Skip to main content

Showing 1–21 of 21 results for author: Vellambi, B N

.
  1. arXiv:2405.07151  [pdf, other

    cs.IT

    Group Complete-$\{s\}$ Pliable Index Coding

    Authors: Sina Eghbal, Badri N. Vellambi, Lawrence Ong, Parastoo Sadeghi

    Abstract: This paper introduces a novel class of PICOD($t$) problems referred to as $g$-group complete-$S$ PICOD($t$) problems. It constructs a multi-stage achievability scheme to generate pliable index codes for group complete PICOD problems when $S = \{s\}$ is a singleton set. Using the maximum acyclic induced subgraph bound, lower bounds on the broadcast rate are derived for singleton $S$, which establis… ▽ More

    Submitted 11 May, 2024; originally announced May 2024.

    Comments: Accepted for publication in 2024 IEEE International Symposium on Information Theory

  2. arXiv:2305.06577  [pdf, other

    cs.IT

    Preferential Pliable Index Coding

    Authors: Daniel Byrne, Lawrence Ong, Parastoo Sadeghi, Badri N. Vellambi

    Abstract: We propose and study a variant of pliable index coding (PICOD) where receivers have preferences for their unknown messages and give each unknown message a preference ranking. We call this the preferential pliable index-coding (PPICOD) problem and study the Pareto trade-off between the code length and overall satisfaction metric among all receivers. We derive theoretical characteristics of the PPIC… ▽ More

    Submitted 15 May, 2023; v1 submitted 11 May, 2023; originally announced May 2023.

    Comments: An extended version of the same-titled paper accepted for presentation at the 2023 IEEE International Symposium on Information Theory (ISIT)

  3. arXiv:2205.02614  [pdf, other

    cs.IT

    Very Pliable Index Coding

    Authors: Lawrence Ong, Badri N. Vellambi

    Abstract: In the pliable variant of index coding, receivers are allowed to decode any new message not known a priori. Optimal code design for this variant involves identifying each receiver's choice of a new message that minimises the overall transmission rate. This paper proposes a formulation that further relaxes the decoding requirements of pliable index coding by allowing receivers to decode different n… ▽ More

    Submitted 5 May, 2022; originally announced May 2022.

    Comments: accepted for presentation at the 2022 IEEE International Symposium on Information Theory (ISIT)

  4. arXiv:1909.11850  [pdf, other

    cs.IT

    Improved Lower Bounds for Pliable Index Coding using Absent Receivers

    Authors: Lawrence Ong, Badri N. Vellambi, Jörg Kliewer, Parastoo Sadeghi

    Abstract: This paper studies pliable index coding, in which a sender broadcasts information to multiple receivers through a shared broadcast medium, and the receivers each have some message a priori and want any message they do not have. An approach, based on receivers that are absent from the problem, was previously proposed to find lower bounds on the optimal broadcast rate. In this paper, we introduce ne… ▽ More

    Submitted 1 October, 2019; v1 submitted 25 September, 2019; originally announced September 2019.

    Comments: An extended version of the same-titled paper submitted to a conference

  5. Optimal-Rate Characterisation for Pliable Index Coding using Absent Receivers

    Authors: Lawrence Ong, Badri N. Vellambi, Jörg Kliewer

    Abstract: We characterise the optimal broadcast rate for a few classes of pliable-index-coding problems. This is achieved by devising new lower bounds that utilise the set of absent receivers to construct decoding chains with skipped messages. This work complements existing works by considering problems that are not complete-S, i.e., problems considered in this work do not require that all receivers with a… ▽ More

    Submitted 25 September, 2019; originally announced September 2019.

