Skip to main content

Showing 1–40 of 40 results for author: Akyol, E

Searching in archive cs. Search in all archives.
.
  1. arXiv:1908.09812  [pdf, ps, other

    cs.SI

    Impact of Confirmation Bias on Competitive Information Spread in Social Networks

    Authors: Yanbing Mao, Emrah Akyol, Naira Hovakimyan

    Abstract: This paper investigates the impact of confirmation bias on competitive information spread in the cyber-social network that comprises individuals in a social network and competitive information sources in cyber layer. We formulate the problem as a zero-sum game, which admits a unique Nash equilibrium in pure strategies. We characterize the dependence of pure Nash equilibrium on the public's innate… ▽ More

    Submitted 24 August, 2020; v1 submitted 26 August, 2019; originally announced August 2019.

    Comments: submitted

  2. arXiv:1908.09472  [pdf, ps, other

    cs.SI

    On Inference of Network Topology and Confirmation Bias in Cyber-Social Networks

    Authors: Yanbing Mao, Emrah Akyol

    Abstract: This paper studies topology inference, from agent states, of a directed cyber-social network with opinion spreading dynamics model that explicitly takes confirmation bias into account. The cyber-social network comprises a set of partially connected directed network of agents at the social level, and a set of information sources at the cyber layer. The necessary and sufficient conditions for the ex… ▽ More

    Submitted 25 April, 2020; v1 submitted 26 August, 2019; originally announced August 2019.

    Comments: to appear in IEEE Transactions on Signal and Information Processing over Networks

  3. arXiv:1908.09466  [pdf, ps, other

    eess.SY cs.DC cs.MA

    Novel Stealthy Attack and Defense Strategies for Networked Control Systems

    Authors: Yanbing Mao, Hamidreza Jafarnejadsani, Pan Zhao, Emrah Akyol, Naira Hovakimyan

    Abstract: This paper studies novel attack and defense strategies, based on a class of stealthy attacks, namely the zero-dynamics attack (ZDA), for multi-agent control systems. ZDA poses a formidable security challenge since its attack signal is hidden in the null-space of the state-space representation of the control system and hence it can evade conventional detection methods. An intuitive defense strategy… ▽ More

    Submitted 25 April, 2020; v1 submitted 26 August, 2019; originally announced August 2019.

    Comments: to appear in IEEE TAC

  4. arXiv:1804.02609  [pdf, other

    eess.SY cs.IT math.OC

    On Remote Estimation with Multiple Communication Channels

    Authors: Xiaobin Gao, Emrah Akyol, Tamer Basar

    Abstract: This paper considers a sequential sensor scheduling and remote estimation problem with multiple communication channels. Departing from the classical remote estimation paradigm, which involves one communication channel (noiseless or noisy), we consider here the more realistic setting of two channels with different characteristics (one is cheap but noisy, the other one is costly but noiseless). We f… ▽ More

    Submitted 7 April, 2018; originally announced April 2018.

  5. arXiv:1803.06377  [pdf, other

    cs.SI cs.MA eess.SY math.OC

    Spread of Information with Confirmation Bias in Cyber-Social Networks

    Authors: Yanbing Mao, Sadegh Bolouki, Emrah Akyol

    Abstract: This paper provides a model to investigate information spreading over cyber-social network of agents communicating with each other. The cyber-social network considered here comprises individuals and news agencies. Each individual holds a belief represented by a scalar. Individuals receive information from news agencies that are closer to their belief, confirmation bias is explicitly incorporated i… ▽ More

    Submitted 16 March, 2018; originally announced March 2018.

  6. arXiv:1711.11183  [pdf, ps, other

    eess.SY cs.MA math.OC

    Strategic Topology Switching for Security-Part I: Consensus & Switching Times

    Authors: Yanbing Mao, Emrah Akyol, Ziang Zhang

    Abstract: In this two-part paper, we consider strategic topology switching for the second-order multi-agent systems under a special class of stealthy attacks, namely the "zero-dynamics" attack (ZDA). The main mathematical tool proposed here is to strategically switch the network topology to detect a possible ZDA. However, it is not clear a priori that such a switching strategy still yields consensus in this… ▽ More

    Submitted 4 March, 2019; v1 submitted 29 November, 2017; originally announced November 2017.

