Skip to main content

Showing 1–50 of 74 results for author: Rini, S

.
  1. arXiv:2406.08767  [pdf, ps, other

    cs.IT

    Coding for the unsourced B-channel with erasures: enhancing the linked loop code

    Authors: William W. Zheng, Jamison R. Ebert, Stefano Rini, Jean-Francois Chamberland

    Abstract: In [1], the linked loop code (LLC) is presented as a promising code for the unsourced A-channel with erasures (UACE). The UACE is an unsourced multiple access channel in which active users' transmitted symbols are erased with a given probability and the channel output is obtained as the union of the non-erased symbols. In this paper, we extend the UACE channel model to the unsourced B-channel with… ▽ More

    Submitted 20 May, 2024; originally announced June 2024.

    Comments: 5 pages, 2 figures, accepted by ICASSP 2024

  2. arXiv:2406.06349  [pdf, other

    cs.IT

    ARMA Processes with Discrete-Continuous Excitation: Compressibility Beyond Sparsity

    Authors: Mohammad-Amin Charusaie, Stefano Rini, Arash Amini

    Abstract: Rényi Information Dimension (RID) plays a central role in quantifying the compressibility of random variables with singularities in their distribution, encompassing and extending beyond the class of sparse sources. The RID, from a high perspective, presents the average number of bits that is needed for coding the i.i.d. samples of a random variable with high precision. There are two main extension… ▽ More

    Submitted 10 June, 2024; originally announced June 2024.

  3. arXiv:2401.01145  [pdf, other

    eess.AS cs.LG cs.SD

    HAAQI-Net: A Non-intrusive Neural Music Audio Quality Assessment Model for Hearing Aids

    Authors: Dyah A. M. G. Wisnu, Stefano Rini, Ryandhimas E. Zezario, Hsin-Min Wang, Yu Tsao

    Abstract: This paper introduces HAAQI-Net, a non-intrusive deep learning model for music audio quality assessment tailored for hearing aid users. Unlike traditional methods like the Hearing Aid Audio Quality Index (HAAQI), which rely on intrusive comparisons to a reference signal, HAAQI-Net offers a more accessible and efficient alternative. Using a bidirectional Long Short-Term Memory (BLSTM) architecture… ▽ More

    Submitted 5 June, 2024; v1 submitted 2 January, 2024; originally announced January 2024.

  4. arXiv:2312.02160  [pdf, ps, other

    cs.IT cs.MM

    Coding for the unsourced A-channel with erasures: the linked loop code

    Authors: William W. Zheng, Jamison R. Ebert, Stefano Rini, Jean-Francois Chamberland

    Abstract: The A-channel is a noiseless multiple access channel in which users simultaneously transmit Q-ary symbols and the receiver observes the set of transmitted symbols, but not their multiplicities. An A-channel is said to be unsourced if, additionally, users transmissions are encoded across time using a common codebook and decoding of the transmitted messages is done without regard to the identities o… ▽ More

    Submitted 19 September, 2023; originally announced December 2023.

    Comments: 5 pages, 4 figures, to be published in the 31st European Signal Processing Conference, EUSIPCO 2023

  5. arXiv:2311.05003  [pdf, ps, other

    eess.SP cs.IT

    Harmonic Retrieval Using Weighted Lifted-Structure Low-Rank Matrix Completion

    Authors: Mohammad Bokaei, Saeed Razavikia, Stefano Rini, Arash Amini, Hamid Behrouzi

    Abstract: In this paper, we investigate the problem of recovering the frequency components of a mixture of $K$ complex sinusoids from a random subset of $N$ equally-spaced time-domain samples. Because of the random subset, the samples are effectively non-uniform. Besides, the frequency values of each of the $K$ complex sinusoids are assumed to vary continuously within a given range. For this problem, we p… ▽ More

    Submitted 8 November, 2023; originally announced November 2023.

  6. arXiv:2301.09269  [pdf, other

    cs.LG cs.DC cs.IT

    M22: A Communication-Efficient Algorithm for Federated Learning Inspired by Rate-Distortion

    Authors: Yangyi Liu, Stefano Rini, Sadaf Salehkalaibar, Jun Chen

    Abstract: In federated learning (FL), the communication constraint between the remote learners and the Parameter Server (PS) is a crucial bottleneck. For this reason, model updates must be compressed so as to minimize the loss in accuracy resulting from the communication constraint. This paper proposes ``\emph{${\bf M}$-magnitude weighted $L_{\bf 2}$ distortion + $\bf 2$ degrees of freedom''} (M22) algorith… ▽ More

    Submitted 22 January, 2023; originally announced January 2023.

