-
A Bandit Approach to Online Pricing for Heterogeneous Edge Resource Allocation
Authors:
Jiaming Cheng,
Duong Thuy Anh Nguyen,
Lele Wang,
Duong Tung Nguyen,
Vijay K. Bhargava
Abstract:
Edge Computing (EC) offers a superior user experience by positioning cloud resources in close proximity to end users. The challenge of allocating edge resources efficiently while maximizing profit for the EC platform remains a sophisticated problem, especially with the added complexity of the online arrival of resource requests. To address this challenge, we propose to cast the problem as a multi-…
▽ More
Edge Computing (EC) offers a superior user experience by positioning cloud resources in close proximity to end users. The challenge of allocating edge resources efficiently while maximizing profit for the EC platform remains a sophisticated problem, especially with the added complexity of the online arrival of resource requests. To address this challenge, we propose to cast the problem as a multi-armed bandit problem and develop two novel online pricing mechanisms, the Kullback-Leibler Upper Confidence Bound (KL-UCB) algorithm and the Min-Max Optimal algorithm, for heterogeneous edge resource allocation. These mechanisms operate in real-time and do not require prior knowledge of demand distribution, which can be difficult to obtain in practice. The proposed posted pricing schemes allow users to select and pay for their preferred resources, with the platform dynamically adjusting resource prices based on observed historical data. Numerical results show the advantages of the proposed mechanisms compared to several benchmark schemes derived from traditional bandit algorithms, including the Epsilon-Greedy, basic UCB, and Thompson Sampling algorithms.
△ Less
Submitted 14 February, 2023;
originally announced February 2023.
-
s-LIME: Reconciling Locality and Fidelity in Linear Explanations
Authors:
Romaric Gaudel,
Luis Galárraga,
Julien Delaunay,
Laurence Rozé,
Vaishnavi Bhargava
Abstract:
The benefit of locality is one of the major premises of LIME, one of the most prominent methods to explain black-box machine learning models. This emphasis relies on the postulate that the more locally we look at the vicinity of an instance, the simpler the black-box model becomes, and the more accurately we can mimic it with a linear surrogate. As logical as this seems, our findings suggest that,…
▽ More
The benefit of locality is one of the major premises of LIME, one of the most prominent methods to explain black-box machine learning models. This emphasis relies on the postulate that the more locally we look at the vicinity of an instance, the simpler the black-box model becomes, and the more accurately we can mimic it with a linear surrogate. As logical as this seems, our findings suggest that, with the current design of LIME, the surrogate model may degenerate when the explanation is too local, namely, when the bandwidth parameter $σ$ tends to zero. Based on this observation, the contribution of this paper is twofold. Firstly, we study the impact of both the bandwidth and the training vicinity on the fidelity and semantics of LIME explanations. Secondly, and based on our findings, we propose \slime, an extension of LIME that reconciles fidelity and locality.
△ Less
Submitted 2 August, 2022;
originally announced August 2022.
-
Fast Multivariate Multipoint Evaluation Over All Finite Fields
Authors:
Vishwas Bhargava,
Sumanta Ghosh,
Zeyu Guo,
Mrinal Kumar,
Chris Umans
Abstract:
Multivariate multipoint evaluation is the problem of evaluating a multivariate polynomial, given as a coefficient vector, simultaneously at multiple evaluation points. In this work, we show that there exists a deterministic algorithm for multivariate multipoint evaluation over any finite field $\mathbb{F}$ that outputs the evaluations of an $m$-variate polynomial of degree less than $d$ in each va…
▽ More
Multivariate multipoint evaluation is the problem of evaluating a multivariate polynomial, given as a coefficient vector, simultaneously at multiple evaluation points. In this work, we show that there exists a deterministic algorithm for multivariate multipoint evaluation over any finite field $\mathbb{F}$ that outputs the evaluations of an $m$-variate polynomial of degree less than $d$ in each variable at $N$ points in time \[ (d^m+N)^{1+o(1)}\cdot\poly(m,d,\log|\mathbb{F}|) \] for all $m\in\N$ and all sufficiently large $d\in\mathbb{N}$.
A previous work of Kedlaya and Umans (FOCS 2008, SICOMP 2011) achieved the same time complexity when the number of variables $m$ is at most $d^{o(1)}$ and had left the problem of removing this condition as an open problem. A recent work of Bhargava, Ghosh, Kumar and Mohapatra (STOC 2022) answered this question when the underlying field is not \emph{too} large and has characteristic less than $d^{o(1)}$. In this work, we remove this constraint on the number of variables over all finite fields, thereby answering the question of Kedlaya and Umans over all finite fields.
Our algorithm relies on a non-trivial combination of ideas from three seemingly different previously known algorithms for multivariate multipoint evaluation, namely the algorithms of Kedlaya and Umans, that of Björklund, Kaski and Williams (IPEC 2017, Algorithmica 2019), and that of Bhargava, Ghosh, Kumar and Mohapatra, together with a result of Bombieri and Vinogradov from analytic number theory about the distribution of primes in an arithmetic progression.
We also present a second algorithm for multivariate multipoint evaluation that is completely elementary and in particular, avoids the use of the Bombieri--Vinogradov Theorem. However, it requires a mild assumption that the field size is bounded by an exponential-tower in $d$ of bounded \textit{height}.
△ Less
Submitted 30 April, 2022;
originally announced May 2022.
