Skip to main content

Showing 1–45 of 45 results for author: Perlaza, S M

.
  1. arXiv:2402.02861  [pdf, other

    cs.GT cs.IT stat.ML

    Leveraging Noisy Observations in Zero-Sum Games

    Authors: Emmanouil M Athanasakos, Samir M Perlaza

    Abstract: This paper studies an instance of zero-sum games in which one player (the leader) commits to its opponent (the follower) to choose its actions by sampling a given probability measure (strategy). The actions of the leader are observed by the follower as the output of an arbitrary channel. In response to that, the follower chooses its action based on its current information, that is, the leader's co… ▽ More

    Submitted 5 February, 2024; originally announced February 2024.

    Comments: This paper is submitted to the 2024 IEEE International Symposium on Information Theory (ISIT 2024)

  2. arXiv:2402.00501  [pdf, ps, other

    stat.ML cs.IT cs.LG

    Equivalence of the Empirical Risk Minimization to Regularization on the Family of f-Divergences

    Authors: Francisco Daunas, Iñaki Esnaola, Samir M. Perlaza, H. Vincent Poor

    Abstract: The solution to empirical risk minimization with $f$-divergence regularization (ERM-$f$DR) is presented under mild conditions on $f$. Under such conditions, the optimal measure is shown to be unique. Examples of the solution for particular choices of the function $f$ are presented. Previously known solutions to common regularization choices are obtained by leveraging the flexibility of the family… ▽ More

    Submitted 1 February, 2024; originally announced February 2024.

    Comments: Submitted to the IEEE Symposium in Information Theory 2024. arXiv admin note: text overlap with arXiv:2306.07123

  3. arXiv:2312.12236  [pdf, ps, other

    cs.LG cs.IT math.ST

    Generalization Analysis of Machine Learning Algorithms via the Worst-Case Data-Generating Probability Measure

    Authors: Xinying Zou, Samir M. Perlaza, Iñaki Esnaola, Eitan Altman

    Abstract: In this paper, the worst-case probability measure over the data is introduced as a tool for characterizing the generalization capabilities of machine learning algorithms. More specifically, the worst-case probability measure is a Gibbs probability measure and the unique solution to the maximization of the expected loss under a relative entropy constraint with respect to a reference probability mea… ▽ More

    Submitted 19 December, 2023; originally announced December 2023.

    Comments: To appear in the Proceedings of the AAAI Conference on Artificial Intelligence (7 + 2 pages)

    Report number: INRIA Technical Report RR-9515

  4. arXiv:2306.12380  [pdf, ps, other

    cs.LG cs.IT math.PR math.ST

    On the Validation of Gibbs Algorithms: Training Datasets, Test Datasets and their Aggregation

    Authors: Samir M. Perlaza, Iñaki Esnaola, Gaetan Bisson, H. Vincent Poor

    Abstract: The dependence on training data of the Gibbs algorithm (GA) is analytically characterized. By adopting the expected empirical risk as the performance metric, the sensitivity of the GA is obtained in closed form. In this case, sensitivity is the performance difference with respect to an arbitrary alternative algorithm. This description enables the development of explicit expressions involving the t… ▽ More

    Submitted 21 June, 2023; originally announced June 2023.

    Comments: In Proc. IEEE International Symposium on Information Theory (ISIT), Taipei, Taiwan, Jun., 2023. arXiv admin note: text overlap with arXiv:2211.06617

  5. arXiv:2306.07123  [pdf, ps, other

    cs.IT stat.ML

    Analysis of the Relative Entropy Asymmetry in the Regularization of Empirical Risk Minimization

    Authors: Francisco Daunas, Iñaki Esnaola, Samir M. Perlaza, H. Vincent Poor

    Abstract: The effect of the relative entropy asymmetry is analyzed in the empirical risk minimization with relative entropy regularization (ERM-RER) problem. A novel regularization is introduced, coined Type-II regularization, that allows for solutions to the ERM-RER problem with a support that extends outside the support of the reference measure. The solution to the new ERM-RER Type-II problem is analytica… ▽ More

    Submitted 12 June, 2023; originally announced June 2023.

    Comments: To appear in the proceedings of the International Symposium on Information Theory 2023

  6. arXiv:2211.06617  [pdf, other

    math.ST cs.IT cs.LG

    Empirical Risk Minimization with Relative Entropy Regularization

    Authors: Samir M. Perlaza, Gaetan Bisson, Iñaki Esnaola, Alain Jean-Marie, Stefano Rini

    Abstract: The empirical risk minimization (ERM) problem with relative entropy regularization (ERM-RER) is investigated under the assumption that the reference measure is a $σ$-finite measure, and not necessarily a probability measure. Under this assumption, which leads to a generalization of the ERM-RER problem allowing a larger degree of flexibility for incorporating prior knowledge, numerous relevant prop… ▽ More

    Submitted 8 April, 2024; v1 submitted 12 November, 2022; originally announced November 2022.