    Comments: arXiv admin note: text overlap with arXiv:2202.02812

  7. arXiv:2211.06617  [pdf, other

    math.ST cs.IT cs.LG

    Empirical Risk Minimization with Relative Entropy Regularization

    Authors: Samir M. Perlaza, Gaetan Bisson, Iñaki Esnaola, Alain Jean-Marie, Stefano Rini

    Abstract: The empirical risk minimization (ERM) problem with relative entropy regularization (ERM-RER) is investigated under the assumption that the reference measure is a $σ$-finite measure, and not necessarily a probability measure. Under this assumption, which leads to a generalization of the ERM-RER problem allowing a larger degree of flexibility for incorporating prior knowledge, numerous relevant prop… ▽ More

    Submitted 8 April, 2024; v1 submitted 12 November, 2022; originally announced November 2022.

    Comments: Appears in IEEE Transactions on Information Theory: Submitted June 2023. Revised in October 2023. Accepted January 2024. CameraReady February 2024. Also available as: Research Report, INRIA, No. RR-9454, Centre Inria d'Université Côte d'Azur, Sophia Antipolis, France, Feb., 2022. Last version: Version 7

    Report number: RR-9454

  8. arXiv:2205.08199  [pdf, ps, other

    cs.IT cs.LG stat.ML

    Sharp asymptotics on the compression of two-layer neural networks

    Authors: Mohammad Hossein Amani, Simone Bombari, Marco Mondelli, Rattana Pukdee, Stefano Rini

    Abstract: In this paper, we study the compression of a target two-layer neural network with N nodes into a compressed network with M<N nodes. More precisely, we consider the setting in which the weights of the target network are i.i.d. sub-Gaussian, and we minimize the population L_2 loss between the outputs of the target and of the compressed network, under the assumption of Gaussian inputs. By using tools… ▽ More

    Submitted 16 August, 2022; v1 submitted 17 May, 2022; originally announced May 2022.

  9. arXiv:2204.08211  [pdf, ps, other

    cs.LG

    How to Attain Communication-Efficient DNN Training? Convert, Compress, Correct

    Authors: Zhong-**g Chen, Eduin E. Hernandez, Yu-Chih Huang, Stefano Rini

    Abstract: This paper introduces CO3 -- an algorithm for communication-efficient federated Deep Neural Network (DNN) training. CO3 takes its name from three processing applied which reduce the communication load when transmitting the local DNN gradients from the remote users to the Parameter Server. Namely: (i) gradient quantization through floating-point conversion, (ii) lossless compression of the quantize… ▽ More

    Submitted 1 June, 2023; v1 submitted 18 April, 2022; originally announced April 2022.

    Comments: arXiv admin note: substantial text overlap with arXiv:2203.09044

  10. arXiv:2203.11793  [pdf, other

    cs.IT cs.LG eess.SP

    A Perspective on Neural Capacity Estimation: Viability and Reliability

    Authors: Farhad Mirkarimi, Stefano Rini, Nariman Farsad

    Abstract: Recently, several methods have been proposed for estimating the mutual information from sample data using deep neural networks. These estimators ar referred to as neural mutual information estimation (NMIE)s. NMIEs differ from other approaches as they are data-driven estimators. As such, they have the potential to perform well on a large class of capacity problems. In order to test the performance… ▽ More

    Submitted 5 October, 2022; v1 submitted 22 March, 2022; originally announced March 2022.

    Comments: 33 pages, 9 figures, under revison for possible journal publication

  11. arXiv:2203.09044  [pdf, ps, other

    cs.LG

    Convert, compress, correct: Three steps toward communication-efficient DNN training

    Authors: Zhong-**g Chen, Eduin E. Hernandez, Yu-Chih Huang, Stefano Rini

    Abstract: In this paper, we introduce a novel algorithm, $\mathsf{CO}_3$, for communication-efficiency distributed Deep Neural Network (DNN) training. $\mathsf{CO}_3$ is a joint training/communication protocol, which encompasses three processing steps for the network gradients: (i) quantization through floating-point conversion, (ii) lossless compression, and (iii) error correction. These three components a… ▽ More

    Submitted 16 March, 2022; originally announced March 2022.