-
Fast, Algebraic Multivariate Multipoint Evaluation in Small Characteristic and Applications
Authors:
Vishwas Bhargava,
Sumanta Ghosh,
Mrinal Kumar,
Chandra Kanta Mohapatra
Abstract:
Multipoint evaluation is the computational task of evaluating a polynomial given as a list of coefficients at a given set of inputs. And while \emph{nearly linear time} algorithms have been known for the univariate instance of multipoint evaluation for close to five decades due to a work of Borodin and Moenck \cite{BM74}, fast algorithms for the multivariate version have been much harder to come b…
▽ More
Multipoint evaluation is the computational task of evaluating a polynomial given as a list of coefficients at a given set of inputs. And while \emph{nearly linear time} algorithms have been known for the univariate instance of multipoint evaluation for close to five decades due to a work of Borodin and Moenck \cite{BM74}, fast algorithms for the multivariate version have been much harder to come by. In a significant improvement to the state of art for this problem, Umans \cite{Umans08} and Kedlaya \& Umans \cite{Kedlaya11} gave nearly linear time algorithms for this problem over field of small characteristic and over all finite fields respectively, provided that the number of variables $n$ is at most $d^{o(1)}$ where the degree of the input polynomial in every variable is less than $d$. They also stated the question of designing fast algorithms for the large variable case (i.e. $n \notin d^{o(1)}$) as an open problem. In this work, we show that there is a deterministic algorithm for multivariate multipoint evaluation over a field $\F_{q}$ of characteristic $p$ which evaluates an $n$-variate polynomial of degree less than $d$ in each variable on $N$ inputs in time $$\left((N + d^n)^{1 + o(1)}\text{poly}(\log q, d, p, n)\right)$$ provided that $p$ is at most $d^{o(1)}$, and $q$ is at most $(\exp(\exp(\exp(\cdots (\exp(d)))))$, where the height of this tower of exponentials is fixed. When the number of variables is large (e.g. $n \notin d^{o(1)}$), this is the first {nearly linear} time algorithm for this problem over any (large enough) field.Our algorithm is based on elementary algebraic ideas and this algebraic structure naturally leads to the applications to data structure upper bounds for polynomial evaluation and to an upper bound on the rigidity of Vandermonde matrices.
△ Less
Submitted 28 March, 2022; v1 submitted 15 November, 2021;
originally announced November 2021.
-
A Bilevel Programming Framework for Joint Edge Resource Management and Pricing
Authors:
Tarannum Nisha,
Duong Tung Nguyen,
Vijay K. Bhargava
Abstract:
The emerging edge computing paradigm promises to provide low latency and ubiquitous computation to numerous mobile and Internet of Things (IoT) devices at the network edge. How to efficiently allocate geographically distributed heterogeneous edge resources to a variety of services is a challenging task. While this problem has been studied extensively in recent years, most of the previous work has…
▽ More
The emerging edge computing paradigm promises to provide low latency and ubiquitous computation to numerous mobile and Internet of Things (IoT) devices at the network edge. How to efficiently allocate geographically distributed heterogeneous edge resources to a variety of services is a challenging task. While this problem has been studied extensively in recent years, most of the previous work has largely ignored the preferences of the services when making edge resource allocation decisions. To this end, this paper introduces a novel bilevel optimization model, which explicitly takes the service preferences into consideration, to study the interaction between an EC platform and multiple services. The platform manages a set of edge nodes (ENs) and acts as the leader while the services are the followers. Given the service placement and resource pricing decisions of the leader, each service decides how to optimally divide its workload to different ENs. The proposed framework not only maximizes the profit of the platform but also minimizes the cost of every service. When there is a single EN, we derive a simple analytic solution for the underlying problem. For the general case with multiple ENs and multiple services, we present a Karush Kuhn Tucker based solution and a duality based solution, combining with a series of linearizations, to solve the bilevel problem. Extensive numerical results are shown to illustrate the efficacy of the proposed model.
△ Less
Submitted 14 February, 2022; v1 submitted 18 July, 2021;
originally announced July 2021.
-
Resilient Edge Service Placement under Demand and Node Failure Uncertainties
Authors:
Jiaming Cheng,
Duong Tung Nguyen,
Vijay K. Bhargava
Abstract:
Resiliency plays a critical role in designing future communication networks. How to make edge computing systems resilient against unpredictable failures and fluctuating demand is an important and challenging problem. To this end, this paper investigates a resilient service placement and workload allocation problem for a service provider (SP) who can procure resources from numerous edge nodes to se…
▽ More
Resiliency plays a critical role in designing future communication networks. How to make edge computing systems resilient against unpredictable failures and fluctuating demand is an important and challenging problem. To this end, this paper investigates a resilient service placement and workload allocation problem for a service provider (SP) who can procure resources from numerous edge nodes to serve its users, considering both resource demand and node failure uncertainties. We introduce a novel two-stage adaptive robust model to capture this problem. The service placement and resource procurement decisions are optimized in the first stage while the workload allocation decision is determined in the second stage after the uncertainty realization. By exploiting the special structure of the uncertainty set, we develop an efficient iterative algorithm that can converge to an exact optimal solution within a finite number of iterations. We further present an affine decision rule approximation approach for solving large-scale problem instances in a reasonable time. Extensive numerical results demonstrate the advantages of the proposed model and approaches, which can help the SP make proactive decisions to mitigate the impacts of the uncertainties.
△ Less
Submitted 27 June, 2023; v1 submitted 9 July, 2021;
originally announced July 2021.
-
Reconstruction Algorithms for Low-Rank Tensors and Depth-3 Multilinear Circuits
Authors:
Vishwas Bhargava,
Shubhangi Saraf,
Ilya Volkovich
Abstract:
We give new and efficient black-box reconstruction algorithms for some classes of depth-$3$ arithmetic circuits. As a consequence, we obtain the first efficient algorithm for computing the tensor rank and for finding the optimal tensor decomposition as a sum of rank-one tensors when then input is a constant-rank tensor. More specifically, we provide efficient learning algorithms that run in random…
▽ More
We give new and efficient black-box reconstruction algorithms for some classes of depth-$3$ arithmetic circuits. As a consequence, we obtain the first efficient algorithm for computing the tensor rank and for finding the optimal tensor decomposition as a sum of rank-one tensors when then input is a constant-rank tensor. More specifically, we provide efficient learning algorithms that run in randomized polynomial time over general fields and in deterministic polynomial time over the reals and the complex numbers for the following classes:
(1) Set-multilinear depth-$3$ circuits of constant top fan-in $ΣΠΣ\{\sqcup_j X_j\}(k)$ circuits). As a consequence of our algorithm, we obtain the first polynomial time algorithm for tensor rank computation and optimal tensor decomposition of constant-rank tensors. This result holds for $d$ dimensional tensors for any $d$, but is interesting even for $d=3$.
(2) Sums of powers of constantly many linear forms ($Σ\wedgeΣ$ circuits). As a consequence we obtain the first polynomial-time algorithm for tensor rank computation and optimal tensor decomposition of constant-rank symmetric tensors.
(3) Multilinear depth-3 circuits of constant top fan-in (multilinear $ΣΠΣ(k)$ circuits). Our algorithm works over all fields of characteristic 0 or large enough characteristic. Prior to our work the only efficient algorithms known were over polynomially-sized finite fields (see. Karnin-Shpilka 09').
