Skip to main content

Showing 1–27 of 27 results for author: Fong, S L

Searching in archive cs. Search in all archives.
.
  1. arXiv:2203.05102  [pdf, other

    cs.IT

    Adaptive relaying for streaming erasure codes in a three node relay network

    Authors: Gustavo Kasper Facenda, M. Nikhil Krishnan, Elad Domanovitz, Silas L. Fong, Ashish Khisti, Wai-Tian Tan, John Apostolopoulos

    Abstract: This paper investigates adaptive streaming codes over a three-node relayed network. In this setting, a source node transmits a sequence of message packets to a destination through a relay. The source-to-relay and relay-to-destination links are unreliable and introduce at most $N_1$ and $N_2$ packet erasures, respectively. The destination node must recover each message packet within a strict delay… ▽ More

    Submitted 9 March, 2022; originally announced March 2022.

    Comments: Paper has been submitted to transactions on information theory

  2. arXiv:1909.06709  [pdf, other

    cs.NI

    Low-Latency Network-Adaptive Error Control for Interactive Streaming

    Authors: Salma Emara, Silas L. Fong, Baochun Li, Ashish Khisti, Wai-Tian Tan, Xiaoqing Zhu, John Apostolopoulos

    Abstract: We introduce a novel network-adaptive algorithm that is suitable for alleviating network packet losses for low-latency interactive communications between a source and a destination. Our network-adaptive algorithm estimates in real-time the best parameters of a recently proposed streaming code that uses forward error correction (FEC) to correct both arbitrary and burst losses, which cause a crackli… ▽ More

    Submitted 29 June, 2020; v1 submitted 14 September, 2019; originally announced September 2019.

    Comments: Presented in part at 27th ACM International Conference on Multimedia, October 2019; 13 pages, 24 figures, submitted to IEEE Transactions on Multimedia

  3. arXiv:1904.06212  [pdf, ps, other

    cs.IT

    An Explicit Rate-Optimal Streaming Code for Channels with Burst and Arbitrary Erasures

    Authors: Elad Domanovitz, Silas L. Fong, Ashish Khisti

    Abstract: This paper considers the transmission of an infinite sequence of messages (a streaming source) over a packet erasure channel, where every source message must be recovered perfectly at the destination subject to a fixed decoding delay. While the capacity of a channel that introduces only bursts of erasures is well known, only recently, the capacity of a channel with either one burst of erasures or… ▽ More

    Submitted 13 May, 2020; v1 submitted 11 April, 2019; originally announced April 2019.

    Comments: arXiv admin note: text overlap with arXiv:1903.07434

  4. arXiv:1903.07434  [pdf, ps, other

    cs.IT

    An Explicit Construction of Optimal Streaming Codes for Channels with Burst and Arbitrary Erasures

    Authors: Damian Dudzicz, Silas L. Fong, Ashish Khisti

    Abstract: This paper presents a new construction of error correcting codes which achieves optimal recovery of a streaming source over a packet erasure channel. The channel model considered is the sliding window erasure model, with burst and arbitrary losses, introduced by Badr et al. . Recently, two independents works by Fong et al. and Krishnan and Kumar have identified optimal streaming codes within this… ▽ More

    Submitted 22 April, 2019; v1 submitted 18 March, 2019; originally announced March 2019.

    Comments: 22 pages

  5. arXiv:1901.03769  [pdf, other

    cs.IT

    Optimal Multiplexed Erasure Codes for Streaming Messages with Different Decoding Delays

    Authors: Silas L. Fong, Ashish Khisti, Baochun Li, Wai-Tian Tan, Xiaoqing Zhu, John Apostolopoulos

    Abstract: This paper considers multiplexing two sequences of messages with two different decoding delays over a packet erasure channel. In each time slot, the source constructs a packet based on the current and previous messages and transmits the packet, which may be erased when the packet travels from the source to the destination. The destination must perfectly recover every source message in the first se… ▽ More

    Submitted 8 November, 2019; v1 submitted 11 January, 2019; originally announced January 2019.

