Skip to main content

Showing 1–38 of 38 results for author: Khalaj, B H

.
  1. arXiv:2401.00631  [pdf, other

    cs.NI cs.AI eess.SP

    Coordinated Deep Neural Networks: A Versatile Edge Offloading Algorithm

    Authors: Alireza Maleki, Hamed Shah-Mansouri, Babak H. Khalaj

    Abstract: As artificial intelligence (AI) applications continue to expand, there is a growing need for deep neural network (DNN) models. Although DNN models deployed at the edge are promising to provide AI as a service with low latency, their cooperation is yet to be explored. In this paper, we consider the DNN service providers share their computing resources as well as their models' parameters and allow o… ▽ More

    Submitted 31 December, 2023; originally announced January 2024.

  2. arXiv:2310.00027  [pdf, ps, other

    stat.ML cs.LG

    Out-Of-Domain Unlabeled Data Improves Generalization

    Authors: Amir Hossein Saberi, Amir Najafi, Alireza Heidari, Mohammad Hosein Movasaghinia, Abolfazl Motahari, Babak H. Khalaj

    Abstract: We propose a novel framework for incorporating unlabeled data into semi-supervised classification problems, where scenarios involving the minimization of either i) adversarially robust or ii) non-robust loss functions have been considered. Notably, we allow the unlabeled samples to deviate slightly (in total variation sense) from the in-domain distribution. The core idea behind our framework is to… ▽ More

    Submitted 15 February, 2024; v1 submitted 28 September, 2023; originally announced October 2023.

    Comments: Published at ICLR 2024 (Spotlight), 29 pages, no figures

  3. arXiv:2308.02892  [pdf, ps, other

    cs.IT cs.LG eess.IV

    Secure Deep-JSCC Against Multiple Eavesdroppers

    Authors: Seyyed Amirhossein Ameli Kalkhoran, Mehdi Letafati, Ecenaz Erdemir, Babak Hossein Khalaj, Hamid Behroozi, Deniz Gündüz

    Abstract: In this paper, a generalization of deep learning-aided joint source channel coding (Deep-JSCC) approach to secure communications is studied. We propose an end-to-end (E2E) learning-based approach for secure communication against multiple eavesdroppers over complex-valued fading channels. Both scenarios of colluding and non-colluding eavesdroppers are studied. For the colluding strategy, eavesdropp… ▽ More

    Submitted 5 August, 2023; originally announced August 2023.

  4. arXiv:2301.01221  [pdf, other

    cs.CR

    Unlocking Metaverse-as-a-Service The three pillars to watch: Privacy and Security, Edge Computing, and Blockchain

    Authors: Vesal Ahsani, Ali Rahimi, Mehdi Letafati, Babak Hossein Khalaj

    Abstract: In this article, the authors provide a comprehensive overview on three core pillars of metaverse-as-a-service (MaaS) platforms; privacy and security, edge computing, and blockchain technology. The article starts by investigating security aspects for the wireless access to the metaverse. Then it goes through the privacy and security issues inside the metaverse from data-centric, learning-centric, a… ▽ More

    Submitted 11 January, 2023; v1 submitted 1 January, 2023; originally announced January 2023.

    Comments: 21 pages, 4 figures, added references for section 3-A

  5. arXiv:2211.14672  [pdf, other

    cs.IT

    Multi-Transmitter Coded Caching with Secure Delivery over Linear Networks -- Extended Version

    Authors: Mohammad Javad Sojdeh, Mehdi Letafati, Seyed Pooya Shariatpanahi, Babak Hossein Khalaj

    Abstract: In this paper, we consider multiple cache-enabled end-users connected to multiple transmitters through a linear network. We also prevent a totally passive eavesdropper, who sniffs the packets in the delivery phase, from obtaining any information about the original files in cache-aided networks. Three different secure centralized multi-transmitter coded caching scenarios namely, secure multi-transm… ▽ More

    Submitted 26 November, 2022; originally announced November 2022.