    Comments: Appears in IEEE Transactions on Information Theory: Submitted June 2023. Revised in October 2023. Accepted January 2024. CameraReady February 2024. Also available as: Research Report, INRIA, No. RR-9454, Centre Inria d'Université Côte d'Azur, Sophia Antipolis, France, Feb., 2022. Last version: Version 7

    Report number: RR-9454

  7. arXiv:2211.05873  [pdf, ps, other

    cs.IT

    Information-Energy Regions in the Finite Block-Length Regime with Finite Channel Inputs

    Authors: Sadaf Ul Zuhra, Samir M. Perlaza, H. Vincent Poor, Mikael Skoglund

    Abstract: This paper characterizes the trade-offs between information and energy transmission over an additive white Gaussian noise channel in the finite block-length regime with finite sets of channel input symbols. These trade-offs are characterized using impossibility and achievability bounds on the information transmission rate, energy transmission rate, decoding error probability (DEP) and energy outag… ▽ More

    Submitted 24 May, 2023; v1 submitted 10 November, 2022; originally announced November 2022.

    Comments: arXiv admin note: text overlap with arXiv:2202.05002, arXiv:2110.01882

  8. arXiv:2211.02538  [pdf, other

    eess.SY

    An information theoretic vulnerability metric for data integrity attacks on smart grids

    Authors: Xiuzhen Ye, Iñaki Esnaola, Samir M. Perlaza, Robert F. Harrison

    Abstract: A novel metric that describes the vulnerability of the measurements in power systems to data integrity attacks is proposed. The new metric, coined vulnerability index (VuIx), leverages information theoretic measures to assess the attack effect on the fundamental limits of the disruption and detection tradeoff. The result of computing the VuIx of the measurements in the system yields an ordering of… ▽ More

    Submitted 4 November, 2022; originally announced November 2022.

    Comments: 7 pages, 10 figures, submitted to IET Smart Grid. arXiv admin note: substantial text overlap with arXiv:2207.06973

  9. arXiv:2211.01703  [pdf, other

    cs.GT cs.IT cs.LG math.ST stat.ML

    $2 \times 2$ Zero-Sum Games with Commitments and Noisy Observations

    Authors: Ke Sun, Samir M. Perlaza, Alain Jean-Marie

    Abstract: In this paper, $2\times2$ zero-sum games are studied under the following assumptions: $(1)$ One of the players (the leader) commits to choose its actions by sampling a given probability measure (strategy); $(2)$ The leader announces its action, which is observed by its opponent (the follower) through a binary channel; and $(3)$ the follower chooses its strategy based on the knowledge of the leader… ▽ More

    Submitted 11 May, 2023; v1 submitted 3 November, 2022; originally announced November 2022.

    Comments: Accepted by 2023 IEEE Int. Symp. on Information Theory (ISIT)

  10. arXiv:2207.06973  [pdf, ps, other

    eess.SY

    Power Injection Measurements are more Vulnerable to Data Integrity Attacks than Power Flow Measurements

    Authors: Xiuzhen Ye, Iñaki Esnaola, Samir M. Perlaza, Robert F. Harrison

    Abstract: A novel metric that describes the vulnerability of the measurements in power system to data integrity attacks is proposed. The new metric, coined vulnerability index (VuIx), leverages information theoretic measures to assess the attack effect on the fundamental limits of the disruption and detection tradeoff. The result of computing the VuIx of the measurements in the system yields an ordering of… ▽ More

    Submitted 14 July, 2022; originally announced July 2022.

    Comments: 6 pages, 9 figures, Submitted to IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids

  11. arXiv:2206.10211  [pdf, other

    cs.IT cs.GT

    FEAT: Fair Coordinated Iterative Water-Filling Algorithm

    Authors: Majed Haddad, Piotr Wiecek, Oussama Habachi, Samir M. Perlaza, Shahid M. Shah

    Abstract: In this paper, we consider a perfect coordinated water-filling game, where each user transmits solely on a given carrier. The main goal of the proposed algorithm (which we call FEAT) is to get close to the optimal, while kee** a decent level of fairness. The key idea within FEAT is to minimize the ratio between the best and the worst utilities of the users. This is done by ensuring that, at each… ▽ More

    Submitted 22 June, 2022; v1 submitted 21 June, 2022; originally announced June 2022.

