMSE is first presented, whic… ▽ More

    Submitted 11 May, 2022; originally announced May 2022.

    Comments: To be presented at International Symposium on Information Theory (ISIT 2022)

  13. arXiv:2205.04621  [pdf, ps, other

    cs.IT math.ST stat.ML

    Entropic CLT for Order Statistics

    Authors: Martina Cardone, Alex Dytso, Cynthia Rush

    Abstract: It is well known that central order statistics exhibit a central limit behavior and converge to a Gaussian distribution as the sample size grows. This paper strengthens this known result by establishing an entropic version of the CLT that ensures a stronger mode of convergence using the relative entropy. In particular, an order $O(1/\sqrt{n})$ rate of convergence is established under mild conditio… ▽ More

    Submitted 9 May, 2022; originally announced May 2022.

    Comments: Accepted to the 2022 IEEE International Symposium on Information Theory (ISIT)

  14. arXiv:2105.05106  [pdf, ps, other

    math.PR cs.IT math.ST

    A General Derivative Identity for the Conditional Expectation with Focus on the Exponential Family

    Authors: Alex Dytso, Martina Cardone

    Abstract: Consider a pair of random vectors $(\mathbf{X},\mathbf{Y}) $ and the conditional expectation operator $\mathbb{E}[\mathbf{X}|\mathbf{Y}=\mathbf{y}]$. This work studies analytic properties of the conditional expectation by characterizing various derivative identities. The paper consists of two parts. In the first part of the paper, a general derivative identity for the conditional expectation is de… ▽ More

    Submitted 30 August, 2021; v1 submitted 11 May, 2021; originally announced May 2021.

  15. arXiv:2105.03064  [pdf, other

    cs.IT

    When an Energy-Efficient Scheduling is Optimal for Half-Duplex Relay Networks?

    Authors: Sarthak Jain, Martina Cardone, Soheil Mohajer

    Abstract: This paper considers a diamond network with $n$ interconnected relays, namely a network where a source communicates with a destination by hop** information through $n$ communicating/interconnected relays. Specifically, the main focus of the paper is on characterizing sufficient conditions under which the $n+1$ states (out of the $2^{n}$ possible ones) in which at most one relay is transmitting s… ▽ More

    Submitted 12 August, 2021; v1 submitted 7 May, 2021; originally announced May 2021.

  16. arXiv:2105.03015  [pdf, ps, other

    cs.IT eess.SP math.ST

    Retrieving Data Permutations from Noisy Observations: High and Low Noise Asymptotics

    Authors: Minoh Jeong, Alex Dytso, Martina Cardone

    Abstract: This paper considers the problem of recovering the permutation of an n-dimensional random vector X observed in Gaussian noise. First, a general expression for the probability of error is derived when a linear decoder (i.e., linear estimator followed by a sorting operation) is used. The derived expression holds with minimal assumptions on the distribution of X and when the noise has memory. Second,… ▽ More

    Submitted 6 May, 2021; originally announced May 2021.

  17. arXiv:2101.11667  [pdf, other

    cs.IT

    The Most Informative Order Statistic and its Application to Image Denoising

    Authors: Alex Dytso, Martina Cardone, Cynthia Rush

    Abstract: We consider the problem of finding the subset of order statistics that contains the most information about a sample of random variables drawn independently from some known parametric distribution. We leverage information-theoretic quantities, such as entropy and mutual information, to quantify the level of informativeness and rigorously characterize the amount of information contained in any subse… ▽ More

    Submitted 27 January, 2021; originally announced January 2021.

  18. arXiv:2009.12337  [pdf, ps, other

    cs.IT math.ST

    Measuring Dependencies of Order Statistics: An Information Theoretic Perspective

    Authors: Alex Dytso, Martina Cardone, Cynthia Rush

    Abstract: Consider a random sample $X_1 , X_2 , ..., X_n$ drawn independently and identically distributed from some known sampling distribution $P_X$. Let $X_{(1)} \le X_{(2)} \le ... \le X_{(n)}$ represent the order statistics of the sample. The first part of the paper focuses on distributions with an invertible cumulative distribution function. Under this assumption, a distribution-free property is establ… ▽ More

    Submitted 25 September, 2020; originally announced September 2020.

