Skip to main content

Showing 1–27 of 27 results for author: Nasser, R

.
  1. arXiv:2406.04860  [pdf, other

    cs.LG cs.DS stat.ML

    Multi-View Stochastic Block Models

    Authors: Vincent Cohen-Addad, Tommaso d'Orsi, Silvio Lattanzi, Rajai Nasser

    Abstract: Graph clustering is a central topic in unsupervised learning with a multitude of practical applications. In recent years, multi-view graph clustering has gained a lot of attention for its applicability to real-world instances where one has access to multiple data sources. In this paper we formalize a new family of models, called \textit{multi-view stochastic block models} that captures this settin… ▽ More

    Submitted 7 June, 2024; originally announced June 2024.

    Comments: 31 pages, ICML 2024

    ACM Class: F.2; G.3

  2. arXiv:2211.07327  [pdf, ps, other

    cs.LG stat.ML

    Higher degree sum-of-squares relaxations robust against oblivious outliers

    Authors: Tommaso d'Orsi, Rajai Nasser, Gleb Novikov, David Steurer

    Abstract: We consider estimation models of the form $Y=X^*+N$, where $X^*$ is some $m$-dimensional signal we wish to recover, and $N$ is symmetrically distributed noise that may be unbounded in all but a small $α$ fraction of the entries. We introduce a family of algorithms that under mild assumptions recover the signal $X^*$ in all estimation problems for which there exists a sum-of-squares algorithm that… ▽ More

    Submitted 14 November, 2022; originally announced November 2022.

    Comments: To appear in SODA 2023

  3. arXiv:2202.01297  [pdf, ps, other

    cs.IT

    Age Distribution in Arbitrary Preemptive Memoryless Networks

    Authors: Rajai Nasser, Ibrahim Issa, Ibrahim Abou-Faycal

    Abstract: We study the probability distribution of age of information (AoI) in arbitrary networks with memoryless service times. A source node generates packets following a Poisson process, and then the packets are forwarded across the network in such a way that newer updates preempt older ones. This model is equivalent to gossip networks that was recently studied by Yates, and for which he obtained a recur… ▽ More

    Submitted 2 February, 2022; originally announced February 2022.

    Comments: 20 pages

  4. arXiv:2201.09818  [pdf, ps, other

    cs.LG cs.CC math.ST stat.ML

    Optimal SQ Lower Bounds for Learning Halfspaces with Massart Noise

    Authors: Rajai Nasser, Stefan Tiegel

    Abstract: We give tight statistical query (SQ) lower bounds for learnining halfspaces in the presence of Massart noise. In particular, suppose that all labels are corrupted with probability at most $η$. We show that for arbitrary $η\in [0,1/2]$ every SQ algorithm achieving misclassification error better than $η$ requires queries of superpolynomial accuracy or at least a superpolynomial number of queries. Fu… ▽ More

    Submitted 24 January, 2022; originally announced January 2022.

  5. arXiv:2111.08568  [pdf, ps, other

    cs.LG stat.ML

    Robust recovery for stochastic block models

    Authors: **gqiu Ding, Tommaso d'Orsi, Rajai Nasser, David Steurer

    Abstract: We develop an efficient algorithm for weak recovery in a robust version of the stochastic block model. The algorithm matches the statistical guarantees of the best known algorithms for the vanilla version of the stochastic block model. In this sense, our results show that there is no price of robustness in the stochastic block model. Our work is heavily inspired by recent work of Banks, Mohanty, a… ▽ More

    Submitted 16 November, 2021; originally announced November 2021.

    Comments: 203 pages, to appear in FOCS 2021

  6. arXiv:2111.02966  [pdf, ps, other

    cs.LG stat.ML

    Consistent Estimation for PCA and Sparse Regression with Oblivious Outliers

    Authors: Tommaso d'Orsi, Chih-Hung Liu, Rajai Nasser, Gleb Novikov, David Steurer, Stefan Tiegel

    Abstract: We develop machinery to design efficiently computable and consistent estimators, achieving estimation error approaching zero as the number of observations grows, when facing an oblivious adversary that may corrupt responses in all but an $α$ fraction of the samples. As concrete examples, we investigate two problems: sparse regression and principal component analysis (PCA). For sparse regression, w… ▽ More

    Submitted 4 November, 2021; originally announced November 2021.

    Comments: To appear in NeurIPS 2021

  7. On the Scattering of Waves inside Charged Spherically Symmetric Black Holes

    Authors: Mokdad Mokdad, Rajai Nasser

    Abstract: In this paper we show that there is a breakdown of scattering between the event horizon (or the Cauchy horizon) and an intermediate Cauchy hypersurface in the dynamic interior of a Reissner-Nordström-like black hole. More precisely, we show that the trace operators and their analytic counterparts, the inverse wave operators, do not have bounded inverses, even though these operators themselves are… ▽ More

    Submitted 4 April, 2022; v1 submitted 10 October, 2021; originally announced October 2021.

