-
Refuting approaches to the log-rank conjecture for XOR functions
Authors:
Hamed Hatami,
Kaave Hosseini,
Shachar Lovett,
Anthony Ostuni
Abstract:
The log-rank conjecture, a longstanding problem in communication complexity, has persistently eluded resolution for decades. Consequently, some recent efforts have focused on potential approaches for establishing the conjecture in the special case of XOR functions, where the communication matrix is lifted from a boolean function, and the rank of the matrix equals the Fourier sparsity of the functi…
▽ More
The log-rank conjecture, a longstanding problem in communication complexity, has persistently eluded resolution for decades. Consequently, some recent efforts have focused on potential approaches for establishing the conjecture in the special case of XOR functions, where the communication matrix is lifted from a boolean function, and the rank of the matrix equals the Fourier sparsity of the function, which is the number of its nonzero Fourier coefficients.
In this note, we refute two conjectures. The first has origins in Montanaro and Osborne (arXiv'09) and is considered in Tsang et al. (FOCS'13), and the second one is due to Mande and Sanyal (FSTTCS'20). These conjectures were proposed in order to improve the best-known bound of Lovett (STOC'14) regarding the log-rank conjecture in the special case of XOR functions. Both conjectures speculate that the set of nonzero Fourier coefficients of the boolean function has some strong additive structure. We refute these conjectures by constructing two specific boolean functions tailored to each.
△ Less
Submitted 2 May, 2024; v1 submitted 14 December, 2023;
originally announced December 2023.
-
Sparse graph counting and Kelley-Meka bounds for binary systems
Authors:
Yuval Filmus,
Hamed Hatami,
Kaave Hosseini,
Esty Kelman
Abstract:
In a recent breakthrough, Kelley and Meka (FOCS 2023) obtained a strong upper bound on the density of sets of integers without nontrivial three-term arithmetic progressions. In this work, we extend their result, establishing similar bounds for all linear patterns defined by binary systems of linear forms, where "binary" indicates that every linear form depends on exactly two variables. Prior to ou…
▽ More
In a recent breakthrough, Kelley and Meka (FOCS 2023) obtained a strong upper bound on the density of sets of integers without nontrivial three-term arithmetic progressions. In this work, we extend their result, establishing similar bounds for all linear patterns defined by binary systems of linear forms, where "binary" indicates that every linear form depends on exactly two variables. Prior to our work, no strong bounds were known for such systems even in the finite field model setting. A key ingredient in our proof is a graph counting lemma. The classical graph counting lemma, developed by Thomason (Random Graphs 1985) and Chung, Graham, and Wilson (Combinatorica 1989), is a fundamental tool in combinatorics. For a fixed graph $H$, it states that the number of copies of $H$ in a pseudorandom graph $G$ is similar to the number of copies of $H$ in a purely random graph with the same edge density as $G$. However, this lemma is only non-trivial when $G$ is a dense graph. In this work, we prove a graph counting lemma that is also effective when $G$ is sparse. Moreover, our lemma is well-suited for density increment arguments in additive number theory. As an immediate application, we obtain a strong bound for the Turán problem in abelian Cayley sum graphs: let $Γ$ be a finite abelian group with odd order. If a Cayley sum graph on $Γ$ does not contain any $r$-clique as a subgraph, it must have at most $2^{-Ω_r(\log^{1/16}|Γ|)}\cdot |Γ|^2$ edges. These results hinge on the technology developed by Kelley and Meka and the follow-up work by Kelley, Lovett, and Meka (STOC 2024).
△ Less
Submitted 16 May, 2024; v1 submitted 20 November, 2023;
originally announced November 2023.
-
Online Learning and Disambiguations of Partial Concept Classes
Authors:
Tsun-Ming Cheung,
Hamed Hatami,
Pooya Hatami,
Kaave Hosseini
Abstract:
In a recent article, Alon, Hanneke, Holzman, and Moran (FOCS '21) introduced a unifying framework to study the learnability of classes of partial concepts. One of the central questions studied in their work is whether the learnability of a partial concept class is always inherited from the learnability of some ``extension'' of it to a total concept class.
They showed this is not the case for PAC…
▽ More
In a recent article, Alon, Hanneke, Holzman, and Moran (FOCS '21) introduced a unifying framework to study the learnability of classes of partial concepts. One of the central questions studied in their work is whether the learnability of a partial concept class is always inherited from the learnability of some ``extension'' of it to a total concept class.
They showed this is not the case for PAC learning but left the problem open for the stronger notion of online learnability.