    Comments: This is an extended version of a paper submitted to IEEE ITW 2020

  19. arXiv:2005.07812  [pdf, other

    cs.IT

    Recovering Data Permutations from Noisy Observations: The Linear Regime

    Authors: Minoh Jeong, Alex Dytso, Martina Cardone, H. Vincent Poor

    Abstract: This paper considers a noisy data structure recovery problem. The goal is to investigate the following question: Given a noisy observation of a permuted data set, according to which permutation was the original data sorted? The focus is on scenarios where data is generated according to an isotropic Gaussian distribution, and the noise is additive Gaussian with an arbitrary covariance matrix. This… ▽ More

    Submitted 20 November, 2020; v1 submitted 15 May, 2020; originally announced May 2020.

    ACM Class: E.4; G.3

  20. arXiv:2005.06655  [pdf, ps, other

    cs.IT

    Gaussian 1-2-1 Networks with Imperfect Beamforming

    Authors: Yahya H. Ezzeldin, Martina Cardone, Christina Fragouli, Giuseppe Caire

    Abstract: In this work, we study bounds on the capacity of full-duplex Gaussian 1-2-1 networks with imperfect beamforming. In particular, different from the ideal 1-2-1 network model introduced in [1], in this model beamforming patterns result in side-lobe leakage that cannot be perfectly suppressed. The 1-2-1 network model captures the directivity of mmWave network communications, where nodes communicate b… ▽ More

    Submitted 13 May, 2020; originally announced May 2020.

  21. arXiv:2001.02851  [pdf, other

    cs.IT

    Best Relay Selection in Gaussian Half-Duplex Diamond Networks

    Authors: Sarthak Jain, Soheil Mohajer, Martina Cardone

    Abstract: This paper considers Gaussian half-duplex diamond $n$-relay networks, where a source communicates with a destination by hop** information through one layer of $n$ non-communicating relays that operate in half-duplex. The main focus consists of investigating the following question: What is the contribution of a single relay on the approximate capacity of the entire network? In particular, approxi… ▽ More

    Submitted 9 January, 2020; originally announced January 2020.

    Comments: 30 pages, 5 figures, journal

  22. arXiv:1901.06294  [pdf, other

    cs.IT

    Estimating Noisy Order Statistics

    Authors: Alex Dytso, Martina Cardone, H. Vincent Poor

    Abstract: This paper proposes an estimation framework to assess the performance of sorting over perturbed/noisy data. In particular, the recovering accuracy is measured in terms of Minimum Mean Square Error (MMSE) between the values of the sorting function computed on data without perturbation and the estimator that operates on the sorted noisy data. It is first shown that, under certain symmetry conditions… ▽ More

    Submitted 3 September, 2019; v1 submitted 18 January, 2019; originally announced January 2019.

    Comments: Submitted to ISIT 2019

  23. arXiv:1901.03216  [pdf, other

    cs.IT

    On Secure Capacity of Multiple Unicast Traffic over Separable Networks

    Authors: Gaurav Kumar Agarwal, Martina Cardone, Christina Fragouli

    Abstract: This paper studies the problem of information theoretic secure communication when a source has private messages to transmit to $m$ destinations, in the presence of a passive adversary who eavesdrops an unknown set of $k$ edges. The information theoretic secure capacity is derived over unit-edge capacity separable networks, for the cases when $k=1$ and $m$ is arbitrary, or $m=3$ and $k$ is arbitrar… ▽ More

    Submitted 10 April, 2019; v1 submitted 10 January, 2019; originally announced January 2019.

    Comments: Submitted for ITW

  24. arXiv:1901.02933  [pdf, other

    cs.IT

    Polynomial-time Capacity Calculation and Scheduling for Half-Duplex 1-2-1 Networks

    Authors: Yahya H. Ezzeldin, Martina Cardone, Christina Fragouli, Giuseppe Caire

    Abstract: This paper studies the 1-2-1 half-duplex network model, where two half-duplex nodes can communicate only if they point `beams' at each other; otherwise, no signal can be exchanged or interference can be generated. The main result of this paper is the design of two polynomial-time algorithms that: (i) compute the approximate capacity of the 1-2-1 half-duplex network and, (ii) find the network sched… ▽ More

    Submitted 9 January, 2019; originally announced January 2019.

  25. arXiv:1901.02787  [pdf, other

    cs.IT

    On Secure Network Coding for Multiple Unicast Traffic

    Authors: Gaurav Kumar Agarwal, Martina Cardone, Christina Fragouli

    Abstract: This paper investigates the problem of secure communication in a wireline noiseless scenario where a source wishes to communicate to a number of destinations in the presence of a passive external adversary. Different from the multicast scenario, where all destinations are interested in receiving the same message, in this setting different destinations are interested in different messages. The main… ▽ More

    Submitted 9 January, 2019; originally announced January 2019.