    Comments: 27 PAGES, 14 FIGURES

  12. arXiv:2202.05002  [pdf, ps, other

    cs.IT

    Achievable Information-Energy Region in the Finite Block-Length Regime with Finite Constellations

    Authors: Sadaf ul Zuhra, Samir M. Perlaza, H. Vincent Poor, Eitan Altman

    Abstract: This paper characterizes an achievable information-energy region of simultaneous information and energy transmission over an additive white Gaussian noise channel. This analysis is performed in the finite block-length regime with finite constellations. More specifically, a method for constructing a family of codes is proposed and the set of achievable tuples of information rate, energy rate, decod… ▽ More

    Submitted 10 February, 2022; originally announced February 2022.

  13. arXiv:2202.04385  [pdf, ps, other

    cs.LG cs.IT math.ST

    Empirical Risk Minimization with Relative Entropy Regularization: Optimality and Sensitivity Analysis

    Authors: Samir M. Perlaza, Gaetan Bisson, Iñaki Esnaola, Alain Jean-Marie, Stefano Rini

    Abstract: The optimality and sensitivity of the empirical risk minimization problem with relative entropy regularization (ERM-RER) are investigated for the case in which the reference is a sigma-finite measure instead of a probability measure. This generalization allows for a larger degree of flexibility in the incorporation of prior knowledge over the set of models. In this setting, the interplay of the re… ▽ More

    Submitted 12 November, 2022; v1 submitted 9 February, 2022; originally announced February 2022.

    Comments: In Proc. IEEE International Symposium on Information Theory (ISIT), Aalto, Finland, Jul., 2022

  14. arXiv:2201.00065  [pdf, ps, other

    eess.SY

    Stealth Data Injection Attacks with Sparsity Constraints

    Authors: Xiuzhen Ye, Iñaki Esnaola, Samir M. Perlaza, Robert F. Harrison

    Abstract: Sparse stealth attack constructions that minimize the mutual information between the state variables and the observations are proposed. The attack construction is formulated as the design of a multivariate Gaussian distribution that aims to minimize the mutual information while limiting the Kullback-Leibler divergence between the distribution of the observations under attack and the distribution o… ▽ More

    Submitted 23 July, 2022; v1 submitted 31 December, 2021; originally announced January 2022.

    Comments: 10 pages, 6 figures, submited to IEEE Trans. Smart Grid

  15. arXiv:2110.01882  [pdf, ps, other

    cs.IT

    Simultaneous Information and Energy Transmission with Finite Constellations

    Authors: Sadaf ul Zuhra, Samir M. Perlaza, Eitan Altman

    Abstract: In this paper, the fundamental limits on the rates at which information and energy can be simultaneously transmitted over an additive white Gaussian noise channel are studied under the following assumptions: $(a)$ the channel is memoryless; $(b)$ the number of channel input symbols (constellation size) and block length are finite; and $(c)$ the decoding error probability (DEP) and the energy outag… ▽ More

    Submitted 5 October, 2021; originally announced October 2021.

    Journal ref: Information Theory Workshop 2021

  16. arXiv:2102.01925  [pdf, other

    eess.SY

    Data-Injection Attacks

    Authors: Iñaki Esnaola, Samir M. Perlaza, Ke Sun

    Abstract: In this chapter we review some of the basic attack constructions that exploit a stochastic description of the state variables. We pose the state estimation problem in a Bayesian setting and cast the bad data detection procedure as a Bayesian hypothesis testing problem. This revised detection framework provides the benchmark for the attack detection problem that limits the achievable attack disrupt… ▽ More

    Submitted 3 February, 2021; originally announced February 2021.

    Comments: arXiv admin note: substantial text overlap with arXiv:1808.04184

    Journal ref: Chapter 9 of: Advanced Data Analytics for Power Systems, A. Tajer, S. M. Perlaza and H. V. Poor, Eds., Cambridge University Press, Cambridge, UK, 2021, pp. 197-229

  17. arXiv:2007.02764  [pdf, ps, other

    eess.SY

    Information Theoretic Data Injection Attacks with Sparsity Constraints

    Authors: Xiuzhen Ye, Iñaki Esnaola, Samir M. Perlaza, Robert F. Harrison

    Abstract: Information theoretic sparse attacks that minimize simultaneously the information obtained by the operator and the probability of detection are studied in a Bayesian state estimation setting. The attack construction is formulated as an optimization problem that aims to minimize the mutual information between the state variables and the observations while guaranteeing the stealth of the attack. Ste… ▽ More

    Submitted 15 July, 2022; v1 submitted 6 July, 2020; originally announced July 2020.

