Skip to main content

Showing 1–42 of 42 results for author: Tajer, A

.
  1. arXiv:2406.08666  [pdf, other

    cs.LG cs.AI stat.ME stat.ML

    Interventional Causal Discovery in a Mixture of DAGs

    Authors: Burak Varıcı, Dmitriy Katz-Rogozhnikov, Dennis Wei, Prasanna Sattigeri, Ali Tajer

    Abstract: Causal interactions among a group of variables are often modeled by a single causal graph. In some domains, however, these interactions are best described by multiple co-existing causal graphs, e.g., in dynamical systems or genomics. This paper addresses the hitherto unknown role of interventions in learning causal interactions among variables governed by a mixture of causal systems, each modeled… ▽ More

    Submitted 12 June, 2024; originally announced June 2024.

  2. arXiv:2406.05937  [pdf, other

    cs.LG stat.ML

    Linear Causal Representation Learning from Unknown Multi-node Interventions

    Authors: Burak Varıcı, Emre Acartürk, Karthikeyan Shanmugam, Ali Tajer

    Abstract: Despite the multifaceted recent advances in interventional causal representation learning (CRL), they primarily focus on the stylized assumption of single-node interventions. This assumption is not valid in a wide range of applications, and generally, the subset of nodes intervened in an interventional environment is fully unknown. This paper focuses on interventional CRL under unknown multi-node… ▽ More

    Submitted 9 June, 2024; originally announced June 2024.

  3. arXiv:2405.07795  [pdf, other

    stat.ML cs.LG

    Improved Bound for Robust Causal Bandits with Linear Models

    Authors: Zirui Yan, Arpan Mukherjee, Burak Varıcı, Ali Tajer

    Abstract: This paper investigates the robustness of causal bandits (CBs) in the face of temporal model fluctuations. This setting deviates from the existing literature's widely-adopted assumption of constant causal models. The focus is on causal systems with linear structural equation models (SEMs). The SEMs and the time-varying pre- and post-interventional statistical models are all unknown and subject to… ▽ More

    Submitted 13 May, 2024; originally announced May 2024.

    Comments: 11 pages, 3 figures. arXiv admin note: substantial text overlap with arXiv:2310.19794

  4. arXiv:2403.16297  [pdf, other

    stat.ME math.ST

    Round Robin Active Sequential Change Detection for Dependent Multi-Channel Data

    Authors: Anamitra Chaudhuri, Georgios Fellouris, Ali Tajer

    Abstract: This paper considers the problem of sequentially detecting a change in the joint distribution of multiple data sources under a sampling constraint. Specifically, the channels or sources generate observations that are independent over time, but not necessarily independent at any given time instant. The sources follow an initial joint distribution, and at an unknown time instant, the joint distribut… ▽ More

    Submitted 24 March, 2024; originally announced March 2024.

    MSC Class: 62L10; 62L05 (Primary) 62P30 (Secondary)

  5. arXiv:2403.00233  [pdf, other

    stat.ML cs.LG

    Causal Bandits with General Causal Models and Interventions

    Authors: Zirui Yan, Dennis Wei, Dmitriy Katz-Rogozhnikov, Prasanna Sattigeri, Ali Tajer

    Abstract: This paper considers causal bandits (CBs) for the sequential design of interventions in a causal system. The objective is to optimize a reward function via minimizing a measure of cumulative regret with respect to the best sequence of interventions in hindsight. The paper advances the results on CBs in three directions. First, the structural causal models (SCMs) are assumed to be unknown and drawn… ▽ More

    Submitted 29 February, 2024; originally announced March 2024.

    Comments: 37 pages, 13 figures, conference

  6. arXiv:2402.00849  [pdf, other

    cs.LG stat.ML

    Score-based Causal Representation Learning: Linear and General Transformations

    Authors: Burak Varıcı, Emre Acartürk, Karthikeyan Shanmugam, Abhishek Kumar, Ali Tajer

    Abstract: This paper addresses intervention-based causal representation learning (CRL) under a general nonparametric latent causal model and an unknown transformation that maps the latent variables to the observed variables. Linear and general transformations are investigated. The paper addresses both the identifiability and achievability aspects. Identifiability refers to determining algorithm-agnostic con… ▽ More

    Submitted 26 February, 2024; v1 submitted 1 February, 2024; originally announced February 2024.