    Comments: Authors' copy

    Journal ref: in Proc. IEEE Int. Symp. Inf. Theory (ISIT), Paris, France, July 7-12 2019, pp. 522-526

  6. arXiv:1809.03615  [pdf, other

    cs.IT

    On the Capacity Region for Secure Index Coding

    Authors: Yuxin Liu, Badri N. Vellambi, Young-Han Kim, Parastoo Sadeghi

    Abstract: We study the index coding problem in the presence of an eavesdropper, where the aim is to communicate without allowing the eavesdropper to learn any single message aside from the messages it may already know as side information. We establish an outer bound on the underlying secure capacity region of the index coding problem, which includes polymatroidal and security constraints, as well as the set… ▽ More

    Submitted 10 September, 2018; originally announced September 2018.

  7. Strong Coordination over Noisy Channels

    Authors: Sarah A. Obead, Badri N. Vellambi, Jörg Kliewer

    Abstract: We study the problem of strong coordination of the actions of two nodes $X$ and $Y$ that communicate over a discrete memoryless channel (DMC) such that the actions follow a prescribed joint probability distribution. We propose two novel random coding schemes and a polar coding scheme for this noisy strong coordination problem, and derive inner bounds for the respective strong coordination capacity… ▽ More

    Submitted 15 August, 2018; originally announced August 2018.

    Comments: 30 pages, 9 figures, submitted for publication. arXiv admin note: substantial text overlap with arXiv:1704.08771, arXiv:1710.03210

    Journal ref: IEEE Transactions on Information Theory, vol. 67, no. 5, pp. 2716-2738, May 2021

  8. arXiv:1804.09888  [pdf, ps, other

    cs.IT

    A Code Equivalence between Secure Network and Index Coding

    Authors: Lawrence Ong, Jörg Kliewer, Badri N. Vellambi, Phee Lep Yeoh

    Abstract: A code equivalence between index coding and network coding was established, which shows that any index-coding instance can be mapped to a network-coding instance, for which any index code can be translated to a network code with the same decoding-error performance, and vice versa. Also, any network-coding instance can be mapped to an index-coding instance with a similar code translation. In this p… ▽ More

    Submitted 26 April, 2018; originally announced April 2018.

    Comments: The journal version of conference papers "An Equivalence Between Secure Network and Index Coding" (Globecom-NetCod 2016) and "Secure Network-Index Code Equivalence: Extension to Non-zero Error and Leakage" (ISIT 2018)

    MSC Class: 94A15

  9. Joint Coordination-Channel Coding for Strong Coordination over Noisy Channels Based on Polar Codes

    Authors: Sarah A. Obead, Jörg Kliewer, Badri N. Vellambi

    Abstract: We construct a joint coordination-channel polar coding scheme for strong coordination of actions between two agents $\mathsf X$ and $\mathsf Y$, which communicate over a discrete memoryless channel (DMC) such that the joint distribution of actions follows a prescribed probability distribution. We show that polar codes are able to achieve our previously established inner bound to the strong noisy c… ▽ More

    Submitted 9 October, 2017; originally announced October 2017.

    Comments: 8 pages, 6 figures. Accepted in the 55th Annual Allerton Conference on Communication, Control, and Computing (Allerton), 2017

    Journal ref: 55th Annual Allerton Conference on Communication, Control, and Computing (Allerton), Monticello, IL, USA, Oct 2017, pp. 580-587

  10. Strong Coordination over Noisy Channels: Is Separation Sufficient?

    Authors: Sarah A. Obead, Badri N. Vellambi, Jörg Kliewer

    Abstract: We study the problem of strong coordination of actions of two agents $X$ and $Y$ that communicate over a noisy communication channel such that the actions follow a given joint probability distribution. We propose two novel schemes for this noisy strong coordination problem, and derive inner bounds for the underlying strong coordination capacity region. The first scheme is a joint coordination-chan… ▽ More

    Submitted 27 April, 2017; originally announced April 2017.

