Skip to main content

Showing 1–22 of 22 results for author: Nazer, B

.
  1. arXiv:2405.08225  [pdf, ps, other

    math.ST cs.IT math.PR

    Linear Operator Approximate Message Passing (OpAMP)

    Authors: Riccardo Rossetti, Bobak Nazer, Galen Reeves

    Abstract: This paper introduces a framework for approximate message passing (AMP) in dynamic settings where the data at each iteration is passed through a linear operator. This framework is motivated in part by applications in large-scale, distributed computing where only a subset of the data is available at each iteration. An autoregressive memory term is used to mitigate information loss across iterations… ▽ More

    Submitted 13 May, 2024; originally announced May 2024.

    Comments: 31 pages, 5 figures

  2. arXiv:2206.12011  [pdf, ps, other

    cs.IT math.ST

    Detecting Correlated Gaussian Databases

    Authors: Zeynep K, Bobak Nazer

    Abstract: This paper considers the problem of detecting whether two databases, each consisting of $n$ users with $d$ Gaussian features, are correlated. Under the null hypothesis, the databases are independent. Under the alternate hypothesis, the features are correlated across databases, under an unknown row permutation. A simple test is developed to show that detection is achievable above… ▽ More

    Submitted 23 June, 2022; originally announced June 2022.

    Comments: 26 pages, 4 figures

  3. arXiv:2110.00132  [pdf, other

    cs.IT

    A Unified Discretization Approach to Compute-Forward: From Discrete to Continuous Inputs

    Authors: Adriano Pastore, Sung Hoon Lim, Chen Feng, Bobak Nazer, Michael Gastpar

    Abstract: Compute-forward is a coding technique that enables receiver(s) in a network to directly decode one or more linear combinations of the transmitted codewords. Initial efforts focused on Gaussian channels and derived achievable rate regions via nested lattice codes and single-user (lattice) decoding as well as sequential (lattice) decoding. Recently, these results have been generalized to discrete me… ▽ More

    Submitted 30 September, 2021; originally announced October 2021.

    Comments: 86 pages, 7 figures, submitted to IEEE Transactions of Information Theory

  4. arXiv:2011.03678  [pdf, ps, other

    cs.IT math.ST

    Limits on Testing Structural Changes in Ising Models

    Authors: Aditya Gangrade, Bobak Nazer, Venkatesh Saligrama

    Abstract: We present novel information-theoretic limits on detecting sparse changes in Ising models, a problem that arises in many applications where network changes can occur due to some external stimuli. We show that the sample complexity for detecting sparse changes, in a minimax sense, is no better than learning the entire model even in settings with local sparsity. This is a surprising fact in light of… ▽ More

    Submitted 6 November, 2020; originally announced November 2020.

    Comments: Slightly expanded version of a paper to appear at NeurIPS 2020. Supersedes arXiv:1710.10366

  5. arXiv:2001.00607  [pdf, ps, other

    cs.IT

    Integer-Forcing Architectures for Uplink Cloud Radio Access Networks

    Authors: Islam El Bakoury, Bobak Nazer

    Abstract: Consider an uplink cloud radio access network where users are observed simultaneously by several base stations, each with a rate-limited link to a central processor, which wishes to decode all transmitted messages. Recent efforts have demonstrated the advantages of compression-based strategies that send quantized channel observations to the central processor, rather than attempt local decoding. We… ▽ More

    Submitted 6 January, 2020; v1 submitted 2 January, 2020; originally announced January 2020.

    Comments: 16 pages, 6 figures, to appear in IEEE Transactions on Wireless Communications

  6. arXiv:1901.03274  [pdf, ps, other

    cs.IT

    Towards an Algebraic Network Information Theory: Simultaneous Joint Typicality Decoding

    Authors: Sung Hoon Lim, Chen Feng, Adriano Pastore, Bobak Nazer, Michael Gastpar

    Abstract: Consider a receiver in a multi-user network that wishes to decode several messages. Simultaneous joint typicality decoding is one of the most powerful techniques for determining the fundamental limits at which reliable decoding is possible. This technique has historically been used in conjunction with random i.i.d. codebooks to establish achievable rate regions for networks. Recently, it has been… ▽ More

    Submitted 10 January, 2019; originally announced January 2019.

