Skip to main content

Showing 1–48 of 48 results for author: Heidarzadeh, A

.
  1. arXiv:2401.16630  [pdf, ps, other

    cs.IT

    Achieving Capacity of PIR with Private Side Information with Low Sub-packetization and without MDS Codes

    Authors: Leila Erhili, Anoosheh Heidarzadeh

    Abstract: This paper revisits the problem of multi-server Private Information Retrieval with Private Side Information (PIR-PSI). In this problem, $N$ non-colluding servers store identical copies of $K$ messages, each comprising $L$ symbols from $\mathbb{F}_q$, and a user, who knows $M$ of these messages, wants to retrieve one of the remaining $K-M$ messages. The user's goal is to retrieve the desired messag… ▽ More

    Submitted 29 January, 2024; originally announced January 2024.

  2. arXiv:2401.16628  [pdf, ps, other

    cs.IT

    A New Approach to Harnessing Side Information in Multi-Server Private Information Retrieval

    Authors: Ningze Wang, Anoosheh Heidarzadeh, Alex Sprintson

    Abstract: This paper presents new solutions for Private Information Retrieval (PIR) with side information. This problem is motivated by PIR settings in which a client has side information about the data held by the servers and would like to leverage this information in order to improve the download rate. The problem of PIR with side information has been the subject of several recent studies that presented a… ▽ More

    Submitted 29 January, 2024; originally announced January 2024.

  3. arXiv:2307.07731  [pdf

    cond-mat.mtrl-sci

    Exploring the Impact of Configurational Entropy on the Design and Development of CoNi-Based Superalloys for Sustainable Applications

    Authors: Ahad Mohammadzadeha, Akbar Heidarzadeh, Hailey Becker, Jorge Valilla Robles, Alberto Meza, Manuel Avella, Miguel A. Monclus, Damien Tourret, Jose Manuel Torralba

    Abstract: A comprehensive literature review on recently rediscovered Co- and/or CoNi-based superalloys, strengthened by the γ' phase, revealed a relationship between the configurational entropy of the system and the γ' solvus temperature. This study was conducted on a high Cr CoNi-based superalloy system with high configurational entropy to test our hypothesis based on the sustainable metallurgy framework.… ▽ More

    Submitted 15 July, 2023; originally announced July 2023.

  4. arXiv:2208.13237  [pdf, ps, other

    cs.IT

    Multi-Message Private Information Retrieval: A Scalar Linear Solution

    Authors: Ningze Wang, Anoosheh Heidarzadeh, Alex Sprintson

    Abstract: In recent years, the Multi-message Private Information Retrieval (MPIR) problem has received significant attention from the research community. In this problem, a user wants to privately retrieve $D$ messages out of $K$ messages whose identical copies are stored on $N$ remote servers, while maximizing the download rate. The MPIR schemes can find applications in many practical scenarios and can ser… ▽ More

    Submitted 28 August, 2022; originally announced August 2022.

  5. arXiv:2205.06172  [pdf, other

    cs.IT cs.IR

    Single-Server Private Information Retrieval with Side Information Under Arbitrary Popularity Profiles

    Authors: Alejandro Gomez-Leos, Anoosheh Heidarzadeh

    Abstract: This paper introduces a generalization of the Private Information Retrieval with Side Information (PIR-SI) problem called Popularity-Aware PIR-SI (PA-PIR-SI). The PA-PIR-SI problem includes one or more remote servers storing copies of a dataset of $K$ messages, and a user who knows $M$ out of $K$ messages -- the identities of which are unknown to the server -- as a prior side information, and wish… ▽ More

    Submitted 14 May, 2022; v1 submitted 12 May, 2022; originally announced May 2022.

  6. arXiv:2205.06162  [pdf, other

    cs.IT cs.DC

    Sparse Random Khatri-Rao Product Codes for Distributed Matrix Multiplication

    Authors: Ruowan Ji, Anoosheh Heidarzadeh, Krishna R. Narayanan

    Abstract: We introduce two generalizations to the paradigm of using Random Khatri-Rao Product (RKRP) codes for distributed matrix multiplication. We first introduce a class of codes called Sparse Random Khatri-Rao Product (SRKRP) codes which have sparse generator matrices. SRKRP codes result in lower encoding, computation and communication costs than RKRP codes when the input matrices are sparse, while they… ▽ More

    Submitted 12 May, 2022; originally announced May 2022.

