Skip to main content

Showing 1–43 of 43 results for author: Grover, P

Searching in archive cs. Search in all archives.
.
  1. arXiv:2407.02450  [pdf, other

    q-bio.QM cs.IT q-bio.NC

    Message-Relevant Dimension Reduction of Neural Populations

    Authors: Amanda Merkley, Alice Y. Nam, Y. Kate Hong, Pulkit Grover

    Abstract: Quantifying relevant interactions between neural populations is a prominent question in the analysis of high-dimensional neural recordings. However, existing dimension reduction methods often discuss communication in the absence of a formal framework, while frameworks proposed to address this gap are impractical in data analysis. This work bridges the formal framework of M-Information Flow with pr… ▽ More

    Submitted 2 July, 2024; originally announced July 2024.

  2. arXiv:2309.13103  [pdf, other

    cs.LG cs.AI stat.ME

    OpportunityFinder: A Framework for Automated Causal Inference

    Authors: Huy Nguyen, Prince Grover, Devashish Khatwani

    Abstract: We introduce OpportunityFinder, a code-less framework for performing a variety of causal inference studies with panel data for non-expert users. In its current state, OpportunityFinder only requires users to provide raw observational data and a configuration file. A pipeline is then triggered that inspects/processes data, chooses the suitable algorithm(s) to execute the causal study. It returns th… ▽ More

    Submitted 22 September, 2023; originally announced September 2023.

    Comments: KDD 2023 Workshop - Causal Inference and Machine Learning in Practice

  3. arXiv:2305.07013  [pdf, ps, other

    cs.IT

    Computing Unique Information for Poisson and Multinomial Systems

    Authors: Chaitanya Goswami, Amanda Merkley, Pulkit Grover

    Abstract: Bivariate Partial Information Decomposition (PID) describes how the mutual information between a random variable M and two random variables Y and Z is decomposed into unique, redundant, and synergistic terms. Recently, PID has shown promise as an emerging tool to understand biological systems and biases in machine learning. However, computing PID is a challenging problem as it typically involves o… ▽ More

    Submitted 11 May, 2023; originally announced May 2023.

  4. Extracting Unique Information Through Markov Relations

    Authors: Keerthana Gurushankar, Praveen Venkatesh, Pulkit Grover

    Abstract: We propose two new measures for extracting the unique information in $X$ and not $Y$ about a message $M$, when $X, Y$ and $M$ are joint random variables with a given joint distribution. We take a Markov based approach, motivated by questions in fair machine learning, and inspired by similar Markov-based optimization problems that have been used in the Information Bottleneck and Common Information… ▽ More

    Submitted 26 October, 2022; originally announced October 2022.

    Journal ref: 2022 58th Annual Allerton Conference on Communication, Control, and Computing (Allerton)

  5. arXiv:2208.14417  [pdf, other

    cs.LG cs.CR stat.ML

    Fraud Dataset Benchmark and Applications

    Authors: Prince Grover, Julia Xu, Justin Tittelfitz, Anqi Cheng, Zheng Li, Jakub Zablocki, Jianbo Liu, Hao Zhou

    Abstract: Standardized datasets and benchmarks have spurred innovations in computer vision, natural language processing, multi-modal and tabular settings. We note that, as compared to other well researched fields, fraud detection has unique challenges: high-class imbalance, diverse feature types, frequently changing fraud patterns, and adversarial nature of the problem. Due to these, the modeling approaches… ▽ More

    Submitted 22 September, 2023; v1 submitted 30 August, 2022; originally announced August 2022.

  6. arXiv:2206.08454  [pdf, other

    cs.LG cs.AI cs.CY cs.IT stat.ML

    Quantifying Feature Contributions to Overall Disparity Using Information Theory

    Authors: Sanghamitra Dutta, Praveen Venkatesh, Pulkit Grover

    Abstract: When a machine-learning algorithm makes biased decisions, it can be helpful to understand the sources of disparity to explain why the bias exists. Towards this, we examine the problem of quantifying the contribution of each individual feature to the observed disparity. If we have access to the decision-making model, one potential approach (inspired from intervention-based approaches in explainabil… ▽ More

    Submitted 16 June, 2022; originally announced June 2022.

    Comments: Presented at the AAAI-22 Workshop on Information-Theoretic Methods for Causal Inference and Discovery in March 2022

  7. arXiv:2111.05299  [pdf, other

    cs.IT cs.AI cs.LG q-bio.NC stat.ML

    Can Information Flows Suggest Targets for Interventions in Neural Circuits?

