Skip to main content

Showing 1–50 of 51 results for author: Dey, B K

.
  1. arXiv:2405.09309  [pdf, ps, other

    cs.IT

    Identification via Permutation Channels

    Authors: Abhishek Sarkar, Bikash Kumar Dey

    Abstract: We study message identification over a $q$-ary uniform permutation channel, where the transmitted vector is permuted by a permutation chosen uniformly at random. For discrete memoryless channels (DMCs), the number of identifiable messages grows doubly exponentially. Identification capacity, the maximum second-order exponent, is known to be the same as the Shannon capacity of the DMC. Permutation c… ▽ More

    Submitted 4 June, 2024; v1 submitted 15 May, 2024; originally announced May 2024.

    Comments: 9 pages. Extended and generalized version of submission to ITW 2024

    MSC Class: 68P30; 94A15

  2. arXiv:2309.11174  [pdf, ps, other

    cs.IT

    Byzantine Multiple Access Channels -- Part II: Communication With Adversary Identification

    Authors: Neha Sangwan, Mayank Bakshi, Bikash Kumar Dey, Vinod M. Prabhakaran

    Abstract: We introduce the problem of determining the identity of a byzantine user (internal adversary) in a communication system. We consider a two-user discrete memoryless multiple access channel where either user may deviate from the prescribed behaviour. Owing to the noisy nature of the channel, it may be overly restrictive to attempt to detect all deviations. In our formulation, we only require detecti… ▽ More

    Submitted 20 September, 2023; originally announced September 2023.

    Comments: arXiv admin note: substantial text overlap with arXiv:2105.03380

  3. arXiv:2304.14166  [pdf, ps, other

    cs.IT

    Hypothesis Testing for Adversarial Channels: Chernoff-Stein Exponents

    Authors: Eeshan Modak, Neha Sangwan, Mayank Bakshi, Bikash Kumar Dey, Vinod M. Prabhakaran

    Abstract: We study the Chernoff-Stein exponent of the following binary hypothesis testing problem: Associated with each hypothesis is a set of channels. A transmitter, without knowledge of the hypothesis, chooses the vector of inputs to the channel. Given the hypothesis, from the set associated with the hypothesis, an adversary chooses channels, one for each element of the input vector. Based on the channel… ▽ More

    Submitted 27 April, 2023; originally announced April 2023.

    Comments: This is a slightly edited version of the extended manuscript submitted to ISIT 2023 for review on February 5, 2023; the paper has been accepted for presentation

  4. arXiv:2211.12769  [pdf, ps, other

    cs.IT

    Byzantine Multiple Access Channels -- Part I: Reliable Communication

    Authors: Neha Sangwan, Mayank Bakshi, Bikash Kumar Dey, Vinod M. Prabhakaran

    Abstract: We study communication over a Multiple Access Channel (MAC) where users can possibly be adversarial. The receiver is unaware of the identity of the adversarial users (if any). When all users are non-adversarial, we want their messages to be decoded reliably. When a user behaves adversarially, we require that the honest users' messages be decoded reliably. An adversarial user can mount an attack by… ▽ More

    Submitted 11 September, 2023; v1 submitted 23 November, 2022; originally announced November 2022.

    Comments: This supercedes Part I of arxiv:1904.11925

  5. arXiv:2105.03420  [pdf, other

    cs.IT

    Compound Arbitrarily Varying Channels

    Authors: Syomantak Chaudhuri, Neha Sangwan, Mayank Bakshi, Bikash Kumar Dey, Vinod M. Prabhakaran

    Abstract: We propose a communication model, that we call compound arbitrarily varying channels (CAVC), which unifies and generalizes compound channels and arbitrarily varying channels (AVC). A CAVC can be viewed as a noisy channel with a fixed, but unknown, compound-state and an AVC-state which may vary with every channel use. The AVC-state is controlled by an adversary who is aware of the compound-state. W… ▽ More

    Submitted 7 May, 2021; originally announced May 2021.

  6. arXiv:2105.03380  [pdf, ps, other

    cs.IT

    Communication With Adversary Identification in Byzantine Multiple Access Channels

    Authors: Neha Sangwan, Mayank Bakshi, Bikash Kumar Dey, Vinod M. Prabhakaran

    Abstract: We introduce the problem of determining the identity of a byzantine user (internal adversary) in a communication system. We consider a two-user discrete memoryless multiple access channel where either user may deviate from the prescribed behaviour. Owing to the noisy nature of the channel, it may be overly restrictive to attempt to detect all deviations. In our formulation, we only require detecti… ▽ More

    Submitted 7 May, 2021; originally announced May 2021.