  7. arXiv:2202.12284  [pdf, ps, other

    cs.IT eess.SP

    Noisy Group Testing with Side Information

    Authors: Esmaeil Karimi, Anoosheh Heidarzadeh, Krishna R. Narayanan, Alex Sprintson

    Abstract: Group testing has recently attracted significant attention from the research community due to its applications in diagnostic virology. An instance of the group testing problem includes a ground set of individuals which includes a small subset of infected individuals. The group testing procedure consists of a number of tests, such that each test indicates whether or not a given subset of individual… ▽ More

    Submitted 24 February, 2022; originally announced February 2022.

  8. arXiv:2202.12229  [pdf, ps, other

    cs.IT cs.IR

    The Linear Capacity of Single-Server Individually-Private Information Retrieval with Side Information

    Authors: Anoosheh Heidarzadeh, Alex Sprintson

    Abstract: This paper considers the problem of single-server Individually-Private Information Retrieval with side information (IPIR). In this problem, there is a remote server that stores a dataset of $K$ messages, and there is a user that initially knows $M$ of these messages, and wants to retrieve $D$ other messages belonging to the dataset. The goal of the user is to retrieve the $D$ desired messages by d… ▽ More

    Submitted 24 February, 2022; originally announced February 2022.

  9. arXiv:2201.11605  [pdf, ps, other

    cs.IT cs.IR

    The Role of Reusable and Single-Use Side Information in Private Information Retrieval

    Authors: Anoosheh Heidarzadeh, Alex Sprintson

    Abstract: This paper introduces the problem of Private Information Retrieval with Reusable and Single-use Side Information (PIR-RSSI). In this problem, one or more remote servers store identical copies of a set of $K$ messages, and there is a user that initially knows $M$ of these messages, and wants to privately retrieve one other message from the set of $K$ messages. The objective is to design a retrieval… ▽ More

    Submitted 27 January, 2022; originally announced January 2022.

  10. arXiv:2110.10110  [pdf, ps, other

    cs.IT

    Scheduling Improves the Performance of Belief Propagation for Noisy Group Testing

    Authors: Esmaeil Karimi, Anoosheh Heidarzadeh, Krishna R. Narayanan, Alex Sprintson

    Abstract: This paper considers the noisy group testing problem where among a large population of items some are defective. The goal is to identify all defective items by testing groups of items, with the minimum possible number of tests. The focus of this work is on the practical settings with a limited number of items rather than the asymptotic regime. In the current literature, belief propagation has been… ▽ More

    Submitted 19 October, 2021; originally announced October 2021.

  11. arXiv:2108.09271  [pdf, ps, other

    cs.IT cs.IR

    Multi-Server Private Linear Computation with Joint and Individual Privacy Guarantees

    Authors: Nahid Esmati, Anoosheh Heidarzadeh

    Abstract: This paper considers the problem of multi-server Private Linear Computation, under the joint and individual privacy guarantees. In this problem, identical copies of a dataset comprised of $K$ messages are stored on $N$ non-colluding servers, and a user wishes to obtain one linear combination of a $D$-subset of messages belonging to the dataset. The goal is to design a scheme for performing the com… ▽ More

    Submitted 22 August, 2021; v1 submitted 20 August, 2021; originally announced August 2021.

    Comments: 10 pages

  12. arXiv:2106.05222  [pdf, other

    cs.IT cs.IR cs.LG

    Single-Server Private Linear Transformation: The Individual Privacy Case

    Authors: Anoosheh Heidarzadeh, Nahid Esmati, Alex Sprintson

    Abstract: This paper considers the single-server Private Linear Transformation (PLT) problem with individual privacy guarantees. In this problem, there is a user that wishes to obtain $L$ independent linear combinations of a $D$-subset of messages belonging to a dataset of $K$ messages stored on a single server. The goal is to minimize the download cost while kee** the identity of each message required fo… ▽ More

    Submitted 9 June, 2021; v1 submitted 9 June, 2021; originally announced June 2021.

    Comments: 14 pages, 1 figure. This work is a long version of arXiv:2102.01662

  13. arXiv:2106.05220  [pdf, other

    cs.IT cs.IR cs.LG

    Single-Server Private Linear Transformation: The Joint Privacy Case

    Authors: Anoosheh Heidarzadeh, Nahid Esmati, Alex Sprintson

    Abstract: This paper introduces the problem of Private Linear Transformation (PLT) which generalizes the problems of private information retrieval and private linear computation. The PLT problem includes one or more remote server(s) storing (identical copies of) $K$ messages and a user who wants to compute $L$ independent linear combinations of a $D$-subset of messages. The objective of the user is to perfo… ▽ More

    Submitted 9 June, 2021; v1 submitted 9 June, 2021; originally announced June 2021.