    Comments: 26 pages, 3 figures

    Journal ref: Annales Henri Poincaré (2022)

  8. arXiv:2108.09138  [pdf, other

    cs.IT eess.SP

    deep unfolding for non-negative matrix factorization with application to mutational signature analysis

    Authors: Rami Nasser, Yonina C. Eldar, Roded Sharan

    Abstract: Non-negative matrix factorization (NMF) is a fundamental matrix decomposition technique that is used primarily for dimensionality reduction and is increasing in popularity in the biological domain. Although finding a unique NMF is generally not possible, there are various iterative algorithms for NMF optimization that converge to locally optimal solutions. Such techniques can also serve as a start… ▽ More

    Submitted 20 August, 2021; originally announced August 2021.

  9. arXiv:2105.09512  [pdf, other

    stat.CO cs.MS math.PR stat.AP

    Uncertainty quantification through Monte Carlo method in a cloud computing setting

    Authors: A. Cunha Jr, R. Nasser, R. Sampaio, H. Lopes, K. Breitman

    Abstract: The Monte Carlo (MC) method is the most common technique used for uncertainty quantification, due to its simplicity and good statistical results. However, its computational cost is extremely high, and, in many cases, prohibitive. Fortunately, the MC algorithm is easily parallelizable, which allows its use in simulations where the computation of a single realization is very costly. This work presen… ▽ More

    Submitted 20 May, 2021; originally announced May 2021.

    MSC Class: 62D05 ACM Class: G.3

    Journal ref: Computer Physics Communications, vol. 185, pp. 1355-1363, 2014

  10. arXiv:2003.12967  [pdf, ps, other

    math.AP math.OC

    Stability results for an elastic-viscoelastic waves interaction systems with localized Kelvin-Voigt dam** and with an internal or boundary time delay

    Authors: Mouhammad Ghader, Rayan Nasser, Ali Wehbe

    Abstract: We investigate the stability of a one-dimensional wave equation with non smooth localized internal viscoelastic dam** of Kelvin-Voigt type and with boundary or localized internal delay feedback. The main novelty in this paper is that the Kelvin-Voigt and the delay dam** are both localized via non smooth coefficients. In the case that the Kelvin-Voigt dam** is localized faraway from the tip a… ▽ More

    Submitted 29 March, 2020; originally announced March 2020.

  11. arXiv:1901.01573  [pdf, other

    cs.IT

    Optimal Age over Erasure Channels

    Authors: Elie Najm, Emre Telatar, Rajai Nasser

    Abstract: Previous works on age of information and erasure channels have dealt with specific models and computed the average age or average peak age for certain settings. In this paper, given a source that produces a letter every $T_s$ seconds and an erasure channel that can be used every $T_c$ seconds, we ask what is the coding strategy that minimizes the time-average age of information that an observer of… ▽ More

    Submitted 20 October, 2021; v1 submitted 6 January, 2019; originally announced January 2019.

  12. arXiv:1811.05203  [pdf, ps, other

    cs.IT

    On the Polarization Levels of Automorphic-Symmetric Channels

    Authors: Rajai Nasser

    Abstract: It is known that if an Abelian group operation is used in an Arıkan-style construction, we have multilevel polarization where synthetic channels can approach intermediate channels that are neither almost perfect nor almost useless. An open problem in polarization theory is to determine the polarization levels of a given channel. In this paper, we discuss the polarization levels of a family of chan… ▽ More

    Submitted 15 November, 2018; v1 submitted 13 November, 2018; originally announced November 2018.

  13. arXiv:1810.10821  [pdf, ps, other

    cs.IT

    On the Convergence of the Polarization Process in the Noisiness/Weak-$\ast$ Topology

    Authors: Rajai Nasser

    Abstract: Let $W$ be a channel where the input alphabet is endowed with an Abelian group operation, and let $(W_n)_{n\geq 0}$ be Arıkan's channel-valued polarization process that is obtained from $W$ using this operation. We prove that the process $(W_n)_{n\geq 0}$ converges almost surely to deterministic homomorphism channels in the noisiness/weak-$\ast$ topology. This provides a simple proof of multilevel… ▽ More

    Submitted 26 October, 2018; v1 submitted 25 October, 2018; originally announced October 2018.

  14. arXiv:1801.04067  [pdf, other

    cs.IT

    Content Based Status Updates

    Authors: Elie Najm, Rajai Nasser, Emre Telatar

    Abstract: Consider a stream of status updates generated by a source, where each update is of one of two types: high priority or ordinary (low priority). These updates are to be transmitted through a network to a monitor. However, the transmission policy of each packet depends on the type of stream it belongs to. For the low priority stream, we analyze and compare the performances of two transmission schemes… ▽ More

    Submitted 15 October, 2019; v1 submitted 12 January, 2018; originally announced January 2018.