    Comments: 6 pages, 3 figures, published in 2020 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm)

  18. arXiv:1809.06968  [pdf, other

    cs.IT

    Approximate Nash Region of the Gaussian Interference Channel with Noisy Output Feedback

    Authors: Victor Quintero, Samir M. Perlaza, Jean-Marie Gorce, H. Vincent Poor

    Abstract: In this paper, an achievable $η$-Nash equilibrium ($η$-NE) region for the two-user Gaussian interference channel with noisy channel-output feedback is presented for all $η\geqslant 1$. This result is obtained in the scenario in which each transmitter-receiver pair chooses its own transmit-receive configuration in order to maximize its own individual information transmission rate. At an $η$-NE, any… ▽ More

    Submitted 18 September, 2018; originally announced September 2018.

    Comments: Accepted paper in IEEE ITW-2018

  19. arXiv:1808.04184  [pdf, other

    cs.IT eess.SY

    Stealth Attacks on the Smart Grid

    Authors: Ke Sun, Iñaki Esnaola, Samir M. Perlaza, H. Vincent Poor

    Abstract: Random attacks that jointly minimize the amount of information acquired by the operator about the state of the grid and the probability of attack detection are presented. The attacks minimize the information acquired by the operator by minimizing the mutual information between the observations and the state variables describing the grid. Simultaneously, the attacker aims to minimize the probabilit… ▽ More

    Submitted 7 April, 2020; v1 submitted 13 August, 2018; originally announced August 2018.

    Comments: IEEE Trans. Smart Grid

    Journal ref: IEEE Trans. Smart Grid, vol. 11 , no. 2, pp. 1276-1285, Mar. 2020

  20. arXiv:1708.07810  [pdf, other

    cs.IT eess.SY

    Information-Theoretic Attacks in the Smart Grid

    Authors: Ke Sun, Inaki Esnaola, Samir M. Perlaza, H. Vincent Poor

    Abstract: Gaussian random attacks that jointly minimize the amount of information obtained by the operator from the grid and the probability of attack detection are presented. The construction of the attack is posed as an optimization problem with a utility function that captures two effects: firstly, minimizing the mutual information between the measurements and the state variables; secondly, minimizing th… ▽ More

    Submitted 25 August, 2017; originally announced August 2017.

    Comments: 2017 IEEE International Conference on Smart Grid Communications (SmartGridComm)

    Journal ref: in Proc. IEEE Int. Conf. on Smart Grid Commun., Dresden, Germany, Oct. 2017, pp. 455-460

  21. arXiv:1708.01583  [pdf, other

    eess.SY

    Robust Recovery of Missing Data in Electricity Distribution Systems

    Authors: Cristian Genes, Iñaki Esnaola, Samir. M. Perlaza, Luis F. Ochoa, Daniel Coca

    Abstract: The advanced operation of future electricity distribution systems is likely to require significant observability of the different parameters of interest (e.g., demand, voltages, currents, etc.). Ensuring completeness of data is, therefore, paramount. In this context, an algorithm for recovering missing state variable observations in electricity distribution systems is presented. The proposed metho… ▽ More

    Submitted 4 August, 2017; originally announced August 2017.

    Comments: Submitted to IEEE Trans. Smart Grid

  22. arXiv:1705.04051  [pdf, other

    cs.IT

    Nash Region of the Linear Deterministic Interference Channel with Noisy Output Feedback

    Authors: Victor Quintero, Samir M. Perlaza, Jean-Marie Gorce, H. Vincent Poor

    Abstract: In this paper, the $η$-Nash equilibrium ($η$-NE) region of the two-user linear deterministic interference channel (IC) with noisy channel-output feedback is characterized for all $η> 0$. The $η$-NE region, a subset of the capacity region, contains the set of all achievable information rate pairs that are stable in the sense of an $η$-NE. More specifically, given an $η$-NE coding scheme, there does… ▽ More

    Submitted 11 May, 2017; originally announced May 2017.