    Comments: (updated literature review) Linear transformations: stronger results than our previous paper Score-based Causal Representation Learning with Interventions (arXiv:2301.08230). General transformations: results also appear in our paper General Identifiability and Achievability for Causal Representation Learning (arXiv:2310.15450) accepted to AISTATS 2024 (oral). arXiv admin note: text overlap with arXiv:2310.15450

  7. arXiv:2401.09640  [pdf, ps, other

    eess.SY cs.AI

    Blackout Mitigation via Physics-guided RL

    Authors: Anmol Dwivedi, Santiago Paternain, Ali Tajer

    Abstract: This paper considers the sequential design of remedial control actions in response to system anomalies for the ultimate objective of preventing blackouts. A physics-guided reinforcement learning (RL) framework is designed to identify effective sequences of real-time remedial look-ahead decisions accounting for the long-term impact on the system's stability. The paper considers a space of control a… ▽ More

    Submitted 17 January, 2024; originally announced January 2024.

  8. arXiv:2310.19794  [pdf, other

    stat.ML cs.LG

    Robust Causal Bandits for Linear Models

    Authors: Zirui Yan, Arpan Mukherjee, Burak Varıcı, Ali Tajer

    Abstract: Sequential design of experiments for optimizing a reward function in causal systems can be effectively modeled by the sequential design of interventions in causal bandits (CBs). In the existing literature on CBs, a critical assumption is that the causal models remain constant over time. However, this assumption does not necessarily hold in complex systems, which constantly undergo temporal model f… ▽ More

    Submitted 4 March, 2024; v1 submitted 30 October, 2023; originally announced October 2023.

  9. arXiv:2310.15450  [pdf, other

    cs.LG stat.ML

    General Identifiability and Achievability for Causal Representation Learning

    Authors: Burak Varıcı, Emre Acartürk, Karthikeyan Shanmugam, Ali Tajer

    Abstract: This paper focuses on causal representation learning (CRL) under a general nonparametric latent causal model and a general transformation model that maps the latent data to the observational data. It establishes identifiability and achievability results using two hard uncoupled interventions per node in the latent causal graph. Notably, one does not know which pair of intervention environments hav… ▽ More

    Submitted 14 February, 2024; v1 submitted 23 October, 2023; originally announced October 2023.

    Comments: Accepted to AISTATS 2024 (oral presentation). Also appeared at CRL Workshop @ NeurIPS 2023 (oral presentation) titled as "Score-based Causal Representation Learning: Nonparametric Identifiability"

  10. arXiv:2310.13393  [pdf, ps, other

    stat.ML cs.IT cs.LG

    Optimal Best Arm Identification with Fixed Confidence in Restless Bandits

    Authors: P. N. Karthik, Vincent Y. F. Tan, Arpan Mukherjee, Ali Tajer

    Abstract: We study best arm identification in a restless multi-armed bandit setting with finitely many arms. The discrete-time data generated by each arm forms a homogeneous Markov chain taking values in a common, finite state space. The state transitions in each arm are captured by an ergodic transition probability matrix (TPM) that is a member of a single-parameter exponential family of TPMs. The real-val… ▽ More

    Submitted 23 June, 2024; v1 submitted 20 October, 2023; originally announced October 2023.

    Comments: Accepted to the IEEE Transactions on Information Theory

  11. arXiv:2309.01207  [pdf, other

    eess.IV cs.CV cs.LG

    Spectral Adversarial MixUp for Few-Shot Unsupervised Domain Adaptation

    Authors: Jia** Zhang, Hanqing Chao, Amit Dhurandhar, Pin-Yu Chen, Ali Tajer, Yangyang Xu, **kun Yan

    Abstract: Domain shift is a common problem in clinical applications, where the training images (source domain) and the test images (target domain) are under different distributions. Unsupervised Domain Adaptation (UDA) techniques have been proposed to adapt models trained in the source domain to the target domain. However, those methods require a large number of images from the target domain for model train… ▽ More

    Submitted 3 September, 2023; originally announced September 2023.