    Comments: 24 pages, 5 figures, submitted to IEEE Transactions on Information Theory

  7. arXiv:1812.03031  [pdf, ps, other

    cs.IT

    Information-Distilling Quantizers

    Authors: Alankrita Bhatt, Bobak Nazer, Or Ordentlich, Yury Polyanskiy

    Abstract: Let $X$ and $Y$ be dependent random variables. This paper considers the problem of designing a scalar quantizer for $Y$ to maximize the mutual information between the quantizer's output and $X$, and develops fundamental properties and bounds for this form of quantization, which is connected to the log-loss distortion criterion. The main focus is the regime of low $I(X;Y)$, where it is shown that,… ▽ More

    Submitted 29 October, 2019; v1 submitted 7 December, 2018; originally announced December 2018.

  8. arXiv:1812.00769  [pdf, ps, other

    cs.IT cs.LG cs.SI math.ST

    Testing Changes in Communities for the Stochastic Block Model

    Authors: Aditya Gangrade, Praveen Venkatesh, Bobak Nazer, Venkatesh Saligrama

    Abstract: We propose and analyze the problems of \textit{community goodness-of-fit and two-sample testing} for stochastic block models (SBM), where changes arise due to modification in community memberships of nodes. Motivated by practical applications, we consider the challenging sparse regime, where expected node degrees are constant, and the inter-community mean degree ($b$) scales proportionally to intr… ▽ More

    Submitted 30 October, 2019; v1 submitted 29 November, 2018; originally announced December 2018.

    Comments: Version 3 includes material on unbalanced but linearly sized communities. This version is to appear in NeurIPS 2019

  9. arXiv:1710.10366  [pdf, ps, other

    cs.IT cs.LG math.ST

    Lower Bounds for Two-Sample Structural Change Detection in Ising and Gaussian Models

    Authors: Aditya Gangrade, Bobak Nazer, Venkatesh Saligrama

    Abstract: The change detection problem is to determine if the Markov network structures of two Markov random fields differ from one another given two sets of samples drawn from the respective underlying distributions. We study the trade-off between the sample sizes and the reliability of change detection, measured as a minimax risk, for the important cases of the Ising models and the Gaussian Markov random… ▽ More

    Submitted 27 October, 2017; originally announced October 2017.

    Comments: Presented at the 55th Annual Allerton Conference on Communication, Control, and Computing, Oct. 2017

  10. arXiv:1608.03351  [pdf, ps, other

    cs.IT

    Uplink-Downlink Duality for Integer-Forcing

    Authors: Wenbo He, Bobak Nazer, Shlomo Shamai

    Abstract: Consider a Gaussian multiple-input multiple-output (MIMO) multiple-access channel (MAC) with channel matrix $\mathbf{H}$ and a Gaussian MIMO broadcast channel (BC) with channel matrix $\mathbf{H}^{\mathsf{T}}$. For the MIMO MAC, the integer-forcing architecture consists of first decoding integer-linear combinations of the transmitted codewords, which are then solved for the original messages. For… ▽ More

    Submitted 6 January, 2018; v1 submitted 10 August, 2016; originally announced August 2016.

    Comments: 20 pages, 10 figures, to appear in IEEE Transactions on Information Theory

  11. arXiv:1606.09548  [pdf, ps, other

    cs.IT

    A Joint Typicality Approach to Algebraic Network Information Theory

    Authors: Sung Hoon Lim, Chen Feng, Adriano Pastore, Bobak Nazer, Michael Gastpar

    Abstract: This paper presents a joint typicality framework for encoding and decoding nested linear codes for multi-user networks. This framework provides a new perspective on compute-forward within the context of discrete memoryless networks. In particular, it establishes an achievable rate region for computing the weighted sum of nested linear codewords over a discrete memoryless multiple-access channel (M… ▽ More

    Submitted 30 June, 2016; originally announced June 2016.