    Comments: working paper, 12 pages

  7. arXiv:1711.11181  [pdf, ps, other

    cs.MA math.OC

    Strategic Topology Switching for Security-Part II: Detection & Switching Topologies

    Authors: Yanbing Mao, Emrah Akyol, Ziang Zhang

    Abstract: This two-part paper considers strategic topology switching for security in the second-order multi-agent system. In Part II, we propose a strategy on switching topologies to detect zero-dynamics attack (ZDA), whose attack-starting time is allowed to be not the initial time. We first characterize the sufficient and necessary condition for detectability of ZDA, in terms of the network topologies to b… ▽ More

    Submitted 4 March, 2019; v1 submitted 29 November, 2017; originally announced November 2017.

    Comments: working paper, 12 pages, second part of a two-part paper

  8. arXiv:1708.04956  [pdf, other

    cs.GT cs.IT cs.MA cs.SI eess.SY

    Strategic Communication Between Prospect Theoretic Agents over a Gaussian Test Channel

    Authors: Venkata Sriram Siddhardh Nadendla, Emrah Akyol, Cedric Langbort, Tamer Başar

    Abstract: In this paper, we model a Stackelberg game in a simple Gaussian test channel where a human transmitter (leader) communicates a source message to a human receiver (follower). We model human decision making using prospect theory models proposed for continuous decision spaces. Assuming that the value function is the squared distortion at both the transmitter and the receiver, we analyze the effects o… ▽ More

    Submitted 28 September, 2017; v1 submitted 14 August, 2017; originally announced August 2017.

    Comments: 6 pages, 3 figures, Accepted to MILCOM-2017, Corrections made in the new version

  9. arXiv:1701.08058  [pdf, other

    cs.GT cs.CR cs.IT cs.MA

    Optimal Communication Strategies in Networked Cyber-Physical Systems with Adversarial Elements

    Authors: Emrah Akyol, Kenneth Rose, Tamer Basar, Cedric Langbort

    Abstract: This paper studies optimal communication and coordination strategies in cyber-physical systems for both defender and attacker within a game-theoretic framework. We model the communication network of a cyber-physical system as a sensor network which involves one single Gaussian source observed by many sensors, subject to additive independent Gaussian observation noises. The sensors communicate with… ▽ More

    Submitted 27 January, 2017; originally announced January 2017.

    Comments: submitted to IEEE Transactions on Signal and Information Processing over Networks, Special Issue on Distributed Signal Processing for Security and Privacy in Networked Cyber-Physical Systems

  10. arXiv:1610.08210  [pdf, other

    cs.GT

    Price of Transparency in Strategic Machine Learning

    Authors: Emrah Akyol, Cedric Langbort, Tamer Basar

    Abstract: Based on the observation that the transparency of an algorithm comes with a cost for the algorithm designer when the users (data providers) are strategic, this paper studies the impact of strategic intent of the users on the design and performance of transparent ML algorithms. We quantitatively study the {\bf price of transparency} in the context of strategic classification algorithms, by modeling… ▽ More

    Submitted 26 October, 2016; originally announced October 2016.

    Comments: 3rd Workshop on Fairness, Accountability, and Transparency in Machine Learning

  11. arXiv:1610.05471  [pdf, other

    math.OC cs.IT eess.SY

    Optimal Communication Scheduling and Remote Estimation over an Additive Noise Channel

    Authors: Xiaobin Gao, Emrah Akyol, Tamer Basar

    Abstract: This paper considers a sequential sensor scheduling and remote estimation problem with one sensor and one estimator. The sensor makes sequential observations about the state of an underlying memoryless stochastic process and makes a decision as to whether or not to send this measurement to the estimator. The sensor and the estimator have the common objective of minimizing expected distortion in th… ▽ More

    Submitted 18 October, 2016; originally announced October 2016.