    Comments: Accepted by MICCAI 2023

  12. arXiv:2303.08864  [pdf, other

    eess.SY eess.SP

    GRNN-based Real-time Fault Chain Prediction

    Authors: Anmol Dwivedi, Ali Tajer

    Abstract: This paper proposes a data-driven graphical framework for the real-time search of risky cascading fault chains (FCs). While identifying risky FCs is pivotal to alleviating cascading failures, the complex spatio-temporal dependencies among the components of the power system render challenges to modeling and analyzing FCs. Furthermore, the real-time search of risky FCs faces an inherent combinatoria… ▽ More

    Submitted 15 March, 2023; originally announced March 2023.

  13. arXiv:2301.08230  [pdf, other

    stat.ML cs.LG

    Score-based Causal Representation Learning with Interventions

    Authors: Burak Varici, Emre Acarturk, Karthikeyan Shanmugam, Abhishek Kumar, Ali Tajer

    Abstract: This paper studies the causal representation learning problem when the latent causal variables are observed indirectly through an unknown linear transformation. The objectives are: (i) recovering the unknown linear transformation (up to scaling) and (ii) determining the directed acyclic graph (DAG) underlying the latent variables. Sufficient conditions for DAG recovery are established, and it is s… ▽ More

    Submitted 1 May, 2023; v1 submitted 19 January, 2023; originally announced January 2023.

    Comments: This version outlines large classes of non-linear causal models in the latent space for which our assumptions hold. It also discusses the latest updates of related literature

  14. arXiv:2301.03785  [pdf, other

    stat.ML cs.LG

    Best Arm Identification in Stochastic Bandits: Beyond $β-$optimality

    Authors: Arpan Mukherjee, Ali Tajer

    Abstract: This paper investigates a hitherto unaddressed aspect of best arm identification (BAI) in stochastic multi-armed bandits in the fixed-confidence setting. Two key metrics for assessing bandit algorithms are computational efficiency and performance optimality (e.g., in sample complexity). In stochastic BAI literature, there have been advances in designing algorithms to achieve optimal performance, b… ▽ More

    Submitted 22 June, 2023; v1 submitted 10 January, 2023; originally announced January 2023.

  15. arXiv:2212.00850  [pdf, other

    cs.CV cs.AI

    When Neural Networks Fail to Generalize? A Model Sensitivity Perspective

    Authors: Jia** Zhang, Hanqing Chao, Amit Dhurandhar, Pin-Yu Chen, Ali Tajer, Yangyang Xu, **kun Yan

    Abstract: Domain generalization (DG) aims to train a model to perform well in unseen domains under different distributions. This paper considers a more realistic yet more challenging scenario,namely Single Domain Generalization (Single-DG), where only a single source domain is available for training. To tackle this challenge, we first try to understand when neural networks fail to generalize? We empirically… ▽ More

    Submitted 1 December, 2022; originally announced December 2022.

    Comments: Accepted by AAAI 2023

  16. arXiv:2208.12764  [pdf, other

    stat.ML cs.LG

    Causal Bandits for Linear Structural Equation Models

    Authors: Burak Varici, Karthikeyan Shanmugam, Prasanna Sattigeri, Ali Tajer

    Abstract: This paper studies the problem of designing an optimal sequence of interventions in a causal graphical model to minimize cumulative regret with respect to the best intervention in hindsight. This is, naturally, posed as a causal bandit problem. The focus is on causal bandits for linear structural equation models (SEMs) and soft interventions. It is assumed that the graph's structure is known and h… ▽ More

    Submitted 31 March, 2023; v1 submitted 26 August, 2022; originally announced August 2022.

    Comments: 61 pages; new to this version: added lower bounds and relaxed assumptions

  17. Active Sampling of Multiple Sources for Sequential Estimation

    Authors: Arpan Mukherjee, Ali Tajer, Pin-Yu Chen, Payel Das

    Abstract: Consider $K$ processes, each generating a sequence of identical and independent random variables. The probability measures of these processes have random parameters that must be estimated. Specifically, they share a parameter $θ$ common to all probability measures. Additionally, each process $i\in\{1, \dots, K\}$ has a private parameter $α_i$. The objective is to design an active sampling algorith… ▽ More

    Submitted 10 August, 2022; originally announced August 2022.