  12. Coded Demixing for Unsourced Random Access

    Authors: Jamison R. Ebert, Vamsi K. Amalladinne, Stefano Rini, Jean-Francois Chamberland, Krishna R. Narayanan

    Abstract: Unsourced random access (URA) is a recently proposed multiple access paradigm tailored to the uplink channel of machine-type communication networks. By exploiting a strong connection between URA and compressed sensing, the massive multiple access problem may be cast as a compressed sensing (CS) problem, albeit one in exceedingly large dimensions. To efficiently handle the dimensionality of the pro… ▽ More

    Submitted 27 June, 2022; v1 submitted 1 March, 2022; originally announced March 2022.

    Comments: 1053-587X Copyright 2022 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See https://www.ieee.org/publications/rights/index.html for more information

    Journal ref: IEEE Transactions on Signal Processing, vol. 70, pp. 2972-2984, 2022

  13. arXiv:2202.10148  [pdf, other

    eess.SP cs.IT

    Two-snapshot DOA Estimation via Hankel-structured Matrix Completion

    Authors: Mohammad Bokaei, Saeed Razavikia, Arash Amini, Stefano Rini

    Abstract: In this paper, we study the problem of estimating the direction of arrival (DOA) using a sparsely sampled uniform linear array (ULA). Based on an initial incomplete ULA measurement, our strategy is to choose a sparse subset of array elements for measuring the next snapshot. Then, we use a Hankel-structured matrix completion to interpolate for the missing ULA measurements. Finally, the source DOAs… ▽ More

    Submitted 21 February, 2022; originally announced February 2022.

  14. arXiv:2202.04385  [pdf, ps, other

    cs.LG cs.IT math.ST

    Empirical Risk Minimization with Relative Entropy Regularization: Optimality and Sensitivity Analysis

    Authors: Samir M. Perlaza, Gaetan Bisson, Iñaki Esnaola, Alain Jean-Marie, Stefano Rini

    Abstract: The optimality and sensitivity of the empirical risk minimization problem with relative entropy regularization (ERM-RER) are investigated for the case in which the reference is a sigma-finite measure instead of a probability measure. This generalization allows for a larger degree of flexibility in the incorporation of prior knowledge over the set of models. In this setting, the interplay of the re… ▽ More

    Submitted 12 November, 2022; v1 submitted 9 February, 2022; originally announced February 2022.

    Comments: In Proc. IEEE International Symposium on Information Theory (ISIT), Aalto, Finland, Jul., 2022

  15. arXiv:2202.02812  [pdf, ps, other

    cs.LG cs.IT

    Lossy Gradient Compression: How Much Accuracy Can One Bit Buy?

    Authors: Sadaf Salehkalaibar, Stefano Rini

    Abstract: In federated learning (FL), a global model is trained at a Parameter Server (PS) by aggregating model updates obtained from multiple remote learners. Generally, the communication between the remote users and the PS is rate-limited, while the transmission from the PS to the remote users are unconstrained. The FL setting gives rise to the distributed learning scenario in which the updates from the r… ▽ More

    Submitted 2 June, 2022; v1 submitted 6 February, 2022; originally announced February 2022.

  16. arXiv:2111.07599  [pdf, ps, other

    cs.LG

    DNN gradient lossless compression: Can GenNorm be the answer?

    Authors: Zhong-**g Chen, Eduin E. Hernandez, Yu-Chih Huang, Stefano Rini

    Abstract: In this paper, the problem of optimal gradient lossless compression in Deep Neural Network (DNN) training is considered. Gradient compression is relevant in many distributed DNN training scenarios, including the recently popular federated learning (FL) scenario in which each remote users are connected to the parameter server (PS) through a noiseless but rate limited channel. In distributed DNN tra… ▽ More

    Submitted 15 November, 2021; originally announced November 2021.

  17. arXiv:2111.07401  [pdf, other

    cs.IT cs.LG eess.SP

    Neural Capacity Estimators: How Reliable Are They?

    Authors: Farhad Mirkarimi, Stefano Rini, Nariman Farsad

    Abstract: Recently, several methods have been proposed for estimating the mutual information from sample data using deep neural networks and without the knowing closed form distribution of the data. This class of estimators is referred to as neural mutual information estimators. Although very promising, such techniques have yet to be rigorously bench-marked so as to establish their efficacy, ease of impleme… ▽ More

    Submitted 18 March, 2022; v1 submitted 14 November, 2021; originally announced November 2021.