We resolve this problem by constructing a class of partial concepts that is online learnable, but no extension of it to a class of total concepts is online learnable (or even PAC learnable).
△ Less
Submitted 30 March, 2023;
originally announced March 2023.
-
Faking feature importance: A cautionary tale on the use of differentially-private synthetic data
Authors:
Oscar Giles,
Kasra Hosseini,
Grigorios Mingas,
Oliver Strickson,
Louise Bowler,
Camila Rangel Smith,
Harrison Wilde,
Jen Ning Lim,
Bilal Mateen,
Kasun Amarasinghe,
Rayid Ghani,
Alison Heppenstall,
Nik Lomax,
Nick Malleson,
Martin O'Reilly,
Sebastian Vollmerteke
Abstract:
Synthetic datasets are often presented as a silver-bullet solution to the problem of privacy-preserving data publishing. However, for many applications, synthetic data has been shown to have limited utility when used to train predictive models. One promising potential application of these data is in the exploratory phase of the machine learning workflow, which involves understanding, engineering a…
▽ More
Synthetic datasets are often presented as a silver-bullet solution to the problem of privacy-preserving data publishing. However, for many applications, synthetic data has been shown to have limited utility when used to train predictive models. One promising potential application of these data is in the exploratory phase of the machine learning workflow, which involves understanding, engineering and selecting features. This phase often involves considerable time, and depends on the availability of data. There would be substantial value in synthetic data that permitted these steps to be carried out while, for example, data access was being negotiated, or with fewer information governance restrictions. This paper presents an empirical analysis of the agreement between the feature importance obtained from raw and from synthetic data, on a range of artificially generated and real-world datasets (where feature importance represents how useful each feature is when predicting a the outcome). We employ two differentially-private methods to produce synthetic data, and apply various utility measures to quantify the agreement in feature importance as this varies with the level of privacy. Our results indicate that synthetic data can sometimes preserve several representations of the ranking of feature importance in simple settings but their performance is not consistent and depends upon a number of factors. Particular caution should be exercised in more nuanced real-world settings, where synthetic data can lead to differences in ranked feature importance that could alter key modelling decisions. This work has important implications for develo** synthetic versions of highly sensitive data sets in fields such as finance and healthcare.
△ Less
Submitted 2 March, 2022;
originally announced March 2022.
-
MapReader: A Computer Vision Pipeline for the Semantic Exploration of Maps at Scale
Authors:
Kasra Hosseini,
Daniel C. S. Wilson,
Kaspar Beelen,
Katherine McDonough
Abstract:
We present MapReader, a free, open-source software library written in Python for analyzing large map collections (scanned or born-digital). This library transforms the way historians can use maps by turning extensive, homogeneous map sets into searchable primary sources. MapReader allows users with little or no computer vision expertise to i) retrieve maps via web-servers; ii) preprocess and divid…
▽ More
We present MapReader, a free, open-source software library written in Python for analyzing large map collections (scanned or born-digital). This library transforms the way historians can use maps by turning extensive, homogeneous map sets into searchable primary sources. MapReader allows users with little or no computer vision expertise to i) retrieve maps via web-servers; ii) preprocess and divide them into patches; iii) annotate patches; iv) train, fine-tune, and evaluate deep neural network models; and v) create structured data about map content. We demonstrate how MapReader enables historians to interpret a collection of $\approx$16K nineteenth-century Ordnance Survey map sheets ($\approx$30.5M patches), foregrounding the challenge of translating visual markers into machine-readable data. We present a case study focusing on British rail infrastructure and buildings as depicted on these maps. We also show how the outputs from the MapReader pipeline can be linked to other, external datasets, which we use to evaluate as well as enrich and interpret the results. We release $\approx$62K manually annotated patches used here for training and evaluating the models.
△ Less
Submitted 30 November, 2021;
originally announced November 2021.
-
Neural Language Models for Nineteenth-Century English
Authors:
Kasra Hosseini,
Kaspar Beelen,
Giovanni Colavizza,
Mariona Coll Ardanuy
Abstract:
We present four types of neural language models trained on a large historical dataset of books in English, published between 1760-1900 and comprised of ~5.1 billion tokens. The language model architectures include static (word2vec and fastText) and contextualized models (BERT and Flair). For each architecture, we trained a model instance using the whole dataset. Additionally, we trained separate i…
▽ More
We present four types of neural language models trained on a large historical dataset of books in English, published between 1760-1900 and comprised of ~5.1 billion tokens. The language model architectures include static (word2vec and fastText) and contextualized models (BERT and Flair). For each architecture, we trained a model instance using the whole dataset. Additionally, we trained separate instances on text published before 1850 for the two static models, and four instances considering different time slices for BERT. Our models have already been used in various downstream tasks where they consistently improved performance. In this paper, we describe how the models have been created and outline their reuse potential.
