Skip to main content

Showing 1–50 of 58 results for author: Gohari, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2404.04534  [pdf, ps, other

    cs.LG cs.AI cs.CY

    Impact of Fairness Regulations on Institutions' Policies and Population Qualifications

    Authors: Hamidreza Montaseri, Amin Gohari

    Abstract: The proliferation of algorithmic systems has fueled discussions surrounding the regulation and control of their social impact. Herein, we consider a system whose primary objective is to maximize utility by selecting the most qualified individuals. To promote demographic parity in the selection algorithm, we consider penalizing discrimination across social groups. We examine conditions under which… ▽ More

    Submitted 19 May, 2024; v1 submitted 6 April, 2024; originally announced April 2024.

    Comments: Added experiments

  2. arXiv:2402.18129  [pdf, other

    cs.LG cs.AI cs.IT

    On the Inductive Biases of Demographic Parity-based Fair Learning Algorithms

    Authors: Haoyu Lei, Amin Gohari, Farzan Farnia

    Abstract: Fair supervised learning algorithms assigning labels with little dependence on a sensitive attribute have attracted great attention in the machine learning community. While the demographic parity (DP) notion has been frequently used to measure a model's fairness in training fair classifiers, several studies in the literature suggest potential impacts of enforcing DP in fair learning algorithms. In… ▽ More

    Submitted 20 June, 2024; v1 submitted 28 February, 2024; originally announced February 2024.

  3. arXiv:2307.06155  [pdf, other

    math.CO cs.IT

    Relative Fractional Independence Number and Its Applications

    Authors: Sharareh Alipour, Amin Gohari, Mehrshad Taziki

    Abstract: We define the relative fractional independence number of a graph $G$ with respect to another graph $H$, as $$α^*(G|H)=\max_{W}\frac{α(G\boxtimes W)}{α(H\boxtimes W)},$$ where the maximum is taken over all graphs $W$, $G\boxtimes W$ is the strong product of $G$ and $W$, and $α$ denotes the independence number. We give a non-trivial linear program to compute $α^*(G|H)$ and discuss some of its proper… ▽ More

    Submitted 17 May, 2024; v1 submitted 12 July, 2023; originally announced July 2023.

  4. arXiv:2206.11042  [pdf, other

    cs.IT cs.LG

    f-divergences and their applications in lossy compression and bounding generalization error

    Authors: Saeed Masiha, Amin Gohari, Mohammad Hossein Yassaee

    Abstract: In this paper, we provide three applications for $f$-divergences: (i) we introduce Sanov's upper bound on the tail probability of the sum of independent random variables based on super-modular $f$-divergence and show that our generalized Sanov's bound strictly improves over ordinary one, (ii) we consider the lossy compression problem which studies the set of achievable rates for a given distortion… ▽ More

    Submitted 26 January, 2023; v1 submitted 21 June, 2022; originally announced June 2022.

  5. arXiv:2203.02474  [pdf, other

    stat.ML cs.IT cs.LG

    Rate-Distortion Theoretic Generalization Bounds for Stochastic Learning Algorithms

    Authors: Milad Sefidgaran, Amin Gohari, Gaël Richard, Umut Şimşekli

    Abstract: Understanding generalization in modern machine learning settings has been one of the major challenges in statistical learning theory. In this context, recent years have witnessed the development of various generalization bounds suggesting different complexity notions such as the mutual information between the data sample and the algorithm output, compressibility of the hypothesis space, and the fr… ▽ More

    Submitted 29 June, 2022; v1 submitted 4 March, 2022; originally announced March 2022.

    Comments: Accepted for presentation at the Conference on Learning Theory (COLT) 2022

  6. arXiv:2102.05695  [pdf, other

    cs.IT

    Learning under Distribution Mismatch and Model Misspecification

    Authors: Saeed Masiha, Amin Gohari, Mohammad Hossein Yassaee, Mohammad Reza Aref

    Abstract: We study learning algorithms when there is a mismatch between the distributions of the training and test datasets of a learning algorithm. The effect of this mismatch on the generalization error and model misspecification are quantified. Moreover, we provide a connection between the generalization error and the rate-distortion theory, which allows one to utilize bounds from the rate-distortion the… ▽ More

    Submitted 10 August, 2022; v1 submitted 10 February, 2021; originally announced February 2021.