  6. arXiv:2209.05953  [pdf, ps, other

    stat.ML cs.LG

    Sample Complexity Bounds for Learning High-dimensional Simplices in Noisy Regimes

    Authors: Amir Hossein Saberi, Amir Najafi, Seyed Abolfazl Motahari, Babak H. Khalaj

    Abstract: In this paper, we find a sample complexity bound for learning a simplex from noisy samples. Assume a dataset of size $n$ is given which includes i.i.d. samples drawn from a uniform distribution over an unknown simplex in $\mathbb{R}^K$, where samples are assumed to be corrupted by a multi-variate additive Gaussian noise of an arbitrary magnitude. We prove the existence of an algorithm that with hi… ▽ More

    Submitted 28 April, 2023; v1 submitted 9 September, 2022; originally announced September 2022.

    Comments: Accepted for ICML 2023; 27 pages

  7. arXiv:2104.09326  [pdf, ps, other

    cs.IT

    On Learning-Assisted Content-Based Secure Image Transmission for Delay-Aware Systems with Randomly-Distributed Eavesdroppers -- Extended Version

    Authors: Mehdi Letafati, Hamid Behroozi, Babak Hossein Khalaj, Eduard A. Jorswieck

    Abstract: In this paper, a learning-aided content-based wireless image transmission scheme is proposed, where a multi-antenna-aided source wishes to securely deliver an image to a legitimate destination in the presence of randomly distributed eavesdroppers (Eves). We take into account the fact that not all regions of an image have the same importance from the security perspective. Hence, we propose a transm… ▽ More

    Submitted 19 April, 2021; originally announced April 2021.

  8. arXiv:2008.06905  [pdf, ps, other

    eess.SP

    DRL-Based QoS-Aware Resource Allocation Scheme for Coexistence of Licensed and Unlicensed Users in LTE and Beyond

    Authors: Mahdi Nouri Boroujerdi, Mohammad Akbari, Roghayeh Joda, Mohammad Ali Maddah-Ali, Babak Hossein Khalaj

    Abstract: In this paper, we employ deep reinforcement learning to develop a novel radio resource allocation and packet scheduling scheme for different Quality of Service (QoS) requirements applicable to LTEadvanced and 5G networks. In addition, regarding the scarcity of spectrum in below 6GHz bands, the proposed algorithm dynamically allocates the resource blocks (RBs) to licensed users in a way to mostly p… ▽ More

    Submitted 16 August, 2020; originally announced August 2020.

  9. arXiv:2007.13230  [pdf, other

    cs.NI

    Energy Efficiency Through Joint Routing and Function Placement in Different Modes of SDN/NFV Networks

    Authors: Reza Moosavi, Saeedeh Parsaeefard, Mohammad Ali Maddah-Ali, Vahid Shah-Mansouri, Babak Hossein Khalaj, Mehdi Bennis

    Abstract: Network function virtualization (NFV) and software defined networking (SDN) are two promising technologies to enable 5G and 6G services and achieve cost reduction, network scalability, and deployment flexibility. However, migration to full SDN/NFV networks in order to serve these services is a time consuming process and costly for mobile operators. This paper focuses on energy efficiency during… ▽ More

    Submitted 17 October, 2020; v1 submitted 26 July, 2020; originally announced July 2020.

  10. arXiv:1904.06839  [pdf

    eess.SP

    Minimizing Uplink Delay in Delay-Sensitive 5G CRAN platforms

    Authors: Ali Ataie, Borna Kanaanian, Babak H. Khalaj

    Abstract: In this paper, we consider the problem of minimizing the uplink delays of users in a 5G cellular network. Such cellular network is based on a Cloud Radio Access Network (CRAN) architecture with limited fronthaul capacity, where our goal is to minimize delays of all users through an optimal resource allocation. Earlier works minimize average delay of each user assuming same transmit power for all u… ▽ More

    Submitted 15 April, 2019; originally announced April 2019.