△ Less
Submitted 24 May, 2021;
originally announced May 2021.
-
A Deep Learning Approach to Geographical Candidate Selection through Toponym Matching
Authors:
Mariona Coll Ardanuy,
Kasra Hosseini,
Katherine McDonough,
Amrey Krause,
Daniel van Strien,
Federico Nanni
Abstract:
Recognizing toponyms and resolving them to their real-world referents is required for providing advanced semantic access to textual data. This process is often hindered by the high degree of variation in toponyms. Candidate selection is the task of identifying the potential entities that can be referred to by a toponym previously recognized. While it has traditionally received little attention in…
▽ More
Recognizing toponyms and resolving them to their real-world referents is required for providing advanced semantic access to textual data. This process is often hindered by the high degree of variation in toponyms. Candidate selection is the task of identifying the potential entities that can be referred to by a toponym previously recognized. While it has traditionally received little attention in the research community, it has been shown that candidate selection has a significant impact on downstream tasks (i.e. entity resolution), especially in noisy or non-standard text. In this paper, we introduce a flexible deep learning method for candidate selection through toponym matching, using state-of-the-art neural network architectures. We perform an intrinsic toponym matching evaluation based on several new realistic datasets, which cover various challenging scenarios (cross-lingual and regional variations, as well as OCR errors). We report its performance on candidate selection in the context of the downstream task of toponym resolution, both on existing datasets and on a new manually-annotated resource of nineteenth-century English OCR'd text.
△ Less
Submitted 22 September, 2020; v1 submitted 17 September, 2020;
originally announced September 2020.
-
Continuous $K$-$g$-frames in Hilbert $C^*$-modules
Authors:
Jahangir Cheshmavar,
Javad Baradaran,
Seyed Kamel Hosseini
Abstract:
This study aims at combining the concepts of $g$-frame and $K$-frame for a Hilbert $C^*$-module $U$, for an operator $K \in End^*_A(U)$, where $End^*_A(U)$ contains all adjointable $A$-linear maps on $U$. As a result, continuous $K$-$g$-frames for Hilbert $C^*$-modules are introduced and studied. Subsequently, some characterizations of continuous $K$-$g$-frames in Hilbert $C^*$-modules are proved.…
▽ More
This study aims at combining the concepts of $g$-frame and $K$-frame for a Hilbert $C^*$-module $U$, for an operator $K \in End^*_A(U)$, where $End^*_A(U)$ contains all adjointable $A$-linear maps on $U$. As a result, continuous $K$-$g$-frames for Hilbert $C^*$-modules are introduced and studied. Subsequently, some characterizations of continuous $K$-$g$-frames in Hilbert $C^*$-modules are proved. Next, continuous $K$-$g$-dual of a $c$-$K$-$g$-frame is introduced. Finally, some results, particularly, the existence of continuous $K$-$g$-dual, are derived.
△ Less
Submitted 16 March, 2022; v1 submitted 8 June, 2020;
originally announced June 2020.
-
Living Machines: A study of atypical animacy
Authors:
Mariona Coll Ardanuy,
Federico Nanni,
Kaspar Beelen,
Kasra Hosseini,
Ruth Ahnert,
Jon Lawrence,
Katherine McDonough,
Giorgia Tolfo,
Daniel CS Wilson,
Barbara McGillivray
Abstract:
This paper proposes a new approach to animacy detection, the task of determining whether an entity is represented as animate in a text. In particular, this work is focused on atypical animacy and examines the scenario in which typically inanimate objects, specifically machines, are given animate attributes. To address it, we have created the first dataset for atypical animacy detection, based on n…
▽ More
This paper proposes a new approach to animacy detection, the task of determining whether an entity is represented as animate in a text. In particular, this work is focused on atypical animacy and examines the scenario in which typically inanimate objects, specifically machines, are given animate attributes. To address it, we have created the first dataset for atypical animacy detection, based on nineteenth-century sentences in English, with machines represented as either animate or inanimate. Our method builds on recent innovations in language modeling, specifically BERT contextualized word embeddings, to better capture fine-grained contextual properties of words. We present a fully unsupervised pipeline, which can be easily adapted to different contexts, and report its performance on an established animacy dataset and our newly introduced resource. We show that our method provides a substantially more accurate characterization of atypical animacy, especially when applied to highly complex forms of language use.