    Comments: 7 pages, accepted for publication at the 2022 IEEE International Conference on Communications (ICC)

  18. arXiv:2110.09164  [pdf, ps, other

    cs.LG

    Speeding-Up Back-Propagation in DNN: Approximate Outer Product with Memory

    Authors: Eduin E. Hernandez, Stefano Rini, Tolga M. Duman

    Abstract: In this paper, an algorithm for approximate evaluation of back-propagation in DNN training is considered, which we term Approximate Outer Product Gradient Descent with Memory (Mem-AOP-GD). The Mem-AOP-GD algorithm implements an approximation of the stochastic gradient descent by considering only a subset of the outer products involved in the matrix multiplications that encompass backpropagation. I… ▽ More

    Submitted 18 October, 2021; originally announced October 2021.

    Comments: 5 pages, 3 figures

  19. arXiv:2106.00564  [pdf, other

    cs.IT cs.LG

    Wireless Federated Learning with Limited Communication and Differential Privacy

    Authors: Amir Sonee, Stefano Rini, Yu-Chih Huang

    Abstract: This paper investigates the role of dimensionality reduction in efficient communication and differential privacy (DP) of the local datasets at the remote users for over-the-air computation (AirComp)-based federated learning (FL) model. More precisely, we consider the FL setting in which clients are prompted to train a machine learning model by simultaneous channel-aware and limited communications… ▽ More

    Submitted 1 June, 2021; originally announced June 2021.

  20. arXiv:2105.14464  [pdf, other

    cs.IT

    Comparison-limited Vector Quantization

    Authors: Joseph Chataignon, Stefano Rini

    Abstract: In this paper a variation of the classic vector quantization problem is considered. In the standard formulation, a quantizer is designed to minimize the distortion between input and output when the number of reconstruction points is fixed. We consider, instead, the scenario in which the number of comparators used in quantization is fixed. More precisely, we study the case in which a vector quantiz… ▽ More

    Submitted 30 May, 2021; originally announced May 2021.

    Comments: 27 pages, 10 figures

  21. arXiv:2104.05686  [pdf, ps, other

    cs.IT

    Stochastic Binning and Coded Demixing for Unsourced Random Access

    Authors: Jamison R. Ebert, Vamsi K. Amalladinne, Stefano Rini, Jean-Francois Chamberland, Krishna R. Narayanan

    Abstract: Unsourced random access is a novel communication paradigm designed for handling a large number of uncoordinated users that sporadically transmit very short messages. Under this model, coded compressed sensing (CCS) has emerged as a low-complexity scheme that exhibits good error performance. Yet, one of the challenges faced by CCS pertains to disentangling a large number of codewords present on a s… ▽ More

    Submitted 21 July, 2021; v1 submitted 12 April, 2021; originally announced April 2021.

    Comments: Submitted to IEEE-SPAWC 2021

  22. arXiv:2103.04215  [pdf, ps, other

    stat.ML cs.LG

    Hierarchical Causal Bandit

    Authors: Ruiyang Song, Stefano Rini, Kuang Xu

    Abstract: Causal bandit is a nascent learning model where an agent sequentially experiments in a causal network of variables, in order to identify the reward-maximizing intervention. Despite the model's wide applicability, existing analytical results are largely restricted to a parallel bandit version where all variables are mutually independent. We introduce in this work the hierarchical causal bandit mode… ▽ More

    Submitted 6 March, 2021; originally announced March 2021.

  23. arXiv:2103.02928  [pdf, other

    cs.DC cs.IT

    Straggler Mitigation through Unequal Error Protection for Distributed Approximate Matrix Multiplication

    Authors: Busra Tegin, Eduin. E. Hernandez, Stefano Rini, Tolga M. Duman

    Abstract: Large-scale machine learning and data mining methods routinely distribute computations across multiple agents to parallelize processing. The time required for the computations at the agents is affected by the availability of local resources and/or poor channel conditions giving rise to the "straggler problem". As a remedy to this problem, we employ Unequal Error Protection (UEP) codes to obtain an… ▽ More

    Submitted 27 July, 2021; v1 submitted 4 March, 2021; originally announced March 2021.

    Comments: 16 pages. arXiv admin note: text overlap with arXiv:2011.02749

  24. arXiv:2102.07704  [pdf, ps, other

    cs.IT

    Multi-Class Unsourced Random Access via Coded Demixing

    Authors: Vamsi K. Amalladinne, Allen Hao, Stefano Rini, Jean-Francois Chamberland

    Abstract: Unsourced random access (URA) is a recently proposed communication paradigm attuned to machine-driven data transfers. In the original URA formulation, all the active devices share the same number of bits per packet. The scenario where several classes of devices transmit concurrently has so far received little attention. An initial solution to this problem takes the form of group successive interfe… ▽ More

    Submitted 15 February, 2021; originally announced February 2021.