    Comments: 5 pages, 2 figures, to appear in ISIT 2017

  23. arXiv:1611.05322  [pdf, other

    cs.IT

    Approximate Capacity Region of the Two-User Gaussian Interference Channel with Noisy Channel-Output Feedback

    Authors: Victor Quintero, Samir M. Perlaza, Iñaki Esnaola, Jean-Marie Gorce

    Abstract: In this paper, the capacity region of the linear deterministic interference channel with noisy channel-output feedback (LD-IC-NF) is fully characterized. The proof of achievability is based on random coding arguments and rate splitting; block-Markov superposition coding; and backward decoding. The proof of converse reuses some of the existing outer bounds and includes new ones obtained using genie… ▽ More

    Submitted 19 May, 2018; v1 submitted 15 November, 2016; originally announced November 2016.

    Comments: This work will appear in the IEEE Transactions on Information Theory. Accepted on Mar. 4, 2018. Part of this work was presented at the IEEE International Workshop on Information Theory (ITW), Cambridge, UK, Sept., 2016 (arXiv:1603.07554), and IEEE-ITW, Jeju Island, Korea, Oct., 2015 (arXiv:1502.04649). Parts of this work appear in INRIA Reports 0456 (arXiv:1608.08920) and 8861 (arXiv:1608.08907)

  24. arXiv:1608.08920  [pdf, other

    cs.IT

    Noisy Channel-Output Feedback Capacity of the Linear Deterministic Interference Channel

    Authors: Victor Quintero, Samir M. Perlaza, Jean-Marie Gorce

    Abstract: In this technical report, the capacity region of the two-user linear deterministic (LD) interference channel with noisy output feedback (IC-NOF) is fully characterized. This result allows the identification of several asymmetric scenarios in which implementing channel-output feedback in only one of the transmitter-receiver pairs is as beneficial as implementing it in both links, in terms of achiev… ▽ More

    Submitted 15 November, 2016; v1 submitted 31 August, 2016; originally announced August 2016.

    Comments: INRIA Technical Report 456, 34 pages, 18 figures. arXiv admin note: text overlap with arXiv:1608.08907

    Report number: INRIA TR 456

  25. arXiv:1608.08907  [pdf, other

    cs.IT

    Approximate Capacity of the Two-User Gaussian Interference Channel with Noisy Channel-Output Feedback

    Authors: Victor Quintero, Samir M. Perlaza, Iñaki Esnaola, Jean-Marie Gorce

    Abstract: In this research report, an achievability region and a converse region for the two-user Gaussian interference channel with noisy channel-output feedback (G-IC-NOF) are presented. The achievability region is obtained using a random coding argument and three well-known techniques: rate splitting, superposition coding and backward decoding. The converse region is obtained using some of the existing p… ▽ More

    Submitted 15 November, 2016; v1 submitted 31 August, 2016; originally announced August 2016.

    Comments: INRIA Research report 8861. 38 pages. 5 figures. arXiv admin note: text overlap with arXiv:1608.08920

    Report number: INRIA RR 8861

  26. arXiv:1606.04432  [pdf, other

    cs.IT

    Decentralized Simultaneous Information and Energy Transmission in K-User Multiple Access Channels

    Authors: Selma Belhadj Amor, Samir M. Perlaza, H. Vincent Poor

    Abstract: In this paper, the fundamental limits of decentralized simultaneous information and energy transmission in the $K$-user Gaussian multiple access channel (G-MAC), with an arbitrary $K \geqslant 2$ and one non-colocated energy harvester (EH), are fully characterized. The objective of the transmitters is twofold. First, they aim to reliably communicate their message indices to the receiver; and sec… ▽ More

    Submitted 26 September, 2017; v1 submitted 14 June, 2016; originally announced June 2016.

    Comments: 17 pages, 4 figures. Submitted to IEEE Transactions on Information Theory

  27. arXiv:1604.03432  [pdf, other

    cs.IT

    Fundamental Limits of Simultaneous Energy and Information Transmission

    Authors: Selma Belhadj Amor, Samir M. Perlaza

    Abstract: In this paper, existing results regarding the fundamental limits of simultaneous energy and information transmission in wireless networks are reviewed. In point-to-point channels, the fundamental limits on the information rate given a minimum energy rate constraint are fully characterized by the notion of information-energy capacity function introduced by Varshney in 2008. In a centralized multi-u… ▽ More

    Submitted 12 April, 2016; originally announced April 2016.

    Comments: 5 pages, one figure. Invited paper at the 23rd International Conference on Telecommunications, Thessaloniki, Greece, May 2016

  28. Approximate Capacity of the Gaussian Interference Channel with Noisy Channel-Output Feedback

    Authors: Victor Quintero, Samir M. Perlaza, Iñaki Esnaola, Jean-Marie Gorce

    Abstract: In this paper, an achievability region and a converse region for the two-user Gaussian interference channel with noisy channel-output feedback (G-IC-NOF) are presented. The achievability region is obtained using a random coding argument and three well-known techniques: rate splitting, superposition coding and backward decoding. The converse region is obtained using some of the existing perfect-out… ▽ More

    Submitted 14 November, 2016; v1 submitted 24 March, 2016; originally announced March 2016.