  7. arXiv:2101.07127  [pdf, other

    cs.IT

    Fundamental Limits of Demand-Private Coded Caching

    Authors: Chinmay Gurjarpadhye, Jithin Ravi, Sneha Kamath, Bikash Kumar Dey, Nikhil Karamchandani

    Abstract: We consider the coded caching problem with an additional privacy constraint that a user should not get any information about the demands of the other users. We first show that a demand-private scheme for $N$ files and $K$ users can be obtained from a non-private scheme that serves only a subset of the demands for the $N$ files and $NK$ users problem. We further use this fact to construct a demand-… ▽ More

    Submitted 18 January, 2021; originally announced January 2021.

    Comments: 43 pages, 6 figures

  8. arXiv:2006.00257  [pdf, other

    cs.IT

    Private Index Coding

    Authors: Varun Narayanan, Jithin Ravi, Vivek K. Mishra, Bikash Kumar Dey, Nikhil Karamchandani, Vinod M. Prabhakaran

    Abstract: We study the fundamental problem of index coding under an additional privacy constraint that requires each receiver to learn nothing more about the collection of messages beyond its demanded messages from the server and what is available to it as side information. To enable such private communication, we allow the use of a collection of independent secret keys, each of which is shared amongst a su… ▽ More

    Submitted 30 May, 2020; originally announced June 2020.

    Comments: 46 pages, 10 figures

  9. arXiv:1911.06995  [pdf, other

    cs.IT

    Demand-Private Coded Caching and the Exact Trade-off for N=K=2

    Authors: Sneha Kamath, Jithin Ravi, Bikash Kumar Dey

    Abstract: The distributed coded caching problem has been studied extensively in the recent past. While the known coded caching schemes achieve an improved transmission rate, they violate the privacy of the users since in these schemes the demand of one user is revealed to others in the delivery phase. In this paper, we consider the coded caching problem under the constraint that the demands of the other use… ▽ More

    Submitted 18 February, 2020; v1 submitted 16 November, 2019; originally announced November 2019.

    Comments: 8 pages, 2 figures

  10. arXiv:1904.11925  [pdf, ps, other

    cs.IT

    Byzantine Multiple Access

    Authors: Neha Sangwan, Mayank Bakshi, Bikash Kumar Dey, Vinod M. Prabhakaran

    Abstract: We study communication over multiple access channels (MAC) where one of the users is possibly adversarial. When all users are non-adversarial, we want their messages to be decoded reliably. When an adversary is present, we consider two different decoding guarantees. In part I, we require that the honest users' messages be decoded reliably. We study the 3-user MAC; 2-user MAC capacity follows fro… ▽ More

    Submitted 26 April, 2019; originally announced April 2019.

    Comments: Part II is an extended version of the paper titled "Multiple Access Channels with Adversarial Users" to be presented at IEEE International Symposium on Information Theory 2019

  11. arXiv:1809.04464  [pdf, other

    cs.IT

    Arbitrarily Varying Remote Sources

    Authors: Amitalok J. Budkuley, Bikash Kumar Dey, Sidharth Jaggi, Vinod M. Prabhakaran

    Abstract: We study a lossy source coding problem for an arbitrarily varying remote source (AVRS) which was proposed in a prior work. An AVRS transmits symbols, each generated in an independent and identically distributed manner, which are sought to be estimated at the decoder. These symbols are remotely generated, and the encoder and decoder observe noise corrupted versions received through a two-output noi… ▽ More

    Submitted 11 September, 2018; originally announced September 2018.

    Comments: 10 pages. arXiv admin note: substantial text overlap with arXiv:1704.07693

  12. arXiv:1805.03319  [pdf, other

    cs.IT

    Quadratically Constrained Channels with Causal Adversaries

    Authors: Tongxin Li, Bikash Kumar Dey, Sidharth Jaggi, Michael Langberg, Anand D. Sarwate

    Abstract: We consider the problem of communication over a channel with a causal jamming adversary subject to quadratic constraints. A sender Alice wishes to communicate a message to a receiver Bob by transmitting a real-valued length-$n$ codeword $\mathbf{x}=x_1,...,x_n$ through a communication channel. Alice and Bob do not share common randomness. Knowing Alice's encoding strategy, an adversarial jammer Ja… ▽ More

    Submitted 8 May, 2018; originally announced May 2018.

