-
Multi-View Stochastic Block Models
Authors:
Vincent Cohen-Addad,
Tommaso d'Orsi,
Silvio Lattanzi,
Rajai Nasser
Abstract:
Graph clustering is a central topic in unsupervised learning with a multitude of practical applications. In recent years, multi-view graph clustering has gained a lot of attention for its applicability to real-world instances where one has access to multiple data sources. In this paper we formalize a new family of models, called \textit{multi-view stochastic block models} that captures this settin…
▽ More
Graph clustering is a central topic in unsupervised learning with a multitude of practical applications. In recent years, multi-view graph clustering has gained a lot of attention for its applicability to real-world instances where one has access to multiple data sources. In this paper we formalize a new family of models, called \textit{multi-view stochastic block models} that captures this setting.
For this model, we first study efficient algorithms that naively work on the union of multiple graphs. Then, we introduce a new efficient algorithm that provably outperforms previous approaches by analyzing the structure of each graph separately. Furthermore, we complement our results with an information-theoretic lower bound studying the limits of what can be done in this model. Finally, we corroborate our results with experimental evaluations.
△ Less
Submitted 7 June, 2024;
originally announced June 2024.
-
Higher degree sum-of-squares relaxations robust against oblivious outliers
Authors:
Tommaso d'Orsi,
Rajai Nasser,
Gleb Novikov,
David Steurer
Abstract:
We consider estimation models of the form $Y=X^*+N$, where $X^*$ is some $m$-dimensional signal we wish to recover, and $N$ is symmetrically distributed noise that may be unbounded in all but a small $α$ fraction of the entries. We introduce a family of algorithms that under mild assumptions recover the signal $X^*$ in all estimation problems for which there exists a sum-of-squares algorithm that…
▽ More
We consider estimation models of the form $Y=X^*+N$, where $X^*$ is some $m$-dimensional signal we wish to recover, and $N$ is symmetrically distributed noise that may be unbounded in all but a small $α$ fraction of the entries. We introduce a family of algorithms that under mild assumptions recover the signal $X^*$ in all estimation problems for which there exists a sum-of-squares algorithm that succeeds in recovering the signal $X^*$ when the noise $N$ is Gaussian. This essentially shows that it is enough to design a sum-of-squares algorithm for an estimation problem with Gaussian noise in order to get the algorithm that works with the symmetric noise model. Our framework extends far beyond previous results on symmetric noise models and is even robust to adversarial perturbations.
As concrete examples, we investigate two problems for which no efficient algorithms were known to work for heavy-tailed noise: tensor PCA and sparse PCA. For the former, our algorithm recovers the principal component in polynomial time when the signal-to-noise ratio is at least $\tilde{O}(n^{p/4}/α)$, that matches (up to logarithmic factors) current best known algorithmic guarantees for Gaussian noise. For the latter, our algorithm runs in quasipolynomial time and matches the state-of-the-art guarantees for quasipolynomial time algorithms in the case of Gaussian noise. Using a reduction from the planted clique problem, we provide evidence that the quasipolynomial time is likely to be necessary for sparse PCA with symmetric noise.
In our proofs we use bounds on the covering numbers of sets of pseudo-expectations, which we obtain by certifying in sum-of-squares upper bounds on the Gaussian complexities of sets of solutions. This approach for bounding the covering numbers of sets of pseudo-expectations may be interesting in its own right and may find other application in future works.
△ Less
Submitted 14 November, 2022;
originally announced November 2022.
-
Age Distribution in Arbitrary Preemptive Memoryless Networks
Authors:
Rajai Nasser,
Ibrahim Issa,
Ibrahim Abou-Faycal
Abstract:
We study the probability distribution of age of information (AoI) in arbitrary networks with memoryless service times. A source node generates packets following a Poisson process, and then the packets are forwarded across the network in such a way that newer updates preempt older ones. This model is equivalent to gossip networks that was recently studied by Yates, and for which he obtained a recur…
▽ More
We study the probability distribution of age of information (AoI) in arbitrary networks with memoryless service times. A source node generates packets following a Poisson process, and then the packets are forwarded across the network in such a way that newer updates preempt older ones. This model is equivalent to gossip networks that was recently studied by Yates, and for which he obtained a recursive formula allowing the computation for the average AoI. In this paper, we obtain a very simple characterization of the stationary distribution of AoI at every node in the network. This allows for the computation of the average of an arbitrary function of the age. In particular, we can compute age-violation probabilities. Furthermore, we show how it is possible to use insights from our simple characterization in order to substantially reduce the computation time of average AoIs in some structured networks. Finally, we describe how it is possible to use our characterization in order to obtain faster and more accurate Monte Carlo simulations estimating the average AoI, or the average of an arbitrary function of the age.