    Comments: 12 pages, 1 figure. This work is a long version of arXiv:2102.01665

  14. arXiv:2102.01665  [pdf, ps, other

    cs.IT cs.IR

    Private Linear Transformation: The Joint Privacy Case

    Authors: Nahid Esmati, Anoosheh Heidarzadeh, Alex Sprintson

    Abstract: We introduce the problem of Private Linear Transformation (PLT). This problem includes a single (or multiple) remote server(s) storing (identical copies of) $K$ messages and a user who wants to compute $L$ linear combinations of a $D$-subset of these messages by downloading the minimum amount of information from the server(s) while protecting the privacy of the entire set of $D$ messages. This pro… ▽ More

    Submitted 3 February, 2021; v1 submitted 2 February, 2021; originally announced February 2021.

    Comments: arXiv admin note: text overlap with arXiv:2102.01662

  15. arXiv:2102.01662  [pdf, ps, other

    cs.IT cs.IR

    Private Linear Transformation: The Individual Privacy Case

    Authors: Nahid Esmati, Anoosheh Heidarzadeh, Alex Sprintson

    Abstract: This paper considers the single-server Private Linear Transformation (PLT) problem when individual privacy is required. In this problem, there is a user that wishes to obtain $L$ linear combinations of a $D$-subset of messages belonging to a dataset of $K$ messages stored on a single server. The goal is to minimize the download cost while kee** the identity of every message required for the comp… ▽ More

    Submitted 5 February, 2021; v1 submitted 2 February, 2021; originally announced February 2021.

  16. arXiv:2007.02695  [pdf, other

    cs.IT q-bio.QM

    Two-Stage Adaptive Pooling with RT-qPCR for COVID-19 Screening

    Authors: Anoosheh Heidarzadeh, Krishna R. Narayanan

    Abstract: We propose two-stage adaptive pooling schemes, 2-STAP and 2-STAMP, for detecting COVID-19 using real-time reverse transcription quantitative polymerase chain reaction (RT-qPCR) test kits. Similar to the Tapestry scheme of Ghosh et al., the proposed schemes leverage soft information from the RT-qPCR process about the total viral load in the pool. This is in contrast to conventional group testing sc… ▽ More

    Submitted 6 July, 2020; originally announced July 2020.

    Comments: 23 pages, 3 figures, 4 tables

  17. arXiv:2004.04785  [pdf, other

    cs.IT

    On Accelerated Testing for COVID-19 Using Group Testing

    Authors: Krishna R. Narayanan, Anoosheh Heidarzadeh, Ramanan Laxminarayan

    Abstract: COVID-19 has resulted in a global health crisis that may become even more acute over the upcoming months. One of the main reasons behind the current rapid growth of COVID-19 in the U.S. population is the limited availability of testing kits and the relatively-high cost of screening tests. In this draft, we demonstrate the effectiveness of group testing (pooling) ideas to accelerate testing for COV… ▽ More

    Submitted 9 April, 2020; originally announced April 2020.

    Comments: 16 pages, 10 figures, 4 tables

  18. arXiv:2001.04545  [pdf, ps, other

    cs.IT

    Private Computation with Individual and Joint Privacy

    Authors: Anoosheh Heidarzadeh, Alex Sprintson

    Abstract: This paper considers the problem of single-server Private Computation (PC) in the presence of Side Information (SI). In this problem, there is a server that stores $K$ i.i.d. messages, and a user who has a subset of $M$ uncoded messages or a coded linear combination of them as side information, where the identities of these messages are unknown to the server. The user wants to privately compute (v… ▽ More

    Submitted 19 January, 2020; v1 submitted 13 January, 2020; originally announced January 2020.

    Comments: 17 pages; This work is a longer version of an article submitted to IEEE for possible publication

  19. arXiv:1910.07612  [pdf, ps, other

    cs.IT cs.IR

    The Role of Coded Side Information in Single-Server Private Information Retrieval

    Authors: Anoosheh Heidarzadeh, Fatemeh Kazemi, Alex Sprintson

    Abstract: We study the role of coded side information in single-server Private Information Retrieval (PIR). An instance of the single-server PIR problem includes a server that stores a database of $K$ independently and uniformly distributed messages, and a user who wants to retrieve one of these messages from the server. We consider settings in which the user initially has access to a coded side information… ▽ More

    Submitted 16 October, 2019; originally announced October 2019.