    Comments: 80 pages, ISIT 2018

  13. arXiv:1704.07693  [pdf, other

    cs.IT

    Coding for Arbitrarily Varying Remote Sources

    Authors: Amitalok J. Budkuley, Bikash Kumar Dey, Vinod M. Prabhakaran

    Abstract: We study a lossy source coding problem for a memoryless remote source. The source data is broadcast over an arbitrarily varying channel (AVC) controlled by an adversary. One output of the AVC is received as input at the encoder, and another output is received as side information at the decoder. The adversary is assumed to know the source data non-causally, and can employ randomized jamming strateg… ▽ More

    Submitted 25 April, 2017; originally announced April 2017.

    Comments: 11 pages

  14. arXiv:1610.01287  [pdf, other

    cs.IT

    Sufficiently Myopic Adversaries are Blind

    Authors: Bikash Kumar Dey, Sidharth Jaggi, Michael Langberg

    Abstract: In this work we consider a communication problem in which a sender, Alice, wishes to communicate with a receiver, Bob, over a channel controlled by an adversarial jammer, James, who is {\em myopic}. Roughly speaking, for blocklength $n$, the codeword $X^n$ transmitted by Alice is corrupted by James who must base his adversarial decisions (of which locations of $X^n$ to corrupt and how to corrupt t… ▽ More

    Submitted 5 October, 2016; originally announced October 2016.

    Comments: 18 pages

  15. arXiv:1610.00867  [pdf, other

    cs.IT

    Broadcast Function Computation with Complementary Side Information

    Authors: Jithin Ravi, Bikash Kumar Dey

    Abstract: We consider the function computation problem in a three node network with one encoder and two decoders. The encoder has access to two correlated sources $X$ and $Y$. The encoder encodes $X^n$ and $Y^n$ into a message which is given to two decoders. Decoder 1 and decoder 2 have access to $X$ and $Y$ respectively, and they want to compute two functions $f(X,Y)$ and $g(X,Y)$ respectively using the en… ▽ More

    Submitted 4 October, 2016; originally announced October 2016.

    Comments: Accepted to IEEE GLOBECOM NetCod 2016

  16. arXiv:1609.07923  [pdf, other

    cs.IT

    Function Computation through a Bidirectional Relay

    Authors: Jithin Ravi, Bikash Kumar Dey

    Abstract: We consider a function computation problem in a three node wireless network. Nodes A and B observe two correlated sources $X$ and $Y$ respectively, and want to compute a function $f(X,Y)$. To achieve this, nodes A and B send messages to a relay node C at rates $R_A$ and $R_B$ respectively. The relay C then broadcasts a message to A and B at rate $R_C$. We allow block coding, and study the achievab… ▽ More

    Submitted 27 October, 2018; v1 submitted 26 September, 2016; originally announced September 2016.

  17. arXiv:1604.05668  [pdf, ps, other

    cs.CR cs.IT

    Wiretapped Oblivious Transfer

    Authors: Manoj Mishra, Bikash Kumar Dey, Vinod M. Prabhakaran, Suhas Diggavi

    Abstract: In this paper, we study the problem of obtaining $1$-of-$2$ string oblivious transfer (OT) between users Alice and Bob, in the presence of a passive eavesdropper Eve. The resource enabling OT in our setup is a noisy broadcast channel from Alice to Bob and Eve. Apart from the OT requirements between the users, Eve is not allowed to learn anything about the users' inputs. When Alice and Bob are hone… ▽ More

    Submitted 20 April, 2016; v1 submitted 19 April, 2016; originally announced April 2016.

    Comments: Submitted to IEEE Transactions on Information Theory

  18. arXiv:1602.02384  [pdf, other

    cs.IT cs.CR

    The benefit of a 1-bit jump-start, and the necessity of stochastic encoding, in jamming channels

    Authors: Bikash Kumar Dey, Sidharth Jaggi, Michael Langberg, Anand D. Sarwate

    Abstract: We consider the problem of communicating a message $m$ in the presence of a malicious jamming adversary (Calvin), who can erase an arbitrary set of up to $pn$ bits, out of $n$ transmitted bits $(x_1,\ldots,x_n)$. The capacity of such a channel when Calvin is exactly causal, i.e. Calvin's decision of whether or not to erase bit $x_i$ depends on his observations $(x_1,\ldots,x_i)$ was recently chara… ▽ More

    Submitted 7 February, 2016; originally announced February 2016.