△ Less
Submitted 19 November, 2020; v1 submitted 22 May, 2020;
originally announced May 2020.
-
The Poisson ratio of the cellular actin cortex is frequency-dependent
Authors:
Marcel Mokbel,
Kamran Hosseini,
Sebastian Aland,
Elisabeth Fischer-Friedrich
Abstract:
Cell shape changes are vital for many physiological processes such as cell proliferation, cell migration and morphogenesis. They emerge from an orchestrated interplay of active cellular force generation and passive cellular force response - both crucially influenced by the actin cytoskeleton. To model cellular force response and deformation, cell mechanical models commonly describe the actin cytos…
▽ More
Cell shape changes are vital for many physiological processes such as cell proliferation, cell migration and morphogenesis. They emerge from an orchestrated interplay of active cellular force generation and passive cellular force response - both crucially influenced by the actin cytoskeleton. To model cellular force response and deformation, cell mechanical models commonly describe the actin cytoskeleton as a contractile isotropic incompressible material. However, in particular at slow frequencies, there is no compelling reason to assume incompressibility as the water content of the cytoskeleton may change. Here we challenge the assumption of incompressibility by comparing computer simulations of an isotropic actin cortex with tunable Poisson ratio to measured cellular force response. Comparing simulation results and experimental data, we determine the Poisson ratio of the cortex in a frequency-dependent manner. We find that the Poisson ratio of the cortex decreases with frequency likely due to actin cortex turnover leading to an over-proportional decrease of shear stiffness at larger time scales. We thus report a trend of the Poisson ratio similar to that of glassy materials, where the frequency-dependence of jamming leads to an analogous effect.
△ Less
Submitted 14 December, 2019; v1 submitted 10 December, 2019;
originally announced December 2019.
-
Viewing *-multiplication operators between Orlics spaces
Authors:
Jahangir Cheshmavar,
Seyed Kamel Hosseini
Abstract:
In this paper, Lambert multipliers acting between Orlicz spaces are characterized based on conditional expectation operators. Also, we give necessary and sufficient conditions to *-multiplication operators to be closed range. Finally, the necessary condition under which a *-multiplication operator to be Fredholm operator is investigated.
In this paper, Lambert multipliers acting between Orlicz spaces are characterized based on conditional expectation operators. Also, we give necessary and sufficient conditions to *-multiplication operators to be closed range. Finally, the necessary condition under which a *-multiplication operator to be Fredholm operator is investigated.
△ Less
Submitted 4 January, 2019; v1 submitted 15 October, 2018;
originally announced October 2018.
-
Fusion Cross Section of $\rm T(d,n)^{4}He$ and $\rm ^{3}He(d,p)^{4}He$ Reactions by Four Parameters Formula
Authors:
T. Koohrokhi,
A. M. Izadpanah,
S. K. Hosseini
Abstract:
Fusion cross sections of light nuclei are calculated by a complex potential and taking into account of conservation of angular momentum and parity. The nuclear potential is assumed to be as simple as a spherical complex square well with a rigid core. Then, the nuclear phase shift is extracted from continuity condition of inverse of the logarithmic derivative of the wave functions as a complex quan…
▽ More
Fusion cross sections of light nuclei are calculated by a complex potential and taking into account of conservation of angular momentum and parity. The nuclear potential is assumed to be as simple as a spherical complex square well with a rigid core. Then, the nuclear phase shift is extracted from continuity condition of inverse of the logarithmic derivative of the wave functions as a complex quantity. The quantum tunneling probability and cross section are obtained via real and complex components of nuclear phase shift. The obtained results for the two most important light nuclei reactions, $\rm T(d,n)^{4}He$, $\rm ^{3}He(d,p)^{4}He$ are compared with other theoretical formulas and experimental data. Despite that the theory is simplified as much as possible and the complexities and details of nuclear interactions has been ignored, excellent agreements with experimental data are achieved.
△ Less
Submitted 14 October, 2018;
originally announced October 2018.
-
Optimality of Linear Sketching under Modular Updates
Authors:
Kaave Hosseini,
Shachar Lovett,
Grigory Yaroslavtsev
Abstract:
We study the relation between streaming algorithms and linear sketching algorithms, in the context of binary updates. We show that for inputs in $n$ dimensions, the existence of efficient streaming algorithms which can process $Ω(n^2)$ updates implies efficient linear sketching algorithms with comparable cost. This improves upon the previous work of Li, Nguyen and Woodruff [LNW14] and Ai, Hu, Li a…
▽ More
We study the relation between streaming algorithms and linear sketching algorithms, in the context of binary updates. We show that for inputs in $n$ dimensions, the existence of efficient streaming algorithms which can process $Ω(n^2)$ updates implies efficient linear sketching algorithms with comparable cost. This improves upon the previous work of Li, Nguyen and Woodruff [LNW14] and Ai, Hu, Li and Woodruff [AHLW16] which required a triple-exponential number of updates to achieve a similar result for updates over integers. We extend our results to updates modulo $p$ for integers $p \ge 2$, and to approximation instead of exact computation.