  15. arXiv:1705.01394  [pdf, ps, other

    cs.IT

    A Characterization of the Shannon Ordering of Communication Channels

    Authors: Rajai Nasser

    Abstract: The ordering of communication channels was first introduced by Shannon. In this paper, we aim to find a characterization of the Shannon ordering. We show that $W'$ contains $W$ if and only if $W$ is the skew-composition of $W'$ with a convex-product channel. This fact is used to derive a characterization of the Shannon ordering that is similar to the Blackwell-Sherman-Stein theorem. Two channels a… ▽ More

    Submitted 3 May, 2017; originally announced May 2017.

    Comments: 23 pages, presented in part at ISIT'17. arXiv admin note: text overlap with arXiv:1702.00727

  16. arXiv:1702.00727  [pdf, ps, other

    cs.IT

    On the Input-Degradedness and Input-Equivalence Between Channels

    Authors: Rajai Nasser

    Abstract: A channel $W$ is said to be input-degraded from another channel $W'$ if $W$ can be simulated from $W'$ by randomization at the input. We provide a necessary and sufficient condition for a channel to be input-degraded from another one. We show that any decoder that is good for $W'$ is also good for $W$. We provide two characterizations for input-degradedness, one of which is similar to the Blackwel… ▽ More

    Submitted 2 February, 2017; originally announced February 2017.

    Comments: 30 pages. Submitted to IEEE Trans. Inform. Theory and in part to ISIT2017. arXiv admin note: substantial text overlap with arXiv:1701.04467

  17. arXiv:1701.04467  [pdf, ps, other

    math.GN cs.IT

    Topological Structures on DMC spaces

    Authors: Rajai Nasser

    Abstract: Two channels are said to be equivalent if they are degraded from each other. The space of equivalent channels with input alphabet $X$ and output alphabet $Y$ can be naturally endowed with the quotient of the Euclidean topology by the equivalence relation. A topology on the space of equivalent channels with fixed input alphabet $X$ and arbitrary but finite output alphabet is said to be natural if a… ▽ More

    Submitted 13 March, 2017; v1 submitted 16 January, 2017; originally announced January 2017.

    Comments: 43 pages, submitted to IEEE Trans. Inform. Theory and in part to ISIT2017

  18. Continuity of Channel Parameters and Operations under Various DMC Topologies

    Authors: Rajai Nasser

    Abstract: We study the continuity of many channel parameters and operations under various topologies on the space of equivalent discrete memoryless channels (DMC). We show that mutual information, channel capacity, Bhattacharyya parameter, probability of error of a fixed code, and optimal probability of error for a given code rate and blocklength, are continuous under various DMC topologies. We also show th… ▽ More

    Submitted 27 March, 2017; v1 submitted 16 January, 2017; originally announced January 2017.

    Comments: 31 pages. Submitted to IEEE Trans. Inform. Theory and in part to ISIT2017

  19. Polar Codes for Arbitrary Classical-Quantum Channels and Arbitrary cq-MACs

    Authors: Rajai Nasser, Joseph M. Renes

    Abstract: We prove polarization theorems for arbitrary classical-quantum (cq) channels. The input alphabet is endowed with an arbitrary Abelian group operation and an Arıkan-style transformation is applied using this operation. It is shown that as the number of polarization steps becomes large, the synthetic cq-channels polarize to deterministic homomorphism channels which project their input to a quotient… ▽ More

    Submitted 12 January, 2017; originally announced January 2017.

    Comments: 30 pages. Submitted to IEEE Trans. Inform. Theory and in part to ISIT2017

    Journal ref: IEEE Transactions on Information Theory 64, 7424 (2018)

  20. arXiv:1604.01286  [pdf, ps, other

    cs.IT

    Age of Information: The Gamma Awakening

    Authors: Elie Najm, Rajai Nasser

    Abstract: We consider a scenario where a monitor is interested in being up to date with respect to the status of some system which is not directly accessible to this monitor. However, we assume a source node has access to the status and can send status updates as packets to the monitor through a communication system. We also assume that the status updates are generated randomly as a Poisson process. The sou… ▽ More

    Submitted 5 April, 2016; originally announced April 2016.