    Comments: 20 pages, 1 figure, 1 table, presented in part at 2019 IEEE ISIT

  6. arXiv:1806.09768   

    cs.IT

    Optimal Streaming Erasure Codes over the Three-Node Relay Network

    Authors: Silas L. Fong, Ashish Khisti, Baochun Li, Wai-Tian Tan, Xiaoqing Zhu, John Apostolopoulos

    Abstract: This paper investigates low-latency streaming codes for a three-node relay network. The source transmits a sequence of messages (streaming messages) to the destination through the relay between them, where the first-hop channel from the source to the relay and the second-hop channel from the relay to the destination are subject to packet erasures. Every source message must be recovered perfectly a… ▽ More

    Submitted 10 March, 2022; v1 submitted 25 June, 2018; originally announced June 2018.

    Comments: Another researcher pointed out that the upper bound on rate in (21) is incorrect. We found that this is the case and we confirmed that there exists a transmission scheme on a 3-node relay network which achieves a rate strictly higher than our upper bound

  7. arXiv:1805.02829  [pdf, other

    cs.IT

    Non-Asymptotic Achievable Rates for Gaussian Energy-Harvesting Channels: Best-Effort and Save-and-Transmit

    Authors: Silas L. Fong, **g Yang, Aylin Yener

    Abstract: An additive white Gaussian noise energy-harvesting channel with an infinite-sized battery is considered. The energy arrival process is modeled as a sequence of independent and identically distributed random variables. The channel capacity $\frac{1}{2}\log(1+P)$ is achievable by the so-called best-effort and save-and-transmit schemes where $P$ denotes the battery recharge rate. This paper analyzes… ▽ More

    Submitted 14 January, 2019; v1 submitted 8 May, 2018; originally announced May 2018.

    Comments: 33 pages, 4 figures, was presented in part at the 2018 IEEE International Symposium on Information Theory

  8. arXiv:1801.04241  [pdf, other

    cs.IT

    Optimal Streaming Codes for Channels with Burst and Arbitrary Erasures

    Authors: Silas L. Fong, Ashish Khisti, Baochun Li, Wai-Tian Tan, Xiaoqing Zhu, John Apostolopoulos

    Abstract: This paper considers transmitting a sequence of messages (a streaming source) over a packet erasure channel. In each time slot, the source constructs a packet based on the current and the previous messages and transmits the packet, which may be erased when the packet travels from the source to the destination. Every source message must be recovered perfectly at the destination subject to a fixed d… ▽ More

    Submitted 5 December, 2018; v1 submitted 12 January, 2018; originally announced January 2018.

    Comments: 36 pages, 3 figures, 2 tables

  9. Scaling Exponent and Moderate Deviations Asymptotics of Polar Codes for the AWGN Channel

    Authors: Silas L. Fong, Vincent Y. F. Tan

    Abstract: This paper investigates polar codes for the additive white Gaussian noise (AWGN) channel. The scaling exponent $μ$ of polar codes for a memoryless channel $q_{Y|X}$ with capacity $I(q_{Y|X})$ characterizes the closest gap between the capacity and non-asymptotic achievable rates in the following way: For a fixed $\varepsilon \in (0, 1)$, the gap between the capacity $I(q_{Y|X})$ and the maximum non… ▽ More

    Submitted 8 June, 2017; originally announced June 2017.

    Comments: 24 pages

  10. arXiv:1703.05932  [pdf, ps, other

    cs.IT

    A Tight Upper Bound on the Second-Order Coding Rate of the Parallel Gaussian Channel with Feedback

    Authors: Silas L. Fong, Vincent Y. F. Tan

    Abstract: This paper investigates the asymptotic expansion for the maximum rate of fixed-length codes over a parallel Gaussian channel with feedback under the following setting: A peak power constraint is imposed on every transmitted codeword, and the average error probability of decoding the transmitted message is non-vanishing as the blocklength increases. It is well known that the presence of feedback do… ▽ More

    Submitted 8 July, 2017; v1 submitted 17 March, 2017; originally announced March 2017.