    Comments: Extended version of a journal submission

  12. arXiv:1609.09448  [pdf, other

    cs.GT math.OC

    Hierarchical Multistage Gaussian Signaling Games in Noncooperative Communication and Control Systems

    Authors: Muhammed O. Sayin, Emrah Akyol, Tamer Basar

    Abstract: We analyze in this paper finite horizon hierarchical signaling games between (information provider) senders and (decision maker) receivers in a dynamic environment. The underlying information evolves in time while sender and receiver interact repeatedly. Different from the classical communication (control) models, however, the sender (sensor) and the receiver (controller) have different objectives… ▽ More

    Submitted 11 June, 2019; v1 submitted 29 September, 2016; originally announced September 2016.

    Journal ref: Automatica, Volume 107, September 2019

  13. arXiv:1607.03273  [pdf, other

    cs.CR cs.GT cs.IT cs.MM

    Scalar Quadratic-Gaussian Soft Watermarking Games

    Authors: Kivanc Mihcak, Emrah Akyol, Tamer Basar, Cedric Langbort

    Abstract: We introduce the zero-sum game problem of soft watermarking: The hidden information (watermark) comes from a continuum and has a perceptual value; the receiver generates an estimate of the embedded watermark to minimize the expected estimation error (unlike the conventional watermarking schemes where both the hidden information and the receiver output are from a discrete finite set). Applications… ▽ More

    Submitted 12 July, 2016; originally announced July 2016.

    Comments: submitted for publication

  14. arXiv:1607.02864  [pdf, other

    eess.SY cs.GT cs.IT

    On the Structure of Equilibrium Strategies in Dynamic Gaussian Signaling Games

    Authors: Muhammed Sayin, Emrah Akyol, Tamer Basar

    Abstract: This paper analyzes a finite horizon dynamic signaling game motivated by the well-known strategic information transmission problems in economics. The mathematical model involves information transmission between two agents, a sender who observes two Gaussian processes, state and bias, and a receiver who takes an action based on the received message from the sender. The players incur quadratic insta… ▽ More

    Submitted 11 July, 2016; originally announced July 2016.

    Comments: will appear in IEEE Multi-Conference on Systems and Control 2016

  15. arXiv:1602.06406  [pdf, other

    cs.IT cs.GT cs.SI

    On the Role of Side Information In Strategic Communication

    Authors: Emrah Akyol, Cedric Langbort, Tamer Basar

    Abstract: This paper analyzes the fundamental limits of strate- gic communication in network settings. Strategic communication differs from the conventional communication paradigms in in- formation theory since it involves different objectives for the encoder and the decoder, which are aware of this mismatch and act accordingly. This leads to a Stackelberg game where both agents commit to their map**s ex-… ▽ More

    Submitted 20 February, 2016; originally announced February 2016.

    Comments: submitted to ISIT'16. arXiv admin note: text overlap with arXiv:1510.00764

  16. arXiv:1602.06375  [pdf, other

    cs.IT cs.RO math.OC stat.AP

    Power-Distortion Metrics for Path Planning over Gaussian Sensor Networks

    Authors: Emrah Akyol, Urbashi Mitra

    Abstract: Path planning is an important component of au- tonomous mobile sensing systems. This paper studies upper and lower bounds of communication performance over Gaussian sen- sor networks, to drive power-distortion metrics for path planning problems. The Gaussian multiple-access channel is employed as a channel model and two source models are considered. In the first setting, the underlying source is e… ▽ More

    Submitted 20 February, 2016; originally announced February 2016.