    Comments: 15 pages,4 figures

  11. arXiv:1901.06698  [pdf, other

    cs.IT

    Cloud-Aided Interference Management with Cache-Enabled Edge Nodes and Users

    Authors: Seyed Pooya Shariatpanahi, **g**g Zhang, Osvaldo Simeone, Babak Hossein Khalaj, Mohammad-Ali Maddah-Ali

    Abstract: This paper considers a cloud-RAN architecture with cache-enabled multi-antenna Edge Nodes (ENs) that deliver content to cache-enabled end-users. The ENs are connected to a central server via limited-capacity fronthaul links, and, based on the information received from the central server and the cached contents, they transmit on the shared wireless medium to satisfy users' requests. By leveraging c… ▽ More

    Submitted 20 January, 2019; originally announced January 2019.

    Comments: 9 pages, 3 figures, submitted

  12. arXiv:1810.07845  [pdf, other

    cs.LG stat.ML

    On Statistical Learning of Simplices: Unmixing Problem Revisited

    Authors: Amir Najafi, Saeed Ilchi, Amir H. Saberi, Seyed Abolfazl Motahari, Babak H. Khalaj, Hamid R. Rabiee

    Abstract: We study the sample complexity of learning a high-dimensional simplex from a set of points uniformly sampled from its interior. Learning of simplices is a long studied problem in computer science and has applications in computational biology and remote sensing, mostly under the name of `spectral unmixing'. We theoretically show that a sufficient sample complexity for reliable learning of a $K$-dim… ▽ More

    Submitted 12 August, 2020; v1 submitted 17 October, 2018; originally announced October 2018.

    Comments: 32 pages

  13. arXiv:1807.08646  [pdf, other

    cs.IT

    $K$--User Interference Channel with Backhaul Cooperation: DoF vs. Backhaul Load Trade--Off

    Authors: Borna Kananian, Mohammad Ali Maddah-ali, Babak Hossein Khalaj

    Abstract: In this paper, we consider multiple-antenna $K$-user interference channels with backhaul collaboration in one side (among the transmitters or among the receivers) and investigate the trade-off between the rate in the channel versus the communication load in the backhaul. In this investigation, we focus on a first order approximation result, where the rate of the wireless channel is measured by the… ▽ More

    Submitted 23 July, 2018; originally announced July 2018.

  14. arXiv:1807.03337  [pdf, other

    cs.IT

    Optimum Transmission Delay for Function Computation in NFV-based Networks: the role of Network Coding and Redundant Computing

    Authors: Behrooz Tahmasebi, Mohammad Ali Maddah-Ali, Saeedeh Parsaeefard, Babak Hossein Khalaj

    Abstract: In this paper, we study the problem of delay minimization in NFV-based networks. In such systems, the ultimate goal of any request is to compute a sequence of functions in the network, where each function can be computed at only a specific subset of network nodes. In conventional approaches, for each function, we choose one node from the corresponding subset of the nodes to compute that function.… ▽ More

    Submitted 11 September, 2018; v1 submitted 9 July, 2018; originally announced July 2018.

    Comments: Revised Version

  15. arXiv:1807.00207  [pdf, other

    cs.NI

    Multi-agent Learning for Cooperative Large-scale Caching Networks

    Authors: Elahe Rezaei, Hafez Eslami Manoochehri, Babak Hossein Khalaj

    Abstract: Caching networks are designed to reduce traffic load at backhaul links, by serving demands from edge-nodes. In the past decades, many studies have been done to address the caching problem. However, in practice, finding an optimal caching policy is still challenging due to dynamicity of traffic and scalability caused by complex impact of caching strategy chosen by each individual cache on other par… ▽ More

    Submitted 30 June, 2018; originally announced July 2018.

    Comments: 10 pages

  16. arXiv:1803.07655  [pdf, other

    cs.IT cs.NI

    On Multi-Server Coded Caching in the Low Memory Regime

    Authors: Seyed Pooya Shariatpanahi, Babak Hossein Khalaj

    Abstract: In this paper we determine the delivery time for a multi-server coded caching problem when the cache size of each user is small. We propose an achievable scheme based on coded cache content placement, and employ zero-forcing techniques at the content delivery phase. Surprisingly, in contrast to previous multi-server results which were proved to be order-optimal within a multiplicative factor of 2,… ▽ More

    Submitted 20 March, 2018; originally announced March 2018.

