-
LLMs Are Not Intelligent Thinkers: Introducing Mathematical Topic Tree Benchmark for Comprehensive Evaluation of LLMs
Authors:
Arash Gholami Davoodi,
Seyed Pouyan Mousavi Davoudi,
Pouya Pezeshkpour
Abstract:
Large language models (LLMs) demonstrate impressive capabilities in mathematical reasoning. However, despite these achievements, current evaluations are mostly limited to specific mathematical topics, and it remains unclear whether LLMs are genuinely engaging in reasoning. To address these gaps, we present the Mathematical Topics Tree (MaTT) benchmark, a challenging and structured benchmark that o…
▽ More
Large language models (LLMs) demonstrate impressive capabilities in mathematical reasoning. However, despite these achievements, current evaluations are mostly limited to specific mathematical topics, and it remains unclear whether LLMs are genuinely engaging in reasoning. To address these gaps, we present the Mathematical Topics Tree (MaTT) benchmark, a challenging and structured benchmark that offers 1,958 questions across a wide array of mathematical subjects, each paired with a detailed hierarchical chain of topics. Upon assessing different LLMs using the MaTT benchmark, we find that the most advanced model, GPT-4, achieved a mere 54\% accuracy in a multiple-choice scenario. Interestingly, even when employing Chain-of-Thought prompting, we observe mostly no notable improvement. Moreover, LLMs accuracy dramatically reduced by up to 24.2 percentage point when the questions were presented without providing choices. Further detailed analysis of the LLMs' performance across a range of topics showed significant discrepancy even for closely related subtopics within the same general mathematical area. In an effort to pinpoint the reasons behind LLMs performances, we conducted a manual evaluation of the completeness and correctness of the explanations generated by GPT-4 when choices were available. Surprisingly, we find that in only 53.3\% of the instances where the model provided a correct answer, the accompanying explanations were deemed complete and accurate, i.e., the model engaged in genuine reasoning.
△ Less
Submitted 7 June, 2024;
originally announced June 2024.
-
Automated Inference of Graph Transformation Rules
Authors:
Jakob L. Andersen,
Akbar Davoodi,
Rolf Fagerberg,
Christoph Flamm,
Walter Fontana,
Juri Kolčák,
Christophe V. F. P. Laurent,
Daniel Merkle,
Nikolai Nøjgaard
Abstract:
The explosion of data available in life sciences is fueling an increasing demand for expressive models and computational methods. Graph transformation is a model for dynamic systems with a large variety of applications. We introduce a novel method of the graph transformation model construction, combining generative and dynamical viewpoints to give a fully automated data-driven model inference meth…
▽ More
The explosion of data available in life sciences is fueling an increasing demand for expressive models and computational methods. Graph transformation is a model for dynamic systems with a large variety of applications. We introduce a novel method of the graph transformation model construction, combining generative and dynamical viewpoints to give a fully automated data-driven model inference method.
The method takes the input dynamical properties, given as a "snapshot" of the dynamics encoded by explicit transitions, and constructs a compatible model. The obtained model is guaranteed to be minimal, thus framing the approach as model compression (from a set of transitions into a set of rules). The compression is permissive to a lossy case, where the constructed model is allowed to exhibit behavior outside of the input transitions, thus suggesting a completion of the input dynamics.
The task of graph transformation model inference is naturally highly challenging due to the combinatorics involved. We tackle the exponential explosion by proposing a heuristically minimal translation of the task into a well-established problem, set cover, for which highly optimized solutions exist. We further showcase how our results relate to Kolmogorov complexity expressed in terms of graph transformation.
△ Less
Submitted 3 April, 2024;
originally announced April 2024.
-
Block Pruning for Enhanced Efficiency in Convolutional Neural Networks
Authors:
Cheng-En Wu,
Azadeh Davoodi,
Yu Hen Hu
Abstract:
This paper presents a novel approach to network pruning, targeting block pruning in deep neural networks for edge computing environments. Our method diverges from traditional techniques that utilize proxy metrics, instead employing a direct block removal strategy to assess the impact on classification accuracy. This hands-on approach allows for an accurate evaluation of each block's importance. We…
▽ More
This paper presents a novel approach to network pruning, targeting block pruning in deep neural networks for edge computing environments. Our method diverges from traditional techniques that utilize proxy metrics, instead employing a direct block removal strategy to assess the impact on classification accuracy. This hands-on approach allows for an accurate evaluation of each block's importance. We conducted extensive experiments on CIFAR-10, CIFAR-100, and ImageNet datasets using ResNet architectures. Our results demonstrate the efficacy of our method, particularly on large-scale datasets like ImageNet with ResNet50, where it excelled in reducing model size while retaining high accuracy, even when pruning a significant portion of the network. The findings underscore our method's capability in maintaining an optimal balance between model size and performance, especially in resource-constrained edge computing scenarios.
△ Less
Submitted 14 January, 2024; v1 submitted 28 December, 2023;
originally announced December 2023.
-
On the total versions of 1-2-3-conjecture for graphs and hypergraphs
Authors:
Akbar Davoodi,
Leila Maherani
Abstract:
In 2004, Karoński, Łuczak and Thomason proposed $1$-$2$-$3$-conjecture: For every nice graph $G$ there is an edge weighting function $ w:E(G)\rightarrow\{1,2,3\} $ such that the induced vertex coloring is proper.