    Comments: will appear in Trans. on Communications

  17. arXiv:1512.01749  [pdf, other

    cs.IT

    Combinatorial Message Sharing and a New Achievable Region for Multiple Descriptions

    Authors: Kumar Viswanatha, Emrah Akyol, Kenneth Rose

    Abstract: This paper presents a new achievable rate-distortion region for the general L channel multiple descriptions problem. A well known general region for this problem is due to Venkataramani, Kramer and Goyal (VKG) [1]. Their encoding scheme is an extension of the El-Gamal-Cover (EC) and Zhang- Berger (ZB) coding schemes to the L channel case and includes a combinatorial number of refinement codebooks,… ▽ More

    Submitted 6 December, 2015; originally announced December 2015.

  18. Deterministic Annealing Based Optimization for Zero-Delay Source-Channel Coding in Networks

    Authors: Mustafa Said Mehmetoglu, Emrah Akyol, Kenneth Rose

    Abstract: This paper studies the problem of global optimization of zero-delay source-channel codes that map between the source space and the channel space, under a given transmission power constraint and for the mean square error distortion. Particularly, we focus on two well known network settings: the Wyner-Ziv setting where only a decoder has access to side information and the distributed setting where i… ▽ More

    Submitted 6 November, 2015; originally announced November 2015.

    Comments: Accepted for publication at IEEE Transactions on Communications

  19. arXiv:1510.03495  [pdf, other

    cs.IT cs.GT

    Privacy Constrained Information Processing

    Authors: Emrah Akyol, Cedric Langbort, Tamer Basar

    Abstract: This paper studies communication scenarios where the transmitter and the receiver have different objectives due to privacy concerns, in the context of a variation of the strategic information transfer (SIT) model of Sobel and Crawford. We first formulate the problem as the minimization of a common distortion by the transmitter and the receiver subject to a privacy constrained transmitter. We show… ▽ More

    Submitted 12 October, 2015; originally announced October 2015.

    Comments: will appear in CDC'15

  20. arXiv:1510.00764  [pdf, other

    cs.IT cs.GT math.OC

    Information-Theoretic Approach to Strategic Communication as a Hierarchical Game

    Authors: Emrah Akyol, Cedric Langbort, Tamer Basar

    Abstract: This paper analyzes the information disclosure problems originated in economics through the lens of information theory. Such problems are radically different from the conventional communication paradigms in information theory since they involve different objectives for the encoder and the decoder, which are aware of this mismatch and act accordingly. This leads, in our setting, to a hierarchical c… ▽ More

    Submitted 11 July, 2016; v1 submitted 2 October, 2015; originally announced October 2015.

    Comments: in press, the Proceedings of the IEEE, Special Issue on Principles and Applications of Science of Information

  21. arXiv:1510.00450  [pdf, other

    cs.IT

    Analog Multiple Descriptions: A Zero-Delay Source-Channel Coding Approach

    Authors: Mustafa Said Mehmetoglu, Emrah Akyol, Kenneth Rose

    Abstract: This paper extends the well-known source coding problem of multiple descriptions, in its general and basic setting, to analog source-channel coding scenarios. Encoding-decoding functions that optimally map between the (possibly continuous valued) source and the channel spaces are numerically derived. The main technical tool is a non-convex optimization method, namely, deterministic annealing, whic… ▽ More

    Submitted 1 October, 2015; originally announced October 2015.

    Comments: Submitted to ICASSP 2016

  22. arXiv:1510.00064  [pdf, ps, other

    eess.SY cs.IT

    Optimal Sensor Scheduling and Remote Estimation over an Additive Noise Channel

    Authors: Xiaobin Gao, Emrah Akyol, Tamer Basar

    Abstract: We consider a sensor scheduling and remote estimation problem with one sensor and one estimator. At each time step, the sensor makes an observation on the state of a source, and then decides whether to transmit its observation to the estimator or not. The sensor is charged a cost for each transmission. The remote estimator generates a real-time estimate on the state of the source based on the mess… ▽ More

    Submitted 30 September, 2015; originally announced October 2015.