    Comments: 40 pages; This work was presented in part at the 2018 IEEE Information Theory Workshop, Guangzhou, China, November 2018, and the 2019 IEEE International Symposium on Information Theory, Paris, France, July 2019

  20. arXiv:1910.06845  [pdf, ps, other

    cs.IT

    Non-adaptive Quantitative Group Testing Using Irregular Sparse Graph Codes

    Authors: Esmaeil Karimi, Fatemeh Kazemi, Anoosheh Heidarzadeh, Krishna R. Narayanan, Alex Sprintson

    Abstract: This paper considers the problem of Quantitative Group Testing (QGT) where there are some defective items among a large population of $N$ items. We consider the scenario in which each item is defective with probability $K/N$, independently from the other items. In the QGT problem, the goal is to identify all or a sufficiently large fraction of the defective items by testing groups of items, with t… ▽ More

    Submitted 15 October, 2019; originally announced October 2019.

    Comments: 7 pages; This work was presented at the 57th Annual Allerton Conference on Communication, Control, and Computing (Allerton'19), Monticello, Illinois, USA, Sept 2019

  21. arXiv:1907.11018  [pdf, ps, other

    cs.IT

    Factored LT and Factored Raptor Codes for Large-Scale Distributed Matrix Multiplication

    Authors: Asit Kumar Pradhan, Anoosheh Heidarzadeh, Krishna R. Narayanan

    Abstract: We propose two coding schemes for distributed matrix multiplication in the presence of stragglers. These coding schemes are adaptations of LT codes and Raptor codes to distributed matrix multiplication and are termed \emph{factored LT (FLT) codes} and \emph{factored Raptor (FR) codes}. Empirically, we show that FLT codes have near-optimal recovery thresholds when the number of worker nodes is very… ▽ More

    Submitted 25 July, 2019; originally announced July 2019.

  22. arXiv:1907.05965  [pdf, ps, other

    cs.IT

    Random Khatri-Rao-Product Codes for Numerically-Stable Distributed Matrix Multiplication

    Authors: Adarsh M. Subramaniam, Anoosheh Heidarzadeh, Krishna R. Narayanan

    Abstract: We propose a class of codes called random Khatri-Rao-Product (RKRP) codes for distributed matrix multiplication in the presence of stragglers. The main advantage of the proposed codes is that decoding of RKRP codes is highly numerically stable in comparison to decoding of Polynomial codes and decoding of the recently proposed OrthoPoly codes. We show that RKRP codes are maximum distance separable… ▽ More

    Submitted 12 July, 2019; originally announced July 2019.

    Comments: 16 pages, 4 figures, submitted to 57th Annual Allerton Conference on Communication, Control, and Computing (Allerton 2019)

  23. arXiv:1907.00598  [pdf, ps, other

    cs.IT cs.CR

    On an Equivalence Between Single-Server PIR with Side Information and Locally Recoverable Codes

    Authors: Swanand Kadhe, Anoosheh Heidarzadeh, Alex Sprintson, O. Ozan Koyluoglu

    Abstract: Private Information Retrieval (PIR) problem has recently attracted a significant interest in the information-theory community. In this problem, a user wants to privately download one or more messages belonging to a database with copies stored on a single or multiple remote servers. In the single server scenario, the user must have prior side information, i.e., a subset of messages unknown to the s… ▽ More

    Submitted 1 July, 2019; originally announced July 2019.

  24. arXiv:1906.11278  [pdf, ps, other

    cs.IT

    Private Information Retrieval with Private Coded Side Information: The Multi-Server Case

    Authors: Fatemeh Kazemi, Esmaeil Karimi, Anoosheh Heidarzadeh, Alex Sprintson

    Abstract: In this paper, we consider the multi-server setting of Private Information Retrieval with Private Coded Side Information (PIR-PCSI) problem. In this problem, there is a database of $K$ messages whose copies are replicated across $N$ servers, and there is a user who knows a random linear combination of a random subset of $M$ messages in the database as side information. The user wishes to download… ▽ More

    Submitted 26 June, 2019; originally announced June 2019.