After that, the total versions of this conjecture were suggested in the literature and recently, Kalkowski et al. have generalized this conjecture to hypergraphs. In this paper, some pre…
▽ More
In 2004, Karoński, Łuczak and Thomason proposed $1$-$2$-$3$-conjecture: For every nice graph $G$ there is an edge weighting function $ w:E(G)\rightarrow\{1,2,3\} $ such that the induced vertex coloring is proper.
After that, the total versions of this conjecture were suggested in the literature and recently, Kalkowski et al. have generalized this conjecture to hypergraphs. In this paper, some previously known results on the total versions are improved. Moreover, an affirmative answer is given to the conjecture for some well-known families of hypergraphs like complete $n$-partite hypergraphs, paths, cycles, theta hypergraphs and some geometric planes. Also, these hypergraphs are characterized based on the corresponding parameter.
△ Less
Submitted 29 April, 2022;
originally announced April 2022.
-
On a Conjecture of Erd\H os on Size Ramsey Number of Star Forests
Authors:
Akbar Davoodi,
Ramin Javadi,
Azam Kamranian,
Ghaffar Raeisi
Abstract:
Given graphs $ F_1, F_2$ and $G$, we say that $G$ is Ramsey for $(F_1,F_2)$ and we write $G\rightarrow(F_1, F_2)$, if for every edge coloring of $G$ by red and blue, there is either a red copy of $F_1$ or a blue copy of $F_2$ in $G$. The size Ramsey number $\hat{r}(F_1, F_2)$ is defined as the minimum number of edges of a graph $G$ such that $G\rightarrow(F_1, F_2)$. This paper provides the exact…
▽ More
Given graphs $ F_1, F_2$ and $G$, we say that $G$ is Ramsey for $(F_1,F_2)$ and we write $G\rightarrow(F_1, F_2)$, if for every edge coloring of $G$ by red and blue, there is either a red copy of $F_1$ or a blue copy of $F_2$ in $G$. The size Ramsey number $\hat{r}(F_1, F_2)$ is defined as the minimum number of edges of a graph $G$ such that $G\rightarrow(F_1, F_2)$. This paper provides the exact value of $\hat{r}(F_1, F_2)$ for many pairs $(F_1, F_2)$ of star forests, giving a partial solution to a conjecture of Burr et al. (Ramsey-minimal graphs for multiple copies, Indagationes Mathematicae, 81(2) (1978), 187-195).
△ Less
Submitted 3 November, 2021;
originally announced November 2021.
-
Analysis of Strongly Non-linear Oscillators by He`s Improved Amplitude-Frequency Formulation
Authors:
R. Azami,
D. D. Ganji,
A. G. Davodi,
H. Babazadeh
Abstract:
In this work, we implement a relatively new analytical technique, the Improved Amplitude-Frequency Formulation (IAFF) method, approach for solving accurate approximate analytical solutions for strong nonlinear oscillators, which may contain high nonlinear terms. This method can be used to obtain analytic and approximate solutions of different types of fractional differential equations applied in e…
▽ More
In this work, we implement a relatively new analytical technique, the Improved Amplitude-Frequency Formulation (IAFF) method, approach for solving accurate approximate analytical solutions for strong nonlinear oscillators, which may contain high nonlinear terms. This method can be used to obtain analytic and approximate solutions of different types of fractional differential equations applied in engineering mathematics. The solutions obtained are compared with those obtained by the Harmonic balance method (HBM) and Exact method, showing excellent agreement. We find that these attained solutions are not only with high degree of accuracy, but also uniformly valid in the whole solution domain which are so simple-to-do and effective.
△ Less
Submitted 2 October, 2021;
originally announced October 2021.
-
Logic Synthesis Meets Machine Learning: Trading Exactness for Generalization
Authors:
Shubham Rai,
Walter Lau Neto,
Yukio Miyasaka,
Xinpei Zhang,
Mingfei Yu,
Qingyang Yi Masahiro Fujita,
Guilherme B. Manske,
Matheus F. Pontes,
Leomar S. da Rosa Junior,
Marilton S. de Aguiar,
Paulo F. Butzen,
Po-Chun Chien,
Yu-Shan Huang,
Hoa-Ren Wang,
Jie-Hong R. Jiang,
Jiaqi Gu,
Zheng Zhao,
Zixuan Jiang,
David Z. Pan,
Brunno A. de Abreu,
Isac de Souza Campos,
Augusto Berndt,
Cristina Meinhardt,
Jonata T. Carvalho,
Mateus Grellert
, et al. (15 additional authors not shown)
Abstract:
Logic synthesis is a fundamental step in hardware design whose goal is to find structural representations of Boolean functions while minimizing delay and area. If the function is completely-specified, the implementation accurately represents the function. If the function is incompletely-specified, the implementation has to be true only on the care set. While most of the algorithms in logic synthes…
▽ More
Logic synthesis is a fundamental step in hardware design whose goal is to find structural representations of Boolean functions while minimizing delay and area. If the function is completely-specified, the implementation accurately represents the function. If the function is incompletely-specified, the implementation has to be true only on the care set. While most of the algorithms in logic synthesis rely on SAT and Boolean methods to exactly implement the care set, we investigate learning in logic synthesis, attempting to trade exactness for generalization. This work is directly related to machine learning where the care set is the training set and the implementation is expected to generalize on a validation set. We present learning incompletely-specified functions based on the results of a competition conducted at IWLS 2020. The goal of the competition was to implement 100 functions given by a set of care minterms for training, while testing the implementation using a set of validation minterms sampled from the same function. We make this benchmark suite available and offer a detailed comparative analysis of the different approaches to learning
△ Less
Submitted 15 December, 2020; v1 submitted 4 December, 2020;
originally announced December 2020.