△ Less
Submitted 24 September, 2018;
originally announced September 2018.
-
Optimizing the MIMO Cellular Downlink: Multiplexing, Diversity, or Interference Nulling?
Authors:
Kianoush Hosseini,
Caiyi Zhu,
Ahmad Khan,
Raviraj S. Adve,
Wei Yu
Abstract:
A base-station (BS) equipped with multiple antennas can use its spatial dimensions in three different ways: (1) to serve multiple users, thereby achieving a multiplexing gain, (2) to provide spatial diversity in order to improve user rates and (3) to null interference in neighboring cells. This paper answers the following question: What is the optimal balance between these three competing benefits…
▽ More
A base-station (BS) equipped with multiple antennas can use its spatial dimensions in three different ways: (1) to serve multiple users, thereby achieving a multiplexing gain, (2) to provide spatial diversity in order to improve user rates and (3) to null interference in neighboring cells. This paper answers the following question: What is the optimal balance between these three competing benefits? We answer this question in the context of the downlink of a cellular network, where multi-antenna BSs serve multiple single-antenna users using zero-forcing beamforming with equal power assignment, while nulling interference at a subset of out-of-cell users. Any remaining spatial dimensions provide transmit diversity for the scheduled users. Utilizing tools from stochastic geometry, we show that, surprisingly, to maximize the per-BS ergodic sum rate, with an optimal allocation of spatial resources, interference nulling does not provide a tangible benefit. The strategy of avoiding inter-cell interference nulling, reserving some fraction of spatial resources for multiplexing and using the rest to provide diversity, is already close-to-optimal in terms of the sum-rate. However, interference nulling does bring significant benefit to cell-edge users, particularly when adopting a range-adaptive nulling strategy where the size of the cooperating BS cluster is increased for cell-edge users.
△ Less
Submitted 21 August, 2018;
originally announced August 2018.
-
A bilinear Bogolyubov-Ruzsa lemma with poly-logarithmic bounds
Authors:
Kaave Hosseini,
Shachar Lovett
Abstract:
The Bogolyubov-Ruzsa lemma, in particular the quantitative bounds obtained by Sanders, plays a central role in obtaining effective bounds for the inverse $U^3$ theorem for the Gowers norms. Recently, Gowers and Milićević applied a bilinear Bogolyubov-Ruzsa lemma as part of a proof of the inverse $U^4$ theorem with effective bounds. The goal of this note is to obtain quantitative bounds for the bil…
▽ More
The Bogolyubov-Ruzsa lemma, in particular the quantitative bounds obtained by Sanders, plays a central role in obtaining effective bounds for the inverse $U^3$ theorem for the Gowers norms. Recently, Gowers and Milićević applied a bilinear Bogolyubov-Ruzsa lemma as part of a proof of the inverse $U^4$ theorem with effective bounds. The goal of this note is to obtain quantitative bounds for the bilinear Bogolyubov-Ruzsa lemma which are similar to those obtained by Sanders for the Bogolyubov-Ruzsa lemma.
We show that if a set $A \subset \mathbb{F}_p^n \times \mathbb{F}_p^n$ has density $α$, then after a constant number of horizontal and vertical sums, the set $A$ would contain a bilinear structure of co-dimension $r=\log^{O(1)} α^{-1}$. This improves the results of Gowers and Milićević which obtained similar results with a weaker bound of $r=\exp(\exp(\log^{O(1)} α^{-1}))$ and by Bienvenu and Lê which obtained $r=\exp(\exp(\exp(\log^{O(1)} α^{-1})))$.
△ Less
Submitted 12 June, 2019; v1 submitted 15 August, 2018;
originally announced August 2018.