  17. arXiv:1711.05969  [pdf, ps, other

    cs.IT cs.NI

    Physical-Layer Schemes for Wireless Coded Caching

    Authors: Seyed Pooya Shariatpanahi, Giuseppe Caire, Babak Hossein Khalaj

    Abstract: We investigate the potentials of applying the coded caching paradigm in wireless networks. In order to do this, we investigate physical layer schemes for downlink transmission from a multiantenna transmitter to several cache-enabled users. As the baseline scheme we consider employing coded caching on top of max-min fair multicasting, which is shown to be far from optimal at high SNR values. Our fi… ▽ More

    Submitted 29 January, 2018; v1 submitted 16 November, 2017; originally announced November 2017.

    Comments: 25 pages, 14 figures. This manuscript is the extended journal version of the ISIT 2017 conference article available at arXiv:1701.02979 [cs.IT]

  18. arXiv:1701.02979  [pdf, ps, other

    cs.IT cs.NI

    Multi-Antenna Coded Caching

    Authors: Seyed Pooya Shariatpanahi, Giuseppe Caire, Babak Hossein Khalaj

    Abstract: In this paper we consider a single-cell downlink scenario where a multiple-antenna base station delivers contents to multiple cache-enabled user terminals. Based on the multicasting opportunities provided by the so-called Coded Caching technique, we investigate three delivery approaches. Our baseline scheme employs the coded caching technique on top of max-min fair multicasting. The second one con… ▽ More

    Submitted 11 January, 2017; originally announced January 2017.

    Comments: 7 pages, 2 figures

  19. arXiv:1611.06538  [pdf, other

    cs.IT

    On Storage Allocation in Cache-Enabled Interference Channels with Mixed CSIT

    Authors: Mohammad Ali Tahmasbi Nejad, Seyed Pooya Shariatpanahi, Babak Hossein Khalaj

    Abstract: Recently, it has been shown that in a cache-enabled interference channel, the storage at the transmit and receive sides are of equal value in terms of Degrees of Freedom (DoF). This is derived by assuming full Channel State Information at the Transmitter (CSIT). In this paper, we consider a more practical scenario, where a training/feedback phase should exist for obtaining CSIT, during which insta… ▽ More

    Submitted 21 January, 2017; v1 submitted 20 November, 2016; originally announced November 2016.

    Comments: arXiv admin note: text overlap with arXiv:1209.5807 by other authors

  20. arXiv:1609.08476  [pdf, other

    cs.NI cs.IT

    Joint Cell Muting and User Scheduling in Multi-Cell Networks with Temporal Fairness

    Authors: Shahram Shahsavari, Nail Akar, Babak Hossein Khalaj

    Abstract: A semi-centralized joint cell muting and user scheduling scheme for interference coordination in a multicell network is proposed under two different temporal fairness criteria. The main principle behind the proposed scheme is that a central entity selects a cell muting pattern out of a pattern set at a decision instant, and subsequently the un-muted base stations opportunistically schedule the use… ▽ More

    Submitted 4 July, 2017; v1 submitted 27 September, 2016; originally announced September 2016.

  21. arXiv:1604.04735  [pdf, other

    cs.IT

    Fundamental Limits of Pooled-DNA Sequencing

    Authors: Amir Najafi, Damoun Nashta-ali, Seyed Abolfazl Motahari, Mehrdad Khani, Babak H. Khalaj, Hamid R. Rabiee

    Abstract: In this paper, fundamental limits in sequencing of a set of closely related DNA molecules are addressed. This problem is called pooled-DNA sequencing which encompasses many interesting problems such as haplotype phasing, metageomics, and conventional pooled-DNA sequencing in the absence of tagging. From an information theoretic point of view, we have proposed fundamental limits on the number and l… ▽ More

    Submitted 19 April, 2016; v1 submitted 16 April, 2016; originally announced April 2016.