  26. arXiv:1809.08263  [pdf, other

    cs.IT

    Privacy in Index Coding: $k$-Limited-Access Schemes

    Authors: Mohammed Karmoose, Linqi Song, Martina Cardone, Christina Fragouli

    Abstract: In the traditional index coding problem, a server employs coding to send messages to $n$ clients within the same broadcast domain. Each client already has some messages as side information and requests a particular unknown message from the server. All clients learn the coding matrix so that they can decode and retrieve their requested data. Our starting observation is that, learning the coding mat… ▽ More

    Submitted 21 September, 2018; originally announced September 2018.

  27. Privacy in Index Coding: Improved Bounds and Coding Schemes

    Authors: Mohammed Karmoose, Linqi Song, Martina Cardone, Christina Fragouli

    Abstract: It was recently observed in [1], that in index coding, learning the coding matrix used by the server can pose privacy concerns: curious clients can extract information about the requests and side information of other clients. One approach to mitigate such concerns is the use of $k$-limited-access schemes [1], that restrict each client to learn only part of the index coding matrix, and in particula… ▽ More

    Submitted 11 January, 2018; originally announced January 2018.

  28. Secure Communication over 1-2-1 Networks

    Authors: Gaurav Kumar Agarwal, Yahya H. Ezzeldin, Martina Cardone, Christina Fragouli

    Abstract: This paper starts by assuming a 1-2-1 network, the abstracted noiseless model of mmWave networks that was shown to closely approximate the Gaussian capacity in [1], and studies secure communication. First, the secure capacity is derived for 1-2-1 networks where a source is connected to a destination through a network of unit capacity links. Then, lower and upper bounds on the secure capacity are d… ▽ More

    Submitted 12 January, 2018; v1 submitted 9 January, 2018; originally announced January 2018.

    Comments: Submitted for ISIT 2018

  29. Gaussian 1-2-1 Networks: Capacity Results for mmWave Communications

    Authors: Yahya H. Ezzeldin, Martina Cardone, Christina Fragouli, Giuseppe Caire

    Abstract: This paper proposes a new model for wireless relay networks referred to as "1-2-1 network", where two nodes can communicate only if they point "beams" at each other, while if they do not point beams at each other, no signal can be exchanged or interference can be generated. This model is motivated by millimeter wave communications where, due to the high path loss, a link between two nodes can exis… ▽ More

    Submitted 17 June, 2018; v1 submitted 8 January, 2018; originally announced January 2018.

  30. Half-Duplex Routing is NP-hard

    Authors: Yahya H. Ezzeldin, Martina Cardone, Christina Fragouli, Daniela Tuninetti

    Abstract: Routing is a widespread approach to transfer information from a source node to a destination node in many deployed wireless ad-hoc networks. Today's implemented routing algorithms seek to efficiently find the path/route with the largest Full-Duplex (FD) capacity, which is given by the minimum among the point-to-point link capacities in the path. Such an approach may be suboptimal if then the nodes… ▽ More

    Submitted 10 August, 2017; originally announced August 2017.

  31. Preserving Privacy while Broadcasting: $k$-Limited-Access Schemes

    Authors: Mohammed Karmoose, Linqi Song, Martina Cardone, Christina Fragouli

    Abstract: Index coding employs coding across clients within the same broadcast domain. This typically assumes that all clients learn the coding matrix so that they can decode and retrieve their requested data. However, learning the coding matrix can pose privacy concerns: it may enable clients to infer information about the requests and side information of other clients [1]. In this paper, we formalize the… ▽ More

    Submitted 23 May, 2017; originally announced May 2017.

  32. Private Broadcasting: an Index Coding Approach

    Authors: Mohammed Karmoose, Linqi Song, Martina Cardone, Christina Fragouli

    Abstract: Using a broadcast channel to transmit clients' data requests may impose privacy risks. In this paper, we address such privacy concerns in the index coding framework. We show how a malicious client can infer some information about the requests and side information of other clients by learning the encoding matrix used by the server. We propose an information-theoretic metric to measure the level of… ▽ More

    Submitted 22 January, 2017; v1 submitted 18 January, 2017; originally announced January 2017.

  33. Efficiently Finding Simple Schedules in Gaussian Half-Duplex Relay Line Networks

    Authors: Yahya H. Ezzeldin, Martina Cardone, Christina Fragouli, Daniela Tuninetti

    Abstract: The problem of operating a Gaussian Half-Duplex (HD) relay network optimally is challenging due to the exponential number of listen/transmit network states that need to be considered. Recent results have shown that, for the class of Gaussian HD networks with N relays, there always exists a simple schedule, i.e., with at most N +1 active states, that is sufficient for approximate (i.e., up to a con… ▽ More

    Submitted 21 June, 2017; v1 submitted 16 January, 2017; originally announced January 2017.