-
Torus polynomials: an algebraic approach to ACC lower bounds
Authors:
Abhishek Bhrushundi,
Kaave Hosseini,
Shachar Lovett,
Sankeerth Rao
Abstract:
We propose an algebraic approach to proving circuit lower bounds for ACC0 by defining and studying the notion of torus polynomials. We show how currently known polynomial-based approximation results for AC0 and ACC0 can be reformulated in this framework, implying that ACC0 can be approximated by low-degree torus polynomials. Furthermore, as a step towards proving ACC0 lower bounds for the majority…
▽ More
We propose an algebraic approach to proving circuit lower bounds for ACC0 by defining and studying the notion of torus polynomials. We show how currently known polynomial-based approximation results for AC0 and ACC0 can be reformulated in this framework, implying that ACC0 can be approximated by low-degree torus polynomials. Furthermore, as a step towards proving ACC0 lower bounds for the majority function via our approach, we show that MAJORITY cannot be approximated by low-degree symmetric torus polynomials. We also pose several open problems related to our framework.
△ Less
Submitted 28 February, 2019; v1 submitted 22 April, 2018;
originally announced April 2018.
-
A multiphase meshfree method for continuum-based modeling of dry and submerged granular flows
Authors:
Ehsan Jafari-Nodoushan,
Ahmad Shakibaeinia,
Khosrow Hosseini
Abstract:
We develop and fully characterize a meshfree Lagrangian (particle) model for continuum-based numerical modeling of dry and submerged granular flows. The multiphase system of the granular material and the ambient fluid is treated as a multi-density multi-viscosity system in which the viscous behaviour of the granular phase is predicted using a regularized viscoplastic rheological model with a press…
▽ More
We develop and fully characterize a meshfree Lagrangian (particle) model for continuum-based numerical modeling of dry and submerged granular flows. The multiphase system of the granular material and the ambient fluid is treated as a multi-density multi-viscosity system in which the viscous behaviour of the granular phase is predicted using a regularized viscoplastic rheological model with a pressure-dependent yield criterion. The numerical technique is based on the Weakly-Compressible Moving Particle Semi-implicit (WC-MPS) method. The required algorithms for approximation of the effective viscosity, effective pressure, and shear stress divergence are introduced. The capability of the model in dealing with the viscoplasticity is validated for the viscoplastic Poiseuille flow between parallel plates. The model is then applied and fully characterized (with respect to the various rheological and numerical parameters) for dry and submerged granular collapses with different aspect ratios. The numerical results are evaluated in comparison with the available experimental measurement in literature as well as some complementary experimental measurements, performed in this study. The results show the capabilities of the presented model and its potential to deal with a broad range of dry and submerged granular flows. It also revealed the impotent role of the regularization, effective pressure, and shear stress divergence calculation methods on the accuracy of the results.
△ Less
Submitted 1 November, 2017; v1 submitted 2 August, 2017;
originally announced August 2017.
-
Lambert Multipliers Between $L^P$-spaces as a Banach Algebra
Authors:
Jahangir Cheshmavar,
Seyed Kamel Hosseini
Abstract:
For 1 ⤠p < â, it is known that the set K^*_p contains of all Lambert multipliers acting between L^p-spaces is a Banach space. In this study, we introduce a new induced norm by conditional expectation operators to show that K^*_p is a commutative Banach algebra with respect to this norm. Furthermore, in main result, the Fredholm *-multiplication operators on L^p-spaces are characterized, and…
▽ More
For 1 ⤠p < â, it is known that the set K^*_p contains of all Lambert multipliers acting between L^p-spaces is a Banach space. In this study, we introduce a new induced norm by conditional expectation operators to show that K^*_p is a commutative Banach algebra with respect to this norm. Furthermore, in main result, the Fredholm *-multiplication operators on L^p-spaces are characterized, and some more results are obtained.
△ Less
Submitted 23 May, 2020; v1 submitted 20 September, 2016;
originally announced September 2016.
-
A Stochastic Analysis of Network MIMO Systems
Authors:
Kianoush Hosseini,
Wei Yu,
Raviraj S. Adve
Abstract:
This paper quantifies the benefits and limitations of cooperative communications by providing a statistical analysis of the downlink in network multiple-input multiple-output (MIMO) systems. We consider an idealized model where the multiple-antenna base-stations (BSs) are distributed according to a homogeneous Poisson point process and cooperate by forming disjoint clusters. We assume that perfect…
▽ More
This paper quantifies the benefits and limitations of cooperative communications by providing a statistical analysis of the downlink in network multiple-input multiple-output (MIMO) systems. We consider an idealized model where the multiple-antenna base-stations (BSs) are distributed according to a homogeneous Poisson point process and cooperate by forming disjoint clusters. We assume that perfect channel state information (CSI) is available at the cooperating BSs without any overhead. Multiple single-antenna users are served using zero-forcing beamforming with equal power allocation across the beams. For such a system, we obtain tractable, but accurate, approximations of the signal power and inter-cluster interference power distributions and derive a computationally efficient expression for the achievable per-BS ergodic sum rate using tools from stochastic geometry. This expression allows us to obtain the optimal loading factor, i.e., the ratio between the number of scheduled users and the number of BS antennas, that maximizes the per-BS ergodic sum rate. Further, it allows us to quantify the performance improvement of network MIMO systems as a function of the cooperating cluster size. We show that to perform zero-forcing across the distributed set of BSs within the cluster, the network MIMO system introduces a penalty in received signal power. Along with the inevitable out-of-cluster interference, we show that the per-BS ergodic sum rate of a network MIMO system does not approach that of an isolated cell even at unrealistically large cluster sizes. Nevertheless, network MIMO does provide significant rate improvement as compared to uncoordinated single-cell processing even at relatively modest cluster sizes.