    Comments: 24 pages

  11. arXiv:1701.02088  [pdf, other

    cs.IT

    On Achievable Rates of AWGN Energy-Harvesting Channels with Block Energy Arrival and Non-Vanishing Error Probabilities

    Authors: Silas L. Fong, Vincent Y. F. Tan, Ayfer Özgür

    Abstract: This paper investigates the achievable rates of an additive white Gaussian noise (AWGN) energy-harvesting (EH) channel with an infinite battery. The EH process is characterized by a sequence of blocks of harvested energy, which is known causally at the source. The harvested energy remains constant within a block while the harvested energy across different blocks is characterized by a sequence of i… ▽ More

    Submitted 1 September, 2017; v1 submitted 9 January, 2017; originally announced January 2017.

    Comments: 51 pages

  12. arXiv:1606.04678  [pdf, ps, other

    cs.IT

    Strong Converse Theorems for Multimessage Networks with Tight Cut-Set Bound

    Authors: Silas L. Fong, Vincent Y. F. Tan

    Abstract: This paper considers a multimessage network where each node may send a message to any other node in the network. Under the discrete memoryless model, we prove the strong converse theorem for any network whose cut-set bound is tight, i.e., achievable. Our result implies that for any fixed rate vector that resides outside the capacity region, the average error probabilities of any sequence of length… ▽ More

    Submitted 5 February, 2019; v1 submitted 15 June, 2016; originally announced June 2016.

    Comments: 37 pages, to appear in Problems of Information Transmission

  13. arXiv:1604.01566  [pdf, other

    cs.IT

    Achievable Rates for Gaussian Degraded Relay Channels with Non-Vanishing Error Probabilities

    Authors: Silas L. Fong, Vincent Y. F. Tan

    Abstract: This paper revisits the Gaussian degraded relay channel, where the link that carries information from the source to the destination is a physically degraded version of the link that carries information from the source to the relay. The source and the relay are subject to expected power constraints. The $\varepsilon$-capacity of the channel is characterized and it is strictly larger than the capaci… ▽ More

    Submitted 18 October, 2016; v1 submitted 6 April, 2016; originally announced April 2016.

    Comments: 28 pages

  14. On the Scaling Exponent of Polar Codes for Binary-Input Energy-Harvesting Channels

    Authors: Silas L. Fong, Vincent Y. F. Tan

    Abstract: This paper investigates the scaling exponent of polar codes for binary-input energy-harvesting (EH) channels with infinite-capacity batteries. The EH process is characterized by a sequence of i.i.d. random variables with finite variances. The scaling exponent $μ$ of polar codes for a binary-input memoryless channel (BMC) characterizes the closest gap between the capacity and non-asymptotic rates a… ▽ More

    Submitted 14 November, 2016; v1 submitted 6 January, 2016; originally announced January 2016.

    Comments: References updated, typos corrected, to appear in IEEE Journal on Selected Areas in Communications

  15. arXiv:1512.05088  [pdf, other

    cs.IT

    On Gaussian Channels with Feedback under Expected Power Constraints and with Non-Vanishing Error Probabilities

    Authors: Lan V. Truong, Silas L. Fong, Vincent Y. F. Tan

    Abstract: In this paper, we consider single- and multi-user Gaussian channels with feedback under expected power constraints and with non-vanishing error probabilities. In the first of two contributions, we study asymptotic expansions for the additive white Gaussian noise (AWGN) channel with feedback under the average error probability formalism. By drawing ideas from Gallager and Nakiboğlu's work for the d… ▽ More

    Submitted 21 September, 2016; v1 submitted 16 December, 2015; originally announced December 2015.

    Comments: Submitted to the IEEE Transactions on Information Theory (revised in September)

  16. arXiv:1510.08544   

    cs.IT

    Empirical Output Distribution of Good Delay-Limited Codes for Quasi-Static Fading Channels

    Authors: Silas L. Fong, Vincent Y. F. Tan

    Abstract: This paper considers delay-limited communication over quasi-static fading channels under a long-term power constraint. A sequence of length-$n$ delay-limited codes for a quasi-static fading channel is said to be capacity-achieving if the codes achieve the delay-limited capacity, which is defined to be the maximum rate achievable by delay-limited codes. The delay-limited capacity is sometimes refer… ▽ More

    Submitted 13 November, 2016; v1 submitted 28 October, 2015; originally announced October 2015.