    Comments: 21 pages, 4 figures, extended draft of submission to ISIT 2016

  19. arXiv:1509.08299  [pdf, other

    cs.IT

    Communication in the Presence of a State-Aware Adversary

    Authors: Amitalok J. Budkuley, Bikash Kumar Dey, Vinod M. Prabhakaran

    Abstract: We study communication systems over state-dependent channels in the presence of a malicious state-aware jamming adversary. The channel has a memoryless state with an underlying distribution. The adversary introduces a jamming signal into the channel. The state sequence is known non-causally to both the encoder and the adversary. Taking an Arbitrarily Varying Channel (AVC) approach, we consider two… ▽ More

    Submitted 31 August, 2017; v1 submitted 28 September, 2015; originally announced September 2015.

    Comments: 24 pages, 3 figures

  20. arXiv:1508.00664  [pdf, other

    cs.IT

    Oblivious Transfer over Wireless Channels

    Authors: Jithin Ravi, Bikash Kumar Dey, Emanuele Viterbo

    Abstract: We consider the problem of oblivious transfer (OT) over OFDM and MIMO wireless communication systems where only the receiver knows the channel state information. The sender and receiver also have unlimited access to a noise-free real channel. Using a physical layer approach, based on the properties of the noisy fading channel, we propose a scheme that enables the transmitter to send obliviously on… ▽ More

    Submitted 4 August, 2015; originally announced August 2015.

    Comments: Submitted to Transactions on Communications

  21. On the Oblivious Transfer Capacity of the Degraded Wiretapped Binary Erasure Channel

    Authors: Manoj Mishra, Bikash Kumar Dey, Vinod M. Prabhakaran, Suhas Diggavi

    Abstract: We study oblivious transfer (OT) between Alice and Bob in the presence of an eavesdropper Eve over a degraded wiretapped binary erasure channel from Alice to Bob and Eve. In addition to the privacy goals of oblivious transfer between Alice and Bob, we require privacy of Alice and Bob's private data from Eve. In previous work we derived the OT capacity (in the honest-but-curious model) of the wiret… ▽ More

    Submitted 17 April, 2015; originally announced April 2015.

    Comments: To be presented at the IEEE International Symposium on Information Theory (ISIT 2015), Hong Kong

  22. arXiv:1504.04351  [pdf, other

    cs.IT

    Dirty Paper Arbitrarily Varying Channel with a State-Aware Adversary

    Authors: Amitalok J. Budkuley, Bikash Kumar Dey, Vinod M. Prabhakaran

    Abstract: In this paper, we take an arbitrarily varying channel (AVC) approach to examine the problem of writing on a dirty paper in the presence of an adversary. We consider an additive white Gaussian noise (AWGN) channel with an additive white Gaussian state, where the state is known non-causally to the encoder and the adversary, but not the decoder. We determine the randomized coding capacity of this AVC… ▽ More

    Submitted 16 April, 2015; originally announced April 2015.

  23. Private Data Transfer over a Broadcast Channel

    Authors: Manoj Mishra, Tanmay Sharma, Bikash K. Dey, Vinod M. Prabhakaran

    Abstract: We study the following private data transfer problem: Alice has a database of files. Bob and Cathy want to access a file each from this database (which may or may not be the same file), but each of them wants to ensure that their choices of file do not get revealed even if Alice colludes with the other user. Alice, on the other hand, wants to make sure that each of Bob and Cathy does not learn any… ▽ More

    Submitted 16 April, 2015; v1 submitted 5 April, 2015; originally announced April 2015.

    Comments: To be presented at IEEE International Symposium on Information Theory (ISIT 2015), Hong Kong

  24. arXiv:1411.6835  [pdf, other

    cs.IT

    Zero-Error Function Computation through a Bidirectional Relay

    Authors: Jithin Ravi, Bikash Kumar Dey

    Abstract: We consider zero error function computation in a three node wireless network. Nodes A and B observe $X$ and $Y$ respectively, and want to compute a function $f(X,Y)$ with zero error. To achieve this, nodes A and B send messages to a relay node C at rates $R_A$ and $R_B$ respectively. The relay C then broadcasts a message to A and B at rate $R_C$ to help them compute $f(X,Y)$ with zero error. We al… ▽ More

    Submitted 25 November, 2014; originally announced November 2014.