    Comments: 5 Pages, 3 figures. Paper in IEEE Information Theory Workshop 2016 (ITW-2016)

  29. arXiv:1512.01465  [pdf, other

    cs.IT

    Feedback Enhances Simultaneous Wireless Information and Energy Transmission in Multiple Access Channels

    Authors: Selma Belhadj Amor, Samir M. Perlaza, Ioannis Krikidis, H. Vincent Poor

    Abstract: In this report, the fundamental limits of simultaneous information and energy transmission in the two-user Gaussian multiple access channel (G-MAC) with and without feedback are fully characterized. More specifically, all the achievable information and energy transmission rates (in bits per channel use and energy-units per channel use, respectively) are identified. Furthermore, the fundamental lim… ▽ More

    Submitted 13 March, 2017; v1 submitted 4 December, 2015; originally announced December 2015.

    Comments: INRIA REPORT N°8804, accepted for publication in IEEE transactions on Information Theory, March, 2017

  30. Noisy Channel-Output Feedback Capacity of the Linear Deterministic Interference Channel

    Authors: Victor Quintero, Samir M. Perlaza, Jean-Marie Gorce

    Abstract: In this paper, the capacity region of the two-user linear deterministic (LD) interference channel with noisy output feedback (IC-NOF) is fully characterized. This result allows the identification of several asymmetric scenarios in which imple- menting channel-output feedback in only one of the transmitter- receiver pairs is as beneficial as implementing it in both links, in terms of achievable ind… ▽ More

    Submitted 27 January, 2016; v1 submitted 16 February, 2015; originally announced February 2015.

    Comments: 5 pages, 9 figures, see proofs in V. Quintero, S. M. Perlaza, and J.-M. Gorce, "Noisy channel-output feedback capacity of the linear deterministic interference channel," INRIA, Tech. Rep. 456, Jan. 2015. This was submitted and accepted in IEEE ITW 2015

  31. Power Allocation Strategies in Energy Harvesting Wireless Cooperative Networks

    Authors: Zhiguo Ding, Samir M. Perlaza, Inaki Esnaola, H. Vincent Poor

    Abstract: In this paper, a wireless cooperative network is considered, in which multiple source-destination pairs communicate with each other via an energy harvesting relay. The focus of this paper is on the relay's strategies to distribute the harvested energy among the multiple users and their impact on the system performance. Specifically, a non-cooperative strategy is to use the energy harvested from th… ▽ More

    Submitted 15 July, 2013; v1 submitted 5 July, 2013; originally announced July 2013.

    Comments: submitted to IEEE TWireless

  32. arXiv:1306.2878  [pdf, other

    cs.IT

    Perfect Output Feedback in the Two-User Decentralized Interference Channel

    Authors: Samir M. Perlaza, Ravi Tandon, H. Vincent Poor, Zhu Han

    Abstract: In this paper, the $η$-Nash equilibrium ($η$-NE) region of the two-user Gaussian interference channel (IC) with perfect output feedback is approximated to within $1$ bit/s/Hz and $η$ arbitrarily close to $1$ bit/s/Hz. The relevance of the $η$-NE region is that it provides the set of rate-pairs that are achievable and stable in the IC when both transmitter-receiver pairs autonomously tune their own… ▽ More

    Submitted 9 August, 2015; v1 submitted 12 June, 2013; originally announced June 2013.

    Comments: Revised version (Aug. 2015)

  33. arXiv:1202.6157  [pdf, other

    cs.GT cs.AI cs.LG

    Distributed Power Allocation with SINR Constraints Using Trial and Error Learning

    Authors: Luca Rose, Samir M. Perlaza, Mérouane Debbah, Christophe J. Le Martret

    Abstract: In this paper, we address the problem of global transmit power minimization in a self-congiguring network where radio devices are subject to operate at a minimum signal to interference plus noise ratio (SINR) level. We model the network as a parallel Gaussian interference channel and we introduce a fully decentralized algorithm (based on trial and error) able to statistically achieve a congigurati… ▽ More

    Submitted 28 February, 2012; originally announced February 2012.