  18. arXiv:2207.11158  [pdf, ps, other

    stat.ML cs.LG

    SPRT-based Efficient Best Arm Identification in Stochastic Bandits

    Authors: Arpan Mukherjee, Ali Tajer

    Abstract: This paper investigates the best arm identification (BAI) problem in stochastic multi-armed bandits in the fixed confidence setting. The general class of the exponential family of bandits is considered. The existing algorithms for the exponential family of bandits face computational challenges. To mitigate these challenges, the BAI problem is viewed and analyzed as a sequential composite hypothesi… ▽ More

    Submitted 22 June, 2023; v1 submitted 22 July, 2022; originally announced July 2022.

  19. arXiv:2111.07512  [pdf, other

    stat.ME cs.LG stat.ML

    Scalable Intervention Target Estimation in Linear Models

    Authors: Burak Varici, Karthikeyan Shanmugam, Prasanna Sattigeri, Ali Tajer

    Abstract: This paper considers the problem of estimating the unknown intervention targets in a causal directed acyclic graph from observational and interventional data. The focus is on soft interventions in linear structural equation models (SEMs). Current approaches to causal structure learning either work with known intervention targets or use hypothesis testing to discover the unknown intervention target… ▽ More

    Submitted 14 November, 2021; originally announced November 2021.

    Comments: 23 pages, 4 figures, NeurIPS 2021

  20. arXiv:2111.07458  [pdf, ps, other

    cs.LG stat.ML

    Mean-based Best Arm Identification in Stochastic Bandits under Reward Contamination

    Authors: Arpan Mukherjee, Ali Tajer, Pin-Yu Chen, Payel Das

    Abstract: This paper investigates the problem of best arm identification in $\textit{contaminated}$ stochastic multi-arm bandits. In this setting, the rewards obtained from any arm are replaced by samples from an adversarial model with probability $\varepsilon$. A fixed confidence (infinite-horizon) setting is considered, where the goal of the learner is to identify the arm with the largest mean. Owing to t… ▽ More

    Submitted 14 November, 2021; originally announced November 2021.

  21. arXiv:2105.07725  [pdf, other

    cs.IT

    Distributed Computation over MAC via Kolmogorov-Arnold Representation

    Authors: Derya Malak, Ali Tajer

    Abstract: Kolmogorov's representation theorem provides a framework for decomposing any arbitrary real-valued, multivariate, and continuous function into a two-layer nested superposition of a finite number of functions. The functions at these two layers, are referred to as the inner and outer functions with the key property that the design of the inner functions is independent of that of the original functio… ▽ More

    Submitted 17 May, 2021; originally announced May 2021.

  22. The Broadcast Approach in Communication Networks

    Authors: Ali Tajer, Avi Steiner, Shlomo Shamai

    Abstract: This paper reviews the theoretical and practical principles of the broadcast approach to communication over state-dependent channels and networks in which the transmitters have access to only the probabilistic description of the time-varying states while remaining oblivious to their instantaneous realizations. When the temporal variations are frequent enough, an effective long-term strategy is ada… ▽ More

    Submitted 18 January, 2021; originally announced January 2021.

    Comments: 149 pages, 37 figures

  23. arXiv:1812.10569  [pdf, other

    cs.IT eess.SP

    Secure Estimation under Causative Attacks

    Authors: Saurabh Sihag, Ali Tajer

    Abstract: This paper considers the problem of secure parameter estimation when the estimation algorithm is prone to causative attacks. Causative attacks, in principle, target decision-making algorithms to alter their decisions by making them oblivious to specific attacks. Such attacks influence inference algorithms by tampering with the mechanism through which the algorithm is provided with the statistical… ▽ More

    Submitted 26 December, 2018; originally announced December 2018.