Prior to our work, the only polynomial-time or even subexponential-time algorithms known (deterministic or randomized) for subclasses of $ΣΠΣ(k)$ circuits that also work over large/infinite fields were for the setting when the top fan-in $k$ is at most $2$ (see Sinha 16' and Sinha 20').
△ Less
Submitted 4 May, 2021;
originally announced May 2021.
-
Making ML models fairer through explanations: the case of LimeOut
Authors:
Guilherme Alves,
Vaishnavi Bhargava,
Miguel Couceiro,
Amedeo Napoli
Abstract:
Algorithmic decisions are now being used on a daily basis, and based on Machine Learning (ML) processes that may be complex and biased. This raises several concerns given the critical impact that biased decisions may have on individuals or on society as a whole. Not only unfair outcomes affect human rights, they also undermine public trust in ML and AI. In this paper we address fairness issues of…
▽ More
Algorithmic decisions are now being used on a daily basis, and based on Machine Learning (ML) processes that may be complex and biased. This raises several concerns given the critical impact that biased decisions may have on individuals or on society as a whole. Not only unfair outcomes affect human rights, they also undermine public trust in ML and AI. In this paper we address fairness issues of ML models based on decision outcomes, and we show how the simple idea of "feature dropout" followed by an "ensemble approach" can improve model fairness. To illustrate, we will revisit the case of "LimeOut" that was proposed to tackle "process fairness", which measures a model's reliance on sensitive or discriminatory features. Given a classifier, a dataset and a set of sensitive features, LimeOut first assesses whether the classifier is fair by checking its reliance on sensitive features using "Lime explanations". If deemed unfair, LimeOut then applies feature dropout to obtain a pool of classifiers. These are then combined into an ensemble classifier that was empirically shown to be less dependent on sensitive features without compromising the classifier's accuracy. We present different experiments on multiple datasets and several state of the art classifiers, which show that LimeOut's classifiers improve (or at least maintain) not only process fairness but also other fairness metrics such as individual and group fairness, equal opportunity, and demographic parity.
△ Less
Submitted 1 November, 2020;
originally announced November 2020.
-
LimeOut: An Ensemble Approach To Improve Process Fairness
Authors:
Vaishnavi Bhargava,
Miguel Couceiro,
Amedeo Napoli
Abstract:
Artificial Intelligence and Machine Learning are becoming increasingly present in several aspects of human life, especially, those dealing with decision making. Many of these algorithmic decisions are taken without human supervision and through decision making processes that are not transparent. This raises concerns regarding the potential bias of these processes towards certain groups of society,…
▽ More
Artificial Intelligence and Machine Learning are becoming increasingly present in several aspects of human life, especially, those dealing with decision making. Many of these algorithmic decisions are taken without human supervision and through decision making processes that are not transparent. This raises concerns regarding the potential bias of these processes towards certain groups of society, which may entail unfair results and, possibly, violations of human rights. Dealing with such biased models is one of the major concerns to maintain the public trust.
In this paper, we address the question of process or procedural fairness. More precisely, we consider the problem of making classifiers fairer by reducing their dependence on sensitive features while increasing (or, at least, maintaining) their accuracy. To achieve both, we draw inspiration from "dropout" techniques in neural based approaches, and propose a framework that relies on "feature drop-out" to tackle process fairness. We make use of "LIME Explanations" to assess a classifier's fairness and to determine the sensitive features to remove. This produces a pool of classifiers (through feature dropout) whose ensemble is shown empirically to be less dependent on sensitive features, and with improved or no impact on accuracy.
△ Less
Submitted 17 June, 2020;
originally announced June 2020.
-
Two-Stage Robust Edge Service Placement and Sizing under Demand Uncertainty
Authors:
Duong Tung Nguyen,
Hieu Trung Nguyen,
Ni Trieu,
Vijay K. Bhargava
Abstract:
Edge computing has emerged as a key technology to reduce network traffic, improve user experience, and enable various Internet of Things applications. From the perspective of a service provider (SP), how to jointly optimize the service placement, sizing, and workload allocation decisions is an important and challenging problem, which becomes even more complicated when considering demand uncertaint…
▽ More
Edge computing has emerged as a key technology to reduce network traffic, improve user experience, and enable various Internet of Things applications. From the perspective of a service provider (SP), how to jointly optimize the service placement, sizing, and workload allocation decisions is an important and challenging problem, which becomes even more complicated when considering demand uncertainty. To this end, we propose a novel two-stage adaptive robust optimization framework to help the SP optimally determine the locations for installing their service (i.e., placement) and the amount of computing resource to purchase from each location (i.e., sizing). The service placement and sizing solution of the proposed model can hedge against any possible realization within the uncertainty set of traffic demand. Given the first-stage robust solution, the optimal resource and workload allocation decisions are computed in the second-stage after the uncertainty is revealed. To solve the two-stage model, in this paper, we present an iterative solution by employing the column-and-constraint generation method that decomposes the underlying problem into a master problem and a max-min subproblem associated with the second stage. Extensive numerical results are shown to illustrate the effectiveness of the proposed two-stage robust optimization model.
△ Less
Submitted 30 November, 2020; v1 submitted 27 April, 2020;
originally announced April 2020.
-
Deterministic Factorization of Sparse Polynomials with Bounded Individual Degree
Authors:
Vishwas Bhargava,
Shubhangi Saraf,
Ilya Volkovich
Abstract:
In this paper we study the problem of deterministic factorization of sparse polynomials. We show that if $f \in \mathbb{F}[x_{1},x_{2},\ldots ,x_{n}]$ is a polynomial with $s$ monomials, with individual degrees of its variables bounded by $d$, then $f$ can be deterministically factored in time $s^{\mathrm{poly}(d) \log n}$. Prior to our work, the only efficient factoring algorithms known for this…
▽ More
In this paper we study the problem of deterministic factorization of sparse polynomials. We show that if $f \in \mathbb{F}[x_{1},x_{2},\ldots ,x_{n}]$ is a polynomial with $s$ monomials, with individual degrees of its variables bounded by $d$, then $f$ can be deterministically factored in time $s^{\mathrm{poly}(d) \log n}$. Prior to our work, the only efficient factoring algorithms known for this class of polynomials were randomized, and other than for the cases of $d=1$ and $d=2$, only exponential time deterministic factoring algorithms were known.