-
DoF Region of the Decentralized MIMO Broadcast Channel -- How many informed antennas do we need?
Authors:
Antonio Bazco-Nogueras,
Arash Davoodi,
Paul de Kerret,
David Gesbert,
Nicolas Gresset,
Syed Jafar
Abstract:
In this work, we study the impact of imperfect sharing of the Channel State Information (CSI) available at the transmitters on a Network MIMO setting in which a set of $M$ transmit antennas, possibly not co-located, jointly serve two multi-antenna users endowed with $N_1$ and $N_2$ antennas, respectively. We consider the case where only a subset of $k$ transmit antennas have access to perfect CSI,…
▽ More
In this work, we study the impact of imperfect sharing of the Channel State Information (CSI) available at the transmitters on a Network MIMO setting in which a set of $M$ transmit antennas, possibly not co-located, jointly serve two multi-antenna users endowed with $N_1$ and $N_2$ antennas, respectively. We consider the case where only a subset of $k$ transmit antennas have access to perfect CSI, whereas the other $M-k$ transmit antennas have only access to finite precision CSI. The analysis of this configuration aims to answer the question of how much an extra informed antenna can help. We model this scenario as a Decentralized MIMO Broadcast Channel (BC) and characterize the Degrees-of-Freedom (DoF) region, showing that only $k=\max(N_1,N_2)$ antennas with perfect CSI are needed to achieve the DoF of the conventional BC with ubiquitous perfect CSI. Furthermore, we identify the increase of DoF obtained by providing CSI to an extra transmit antenna.
△ Less
Submitted 13 May, 2020; v1 submitted 13 January, 2020;
originally announced January 2020.
-
Efficient Inference of CNNs via Channel Pruning
Authors:
Boyu Zhang,
Azadeh Davoodi,
Yu Hen Hu
Abstract:
The deployment of Convolutional Neural Networks (CNNs) on resource constrained platforms such as mobile devices and embedded systems has been greatly hindered by their high implementation cost, and thus motivated a lot research interest in compressing and accelerating trained CNN models. Among various techniques proposed in literature, structured pruning, especially channel pruning, has gain a lot…
▽ More
The deployment of Convolutional Neural Networks (CNNs) on resource constrained platforms such as mobile devices and embedded systems has been greatly hindered by their high implementation cost, and thus motivated a lot research interest in compressing and accelerating trained CNN models. Among various techniques proposed in literature, structured pruning, especially channel pruning, has gain a lot focus due to 1) its superior performance in memory, computation, and energy reduction; and 2) it is friendly to existing hardware and software libraries. In this paper, we investigate the intermediate results of convolutional layers and present a novel pivoted QR factorization based channel pruning technique that can prune any specified number of input channels of any layer. We also explore more pruning opportunities in ResNet-like architectures by applying two tweaks to our technique. Experiment results on VGG-16 and ResNet-50 models with ImageNet ILSVRC 2012 dataset are very impressive with 4.29X and 2.84X computation reduction while only sacrificing about 1.40\% top-5 accuracy. Compared to many prior works, the pruned models produced by our technique require up to 47.7\% less computation while still achieve higher accuracies.
△ Less
Submitted 8 August, 2019;
originally announced August 2019.
-
ForestDSH: A Universal Hash Design for Discrete Probability Distributions
Authors:
Arash Gholami Davoodi,
Sean Chang,
Hyun Gon Yoo,
Anubhav Baweja,
Mihir Mongia,
Hosein Mohimani
Abstract:
In this paper, we consider the problem of classification of $M$ high dimensional queries $y^1,\cdots,y^M\in B^S$ to $N$ high dimensional classes $x^1,\cdots,x^N\in A^S$ where $A$ and $B$ are discrete alphabets and the probabilistic model that relates data to the classes $P(x,y)$ is known. This problem has applications in various fields including the database search problem in mass spectrometry. Th…
▽ More
In this paper, we consider the problem of classification of $M$ high dimensional queries $y^1,\cdots,y^M\in B^S$ to $N$ high dimensional classes $x^1,\cdots,x^N\in A^S$ where $A$ and $B$ are discrete alphabets and the probabilistic model that relates data to the classes $P(x,y)$ is known. This problem has applications in various fields including the database search problem in mass spectrometry. The problem is analogous to the nearest neighbor search problem, where the goal is to find the data point in a database that is the most similar to a query point. The state of the art method for solving an approximate version of the nearest neighbor search problem in high dimensions is locality sensitive hashing (LSH). LSH is based on designing hash functions that map near points to the same buckets with a probability higher than random (far) points. To solve our high dimensional classification problem, we introduce distribution sensitive hashes that map jointly generated pairs $(x,y)\sim P$ to the same bucket with probability higher than random pairs $x\sim P^A$ and $y\sim P^B$, where $P^A$ and $P^B$ are the marginal probability distributions of $P$. We design distribution sensitive hashes using a forest of decision trees and we show that the complexity of search grows with $O(N^{λ^*(P)})$ where $λ^*(P)$ is expressed in an analytical form. We further show that the proposed hashes perform faster than state of the art approximate nearest neighbor search methods for a range of probability distributions, in both theory and simulations. Finally, we apply our method to the spectral library search problem in mass spectrometry, and show that it is an order of magnitude faster than the state of the art methods.