    Comments: This paper has been withdrawn by the authors because of insufficient novelty

  17. arXiv:1509.01380  [pdf, ps, other

    cs.IT

    A Proof of the Strong Converse Theorem for Gaussian Broadcast Channels via the Gaussian Poincaré Inequality

    Authors: Silas L. Fong, Vincent Y. F. Tan

    Abstract: We prove that the Gaussian broadcast channel with two destinations admits the strong converse property. This implies that for every sequence of block codes operated at a common rate pair with an asymptotic average error probability $<1$, the rate pair must lie within the capacity region derived by Cover and Bergmans. The main mathematical tool required for our analysis is a logarithmic Sobolev ine… ▽ More

    Submitted 8 June, 2017; v1 submitted 4 September, 2015; originally announced September 2015.

    Comments: 19 pages. Submitted to IEEE Transactions on Information Theory

  18. Non-Asymptotic Achievable Rates for Energy-Harvesting Channels using Save-and-Transmit

    Authors: Silas L. Fong, Vincent Y. F. Tan, **g Yang

    Abstract: This paper investigates the information-theoretic limits of energy-harvesting (EH) channels in the finite blocklength regime. The EH process is characterized by a sequence of i.i.d. random variables with finite variances. We use the save-and-transmit strategy proposed by Ozel and Ulukus (2012) together with Shannon's non-asymptotic achievability bound to obtain lower bounds on the achievable rates… ▽ More

    Submitted 25 April, 2016; v1 submitted 9 July, 2015; originally announced July 2015.

    Comments: Submitted to IEEE Journal on Selected Areas in Communications, 2nd revision completed; Typos are corrected

  19. Cut-Set Bounds for Multimessage Multicast Networks with Independent Channels and Zero-Delay Edges

    Authors: Silas L. Fong

    Abstract: We consider a communication network consisting of nodes and directed edges that connect the nodes. The network may contain cycles. The communications are slotted where the duration of each time slot is equal to the maximum propagation delay experienced by the edges. The edges with negligible delays are allowed to be operated before the other edges in each time slot. For any pair of adjacent edges… ▽ More

    Submitted 25 April, 2016; v1 submitted 1 June, 2015; originally announced June 2015.

    Comments: Presented in part at 2015 IEEE International Symposium of Information Theory, Hong Kong. Motivation of the work is added. Typos are corrected

  20. A Proof of the Strong Converse Theorem for Gaussian Multiple Access Channels

    Authors: Silas L. Fong, Vincent Y. F. Tan

    Abstract: We prove the strong converse for the $N$-source Gaussian multiple access channel (MAC). In particular, we show that any rate tuple that can be supported by a sequence of codes with asymptotic average error probability less than one must lie in the Cover-Wyner capacity region. Our proof consists of the following. First, we perform an expurgation step to convert any given sequence of codes with asym… ▽ More

    Submitted 25 April, 2016; v1 submitted 11 February, 2015; originally announced February 2015.

    Comments: Explanation of the proof is added. Typos are corrected

  21. Classes of Delay-Independent Multimessage Multicast Networks with Zero-Delay Nodes

    Authors: Silas L. Fong

    Abstract: In a network, a node is said to incur a delay if its encoding of each transmitted symbol involves only its received symbols obtained before the time slot in which the transmitted symbol is sent (hence the transmitted symbol sent in a time slot cannot depend on the received symbol obtained in the same time slot). A node is said to incur no delay if its received symbol obtained in a time slot is ava… ▽ More

    Submitted 11 September, 2015; v1 submitted 20 October, 2014; originally announced October 2014.

    Comments: 32 pages. Submitted to IEEE Transactions on Information Theory

    Journal ref: IEEE Transactions on Information Theory, vol. 62, pp. 384-400, Jan, 2016

  22. arXiv:1410.2390  [pdf, ps, other

    cs.IT

    Asymptotic Expansions for Gaussian Channels with Feedback under a Peak Power Constraint

    Authors: Silas L. Fong, Vincent Y. F. Tan

    Abstract: This paper investigates the asymptotic expansion for the size of block codes defined for the additive white Gaussian noise (AWGN) channel with feedback under the following setting: A peak power constraint is imposed on every transmitted codeword, and the average error probability of decoding the transmitted message is non-vanishing as the blocklength increases. It is well-known that the presence o… ▽ More

    Submitted 13 October, 2014; v1 submitted 9 October, 2014; originally announced October 2014.