    Comments: In Proceedings of American Control Conference (ACC), pages 2723-2728, 2015

  23. arXiv:1510.00059  [pdf, ps, other

    cs.IT eess.SY

    On Remote Estimation with Multiple Communication Channels

    Authors: Xiaobin Gao, Emrah Akyol, Tamer Basar

    Abstract: This paper considers a sequential estimation and sensor scheduling problem in the presence of multiple communication channels. As opposed to the classical remote estimation problem that involves one perfect (noiseless) channel and one extremely noisy channel (which corresponds to not transmitting the observed state), a more realistic additive noise channel with fixed power constraint along with a… ▽ More

    Submitted 30 September, 2015; originally announced October 2015.

    Comments: Submitted to 2016 American Control Conference (ACC 2016)

  24. Optimal Estimation with Limited Measurements and Noisy Communication

    Authors: Xiaobin Gao, Emrah Akyol, Tamer Basar

    Abstract: This paper considers a sequential estimation and sensor scheduling problem with one sensor and one estimator. The sensor makes sequential observations about the state of an underlying memoryless stochastic process, and makes a decision as to whether or not to send this measurement to the estimator. The sensor and the estimator have the common objective of minimizing expected distortion in the esti… ▽ More

    Submitted 28 September, 2015; originally announced September 2015.

    Comments: X. Gao, E. Akyol, and T. Basar. Optimal estimation with limited measurements and noisy communication. In 54th IEEE Conference on Decision and Control (CDC15), 2015, to appear

  25. arXiv:1403.8093  [pdf, other

    cs.IT

    The Lossy Common Information of Correlated Sources

    Authors: Kumar Viswanatha, Emrah Akyol, Kenneth Rose

    Abstract: The two most prevalent notions of common information (CI) are due to Wyner and Gacs-Korner and both the notions can be stated as two different characteristic points in the lossless Gray-Wyner region. Although the information theoretic characterizations for these two CI quantities can be easily evaluated for random variables with infinite entropy (eg., continuous random variables), their operationa… ▽ More

    Submitted 31 March, 2014; originally announced March 2014.

  26. arXiv:1403.5315  [pdf, other

    eess.SY cs.IT math.OC

    A Deterministic Annealing Optimization Approach for Witsenhausen's and Related Decentralized Control Settings

    Authors: Mustafa Mehmetoglu, Emrah Akyol, Kenneth Rose

    Abstract: This paper studies the problem of map** optimization in decentralized control problems. A global optimization algorithm is proposed based on the ideas of ``deterministic annealing" - a powerful non-convex optimization framework derived from information theoretic principles with analogies to statistical physics. The key idea is to randomize the map**s and control the Shannon entropy of the syst… ▽ More

    Submitted 20 March, 2014; originally announced March 2014.

    Comments: submitted to CDC'14

  27. arXiv:1402.0525  [pdf, other

    cs.IT eess.SY math.OC

    A Deterministic Annealing Approach to Witsenhausen's Counterexample

    Authors: Mustafa Mehmetoglu, Emrah Akyol, Kenneth Rose

    Abstract: This paper proposes a numerical method, based on information theoretic ideas, to a class of distributed control problems. As a particular test case, the well-known and numerically "over-mined" problem of decentralized control and implicit communication, commonly referred to as Witsenhausen's counterexample, is considered. The method provides a small improvement over the best numerical result so fa… ▽ More

    Submitted 3 February, 2014; originally announced February 2014.

    Comments: submitted to ISIT'14

  28. arXiv:1312.0685  [pdf, other

    cs.IT

    Optimization of zero-delay map**s for distributed coding by deterministic annealing

    Authors: Mustafa S. Mehmetoglu, Emrah Akyol, Kenneth Rose

    Abstract: This paper studies the optimization of zero-delay analog map**s in a network setting that involves distributed coding. The cost surface is known to be non-convex, and known greedy methods tend to get trapped in poor locally optimal solutions that depend heavily on initialization. We derive an optimization algorithm based on the principles of "deterministic annealing", a powerful global optimizat… ▽ More

    Submitted 2 December, 2013; originally announced December 2013.