△ Less
Submitted 2 February, 2022;
originally announced February 2022.
-
Optimal SQ Lower Bounds for Learning Halfspaces with Massart Noise
Authors:
Rajai Nasser,
Stefan Tiegel
Abstract:
We give tight statistical query (SQ) lower bounds for learnining halfspaces in the presence of Massart noise. In particular, suppose that all labels are corrupted with probability at most $η$. We show that for arbitrary $η\in [0,1/2]$ every SQ algorithm achieving misclassification error better than $η$ requires queries of superpolynomial accuracy or at least a superpolynomial number of queries. Fu…
▽ More
We give tight statistical query (SQ) lower bounds for learnining halfspaces in the presence of Massart noise. In particular, suppose that all labels are corrupted with probability at most $η$. We show that for arbitrary $η\in [0,1/2]$ every SQ algorithm achieving misclassification error better than $η$ requires queries of superpolynomial accuracy or at least a superpolynomial number of queries. Further, this continues to hold even if the information-theoretically optimal error $\mathrm{OPT}$ is as small as $\exp\left(-\log^c(d)\right)$, where $d$ is the dimension and $0 < c < 1$ is an arbitrary absolute constant, and an overwhelming fraction of examples are noiseless. Our lower bound matches known polynomial time algorithms, which are also implementable in the SQ framework. Previously, such lower bounds only ruled out algorithms achieving error $\mathrm{OPT} + ε$ or error better than $Ω(η)$ or, if $η$ is close to $1/2$, error $η- o_η(1)$, where the term $o_η(1)$ is constant in $d$ but going to 0 for $η$ approaching $1/2$.
As a consequence, we also show that achieving misclassification error better than $1/2$ in the $(A,α)$-Tsybakov model is SQ-hard for $A$ constant and $α$ bounded away from 1.
△ Less
Submitted 24 January, 2022;
originally announced January 2022.
-
Robust recovery for stochastic block models
Authors:
**gqiu Ding,
Tommaso d'Orsi,
Rajai Nasser,
David Steurer
Abstract:
We develop an efficient algorithm for weak recovery in a robust version of the stochastic block model. The algorithm matches the statistical guarantees of the best known algorithms for the vanilla version of the stochastic block model. In this sense, our results show that there is no price of robustness in the stochastic block model. Our work is heavily inspired by recent work of Banks, Mohanty, a…
▽ More
We develop an efficient algorithm for weak recovery in a robust version of the stochastic block model. The algorithm matches the statistical guarantees of the best known algorithms for the vanilla version of the stochastic block model. In this sense, our results show that there is no price of robustness in the stochastic block model. Our work is heavily inspired by recent work of Banks, Mohanty, and Raghavendra (SODA 2021) that provided an efficient algorithm for the corresponding distinguishing problem. Our algorithm and its analysis significantly depart from previous ones for robust recovery. A key challenge is the peculiar optimization landscape underlying our algorithm: The planted partition may be far from optimal in the sense that completely unrelated solutions could achieve the same objective value. This phenomenon is related to the push-out effect at the BBP phase transition for PCA. To the best of our knowledge, our algorithm is the first to achieve robust recovery in the presence of such a push-out effect in a non-asymptotic setting. Our algorithm is an instantiation of a framework based on convex optimization (related to but distinct from sum-of-squares), which may be useful for other robust matrix estimation problems. A by-product of our analysis is a general technique that boosts the probability of success (over the randomness of the input) of an arbitrary robust weak-recovery algorithm from constant (or slowly vanishing) probability to exponentially high probability.
△ Less
Submitted 16 November, 2021;
originally announced November 2021.
-
Consistent Estimation for PCA and Sparse Regression with Oblivious Outliers
Authors:
Tommaso d'Orsi,
Chih-Hung Liu,
Rajai Nasser,
Gleb Novikov,
David Steurer,
Stefan Tiegel
Abstract:
We develop machinery to design efficiently computable and consistent estimators, achieving estimation error approaching zero as the number of observations grows, when facing an oblivious adversary that may corrupt responses in all but an $α$ fraction of the samples. As concrete examples, we investigate two problems: sparse regression and principal component analysis (PCA). For sparse regression, w…
▽ More
We develop machinery to design efficiently computable and consistent estimators, achieving estimation error approaching zero as the number of observations grows, when facing an oblivious adversary that may corrupt responses in all but an $α$ fraction of the samples. As concrete examples, we investigate two problems: sparse regression and principal component analysis (PCA). For sparse regression, we achieve consistency for optimal sample size $n\gtrsim (k\log d)/α^2$ and optimal error rate $O(\sqrt{(k\log d)/(n\cdot α^2)})$ where $n$ is the number of observations, $d$ is the number of dimensions and $k$ is the sparsity of the parameter vector, allowing the fraction of inliers to be inverse-polynomial in the number of samples. Prior to this work, no estimator was known to be consistent when the fraction of inliers $α$ is $o(1/\log \log n)$, even for (non-spherical) Gaussian design matrices. Results holding under weak design assumptions and in the presence of such general noise have only been shown in dense setting (i.e., general linear regression) very recently by d'Orsi et al. [dNS21]. In the context of PCA, we attain optimal error guarantees under broad spikiness assumptions on the parameter matrix (usually used in matrix completion). Previous works could obtain non-trivial guarantees only under the assumptions that the measurement noise corresponding to the inliers is polynomially small in $n$ (e.g., Gaussian with variance $1/n^2$).