    Comments: 39 pages, Submitted to IEEE Transactions on Information Theory

  22. arXiv:1503.00265  [pdf, ps, other

    cs.IT

    Multi-Server Coded Caching

    Authors: Seyed Pooya Shariatpanahi, Seyed Abolfazl Motahari, Babak Hossein Khalaj

    Abstract: In this paper, we consider multiple cache-enabled clients connected to multiple servers through an intermediate network. We design several topology-aware coding strategies for such networks. Based on topology richness of the intermediate network, and types of coding operations at internal nodes, we define three classes of networks, namely, dedicated, flexible, and linear networks. For each class,… ▽ More

    Submitted 1 March, 2015; originally announced March 2015.

  23. arXiv:1502.06327  [pdf, other

    cs.GT cs.NI

    Incentive Design and Market Evolution of Mobile User-Provided Networks

    Authors: Mohammad Mahdi Khalili, Lin Gao, Jianwei Huang, Babak Hossein Khalaj

    Abstract: An operator-assisted user-provided network (UPN) has the potential to achieve a low cost ubiquitous Internet connectivity, without significantly increasing the network infrastructure investment. In this paper, we consider such a network where the network operator encourages some of her subscribers to operate as mobile Wi-Fi hotspots (hosts), providing Internet connectivity for other subscribers (c… ▽ More

    Submitted 19 April, 2015; v1 submitted 23 February, 2015; originally announced February 2015.

    Comments: This manuscript serves as the online technical report of the article published in IEEE Workshop on Smart Data Pricing (SDP), 2015

  24. arXiv:1312.2241  [pdf, other

    cs.NI

    ABMQ: An Agent-Based Modeler and Simulator for Self-Organization in MANETs using Qt

    Authors: Mohammad Noormohammadpour, Mohammad Javad Salehi, Seyed Mohammad Asghari Pari, Babak Hossein Khalaj, Hamidreza Bagheri, Marcos Katz

    Abstract: Agent-Based Modeling and Simulation (ABMS) is a simple and yet powerful method for simulation of interactions among individual agents. Using ABMS, different phenomena can be modeled and simulated without spending additional time on unnecessary complexities. Although ABMS is well-matured in many different fields such as economic, social, and natural phenomena, it has not received much attention in… ▽ More

    Submitted 8 December, 2013; originally announced December 2013.

    Comments: 6 pages, 8 figures, conference paper

  25. arXiv:1309.0088  [pdf, ps, other

    cs.IT

    Caching Gain in Wireless Networks with Fading: A Multi-User Diversity Perspective

    Authors: Seyed Pooya Shariatpanahi, Hamed Shah-Mansouri, Babak Hossein Khalaj

    Abstract: We consider the effect of caching in wireless networks where fading is the dominant channel effect. First, we propose a one-hop transmission strategy for cache-enabled wireless networks, which is based on exploiting multi-user diversity gain. Then, we derive a closed-form result for throughput scaling of the proposed scheme in large networks, which reveals the inherent trade-off between cache memo… ▽ More

    Submitted 31 August, 2013; originally announced September 2013.

    Comments: 6 pages, 4 figures, conference

  26. arXiv:1308.2372  [pdf, ps, other

    cs.IT

    Throughput of One-Hop Wireless Networks with Noisy Feedback Channel

    Authors: Seyed Pooya Shariatpanahi, Hamed Shah-Mansouri, Babak Hossein Khalaj

    Abstract: In this paper, we consider the effect of feedback channel error on the throughput of one-hop wireless networks under the random connection model. The transmission strategy is based on activating source-destination pairs with strongest direct links. While these activated pairs are identified based on Channel State Information (CSI) at the receive side, the transmit side will be provided with a nois… ▽ More

    Submitted 11 August, 2013; originally announced August 2013.