A crucial ingredient in our proof is a quasi-polynomial sparsity bound for factors of sparse polynomials of bounded individual degree. In particular we show if $f$ is an $s$-sparse polynomial in $n$ variables, with individual degrees of its variables bounded by $d$, then the sparsity of each factor of $f$ is bounded by $s^{O({d^2\log{n}})}$. This is the first nontrivial bound on factor sparsity for $d>2$. Our sparsity bound uses techniques from convex geometry, such as the theory of Newton polytopes and an approximate version of the classical Carathéodory's Theorem.
Our work addresses and partially answers a question of von zur Gathen and Kaltofen (JCSS 1985) who asked whether a quasi-polynomial bound holds for the sparsity of factors of sparse polynomials.
△ Less
Submitted 20 August, 2018;
originally announced August 2018.
-
A Market-Based Framework for Multi-Resource Allocation in Fog Computing
Authors:
Duong Tung Nguyen,
Long Bao Le,
Vijay Bhargava
Abstract:
Fog computing is transforming the network edge into an intelligent platform by bringing storage, computing, control, and networking functions closer to end-users, things, and sensors. How to allocate multiple resource types (e.g., CPU, memory, bandwidth) of capacity-limited heterogeneous fog nodes to competing services with diverse requirements and preferences in a fair and efficient manner is a c…
▽ More
Fog computing is transforming the network edge into an intelligent platform by bringing storage, computing, control, and networking functions closer to end-users, things, and sensors. How to allocate multiple resource types (e.g., CPU, memory, bandwidth) of capacity-limited heterogeneous fog nodes to competing services with diverse requirements and preferences in a fair and efficient manner is a challenging task. To this end, we propose a novel market-based resource allocation framework in which the services act as buyers and fog resources act as divisible goods in the market. The proposed framework aims to compute a market equilibrium (ME) solution at which every service obtains its favorite resource bundle under the budget constraint while the system achieves high resource utilization. This work extends the General Equilibrium literature by considering a practical case of satiated utility functions. Also, we introduce the notions of non-wastefulness and frugality for equilibrium selection, and rigorously demonstrate that all the non-wasteful and frugal ME are the optimal solutions to a convex program. Furthermore, the proposed equilibrium is shown to possess salient fairness properties including envy-freeness, sharing-incentive, and proportionality. Another major contribution of this work is to develop a privacy-preserving distributed algorithm, which is of independent interest, for computing an ME while allowing market participants to obfuscate their private information. Finally, extensive performance evaluation is conducted to verify our theoretical analyses.
△ Less
Submitted 16 April, 2019; v1 submitted 25 July, 2018;
originally announced July 2018.
-
Price-based Resource Allocation for Edge Computing: A Market Equilibrium Approach
Authors:
Duong Tung Nguyen,
Long Bao Le,
Vijay Bhargava
Abstract:
The emerging edge computing paradigm promises to deliver superior user experience and enable a wide range of Internet of Things (IoT) applications. In this work, we propose a new market-based framework for efficiently allocating resources of heterogeneous capacity-limited edge nodes (EN) to multiple competing services at the network edge. By properly pricing the geographically distributed ENs, the…
▽ More
The emerging edge computing paradigm promises to deliver superior user experience and enable a wide range of Internet of Things (IoT) applications. In this work, we propose a new market-based framework for efficiently allocating resources of heterogeneous capacity-limited edge nodes (EN) to multiple competing services at the network edge. By properly pricing the geographically distributed ENs, the proposed framework generates a market equilibrium (ME) solution that not only maximizes the edge computing resource utilization but also allocates optimal (i.e., utility-maximizing) resource bundles to the services given their budget constraints. When the utility of a service is defined as the maximum revenue that the service can achieve from its resource allotment, the equilibrium can be computed centrally by solving the Eisenberg-Gale (EG) convex program. drawn from the economics literature. We further show that the equilibrium allocation is Pareto-optimal and satisfies desired fairness properties including sharing incentive, proportionality, and envy-freeness. Also, two distributed algorithms are introduced, which efficiently converge to an ME. When each service aims to maximize its net profit (i.e., revenue minus cost) instead of the revenue, we derive a novel convex optimization problem and rigorously prove that its solution is exactly an ME. Extensive numerical results are presented to validate the effectiveness of the proposed techniques.
△ Less
Submitted 8 May, 2018;
originally announced May 2018.
-
Machine Learning Methods for User Positioning With Uplink RSS in Distributed Massive MIMO
Authors:
K. N. R. Surya Vara Prasad,
Ekram Hossain,
Vijay K. Bhargava
Abstract:
We consider a machine learning approach based on Gaussian process regression (GP) to position users in a distributed massive multiple-input multiple-output (MIMO) system with the uplink received signal strength (RSS) data. We focus on the scenario where noise-free RSS is available for training, but only noisy RSS is available for testing purposes. To estimate the test user locations and their 2σ e…
▽ More
We consider a machine learning approach based on Gaussian process regression (GP) to position users in a distributed massive multiple-input multiple-output (MIMO) system with the uplink received signal strength (RSS) data. We focus on the scenario where noise-free RSS is available for training, but only noisy RSS is available for testing purposes. To estimate the test user locations and their 2σ error-bars, we adopt two state-of-the-art GP methods, namely, the conventional GP (CGP) and the numerical approximation GP (NaGP) methods. We find that the CGP method, which treats the noisy test RSS vectors as noise-free, provides unrealistically small 2σ error-bars on the estimated locations. To alleviate this concern, we derive the true predictive distribution for the test user locations and then employ the NaGP method to numerically approximate it as a Gaussian with the same first and second order moments. We also derive a Bayesian Cramer-Rao lower bound (BCRLB) on the achievable root- mean-squared-error (RMSE) performance of the two GP methods. Simulation studies reveal that: (i) the NaGP method indeed provides realistic 2σ error-bars on the estimated locations, (ii) operation in massive MIMO regime improves the RMSE performance, and (iii) the achieved RMSE performances are very close to the derived BCRLB.
△ Less
Submitted 19 January, 2018;
originally announced January 2018.