    Comments: 69 pages, 11 figures, submitted to the IEEE Transactions on Information Theory

  12. Expanding the Compute-and-Forward Framework: Unequal Powers, Signal Levels, and Multiple Linear Combinations

    Authors: Bobak Nazer, Viveck Cadambe, Vasilis Ntranos, Giuseppe Caire

    Abstract: The compute-and-forward framework permits each receiver in a Gaussian network to directly decode a linear combination of the transmitted messages. The resulting linear combinations can then be employed as an end-to-end communication strategy for relaying, interference alignment, and other applications. Recent efforts have demonstrated the advantages of employing unequal powers at the transmitters… ▽ More

    Submitted 28 June, 2016; v1 submitted 7 April, 2015; originally announced April 2015.

    Comments: 30 pages, 10 figures, to appear in IEEE Transactions on Information Theory

  13. arXiv:1307.2105  [pdf, ps, other

    cs.IT

    Successive Integer-Forcing and its Sum-Rate Optimality

    Authors: Or Ordentlich, Uri Erez, Bobak Nazer

    Abstract: Integer-forcing receivers generalize traditional linear receivers for the multiple-input multiple-output channel by decoding integer-linear combinations of the transmitted streams, rather then the streams themselves. Previous works have shown that the additional degree of freedom in choosing the integer coefficients enables this receiver to approach the performance of maximum-likelihood decoding i… ▽ More

    Submitted 8 July, 2013; originally announced July 2013.

    Comments: A shorter version was submitted to the 51st Allerton Conference

  14. arXiv:1210.0293  [pdf, other

    cs.IT

    Feedback Interference Alignment: Exact Alignment for Three Users in Two Time Slots

    Authors: Vasilis Ntranos, Viveck R. Cadambe, Bobak Nazer, Giuseppe Caire

    Abstract: We study the three-user interference channel where each transmitter has local feedback of the signal from its targeted receiver. We show that in the important case where the channel coefficients are static, exact alignment can be achieved over two time slots using linear schemes. This is in contrast with the interference channel where no feedback is utilized, where it seems that either an infinite… ▽ More

    Submitted 1 October, 2012; originally announced October 2012.

  15. The Approximate Sum Capacity of the Symmetric Gaussian K-User Interference Channel

    Authors: Or Ordentlich, Uri Erez, Bobak Nazer

    Abstract: Interference alignment has emerged as a powerful tool in the analysis of multi-user networks. Despite considerable recent progress, the capacity region of the Gaussian K-user interference channel is still unknown in general, in part due to the challenges associated with alignment on the signal scale using lattice codes. This paper develops a new framework for lattice interference alignment, based… ▽ More

    Submitted 19 March, 2014; v1 submitted 1 June, 2012; originally announced June 2012.

    Comments: Accepted for publication in the IEEE Transactions on Information Theory

  16. arXiv:1108.6312  [pdf, ps, other

    cs.IT

    Computation Alignment: Capacity Approximation without Noise Accumulation

    Authors: Urs Niesen, Bobak Nazer, Phil Whiting

    Abstract: Consider several source nodes communicating across a wireless network to a destination node with the help of several layers of relay nodes. Recent work by Avestimehr et al. has approximated the capacity of this network up to an additive gap. The communication scheme achieving this capacity approximation is based on compress-and-forward, resulting in noise accumulation as the messages traverse the… ▽ More

    Submitted 4 February, 2013; v1 submitted 31 August, 2011; originally announced August 2011.