  24. arXiv:1804.09657  [pdf, ps, other

    cs.IT

    Quickest Search for a Change Point

    Authors: Javad Heydari, Ali Tajer

    Abstract: This paper considers a sequence of random variables generated according to a common distribution. The distribution might undergo periods of transient changes at an unknown set of time instants, referred to as change-points. The objective is to sequentially collect measurements from the sequence and design a dynamic decision rule for the quickest identification of one change-point in real time, whi… ▽ More

    Submitted 25 April, 2018; originally announced April 2018.

    Comments: 6 pages, 3 figures

  25. arXiv:1712.08720  [pdf, other

    cs.IT

    Multiaccess Communication via a Broadcast Approach Adapted to the Multiuser Channel

    Authors: Samia Kazemi, Ali Tajer

    Abstract: A broadcast strategy for multiple access communication over slowly fading channels is introduced, in which the channel state information is known to only the receiver. In this strategy, the transmitters split their information streams into multiple independent information streams, each adapted to a specific actual channel realization. The major distinction between the proposed strategy and the exi… ▽ More

    Submitted 23 December, 2017; originally announced December 2017.

  26. arXiv:1711.04268  [pdf, other

    stat.ME cs.IT

    Active Sampling for the Quickest Detection of Markov Networks

    Authors: Javad Heydari, Ali Tajer, H. Vincent Poor

    Abstract: Consider $n$ random variables forming a Markov random field (MRF). The true model of the MRF is unknown, and it is assumed to belong to a binary set. The objective is to sequentially sample the random variables (one-at-a-time) such that the true MRF model can be detected with the fewest number of samples, while in parallel, the decision reliability is controlled. The core element of an optimal dec… ▽ More

    Submitted 2 August, 2020; v1 submitted 12 November, 2017; originally announced November 2017.

    Comments: 50 pages, 12 figures

  27. arXiv:1702.01576  [pdf, other

    stat.AP cs.IT

    Quickest Localization of Anomalies in Power Grids: A Stochastic Graphical Framework

    Authors: Javad Heydari, Ali Tajer

    Abstract: Agile localization of anomalous events plays a pivotal role in enhancing the overall reliability of the grid and avoiding cascading failures. This is especially of paramount significance in the large-scale grids due to their geographical expansions and the large volume of data generated. This paper proposes a stochastic graphical framework, by leveraging which it aims to localize the anomalies wit… ▽ More

    Submitted 6 February, 2017; originally announced February 2017.

    Comments: 31 pages, 7 figures

  28. A Stochastic Sizing Approach for Sharing-based Energy Storage Applications

    Authors: Islam Safak Bayram, Mohamed Abdallah, Ali Tajer, Khalid Qaraqe

    Abstract: In order to foster renewable energy integration, improve power quality and reliability, and reduce hydrocarbon emissions, there is a strong need to deploy energy storage systems (ESSs), which can provide a control medium for peak hour utility operations. ESSs are especially desired at the residential level, as this sector has the most untapped demand response potential. However, considering their… ▽ More

    Submitted 8 August, 2015; v1 submitted 31 July, 2015; originally announced July 2015.

    Comments: Accepted by IEEE Transactions on Smart Grid

  29. arXiv:1502.01524  [pdf, ps, other

    math.OC

    Capacity Planning Frameworks for Electric Vehicle Charging Stations with Multi-Class Customers

    Authors: Islam Safak Bayram, Ali Tajer, Mohamed Abdallah, Khalid Qaraqe

    Abstract: In order to foster electric vehicle (EV) adoption, there is a strong need for designing and develo** charging stations that can accommodate different customer classes, distinguished by their charging preferences, needs, and technologies. By growing such charging station networks, the power grid becomes more congested and, therefore, controlling of charging demands should be carefully aligned wit… ▽ More

    Submitted 5 February, 2015; originally announced February 2015.

    Comments: Accepted Transactions on Smart Grid

  30. arXiv:1406.4726  [pdf, ps, other

    math.OC

    Energy Storage System Sizing for Peak Hour Utility Applications

    Authors: I. Safak Bayram, Mohamed Abdallah, Ali Tajer, Khalid Qaraqe

    Abstract: In future smart grids, energy storage systems (ESSs) are expected to play a key role in reducing peak hour electricity generation cost and the associated level of carbon emissions. Considering their high acquisition, operation, and maintenance costs, ESSs are likely to serve a large number of users. Hence, optimal sizing of energy ESSs plays a critical role as over-provisioning ESS size leads to u… ▽ More

    Submitted 7 January, 2015; v1 submitted 18 June, 2014; originally announced June 2014.