    Comments: 11 pages

  25. arXiv:1906.09259  [pdf, ps, other

    cs.IT

    Multi-Server Private Information Retrieval with Coded Side Information

    Authors: Fatemeh Kazemi, Esmaeil Karimi, Anoosheh Heidarzadeh, Alex Sprintson

    Abstract: In this paper, we study the multi-server setting of the \emph{Private Information Retrieval with Coded Side Information (PIR-CSI)} problem. In this problem, there are $K$ messages replicated across $N$ servers, and there is a user who wishes to download one message from the servers without revealing any information to any server about the identity of the requested message. The user has a side info… ▽ More

    Submitted 21 June, 2019; originally announced June 2019.

    Comments: 16 pages; A short version of this work was presented at the 16th Canadian Workshop on Information Theory (CWIT'19), Hamilton, Ontario, Canada, June 2019

  26. arXiv:1901.09248  [pdf, ps, other

    cs.IT

    Capacity of Single-Server Single-Message Private Information Retrieval with Private Coded Side Information

    Authors: Anoosheh Heidarzadeh, Fatemeh Kazemi, Alex Sprintson

    Abstract: We study the problem of single-server single-message Private Information Retrieval with Private Coded Side Information (PIR-PCSI). In this problem, there is a server that stores a database, and a user who knows a random linear combination of a random subset of messages in the database. The number of messages contributing to the user's side information is known to the server a priori, whereas their… ▽ More

    Submitted 26 January, 2019; originally announced January 2019.

    Comments: 5 pages; Submitted to IEEE for possible publication

  27. arXiv:1901.07748  [pdf, ps, other

    cs.IT

    Single-Server Single-Message Online Private Information Retrieval with Side Information

    Authors: Fatemeh Kazemi, Esmaeil Karimi, Anoosheh Heidarzadeh, Alex Sprintson

    Abstract: In many practical settings, the user needs to retrieve information from a server in a periodic manner, over multiple rounds of communication. In this paper, we discuss the setting in which this information needs to be retrieved privately, such that the identity of all the information retrieved until the current round is protected. This setting can occur in practical situations in which the user ne… ▽ More

    Submitted 25 January, 2019; v1 submitted 23 January, 2019; originally announced January 2019.

    Comments: 7 pages; This work is a long version of an article submitted to IEEE for possible publication

  28. arXiv:1901.07635  [pdf, ps, other

    cs.IT

    Sparse Graph Codes for Non-adaptive Quantitative Group Testing

    Authors: Esmaeil Karimi, Fatemeh Kazemi, Anoosheh Heidarzadeh, Krishna R. Narayanan, Alex Sprintson

    Abstract: This paper considers the problem of Quantitative Group Testing (QGT). Consider a set of $N$ items among which $K$ items are defective. The QGT problem is to identify (all or a sufficiently large fraction of) the defective items, where the result of a test reveals the number of defective items in the tested group. In this work, we propose a non-adaptive QGT algorithm using sparse graph codes over b… ▽ More

    Submitted 24 April, 2019; v1 submitted 22 January, 2019; originally announced January 2019.

  29. arXiv:1901.07509  [pdf, ps, other

    cs.IT

    Single-Server Multi-Message Individually-Private Information Retrieval with Side Information

    Authors: Anoosheh Heidarzadeh, Swanand Kadhe, Salim El Rouayheb, Alex Sprintson

    Abstract: We consider a multi-user variant of the private information retrieval problem described as follows. Suppose there are $D$ users, each of which wants to privately retrieve a distinct message from a server with the help of a trusted agent. We assume that the agent has a random subset of $M$ messages that is not known to the server. The goal of the agent is to collectively retrieve the users' request… ▽ More

    Submitted 1 February, 2019; v1 submitted 22 January, 2019; originally announced January 2019.

    Comments: 11 pages; This work is a long version of an article submitted to IEEE for possible publication; This version includes more details on Conjecture 2

  30. arXiv:1807.09908  [pdf, ps, other

    cs.IT

    On the Capacity of Single-Server Multi-Message Private Information Retrieval with Side Information

    Authors: Anoosheh Heidarzadeh, Brenden Garcia, Swanand Kadhe, Salim El Rouayheb, Alex Sprintson

    Abstract: We study Private Information Retrieval with Side Information (PIR-SI) in the single-server multi-message setting. In this setting, a user wants to download $D$ messages from a database of $K\geq D$ messages, stored on a single server, without revealing any information about the identities of the demanded messages to the server. The goal of the user is to achieve information-theoretic privacy by le… ▽ More

    Submitted 25 July, 2018; originally announced July 2018.