    Comments: 36 pages, to appear in IEEE Transactions on Information Theory

    Journal ref: IEEE Transactions on Information Theory, vol. 59, pp. 3811 - 3832, June 2013

  17. arXiv:1102.5724  [pdf, other

    cs.IT

    Reliable Physical Layer Network Coding

    Authors: Bobak Nazer, Michael Gastpar

    Abstract: When two or more users in a wireless network transmit simultaneously, their electromagnetic signals are linearly superimposed on the channel. As a result, a receiver that is interested in one of these signals sees the others as unwanted interference. This property of the wireless medium is typically viewed as a hindrance to reliable communication over a network. However, using a recently developed… ▽ More

    Submitted 28 February, 2011; originally announced February 2011.

    Comments: 19 pages, 14 figures, survey paper to appear in Proceedings of the IEEE

  18. The AWGN Red Alert Problem

    Authors: Bobak Nazer, Yanina Shkel, Stark C. Draper

    Abstract: Consider the following unequal error protection scenario. One special message, dubbed the "red alert" message, is required to have an extremely small probability of missed detection. The remainder of the messages must keep their average probability of error and probability of false alarm below a certain threshold. The goal then is to design a codebook that maximizes the error exponent of the red a… ▽ More

    Submitted 13 August, 2012; v1 submitted 22 February, 2011; originally announced February 2011.

    Comments: 13 pages, 10 figures, To appear in IEEE Transactions on Information Theory

  19. arXiv:1003.5966  [pdf, ps, other

    cs.IT

    Integer-Forcing Linear Receivers

    Authors: Jiening Zhan, Bobak Nazer, Uri Erez, Michael Gastpar

    Abstract: Linear receivers are often used to reduce the implementation complexity of multiple-antenna systems. In a traditional linear receiver architecture, the receive antennas are used to separate out the codewords sent by each transmit antenna, which can then be decoded individually. Although easy to implement, this approach can be highly suboptimal when the channel matrix is near singular. This paper d… ▽ More

    Submitted 5 August, 2014; v1 submitted 30 March, 2010; originally announced March 2010.

    Comments: 40 pages, 16 figures, to appear in the IEEE Transactions on Information Theory

  20. arXiv:0908.2119  [pdf, ps, other

    cs.IT

    Compute-and-Forward: Harnessing Interference through Structured Codes

    Authors: Bobak Nazer, Michael Gastpar

    Abstract: Interference is usually viewed as an obstacle to communication in wireless networks. This paper proposes a new strategy, compute-and-forward, that exploits interference to obtain significantly higher rates between users in a network. The key idea is that relays should decode linear functions of transmitted messages according to their observed channel coefficients rather than ignoring the interfere… ▽ More

    Submitted 12 June, 2011; v1 submitted 14 August, 2009; originally announced August 2009.

    Comments: IEEE Trans. Info Theory, to appear. 23 pages, 13 figures

  21. arXiv:0901.4379  [pdf, ps, other

    cs.IT

    Ergodic Interference Alignment

    Authors: Bobak Nazer, Michael Gastpar, Syed A. Jafar, Sriram Vishwanath

    Abstract: This paper develops a new communication strategy, ergodic interference alignment, for the K-user interference channel with time-varying fading. At any particular time, each receiver will see a superposition of the transmitted signals plus noise. The standard approach to such a scenario results in each transmitter-receiver pair achieving a rate proportional to 1/K its interference-free ergodic capa… ▽ More

    Submitted 16 June, 2012; v1 submitted 27 January, 2009; originally announced January 2009.

    Comments: 16 pages, 6 figure, To appear in IEEE Transactions on Information Theory

  22. arXiv:0802.0342  [pdf, ps, other

    cs.IT

    The Case for Structured Random Codes in Network Capacity Theorems

    Authors: Bobak Nazer, Michael Gastpar

    Abstract: Random coding arguments are the backbone of most channel capacity achievability proofs. In this paper, we show that in their standard form, such arguments are insufficient for proving some network capacity theorems: structured coding arguments, such as random linear or lattice codes, attain higher rates. Historically, structured codes have been studied as a step** stone to practical constructi… ▽ More

    Submitted 4 February, 2008; originally announced February 2008.

    Comments: 23 pages, 7 figures, To appear in European Transactions on Telecommunication: Special Issue on New Directions in Information Theory