To devise our estimators, we equip the Huber loss with non-smooth regularizers such as the $\ell_1$ norm or the nuclear norm, and extend d'Orsi et al.'s approach [dNS21] in a novel way to analyze the loss function. Our machinery appears to be easily applicable to a wide range of estimation problems.
△ Less
Submitted 4 November, 2021;
originally announced November 2021.
-
On the Scattering of Waves inside Charged Spherically Symmetric Black Holes
Authors:
Mokdad Mokdad,
Rajai Nasser
Abstract:
In this paper we show that there is a breakdown of scattering between the event horizon (or the Cauchy horizon) and an intermediate Cauchy hypersurface in the dynamic interior of a Reissner-Nordström-like black hole. More precisely, we show that the trace operators and their analytic counterparts, the inverse wave operators, do not have bounded inverses, even though these operators themselves are…
▽ More
In this paper we show that there is a breakdown of scattering between the event horizon (or the Cauchy horizon) and an intermediate Cauchy hypersurface in the dynamic interior of a Reissner-Nordström-like black hole. More precisely, we show that the trace operators and their analytic counterparts, the inverse wave operators, do not have bounded inverses, even though these operators themselves are bounded. This result holds for the natural energy given by the energy-momentum tensor of the wave equation using the timelike vector field of the Regge-Wheeler variable, which asymptotically becomes normal to the horizons. The behaviour of solutions at low spatial-frequencies and their behaviour at high angular momenta are the only obstructions causing this breakdown of scattering. The breakdown follows from an analysis of a $1+1$-dimensional wave equation with exponentially decaying potential which we treat for general potentials, and we show that the breakdown is generic.
△ Less
Submitted 4 April, 2022; v1 submitted 10 October, 2021;
originally announced October 2021.
-
deep unfolding for non-negative matrix factorization with application to mutational signature analysis
Authors:
Rami Nasser,
Yonina C. Eldar,
Roded Sharan
Abstract:
Non-negative matrix factorization (NMF) is a fundamental matrix decomposition technique that is used primarily for dimensionality reduction and is increasing in popularity in the biological domain. Although finding a unique NMF is generally not possible, there are various iterative algorithms for NMF optimization that converge to locally optimal solutions. Such techniques can also serve as a start…
▽ More
Non-negative matrix factorization (NMF) is a fundamental matrix decomposition technique that is used primarily for dimensionality reduction and is increasing in popularity in the biological domain. Although finding a unique NMF is generally not possible, there are various iterative algorithms for NMF optimization that converge to locally optimal solutions. Such techniques can also serve as a starting point for deep learning methods that unroll the algorithmic iterations into layers of a deep network. Here we develop unfolded deep networks for NMF and several regularized variants in both a supervised and an unsupervised setting. We apply our method to various mutation data sets to reconstruct their underlying mutational signatures and their exposures. We demonstrate the increased accuracy of our approach over standard formulations in analyzing simulated and real mutation data.
△ Less
Submitted 20 August, 2021;
originally announced August 2021.
-
Uncertainty quantification through Monte Carlo method in a cloud computing setting
Authors:
A. Cunha Jr,
R. Nasser,
R. Sampaio,
H. Lopes,
K. Breitman
Abstract:
The Monte Carlo (MC) method is the most common technique used for uncertainty quantification, due to its simplicity and good statistical results. However, its computational cost is extremely high, and, in many cases, prohibitive. Fortunately, the MC algorithm is easily parallelizable, which allows its use in simulations where the computation of a single realization is very costly. This work presen…
▽ More
The Monte Carlo (MC) method is the most common technique used for uncertainty quantification, due to its simplicity and good statistical results. However, its computational cost is extremely high, and, in many cases, prohibitive. Fortunately, the MC algorithm is easily parallelizable, which allows its use in simulations where the computation of a single realization is very costly. This work presents a methodology for the parallelization of the MC method, in the context of cloud computing. This strategy is based on the MapReduce paradigm, and allows an efficient distribution of tasks in the cloud. This methodology is illustrated on a problem of structural dynamics that is subject to uncertainties. The results show that the technique is capable of producing good results concerning statistical moments of low order. It is shown that even a simple problem may require many realizations for convergence of histograms, which makes the cloud computing strategy very attractive (due to its high scalability capacity and low-cost). Additionally, the results regarding the time of processing and storage space usage allow one to qualify this new methodology as a solution for simulations that require a number of MC realizations beyond the standard.