    Comments: 11 pages, submitted for publication

  31. arXiv:1806.00661  [pdf, ps, other

    cs.IT

    Capacity of Single-Server Single-Message Private Information Retrieval with Coded Side Information

    Authors: Anoosheh Heidarzadeh, Fatemeh Kazemi, Alex Sprintson

    Abstract: This paper considers the problem of single-server single-message private information retrieval with coded side information (PIR-CSI). In this problem, there is a server storing a database, and a user which knows a linear combination of a subset of messages in the database as a side information. The number of messages contributing to the side information is known to the server, but the indices and… ▽ More

    Submitted 13 June, 2018; v1 submitted 2 June, 2018; originally announced June 2018.

    Comments: 8 pages. This article is an extended version of a paper submitted to Information Theory Workshop (ITW) 2018. (A few minor typos in the previous version are fixed.)

  32. A Systematic Approach to Incremental Redundancy over Erasure Channels

    Authors: Anoosheh Heidarzadeh, Jean-Francois Chamberland, Parimal Parag, Richard D. Wesel

    Abstract: As sensing and instrumentation play an increasingly important role in systems controlled over wired and wireless networks, the need to better understand delay-sensitive communication becomes a prime issue. Along these lines, this article studies the operation of data links that employ incremental redundancy as a practical means to protect information from the effects of unreliable channels. Specif… ▽ More

    Submitted 8 May, 2018; originally announced May 2018.

    Comments: 7 pages, 2 figures; A shorter version of this article will appear in the proceedings of ISIT 2018

    Journal ref: IEEE International Symposium on Information Theory (ISIT), Vail, CO, USA, 2018, pp. 1176-1180

  33. arXiv:1805.02977  [pdf, ps, other

    cs.IT

    A Simple and Efficient Strategy for the Coin Weighing Problem with a Spring Scale

    Authors: Esmaeil Karimi, Fatemeh Kazemi, Anoosheh Heidarzadeh, Alex Sprintson

    Abstract: This paper considers a generalized version of the coin weighing problem with a spring scale that lies at the intersection of group testing and compressed sensing problems. Given a collection of $n\geq 2$ coins of total weight $d$ (for a known integer $d$), where the weight of each coin is an unknown integer in the range of $\{0,1,\dots,k\}$ (for a known integer $k\geq 1$), the problem is to determ… ▽ More

    Submitted 8 May, 2018; originally announced May 2018.

    Comments: 10 pages, 3 figures; A shorter version will appear in ISIT 2018

  34. arXiv:1801.03865  [pdf, ps, other

    cs.IT

    A Monetary Mechanism for Stabilizing Cooperative Data Exchange with Selfish Users

    Authors: Anoosheh Heidarzadeh, Ishan Tyagi, Srinivas Shakkottai, Alex Sprintson

    Abstract: This paper considers the problem of stabilizing cooperative data exchange with selfish users. In this setting, each user has a subset of packets in the ground set $X$, and wants all other packets in $X$. The users can exchange their packets by broadcasting coded or uncoded packets over a lossless broadcast channel, and monetary transactions are allowed between any pair of users. We define the util… ▽ More

    Submitted 11 January, 2018; originally announced January 2018.

    Comments: 7 pages

  35. arXiv:1712.09666  [pdf, other

    cs.DS cs.NI

    A Fast and Accurate Failure Frequency Approximation for $k$-Terminal Reliability Systems

    Authors: Anoosheh Heidarzadeh, Alex Sprintson, Chanan Singh

    Abstract: This paper considers the problem of approximating the failure frequency of large-scale composite $k$-terminal reliability systems. In such systems, the nodes ($k$ of which are terminals) are connected through components which are subject to random failure and repair processes. At any time, a system failure occurs if the surviving system fails to connect all the k terminals together. We assume that… ▽ More

    Submitted 27 December, 2017; originally announced December 2017.

    Comments: 17 pages, 3 figures, 5 tables

  36. arXiv:1709.00112  [pdf, ps, other

    cs.IT cs.CR

    Private Information Retrieval with Side Information

    Authors: Swanand Kadhe, Brenden Garcia, Anoosheh Heidarzadeh, Salim El Rouayheb, Alex Sprintson

    Abstract: We study the problem of Private Information Retrieval (PIR) in the presence of prior side information. The problem setup includes a database of $K$ independent messages possibly replicated on several servers, and a user that needs to retrieve one of these messages. In addition, the user has some prior side information in the form of a subset of $M$ messages, not containing the desired message and… ▽ More

    Submitted 31 August, 2017; originally announced September 2017.