    Comments: Submitted to ITW 2015

  25. arXiv:1409.4489  [pdf, other

    cs.IT

    Distributed Rate Adaptation and Power Control in Fading Multiple Access Channels

    Authors: Sreejith Sreekumar, Bikash K. Dey, Sibi Raj B. Pillai

    Abstract: Traditionally, the capacity region of a coherent fading multiple access channel (MAC) is analyzed in two popular contexts. In the first, a centralized system with full channel state information at the transmitters (CSIT) is assumed, and the communication parameters like transmit power and data-rate are jointly chosen for every fading vector realization. On the other hand, in fast-fading links with… ▽ More

    Submitted 15 September, 2014; originally announced September 2014.

    Comments: 26 pages, 11 pictures, presented in parts at ISIT2013 and ITW 2014

  26. How to Securely Compute the Modulo-Two Sum of Binary Sources

    Authors: Deepesh Data, Bikash Kumar Dey, Manoj Mishra, Vinod M. Prabhakaran

    Abstract: In secure multiparty computation, mutually distrusting users in a network want to collaborate to compute functions of data which is distributed among the users. The users should not learn any additional information about the data of others than what they may infer from their own data and the functions they are computing. Previous works have mostly considered the worst case context (i.e., without a… ▽ More

    Submitted 26 May, 2014; v1 submitted 11 May, 2014; originally announced May 2014.

    Comments: 6 pages, 1 figure, extended version of submission to IEEE Information Theory Workshop, 2014

  27. arXiv:1404.6614  [pdf, ps, other

    cs.IT cs.CR

    The Oblivious Transfer Capacity of the Wiretapped Binary Erasure Channel

    Authors: Manoj Mishra, Bikash Kumar Dey, Vinod M. Prabhakaran, Suhas Diggavi

    Abstract: We consider oblivious transfer between Alice and Bob in the presence of an eavesdropper Eve when there is a broadcast channel from Alice to Bob and Eve. In addition to the secrecy constraints of Alice and Bob, Eve should not learn the private data of Alice and Bob. When the broadcast channel consists of two independent binary erasure channels, we derive the oblivious transfer capacity for both 2-p… ▽ More

    Submitted 26 April, 2014; originally announced April 2014.

    Comments: This is an extended version of the paper "The Oblivious Transfer Capacity of the Wiretapped Binary Erasure Channel" to be presented at ISIT 2014

  28. arXiv:1404.5060  [pdf, other

    cs.IT

    Writing on a Dirty Paper in the presence of Jamming

    Authors: Amitalok J. Budkuley, Bikash Kumar Dey, Vinod M. Prabhakaran

    Abstract: In this paper, the problem of writing on a dirty paper in the presence of jamming is examined. We consider an AWGN channel with an additive white Gaussian state and an additive adversarial jammer. The state is assumed to be known non-causally to the encoder and the jammer but not to the decoder. The capacity of the channel in the presence of a jammer is determined. A surprising result that this ca… ▽ More

    Submitted 20 April, 2014; originally announced April 2014.

  29. arXiv:1404.5055  [pdf, other

    cs.IT

    Correlated Jamming in a Joint Source Channel Communication System

    Authors: Amitalok J. Budkuley, Bikash Kumar Dey, Vinod M. Prabhakaran

    Abstract: We study correlated jamming in joint source-channel communication systems. An i.i.d. source is to be communicated over a memoryless channel in the presence of a correlated jammer with non-causal knowledge of user transmission. This user-jammer interaction is modeled as a zero sum game. A set of conditions on the source and the channel is provided for the existence of a Nash equilibrium for this ga… ▽ More

    Submitted 20 April, 2014; originally announced April 2014.

  30. arXiv:1211.4441  [pdf, other

    cs.IT

    On the Separability of Targets Using Binary Proximity Sensors

    Authors: B. Santhana Krishnan, Animesh Kumar, D. Manjunath, Bikash K. Dey

    Abstract: We consider the problem where a network of sensors has to detect the presence of targets at any of $n$ possible locations in a finite region. All such locations may not be occupied by a target. The data from sensors is fused to determine the set of locations that have targets. We term this the separability problem. In this paper, we address the separability of an asymptotically large number of sta… ▽ More

    Submitted 19 November, 2012; originally announced November 2012.

    Comments: 17 pages, 3 figures, Submitted to IEEE TMC

  31. arXiv:1208.4777  [pdf, other

    cs.IT

    Power Controlled Adaptive Sum-Capacity of Fading MACs with Distributed CSI

    Authors: Sibi Raj B. Pillai, Bikash K. Dey, Yash Deshpande, Krishnamoorthy Iyer

    Abstract: We consider the problem of finding optimal, fair and distributed power-rate strategies to achieve the sum capacity of the Gaussian multiple-access block-fading channel. In here, the transmitters have access to only their own fading coefficients, while the receiver has global access to all the fading coefficients. Outage is not permitted in any communication block. The resulting average sum-through… ▽ More

    Submitted 23 August, 2012; originally announced August 2012.