    Authors: Praveen Venkatesh, Sanghamitra Dutta, Neil Mehta, Pulkit Grover

    Abstract: Motivated by neuroscientific and clinical applications, we empirically examine whether observational measures of information flow can suggest interventions. We do so by performing experiments on artificial neural networks in the context of fairness in machine learning, where the goal is to induce fairness in the system through interventions. Using our recently developed $M$-information flow framew… ▽ More

    Submitted 9 November, 2021; originally announced November 2021.

    Comments: Accepted to the Thirty-fifth Conference on Neural Information Processing Systems (NeurIPS 2021). (29 pages; 61 figures)

    Journal ref: Advances in Neural Information Processing Systems 34 (NeurIPS 2021)

  8. arXiv:2110.00889  [pdf, other

    cs.IT q-bio.NC

    A Minimal Intervention Definition of Reverse Engineering a Neural Circuit

    Authors: Keerthana Gurushankar, Pulkit Grover

    Abstract: In neuroscience, researchers have developed informal notions of what it means to reverse engineer a system, e.g., being able to model or simulate a system in some sense. A recent influential paper of Jonas and Kording, that examines a microprocessor using techniques from neuroscience, suggests that common techniques to understand neural systems are inadequate. Part of the difficulty, as a previous… ▽ More

    Submitted 2 October, 2021; originally announced October 2021.

    Comments: 25 pages; submitted to ITCS'22

  9. arXiv:2006.07986  [pdf, other

    cs.IT cs.CR cs.CY cs.LG stat.ML

    Fairness Under Feature Exemptions: Counterfactual and Observational Measures

    Authors: Sanghamitra Dutta, Praveen Venkatesh, Piotr Mardziel, Anupam Datta, Pulkit Grover

    Abstract: With the growing use of ML in highly consequential domains, quantifying disparity with respect to protected attributes, e.g., gender, race, etc., is important. While quantifying disparity is essential, sometimes the needs of an occupation may require the use of certain features that are critical in a way that any disparity that can be explained by them might need to be exempted. E.g., in hiring a… ▽ More

    Submitted 6 August, 2021; v1 submitted 14 June, 2020; originally announced June 2020.

    Comments: Accepted at the IEEE Transactions on Information Theory (Shorter version at AAAI 2020 as an oral presentation)

  10. arXiv:1903.01042  [pdf, other

    cs.IT cs.DC cs.LG cs.PF

    CodeNet: Training Large Scale Neural Networks in Presence of Soft-Errors

    Authors: Sanghamitra Dutta, Ziqian Bai, Tze Meng Low, Pulkit Grover

    Abstract: This work proposes the first strategy to make distributed training of neural networks resilient to computing errors, a problem that has remained unsolved despite being first posed in 1956 by von Neumann. He also speculated that the efficiency and reliability of the human brain is obtained by allowing for low power but error-prone components with redundancy for error-resilience. It is surprising th… ▽ More

    Submitted 3 March, 2019; originally announced March 2019.

    Comments: Currently under review

  11. Information Flow in Computational Systems

    Authors: Praveen Venkatesh, Sanghamitra Dutta, Pulkit Grover

    Abstract: We develop a theoretical framework for defining and identifying flows of information in computational systems. Here, a computational system is assumed to be a directed graph, with "clocked" nodes that send transmissions to each other along the edges of the graph at discrete points in time. We are interested in a definition that captures the dynamic flow of information about a specific message, and… ▽ More

    Submitted 2 March, 2020; v1 submitted 6 February, 2019; originally announced February 2019.

    Comments: Significantly revised version which was accepted for publication at the IEEE Transactions on Information Theory

    Report number: Volume: 66, Issue: 9, pages 5456 - 5491

    Journal ref: IEEE Transactions on Information Theory, September 2020

  12. arXiv:1812.06411  [pdf, other

    cs.IT

    Coded Elastic Computing

    Authors: Yaoqing Yang, Matteo Interlandi, Pulkit Grover, Soummya Kar, Saeed Amizadeh, Markus Weimer

    Abstract: Cloud providers have recently introduced new offerings whereby spare computing resources are accessible at discounts compared to on-demand computing. Exploiting such opportunity is challenging inasmuch as such resources are accessed with low-priority and therefore can elastically leave (through preemption) and join the computation at any time. In this paper, we design a new technique called coded… ▽ More

    Submitted 26 May, 2019; v1 submitted 16 December, 2018; originally announced December 2018.

    Comments: Some preliminary results of the paper have been presented at the Workshop on Systems for ML and Open Source Software at NeurIPS 2018 (without conference proceedings). An updated conference version will appear in ISIT 2019

  13. arXiv:1811.11811  [pdf, other

    cs.IT cs.DC

    An Application of Storage-Optimal MatDot Codes for Coded Matrix Multiplication: Fast k-Nearest Neighbors Estimation

    Authors: Utsav Sheth, Sanghamitra Dutta, Malhar Chaudhari, Haewon Jeong, Yaoqing Yang, Jukka Kohonen, Teemu Roos, Pulkit Grover

    Abstract: We propose a novel application of coded computing to the problem of the nearest neighbor estimation using MatDot Codes [Fahim. et.al. 2017], that are known to be optimal for matrix multiplication in terms of recovery threshold under storage constraints. In approximate nearest neighbor algorithms, it is common to construct efficient in-memory indexes to improve query response time. One such strateg… ▽ More

    Submitted 28 November, 2018; originally announced November 2018.