△ Less
Submitted 20 May, 2021;
originally announced May 2021.
-
Stability results for an elastic-viscoelastic waves interaction systems with localized Kelvin-Voigt dam** and with an internal or boundary time delay
Authors:
Mouhammad Ghader,
Rayan Nasser,
Ali Wehbe
Abstract:
We investigate the stability of a one-dimensional wave equation with non smooth localized internal viscoelastic dam** of Kelvin-Voigt type and with boundary or localized internal delay feedback. The main novelty in this paper is that the Kelvin-Voigt and the delay dam** are both localized via non smooth coefficients. In the case that the Kelvin-Voigt dam** is localized faraway from the tip a…
▽ More
We investigate the stability of a one-dimensional wave equation with non smooth localized internal viscoelastic dam** of Kelvin-Voigt type and with boundary or localized internal delay feedback. The main novelty in this paper is that the Kelvin-Voigt and the delay dam** are both localized via non smooth coefficients. In the case that the Kelvin-Voigt dam** is localized faraway from the tip and the wave is subjected to a locally distributed internal or boundary delay feedback, we prove that the energy of the system decays polynomially of type t^{-4}. However, an exponential decay of the energy of the system is established provided that the Kelvin-Voigt dam** is localized near a part of the boundary and a time delay dam** acts on the second boundary. While, when the Kelvin-Voigt and the internal delay dam** are both localized via non smooth coefficients near the tip, the energy of the system decays polynomially of type t^{-4}. Frequency domain arguments combined with piecewise multiplier techniques are employed.
△ Less
Submitted 29 March, 2020;
originally announced March 2020.
-
Optimal Age over Erasure Channels
Authors:
Elie Najm,
Emre Telatar,
Rajai Nasser
Abstract:
Previous works on age of information and erasure channels have dealt with specific models and computed the average age or average peak age for certain settings. In this paper, given a source that produces a letter every $T_s$ seconds and an erasure channel that can be used every $T_c$ seconds, we ask what is the coding strategy that minimizes the time-average age of information that an observer of…
▽ More
Previous works on age of information and erasure channels have dealt with specific models and computed the average age or average peak age for certain settings. In this paper, given a source that produces a letter every $T_s$ seconds and an erasure channel that can be used every $T_c$ seconds, we ask what is the coding strategy that minimizes the time-average age of information that an observer of the channel output incurs. We first analyze the case where the source alphabet and the channel-input alphabet have the same size. We show that a trivial coding strategy is optimal and a closed form expression for the age can be derived. We then analyze the case where the alphabets have different sizes. We use a random coding argument to bound the average age and show that the average age achieved using random codes converges to the optimal average age of linear block codes as the source alphabet becomes large.
△ Less
Submitted 20 October, 2021; v1 submitted 6 January, 2019;
originally announced January 2019.
-
On the Polarization Levels of Automorphic-Symmetric Channels
Authors:
Rajai Nasser
Abstract:
It is known that if an Abelian group operation is used in an Arıkan-style construction, we have multilevel polarization where synthetic channels can approach intermediate channels that are neither almost perfect nor almost useless. An open problem in polarization theory is to determine the polarization levels of a given channel. In this paper, we discuss the polarization levels of a family of chan…
▽ More
It is known that if an Abelian group operation is used in an Arıkan-style construction, we have multilevel polarization where synthetic channels can approach intermediate channels that are neither almost perfect nor almost useless. An open problem in polarization theory is to determine the polarization levels of a given channel. In this paper, we discuss the polarization levels of a family of channels that we call automorphic-symmetric channels. We show that the polarization levels of an automorphic-symmetric channel are determined by characteristic subgroups. In particular, if the group that is used does not contain any non-trivial characteristic subgroup, we only have two-level polarization to almost perfect and almost useless channels.
△ Less
Submitted 15 November, 2018; v1 submitted 13 November, 2018;
originally announced November 2018.