    Comments: Submitted to IEEE ISIT-2021

  25. arXiv:2011.10900  [pdf, ps, other

    cs.IT

    An Exploration of the Heterogeneous Unsourced MAC

    Authors: Allen Hao, Stefano Rini, Vamsi Amalladinne, Asit Kumar Pradhan, Jean-Francois Chamberland

    Abstract: The unsourced MAC model was originally introduced to study the communication scenario in which a number of devices with low-complexity and low-energy wish to upload their respective messages to a base station. In the original problem formulation, all devices communicate using the same information rate. This may be very inefficient in certain wireless situations with varied channel conditions, powe… ▽ More

    Submitted 21 November, 2020; originally announced November 2020.

  26. arXiv:2011.07470  [pdf, other

    cs.LG eess.SP

    An efficient label-free analyte detection algorithm for time-resolved spectroscopy

    Authors: Stefano Rini, Hirotsugu Hiramatsu

    Abstract: Time-resolved spectral techniques play an important analysis tool in many contexts, from physical chemistry to biomedicine. Customarily, the label-free detection of analytes is manually performed by experts through the aid of classic dimensionality-reduction methods, such as Principal Component Analysis (PCA) and Non-negative Matrix Factorization (NMF). This fundamental reliance on expert analysis… ▽ More

    Submitted 15 November, 2020; originally announced November 2020.

  27. arXiv:2011.04801  [pdf, ps, other

    cs.IT cs.GT

    Fairness-Oriented User Association in HetNets Using Bargaining Game Theory

    Authors: Ehsan Sadeghi, Hamid Behroozi, Stefano Rini

    Abstract: In this paper, the user association and resource allocation problem is investigated for a two-tier HetNet consisting of one macro Base Station (BS) and a number of pico BSs. The effectiveness of user association to BSs is evaluated in terms of fairness and load distribution. In particular, the problem of determining a fair user association is formulated as a bargaining game so that for the Nash Ba… ▽ More

    Submitted 9 November, 2020; originally announced November 2020.

  28. arXiv:2011.02749  [pdf, ps, other

    cs.IT cs.DC

    Straggler Mitigation through Unequal Error Protection for Distributed Matrix Multiplication

    Authors: Busra Tegin, Eduin E. Hernandez, Stefano Rini, Tolga M. Duman

    Abstract: Large-scale machine learning and data mining methods routinely distribute computations across multiple agents to parallelize processing. The time required for computation at the agents is affected by the availability of local resources giving rise to the "straggler problem" in which the computation results are held back by unresponsive agents. For this problem, linear coding of the matrix sub-bloc… ▽ More

    Submitted 19 March, 2021; v1 submitted 5 November, 2020; originally announced November 2020.

    Comments: 6 pages, 6 figures

  29. arXiv:2011.00889  [pdf, ps, other

    cs.IT

    On Sum Secure Degrees of Freedom for K-User MISO Broadcast Channel With Alternating CSIT

    Authors: Leyla Sadighi, Sadaf Salehkalaibar, Stefano Rini

    Abstract: In this paper, the sum secure degrees of freedom (SDoF) of the $K$-user Multiple Input/Single Output (MISO) Broadcast Channel with Confidential Messages (BCCM) and alternating Channel State Information at the Transmitter (CSIT) is investigated. In the MISO BCCM, a $K$-antenna transmitter (TX) communicates toward $K$ single-antenna receivers (RXs), so that message for RX $k$ is kept secret from RX… ▽ More

    Submitted 22 November, 2020; v1 submitted 2 November, 2020; originally announced November 2020.

    Comments: Journal

  30. arXiv:2010.11292  [pdf, other

    math.OC eess.SY

    Decentralized optimization over noisy, rate-constrained networks: Achieving consensus by communicating differences

    Authors: Rajarshi Saha, Stefano Rini, Milind Rao, Andrea Goldsmith

    Abstract: In decentralized optimization, multiple nodes in a network collaborate to minimize the sum of their local loss functions. The information exchange between nodes required for this task, is often limited by network connectivity. We consider a setting in which communication between nodes is hindered by both (i) a finite rate-constraint on the signal transmitted by any node, and (ii) additive noise co… ▽ More

    Submitted 6 October, 2021; v1 submitted 21 October, 2020; originally announced October 2020.