△ Less
Submitted 22 June, 2020; v1 submitted 11 May, 2019;
originally announced May 2019.
-
Degrees of Freedom Region of the $(M,N_1,N_2)$ MIMO Broadcast Channel with Partial CSIT: An Application of Sum-set Inequalities Based on Aligned Image Sets
Authors:
Arash Gholami Davoodi,
Syed A. Jafar
Abstract:
The degrees of freedom (DoF) region is characterized for the $2$-user multiple input multiple output (MIMO) broadcast channel (BC), where the transmitter is equipped with $M$ antennas, the two receivers are equipped with $N_1$ and $N_2$ antennas, and the levels of channel state information at the transmitter (CSIT) for the two users are parameterized by $β_1, β_2$, respectively. The achievability…
▽ More
The degrees of freedom (DoF) region is characterized for the $2$-user multiple input multiple output (MIMO) broadcast channel (BC), where the transmitter is equipped with $M$ antennas, the two receivers are equipped with $N_1$ and $N_2$ antennas, and the levels of channel state information at the transmitter (CSIT) for the two users are parameterized by $β_1, β_2$, respectively. The achievability of the DoF region was established by Hao, Rassouli and Clerckx, but no proof of optimality was heretofore available. The proof of optimality is provided in this work with the aid of sum-set inequalities based on the aligned image sets (AIS) approach.
△ Less
Submitted 17 January, 2019;
originally announced January 2019.
-
Design Rule Violation Hotspot Prediction Based on Neural Network Ensembles
Authors:
Wei Zeng,
Azadeh Davoodi,
Yu Hen Hu
Abstract:
Design rule check is a critical step in the physical design of integrated circuits to ensure manufacturability. However, it can be done only after a time-consuming detailed routing procedure, which adds drastically to the time of design iterations. With advanced technology nodes, the outcomes of global routing and detailed routing become less correlated, which adds to the difficulty of predicting…
▽ More
Design rule check is a critical step in the physical design of integrated circuits to ensure manufacturability. However, it can be done only after a time-consuming detailed routing procedure, which adds drastically to the time of design iterations. With advanced technology nodes, the outcomes of global routing and detailed routing become less correlated, which adds to the difficulty of predicting design rule violations from earlier stages. In this paper, a framework based on neural network ensembles is proposed to predict design rule violation hotspots using information from placement and global routing. A soft voting structure and a PCA-based subset selection scheme are developed on top of a baseline neural network from a recent work. Experimental results show that the proposed architecture achieves significant improvement in model performance compared to the baseline case. For half of test cases, the performance is even better than random forest, a commonly-used ensemble learning model.
△ Less
Submitted 9 November, 2018;
originally announced November 2018.
-
A Mixture of Expert Approach for Low-Cost Customization of Deep Neural Networks
Authors:
Boyu Zhang,
Azadeh Davoodi,
Yu-Hen Hu
Abstract:
The ability to customize a trained Deep Neural Network (DNN) locally using user-specific data may greatly enhance user experiences, reduce development costs, and protect user's privacy. In this work, we propose to incorporate a novel Mixture of Experts (MOE) approach to accomplish this goal. This architecture comprises of a Global Expert (GE), a Local Expert (LE) and a Gating Network (GN). The GE…
▽ More
The ability to customize a trained Deep Neural Network (DNN) locally using user-specific data may greatly enhance user experiences, reduce development costs, and protect user's privacy. In this work, we propose to incorporate a novel Mixture of Experts (MOE) approach to accomplish this goal. This architecture comprises of a Global Expert (GE), a Local Expert (LE) and a Gating Network (GN). The GE is a trained DNN developed on a large training dataset representative of many potential users. After deployment on an embedded edge device, GE will be subject to customized, user-specific data (e.g., accent in speech) and its performance may suffer. This problem may be alleviated by training a local DNN (the local expert, LE) on a small size customized training data to correct the errors made by GE. A gating network then will be trained to determine whether an incoming data should be handled by GE or LE. Since the customized dataset is in general very small, the cost of training LE and GN would be much lower than that of re-training of GE. The training of LE and GN thus can be performed at local device, properly protecting the privacy of customized training data. In this work, we developed a prototype MOE architecture for handwritten alphanumeric character recognition task. We use EMNIST as the generic dataset, LeNet5 as GE, and handwritings of 10 users as the customized dataset. We show that with the LE and GN, the classification accuracy is significantly enhanced over the customized dataset with almost no degradation of accuracy over the generic dataset. In terms of energy and network size, the overhead of LE and GN is around 2.5% compared to those of GE.
△ Less
Submitted 31 October, 2018;
originally announced November 2018.