    Comments: Shorter version of the paper is accepted in Allerton Conference 2017

  37. arXiv:1702.01773  [pdf, ps, other

    cs.IT

    Successive Local and Successive Global Omniscience

    Authors: Anoosheh Heidarzadeh, Alex Sprintson

    Abstract: This paper considers two generalizations of the cooperative data exchange problem, referred to as the successive local omniscience (SLO) and the successive global omniscience (SGO). The users are divided into $\ell$ nested sub-groups. Each user initially knows a subset of packets in a ground set $X$ of size $k$, and all users wish to learn all packets in $X$. The users exchange their packets by br… ▽ More

    Submitted 11 May, 2017; v1 submitted 6 February, 2017; originally announced February 2017.

    Comments: Accepted for publication in Proc. ISIT 2017

  38. arXiv:1702.01734  [pdf, ps, other

    cs.IT

    An Algebraic-Combinatorial Proof Technique for the GM-MDS Conjecture

    Authors: Anoosheh Heidarzadeh, Alex Sprintson

    Abstract: This paper considers the problem of designing maximum distance separable (MDS) codes over small fields with constraints on the support of their generator matrices. For any given $m\times n$ binary matrix $M$, the GM-MDS conjecture, due to Dau et al., states that if $M$ satisfies the so-called MDS condition, then for any field $\mathbb{F}$ of size $q\geq n+m-1$, there exists an $[n,m]_q$ MDS code w… ▽ More

    Submitted 11 May, 2017; v1 submitted 6 February, 2017; originally announced February 2017.

    Comments: Accepted for publication in Proc. ISIT 2017

  39. arXiv:1508.03871  [pdf, ps, other

    cs.IT

    Cooperative Data Exchange with Unreliable Clients

    Authors: Anoosheh Heidarzadeh, Alex Sprintson

    Abstract: Consider a set of clients in a broadcast network, each of which holds a subset of packets in the ground set X. In the (coded) cooperative data exchange problem, the clients need to recover all packets in X by exchanging coded packets over a lossless broadcast channel. Several previous works analyzed this problem under the assumption that each client initially holds a random subset of packets in X.… ▽ More

    Submitted 5 October, 2015; v1 submitted 16 August, 2015; originally announced August 2015.

    Comments: 8 pages; in Proc. 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton 2015)

  40. arXiv:1207.6052  [pdf, other

    cs.IT

    Coding Delay Analysis of Dense and Chunked Network Codes over Line Networks

    Authors: Anoosheh Heidarzadeh, Amir H. Banihashemi

    Abstract: In this paper, we analyze the coding delay and the average coding delay of random linear network codes (a.k.a. dense codes) and chunked codes (CC), which are an attractive alternative to dense codes due to their lower complexity, over line networks with Bernoulli losses and deterministic regular or Poisson transmissions. Our results, which include upper bounds on the delay and the average delay, a… ▽ More

    Submitted 25 July, 2012; originally announced July 2012.

    Comments: 28 pages, 1 figure, 2 tables; Submitted to IEEE Trans. on Info. Theory. arXiv admin note: substantial text overlap with arXiv:1203.1643, arXiv:1202.0343

  41. arXiv:1207.4711  [pdf, ps, other

    cs.IT cs.NI

    Efficient Feedback-Based Scheduling Policies for Chunked Network Codes over Networks with Loss and Delay

    Authors: Anoosheh Heidarzadeh, Amir H. Banihashemi

    Abstract: The problem of designing efficient feedback-based scheduling policies for chunked codes (CC) over packet networks with delay and loss is considered. For networks with feedback, two scheduling policies, referred to as random push (RP) and local-rarest-first (LRF), already exist. We propose a new scheduling policy, referred to as minimum-distance-first (MDF), based on the expected number of innovati… ▽ More

    Submitted 19 July, 2012; originally announced July 2012.

    Comments: 12 pages, 13 tables; Submitted to IEEE Trans. on Networking

  42. arXiv:1203.1643  [pdf, ps, other

    cs.IT

    Coding Delay Analysis of Chunked Codes over Line Networks

    Authors: Anoosheh Heidarzadeh, Amir H. Banihashemi

    Abstract: In this paper, we analyze the coding delay and the average coding delay of Chunked network Codes (CC) over line networks with Bernoulli losses and deterministic regular or Poisson transmissions. Chunked codes are an attractive alternative to random linear network codes due to their lower complexity. Our results, which include upper bounds on the delay and the average delay, are the first of their… ▽ More

    Submitted 7 March, 2012; originally announced March 2012.