  29. arXiv:1305.3931  [pdf, other

    cs.IT eess.SY math.OC

    Gaussian Sensor Networks with Adversarial Nodes

    Authors: Emrah Akyol, Kenneth Rose, Tamer Basar

    Abstract: This paper studies a particular sensor network model which involves one single Gaussian source observed by many sensors, subject to additive independent Gaussian observation noise. Sensors communicate with the receiver over an additive Gaussian multiple access channel. The aim of the receiver is to reconstruct the underlying source with minimum mean squared error. The scenario of interest here is… ▽ More

    Submitted 16 May, 2013; originally announced May 2013.

    Comments: 5 pages, will be presented at ISIT 2013, Istanbul, Turkey

  30. arXiv:1305.3375  [pdf, other

    cs.IT

    On the Role of Common Codewords in Quadratic Gaussian Multiple Descriptions Coding

    Authors: Kumar Viswanatha, Emrah Akyol, Kenneth Rose

    Abstract: This paper focuses on the problem of $L-$channel quadratic Gaussian multiple description (MD) coding. We recently introduced a new encoding scheme in [1] for general $L-$channel MD problem, based on a technique called `Combinatorial Message Sharing' (CMS), where every subset of the descriptions shares a distinct common message. The new achievable region subsumes the most well known region for the… ▽ More

    Submitted 15 May, 2013; originally announced May 2013.

  31. arXiv:1304.6969  [pdf, other

    cs.IT

    A Deterministic Annealing Approach to Optimization of Zero-delay Source-Channel Codes

    Authors: Mustafa S. Mehmetoglu, Emrah Akyol, Kenneth Rose

    Abstract: This paper studies optimization of zero-delay source-channel codes, and specifically the problem of obtaining globally optimal transformations that map between the source space and the channel space, under a given transmission power constraint and for the mean square error distortion. Particularly, we focus on the setting where the decoder has access to side information, whose cost surface is know… ▽ More

    Submitted 25 April, 2013; originally announced April 2013.

    Comments: Submitted to ITW 2013, in review

  32. arXiv:1303.3049  [pdf, other

    math.OC cs.IT eess.SY

    On Optimal Jamming Over an Additive Noise Channel

    Authors: Emrah Akyol, Kenneth Rose, Tamer Basar

    Abstract: This paper considers the problem of optimal zero-delay jamming over an additive noise channel. Early work had already solved this problem for a Gaussian source and channel. Building on a sequence of recent results on conditions for linearity of optimal estimation, and of optimal map**s in source-channel coding, we derive the saddle-point solution to the jamming problem for general sources and ch… ▽ More

    Submitted 12 March, 2013; originally announced March 2013.

    Comments: Submitted to 2013 Conference on Decision and Control

  33. On Zero Delay Source-Channel Coding

    Authors: Emrah Akyol, Kumar Viswanatha, Kenneth Rose, Tor Ramstad

    Abstract: In this paper, we study the zero-delay source-channel coding problem, and specifically the problem of obtaining the vector transformations that optimally map between the m-dimensional source space and the k-dimensional channel space, under a given transmission power constraint and for the mean square error distortion. We first study the functional properties of this problem and show that the objec… ▽ More

    Submitted 14 February, 2013; originally announced February 2013.

    Comments: Submitted to IEEE Transactions on Information Theory, 18 pages, 10 figures

  34. arXiv:1301.0957  [pdf, other

    cs.IT

    On Large Scale Distributed Compression and Dispersive Information Routing for Networks

    Authors: Kumar Viswanatha, Sharadh Ramaswamy, Ankur Saxena, Emrah Akyol, Kenneth Rose

    Abstract: This paper considers the problem of distributed source coding for a large network. A major obstacle that poses an existential threat to practical deployment of conventional approaches to distributed coding is the exponential growth of the decoder complexity with the number of sources and the encoding rates. This growth in complexity renders many traditional approaches impractical even for moderate… ▽ More

    Submitted 5 January, 2013; originally announced January 2013.