    Comments: ACCEPTED BY IEEE ICC 2015

  31. arXiv:1210.2406  [pdf, other

    cs.IT

    Quick Search for Rare Events

    Authors: Ali Tajer, H. Vincent Poor

    Abstract: Rare events can potentially occur in many applications. When manifested as opportunities to be exploited, risks to be ameliorated, or certain features to be extracted, such events become of paramount significance. Due to their sporadic nature, the information-bearing signals associated with rare events often lie in a large set of irrelevant signals and are not easily accessible. This paper provide… ▽ More

    Submitted 8 October, 2012; originally announced October 2012.

  32. arXiv:1206.1438  [pdf, ps, other

    cs.IT

    Adaptive Sensing of Congested Spectrum Bands

    Authors: Ali Tajer, Rui M. Castro, Xiaodong Wang

    Abstract: Cognitive radios process their sensed information collectively in order to opportunistically identify and access under-utilized spectrum segments (spectrum holes). Due to the transient and rapidly-varying nature of the spectrum occupancy, the cognitive radios (secondary users) must be agile in identifying the spectrum holes in order to enhance their spectral efficiency. We propose a novel {\em ada… ▽ More

    Submitted 7 June, 2012; originally announced June 2012.

    Comments: 16 pages, 5 figures

  33. Information Exchange Limits in Cooperative MIMO Networks

    Authors: Ali Tajer, Xiaodong Wang

    Abstract: Concurrent presence of inter-cell and intra-cell interferences constitutes a major impediment to reliable downlink transmission in multi-cell multiuser networks. Harnessing such interferences largely hinges on two levels of information exchange in the network: one from the users to the base-stations (feedback) and the other one among the base-stations (cooperation). We demonstrate that exchanging… ▽ More

    Submitted 20 April, 2011; v1 submitted 19 April, 2011; originally announced April 2011.

    Comments: 35 pages, 5 figure

  34. arXiv:1104.2784  [pdf, ps, other

    cs.IT

    Diversity Analysis of Symbol-by-Symbol Linear Equalizers

    Authors: Ali Tajer, Aria Nosratinia, Naofal Al-Dhahir

    Abstract: In frequency-selective channels linear receivers enjoy significantly-reduced complexity compared with maximum likelihood receivers at the cost of performance degradation which can be in the form of a loss of the inherent frequency diversity order or reduced coding gain. This paper demonstrates that the minimum mean-square error symbol-by-symbol linear equalizer incurs no diversity loss compared to… ▽ More

    Submitted 14 April, 2011; originally announced April 2011.

  35. arXiv:1101.5084  [pdf, other

    stat.AP

    Joint Detection and Estimation: Optimum Tests and Applications

    Authors: George V. Moustakides, Guido H. Jajamovich, Ali Tajer, Xiaodong Wang

    Abstract: We consider a well defined joint detection and parameter estimation problem. By combining the Baysian formulation of the estimation subproblem with suitable constraints on the detection subproblem we develop optimum one- and two-step test for the joint detection/estimation case. The proposed combined strategies have the very desirable characteristic to allow for the trade-off between detection pow… ▽ More

    Submitted 26 January, 2011; originally announced January 2011.

    MSC Class: 62C10; 91B06

  36. Robust Linear Precoder Design for Multi-cell Downlink Transmission

    Authors: Ali Tajer, Narayan Prasad, Xiaodong Wang

    Abstract: Coordinated information processing by the base stations of multi-cell wireless networks enhances the overall quality of communication in the network. Such coordinations for optimizing any desired network-wide quality of service (QoS) necessitate the base stations to acquire and share some channel state information (CSI). With perfect knowledge of channel states, the base stations can adjust their… ▽ More

    Submitted 26 September, 2010; originally announced September 2010.