    Comments: 25 pages, 4 figures

  7. arXiv:2101.11139  [pdf, other

    cs.IT

    A Strengthened Cutset Upper Bound on the Capacity of the Relay Channel and Applications

    Authors: Abbas El Gamal, Amin Gohari, Chandra Nair

    Abstract: We develop a new upper bound on the capacity of the relay channel that is tighter than previously known upper bounds. This upper bound is proved using traditional weak converse techniques involving mutual information inequalities and Gallager-type explicit identification of auxiliary random variables. We show that the new upper bound is strictly tighter than all previous bounds for the Gaussian re… ▽ More

    Submitted 31 March, 2022; v1 submitted 26 January, 2021; originally announced January 2021.

    Comments: To appear in the IEEE Transactions on Information Theory. 42 pages, 8 figures

  8. arXiv:2011.05931  [pdf, other

    cs.IT

    Transmission of a Bit over a Discrete Poisson Channel with Memory

    Authors: Niloufar Ahmadypour, Amin Gohari

    Abstract: A coding scheme for transmission of a bit maps a given bit to a sequence of channel inputs (called the codeword associated to the transmitted bit). In this paper, we study the problem of designing the best code for a discrete Poisson channel with memory (under peak-power and total-power constraints). The outputs of a discrete Poisson channel with memory are Poisson distributed random variables wit… ▽ More

    Submitted 14 April, 2021; v1 submitted 11 November, 2020; originally announced November 2020.

  9. arXiv:2009.14814  [pdf, ps, other

    cs.IT

    An Upper Bound on Secret Key Rates for General Multiterminal Wiretap Channels

    Authors: Amin Gohari, Gerhard Kramer

    Abstract: An upper bound is derived on the secret key rates of a general multiterminal wiretap channel. The bound unifies and generalizes some of the previously known bounds. Additionally, a multivariate dependence balance bound is introduced that is of independent interest.

    Submitted 6 February, 2023; v1 submitted 30 September, 2020; originally announced September 2020.

  10. arXiv:2009.02710  [pdf, other

    cs.DS cs.IT math.CO

    Multi-Way Number Partitioning: an Information-Theoretic View

    Authors: Niloufar Ahmadypour, Amin Gohari

    Abstract: The number partitioning problem is the problem of partitioning a given list of numbers into multiple subsets so that the sum of the numbers in each subset are as nearly equal as possible. We introduce two closely related notions of the "most informative" and "most compressible" partitions. Most informative partitions satisfy a principle of optimality property. We also give an exact algorithm (base… ▽ More

    Submitted 6 September, 2020; originally announced September 2020.

  11. arXiv:2005.14296  [pdf, other

    cs.IT

    An Analytical Model for Molecular Communication over a Non-linear Reaction-Diffusion Medium

    Authors: Hamidreza Abin, Amin Gohari, Masoumeh Nasiri-Kenari

    Abstract: One of the main challenges in diffusion-based molecular communication is dealing with the non-linearity of reaction-diffusion chemical equations. While numerical methods can be used to solve these equations, a change in the input signals or the parameters of the medium requires one to redo the simulations. This makes it difficult to design modulation schemes and practically impossible to prove the… ▽ More

    Submitted 2 June, 2021; v1 submitted 28 May, 2020; originally announced May 2020.

  12. arXiv:1902.03676  [pdf, ps, other

    cs.GT

    Playing Games with Bounded Entropy: Convergence Rate and Approximate Equilibria

    Authors: Mehrdad Valizadeh, Amin Gohari

    Abstract: We consider zero-sum repeated games in which the players are restricted to strategies that require only a limited amount of randomness. Let $v_n$ be the max-min value of the $n$ stage game; previous works have characterized $\lim_{n\rightarrow\infty}v_n$, i.e., the long-run max-min value. Our first contribution is to study the convergence rate of $v_n$ to its limit. To this end, we provide a new t… ▽ More

    Submitted 10 February, 2019; originally announced February 2019.