-
On the Convergence of the Polarization Process in the Noisiness/Weak-$\ast$ Topology
Authors:
Rajai Nasser
Abstract:
Let $W$ be a channel where the input alphabet is endowed with an Abelian group operation, and let $(W_n)_{n\geq 0}$ be Arıkan's channel-valued polarization process that is obtained from $W$ using this operation. We prove that the process $(W_n)_{n\geq 0}$ converges almost surely to deterministic homomorphism channels in the noisiness/weak-$\ast$ topology. This provides a simple proof of multilevel…
▽ More
Let $W$ be a channel where the input alphabet is endowed with an Abelian group operation, and let $(W_n)_{n\geq 0}$ be Arıkan's channel-valued polarization process that is obtained from $W$ using this operation. We prove that the process $(W_n)_{n\geq 0}$ converges almost surely to deterministic homomorphism channels in the noisiness/weak-$\ast$ topology. This provides a simple proof of multilevel polarization for a large family of channels, containing among others, discrete memoryless channels (DMC), and channels with continuous output alphabets. This also shows that any continuous channel functional converges almost surely (even if the functional does not induce a submartingale or a supermartingale).
△ Less
Submitted 26 October, 2018; v1 submitted 25 October, 2018;
originally announced October 2018.
-
Content Based Status Updates
Authors:
Elie Najm,
Rajai Nasser,
Emre Telatar
Abstract:
Consider a stream of status updates generated by a source, where each update is of one of two types: high priority or ordinary (low priority). These updates are to be transmitted through a network to a monitor. However, the transmission policy of each packet depends on the type of stream it belongs to. For the low priority stream, we analyze and compare the performances of two transmission schemes…
▽ More
Consider a stream of status updates generated by a source, where each update is of one of two types: high priority or ordinary (low priority). These updates are to be transmitted through a network to a monitor. However, the transmission policy of each packet depends on the type of stream it belongs to. For the low priority stream, we analyze and compare the performances of two transmission schemes: (i) Ordinary updates are served in a First-Come-First-Served (FCFS) fashion, whereas, in (ii), the ordinary updates are transmitted according to an M/G/1/1 with preemption policy. In both schemes, high priority updates are transmitted according to an M/G/1/1 with preemption policy and receive preferential treatment. An arriving priority update discards and replaces any currently-in-service high priority update, and preempts (with eventual resume for scheme (i)) any ordinary update. We model the arrival processes of the two kinds of updates, in both schemes, as independent Poisson processes. For scheme (i), we find the arrival and service rates under which the system is stable and give closed-form expressions for average peak age and a lower bound on the average age of the ordinary stream. For scheme (ii), we derive closed-form expressions for the average age and average peak age of the high priority and low priority streams. We finally show that, if the service time is exponentially distributed, the M/M/1/1 with preemption policy leads to an average age of the low priority stream higher than the one achieved using the FCFS scheme. Therefore, the M/M//1/1 with preemption policy, when applied on the low priority stream of updates and in the presence of a higher priority scheme, is not anymore the optimal transmission policy from an age point of view.
△ Less
Submitted 15 October, 2019; v1 submitted 12 January, 2018;
originally announced January 2018.
-
A Characterization of the Shannon Ordering of Communication Channels
Authors:
Rajai Nasser
Abstract:
The ordering of communication channels was first introduced by Shannon. In this paper, we aim to find a characterization of the Shannon ordering. We show that $W'$ contains $W$ if and only if $W$ is the skew-composition of $W'$ with a convex-product channel. This fact is used to derive a characterization of the Shannon ordering that is similar to the Blackwell-Sherman-Stein theorem. Two channels a…
▽ More
The ordering of communication channels was first introduced by Shannon. In this paper, we aim to find a characterization of the Shannon ordering. We show that $W'$ contains $W$ if and only if $W$ is the skew-composition of $W'$ with a convex-product channel. This fact is used to derive a characterization of the Shannon ordering that is similar to the Blackwell-Sherman-Stein theorem. Two channels are said to be Shannon-equivalent if each one is contained in the other. We investigate the topologies that can be constructed on the space of Shannon-equivalent channels. We introduce the strong topology and the BRM metric on this space. Finally, we study the continuity of a few channel parameters and operations under the strong topology.
△ Less
Submitted 3 May, 2017;
originally announced May 2017.
-
On the Input-Degradedness and Input-Equivalence Between Channels
Authors:
Rajai Nasser
Abstract:
A channel $W$ is said to be input-degraded from another channel $W'$ if $W$ can be simulated from $W'$ by randomization at the input. We provide a necessary and sufficient condition for a channel to be input-degraded from another one. We show that any decoder that is good for $W'$ is also good for $W$. We provide two characterizations for input-degradedness, one of which is similar to the Blackwel…
▽ More
A channel $W$ is said to be input-degraded from another channel $W'$ if $W$ can be simulated from $W'$ by randomization at the input. We provide a necessary and sufficient condition for a channel to be input-degraded from another one. We show that any decoder that is good for $W'$ is also good for $W$. We provide two characterizations for input-degradedness, one of which is similar to the Blackwell-Sherman-Stein theorem. We say that two channels are input-equivalent if they are input-degraded from each other. We study the topologies that can be constructed on the space of input-equivalent channels, and we investigate their properties. Moreover, we study the continuity of several channel parameters and operations under these topologies.