    Comments: 6 pages, 3 figures, accepted at WCNC 2012

  34. arXiv:1112.1895  [pdf, other

    cs.GT

    Equilibria of Channel Selection Games in Parallel Multiple Access Channel

    Authors: Samir M. Perlaza, Samson Lasaulce, Mérouane Debbah

    Abstract: In this paper, we study the decentralized parallel multiple access channel (MAC) when transmitters selfishly maximize their individual spectral efficiency by selecting a single channel to transmit. More specifically, we investigate the set of Nash equilibria (NE) of decentralized networks comprising several transmitters communicating with a single receiver that implements single user decoding. Thi… ▽ More

    Submitted 8 December, 2011; originally announced December 2011.

    Comments: Article submitted to EURASIP Journal on Wireless Communications. 15 pages and 6 figures

  35. Quality-Of-Service Provisioning in Decentralized Networks: A Satisfaction Equilibrium Approach

    Authors: Samir M. Perlaza, Hamidou Tembiné, Samson Lasaulce, Mérouane Debbah

    Abstract: This paper introduces a particular game formulation and its corresponding notion of equilibrium, namely the satisfaction form (SF) and the satisfaction equilibrium (SE). A game in SF models the case where players are uniquely interested in the satisfaction of some individual performance constraints, instead of individual performance optimization. Under this formulation, the notion of equilibrium c… ▽ More

    Submitted 7 December, 2011; originally announced December 2011.

    Comments: Article accepted for publication in IEEE Journal on Selected Topics in Signal Processing, special issue in Game Theory in Signal Processing. 16 pages, 6 figures

  36. arXiv:1110.1732  [pdf, ps, other

    cs.GT physics.soc-ph

    Electrical Vehicles in the Smart Grid: A Mean Field Game Analysis

    Authors: Romain Couillet, Samir Medina Perlaza, Hamidou Tembine, Merouane Debbah

    Abstract: In this article, we investigate the competitive interaction between electrical vehicles or hybrid oil-electricity vehicles in a Cournot market consisting of electricity transactions to or from an underlying electricity distribution network. We provide a mean field game formulation for this competition, and introduce the set of fundamental differential equations ruling the behavior of the vehicles… ▽ More

    Submitted 11 December, 2011; v1 submitted 8 October, 2011; originally announced October 2011.

    Comments: submitted to IEEE Journal on Selected Areas in Communications: Smart Grid Communications Series

  37. arXiv:1106.2662  [pdf, other

    cs.LG cs.AI cs.GT cs.MA

    Learning Equilibria with Partial Information in Decentralized Wireless Networks

    Authors: Luca Rose, Samir M. Perlaza, Samson Lasaulce, Mérouane Debbah

    Abstract: In this article, a survey of several important equilibrium concepts for decentralized networks is presented. The term decentralized is used here to refer to scenarios where decisions (e.g., choosing a power allocation policy) are taken autonomously by devices interacting with each other (e.g., through mutual interference). The iterative long-term interaction is characterized by stable points of th… ▽ More

    Submitted 14 June, 2011; originally announced June 2011.

    Comments: 16 pages, 5 figures, 1 table. To appear in IEEE Communication Magazine, special Issue on Game Theory

  38. arXiv:1106.2650  [pdf, ps, other

    cs.GT

    On the Nash Equilibria in Decentralized Parallel Interference Channels

    Authors: Luca Rose, Samir M. Perlaza, Mérouane Debbah

    Abstract: In this paper, the 2-dimensional decentralized parallel interference channel (IC) with 2 transmitter-receiver pairs is modelled as a non-cooperative static game. Each transmitter is assumed to be a fully rational entity with complete information on the game, aiming to maximize its own individual spectral efficiency by tuning its own power allocation (PA) vector. Two scenarios are analysed. First,… ▽ More

    Submitted 14 June, 2011; originally announced June 2011.

    Comments: 6 pages, 4 figures, presented in ICCC Kyoto 2011

  39. arXiv:1009.5026  [pdf, ps, other

    cs.GT cs.IT

    On the Fictitious Play and Channel Selection Games

    Authors: S. M. Perlaza, H. Tembine, S. Lasaulce, V. Quintero-Florez

    Abstract: Considering the interaction through mutual interference of the different radio devices, the channel selection (CS) problem in decentralized parallel multiple access channels can be modeled by strategic-form games. Here, we show that the CS problem is a potential game (PG) and thus the fictitious play (FP) converges to a Nash equilibrium (NE) either in pure or mixed strategies. Using a 2-player 2-c… ▽ More

    Submitted 25 September, 2010; originally announced September 2010.