  13. arXiv:1805.08026  [pdf, ps, other

    cs.IT quant-ph

    A Correlation Measure Based on Vector-Valued $L_p$-Norms

    Authors: Mohammad Mahdi Mojahedian, Salman Beigi, Amin Gohari, Mohammad Hossein Yassaee, Mohammad Reza Aref

    Abstract: In this paper, we introduce a new measure of correlation for bipartite quantum states. This measure depends on a parameter $α$, and is defined in terms of vector-valued $L_p$-norms. The measure is within a constant of the exponential of $α$-Rényi mutual information, and reduces to the trace norm (total variation distance) for $α=1$. We will prove some decoupling type theorems in terms of this meas… ▽ More

    Submitted 21 May, 2018; originally announced May 2018.

    Comments: 41 pages

  14. arXiv:1802.08965  [pdf, ps, other

    cs.IT

    Diffusion Based Molecular Communication with Limited Molecule Production Rate

    Authors: Hamid G. Bafghi, Amin Gohari, Mahtab Mirmohseni, Masoumeh Nasiri-Kenari

    Abstract: This paper studies the impact of a transmitter's molecule generation process on the capacity of a concentration based Molecular Communication (MC) system. Constraints caused by the molecule generation process affect the availability of the molecules at the transmitter. The transmitter has a storage of molecules, and should decide whether to release or save the currently produced molecules. As a re… ▽ More

    Submitted 25 February, 2018; originally announced February 2018.

  15. Coding for Positive Rate in the Source Model Key Agreement Problem

    Authors: Amin Gohari, Onur Günlü, Gerhard Kramer

    Abstract: A two-party key agreement problem with public discussion, known as the source model problem, is considered. By relating key agreement to hypothesis testing, a new coding scheme is developed that yields a sufficient condition to achieve a positive secret-key (SK) rate in terms of Rényi divergence. The merits of this coding scheme are illustrated by applying it to an erasure model for Eve's side inf… ▽ More

    Submitted 22 July, 2020; v1 submitted 15 September, 2017; originally announced September 2017.

    Comments: To appear in the IEEE Transactions on Information Theory

  16. arXiv:1703.09537  [pdf, ps, other

    cs.IT

    How Compressible are Innovation Processes?

    Authors: Hamid Ghourchian, Arash Amini, Amin Gohari

    Abstract: The sparsity and compressibility of finite-dimensional signals are of great interest in fields such as compressed sensing. The notion of compressibility is also extended to infinite sequences of i.i.d. or ergodic random variables based on the observed error in their nonlinear k-term approximation. In this work, we use the entropy measure to study the compressibility of continuous-domain innovation… ▽ More

    Submitted 21 January, 2018; v1 submitted 28 March, 2017; originally announced March 2017.

    Comments: 58 pages

  17. Existence and Continuity of Differential Entropy for a Class of Distributions

    Authors: Hamid Ghourchian, Amin Gohari, Arash Amini

    Abstract: In this paper, we identify a class of absolutely continuous probability distributions, and show that the differential entropy is uniformly convergent over this space under the metric of total variation distance. One of the advantages of this class is that the requirements could be readily verified for a given distribution.

    Submitted 28 March, 2017; originally announced March 2017.

    Comments: 4 pages

    Journal ref: IEEE Communications Letters, 21 (7), 1469-1472 (2017)

  18. arXiv:1702.05719  [pdf, other

    cs.IT

    Playing Games with Bounded Entropy

    Authors: Mehrdad Valizadeh, Amin Gohari

    Abstract: In this paper, we consider zero-sum repeated games in which the maximizer is restricted to strategies requiring no more than a limited amount of randomness. Particularly, we analyze the maxmin payoff of the maximizer in two models: the first model forces the maximizer to randomize her action in each stage just by conditioning her decision to outcomes of a given sequence of random source, whereas,… ▽ More

    Submitted 10 October, 2018; v1 submitted 19 February, 2017; originally announced February 2017.

  19. arXiv:1702.03590  [pdf, other

    cs.IT

    On the Capacity of a Class of Signal-Dependent Noise Channels

    Authors: Hamid Ghourchian, Gholamali Aminian, Amin Gohari, Mahtab Mirmohseni, Masoumeh Nasiri-Kenari

    Abstract: In some applications, the variance of additive measurement noise depends on the signal that we aim to measure. For instance, additive Gaussian signal-dependent noise (AGSDN) channel models are used in molecular and optical communication. Herein we provide lower and upper bounds on the capacity of additive signal-dependent noise (ASDN) channels. The idea of the first lower bound is the extension of… ▽ More

    Submitted 2 June, 2017; v1 submitted 12 February, 2017; originally announced February 2017.