-
On Clique Coverings of Complete Multipartite Graphs
Authors:
Akbar Davoodi,
Dániel Gerbner,
Abhishek Methuku,
Máté Vizer
Abstract:
A clique covering of a graph $G$ is a set of cliques of $G$ such that any edge of $G$ is contained in one of these cliques, and the weight of a clique covering is the sum of the sizes of the cliques in it. The sigma clique cover number $scc(G)$ of a graph $G$, is defined as the smallest possible weight of a clique covering of $G$. Let $ K_t(d) $ denote the complete $ t $-partite graph with each pa…
▽ More
A clique covering of a graph $G$ is a set of cliques of $G$ such that any edge of $G$ is contained in one of these cliques, and the weight of a clique covering is the sum of the sizes of the cliques in it. The sigma clique cover number $scc(G)$ of a graph $G$, is defined as the smallest possible weight of a clique covering of $G$. Let $ K_t(d) $ denote the complete $ t $-partite graph with each part of size $d$. We prove that for any fixed $d \ge 2$, we have $$\lim_{t \rightarrow \infty} scc(K_t(d))= \frac{d}{2} t\log t.$$ This disproves a conjecture of Davoodi, Javadi and Omoomi.
△ Less
Submitted 5 September, 2018;
originally announced September 2018.
-
Optimality of Simple Layered Superposition Coding in the 3 User MISO BC with Finite Precision CSIT
Authors:
Arash Gholami Davoodi,
Syed Ali Jafar
Abstract:
We study the $K=3$ user multiple input single output (MISO) broadcast channel (BC) with $M=3$ antennas at the transmitter and $1$ antenna at each receiver, from the generalized degrees of freedom (GDoF) perspective, under the assumption that the channel state information at the transmitter (CSIT) is limited to finite precision. In particular, our goal is to identify a parameter regime where a simp…
▽ More
We study the $K=3$ user multiple input single output (MISO) broadcast channel (BC) with $M=3$ antennas at the transmitter and $1$ antenna at each receiver, from the generalized degrees of freedom (GDoF) perspective, under the assumption that the channel state information at the transmitter (CSIT) is limited to finite precision. In particular, our goal is to identify a parameter regime where a simple layered superposition (SLS) coding scheme achieves the entire GDoF region. With $α_{ij}$ representing the channel strength parameter for the link from the $j^{th}$ antenna of the transmitter to the $i^{th}$ receiver, we prove that SLS is GDoF optimal without the need for time-sharing if $\max(α_{ki},α_{im})\leqα_{ii}$ and $α_{ki}+α_{im}\leα_{ii}+α_{km}$ for all $i,k\in[3],m\in[M]$. The GDoF region under this condition is a convex polyhedron. The result generalizes to arbitrary $M\geq 3$.
△ Less
Submitted 14 May, 2018; v1 submitted 23 January, 2018;
originally announced January 2018.
-
$K$-User Symmetric M$\times$N MIMO Interference Channel under Finite Precision CSIT: A GDoF perspective
Authors:
Arash Gholami Davoodi,
Syed Ali Jafar
Abstract:
Generalized Degrees of Freedom (GDoF) are characterized for the symmetric $K$-user Multiple Input Multiple Output (MIMO) Interference Channel (IC) under the assumption that the channel state information at the transmitters (CSIT) is limited to finite precision. In this symmetric setting, each transmitter is equipped with $M$ antennas, each receiver is equipped with $N$ antennas, each desired chann…
▽ More
Generalized Degrees of Freedom (GDoF) are characterized for the symmetric $K$-user Multiple Input Multiple Output (MIMO) Interference Channel (IC) under the assumption that the channel state information at the transmitters (CSIT) is limited to finite precision. In this symmetric setting, each transmitter is equipped with $M$ antennas, each receiver is equipped with $N$ antennas, each desired channel (i.e., a channel between a transmit antenna and a receive antenna belonging to the same user) has strength $\sim P$, while each undesired channel has strength $\sim P^α$, where $P$ is a nominal SNR parameter. The result generalizes a previous GDoF characterization for the SISO setting $(M=N=1)$ and is enabled by a significant extension of the Aligned Image Sets bound that is broadly useful. GDoF per user take the form of a $W$-curve with respect to $α$ for fixed values of $M$ and $N$. Under finite precision CSIT, in spite of the presence of multiple antennas, all the benefits of interference alignment are lost.
△ Less
Submitted 31 October, 2017;
originally announced November 2017.
-
Network Coherence Time Matters - Aligned Image Sets and the Degrees of Freedom of Interference Networks with Finite Precision CSIT and Perfect CSIR
Authors:
Arash Gholami Davoodi,
Syed Ali Jafar
Abstract:
This work obtains the first bound that is provably sensitive to network coherence time, i.e., coherence time in an interference network where all channels experience the same coherence patterns. This is accomplished by a novel adaptation of the aligned image sets bound, and settles various open problems noted previously by Naderi and Avestimehr and by Gou et al. For example, a necessary and suffic…
▽ More
This work obtains the first bound that is provably sensitive to network coherence time, i.e., coherence time in an interference network where all channels experience the same coherence patterns. This is accomplished by a novel adaptation of the aligned image sets bound, and settles various open problems noted previously by Naderi and Avestimehr and by Gou et al. For example, a necessary and sufficient condition is obtained for the optimality of 1/2 DoF per user in a partially connected interference network where the channel state information at the receivers (CSIR) is perfect, the channel state information at the transmitters (CSIT) is instantaneous but limited to finite precision, and the network coherence time is T_c= 1. The surprising insight that emerges is that even with perfect CSIR and instantaneous finite precision CSIT, network coherence time matters, i.e., it has a DoF impact.