-
Low-Dimensionality of Noise-Free RSS and its Application in Distributed Massive MIMO
Authors:
K. N. R. Surya Vara Prasad,
Ekram Hossain,
Vijay K. Bhargava
Abstract:
We examine the dimensionality of noise-free uplink received signal strength (RSS) data in a distributed multiuser massive multiple-input multiple-output system. Specifically, we apply principal component analysis to the noise-free uplink RSS and observe that it has a low-dimensional principal subspace. We make use of this unique property to propose RecGP - a reconstruction-based Gaussian process r…
▽ More
We examine the dimensionality of noise-free uplink received signal strength (RSS) data in a distributed multiuser massive multiple-input multiple-output system. Specifically, we apply principal component analysis to the noise-free uplink RSS and observe that it has a low-dimensional principal subspace. We make use of this unique property to propose RecGP - a reconstruction-based Gaussian process regression (GP) method which predicts user locations from uplink RSS data. Considering noise-free RSS for training and noisy test RSS for location prediction, RecGP reconstructs the noisy test RSS from a low- dimensional principal subspace of the noise-free training RSS. The reconstructed RSS is input to a trained GP model for location prediction. Noise reduction facilitated by the reconstruction step allows RecGP to achieve lower prediction error than standard GP methods which directly use the test RSS for location prediction.
△ Less
Submitted 7 August, 2017;
originally announced August 2017.
-
A Survey on Non-Orthogonal Multiple Access for 5G Networks: Research Challenges and Future Trends
Authors:
Zhiguo Ding,
Xianfu Lei,
George K. Karagiannidis,
Robert Schober,
Jihong Yuan,
Vijay Bhargava
Abstract:
Non-orthogonal multiple access (NOMA) is an essential enabling technology for the fifth generation (5G) wireless networks to meet the heterogeneous demands on low latency, high reliability, massive connectivity, improved fairness, and high throughput. The key idea behind NOMA is to serve multiple users in the same resource block, such as a time slot, subcarrier, or spreading code. The NOMA princip…
▽ More
Non-orthogonal multiple access (NOMA) is an essential enabling technology for the fifth generation (5G) wireless networks to meet the heterogeneous demands on low latency, high reliability, massive connectivity, improved fairness, and high throughput. The key idea behind NOMA is to serve multiple users in the same resource block, such as a time slot, subcarrier, or spreading code. The NOMA principle is a general framework, and several recently proposed 5G multiple access schemes can be viewed as special cases. This survey provides an overview of the latest NOMA research and innovations as well as their applications. Thereby, the papers published in this special issue are put into the content of the existing literature. Future research challenges regarding NOMA in 5G and beyond are also discussed.
△ Less
Submitted 16 June, 2017;
originally announced June 2017.
-
Irreducibility and r-th root finding over finite fields
Authors:
Vishwas Bhargava,
Gábor Ivanyos,
Rajat Mittal,
Nitin Saxena
Abstract:
Constructing $r$-th nonresidue over a finite field is a fundamental computational problem. A related problem is to construct an irreducible polynomial of degree $r^e$ (where $r$ is a prime) over a given finite field $\mathbb{F}_q$ of characteristic $p$ (equivalently, constructing the bigger field $\mathbb{F}_{q^{r^e}}$). Both these problems have famous randomized algorithms but the derandomization…
▽ More
Constructing $r$-th nonresidue over a finite field is a fundamental computational problem. A related problem is to construct an irreducible polynomial of degree $r^e$ (where $r$ is a prime) over a given finite field $\mathbb{F}_q$ of characteristic $p$ (equivalently, constructing the bigger field $\mathbb{F}_{q^{r^e}}$). Both these problems have famous randomized algorithms but the derandomization is an open question. We give some new connections between these two problems and their variants.
In 1897, Stickelberger proved that if a polynomial has an odd number of even degree factors, then its discriminant is a quadratic nonresidue in the field. We give an extension of Stickelberger's Lemma; we construct $r$-th nonresidues from a polynomial $f$ for which there is a $d$, such that, $r|d$ and $r\nmid\,$#(irreducible factor of $f(x)$ of degree $d$). Our theorem has the following interesting consequences: (1) we can construct $\mathbb{F}_{q^m}$ in deterministic poly(deg($f$),$m\log q$)-time if $m$ is an $r$-power and $f$ is known; (2) we can find $r$-th roots in $\mathbb{F}_{p^m}$ in deterministic poly($m\log p$)-time if $r$ is constant and $r|\gcd(m,p-1)$.
We also discuss a conjecture significantly weaker than the Generalized Riemann hypothesis to get a deterministic poly-time algorithm for $r$-th root finding.
△ Less
Submitted 2 February, 2017;
originally announced February 2017.
-
Physical Layer Security for Massive MIMO Systems Impaired by Phase Noise
Authors:
Jun Zhu,
Robert Schober,
Vijay K. Bhargava
Abstract:
In this paper, we investigate the impact of phase noise on the secrecy performance of downlink massive MIMO systems in the presence of a passive multiple-antenna eavesdropper. Thereby, for the base station (BS) and the legitimate users, the effect of multiplicative phase noise is taken into account, whereas the eavesdropper is assumed to employ ideal hardware. We derive a lower bound for the ergod…
▽ More
In this paper, we investigate the impact of phase noise on the secrecy performance of downlink massive MIMO systems in the presence of a passive multiple-antenna eavesdropper. Thereby, for the base station (BS) and the legitimate users, the effect of multiplicative phase noise is taken into account, whereas the eavesdropper is assumed to employ ideal hardware. We derive a lower bound for the ergodic secrecy rate of a given user when matched filter data precoding and artificial noise transmission are employed at the BS. Based on the derived analytical expression, we investigate the impact of the various system parameters on the secrecy rate. Our analytical and simulation results reveal that distributively deployed local oscillators (LOs) can achieve a better performance than one common LO for all BS antennas as long as a sufficient amount of power is assigned for data transmission.
△ Less
Submitted 6 March, 2016;
originally announced March 2016.