    Comments: 34 pages, 3 figures

  20. arXiv:1612.03360  [pdf, other

    cs.IT

    Information Theory of Molecular Communication: Directions and Challenges

    Authors: Amin Gohari, Mahtab Mirmohseni, Masoumeh Nasiri-Kenari

    Abstract: Molecular Communication (MC) is a communication strategy that uses molecules as carriers of information, and is widely used by biological cells. As an interdisciplinary topic, it has been studied by biologists, communication theorists and a growing number of information theorists. This paper aims to specifically bring MC to the attention of information theorists. To do this, we first highlight the… ▽ More

    Submitted 10 December, 2016; originally announced December 2016.

    Comments: Accepted for publication in the IEEE Transactions on Molecular, Biological, and Multi-Scale Communications as a Shannon Centennial Special Issue

  21. arXiv:1611.01335  [pdf, ps, other

    cs.IT

    Phi-Entropic Measures of Correlation

    Authors: Salman Beigi, Amin Gohari

    Abstract: A measure of correlation is said to have the tensorization property if it is unchanged when computed for i.i.d.\ copies. More precisely, a measure of correlation between two random variables $(X, Y)$ denoted by $ρ(X, Y)$, has the tensorization property if $ρ(X^n, Y^n)=ρ(X, Y)$ where $(X^n, Y^n)$ is $n$ i.i.d.\ copies of $(X, Y)$.Two well-known examples of such measures are the maximal correlation… ▽ More

    Submitted 4 November, 2016; originally announced November 2016.

  22. arXiv:1609.04586  [pdf, ps, other

    cs.IT

    On the Equivalency of Reliability and Security Metrics for Wireline Networks

    Authors: Mohammad Mahdi Mojahedian, Amin Gohari, Mohammad Reza Aref

    Abstract: In this paper, we show the equivalency of weak and strong secrecy conditions for a large class of secure network coding problems. When we restrict to linear operations, we show the equivalency of "perfect secrecy and zero-error constraints" with "weak secrecy and $ε$-error constraints".

    Submitted 15 September, 2016; originally announced September 2016.

    Comments: 21 pages, 2 figures

  23. arXiv:1604.05680  [pdf, ps, other

    cs.IT

    On Medium Chemical Reaction in Diffusion-Based Molecular Communication: a Two-Way Relaying Example

    Authors: Maryam Farahnak-Ghazani, Gholamali Aminian, Mahtab Mirmohseni, Amin Gohari, Masoumeh Nasiri-Kenari

    Abstract: Chemical reactions are a prominent feature of molecular communication (MC) systems, with no direct parallels in wireless communications. While chemical reactions may be used inside the transmitter nodes, receiver nodes or the communication medium, we focus on its utility in the medium in this paper. Such chemical reactions can be used to perform computation over the medium as molecules diffuse and… ▽ More

    Submitted 24 April, 2018; v1 submitted 19 April, 2016; originally announced April 2016.

    Comments: 32 pages, 6 figures

  24. arXiv:1603.01819  [pdf, other

    cs.IT cs.ET

    Type Based Sign Modulation and its Application for ISI mitigation in Molecular Communication

    Authors: Reza Mosayebi, Amin Gohari, Mahtab Mirmohseni, Masoumeh Nasiri Kenari

    Abstract: An important challenge in design of modulation schemes for molecular communication is positivity of the transmission signal (only a positive concentration of molecules can be released in the environment). This restriction makes handling of the InterSymbol Interference (ISI) a challenge for molecular communication. Previous works have proposed use of chemical reactions to remove molecules from the… ▽ More

    Submitted 14 December, 2016; v1 submitted 6 March, 2016; originally announced March 2016.

  25. On the Monotone Measure of Correlation

    Authors: Omid Etesami, Amin Gohari

    Abstract: Based on the notion of maximal correlation, Kimeldorf, May and Sampson (1980) introduce a measure of correlation between two random variables, called the "concordant monotone correlation" (CMC). We revisit, generalize and prove new properties of this measure of correlation. It is shown that CMC captures various types of correlation detected in measures of rank correlation like the Kendall tau corr… ▽ More

    Submitted 22 June, 2016; v1 submitted 13 November, 2015; originally announced November 2015.