    Comments: Accepted for publication at the IEEE Big Data 2018

  14. A Unified Coded Deep Neural Network Training Strategy Based on Generalized PolyDot Codes for Matrix Multiplication

    Authors: Sanghamitra Dutta, Ziqian Bai, Haewon Jeong, Tze Meng Low, Pulkit Grover

    Abstract: This paper has two contributions. First, we propose a novel coded matrix multiplication technique called Generalized PolyDot codes that advances on existing methods for coded matrix multiplication under storage and communication constraints. This technique uses "garbage alignment," i.e., aligning computations in coded computing that are not a part of the desired output. Generalized PolyDot codes b… ▽ More

    Submitted 26 November, 2018; originally announced November 2018.

    Comments: Presented in part at the IEEE International Symposium on Information Theory 2018 (Submission Date: Jan 12 2018); Currently under review at the IEEE Transactions on Information Theory

  15. arXiv:1806.06931  [pdf, other

    cs.LG cs.AI stat.ML

    Reinforcement Learning with Function-Valued Action Spaces for Partial Differential Equation Control

    Authors: Yangchen Pan, Amir-massoud Farahmand, Martha White, Saleh Nabi, Piyush Grover, Daniel Nikovski

    Abstract: Recent work has shown that reinforcement learning (RL) is a promising approach to control dynamical systems described by partial differential equations (PDE). This paper shows how to use RL to tackle more general PDE control problems that have continuous high-dimensional action spaces with spatial relationship among action dimensions. In particular, we propose the concept of action descriptors, wh… ▽ More

    Submitted 12 June, 2018; originally announced June 2018.

    Comments: ICML2018

  16. arXiv:1806.06140  [pdf, other

    cs.IT

    Straggler-Resilient and Communication-Efficient Distributed Iterative Linear Solver

    Authors: Farzin Haddadpour, Yaoqing Yang, Malhar Chaudhari, Viveck R Cadambe, Pulkit Grover

    Abstract: We propose a novel distributed iterative linear inverse solver method. Our method, PolyLin, has significantly lower communication cost, both in terms of number of rounds as well as number of bits, in comparison with the state of the art at the cost of higher computational complexity and storage. Our algorithm also has a built-in resilience to straggling and faulty computation nodes. We develop a n… ▽ More

    Submitted 15 June, 2018; originally announced June 2018.

    Comments: 15 pages, 3 figures and 2 tables

  17. arXiv:1805.09891  [pdf, other

    cs.IT cs.DC

    Coded FFT and Its Communication Overhead

    Authors: Haewon Jeong, Tze Meng Low, Pulkit Grover

    Abstract: We propose a coded computing strategy and examine communication costs of coded computing algorithms to make distributed Fast Fourier Transform (FFT) resilient to errors during the computation. We apply maximum distance separable (MDS) codes to a widely used "Transpose" algorithm for parallel FFT. In the uncoded distributed FFT algorithm, the most expensive step is a single "all-to-all" communicati… ▽ More

    Submitted 24 May, 2018; originally announced May 2018.

  18. arXiv:1805.06046  [pdf, other

    cs.IT

    Coded Iterative Computing using Substitute Decoding

    Authors: Yaoqing Yang, Malhar Chaudhari, Pulkit Grover, Soummya Kar

    Abstract: In this paper, we propose a new coded computing technique called "substitute decoding" for general iterative distributed computation tasks. In the first part of the paper, we use PageRank as a simple example to show that substitute decoding can make the computation of power iterations solving PageRank on sparse matrices robust to erasures in distributed systems. For these sparse matrices, codes wi… ▽ More

    Submitted 15 May, 2018; originally announced May 2018.

    Comments: Some parts of this paper will be presented at the 2018 IEEE International Symposium on Information Theory (ISIT)

  19. arXiv:1801.10292  [pdf, other

    cs.IT cs.DC

    On the Optimal Recovery Threshold of Coded Matrix Multiplication

    Authors: Sanghamitra Dutta, Mohammad Fahim, Farzin Haddadpour, Haewon Jeong, Viveck Cadambe, Pulkit Grover

    Abstract: We provide novel coded computation strategies for distributed matrix-matrix products that outperform the recent "Polynomial code" constructions in recovery threshold, i.e., the required number of successful workers. When $m$-th fraction of each matrix can be stored in each worker node, Polynomial codes require $m^2$ successful workers, while our MatDot codes only require $2m-1$ successful workers,… ▽ More

    Submitted 16 May, 2018; v1 submitted 30 January, 2018; originally announced January 2018.