-
Analysis and Design of Secure Massive MIMO Systems in the Presence of Hardware Impairments
Authors:
Jun Zhu,
Derrick Wing Kwan Ng,
Ning Wang,
Robert Schober,
Vijay K. Bhargava
Abstract:
To keep the hardware costs of future communications systems manageable, the use of low-cost hardware components is desirable. This is particularly true for the emerging massive multiple-input multiple-output (MIMO) systems which equip base stations (BSs) with a large number of antenna elements. However, low-cost transceiver designs will further accentuate the hardware impairments which are present…
▽ More
To keep the hardware costs of future communications systems manageable, the use of low-cost hardware components is desirable. This is particularly true for the emerging massive multiple-input multiple-output (MIMO) systems which equip base stations (BSs) with a large number of antenna elements. However, low-cost transceiver designs will further accentuate the hardware impairments which are present in any practical communication system. In this paper, we investigate the impact of hardware impairments on the secrecy performance of downlink massive MIMO systems in the presence of a passive multiple-antenna eavesdropper. Thereby, for the BS and the legitimate users, the joint effects of multiplicative phase noise, additive distortion noise, and amplified receiver noise are taken into account, whereas the eavesdropper is assumed to employ ideal hardware. We derive a lower bound for the ergodic secrecy rate of a given user when matched filter (MF) data precoding and artificial noise (AN) transmission are employed at the BS. Based on the derived analytical expression, we investigate the impact of the various system parameters on the secrecy rate and optimize both the pilot sets used for uplink training and the AN precoding. Our analytical and simulation results reveal that 1) the additive distortion noise at the BS may be beneficial for the secrecy performance, especially if the power assigned for AN emission is not sufficient; 2) all other hardware impairments have a negative impact on the secrecy performance; 3) {\textcolor{blue}{despite their susceptibility to pilot interference in the presence of phase noise}}, so-called spatially orthogonal pilot sequences are preferable unless the phase noise is very strong; 4) the proposed generalized null-space (NS) AN precoding method can efficiently mitigate the negative effects of phase noise.
△ Less
Submitted 10 August, 2016; v1 submitted 26 February, 2016;
originally announced February 2016.
-
Energy Efficiency in Massive MIMO-Based 5G Networks: Opportunities and Challenges
Authors:
K. N. R. Surya Vara Prasad,
Ekram Hossain,
Vijay K. Bhargava
Abstract:
As we make progress towards the era of fifth generation (5G) communication networks, energy efficiency (EE) becomes an important design criterion because it guarantees sustainable evolution. In this regard, the massive multiple-input multiple-output (MIMO) technology, where the base stations (BSs) are equipped with a large number of antennas so as to achieve multiple orders of spectral and energy…
▽ More
As we make progress towards the era of fifth generation (5G) communication networks, energy efficiency (EE) becomes an important design criterion because it guarantees sustainable evolution. In this regard, the massive multiple-input multiple-output (MIMO) technology, where the base stations (BSs) are equipped with a large number of antennas so as to achieve multiple orders of spectral and energy efficiency gains, will be a key technology enabler for 5G. In this article, we present a comprehensive discussion on state-of-the-art techniques which further enhance the EE gains offered by massive MIMO (MM). We begin with an overview of MM systems and discuss how realistic power consumption models can be developed for these systems. Thereby, we discuss and identify few shortcomings of some of the most prominent EE-maximization techniques present in the current literature. Then, we discuss "hybrid MM systems" operating in a 5G architecture, where MM operates in conjunction with other potential technology enablers, such as millimetre wave, heterogenous networks, and energy harvesting networks. Multiple opportunities and challenges arise in such a 5G architecture because these technologies benefit mutually from each other and their coexistence introduces several new constraints on the design of energy-efficient systems. Despite clear evidence that hybrid MM systems can achieve significantly higher EE gains than conventional MM systems, several open research problems continue to roadblock system designers from fully harnessing the EE gains offered by hybrid MM systems. Our discussions lead to the conclusion that hybrid MM systems offer a sustainable evolution towards 5G networks and are therefore an important research topic for future work.
△ Less
Submitted 27 November, 2015;
originally announced November 2015.
-
Per-Antenna Constant Envelope Precoding for Secure Transmission in Large-Scale MISO Systems
Authors:
Jun Zhu,
Ning Wang,
Vijay K. Bhargava
Abstract:
Secure transmission in large-scale MISO systems employing artificial noise (AN) is studied under the per-antenna constant envelope (CE) constraint. Achievable secrecy rate of the per-antenna CE precoding scheme for large-scale MISO is analyzed and compared with that of the matched filter linear precoding. A two-stage per-antenna CE precoding scheme for joint signal-plus-AN transmission is proposed…
▽ More
Secure transmission in large-scale MISO systems employing artificial noise (AN) is studied under the per-antenna constant envelope (CE) constraint. Achievable secrecy rate of the per-antenna CE precoding scheme for large-scale MISO is analyzed and compared with that of the matched filter linear precoding. A two-stage per-antenna CE precoding scheme for joint signal-plus-AN transmission is proposed. The first stage determines the per-antenna CE precoding for the information-bearing signal. A properly generated AN using an iteration algorithm is incorporated into the transmit signal in the second stage such that the combined signal-plus-AN satisfies the per-antenna CE constraint and the AN is orthogonal to the user channel. It is shown that compared to conventional per-antenna CE transmission, this joint signal-plus-AN secure transmission scheme does not require additional transmit power. An alternative low-complexity AN generation scheme which uses a separate antenna to cancel the AN leakage to the intended user introduced by randomly generated AN is also proposed.
△ Less
Submitted 10 October, 2015;
originally announced October 2015.
-
Linear Precoding of Data and Artificial Noise in Secure Massive MIMO Systems
Authors:
Jun Zhu,
Robert Schober,
Vijay K. Bhargava
Abstract:
In this paper, we consider secure downlink transmission in a multi-cell massive multiple-input multiple-output (MIMO) system where the numbers of base station (BS) antennas, mobile terminals, and eavesdropper antennas are asymptotically large. The channel state information of the eavesdropper is assumed to be unavailable at the BS and hence, linear precoding of data and artificial noise (AN) are e…
▽ More
In this paper, we consider secure downlink transmission in a multi-cell massive multiple-input multiple-output (MIMO) system where the numbers of base station (BS) antennas, mobile terminals, and eavesdropper antennas are asymptotically large. The channel state information of the eavesdropper is assumed to be unavailable at the BS and hence, linear precoding of data and artificial noise (AN) are employed for secrecy enhancement. Four different data precoders (i.e., selfish zero-forcing (ZF)/regularized channel inversion (RCI) and collaborative ZF/RCI precoders) and three different AN precoders (i.e., random, selfish/collaborative null-space based precoders) are investigated and the corresponding achievable ergodic secrecy rates are analyzed. Our analysis includes the effects of uplink channel estimation, pilot contamination, multi-cell interference, and path-loss. Furthermore, to strike a balance between complexity and performance, linear precoders that are based on matrix polynomials are proposed for both data and AN precoding. The polynomial coefficients of the data and AN precoders are optimized respectively for minimization of the sum mean squared error of and the AN leakage to the mobile terminals in the cell of interest using tools from free probability and random matrix theory. Our analytical and simulation results provide interesting insights for the design of secure multi-cell massive MIMO systems and reveal that the proposed polynomial data and AN precoders closely approach the performance of selfish RCI data and null-space based AN precoders, respectively.