    Journal ref: IEEE Communication Letters, 2015, Volume 20, Issue 1, Pages 17-20

  26. arXiv:1509.08571  [pdf, ps, other

    cs.GT cs.IT

    High Probability Guarantees in Repeated Games: Theory and Applications in Information Theory

    Authors: Payam Delgosha, Amin Gohari, Mohammad Akbarpour

    Abstract: We introduce a "high probability" framework for repeated games with incomplete information. In our non-equilibrium setting, players aim to guarantee a certain payoff with high probability, rather than in expected value. We provide a high probability counterpart of the classical result of Mertens and Zamir for the zero-sum repeated games. Any payoff that can be guaranteed with high probability can… ▽ More

    Submitted 28 September, 2015; originally announced September 2015.

  27. arXiv:1508.02495  [pdf, other

    cs.IT

    On ISI-free Modulations for Diffusion based Molecular Communication

    Authors: Hamidreza Arjmandi, Mohammad Movahednasab, Amin Gohari, Mahtab Mirmohseni, Masoumeh Nasiri Kenari, Faramarz Fekri

    Abstract: A diffusion molecular channel is a channel with memory, as molecules released into the medium hit the receptors after a random delay. Coding over the diffusion channel is performed by choosing the type, intensity, or the released time of molecules diffused in the environment over time. To avoid intersymbol interference (ISI), molecules of the same type should be released at time instances that are… ▽ More

    Submitted 11 August, 2015; originally announced August 2015.

  28. arXiv:1505.01110  [pdf, ps, other

    cs.IT

    Zero Error Coordination

    Authors: Mahed Abroshan, Amin Gohari, Sidharth Jaggi

    Abstract: In this paper, we consider a zero error coordination problem wherein the nodes of a network exchange messages to be able to perfectly coordinate their actions with the individual observations of each other. While previous works on coordination commonly assume an asymptotically vanishing error, we assume exact, zero error coordination. Furthermore, unlike previous works that employ the empirical or… ▽ More

    Submitted 5 May, 2015; originally announced May 2015.

  29. Perfectly Secure Index Coding

    Authors: Mohammad Mahdi Mojahedian, Mohammad Reza Aref, Amin Gohari

    Abstract: In this paper, we investigate the index coding problem in the presence of an eavesdropper. Messages are to be sent from one transmitter to a number of legitimate receivers who have side information about the messages, and share a set of secret keys with the transmitter. We assume perfect secrecy, meaning that the eavesdropper should not be able to retrieve any information about the message set. We… ▽ More

    Submitted 30 December, 2015; v1 submitted 17 April, 2015; originally announced April 2015.

    Comments: 25 pages, 5 figures, submitted to the IEEE Transactions on Information Theory

  30. arXiv:1502.00827  [pdf, other

    cs.IT

    On the Duality of Additivity and Tensorization

    Authors: Salman Beigi, Amin Gohari

    Abstract: A function is said to be additive if, similar to mutual information, expands by a factor of $n$, when evaluated on $n$ i.i.d. repetitions of a source or channel. On the other hand, a function is said to satisfy the tensorization property if it remains unchanged when evaluated on i.i.d. repetitions. Additive rate regions are of fundamental importance in network information theory, serving as capaci… ▽ More

    Submitted 4 November, 2016; v1 submitted 3 February, 2015; originally announced February 2015.

    Comments: 31 pages, 3 figures

  31. arXiv:1412.6641  [pdf, other

    cs.CC cs.IT

    Deterministic Randomness Extraction from Generalized and Distributed Santha-Vazirani Sources

    Authors: Salman Beigi, Omid Etesami, Amin Gohari

    Abstract: A Santha-Vazirani (SV) source is a sequence of random bits where the conditional distribution of each bit, given the previous bits, can be partially controlled by an adversary. Santha and Vazirani show that deterministic randomness extraction from these sources is impossible. In this paper, we study the generalization of SV sources for non-binary sequences. We show that unlike the binary case, det… ▽ More

    Submitted 20 December, 2014; originally announced December 2014.