    Comments: 15 pages; submitted to IEEE NetCod 2012

  43. arXiv:1202.0343  [pdf, ps, other

    cs.IT

    How Fast Can Dense Codes Achieve the Min-Cut Capacity of Line Networks?

    Authors: Anoosheh Heidarzadeh, Amir H. Banihashemi

    Abstract: In this paper, we study the coding delay and the average coding delay of random linear network codes (dense codes) over line networks with deterministic regular and Poisson transmission schedules. We consider both lossless networks and networks with Bernoulli losses. The upper bounds derived in this paper, which are in some cases more general, and in some other cases tighter, than the existing bou… ▽ More

    Submitted 1 February, 2012; originally announced February 2012.

    Comments: 15 pages, submitted to IEEE ISIT 2012

  44. arXiv:1105.6288  [pdf, ps, other

    cs.IT

    Analysis of Overlapped Chunked Codes with Small Chunks over Line Networks

    Authors: Anoosheh Heidarzadeh, Amir H. Banihashemi

    Abstract: To lower the complexity of network codes over packet line networks with arbitrary schedules, chunked codes (CC) and overlapped chunked codes (OCC) were proposed in earlier works. These codes have been previously analyzed for relatively large chunks. In this paper, we prove that for smaller chunks, CC and OCC asymptotically approach the capacity with an arbitrarily small but non-zero constant gap.… ▽ More

    Submitted 31 May, 2011; originally announced May 2011.

    Comments: 5 pages, 4 figures; accepted for presentation at ISIT'11

  45. arXiv:1105.5736  [pdf, ps, other

    cs.IT

    Network Codes with Overlap** Chunks over Line Networks: A Case for Linear-Time Codes

    Authors: Anoosheh Heidarzadeh, Amir H. Banihashemi

    Abstract: In this paper, the problem of designing network codes that are both communicationally and computationally efficient over packet line networks with worst-case schedules is considered. In this context, random linear network codes (dense codes) are asymptotically capacity-achieving, but require highly complex coding operations. To reduce the coding complexity, Maymounkov et al. proposed chunked codes… ▽ More

    Submitted 28 May, 2011; originally announced May 2011.

    Comments: 73 pages, 28 figures

  46. arXiv:1104.0224  [pdf, other

    cs.IT

    Density Evolution Analysis of Node-Based Verification-Based Algorithms in Compressive Sensing

    Authors: Yaser Eftekhari, Anoosheh Heidarzadeh, Amir H. Banihashemi, Ioannis Lambadaris

    Abstract: In this paper, we present a new approach for the analysis of iterative node-based verification-based (NB-VB) recovery algorithms in the context of compressive sensing. These algorithms are particularly interesting due to their low complexity (linear in the signal dimension $n$). The asymptotic analysis predicts the fraction of unverified signal elements at each iteration $\ell$ in the asymptotic r… ▽ More

    Submitted 1 April, 2011; originally announced April 2011.

    Comments: 70 Pages, Submitted to Trans. IT

  47. arXiv:1102.2928  [pdf, other

    cs.IT

    Density Evolution Analysis of Node-Based Verification-Based Algorithms in Compressed Sensing

    Authors: Yaser Eftekhari, Anoosheh Heidarzadeh, Amir H. Banihashemi, Ioannis Lambadaris

    Abstract: In this paper, we present a new approach for the analysis of iterative node-based verification-based (NB-VB) recovery algorithms in the context of compressive sensing. These algorithms are particularly interesting due to their low complexity (linear in the signal dimension $n$). The asymptotic analysis predicts the fraction of unverified signal elements at each iteration $\ell$ in the asymptotic r… ▽ More

    Submitted 1 June, 2011; v1 submitted 14 February, 2011; originally announced February 2011.

    Comments: 5 Pages, 2 Figures, Proc. ISIT 2011

  48. arXiv:0908.3234  [pdf, other

    cs.IT

    Overlapped Chunked Network Coding

    Authors: Anoosheh Heidarzadeh, Amir H. Banihashemi

    Abstract: Network coding is known to improve the throughput and the resilience to losses in most network scenarios. In a practical network scenario, however, the accurate modeling of the traffic is often too complex and/or infeasible. The goal is thus to design codes that perform close to the capacity of any network (with arbitrary traffic) efficiently. In this context, random linear network codes are kno… ▽ More

    Submitted 22 August, 2009; originally announced August 2009.

    Comments: 5 pages, 3 figures, submitted to ITW 2010, Cairo