△ Less
Submitted 31 August, 2015; v1 submitted 2 May, 2015;
originally announced May 2015.
-
Joint Downlink Cell Association and Bandwidth Allocation for Wireless Backhauling in Two-Tier HetNets with Large-Scale Antenna Arrays
Authors:
Ning Wang,
Ekram Hossain,
Vijay K. Bhargava
Abstract:
The problem of joint downlink cell association (CA) and wireless backhaul bandwidth allocation (WBBA) in two-tier cellular heterogeneous networks (HetNets) is considered. Large-scale antenna array is implemented at the macro base station (BS), while the small cells within the macro cell range are single-antenna BSs and they rely on over-the-air links to the macro BS for backhauling. A sum logarith…
▽ More
The problem of joint downlink cell association (CA) and wireless backhaul bandwidth allocation (WBBA) in two-tier cellular heterogeneous networks (HetNets) is considered. Large-scale antenna array is implemented at the macro base station (BS), while the small cells within the macro cell range are single-antenna BSs and they rely on over-the-air links to the macro BS for backhauling. A sum logarithmic user rate maximization problem is investigated considering wireless backhauling constraints. A duplex and spectrum sharing scheme based on co-channel reverse time-division duplex (TDD) and dynamic soft frequency reuse (SFR) is proposed for interference management in two-tier HetNets with large-scale antenna arrays at the macro BS and wireless backhauling for small cells. Two in-band WBBA scenarios, namely, unified bandwidth allocation and per-small-cell bandwidth allocation scenarios, are investigated for joint CA-WBBA in the HetNet. A two-level hierarchical decomposition method for relaxed optimization is employed to solve the mixed-integer nonlinear program (MINLP). Solutions based on the General Algorithm Modeling System (GAMS) optimization solver and fast heuristics are also proposed for cell association in the per-small-cell WBBA scenario. It is shown that when all small cells have to use in-band wireless backhaul, the system load has more impact on both the sum log-rate and per-user rate performance than the number of small cells deployed within the macro cell range. The proposed joint CA-WBBA algorithms have an optimal load approximately equal to the size of the large-scale antenna array at the macro BS. The cell range expansion (CRE) strategy, which is an efficient cell association scheme for HetNets with perfect backhauling, is shown to be inefficient when in-band wireless backhauling for small cells comes into play.
△ Less
Submitted 31 December, 2014;
originally announced January 2015.
-
Secure Transmission in Multi-Cell Massive MIMO Systems
Authors:
Jun Zhu,
Robert Schober,
Vijay K. Bhargava
Abstract:
In this paper, we consider physical layer security provisioning in multi-cell massive multiple-input multiple-output (MIMO) systems. Specifically, we consider secure downlink transmission in a multi-cell massive MIMO system with matched-filter precoding and artificial noise (AN) generation at the base station (BS) in the presence of a passive multi-antenna eavesdropper. We investigate the resultin…
▽ More
In this paper, we consider physical layer security provisioning in multi-cell massive multiple-input multiple-output (MIMO) systems. Specifically, we consider secure downlink transmission in a multi-cell massive MIMO system with matched-filter precoding and artificial noise (AN) generation at the base station (BS) in the presence of a passive multi-antenna eavesdropper. We investigate the resulting achievable ergodic secrecy rate and the secrecy outage probability for the cases of perfect training and pilot contamination. Thereby, we consider two different AN sha** matrices, namely, the conventional AN sha** matrix, where the AN is transmitted in the null space of the matrix formed by all user channels, and a random AN sha** matrix, which avoids the complexity associated with finding the null space of a large matrix. Our analytical and numerical results reveal that in multi-cell massive MIMO systems employing matched-filter precoding (1) AN generation is required to achieve a positive ergodic secrecy rate if the user and the eavesdropper experience the same path-loss, (2) even with AN generation secure transmission may not be possible if the number of eavesdropper antennas is too large and not enough power is allocated to channel estimation, (3) for a given fraction of power allocated to AN and a given number of users, in case of pilot contamination, the ergodic secrecy rate is not a monotonically increasing function of the number of BS antennas, and (4) random AN sha** matrices provide a favourable performance/complexity tradeoff and are an attractive alternative to conventional AN sha** matrices.
△ Less
Submitted 28 May, 2014;
originally announced May 2014.
-
Unified and Distributed QoS-Driven Cell Association Algorithms in Heterogeneous Networks
Authors:
Hamidreza Boostanimehr,
Vijay K. Bhargava
Abstract:
This paper addresses the cell association problem in the downlink of a multi-tier heterogeneous network (HetNet), where base stations (BSs) have finite number of resource blocks (RBs) available to distribute among their associated users. Two problems are defined and treated in this paper: sum utility of long term rate maximization with long term rate quality of service (QoS) constraints, and globa…
▽ More
This paper addresses the cell association problem in the downlink of a multi-tier heterogeneous network (HetNet), where base stations (BSs) have finite number of resource blocks (RBs) available to distribute among their associated users. Two problems are defined and treated in this paper: sum utility of long term rate maximization with long term rate quality of service (QoS) constraints, and global outage probability minimization with outage QoS constraints. The first problem is well-suited for low mobility environments, while the second problem provides a framework to deal with environments with fast fading. The defined optimization problems in this paper are solved in two phases: cell association phase followed by the optional RB distribution phase. We show that the cell association phase of both problems have the same structure. Based on this similarity, we propose a unified distributed algorithm with low levels of message passing to for the cell association phase. This distributed algorithm is derived by relaxing the association constraints and using Lagrange dual decomposition method. In the RB distribution phase, the remaining RBs after the cell association phase are distributed among the users. Simulation results show the superiority of our distributed cell association scheme compared to schemes that are based on maximum signal to interference plus noise ratio (SINR).
△ Less
Submitted 10 May, 2014;
originally announced May 2014.