    Comments: A short version of this paper was submitted to ISIT 2017

  34. arXiv:1607.01441  [pdf, ps, other

    cs.IT

    Network Simplification in Half-Duplex: Building on Submodularity

    Authors: Martina Cardone, Yahya H. Ezzeldin, Christina Fragouli, Daniela Tuninetti

    Abstract: This paper explores the {\it network simplification} problem in the context of Gaussian Half-Duplex (HD) diamond networks. Specifically, given an $N$-relay diamond network, this problem seeks to derive fundamental guarantees on the capacity of the best $k$-relay subnetwork, as a function of the full network capacity. The main focus of this work is on the case when $k=N-1$ relays are selected out o… ▽ More

    Submitted 7 July, 2017; v1 submitted 5 July, 2016; originally announced July 2016.

  35. On (Secure) Information flow for Multiple-Unicast Sessions: Analysis with Butterfly Network

    Authors: Gaurav Kumar Agarwal, Martina Cardone, Christina Fragouli

    Abstract: This paper considers a class of wireline networks, derived from the well-known butterfly network, over which two independent unicast sessions take place simultaneously. The main objectives are to understand when network coding type of operations are beneficial with and without security considerations and to derive the ultimate gains that cooperation among sources and sinks can bring. Towards these… ▽ More

    Submitted 24 June, 2016; originally announced June 2016.

  36. On Network Simplification for Gaussian Half-Duplex Diamond Networks

    Authors: Martina Cardone, Christina Fragouli, Daniela Tuninetti

    Abstract: This paper investigates the simplification problem in Gaussian Half-Duplex (HD) diamond networks. The goal is to answer the following question: what is the minimum (worst-case) fraction of the total HD capacity that one can always achieve by smartly selecting a subset of $k$ relays, out of the $N$ possible ones? We make progress on this problem for $k=1$ and $k=2$ and show that for… ▽ More

    Submitted 4 July, 2016; v1 submitted 19 January, 2016; originally announced January 2016.

    Comments: Parts of this work will be presented at ISIT 2016

  37. On Secure Network Coding for Two Unicast Sessions

    Authors: Gaurav Kumar Agarwal, Martina Cardone, Christina Fragouli

    Abstract: This paper characterizes the secret message capacity of three networks where two unicast sessions share some of the communication resources. Each network consists of erasure channels with state feedback. A passive eavesdropper is assumed to wiretap any one of the links. The capacity achieving schemes as well as the outer bounds are formulated as linear programs. The proposed strategies are then nu… ▽ More

    Submitted 14 May, 2016; v1 submitted 19 January, 2016; originally announced January 2016.

    Comments: Parts of this work were accepted for publication at ISIT 2016

  38. Simplifying Wireless Social Caching

    Authors: Mohammed Karmoose, Martina Cardone, Christina Fragouli

    Abstract: Social groups give the opportunity for a new form of caching. In this paper, we investigate how a social group of users can jointly optimize bandwidth usage, by each caching parts of the data demand, and then opportunistically share these parts among themselves upon meeting. We formulate this problem as a Linear Program (LP) with exponential complexity. Based on the optimal solution, we propose a… ▽ More

    Submitted 12 May, 2016; v1 submitted 19 January, 2016; originally announced January 2016.

    Comments: Parts of this work were accepted for publication in ISIT 2016. A complete version is submitted to Transactions on Mobile Computing

  39. The Two-user Causal Cognitive Interference Channel: Novel Outer Bounds and Constant Gap Result for the Symmetric Gaussian Noise Channel in Weak Interference

    Authors: Martina Cardone, Daniela Tuninetti, Raymond Knopp

    Abstract: This paper studies the two-user Causal Cognitive Interference Channel (CCIC), where two transmitters aim to communicate independent messages to two different receivers via a common channel. One source, referred to as the cognitive, is capable of overhearing the other source, referred to as the primary, through a noisy in-band link and thus can assist in sending the primary's data. Two novel outer… ▽ More

    Submitted 25 March, 2015; originally announced March 2015.

    Comments: Submitted to IEEE Transactions on Information Theory

  40. On the Optimality of Simple Schedules for Networks with Multiple Half-Duplex Relays

    Authors: Martina Cardone, Daniela Tuninetti, Raymond Knopp

    Abstract: This paper studies networks with N half-duplex relays assisting the communication between a source and a destination. In ISIT'12 Brahma, Özgür and Fragouli conjectured that in Gaussian half-duplex diamond networks (i.e., without a direct link between the source and the destination, and with N non-interfering relays) an approximately optimal relay scheduling policy (i.e., achieving the cut-set uppe… ▽ More

    Submitted 5 December, 2014; originally announced December 2014.