    Comments: 15 pages, 6 figures (To be published in the "IEEE Journal on Selected Areas in Communications (JSAC) Special Issue on Distributed Learning over Wireless Edge Networks")

  31. arXiv:2005.07776  [pdf, other

    cs.LG cs.CR cs.DC cs.IT stat.ML

    Efficient Federated Learning over Multiple Access Channel with Differential Privacy Constraints

    Authors: Amir Sonee, Stefano Rini

    Abstract: In this paper, the problem of federated learning (FL) through digital communication between clients and a parameter server (PS) over a multiple access channel (MAC), also subject to differential privacy (DP) constraints, is studied. More precisely, we consider the setting in which clients in a centralized network are prompted to train a machine learning model using their local datasets. The inform… ▽ More

    Submitted 1 November, 2020; v1 submitted 15 May, 2020; originally announced May 2020.

  32. arXiv:2005.06739  [pdf, other

    cs.CV cs.IT

    The Information & Mutual Information Ratio for Counting Image Features and Their Matches

    Authors: Ali Khajegili Mirabadi, Stefano Rini

    Abstract: Feature extraction and description is an important topic of computer vision, as it is the starting point of a number of tasks such as image reconstruction, stitching, registration, and recognition among many others. In this paper, two new image features are proposed: the Information Ratio (IR) and the Mutual Information Ratio (MIR). The IR is a feature of a single image, while the MIR describes fe… ▽ More

    Submitted 14 May, 2020; originally announced May 2020.

    Comments: 8-th Iran Workshop on Communication and Information Theory, 2020

  33. arXiv:2003.04216  [pdf, other

    eess.SP cs.DC cs.IT cs.LG stat.ML

    Decentralized SGD with Over-the-Air Computation

    Authors: Emre Ozfatura, Stefano Rini, Deniz Gunduz

    Abstract: We study the performance of decentralized stochastic gradient descent (DSGD) in a wireless network, where the nodes collaboratively optimize an objective function using their local datasets. Unlike the conventional setting, where the nodes communicate over error-free orthogonal communication links, we assume that transmissions are prone to additive noise and interference.We first consider a point-… ▽ More

    Submitted 6 March, 2020; originally announced March 2020.

  34. arXiv:2001.07485  [pdf, ps, other

    cs.IT

    On the Capacity of the Oversampled Wiener Phase Noise Channel

    Authors: Luca Barletta, Stefano Rini

    Abstract: In this paper, the capacity of the oversampled Wiener phase noise (OWPN) channel is investigated. The OWPN channel is a discrete-time point-to-point channel with a multi-sample receiver in which the channel output is affected by both additive and multiplicative noise. The additive noise is a white standard Gaussian process while the multiplicative noise is a Wiener phase noise process. This channe… ▽ More

    Submitted 21 January, 2020; originally announced January 2020.

  35. Compressibility Measures for Affinely Singular Random Vectors

    Authors: Mohammad-Amin Charusaie, Arash Amini, Stefano Rini

    Abstract: There are several ways to measure the compressibility of a random measure; they include general approaches such as using the rate-distortion curve, as well as more specific notions, such as the Renyi information dimension (RID). The RID parameter indicates the concentration of the measure around lower-dimensional subsets of the space. While the evaluation of such compressibility parameters is well… ▽ More

    Submitted 8 March, 2022; v1 submitted 12 January, 2020; originally announced January 2020.

  36. arXiv:1905.05401  [pdf, other

    cs.IT eess.SP

    Comparison-limited Vector Quantization

    Authors: Joseph Chataignon, Stefano Rini

    Abstract: A variation of the classic vector quantization problem is considered, in which the analog-to-digital (A2D) conversion is not constrained by the cardinality of the output but rather by the number of comparators available for quantization. More specifically, we consider the scenario in which a vector quantizer of dimension d is comprised of k comparators, each receiving a linear combination of the i… ▽ More

    Submitted 27 June, 2019; v1 submitted 14 May, 2019; originally announced May 2019.

    Comments: 5 pages, 5 figures

  37. arXiv:1905.00405  [pdf, ps, other

    cs.IT

    LDPC Coded Multiuser Sha** for the Gaussian Multiple Access Channel

    Authors: Alexios Balatsoukas-Stimming, Stefano Rini, Joerg Kliewer

    Abstract: The joint design of input constellation and low-density parity-check (LDPC) codes to approach the symmetric capacity of the two-user Gaussian multiple access channel is studied. More specifically, multilevel coding is employed at each user to construct a high-order input constellation and the constellations of the users are jointly designed so as to maximize the multiuser sha** gain. At the rece… ▽ More

    Submitted 1 May, 2019; originally announced May 2019.