△ Less
Submitted 8 May, 2017;
originally announced May 2017.
-
Aligned Image Sets and the Generalized Degrees of Freedom of Symmetric MIMO Interference Channel with Partial CSIT
Authors:
Arash Gholami Davoodi,
Syed A. Jafar
Abstract:
The generalized degrees of freedom (GDoF) of the two user symmetric multiple input multiple output (MIMO) interference channel (IC) are characterized as a function of the channel strength levels and the level of channel state information at the transmitters (CSIT). In this symmetric setting, each transmitter is equipped with M antennas, each receiver is equipped with N antennas, and both cross lin…
▽ More
The generalized degrees of freedom (GDoF) of the two user symmetric multiple input multiple output (MIMO) interference channel (IC) are characterized as a function of the channel strength levels and the level of channel state information at the transmitters (CSIT). In this symmetric setting, each transmitter is equipped with M antennas, each receiver is equipped with N antennas, and both cross links have the same strength parameter $α$ and the same channel uncertainty parameter $β$. The main challenge resides in the proof of the outer bound which is accomplished by a generalization of the aligned image sets approach.
△ Less
Submitted 1 May, 2017;
originally announced May 2017.
-
Sum-set Inequalities from Aligned Image Sets: Instruments for Robust GDoF Bounds
Authors:
Arash Gholami Davoodi,
Syed A. Jafar
Abstract:
We present sum-set inequalities specialized to the generalized degrees of freedom (GDoF) framework. These are information theoretic lower bounds on the entropy of bounded density linear combinations of discrete, power-limited dependent random variables in terms of the joint entropies of arbitrary linear combinations of new random variables that are obtained by power level partitioning of the origi…
▽ More
We present sum-set inequalities specialized to the generalized degrees of freedom (GDoF) framework. These are information theoretic lower bounds on the entropy of bounded density linear combinations of discrete, power-limited dependent random variables in terms of the joint entropies of arbitrary linear combinations of new random variables that are obtained by power level partitioning of the original random variables. These bounds generalize the aligned image sets approach, and are useful instruments to obtain GDoF characterizations for wireless networks, especially with multiple antenna nodes, subject to arbitrary channel strength and channel uncertainty levels. To demonstrate the utility of these bounds, we consider a non-trivial instance of wireless networks - a two user interference channel with different number of antennas at each node, and different levels of partial channel knowledge available to the transmitters. We obtain tight GDoF characterization for specific instance of this channel with the aid of sum-set inequalities.
△ Less
Submitted 24 August, 2017; v1 submitted 3 March, 2017;
originally announced March 2017.
-
Clique Coverings and Claw-free Graphs
Authors:
Csilla Bujtás,
Akbar Davoodi,
Ervin Győri,
Zsolt Tuza
Abstract:
Let $\cal C$ be a clique covering for $E(G)$ and let $v$ be a vertex of $G$. The valency of vertex $v$ (with respect to $\cal C$), denoted by $val_{\cal C}(v)$, is the number of cliques in $\cal C$ containing $v$. The local clique cover number of $G$, denoted by $lcc(G)$, is defined as the smallest integer $k$, for which there exists a clique covering for $E(G)$ such that $val_{\cal C}(v)$ is at m…
▽ More
Let $\cal C$ be a clique covering for $E(G)$ and let $v$ be a vertex of $G$. The valency of vertex $v$ (with respect to $\cal C$), denoted by $val_{\cal C}(v)$, is the number of cliques in $\cal C$ containing $v$. The local clique cover number of $G$, denoted by $lcc(G)$, is defined as the smallest integer $k$, for which there exists a clique covering for $E(G)$ such that $val_{\cal C}(v)$ is at most $k$, for every vertex $v\in V(G)$. In this paper, among other results, we prove that if $G$ is a claw-free graph, then $lcc(G)+χ(G)\leq n+1$.
△ Less
Submitted 27 August, 2016;
originally announced August 2016.
-
An Erdős-Gallai type theorem for uniform hypergraphs
Authors:
Akbar Davoodi,
Ervin Győri,
Abhishek Methuku,
Casey Tompkins
Abstract:
A well-known theorem of Erdős and Gallai asserts that a graph with no path of length $k$ contains at most $\frac{1}{2}(k-1)n$ edges. Recently Győri, Katona and Lemons gave an extension of this result to hypergraphs by determining the maximum number of hyperedges in an $r$-uniform hypergraph containing no Berge path of length $k$ for all values of $r$ and $k$ except for $k=r+1$. We settle the remai…
▽ More
A well-known theorem of Erdős and Gallai asserts that a graph with no path of length $k$ contains at most $\frac{1}{2}(k-1)n$ edges. Recently Győri, Katona and Lemons gave an extension of this result to hypergraphs by determining the maximum number of hyperedges in an $r$-uniform hypergraph containing no Berge path of length $k$ for all values of $r$ and $k$ except for $k=r+1$. We settle the remaining case by proving that an $r$-uniform hypergraph with more than $n$ hyperedges must contain a Berge path of length $r+1$.
△ Less
Submitted 18 November, 2017; v1 submitted 10 August, 2016;
originally announced August 2016.