    Comments: 9 pages, 4 figures. An extended version of a paper accepted for the IEEE International Symposium on Information Theory (ISIT), 2017

    Journal ref: IEEE International Symposium on Information Theory (ISIT), Aachen, Germany, June 2017, pp. 2840-2844

  11. An Equivalence Between Secure Network and Index Coding

    Authors: Lawrence Ong, Badri N. Vellambi, Jörg Kliewer, Phee Lep Yeoh

    Abstract: We extend the equivalence between network coding and index coding by Effros, El Rouayheb, and Langberg to the secure communication setting in the presence of an eavesdropper. Specifically, we show that the most general versions of secure network-coding setup by Chan and Grant and the secure index-coding setup by Dau, Skachek, and Chee, which also include the randomised encoding setting, are equiva… ▽ More

    Submitted 15 February, 2017; originally announced February 2017.

    Journal ref: Proceedings of the 2016 IEEE Globecom Workshop on Network Coding and Applications (NetCod), Washington, USA, Dec. 4-8, 2016

  12. arXiv:1611.05467  [pdf, other

    cs.IT

    Common Reconstructions in the Successive Refinement Problem with Receiver Side Information

    Authors: Badri N. Vellambi, Roy Timo

    Abstract: We study a variant of the successive refinement problem with receiver side information where the receivers require identical reconstructions. We present general inner and outer bounds for the rate region for this variant and present a single-letter characterization of the admissible rate region for several classes of the joint distribution of the source and the side information. The characterizati… ▽ More

    Submitted 16 November, 2016; originally announced November 2016.

    Comments: 37 pages, 8 figures. Some of the material in this paper was presented at the 2013 IEEE Information Theory Workshop in Seville, Spain, and the 2014 IEEEInternational Symposium on Information Theory in Honolulu, USA, 2014. This work was supported by the Australian Research Council Discovery Project DP120102123

  13. Strong Coordination over Multi-hop Line Networks

    Authors: Badri N Vellambi, Joerg Kliewer, Matthieu Bloch

    Abstract: We analyze the problem of strong coordination over a multi-hop line network in which the node initiating the coordination is a terminal network node. We assume that each node has access to a certain amount of randomness that is local to the node, and that the nodes share some common randomness, which are used together with explicit hop-by-hop communication to achieve strong coordination. We derive… ▽ More

    Submitted 8 April, 2016; v1 submitted 29 February, 2016; originally announced February 2016.

    Comments: 35 pages, 9 Figures, 4 Tables. A part of this work were published in the 2015 IEEE Information Theory Workshop, and a part was accepted for publication in the 50th Annual Conference on Information Sciences and Systems

  14. arXiv:1602.06902  [pdf, other

    cs.IT

    Lossy Compression with Near-uniform Encoder Outputs

    Authors: Badri N Vellambi, Joerg Kliewer, Matthieu Bloch

    Abstract: It is well known that lossless compression of a discrete memoryless source with near-uniform encoder output is possible at a rate above its entropy if and only if the encoder is randomized. This work focuses on deriving conditions for near-uniform encoder output(s) in the Wyner-Ziv and the distributed lossy compression problems. We show that in the Wyner-Ziv problem, near-uniform encoder output an… ▽ More

    Submitted 9 July, 2016; v1 submitted 22 February, 2016; originally announced February 2016.

    Comments: Submitted to the 2016 IEEE International Symposium on Information Theory (11 Pages, 3 Figures)

  15. Secure Index Coding: Existence and Construction

    Authors: Lawrence Ong, Badri N. Vellambi, Phee Lep Yeoh, Jörg Kliewer, **hong Yuan

    Abstract: We investigate the construction of weakly-secure index codes for a sender to send messages to multiple receivers with side information in the presence of an eavesdropper. We derive a sufficient and necessary condition for the existence of index codes that are secure against an eavesdropper with access to any subset of messages of cardinality $t$, for any fixed $t$. In contrast to the benefits of u… ▽ More

    Submitted 31 May, 2016; v1 submitted 2 February, 2016; originally announced February 2016.