    Comments: To be presented at ISIT 2019

  38. arXiv:1811.09216  [pdf, other

    cs.IR

    The Statistical Dictionary-based String Matching Problem

    Authors: M. Suri, S. Rini

    Abstract: In the Dictionary-based String Matching (DSM) problem, a retrieval system has access to a source sequence and stores the position of a certain number of strings in a posting table. When a user inquires the position of a string, the retrieval system, instead of searching in the source sequence directly, relies on the the posting table to answer the query more efficiently. In this paper, the Statist… ▽ More

    Submitted 22 November, 2018; originally announced November 2018.

    Comments: 8 pages, 2 figures, submitted to IEEE ICASSP 2019

  39. arXiv:1810.12457  [pdf, ps, other

    cs.DC cs.LG cs.MA eess.SP

    Distributed Convex Optimization With Limited Communications

    Authors: Milind Rao, Stefano Rini, Andrea Goldsmith

    Abstract: In this paper, a distributed convex optimization algorithm, termed \emph{distributed coordinate dual averaging} (DCDA) algorithm, is proposed. The DCDA algorithm addresses the scenario of a large distributed optimization problem with limited communication among nodes in the network. Currently known distributed subgradient methods, such as the distributed dual averaging or the distributed alternati… ▽ More

    Submitted 29 October, 2018; originally announced October 2018.

    Comments: Extended version of submission to IEEE ICASSP 2019

  40. arXiv:1806.01803  [pdf, other

    cs.IT

    On MIMO Channel Capacity with Output Quantization Constraints

    Authors: Abbas Khalili, Stefano Rini, Luca Barletta, Elza Erkip, Yonina C. Eldar

    Abstract: The capacity of a Multiple-Input Multiple-Output (MIMO) channel in which the antenna outputs are processed by an analog linear combining network and quantized by a set of threshold quantizers is studied. The linear combining weights and quantization thresholds are selected from a set of possible configurations as a function of the channel matrix. The possible configurations of the combining networ… ▽ More

    Submitted 5 June, 2018; originally announced June 2018.

    Comments: 5 pages, 3 figures, ISIT 2018

  41. arXiv:1707.02398  [pdf, other

    cs.IT

    On the Capacity of the Carbon Copy onto Dirty Paper Channel

    Authors: Stefano Rini, Shlomo Shamai

    Abstract: The "Carbon Copy onto Dirty Paper" (CCDP) channel is the compound "writing on dirty paper" channel in which the channel output is obtained as the sum of the channel input, white Gaussian noise and a Gaussian state sequence randomly selected among a set possible realizations. The transmitter has non-causal knowledge of the set of possible state sequences but does not know which sequence is selected… ▽ More

    Submitted 8 July, 2017; originally announced July 2017.

  42. arXiv:1707.00420  [pdf, other

    cs.IT

    Compress-and-Estimate Source Coding for a Vector Gaussian Source

    Authors: Ruiyang Song, Stefano Rini, Alon Kipnis, Andrea Goldsmith

    Abstract: We consider the remote vector source coding problem in which a vector Gaussian source is to be estimated from noisy linear measurements. For this problem, we derive the performance of the compress-and-estimate (CE) coding scheme and compare it to the optimal performance. In the CE coding scheme, the remote encoder compresses the noisy source observations so as to minimize the local distortion meas… ▽ More

    Submitted 3 July, 2017; originally announced July 2017.

  43. arXiv:1705.08148  [pdf, ps, other

    cs.IT

    Capacity Outer Bound and Degrees of Freedom of Wiener Phase Noise Channels with Oversampling

    Authors: Luca Barletta, Stefano Rini

    Abstract: The discrete-time Wiener phase noise channel with an integrate-and-dump multi-sample receiver is studied. A novel outer bound on the capacity with an average input power constraint is derived as a function of the oversampling factor. This outer bound yields the degrees of freedom for the scenario in which the oversampling factor grows with the transmit power $P$ as $P^α$. The result shows, p… ▽ More

    Submitted 23 May, 2017; originally announced May 2017.