-
GDoF of the MISO BC: Bridging the Gap between Finite Precision and Perfect CSIT
Authors:
Arash Gholami Davoodi,
Bofeng Yuan,
Syed A. Jafar
Abstract:
For the $K=2$ user MISO BC, i.e., the wireless broadcast channel where a transmitter equipped with $K=2$ antennas sends independent messages to $K=2$ receivers each of which is equipped with a single antenna, the sum generalized degrees of freedom (GDoF) are characterized for arbitrary channel strength and channel uncertainty levels for each of the channel coefficients. The result is extended to…
▽ More
For the $K=2$ user MISO BC, i.e., the wireless broadcast channel where a transmitter equipped with $K=2$ antennas sends independent messages to $K=2$ receivers each of which is equipped with a single antenna, the sum generalized degrees of freedom (GDoF) are characterized for arbitrary channel strength and channel uncertainty levels for each of the channel coefficients. The result is extended to $K>2$ users under additional restrictions which include the assumption of symmetry.
△ Less
Submitted 26 August, 2016; v1 submitted 5 February, 2016;
originally announced February 2016.
-
Generalized Degrees of Freedom of the Symmetric K-User Interference Channel under Finite Precision CSIT
Authors:
Arash Gholami Davoodi,
Syed A. Jafar
Abstract:
The generalized degrees of freedom (GDoF) characterization of the symmetric K-user interference channel is obtained under finite precision channel state information at the transmitters (CSIT). The symmetric setting is where each cross channel is capable of carrying degrees of freedom (DoF) while each direct channel is capable of carrying 1 DoF. Remarkably, under finite precision CSIT the symmetric…
▽ More
The generalized degrees of freedom (GDoF) characterization of the symmetric K-user interference channel is obtained under finite precision channel state information at the transmitters (CSIT). The symmetric setting is where each cross channel is capable of carrying degrees of freedom (DoF) while each direct channel is capable of carrying 1 DoF. Remarkably, under finite precision CSIT the symmetric K-user interference channel loses all the GDoF benefits of interference alignment. The GDoF per user diminish with the number of users everywhere except in the very strong (optimal for every receiver to decode all messages) and very weak (optimal to treat all interference as noise) interference regimes. The result stands in sharp contrast to prior work on the symmetric setting under perfect CSIT, where the GDoF per user remain undiminished due to interference alignment. The result also stands in contrast to prior work on a subclass of asymmetric settings under finite precision CSIT, i.e., the topological interference management problem, where interference alignment plays a crucial role and provides substantial GDoF benefits.
△ Less
Submitted 24 January, 2016;
originally announced January 2016.
-
A characterization of some graphs with metric dimension two
Authors:
Ali Behtoei,
Akbar Davoodi,
Mohsen Jannesari,
Behnaz Omoomi
Abstract:
A set W \subseteq V (G) is called a resolving set, if for each pair of distinct vertices u,v \in V (G) there exists t \in W such that d(u,t) \neq d(v,t), where d(x,y) is the distance between vertices x and y. The cardinality of a minimum resolving set for G is called the metric dimension of G and is denoted by dim_M(G). A k-tree is a chordal graph all of whose maximal cliques are the same size k +…
▽ More
A set W \subseteq V (G) is called a resolving set, if for each pair of distinct vertices u,v \in V (G) there exists t \in W such that d(u,t) \neq d(v,t), where d(x,y) is the distance between vertices x and y. The cardinality of a minimum resolving set for G is called the metric dimension of G and is denoted by dim_M(G). A k-tree is a chordal graph all of whose maximal cliques are the same size k + 1 and all of whose minimal clique separators are also all the same size k. A k-path is a k-tree with maximum degree 2k, where for each integer j, k \leq j < 2k, there exists a unique pair of vertices, u and v, such that deg(u) = deg(v) = j. In this paper, we prove that if G is a k-path, then dim_M(G) = k. Moreover, we provide a characterization of all 2-trees with metric dimension two.
△ Less
Submitted 7 September, 2015;
originally announced September 2015.
-
Sigma clique covering of graphs
Authors:
Akbar Davoodi,
Ramin Javadi,
Behnaz Omoomi
Abstract:
The sigma clique cover number (resp. sigma clique partition number) of graph G, denoted by scc(G) (resp. scp(G)), is defined as the smallest integer k for which there exists a collection of cliques of G, covering (resp. partitioning) all edges of G such that the sum of sizes of the cliques is at most k. In this paper, among some results we provide some tight bounds for scc and scp.
The sigma clique cover number (resp. sigma clique partition number) of graph G, denoted by scc(G) (resp. scp(G)), is defined as the smallest integer k for which there exists a collection of cliques of G, covering (resp. partitioning) all edges of G such that the sum of sizes of the cliques is at most k. In this paper, among some results we provide some tight bounds for scc and scp.
△ Less
Submitted 9 March, 2015;
originally announced March 2015.