  32. arXiv:1410.7918  [pdf, other

    cs.IT

    Adaptive Molecule Transmission Rate for Diffusion Based Molecular Communication

    Authors: Mohammad Movahednasab, Mehdi Soleimanifar, Amin Gohari, Masoumeh Nasiri Kenari, Urbashi Mitra

    Abstract: In this paper, a simple memory limited transmitter for molecular communication is proposed, in which information is encoded in the diffusion rate of the molecules. Taking advantage of memory, the proposed transmitter reduces the ISI problem by properly adjusting its diffusion rate. The error probability of the proposed scheme is derived and the result is compared with the lower bound on error prob… ▽ More

    Submitted 29 October, 2014; originally announced October 2014.

  33. arXiv:1410.3988  [pdf, other

    cs.IT

    Capacity of Diffusion based Molecular Communication Networks over LTI-Poisson Channels

    Authors: Hamidreza Arjmandi, Gholamali Aminian, Amin Gohari, Masoumeh Nasiri Kenari, Urbashi Mitra

    Abstract: In this paper, the capacity of a diffusion based molecular communication network under the model of a Linear Time Invarient-Poisson (LTI-Poisson) channel is studied. Introduced in the context of molecular communication, the LTI-Poisson model is a natural extension of the conventional memoryless Poisson channel to include memory. Exploiting prior art on linear ISI channels, a computable finite-lett… ▽ More

    Submitted 16 October, 2014; v1 submitted 15 October, 2014; originally announced October 2014.

  34. Monotone Measures for Non-Local Correlations

    Authors: Salman Beigi, Amin Gohari

    Abstract: Non-locality is the phenomenon of observing strong correlations among the outcomes of local measurements of a multipartite physical system. No-signaling boxes are the abstract objects for studying non-locality, and wirings are local operations on the space of no-signaling boxes. This means that, no matter how non-local the nature is, the set of physical non-local correlations must be closed under… ▽ More

    Submitted 11 January, 2017; v1 submitted 12 September, 2014; originally announced September 2014.

    Comments: 39 pages, 1 table, 3 figures, final version

    Journal ref: IEEE Transactions on Information Theory 61(9), 5185-5208 (2015)

  35. The Value of Help Bits in Randomized and Average-Case Complexity

    Authors: Salman Beigi, Omid Etesami, Amin Gohari

    Abstract: "Help bits" are some limited trusted information about an instance or instances of a computational problem that may reduce the computational complexity of solving that instance or instances. In this paper, we study the value of help bits in the settings of randomized and average-case complexity. Amir, Beigel, and Gasarch (1990) show that for constant $k$, if $k$ instances of a decision problem c… ▽ More

    Submitted 3 August, 2014; originally announced August 2014.

    Journal ref: Computational Complexity 2016, pp. 1-27

  36. arXiv:1405.0147  [pdf, other

    physics.bio-ph cs.IT

    Receivers for Diffusion-Based Molecular Communication: Exploiting Memory and Sampling Rate

    Authors: Reza Mosayebi, Hamidreza Arjmandi, Amin Gohari, Masoumeh Nasiri Kenari, Urbashi Mitra

    Abstract: In this paper, a diffusion-based molecular communication channel between two nano-machines is considered. The effect of the amount of memory on performance is characterized, and a simple memory-limited decoder is proposed and its performance is shown to be close to that of the best possible imaginable decoder (without any restriction on the computational complexity or its functional form), using G… ▽ More

    Submitted 2 May, 2014; v1 submitted 1 May, 2014; originally announced May 2014.

    Comments: Submitted to JSAC

  37. Quantum Achievability Proof via Collision Relative Entropy

    Authors: Salman Beigi, Amin Gohari

    Abstract: In this paper, we provide a simple framework for deriving one-shot achievable bounds for some problems in quantum information theory. Our framework is based on the joint convexity of the exponential of the collision relative entropy, and is a (partial) quantum generalization of the technique of Yassaee et al. (2013) from classical information theory. Based on this framework, we derive one-shot ach… ▽ More

    Submitted 11 January, 2017; v1 submitted 13 December, 2013; originally announced December 2013.

    Comments: 12 pages

    Journal ref: IEEE Transactions on Information Theory 60(12), 7980-7986 (2014)

  38. arXiv:1312.0132  [pdf, ps, other

    cs.IT cs.DM

    Critical Graphs in Index Coding

    Authors: Mehrdad Tahmasbi, Amirbehshad Shahrasbi, Amin Gohari

    Abstract: In this paper we define critical graphs as minimal graphs that support a given set of rates for the index coding problem, and study them for both the one-shot and asymptotic setups. For the case of equal rates, we find the critical graph with minimum number of edges for both one-shot and asymptotic cases. For the general case of possibly distinct rates, we show that for one-shot and asymptotic lin… ▽ More

    Submitted 12 April, 2014; v1 submitted 30 November, 2013; originally announced December 2013.