    Comments: 15 pages, 5 figures, combined and extended version of ITW 2011 and ISITA 2012 papers

  32. Upper Bounds on the Capacity of Binary Channels with Causal Adversaries

    Authors: Bikash Kumar Dey, Sidharth Jaggi, Michael Langberg, Anand D. Sarwate

    Abstract: In this work we consider the communication of information in the presence of a causal adversarial jammer. In the setting under study, a sender wishes to communicate a message to a receiver by transmitting a codeword $(x_1,...,x_n)$ bit-by-bit over a communication channel. The sender and the receiver do not share common randomness. The adversarial jammer can view the transmitted bits $x_i$ one at a… ▽ More

    Submitted 13 December, 2012; v1 submitted 11 April, 2012; originally announced April 2012.

    Comments: To appear in the IEEE Transactions on Information Theory; shortened version appeared at ISIT 2012

  33. arXiv:1009.6057  [pdf, ps, other

    cs.NI cs.DC cs.IT

    Network Flows for Functions

    Authors: Virag Shah, Bikash Kumar Dey, D. Manjunath

    Abstract: We consider in-network computation of an arbitrary function over an arbitrary communication network. A network with capacity constraints on the links is given. Some nodes in the network generate data, e.g., like sensor nodes in a sensor network. An arbitrary function of this distributed data is to be obtained at a terminal node. The structure of the function is described by a given computation sch… ▽ More

    Submitted 30 September, 2010; originally announced September 2010.

    Comments: 16 pages, 4 figures

  34. arXiv:1001.4137  [pdf, ps, other

    cs.IT

    On the solvability of 3-source 3-terminal sum-networks

    Authors: Sagar Shenvi, Bikash Kumar Dey

    Abstract: We consider a directed acyclic network with three sources and three terminals such that each source independently generates one symbol from a given field $F$ and each terminal wants to receive the sum (over $F$) of the source symbols. Each link in the network is considered to be error-free and delay-free and can carry one symbol from the field in each use. We call such a network a 3-source 3-termi… ▽ More

    Submitted 19 April, 2010; v1 submitted 23 January, 2010; originally announced January 2010.

    Comments: Major revision in the structure of the paper. 24 pages, 15 figures. Shorter version accepted to ISIT 2010

  35. arXiv:0911.3528  [pdf, ps, other

    cs.NI

    Estimating Network Link Characteristics using Packet-Pair Dispersion: A Discrete Time Queueing Theoretic View

    Authors: Bikash Kumar Dey, D. Manjunath, Supriyo Chakraborty

    Abstract: Packet-dispersion based measurement tools insert pairs of probe packets with a known separation into the network for transmission over a unicast path or a multicast tree. Samples of the separation between the probe pairs at the destination(s) are observed. Heuristic techniques are then used by these tools to estimate the path characteristics from the observations. In this paper we present a queu… ▽ More

    Submitted 18 November, 2009; originally announced November 2009.

    Comments: 32 pages, 12 figures, 1 table

  36. arXiv:0909.5268  [pdf, other

    cs.IT

    A Simple Necessary and Sufficient Condition for the Double Unicast Problem

    Authors: Sagar Shenvi, Bikash Kumar Dey

    Abstract: We consider a directed acyclic network where there are two source-terminal pairs and the terminals need to receive the symbols generated at the respective sources. Each source independently generates an i.i.d. random process over the same alphabet. Each edge in the network is error-free, delay-free, and can carry one symbol from the alphabet per use. We give a simple necessary and sufficient con… ▽ More

    Submitted 4 February, 2010; v1 submitted 29 September, 2009; originally announced September 2009.

    Comments: 5 pages, 6 figures. Revised Version. Final manuscript for ICC 2010

  37. A Channel Coding Perspective of Collaborative Filtering

    Authors: S. T. Aditya, Onkar Dabeer, Bikash Kumar Dey

    Abstract: We consider the problem of collaborative filtering from a channel coding perspective. We model the underlying rating matrix as a finite alphabet matrix with block constant structure. The observations are obtained from this underlying matrix through a discrete memoryless channel with a noisy part representing noisy user behavior and an erasure part representing missing data. Moreover, the cluster… ▽ More

    Submitted 18 August, 2009; originally announced August 2009.