△ Less
Submitted 2 February, 2017;
originally announced February 2017.
-
Topological Structures on DMC spaces
Authors:
Rajai Nasser
Abstract:
Two channels are said to be equivalent if they are degraded from each other. The space of equivalent channels with input alphabet $X$ and output alphabet $Y$ can be naturally endowed with the quotient of the Euclidean topology by the equivalence relation. A topology on the space of equivalent channels with fixed input alphabet $X$ and arbitrary but finite output alphabet is said to be natural if a…
▽ More
Two channels are said to be equivalent if they are degraded from each other. The space of equivalent channels with input alphabet $X$ and output alphabet $Y$ can be naturally endowed with the quotient of the Euclidean topology by the equivalence relation. A topology on the space of equivalent channels with fixed input alphabet $X$ and arbitrary but finite output alphabet is said to be natural if and only if it induces the quotient topology on the subspaces of equivalent channels sharing the same output alphabet. We show that every natural topology is $σ$-compact, separable and path-connected. On the other hand, if $|X|\geq 2$, a Hausdorff natural topology is not Baire and it is not locally compact anywhere. This implies that no natural topology can be completely metrized if $|X|\geq 2$. The finest natural topology, which we call the strong topology, is shown to be compactly generated, sequential and $T_4$. On the other hand, the strong topology is not first-countable anywhere, hence it is not metrizable. We show that in the strong topology, a subspace is compact if and only if it is rank-bounded and strongly-closed. We introduce a metric distance on the space of equivalent channels which compares the noise levels between channels. The induced metric topology, which we call the noisiness topology, is shown to be natural. We also study topologies that are inherited from the space of meta-probability measures by identifying channels with their Blackwell measures. We show that the weak-* topology is exactly the same as the noisiness topology and hence it is natural. We prove that if $|X|\geq 2$, the total variation topology is not natural nor Baire, hence it is not completely metrizable. Moreover, it is not locally compact anywhere. Finally, we show that the Borel $σ$-algebra is the same for all Hausdorff natural topologies.
△ Less
Submitted 13 March, 2017; v1 submitted 16 January, 2017;
originally announced January 2017.
-
Continuity of Channel Parameters and Operations under Various DMC Topologies
Authors:
Rajai Nasser
Abstract:
We study the continuity of many channel parameters and operations under various topologies on the space of equivalent discrete memoryless channels (DMC). We show that mutual information, channel capacity, Bhattacharyya parameter, probability of error of a fixed code, and optimal probability of error for a given code rate and blocklength, are continuous under various DMC topologies. We also show th…
▽ More
We study the continuity of many channel parameters and operations under various topologies on the space of equivalent discrete memoryless channels (DMC). We show that mutual information, channel capacity, Bhattacharyya parameter, probability of error of a fixed code, and optimal probability of error for a given code rate and blocklength, are continuous under various DMC topologies. We also show that channel operations such as sums, products, interpolations, and Arıkan-style transformations are continuous.
△ Less
Submitted 27 March, 2017; v1 submitted 16 January, 2017;
originally announced January 2017.
-
Polar Codes for Arbitrary Classical-Quantum Channels and Arbitrary cq-MACs
Authors:
Rajai Nasser,
Joseph M. Renes
Abstract:
We prove polarization theorems for arbitrary classical-quantum (cq) channels. The input alphabet is endowed with an arbitrary Abelian group operation and an Arıkan-style transformation is applied using this operation. It is shown that as the number of polarization steps becomes large, the synthetic cq-channels polarize to deterministic homomorphism channels which project their input to a quotient…
▽ More
We prove polarization theorems for arbitrary classical-quantum (cq) channels. The input alphabet is endowed with an arbitrary Abelian group operation and an Arıkan-style transformation is applied using this operation. It is shown that as the number of polarization steps becomes large, the synthetic cq-channels polarize to deterministic homomorphism channels which project their input to a quotient group of the input alphabet. This result is used to construct polar codes for arbitrary cq-channels and arbitrary classical-quantum multiple access channels (cq-MAC). The encoder can be implemented in $O(N\log N)$ operations, where $N$ is the blocklength of the code. A quantum successive cancellation decoder for the constructed codes is proposed. It is shown that the probability of error of this decoder decays faster than $2^{-N^β}$ for any $β<\frac{1}{2}$.
△ Less
Submitted 12 January, 2017;
originally announced January 2017.