  23. Strong Converse Theorems for Classes of Multimessage Multicast Networks: A Rényi Divergence Approach

    Authors: Silas L. Fong, Vincent Y. F. Tan

    Abstract: This paper establishes that the strong converse holds for some classes of discrete memoryless multimessage multicast networks (DM-MMNs) whose corresponding cut-set bounds are tight, i.e., coincide with the set of achievable rate tuples. The strong converse for these classes of DM-MMNs implies that all sequences of codes with rate tuples belonging to the exterior of the cut-set bound have average e… ▽ More

    Submitted 31 July, 2015; v1 submitted 9 July, 2014; originally announced July 2014.

    Comments: Submitted to IEEE Transactions on Information Theory, Jul 18, 2014. Revised on Jul 31, 2015

  24. Cut-Set Bounds for Networks with Zero-Delay Nodes

    Authors: Silas L. Fong, Raymond W. Yeung

    Abstract: In a network, a node is said to incur a delay if its encoding of each transmitted symbol involves only its received symbols obtained before the time slot in which the transmitted symbol is sent (hence the transmitted symbol sent in a time slot cannot depend on the received symbol obtained in the same time slot). A node is said to incur no delay if its received symbol obtained in a time slot is ava… ▽ More

    Submitted 11 February, 2015; v1 submitted 6 December, 2013; originally announced December 2013.

    Comments: Submitted to IEEE Transactions on Information Theory in Aug, 2012

    Journal ref: IEEE Transactions on Information Theory, vol. 61, pp. 3837-3850, Jul, 2015

  25. Two-Hop Interference Channels: Impact of Linear Schemes

    Authors: Ibrahim Issa, Silas L. Fong, A. Salman Avestimehr

    Abstract: We consider the two-hop interference channel (IC), which consists of two source-destination pairs communicating with each other via two relays. We analyze the degrees of freedom (DoF) of this network when the relays are restricted to perform linear schemes, and the channel gains are constant (i.e., slow fading). We show that, somewhat surprisingly, by using vector-linear strategies at the relays,… ▽ More

    Submitted 3 September, 2013; originally announced September 2013.

    Comments: Submitted to IEEE Transactions on Information Theory

  26. arXiv:1305.3969  [pdf, other

    cs.IT

    Two-Hop Interference Channels: Impact of Linear Time-Varying Schemes

    Authors: Ibrahim Issa, Silas L. Fong, A. Salman Avestimehr

    Abstract: We consider the two-hop interference channel (IC) with constant real channel coefficients, which consists of two source-destination pairs, separated by two relays. We analyze the achievable degrees of freedom (DoF) of such network when relays are restricted to perform scalar amplify-forward (AF) operations, with possibly time-varying coefficients. We show that, somewhat surprisingly, by providing… ▽ More

    Submitted 16 May, 2013; originally announced May 2013.

    Comments: To appear in Proc. of ISIT 2013 (proof of lemma added)

  27. arXiv:1110.2859  [pdf

    cs.CY

    Towards Representation and Validation of Knowledge in Students' Learning Pathway Using Variability Modeling Technique

    Authors: Abdelrahman Osman Elfaki, Md Gapar Md Johar, Kevin Loo Teow Aik, Sim Liew Fong, Ruzi Bachok

    Abstract: Nowadays, E-learning system is considered as one of the main pillars in the learning system. Mainly, E-Learning system is designed to serve different types of students. Thus, providing different learning pathways are a must. In this paper, we introduce the variability technique to represent the knowledge in E-learning system. This representation provides different learning pathways which supports… ▽ More

    Submitted 13 October, 2011; originally announced October 2011.

    Journal ref: Journal: International Journal of Computer Science Issues Issn: 16940784 EIssn: 16940814 Year: 2011 Volume: 8 Issue: 3 pages/rec.No: 30-35