  39. arXiv:1305.5901  [pdf, other

    cs.IT

    Simulation of a Channel with Another Channel

    Authors: Farzin Haddadpour, Mohammad Hossein Yassaee, Salman Beigi, Amin Gohari, Mohammad Reza Aref

    Abstract: In this paper, we study the problem of simulating a DMC channel from another DMC channel under an average-case and an exact model. We present several achievability and infeasibility results, with tight characterizations in special cases. In particular for the exact model, we fully characterize when a BSC channel can be simulated from a BEC channel when there is no shared randomness. We also provid… ▽ More

    Submitted 1 December, 2016; v1 submitted 25 May, 2013; originally announced May 2013.

    Comments: 31 pages, 10 figures, and some parts of this work were published at ITW 2013

  40. arXiv:1304.6133  [pdf, other

    cs.IT

    On Maximal Correlation, Hypercontractivity, and the Data Processing Inequality studied by Erkip and Cover

    Authors: Venkat Anantharam, Amin Gohari, Sudeep Kamath, Chandra Nair

    Abstract: In this paper we provide a new geometric characterization of the Hirschfeld-Gebelein-Rényi maximal correlation of a pair of random $(X,Y)$, as well as of the chordal slope of the nontrivial boundary of the hypercontractivity ribbon of $(X,Y)$ at infinity. The new characterizations lead to simple proofs for some of the known facts about these quantities. We also provide a counterexample to a data p… ▽ More

    Submitted 22 April, 2013; originally announced April 2013.

    Comments: 11 pages

  41. arXiv:1303.0696  [pdf, ps, other

    cs.IT

    A Technique for Deriving One-Shot Achievability Results in Network Information Theory

    Authors: Mohammad Hossein Yassaee, Mohammad Reza Aref, Amin Gohari

    Abstract: This paper proposes a novel technique to prove a one-shot version of achievability results in network information theory. The technique is not based on covering and packing lemmas. In this technique, we use an stochastic encoder and decoder with a particular structure for coding that resembles both the ML and the joint-typicality coders. Although stochastic encoders and decoders do not usually enh… ▽ More

    Submitted 4 March, 2013; originally announced March 2013.

    Comments: A short version has been submitted to ISIT 2013

  42. arXiv:1303.0695  [pdf, ps, other

    cs.IT

    Non-Asymptotic Output Statistics of Random Binning and Its Applications

    Authors: Mohammad Hossein Yassaee, Mohammad Reza Aref, Amin Gohari

    Abstract: In this paper we develop a finite blocklength version of the Output Statistics of Random Binning (OSRB) framework. The framework is shown to be optimal in the point-to-point case. New second order regions for broadcast channel and wiretap channel with strong secrecy criterion are derived.

    Submitted 4 March, 2013; originally announced March 2013.

    Comments: A shot version has been submitted to ISIT 2013

  43. arXiv:1209.5511  [pdf, other

    cs.IT

    Diffusion Based Nanonetworking: A New Modulation Technique and Performance Analysis

    Authors: Hamidreza Arjmandi, Amin Gohari, Masoume Nasiri Kenari, Farshid Bateni

    Abstract: In this letter, we propose a new molecular modulation scheme for nanonetworks. To evaluate the scheme we introduce a more realistic system model for molecule dissemination and propagation processes based on the Poisson distribution. We derive the probability of error of our proposed scheme as well as the previously introduced schemes, including concentration and molecular shift keying modulations… ▽ More

    Submitted 25 September, 2012; originally announced September 2012.

  44. On Dimension Bounds for Auxiliary Quantum Systems

    Authors: Salman Beigi, Amin Gohari

    Abstract: Expressions of several capacity regions in quantum information theory involve an optimization over auxiliary quantum registers. Evaluating such expressions requires bounds on the dimension of the Hilbert space of these auxiliary registers, for which no non-trivial technique is known; we lack a quantum analog of the Carathéodory theorem. In this paper, we develop a new non-Carathéodory-type tool fo… ▽ More

    Submitted 15 November, 2013; v1 submitted 17 July, 2012; originally announced July 2012.