    Comments: 38 Pages, 7 Figures, To appear in the IEEE Transactions on Signal Processing

  37. arXiv:1007.3676  [pdf, ps, other

    cs.IT

    (n,K)-user Interference Channels: Degrees of Freedom

    Authors: Ali Tajer, Xiaodong Wang

    Abstract: We analyze the gains of opportunistic communication in multiuser interference channels. Consider a fully connected $n$-user Gaussian interference channel. At each time instance only $K\leq n$ transmitters are allowed to be communicating with their respective receivers and the remaining $(n-K)$ transmitter-receiver pairs remain inactive. For finite $n$, if the transmitters can acquire channel state… ▽ More

    Submitted 21 July, 2010; originally announced July 2010.

    Comments: 34 pages

  38. arXiv:1004.0383  [pdf, ps, other

    cs.IT

    Multiuser Diversity Gain in Cognitive Networks

    Authors: Ali Tajer, Xiaodong Wang

    Abstract: Dynamic allocation of resources to the \emph{best} link in large multiuser networks offers considerable improvement in spectral efficiency. This gain, often referred to as \emph{multiuser diversity gain}, can be cast as double-logarithmic growth of the network throughput with the number of users. In this paper we consider large cognitive networks granted concurrent spectrum access with license-ho… ▽ More

    Submitted 16 April, 2010; v1 submitted 2 April, 2010; originally announced April 2010.

    Comments: 32 pages, 3 figures, to appear in the IEEE/ACM Transactions on Networking

  39. arXiv:0911.4896  [pdf, ps, other

    cs.IT

    Diversity Order in ISI Channels with Single-Carrier Frequency-Domain Equalizers

    Authors: Ali Tajer, Aria Nosratinia

    Abstract: This paper analyzes the diversity gain achieved by single-carrier frequency-domain equalizer (SC-FDE) in frequency selective channels, and uncovers the interplay between diversity gain $d$, channel memory length $ν$, transmission block length $L$, and the spectral efficiency $R$. We specifically show that for the class of minimum means-square error (MMSE) SC-FDE receivers, for rates… ▽ More

    Submitted 25 November, 2009; originally announced November 2009.

    Comments: 30 pages, 6 figures, to appear in the IEEE Transactions on Wireless Communications

  40. Beamforming and Rate Allocation in MISO Cognitive Radio Networks

    Authors: Ali Tajer, Narayan Prasad, Xiaodong Wang

    Abstract: We consider decentralized multi-antenna cognitive radio networks where secondary (cognitive) users are granted simultaneous spectrum access along with license-holding (primary) users. We treat the problem of distributed beamforming and rate allocation for the secondary users such that the minimum weighted secondary rate is maximized. Such an optimization is subject to (1) a limited weighted sum-… ▽ More

    Submitted 7 August, 2009; originally announced August 2009.

    Comments: 32 pages, 6 figures

  41. Optimal Joint Target Detection and Parameter Estimation By MIMO Radar

    Authors: Ali Tajer, Guido H. Jajamovich, Xiaodong Wang, George V. Moustakides

    Abstract: We consider multiple-input multiple-output (MIMO) radar systems with widely-spaced antennas. Such antenna configuration facilitates capturing the inherent diversity gain due to independent signal dispersion by the target scatterers. We consider a new MIMO radar framework for detecting a target that lies in an unknown location. This is in contrast with conventional MIMO radars which break the spa… ▽ More

    Submitted 7 August, 2009; originally announced August 2009.

    Comments: 37 pages, 8 figures

  42. arXiv:0905.4476  [pdf, ps, other

    cs.IT

    Beacon-Assisted Spectrum Access with Cooperative Cognitive Transmitter and Receiver

    Authors: Ali Tajer, Xiaodong Wang

    Abstract: Spectrum access is an important function of cognitive radios for detecting and utilizing spectrum holes without interfering with the legacy systems. In this paper we propose novel cooperative communication models and show how deploying such cooperations between a pair of secondary transmitter and receiver assists them in identifying spectrum opportunities more reliably. These cooperations are fa… ▽ More

    Submitted 27 May, 2009; originally announced May 2009.

    Comments: 36 pages, 6 figures, To appear in IEEE Transaction on Mobile Computing