  35. arXiv:1209.4383  [pdf, other

    cs.IT

    Minimum Communication Cost for Joint Distributed Source Coding and Dispersive Information Routing

    Authors: Kumar Viswanatha, Emrah Akyol, Kenneth Rose

    Abstract: This paper considers the problem of minimum cost communication of correlated sources over a network with multiple sinks, which consists of distributed source coding followed by routing. We introduce a new routing paradigm called dispersive information routing, wherein the intermediate nodes are allowed to `split' a packet and forward subsets of the received bits on each of the forward paths. This… ▽ More

    Submitted 19 September, 2012; originally announced September 2012.

  36. arXiv:1206.2994   

    cs.IT

    Towards Optimality in Transform Coding

    Authors: Emrah Akyol, Kenneth Rose

    Abstract: It is well-known for transform coding of multivariate Gaussian sources, that the Karhunen-Loève transform (KLT) minimizes the mean square error distortion. However, finding the optimal transform for general non-Gaussian sources has been an open problem for decades, despite several important advances that provide some partial answers regarding KLT optimality. In this paper, we present a necessary a… ▽ More

    Submitted 18 June, 2012; v1 submitted 14 June, 2012; originally announced June 2012.

    Comments: discovered a related prior work on the subject

  37. On Constrained Randomized Quantization

    Authors: Emrah Akyol, Kenneth Rose

    Abstract: Randomized (dithered) quantization is a method capable of achieving white reconstruction error independent of the source. Dithered quantizers have traditionally been considered within their natural setting of uniform quantization. In this paper we extend conventional dithered quantization to nonuniform quantization, via a subterfage: dithering is performed in the companded domain. Closed form nece… ▽ More

    Submitted 13 June, 2012; originally announced June 2012.

    Comments: submitted to IEEE Transactions on Signal Processing, 2012

  38. arXiv:1205.1173  [pdf, ps, other

    cs.IT

    Subset Typicality Lemmas and Improved Achievable Regions in Multiterminal Source Coding

    Authors: Kumar Viswanatha, Emrah Akyol, Kenneth Rose

    Abstract: Consider the following information theoretic setup wherein independent codebooks of N correlated random variables are generated according to their respective marginals. The problem of determining the conditions on the rates of codebooks to ensure the existence of at least one codeword tuple which is jointly typical with respect to a given joint density (called the multivariate covering lemma) has… ▽ More

    Submitted 5 May, 2012; originally announced May 2012.

  39. arXiv:1105.6150  [pdf, other

    cs.IT

    A Strictly Improved Achievable Region for Multiple Descriptions Using Combinatorial Message Sharing

    Authors: Kumar Viswanatha, Emrah Akyol, Kenneth Rose

    Abstract: We recently proposed a new coding scheme for the L-channel multiple descriptions (MD) problem for general sources and distortion measures involving `Combinatorial Message Sharing' (CMS) [7] leading to a new achievable rate-distortion region. Our objective in this paper is to establish that this coding scheme strictly subsumes the most popular region for this problem due to Venkataramani, Kramer an… ▽ More

    Submitted 30 May, 2011; originally announced May 2011.

  40. arXiv:1104.1217  [pdf, other

    cs.IT

    On Conditions for Linearity of Optimal Estimation

    Authors: Emrah Akyol, Kumar Viswanatha, Kenneth Rose

    Abstract: When is optimal estimation linear? It is well known that, when a Gaussian source is contaminated with Gaussian noise, a linear estimator minimizes the mean square estimation error. This paper analyzes, more generally, the conditions for linearity of optimal estimators. Given a noise (or source) distribution, and a specified signal to noise ratio (SNR), we derive conditions for existence and unique… ▽ More

    Submitted 27 February, 2012; v1 submitted 6 April, 2011; originally announced April 2011.

    Comments: To appear in IEEE Transactions on Information Theory, accepted on Feb 5, 2012