    Comments: This paper is an extension of arXiv:1410.7174. Submitted to IEEE Transactions on Information Theory

  41. The Approximate Optimality of Simple Schedules for Half-Duplex Multi-Relay Networks

    Authors: Martina Cardone, Daniela Tuninetti, Raymond Knopp

    Abstract: In ISIT'12 Brahma, Özgür and Fragouli conjectured that in a half-duplex diamond relay network (a Gaussian noise network without a direct source-destination link and with $N$ non-interfering relays) an approximately optimal relay scheduling (achieving the cut-set upper bound to within a constant gap uniformly over all channel gains) exists with at most $N+1$ active states (only $N+1$ out of the… ▽ More

    Submitted 27 October, 2014; originally announced October 2014.

    Comments: Submitted to IEEE Information Theory Workshop (ITW) 2015

  42. New Outer Bounds for the Interference Channel with Unilateral Source Cooperation

    Authors: Martina Cardone, Daniela Tuninetti, Raymond Knopp, Umer Salim

    Abstract: This paper studies the two-user interference channel with unilateral source cooperation, which consists of two source-destination pairs that share the same channel and where one full-duplex source can overhear the other source through a noisy in-band link. Novel outer bounds of the type 2Rp+Rc/Rp+2Rc are developed for the class of injective semi-deterministic channels with independent noises at th… ▽ More

    Submitted 7 February, 2014; originally announced February 2014.

    Comments: Submitted to IEEE International Symposium on Information Theory (ISIT) 2014

  43. Gaussian Half-Duplex Relay Networks: improved constant gap and connections with the assignment problem

    Authors: Martina Cardone, Daniela Tuninetti, Raymond Knopp, Umer Salim

    Abstract: This paper considers a general Gaussian relay network where a source transmits a message to a destination with the help of N half-duplex relays. It proves that the information theoretic cut-set upper bound to the capacity can be achieved to within 2:021(N +2) bits with noisy network coding, thereby reducing the previously known gap. Further improved gap results are presented for more structured ne… ▽ More

    Submitted 31 May, 2013; v1 submitted 21 April, 2013; originally announced April 2013.

    Comments: Substantial text overlaps with Section VIII in arXiv: 1301.5522. Submitted to IEEE Transactions on Information Theory

  44. On the Gaussian Interference Channel with Half-Duplex Causal Cognition

    Authors: Martina Cardone, Daniela Tuninetti, Raymond Knopp, Umer Salim

    Abstract: This paper studies the two-user Gaussian interference channel with half-duplex causal cognition. This channel model consists of two source-destination pairs sharing a common wireless channel. One of the sources, referred to as the cognitive, overhears the other source, referred to as the primary, through a noisy link and can therefore assist in sending the primary's data. Due to practical constrai… ▽ More

    Submitted 7 February, 2014; v1 submitted 2 April, 2013; originally announced April 2013.

    Comments: Accepted for publication in IEEE Journal on Selected Areas in Communications: Cognitive Radio Series

  45. On Gaussian Half-Duplex Relay Networks

    Authors: Martina Cardone, Daniela Tuninetti, Raymond Knopp, Umer Salim

    Abstract: This paper considers Gaussian relay networks where a source transmits a message to a sink terminal with the help of one or more relay nodes. The relays work in half-duplex mode, in the sense that they can not transmit and receive at the same time. For the case of one relay, the generalized Degrees-of-Freedom is characterized first and then it is shown that capacity can be achieved to within a cons… ▽ More

    Submitted 23 January, 2013; originally announced January 2013.

  46. On the Capacity of the Two-user Gaussian Causal Cognitive Interference Channel

    Authors: Martina Cardone, Daniela Tuninetti, Raymond Knopp, Umer Salim

    Abstract: This paper considers the two-user Gaussian Causal Cognitive Interference Channel (GCCIC), which consists of two source-destination pairs that share the same channel and where one full-duplex cognitive source can causally learn the message of the primary source through a noisy link. The GCCIC is an interference channel with unilateral source cooperation that better models practical cognitive radio… ▽ More

    Submitted 30 September, 2013; v1 submitted 23 July, 2012; originally announced July 2012.

    Comments: Under second round review in IEEE Transactions in Information Theory - Submitted September 2013