  21. arXiv:1602.06690  [pdf, ps, other

    cs.IT

    Erasure Schemes Using Generalized Polar Codes: Zero-Undetected-Error Capacity and Performance Trade-offs

    Authors: Rajai Nasser

    Abstract: We study the performance of generalized polar (GP) codes when they are used for coding schemes involving erasure. GP codes are a family of codes which contains, among others, the standard polar codes of Arıkan and Reed-Muller codes. We derive a closed formula for the zero-undetected-error capacity $I_0^{GP}(W)$ of GP codes for a given binary memoryless symmetric (BMS) channel $W$ under the low com… ▽ More

    Submitted 4 April, 2016; v1 submitted 22 February, 2016; originally announced February 2016.

    Comments: Accepted to ISIT2016

  22. Fourier Analysis of MAC Polarization

    Authors: Rajai Nasser, Emre Telatar

    Abstract: One problem with MAC polar codes that are based on MAC polarization is that they may not achieve the entire capacity region. The reason behind this problem is that MAC polarization sometimes induces a loss in the capacity region. This paper provides a single letter necessary and sufficient condition which characterizes all the MACs that do not lose any part of their capacity region by polarization… ▽ More

    Submitted 6 April, 2017; v1 submitted 24 January, 2015; originally announced January 2015.

    Comments: 33 pages, accepted to IEEE Trans. Inform. Theory and presented in part in ISIT2015

  23. Ergodic Theory Meets Polarization. II: A Foundation of Polarization Theory

    Authors: Rajai Nasser

    Abstract: An open problem in polarization theory is to determine the binary operations that always lead to polarization (in the general multilevel sense) when they are used in Arıkan style constructions. This paper, which is presented in two parts, solves this problem by providing a necessary and sufficient condition for a binary operation to be polarizing. This (second) part provides a foundation of polari… ▽ More

    Submitted 4 October, 2016; v1 submitted 11 June, 2014; originally announced June 2014.

    Comments: 33 pages. Accepted to IEEE Trans. Inform. Theory and presented in part at ISIT'15

    Journal ref: IEEE Transactions on Information Theory, vol. 63, no. 2, pp. 1063-1083, Feb. 2017

  24. Ergodic Theory Meets Polarization. I: An Ergodic Theory for Binary Operations

    Authors: Rajai Nasser

    Abstract: An open problem in polarization theory is to determine the binary operations that always lead to polarization (in the general multilevel sense) when they are used in Arıkan style constructions. This paper, which is presented in two parts, solves this problem by providing a necessary and sufficient condition for a binary operation to be polarizing. This (first) part of the paper introduces the math… ▽ More

    Submitted 4 October, 2016; v1 submitted 11 June, 2014; originally announced June 2014.

    Comments: 34 pages, 1 figure. Accepted to IEEE Trans. Inform. Theory and presented in part at ISIT'15

    Journal ref: IEEE Transactions on Information Theory, vol. 62, no. 12, pp. 6931-6952, Dec. 2016

  25. arXiv:1311.3123  [pdf, other

    cs.IT

    Polar Codes for Arbitrary DMCs and Arbitrary MACs

    Authors: Rajai Nasser, Emre Telatar

    Abstract: Polar codes are constructed for arbitrary channels by imposing an arbitrary quasigroup structure on the input alphabet. Just as with "usual" polar codes, the block error probability under successive cancellation decoding is $o(2^{-N^{1/2-ε}})$, where $N$ is the block length. Encoding and decoding for these codes can be implemented with a complexity of $O(N\log N)$. It is shown that the same techni… ▽ More

    Submitted 13 November, 2013; originally announced November 2013.

    Comments: 32 pages, 1 figure. arXiv admin note: text overlap with arXiv:1112.1770

    Journal ref: IEEE Transactions on Information Theory, vol. 62, no. 6, pp. 2917-2936, June 2016

  26. arXiv:1112.1770  [pdf, ps, other

    cs.IT

    Polar codes for the m-user multiple access channels

    Authors: Rajai Nasser

    Abstract: Polar codes are constructed for m-user multiple access channels (MAC) whose input alphabet size is a prime number. The block error probability under successive cancelation decoding decays exponentially with the square root of the block length. Although the sum capacity is achieved by this coding scheme, some points in the symmetric capacity region may not be achieved. In the case where the channel… ▽ More

    Submitted 8 December, 2011; originally announced December 2011.

    Comments: 21 pages

  27. arXiv:1112.1545  [pdf, other

    math.CO

    Oriented paths in n-chromatic digraphs

    Authors: Rajai Nasser

    Abstract: In this thesis, we try to treat the problem of oriented paths in n-chromatic digraphs. We first treat the case of antidirected paths in 5-chromatic digraphs, where we explain El-Sahili's theorem and provide an elementary and shorter proof of it. We then treat the case of paths with two blocks in n-chromatic digraphs with n greater than 4, where we explain the two different approaches of Addario-Be… ▽ More

    Submitted 7 December, 2011; originally announced December 2011.

    Comments: 25 pages, Master thesis in Graph Theory at the Lebanese University