△ Less
Submitted 5 April, 2016;
originally announced April 2016.
-
On the structure of the spectrum of small sets
Authors:
Kaave Hosseini,
Shachar Lovett
Abstract:
Let $G$ be a finite abelian group and $A$ a subset of $G$. The spectrum of $A$ is the set of its large Fourier coefficients. Known combinatorial results on the structure of spectrum, such as Chang's theorem, become trivial in the regime $|A| = |G|^α$ whenever $α\le c$, where $c \ge 1/2$ is some absolute constant. On the other hand, there are statistical results, which apply only to a noticeable fr…
▽ More
Let $G$ be a finite abelian group and $A$ a subset of $G$. The spectrum of $A$ is the set of its large Fourier coefficients. Known combinatorial results on the structure of spectrum, such as Chang's theorem, become trivial in the regime $|A| = |G|^α$ whenever $α\le c$, where $c \ge 1/2$ is some absolute constant. On the other hand, there are statistical results, which apply only to a noticeable fraction of the elements, which give nontrivial bounds even to much smaller sets. One such theorem (due to Bourgain) goes as follows. For a noticeable fraction of pairs $γ_1,γ_2 $ in the spectrum, $γ_1+γ_2$ belongs to the spectrum of the same set with a smaller threshold. Here we show that this result can be made combinatorial by restricting to a large subset. That is, we show that for any set $A$ there exists a large subset $A'$, such that the sumset of the spectrum of $A'$ has bounded size. Our results apply to sets of size $|A| = |G|^α$ for any constant $α>0$, and even in some sub-constant regime.
△ Less
Submitted 4 April, 2015;
originally announced April 2015.
-
Large-Scale MIMO versus Network MIMO for Multicell Interference Mitigation
Authors:
Kianoush Hosseini,
Wei Yu,
Raviraj S. Adve
Abstract:
This paper compares two important downlink multicell interference mitigation techniques, namely, large-scale (LS) multiple-input multiple-output (MIMO) and network MIMO. We consider a cooperative wireless cellular system operating in time-division duplex (TDD) mode, wherein each cooperating cluster includes $B$ base-stations (BSs), each equipped with multiple antennas and scheduling $K$ single-ant…
▽ More
This paper compares two important downlink multicell interference mitigation techniques, namely, large-scale (LS) multiple-input multiple-output (MIMO) and network MIMO. We consider a cooperative wireless cellular system operating in time-division duplex (TDD) mode, wherein each cooperating cluster includes $B$ base-stations (BSs), each equipped with multiple antennas and scheduling $K$ single-antenna users. In an LS-MIMO system, each BS employs $BM$ antennas not only to serve its scheduled users, but also to null out interference caused to the other users within the cooperating cluster using zero-forcing (ZF) beamforming. In a network MIMO system, each BS is equipped with only $M$ antennas, but interference cancellation is realized by data and channel state information exchange over the backhaul links and joint downlink transmission using ZF beamforming. Both systems are able to completely eliminate intra-cluster interference and to provide the same number of spatial degrees of freedom per user. Assuming the uplink-downlink channel reciprocity provided by TDD, both systems are subject to identical channel acquisition overhead during the uplink pilot transmission stage. Further, the available sum power at each cluster is fixed and assumed to be equally distributed across the downlink beams in both systems. Building upon the channel distribution functions and using tools from stochastic ordering, this paper shows, however, that from a performance point of view, users experience better quality of service, averaged over small-scale fading, under an LS-MIMO system than a network MIMO system. Numerical simulations for a multicell network reveal that this conclusion also holds true with regularized ZF beamforming scheme. Hence, given the likely lower cost of adding excess number of antennas at each BS, LS-MIMO could be the preferred route toward interference mitigation in cellular networks.