-
Optimal Tx-BF for MIMO SC-FDE Systems
Authors:
Peiran Wu,
Robert Schober,
Vijay K. Bhargava
Abstract:
Transmit beamforming (Tx-BF) for multiple-input multiple-output (MIMO) channels is an effective means to improve system performance. In frequency-selective channels, Tx-BF can be implemented in combination with single-carrier frequency-domain equalization (SC-FDE) to combat inter-symbol interference. In this paper, we consider the optimal design of the Tx-BF matrix for a MIMO SC-FDE system employi…
▽ More
Transmit beamforming (Tx-BF) for multiple-input multiple-output (MIMO) channels is an effective means to improve system performance. In frequency-selective channels, Tx-BF can be implemented in combination with single-carrier frequency-domain equalization (SC-FDE) to combat inter-symbol interference. In this paper, we consider the optimal design of the Tx-BF matrix for a MIMO SC-FDE system employing a linear minimum mean square error (MSE) receiver. We formulate the Tx-BF optimization problem as the minimization of a general function of the stream MSEs, subject to a transmit power constraint. The optimal structure of the Tx-BF matrix is obtained in closed form and an efficient algorithm is proposed for computing the optimal power allocation. Our simulation results validate the excellent performance of the proposed scheme in terms of uncoded bit-error rate and achievable bit rate.
△ Less
Submitted 28 June, 2013;
originally announced June 2013.
-
Transceiver Design For SC-FDE Based MIMO Relay Systems
Authors:
Peiran Wu,
Robert Schober,
Vijay Bhargava
Abstract:
In this paper, we propose a joint transceiver design for single-carrier frequency-domain equalization (SC-FDE) based multiple-input multiple-output (MIMO) relay systems. To this end, we first derive the optimal minimum mean-squared error linear and decision-feedback frequency-domain equalization filters at the destination along with the corresponding error covariance matrices at the output of the…
▽ More
In this paper, we propose a joint transceiver design for single-carrier frequency-domain equalization (SC-FDE) based multiple-input multiple-output (MIMO) relay systems. To this end, we first derive the optimal minimum mean-squared error linear and decision-feedback frequency-domain equalization filters at the destination along with the corresponding error covariance matrices at the output of the equalizer. Subsequently, we formulate the source and relay precoding matrix design problem as the minimization of a family of Schur-convex and Schur-concave functions of the mean-squared errors at the output of the equalizer under separate power constraints for the source and the relay. By exploiting properties of the error covariance matrix and results from majorization theory, we derive the optimal structures of the source and relay precoding matrices, which allows us to transform the matrix optimization problem into a scalar power optimization problem. Adopting a high signal-to-noise ratio approximation for the objective function, we obtain the global optimal solution for the power allocation variables. Simulation results illustrate the excellent performance of the proposed system and its superiority compared to conventional orthogonal frequency-division multiplexing based MIMO relay systems.
△ Less
Submitted 14 October, 2012;
originally announced October 2012.
-
Relay Selection for OFDM Wireless Systems under Asymmetric Information: A Contract-Theory Based Approach
Authors:
Ziaul Hasan,
Vijay K. Bhargava
Abstract:
User cooperation although improves performance of wireless systems, it requires incentives for the potential cooperating nodes to spend their energy acting as relays. Moreover, these potential relays are better informed than the source about their transmission costs, which depend on the exact channel conditions on their relay-destination links. This results in asymmetry of available information be…
▽ More
User cooperation although improves performance of wireless systems, it requires incentives for the potential cooperating nodes to spend their energy acting as relays. Moreover, these potential relays are better informed than the source about their transmission costs, which depend on the exact channel conditions on their relay-destination links. This results in asymmetry of available information between the source and the relays. In this paper, we use contract theory to tackle the problem of relay selection under asymmetric information in OFDM-based cooperative wireless system that employs decode-and-forward (DF) relaying. We first design incentive compatible offers/contracts, consisting of a menu of payments and desired signal-to-noise-ratios (SNR)s at the destination and then the source broadcasts this menu to nearby mobile nodes. The nearby mobile nodes who are willing to relay notify back the source with the contracts they are willing to accept in each subcarrier. We show that when the source is under a budget constraint, the problem of relay selection in each subcarrier in order to maximize the capacity is a nonlinear non-separable knapsack problem. We propose a heuristic relay selection scheme to solve this problem. We compare the performance of our overall mechanism and the heuristic solution with a simple relay selection scheme and selected numerical results showed that our solution performs better and is close to optimal. The overall mechanism introduced in this paper is simple to implement, requires limited interaction with potential relays and hence requires minimal signalling overhead.
△ Less
Submitted 28 April, 2013; v1 submitted 27 July, 2012;
originally announced July 2012.
-
Green Cellular Networks: A Survey, Some Research Issues and Challenges
Authors:
Ziaul Hasan,
Hamidreza Boostanimehr,
Vijay K. Bhargava
Abstract:
Energy efficiency in cellular networks is a growing concern for cellular operators to not only maintain profitability, but also to reduce the overall environment effects. This emerging trend of achieving energy efficiency in cellular networks is motivating the standardization authorities and network operators to continuously explore future technologies in order to bring improvements in the entire…
▽ More
Energy efficiency in cellular networks is a growing concern for cellular operators to not only maintain profitability, but also to reduce the overall environment effects. This emerging trend of achieving energy efficiency in cellular networks is motivating the standardization authorities and network operators to continuously explore future technologies in order to bring improvements in the entire network infrastructure. In this article, we present a brief survey of methods to improve the power efficiency of cellular networks, explore some research issues and challenges and suggest some techniques to enable an energy efficient or "green" cellular network. Since base stations consume a maximum portion of the total energy used in a cellular system, we will first provide a comprehensive survey on techniques to obtain energy savings in base stations. Next, we discuss how heterogeneous network deployment based on micro, pico and femto-cells can be used to achieve this goal. Since cognitive radio and cooperative relaying are undisputed future technologies in this regard, we propose a research vision to make these technologies more energy efficient. Lastly, we explore some broader perspectives in realizing a "green" cellular network technology
△ Less
Submitted 24 September, 2011; v1 submitted 27 August, 2011;
originally announced August 2011.
-
The Ergodic Capacity of The MIMO Wire-Tap Channel
Authors:
Zouheir Rezki,
Francois Gagnon,
Vijay Bhargava
Abstract:
This paper has been withdrawn to provide a more rigorous proof of the converse of Theorem 1 and Lemma 1 as well.
This paper has been withdrawn to provide a more rigorous proof of the converse of Theorem 1 and Lemma 1 as well.
△ Less
Submitted 20 July, 2009; v1 submitted 1 February, 2009;
originally announced February 2009.