    Comments: 6 pages, 1 figure, conference

  27. arXiv:1308.0959  [pdf, other

    cs.NI

    LORD: Leader-based framework for Resource Discovery in Mobile Device Clouds

    Authors: Seyed Mohammad Asghari, Yi-Hsuan Kao, Mohammad Hassan Lotfi, Mohammad Noormohammadpour, Bhaskar Krishnamachari, Babak Hossein Khalaj, Marcos Katz

    Abstract: We provide a novel solution for Resource Discovery (RD) in mobile device clouds consisting of selfish nodes. Mobile device clouds (MDCs) refer to cooperative arrangement of communication-capable devices formed with resource-sharing goal in mind. Our work is motivated by the observation that with ever-growing applications of MDCs, it is essential to quickly locate resources offered in such clouds,… ▽ More

    Submitted 16 April, 2017; v1 submitted 5 August, 2013; originally announced August 2013.

  28. arXiv:1306.5291  [pdf, ps, other

    cs.IT

    Throughput of Large One-hop Wireless Networks with General Fading

    Authors: Seyed Pooya Shariatpanahi, Babak Hossein Khalaj, Kasra Alishahi, Hamed Shah-Mansouri

    Abstract: Consider $n$ source-destination pairs randomly located in a shared wireless medium, resulting in interference between different transmissions. All wireless links are modeled by independently and identically distributed (i.i.d.) random variables, indicating that the dominant channel effect is the random fading phenomenon. We characterize the throughput of one-hop communication in such network. Firs… ▽ More

    Submitted 22 June, 2013; originally announced June 2013.

    Comments: 27 pages, 2 figures

  29. arXiv:1112.4164  [pdf, ps, other

    cs.CV

    A Geometric Approach For Fully Automatic Chromosome Segmentation

    Authors: Shervin Minaee, Mehran Fotouhi, Babak Hossein Khalaj

    Abstract: A fundamental task in human chromosome analysis is chromosome segmentation. Segmentation plays an important role in chromosome karyoty**. The first step in segmentation is to remove intrusive objects such as stain debris and other noises. The next step is detection of touching and overlap** chromosomes, and the final step is separation of such chromosomes. Common methods for separation between… ▽ More

    Submitted 1 September, 2014; v1 submitted 18 December, 2011; originally announced December 2011.

    Comments: This paper has been revised

  30. One-Hop Throughput of Wireless Networks with Random Connections

    Authors: Seyed Pooya Shariatpanahi, Babak Hossein Khalaj, Kasra Alishahi, Hamed Shah-Mansouri

    Abstract: We consider one-hop communication in wireless networks with random connections. In the random connection model, the channel powers between different nodes are drawn from a common distribution in an i.i.d. manner. An scheme achieving the throughput scaling of order $n^{1/3-δ}$, for any $δ>0$, is proposed, where $n$ is the number of nodes. Such achievable throughput, along with the order $n^{1/3}$ u… ▽ More

    Submitted 8 November, 2011; originally announced November 2011.

    Comments: Submitted to IEEE Communications Letters

  31. arXiv:1011.5124  [pdf

    cs.IT cs.NI eess.SY math.OC

    Delay Constrained Utility Maximization in Multihop Random Access Networks

    Authors: Amir M. Khodaian, Babak H. Khalaj

    Abstract: Multi-hop random access networks have received much attention due to their distributed nature which facilitates deploying many new applications over the sensor and computer networks. Recently, utility maximization framework is applied in order to optimize performance of such networks, however proposed algorithms result in large transmission delays. In this paper, we will analyze delay in random ac… ▽ More

    Submitted 23 November, 2010; originally announced November 2010.

    Comments: 22 pages, IET Communications, 2010, Vol 4., Iss 16

    Report number: p11p

  32. arXiv:1011.5122  [pdf

    cs.IT

    Utility Constrained Energy Minimization In Aloha Networks

    Authors: Amir Mahdi Khodaian, Babak H. Khalaj, Mohammad S. Talebi

    Abstract: In this paper we consider the issue of energy efficiency in random access networks and show that optimizing transmission probabilities of nodes can enhance network performance in terms of energy consumption and fairness. First, we propose a heuristic power control method that improves throughput, and then we model the Utility Constrained Energy Minimization (UCEM) problem in which the utility cons… ▽ More

    Submitted 23 November, 2010; originally announced November 2010.