    Comments: 30 pages, title changed, structure significantly improved, results unchanged, to appear in IEEE TIT

    Journal ref: IEEE Transactions on Information Theory, vol 60, pp. 368-387, January 2014

  45. arXiv:1207.3513  [pdf, ps, other

    cs.IT

    Secure Channel Simulation

    Authors: Amin Gohari, Mohammad Hossein Yassaee, Mohammad Reza Aref

    Abstract: In this paper the Output Statistics of Random Binning (OSRB) framework is used to prove a new inner bound for the problem of secure channel simulation. Our results subsume some recent results on the secure function computation. We also provide an achievability result for the problem of simultaneously simulating a channel and creating a shared secret key. A special case of this result generalizes t… ▽ More

    Submitted 15 July, 2012; originally announced July 2012.

    Comments: Short version to appear at ITW 2012. This will be replaced by a longer version soon

  46. arXiv:1205.4144  [pdf, other

    cs.IT cs.GT

    Information Theoretic cutting of a cake

    Authors: Payam Delgosha, Amin Gohari

    Abstract: Cutting a cake is a metaphor for the problem of dividing a resource (cake) among several agents. The problem becomes non-trivial when the agents have different valuations for different parts of the cake (i.e. one agent may like chocolate while the other may like cream). A fair division of the cake is one that takes into account the individual valuations of agents and partitions the cake based on s… ▽ More

    Submitted 24 January, 2016; v1 submitted 18 May, 2012; originally announced May 2012.

    Comments: Submitted to IEEE Transactions on Information Theory

  47. arXiv:1203.3217  [pdf, ps, other

    cs.IT

    Channel simulation via interactive communications

    Authors: Mohammad Hossein Yassaee, Amin Gohari, Mohammad Reza Aref

    Abstract: In this paper, we study the problem of channel simulation via interactive communication, known as the coordination capacity, in a two-terminal network. We assume that two terminals observe i.i.d.\ copies of two random variables and would like to generate i.i.d.\ copies of two other random variables jointly distributed with the observed random variables. The terminals are provided with two-way comm… ▽ More

    Submitted 18 April, 2014; v1 submitted 14 March, 2012; originally announced March 2012.

    Comments: Submitted to IEEE Trans. on Information Theory

  48. arXiv:1203.0731  [pdf, ps, other

    cs.IT

    Coordination via a relay

    Authors: Farzin Haddadpour, Mohammad Hossein Yassaee, Amin Gohari, Mohammad Reza Aref

    Abstract: In this paper, we study the problem of coordinating two nodes which can only exchange information via a relay at limited rates. The nodes are allowed to do a two-round interactive two-way communication with the relay, after which they should be able to generate i.i.d. copies of two random variables with a given joint distribution within a vanishing total variation distance. We prove inner and oute… ▽ More

    Submitted 4 March, 2012; originally announced March 2012.

    Comments: Submitted to ISIT 2012

  49. arXiv:1203.0730  [pdf, other

    cs.IT

    Achievability proof via output statistics of random binning

    Authors: Mohammad Hossein Yassaee, Mohammad Reza Aref, Amin Gohari

    Abstract: This paper introduces a new and ubiquitous framework for establishing achievability results in \emph{network information theory} (NIT) problems. The framework uses random binning arguments and is based on a duality between channel and source coding problems. {Further,} the framework uses pmf approximation arguments instead of counting and typicality. This allows for proving coordination and \emph{… ▽ More

    Submitted 21 August, 2014; v1 submitted 4 March, 2012; originally announced March 2012.

    Comments: IEEE Transactions on Information Theory, accepted

  50. arXiv:1202.0898  [pdf, other

    cs.IT

    On Marton's inner bound for broadcast channels

    Authors: Amin Gohari, Chandra Nair, Venkat Anantharam

    Abstract: Marton's inner bound is the best known achievable region for a general discrete memoryless broadcast channel. To compute Marton's inner bound one has to solve an optimization problem over a set of joint distributions on the input and auxiliary random variables. The optimizers turn out to be structured in many cases. Finding properties of optimizers not only results in efficient evaluation of the r… ▽ More

    Submitted 4 February, 2012; originally announced February 2012.

    Comments: Submitted to ISIT 2012