-
Age of Information: The Gamma Awakening
Authors:
Elie Najm,
Rajai Nasser
Abstract:
We consider a scenario where a monitor is interested in being up to date with respect to the status of some system which is not directly accessible to this monitor. However, we assume a source node has access to the status and can send status updates as packets to the monitor through a communication system. We also assume that the status updates are generated randomly as a Poisson process. The sou…
▽ More
We consider a scenario where a monitor is interested in being up to date with respect to the status of some system which is not directly accessible to this monitor. However, we assume a source node has access to the status and can send status updates as packets to the monitor through a communication system. We also assume that the status updates are generated randomly as a Poisson process. The source node can manage the packet transmission to minimize the age of information at the destination node, which is defined as the time elapsed since the last successfully transmitted update was generated at the source. We use queuing theory to model the source-destination link and we assume that the time to successfully transmit a packet is a gamma distributed service time. We consider two packet management schemes: LCFS (Last Come First Served) with preemption and LCFS without preemption. We compute and analyze the average age and the average peak age of information under these assumptions. Moreover, we extend these results to the case where the service time is deterministic.
△ Less
Submitted 5 April, 2016;
originally announced April 2016.
-
Erasure Schemes Using Generalized Polar Codes: Zero-Undetected-Error Capacity and Performance Trade-offs
Authors:
Rajai Nasser
Abstract:
We study the performance of generalized polar (GP) codes when they are used for coding schemes involving erasure. GP codes are a family of codes which contains, among others, the standard polar codes of Arıkan and Reed-Muller codes. We derive a closed formula for the zero-undetected-error capacity $I_0^{GP}(W)$ of GP codes for a given binary memoryless symmetric (BMS) channel $W$ under the low com…
▽ More
We study the performance of generalized polar (GP) codes when they are used for coding schemes involving erasure. GP codes are a family of codes which contains, among others, the standard polar codes of Arıkan and Reed-Muller codes. We derive a closed formula for the zero-undetected-error capacity $I_0^{GP}(W)$ of GP codes for a given binary memoryless symmetric (BMS) channel $W$ under the low complexity successive cancellation decoder with erasure. We show that for every $R<I_0^{GP}(W)$, there exists a generalized polar code of blocklength $N$ and of rate at least $R$ where the undetected-error probability is zero and the erasure probability is less than $2^{-N^{\frac{1}{2}-ε}}$. On the other hand, for any GP code of rate $I_0^{GP}(W)<R<I(W)$ and blocklength $N$, the undetected error probability cannot be made less than $2^{-N^{\frac{1}{2}+ε}}$ unless the erasure probability is close to $1$.
△ Less
Submitted 4 April, 2016; v1 submitted 22 February, 2016;
originally announced February 2016.
-
Fourier Analysis of MAC Polarization
Authors:
Rajai Nasser,
Emre Telatar
Abstract:
One problem with MAC polar codes that are based on MAC polarization is that they may not achieve the entire capacity region. The reason behind this problem is that MAC polarization sometimes induces a loss in the capacity region. This paper provides a single letter necessary and sufficient condition which characterizes all the MACs that do not lose any part of their capacity region by polarization…
▽ More
One problem with MAC polar codes that are based on MAC polarization is that they may not achieve the entire capacity region. The reason behind this problem is that MAC polarization sometimes induces a loss in the capacity region. This paper provides a single letter necessary and sufficient condition which characterizes all the MACs that do not lose any part of their capacity region by polarization.
△ Less
Submitted 6 April, 2017; v1 submitted 24 January, 2015;
originally announced January 2015.
-
Ergodic Theory Meets Polarization. II: A Foundation of Polarization Theory
Authors:
Rajai Nasser
Abstract:
An open problem in polarization theory is to determine the binary operations that always lead to polarization (in the general multilevel sense) when they are used in Arıkan style constructions. This paper, which is presented in two parts, solves this problem by providing a necessary and sufficient condition for a binary operation to be polarizing. This (second) part provides a foundation of polari…
▽ More
An open problem in polarization theory is to determine the binary operations that always lead to polarization (in the general multilevel sense) when they are used in Arıkan style constructions. This paper, which is presented in two parts, solves this problem by providing a necessary and sufficient condition for a binary operation to be polarizing. This (second) part provides a foundation of polarization theory based on the ergodic theory of binary operations which we developed in the first part. We show that a binary operation is polarizing if and only if it is uniformity preserving and its right-inverse is strongly ergodic. The rate of polarization of single user channels is studied. It is shown that the exponent of any polarizing operation cannot exceed $\frac{1}{2}$, which is the exponent of quasigroup operations. We also study the polarization of multiple access channels (MAC). In particular, we show that a sequence of binary operations is MAC-polarizing if and only if each binary operation in the sequence is polarizing. It is shown that the exponent of any MAC-polarizing sequence cannot exceed $\frac{1}{2}$, which is the exponent of sequences of quasigroup operations.
△ Less
Submitted 4 October, 2016; v1 submitted 11 June, 2014;
originally announced June 2014.