-
Pairwise Balanced Designs and Sigma Clique Partitions
Authors:
Akbar Davoodi,
Ramin Javadi,
Behnaz Omoomi
Abstract:
In this paper, we are interested in minimizing the sum of block sizes in a pairwise balanced design, where there are some constraints on the size of one block or the size of the largest block. For every positive integers n;m, where m ? n, let S(n;m) be the smallest integer s for which there exists a PBD on n points whose largest block has size m and the sum of its block sizes is equal to s. Also,…
▽ More
In this paper, we are interested in minimizing the sum of block sizes in a pairwise balanced design, where there are some constraints on the size of one block or the size of the largest block. For every positive integers n;m, where m ? n, let S(n;m) be the smallest integer s for which there exists a PBD on n points whose largest block has size m and the sum of its block sizes is equal to s. Also, let S0(n;m) be the smallest integers for which there exists a PBD on n points which has a block of size m and the sum of it block sizes is equal to s. We prove some lower bounds for S(n;m) and S0(n;m). Moreover, we apply these bounds to determine the asymptotic behaviour of the sigma clique partition number of the graph Kn-Km, Cocktail party graphs and complement of paths and cycles.
△ Less
Submitted 2 November, 2014;
originally announced November 2014.
-
Aligned Image Sets under Channel Uncertainty: Settling a Conjecture by Lapidoth, Shamai and Wigger on the Collapse of Degrees of Freedom under Finite Precision CSIT
Authors:
Arash Gholami Davoodi,
Syed A. Jafar
Abstract:
A conjecture made by Lapidoth, Shamai and Wigger at Allerton 2005 (also an open problem presented at ITA 2006) states that the DoF of a 2 user broadcast channel, where the transmitter is equipped with 2 antennas and each user is equipped with 1 antenna, must collapse under finite precision CSIT. In this work we prove that the conjecture is true in all non-degenerate settings (e.g., where the proba…
▽ More
A conjecture made by Lapidoth, Shamai and Wigger at Allerton 2005 (also an open problem presented at ITA 2006) states that the DoF of a 2 user broadcast channel, where the transmitter is equipped with 2 antennas and each user is equipped with 1 antenna, must collapse under finite precision CSIT. In this work we prove that the conjecture is true in all non-degenerate settings (e.g., where the probability density function of unknown channel coefficients exists and is bounded). The DoF collapse even when perfect channel knowledge for one user is available to the transmitter. This also settles a related recent conjecture by Tandon et al. The key to our proof is a bound on the number of codewords that can cast the same image (within noise distortion) at the undesired receiver whose channel is subject to finite precision CSIT, while remaining resolvable at the desired receiver whose channel is precisely known by the transmitter. We are also able to generalize the result along two directions. First, if the peak of the probability density function is allowed to scale as O(P^(α/2)), representing the concentration of probability density (improving CSIT) due to, e.g., quantized feedback at rate (α/2)\log(P), then the DoF are bounded above by 1+α, which is also achievable under quantized feedback. Second, we generalize the result to the K user broadcast channel with K antennas at the transmitter and a single antenna at each receiver. Here also the DoF collapse under non-degenerate channel uncertainty. The result directly implies a collapse of DoF to unity under non-degenerate channel uncertainty for the general K-user interference and MxN user X networks as well.
△ Less
Submitted 6 March, 2014;
originally announced March 2014.
-
On the 1-2-3-conjecture
Authors:
Akbar Davoodi,
Behnaz Omoomi
Abstract:
A k-edge-weighting of a graph G is a function w: E(G)->{1,2,...,k}. An edge-weighting naturally induces a vertex coloring c, where for every vertex v in V(G), c(v) is sum of weights of the edges that are adjacent to vertex v. If the induced coloring c is a proper vertex coloring, then w is called a vertex-coloring k-edge weighting (VCk-EW). Karonski et al. (J. Combin. Theory Ser. B 91 (2004) 151-1…
▽ More
A k-edge-weighting of a graph G is a function w: E(G)->{1,2,...,k}. An edge-weighting naturally induces a vertex coloring c, where for every vertex v in V(G), c(v) is sum of weights of the edges that are adjacent to vertex v. If the induced coloring c is a proper vertex coloring, then w is called a vertex-coloring k-edge weighting (VCk-EW). Karonski et al. (J. Combin. Theory Ser. B 91 (2004) 151-157) conjectured that every graph admits a VC3-EW. This conjecture is known as 1-2-3-conjecture. In this paper, frst, we study the vertex-coloring edge-weighting of the cartesian product of graphs. Among some results, we prove that the 1-2-3-conjecture holds for some infinite classes of graphs. Moreover, we explore some properties of a graph to admit a VC2-EW
△ Less
Submitted 15 May, 2012;
originally announced May 2012.
-
Optimum Power Allocations for Fading Decode-and-Forward Relay Channel
Authors:
Arash Gholami Davoodi,
Mohammad Javad Emadi,
Mohammad Reza Aref
Abstract:
In this paper, for a fading decode-and-forward full-duplex relay channel, we analytically derive optimum power allocations. Individual power constraints for the source and the relay are assumed and the related optimization problem is analyzed for two scenarios. First, optimization is taken over the source power, the relay power, and the correlation coefficient between the transmitted signals of th…
▽ More
In this paper, for a fading decode-and-forward full-duplex relay channel, we analytically derive optimum power allocations. Individual power constraints for the source and the relay are assumed and the related optimization problem is analyzed for two scenarios. First, optimization is taken over the source power, the relay power, and the correlation coefficient between the transmitted signals of the source and the relay. Then, for a fixed value of correlation coefficient, the optimization problem is analyzed. It is also proven that the optimization problems are convex for these two scenarios. Finally, implications of theoretical results are discussed through simulations for each scenario.
△ Less
Submitted 6 February, 2012;
originally announced February 2012.