    Comments: 32 pages, 1 figure, Submitted to IEEE Transactions on Information Theory

  38. arXiv:0907.2090  [pdf, ps, other

    cs.IT

    Some bounds on the capacity of communicating the sum of sources

    Authors: Brijesh Kumar Rai, Bikash Kumar Dey, Sagar Shenvi

    Abstract: We consider directed acyclic networks with multiple sources and multiple terminals where each source generates one i.i.d. random process over an abelian group and all the terminals want to recover the sum of these random processes. The different source processes are assumed to be independent. The solvability of such networks has been considered in some previous works. In this paper we investigat… ▽ More

    Submitted 25 August, 2009; v1 submitted 12 July, 2009; originally announced July 2009.

    Comments: Revised version

  39. On network coding for sum-networks

    Authors: Brijesh Kumar Rai, Bikash Kumar Dey

    Abstract: A directed acyclic network is considered where all the terminals need to recover the sum of the symbols generated at all the sources. We call such a network a sum-network. It is shown that there exists a solvably (and linear solvably) equivalent sum-network for any multiple-unicast network, and thus for any directed acyclic communication network. It is also shown that there exists a linear solvabl… ▽ More

    Submitted 30 August, 2011; v1 submitted 3 June, 2009; originally announced June 2009.

    Comments: Accepted to IEEE Transactions on Information Theory

  40. arXiv:0901.2198  [pdf, ps, other

    cs.IT

    Feasible alphabets for communicating the sum of sources over a network

    Authors: Brijesh Kumar Rai, Bikash Kumar Dey

    Abstract: We consider directed acyclic {\em sum-networks} with $m$ sources and $n$ terminals where the sources generate symbols from an arbitrary alphabet field $F$, and the terminals need to recover the sum of the sources over $F$. We show that for any co-finite set of primes, there is a sum-network which is solvable only over fields of characteristics belonging to that set. We further construct a sum-ne… ▽ More

    Submitted 15 January, 2009; originally announced January 2009.

  41. arXiv:0901.1853  [pdf, ps, other

    cs.IT

    Binary Causal-Adversary Channels

    Authors: Michael Langberg, Sidharth Jaggi, Bikash Kumar Dey

    Abstract: In this work we consider the communication of information in the presence of a causal adversarial jammer. In the setting under study, a sender wishes to communicate a message to a receiver by transmitting a codeword x=(x_1,...,x_n) bit-by-bit over a communication channel. The adversarial jammer can view the transmitted bits x_i one at a time, and can change up to a p-fraction of them. However, t… ▽ More

    Submitted 28 January, 2009; v1 submitted 13 January, 2009; originally announced January 2009.

    Comments: 8 pages, 1 figure, extended version of paper submitted to the International Symposium on Information Theory, 2009 (ISIT2009)

  42. arXiv:0901.1753  [pdf, ps, other

    cs.IT

    A Channel Coding Perspective of Recommendation Systems

    Authors: S. T. Aditya, Onkar Dabeer, Bikash Kumar Dey

    Abstract: Motivated by recommendation systems, we consider the problem of estimating block constant binary matrices (of size $m \times n$) from sparse and noisy observations. The observations are obtained from the underlying block constant matrix after unknown row and column permutations, erasures, and errors. We derive upper and lower bounds on the achievable probability of error. For fixed erasure and e… ▽ More

    Submitted 13 January, 2009; originally announced January 2009.

    Comments: 5 pages, submitted to ISIT 2009

  43. arXiv:0811.2850  [pdf, ps, other

    cs.IT

    Codes against Online Adversaries

    Authors: Bikash Kumar Dey, Sidharth Jaggi, Michael Langberg

    Abstract: In this work we consider the communication of information in the presence of an online adversarial jammer. In the setting under study, a sender wishes to communicate a message to a receiver by transmitting a codeword x=x_1,...,x_n symbol-by-symbol over a communication channel. The adversarial jammer can view the transmitted symbols x_i one at a time, and can change up to a p-fraction of them. Ho… ▽ More

    Submitted 18 November, 2008; originally announced November 2008.