-
Ergodic Theory Meets Polarization. I: An Ergodic Theory for Binary Operations
Authors:
Rajai Nasser
Abstract:
An open problem in polarization theory is to determine the binary operations that always lead to polarization (in the general multilevel sense) when they are used in Arıkan style constructions. This paper, which is presented in two parts, solves this problem by providing a necessary and sufficient condition for a binary operation to be polarizing. This (first) part of the paper introduces the math…
▽ More
An open problem in polarization theory is to determine the binary operations that always lead to polarization (in the general multilevel sense) when they are used in Arıkan style constructions. This paper, which is presented in two parts, solves this problem by providing a necessary and sufficient condition for a binary operation to be polarizing. This (first) part of the paper introduces the mathematical framework that we will use in the second part to characterize the polarizing operations. We define uniformity preserving, irreducible, ergodic and strongly ergodic operations and we study their properties. The concepts of a stable partition and the residue of a stable partition are introduced. We show that an ergodic operation is strongly ergodic if and only if all its stable partitions are their own residues. We also study the products of binary operations and the structure of their stable partitions. We show that the product of a sequence of binary operations is strongly ergodic if and only if all the operations in the sequence are strongly ergodic. In the second part of the paper, we provide a foundation of polarization theory based on the ergodic theory of binary operations that we develop in this part.
△ Less
Submitted 4 October, 2016; v1 submitted 11 June, 2014;
originally announced June 2014.
-
Polar Codes for Arbitrary DMCs and Arbitrary MACs
Authors:
Rajai Nasser,
Emre Telatar
Abstract:
Polar codes are constructed for arbitrary channels by imposing an arbitrary quasigroup structure on the input alphabet. Just as with "usual" polar codes, the block error probability under successive cancellation decoding is $o(2^{-N^{1/2-ε}})$, where $N$ is the block length. Encoding and decoding for these codes can be implemented with a complexity of $O(N\log N)$. It is shown that the same techni…
▽ More
Polar codes are constructed for arbitrary channels by imposing an arbitrary quasigroup structure on the input alphabet. Just as with "usual" polar codes, the block error probability under successive cancellation decoding is $o(2^{-N^{1/2-ε}})$, where $N$ is the block length. Encoding and decoding for these codes can be implemented with a complexity of $O(N\log N)$. It is shown that the same technique can be used to construct polar codes for arbitrary multiple access channels (MAC) by using an appropriate Abelian group structure. Although the symmetric sum capacity is achieved by this coding scheme, some points in the symmetric capacity region may not be achieved. In the case where the channel is a combination of linear channels, we provide a necessary and sufficient condition characterizing the channels whose symmetric capacity region is preserved by the polarization process. We also provide a sufficient condition for having a maximal loss in the dominant face.
△ Less
Submitted 13 November, 2013;
originally announced November 2013.
-
Polar codes for the m-user multiple access channels
Authors:
Rajai Nasser
Abstract:
Polar codes are constructed for m-user multiple access channels (MAC) whose input alphabet size is a prime number. The block error probability under successive cancelation decoding decays exponentially with the square root of the block length. Although the sum capacity is achieved by this coding scheme, some points in the symmetric capacity region may not be achieved. In the case where the channel…
▽ More
Polar codes are constructed for m-user multiple access channels (MAC) whose input alphabet size is a prime number. The block error probability under successive cancelation decoding decays exponentially with the square root of the block length. Although the sum capacity is achieved by this coding scheme, some points in the symmetric capacity region may not be achieved. In the case where the channel is a combination of linear channels, we provide a necessary and sufficient condition characterizing the channels whose symmetric capacity region is preserved upon the polarization process. We also provide a sufficient condition for having a total loss in the dominant face.
△ Less
Submitted 8 December, 2011;
originally announced December 2011.
-
Oriented paths in n-chromatic digraphs
Authors:
Rajai Nasser
Abstract:
In this thesis, we try to treat the problem of oriented paths in n-chromatic digraphs. We first treat the case of antidirected paths in 5-chromatic digraphs, where we explain El-Sahili's theorem and provide an elementary and shorter proof of it. We then treat the case of paths with two blocks in n-chromatic digraphs with n greater than 4, where we explain the two different approaches of Addario-Be…
▽ More
In this thesis, we try to treat the problem of oriented paths in n-chromatic digraphs. We first treat the case of antidirected paths in 5-chromatic digraphs, where we explain El-Sahili's theorem and provide an elementary and shorter proof of it. We then treat the case of paths with two blocks in n-chromatic digraphs with n greater than 4, where we explain the two different approaches of Addario-Berry et al. and of El-Sahili. We indicate a mistake in Addario-Berry et al.'s proof and provide a correction for it.
△ Less
Submitted 7 December, 2011;
originally announced December 2011.