△ Less
Submitted 22 July, 2014;
originally announced July 2014.
-
An Improved Lower Bound for Arithmetic Regularity
Authors:
Kaave Hosseini,
Shachar Lovett,
Guy Moshkovitz,
Asaf Shapira
Abstract:
The arithmetic regularity lemma due to Green [GAFA 2005] is an analogue of the famous Szemer{é}di regularity lemma in graph theory. It shows that for any abelian group $G$ and any bounded function $f:G \to [0,1]$, there exists a subgroup $H \le G$ of bounded index such that, when restricted to most cosets of $H$, the function $f$ is pseudorandom in the sense that all its nontrivial Fourier coeffic…
▽ More
The arithmetic regularity lemma due to Green [GAFA 2005] is an analogue of the famous Szemer{é}di regularity lemma in graph theory. It shows that for any abelian group $G$ and any bounded function $f:G \to [0,1]$, there exists a subgroup $H \le G$ of bounded index such that, when restricted to most cosets of $H$, the function $f$ is pseudorandom in the sense that all its nontrivial Fourier coefficients are small. Quantitatively, if one wishes to obtain that for $1-ε$ fraction of the cosets, the nontrivial Fourier coefficients are bounded by $ε$, then Green shows that $|G/H|$ is bounded by a tower of twos of height $1/ε^3$. He also gives an example showing that a tower of height $Ω(\log 1/ε)$ is necessary. Here, we give an improved example, showing that a tower of height $Ω(1/ε)$ is necessary.
△ Less
Submitted 17 May, 2014;
originally announced May 2014.
-
Resource Allocation for Selection-Based Cooperative OFDM Networks
Authors:
Kianoush Hosseini,
Raviraj S. Adve
Abstract:
This paper considers resource allocation to achieve max-min fairness in a selection-based orthogonal frequency division multiplexing network wherein source nodes are assisted by fixed decode-and-forward relays. The joint problem of transmission strategy selection, relay assignment, and power allocation is a combinatorial problem with exponential complexity. To develop effective solutions to these…
▽ More
This paper considers resource allocation to achieve max-min fairness in a selection-based orthogonal frequency division multiplexing network wherein source nodes are assisted by fixed decode-and-forward relays. The joint problem of transmission strategy selection, relay assignment, and power allocation is a combinatorial problem with exponential complexity. To develop effective solutions to these questions, we approach these problems in two stages. The first set of problems assume ideal source-relay channels; this simplification helps illustrate our general methodology and also why our solutions provide tight bounds. We then formulate the general problem of transmission strategy selection, relay assignment, and power allocation at the sources and relays considering all communication channels, i.e., finite power source-relay channels. In both sets of problems mentioned so far, transmissions over subcarriers are assumed to be independent. However, given the attendant problems of synchronization and the implementation using a FFT/IFFT pair, resource allocation at the subcarrier level appears impractical. We, therefore, consider resource allocation at the level of an entire OFDM block. While optimal resource management requires an exhaustive search, we develop tight bounds with lower complexity. Finally, we propose a decentralized block-based relaying scheme. Simulation results using the COST-231 channel model show that this scheme yields close-to-optimal performance while offering many computational benefits.
△ Less
Submitted 13 December, 2011; v1 submitted 29 April, 2011;
originally announced April 2011.
-
Glass transition in the charge density wave system K$_{0.3}$MoO$_{3}$
Authors:
D. Starešinić,
K. Hosseini,
W. Brütting,
K. Biljaković,
E. Riedel,
S. van Smaalen
Abstract:
Low frequency dielectric spectroscopy and thermally stimulated discharge measurements of charge density wave (CDW) system K$_{0.3}$MoO$_{3}$ are presented. Below 80 K two distinct relaxational processes are observed, which freeze at finite temperatures bearing close resemblance to the phenomenology of the dielectric response of glasses. We compare our results to the case of o-TaS$_{3}$ in which…
▽ More
Low frequency dielectric spectroscopy and thermally stimulated discharge measurements of charge density wave (CDW) system K$_{0.3}$MoO$_{3}$ are presented. Below 80 K two distinct relaxational processes are observed, which freeze at finite temperatures bearing close resemblance to the phenomenology of the dielectric response of glasses. We compare our results to the case of o-TaS$_{3}$ in which the glass transition on the level of CDW superstructure has been recently reported\cite{Star02} and discuss the possibility that it is a universal feature of CDW systems.
△ Less
Submitted 4 September, 2003;
originally announced September 2003.