    Comments: 10 pages + abstract + appendix/references. Submitted to STOC 2009

  44. arXiv:0811.0285  [pdf, ps, other

    cs.IT

    Some results on communicating the sum of sources over a network

    Authors: Brijesh Kumar Rai, Bikash Kumar Dey, Abhay Karandikar

    Abstract: We consider the problem of communicating the sum of $m$ sources to $n$ terminals in a directed acyclic network. Recently, it was shown that for a network of unit capacity links with either $m=2$ or $n=2$, the sum of the sources can be communicated to the terminals if and only if every source-terminal pair is connected in the network. We show in this paper that for any finite set of primes, there… ▽ More

    Submitted 3 November, 2008; originally announced November 2008.

    Comments: 5 pages, 3 figures

  45. arXiv:0810.2659  [pdf, ps, other

    cs.NI

    DSTC Layering Protocols in Wireless Cooperative Networks

    Authors: P. S. Elamvazhuthi, P. S. Kulkarni, B. K. Dey

    Abstract: In a radio network with single source-destination pair and some relays, a link between any two nodes is considered to have same or zero path loss. However in practice some links may have considerably high path loss than others but still being useful. In this report, we take into account signals received from these links also. \indent Our system model consists of a source-destination pair with tw… ▽ More

    Submitted 7 March, 2009; v1 submitted 15 October, 2008; originally announced October 2008.

    Comments: 39 pages, 20 figures. Part of this paper is submitted to IEEE 70th Vehicular Technology Conference: VTC2009-Fall for publication

  46. arXiv:0810.1424  [pdf, ps, other

    cs.IT

    "Real" Slepian-Wolf Codes

    Authors: Bikash Kumar Dey, Sidharth Jaggi, Michael Langberg

    Abstract: We provide a novel achievability proof of the Slepian-Wolf theorem for i.i.d. sources over finite alphabets. We demonstrate that random codes that are linear over the real field achieve the classical Slepian-Wolf rate-region. For finite alphabets we show that typicality decoding is equivalent to solving an integer program. Minimum entropy decoding is also shown to achieve exponentially small pro… ▽ More

    Submitted 8 October, 2008; originally announced October 2008.

    Comments: 20 pages. Preliminary version presented at ISIT 2008, Toronto, Canada

  47. Coherent Optimal Control of Multiphoton Molecular Excitation

    Authors: Bijoy K Dey

    Abstract: We give a framework for molecular multiphoton excitation process induced by an optimally designed electric field. The molecule is initially prepared in a coherent superposition state of two of its eigenfunctions. The relative phase of the two superposed eigenfunctions has been shown to control the optimally designed electric field which triggers the multiphoton excitation in the molecule. This b… ▽ More

    Submitted 24 June, 2003; originally announced June 2003.

    Comments: 5 figures

    Journal ref: Journal of Physics B, 34, page 2189, 2001

  48. Optimal Control of Quantum Dynamics : A New Theoretical Approach

    Authors: Bijoy K. Dey

    Abstract: A New theoretical formalism for the optimal quantum control has been presented. The approach stems from the consideration of describing the time-dependent quantum system in terms of the real physical observables, viz., the probability density rho(x,t) and the quantum current j(x,t) which is well documented in the Bohm's hydrodynamical formulation of quantum mechanics. The approach has been appli… ▽ More

    Submitted 24 June, 2003; originally announced June 2003.

    Comments: 4 figures

    Journal ref: J. Physics A 33, 2000, page 4643-4656

  49. arXiv:physics/0306167  [pdf, ps, other

    physics.atom-ph physics.optics

    Coherent Control of Atomic Beam Diffraction by Standing Light

    Authors: Bijoy K. Dey

    Abstract: Quantum interference is shown to deliver a means of regulating the diffraction pattern of a thermal atomic beam interacting with two standing wave electric fields. Parameters have been identified to enhance the diffraction probability of one momentum component over the others, with specific application to Rb atoms.

    Submitted 24 June, 2003; originally announced June 2003.

    Comments: 5 figures

    Journal ref: Physical Review A 67, 023401, 2003

  50. arXiv:quant-ph/0009053  [pdf, ps, other

    quant-ph physics.chem-ph

    Coherently Controlled Nanoscale Molecular Deposition

    Authors: Bijoy K. Dey, Moshe Shapiro, Paul Brumer

    Abstract: Quantum interference effects are shown to provide a means of controlling and enhancing the focusing a collimated neutral molecular beam onto a surface. The nature of the aperiodic pattern formed can be altered by varying laser field characteristics and the system geometry.

    Submitted 12 September, 2000; originally announced September 2000.

    Comments: 13 pages (inculding 4 figures), LaTeX (Phys. Rev. Lett., 2000, in Press)

    Journal ref: Phys. Rev. Lett., 85, 3125, 2000