    Comments: 5 pages, 1 figure, Submitted to Intern. Workshop Inf. Theory (ITW) 2017

  44. arXiv:1702.08133  [pdf, ps, other

    cs.IT

    A General Framework for Low-Resolution Receivers for MIMO Channels

    Authors: Stefano Rini, Luca Barletta, Yonina C. Eldar, Elza Erkip

    Abstract: The capacity of a discrete-time multi-input multi-output (MIMO) Gaussian channel with output quantization is investigated for different receiver architectures. A general formulation of this problem is proposed in which the antenna outputs are processed by analog combiners while sign quantizers are used for analog-to-digital conversion. To exemplify this approach, four analog receiver architectures… ▽ More

    Submitted 7 July, 2017; v1 submitted 26 February, 2017; originally announced February 2017.

  45. arXiv:1701.04982  [pdf, ps, other

    cs.IT

    Capacity of Discrete-Time Wiener Phase Noise Channels to Within a Constant Gap

    Authors: Luca Barletta, Stefano Rini

    Abstract: The capacity of the discrete-time channel affected by both additive Gaussian noise and Wiener phase noise is studied. Novel inner and outer bounds are presented, which differ of at most $6.65$ bits per channel use for all channel parameters. The capacity of this model can be subdivided in three regimes: (i) for large values of the frequency noise variance, the channel behaves similarly to a channe… ▽ More

    Submitted 18 January, 2017; originally announced January 2017.

    Comments: 7 pages, 3 figures. Extended version of a paper submitted to ISIT 2017

  46. arXiv:1606.06039  [pdf, ps, other

    cs.IT

    On Capacity of the Writing onto Fast Fading Dirt Channel

    Authors: Stefano Rini, Shlomo Shamai

    Abstract: The "Writing onto Fast Fading Dirt" (WFFD) channel is investigated to study the effects of partial channel knowledge on the capacity of the "writing on dirty paper" channel. The WFFD channel is the Gel'fand-Pinsker channel in which the output is obtained as the sum of the input, white Gaussian noise and a fading-times-state term. The fading-times-state term is equal to the element-wise product of… ▽ More

    Submitted 7 July, 2017; v1 submitted 20 June, 2016; originally announced June 2016.

  47. arXiv:1605.03755  [pdf, ps, other

    cs.IT

    Optimal Rate Allocation in Mismatched Multiterminal Source Coding

    Authors: Ruiyang Song, Stefano Rini, Alon Kipnis, Andrea J. Goldsmith

    Abstract: We consider a multiterminal source coding problem in which a source is estimated at a central processing unit from lossy-compressed remote observations. Each lossy-encoded observation is produced by a remote sensor which obtains a noisy version of the source and compresses this observation minimizing a local distortion measure which depends only on the marginal distribution of its observation. The… ▽ More

    Submitted 12 May, 2016; originally announced May 2016.

  48. arXiv:1602.02206  [pdf, ps, other

    cs.IT

    The Carbon Copy onto Dirty Paper Channel with Statistically Equivalent States

    Authors: Stefano Rini, Shlomo Shamai Shitz

    Abstract: Costa's "writing on dirty paper" capacity result establishes that full state pre-cancellation can be attained in Gelfand-Pinsker channel with additive state and additive Gaussian noise. The "carbon copy onto dirty paper" channel is the extension of Costa's model to the compound setting: M receivers each observe the sum of the channel input, Gaussian noise and one of M Gaussian state sequences and… ▽ More

    Submitted 5 February, 2016; originally announced February 2016.

  49. arXiv:1602.02205  [pdf, ps, other

    cs.IT

    On the Capacity of the Dirty Paper Channel with Fast Fading and Discrete Channel States

    Authors: Stefano Rini, Shlomo Shamai Shitz

    Abstract: The "writing dirty paper" capacity result crucially dependents on the perfect channel knowledge at the transmitter as the presence of even a small uncertainty in the channel realization gravely hampers the ability of the transmitter to pre-code its transmission against the channel state. This is particularly disappointing as it implies that interference pre-coding in practical systems is effective… ▽ More

    Submitted 5 February, 2016; originally announced February 2016.

  50. arXiv:1602.02201  [pdf, ps, other

    cs.IT

    The Rate-Distortion Risk in Estimation from Compressed Data

    Authors: Alon Kipnis, Stefano Rini, Andrea J. Goldsmith

    Abstract: Consider the problem of estimating a latent signal from a lossy compressed version of the data when the compressor is agnostic to the relation between the signal and the data. This situation arises in a host of modern applications when data is transmitted or stored prior to determining the downstream inference task. Given a bitrate constraint and a distortion measure between the data and its compr… ▽ More

    Submitted 10 January, 2021; v1 submitted 5 February, 2016; originally announced February 2016.

    Comments: Second revision. IEEE Transactions on Information Theory