    Comments: 5 pages, ccnc07

  33. arXiv:1011.5117  [pdf

    cs.IT

    Energy and Utility Optimization in Wireless Networks with Random Access

    Authors: Amirmahdi Khodaian, Babak H. Khalaj

    Abstract: Energy consumption is a main issue of concern in wireless networks. Energy minimization increases the time that networks' nodes work properly without recharging or substituting batteries. Another criterion for network performance is data transmission rate which is usually quantified by a network utility function. There exists an inherent tradeoff between these criteria and enhancing one of them… ▽ More

    Submitted 23 November, 2010; originally announced November 2010.

    Comments: 6 pages, icc07

  34. arXiv:1011.5115  [pdf

    cs.IT cs.NI

    Optimal Utility-Energy tradeoff in Delay Constrained Random Access Networks

    Authors: Amir Mahdi Khodaian, Babak H. Khalaj, Hamed Shah-mansouri

    Abstract: Rate, energy and delay are three main parameters of interest in ad-hoc networks. In this paper, we discuss the problem of maximizing network utility and minimizing energy consumption while satisfying a given transmission delay constraint for each packet. We formulate this problem in the standard convex optimization form and subsequently discuss the tradeoff between utility, energy and delay in suc… ▽ More

    Submitted 23 November, 2010; originally announced November 2010.

    Comments: 5 pages, icc009

  35. arXiv:1011.5113  [pdf

    cs.IT cs.NI

    State-Based Random Access: A Cross-Layer Approach

    Authors: Amir Mahdy Khodaian, Babak H. Khalaj

    Abstract: In this paper, we propose novel state-based algorithms which dynamically control the random access network based on its current state such as channel states of wireless links and backlog states of the queues. After formulating the problem, corresponding algorithms with diverse control functions are proposed. Consequently, it will be shown that the proposed state-based schemes for control of the ra… ▽ More

    Submitted 23 November, 2010; originally announced November 2010.

    Comments: submitted icc2011

  36. arXiv:0912.4390  [pdf

    cs.NI

    Delay-Constrained Utility Maximization in Multihop Random Access Networks

    Authors: Amir M. Khodaian, Babak H. Khalaj

    Abstract: Multi-hop random access networks have received much attention due to their distributed nature which facilitates deploying many new applications over the sensor and computer networks. Recently, utility maximization framework is applied in order to optimize performance of such networks however delay is not limited and proposed algorithms result in very large transmission delays. In this paper, we… ▽ More

    Submitted 22 December, 2009; originally announced December 2009.

  37. Cooperative Transmission for Wireless Relay Networks Using Limited Feedback

    Authors: Javier M. Paredes, Babak H. Khalaj, Alex B. Gershman

    Abstract: To achieve the available performance gains in half-duplex wireless relay networks, several cooperative schemes have been earlier proposed using either distributed space-time coding or distributed beamforming for the transmitter without and with channel state information (CSI), respectively. However, these schemes typically have rather high implementation and/or decoding complexities, especially… ▽ More

    Submitted 29 July, 2009; v1 submitted 8 April, 2009; originally announced April 2009.

    Comments: V1: 27 pages, 1 column, 6 figures. Submitted to IEEE Transactions on Signal Processing, February 2, 2009. V2: 30 pages, 1 column, 8 figures. Revised version submitted to IEEE Transactions on Signal Processing, July 23, 2009

  38. arXiv:0902.1853  [pdf, ps, other

    cs.IT

    A Unified Approach to Sparse Signal Processing

    Authors: F. Marvasti, A. Amini, F. Haddadi, M. Soltanolkotabi, B. H. Khalaj, A. Aldroubi, S. Holm, S. Sanei, J. Chambers

    Abstract: A unified view of sparse signal processing is presented in tutorial form by bringing together various fields. For each of these fields, various algorithms and techniques, which have been developed to leverage sparsity, are described succinctly. The common benefits of significant reduction in sampling rate and processing manipulations are revealed. The key applications of sparse signal processi… ▽ More

    Submitted 11 February, 2009; originally announced February 2009.

    Comments: 43 pages, 40 figures, 15 tables