    Comments: In proc. of the IEEE Latin-American Conference on Communications (LATINCOM), Bogota, Colombia, September, 2010

  40. arXiv:1007.5170  [pdf, ps, other

    cs.NI cs.GT

    Satisfaction Equilibrium: A General Framework for QoS Provisioning in Self-Configuring Networks

    Authors: Samir M. Perlaza, Hamidou Tembine, Samson Lasaulce, Merouane Debbah

    Abstract: This paper is concerned with the concept of equilibrium and quality of service (QoS) provisioning in self-configuring wireless networks with non-cooperative radio devices (RD). In contrast with the Nash equilibrium (NE), where RDs are interested in selfishly maximizing its QoS, we present a concept of equilibrium, named satisfaction equilibrium (SE), where RDs are interested only in guaranteing a… ▽ More

    Submitted 29 July, 2010; originally announced July 2010.

    Comments: Accepted for publication in Globecom 2010

  41. arXiv:0908.1667  [pdf, ps, other

    cs.GT

    On the Base Station Selection and Base Station Sharing in Self-Configuring Networks

    Authors: S. M. Perlaza, E. V. Belmega, S. Lasaulce, M. Debbah

    Abstract: We model the interaction of several radio devices aiming to obtain wireless connectivity by using a set of base stations (BS) as a non-cooperative game. Each radio device aims to maximize its own spectral efficiency (SE) in two different scenarios: First, we let each player to use a unique BS (BS selection) and second, we let them to simultaneously use several BSs (BS Sharing). In both cases, we… ▽ More

    Submitted 12 August, 2009; originally announced August 2009.

    Comments: 3rd ICST/ACM International Workshop on Game Theory in Communication Networks. October 23th 2009. Pisa, Italy

  42. From Spectrum Pooling to Space Pooling: Opportunistic Interference Alignment in MIMO Cognitive Networks

    Authors: S. M. Perlaza, N. Fawaz, S. Lasaulce, M. Debbah

    Abstract: We describe a non-cooperative interference alignment (IA) technique which allows an opportunistic multiple input multiple output (MIMO) link (secondary) to harmlessly coexist with another MIMO link (primary) in the same frequency band. Assuming perfect channel knowledge at the primary receiver and transmitter, capacity is achieved by transmiting along the spatial directions (SD) associated with… ▽ More

    Submitted 24 December, 2009; v1 submitted 7 July, 2009; originally announced July 2009.

    Comments: Submitted to IEEE Trans. in Signal Processing. Revised on 23-11-09

  43. arXiv:0905.2676  [pdf, ps, other

    cs.IT

    On the Benefits of Bandwidth Limiting in Decentralized Vector Multiple Access Channels

    Authors: Samir M. Perlaza, Merouane Debbah, Samson Lasaulce, Hanna Bogucka

    Abstract: We study the network spectral efficiency of decentralized vector multiple access channels (MACs) when the number of accessible dimensions per transmitter is strategically limited. Considering each dimension as a frequency band, we call this limiting process bandwidth limiting (BL). Assuming that each transmitter maximizes its own data rate by water-filling over the available frequency bands, we… ▽ More

    Submitted 16 May, 2009; originally announced May 2009.

  44. Opportunistic Interference Alignment in MIMO Interference Channels

    Authors: Samir Medina Perlaza, Merouane Debbah, Samson Lasaulce, Jean-Marie Chaufray

    Abstract: We present two interference alignment techniques such that an opportunistic point-to-point multiple input multiple output (MIMO) link can reuse, without generating any additional interference, the same frequency band of a similar pre-existing primary link. In this scenario, we exploit the fact that under power constraints, although each radio maximizes independently its rate by water-filling on… ▽ More

    Submitted 24 June, 2008; v1 submitted 23 June, 2008; originally announced June 2008.

    Comments: To appear in proc. IEEE PIMRC 2008 - Workshop in Emerging Network Perspectives in Multiuser and Cooperative MIMO (NWMIMO). 5 pages and 4 figures

  45. A Game Theoretic Framework for Decentralized Power Allocation in IDMA Systems

    Authors: Samir Medina Perlaza, Laura Cottatellucci, Merouane Debbah

    Abstract: In this contribution we present a decentralized power allocation algorithm for the uplink interleave division multiple access (IDMA) channel. Within the proposed optimal strategy for power allocation, each user aims at selfishly maximizing its own utility function. An iterative chip by chip (CBC) decoder at the receiver and a rational selfish behavior of all the users according to a classical ga… ▽ More

    Submitted 23 June, 2008; v1 submitted 9 March, 2008; originally announced March 2008.

    Comments: To appear in IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC 2008)