    Comments: Author final manuscript (to be presented at the 2016 IEEE International Symposium on Information Theory)

  16. arXiv:1211.0374  [pdf, ps, other

    stat.AP

    Polynomial phase estimation by phase unwrap**

    Authors: Robby G. McKilliam, Barry G. Quinn, I. Vaughan L. Clarkson, Bill Moran, Badri N. Vellambi

    Abstract: Estimating the coefficients of a noisy polynomial phase signal is important in fields including radar, biology and radio communications. One approach attempts to perform polynomial regression on the phase of the signal. This is complicated by the fact that the phase is wrapped modulo 2πand must be unwrapped before regression can be performed. In this paper we consider an estimator that performs ph… ▽ More

    Submitted 2 November, 2012; originally announced November 2012.

  17. arXiv:1112.2810  [pdf, ps, other

    cs.IT

    Exact Modeling of the Performance of Random Linear Network Coding in Finite-buffer Networks

    Authors: Nima Torabkhani, Badri N. Vellambi, Ahmad Beirami, Faramarz Fekri

    Abstract: In this paper, we present an exact model for the analysis of the performance of Random Linear Network Coding (RLNC) in wired erasure networks with finite buffers. In such networks, packets are delayed due to either random link erasures or blocking by full buffers. We assert that because of RLNC, the content of buffers have dependencies which cannot be captured directly using the classical queueing… ▽ More

    Submitted 13 December, 2011; originally announced December 2011.

    Comments: 5 pages, 5 figures, ITW2011

  18. arXiv:1103.1403  [pdf, ps, other

    cs.IT

    Study of Throughput and Delay in Finite-Buffer Line Networks

    Authors: Badri N. Vellambi, Nima Torabkhani, Faramarz Fekri

    Abstract: In this work, we study the effects of finite buffers on the throughput and delay of line networks with erasure links. We identify the calculation of performance parameters such as throughput and delay to be equivalent to determining the stationary distribution of an irreducible Markov chain. We note that the number of states in the Markov chain grows exponentially in the size of the buffers with t… ▽ More

    Submitted 7 March, 2011; originally announced March 2011.

    Comments: 5 pages, 8 figures, ITA 2011

  19. Throughput and Latency in Finite-Buffer Line Networks

    Authors: Badri N. Vellambi, Nima Torabkhani, Faramarz Fekri

    Abstract: This work investigates the effect of finite buffer sizes on the throughput capacity and packet delay of line networks with packet erasure links that have perfect feedback. These performance measures are shown to be linked to the stationary distribution of an underlying irreducible Markov chain that models the system exactly. Using simple strategies, bounds on the throughput capacity are derived. T… ▽ More

    Submitted 12 December, 2010; originally announced December 2010.

    Comments: 19 pages, 14 figures, accepted in IEEE Transactions on Information Theory

  20. arXiv:1012.2622  [pdf, ps, other

    cs.IT

    Study of Throughput and Latency in Finite-buffer Coded Networks

    Authors: Nima Torabkhani, Badri N. Vellambi, Faramarz Fekri

    Abstract: Exact queueing analysis of erasure networks with network coding in a finite buffer regime is an extremely hard problem due to the large number of states in the network. In such networks, packets are lost due to either link erasures or due to blocking due to full buffers. In this paper, a block-by-block random linear network coding scheme with feedback on the links is selected for reliability and m… ▽ More

    Submitted 12 December, 2010; originally announced December 2010.

    Comments: 5 pages, 4 figures, Asilomar 2010

  21. arXiv:1012.2621  [pdf, ps, other

    cs.IT

    Throughput and Latency of Acyclic Erasure Networks with Feedback in a Finite Buffer Regime

    Authors: Nima Torabkhani, Badri N. Vellambi, Faramarz Fekri

    Abstract: The exact Markov modeling analysis of erasure networks with finite buffers is an extremely hard problem due to the large number of states in the system. In such networks, packets are lost due to either link erasures or blocking by the full buffers. In this paper, we propose a novel method that iteratively estimates the performance parameters of the network and more importantly reduces the computat… ▽ More

    Submitted 12 December, 2010; originally announced December 2010.

    Comments: 5 pages, 5 figures, ITW2010 Dublin