    Comments: Extended version of the paper that appeared at Allerton 2017 (October 2017), including full proofs and further results. Submitted to IEEE Transactions on Information Theory

  20. arXiv:1706.00163  [pdf, other

    cs.IT

    Coding Method for Parallel Iterative Linear Solver

    Authors: Yaoqing Yang, Pulkit Grover, Soummya Kar

    Abstract: Computationally intensive distributed and parallel computing is often bottlenecked by a small set of slow workers known as stragglers. In this paper, we utilize the emerging idea of "coded computation" to design a novel error-correcting-code inspired technique for solving linear inverse problems under specific iterative methods in a parallelized implementation affected by stragglers. Example appli… ▽ More

    Submitted 5 June, 2017; v1 submitted 1 June, 2017; originally announced June 2017.

    Comments: submitted

  21. arXiv:1705.03875  [pdf, other

    cs.IT

    Coded convolution for parallel and distributed computing within a deadline

    Authors: Sanghamitra Dutta, Viveck Cadambe, Pulkit Grover

    Abstract: We consider the problem of computing the convolution of two long vectors using parallel processing units in the presence of "stragglers". Stragglers refer to the small fraction of faulty or slow processors that delays the entire computation in time-critical distributed systems. We first show that splitting the vectors into smaller pieces and using a linear code to encode these pieces provides bett… ▽ More

    Submitted 10 May, 2017; originally announced May 2017.

    Comments: To appear in ISIT 2017

  22. arXiv:1704.05181  [pdf, other

    cs.IT

    "Short-Dot": Computing Large Linear Transforms Distributedly Using Coded Short Dot Products

    Authors: Sanghamitra Dutta, Viveck Cadambe, Pulkit Grover

    Abstract: Faced with saturation of Moore's law and increasing dimension of data, system designers have increasingly resorted to parallel and distributed computing. However, distributed computing is often bottle necked by a small fraction of slow processors called "stragglers" that reduce the speed of computation because the fusion node has to wait for all processors to finish. To combat the effect of stragg… ▽ More

    Submitted 17 April, 2017; originally announced April 2017.

    Comments: Presented at NIPS 2016, Barcelona, Spain

  23. arXiv:1602.04260  [pdf, other

    cs.IT

    Adaptivity provably helps: information-theoretic limits on $l_0$ cost of non-adaptive sensing

    Authors: Sanghamitra Dutta, Pulkit Grover

    Abstract: The advantages of adaptivity and feedback are of immense interest in signal processing and communication with many positive and negative results. Although it is established that adaptivity does not offer substantial reductions in minimax mean square error for a fixed number of measurements, existing results have shown several advantages of adaptivity in complexity of reconstruction, accuracy of su… ▽ More

    Submitted 22 June, 2016; v1 submitted 12 February, 2016; originally announced February 2016.

    Comments: 8 pages, 2 figures, Accepted at ISIT 2016

  24. arXiv:1601.06224  [pdf, other

    cs.IT

    Rate Distortion for Lossy In-network Function Computation: Information Dissipation and Sequential Reverse Water-Filling

    Authors: Yaoqing Yang, Pulkit Grover, Soummya Kar

    Abstract: We consider the problem of distributed lossy linear function computation in a tree network. We examine two cases: (i) data aggregation (only one sink node computes) and (ii) consensus (all nodes compute the same function). By quantifying the accumulation of information loss in distributed computing, we obtain fundamental limits on network computation rate as a function of incremental distortions (… ▽ More

    Submitted 12 January, 2017; v1 submitted 22 January, 2016; originally announced January 2016.

    Comments: This paper will be submitted to the IEEE Transactions on Information Theory

  25. arXiv:1601.06095  [pdf, ps, other

    cs.IT

    Energy Efficient Distributed Coding for Data Collection in a Noisy Sparse Network

    Authors: Yaoqing Yang, Soummya Kar, Pulkit Grover

    Abstract: We consider the problem of data collection in a two-layer network consisting of (1) links between $N$ distributed agents and a remote sink node; (2) a sparse network formed by these distributed agents. We study the effect of inter-agent communications on the overall energy consumption. Despite the sparse connections between agents, we provide an in-network coding scheme that reduces the overall en… ▽ More

    Submitted 22 January, 2016; originally announced January 2016.

    Comments: arXiv admin note: substantial text overlap with arXiv:1508.01553

  26. Model-free control framework for multi-limb soft robots

    Authors: Vishesh Vikas, Piyush Grover, Barry Trimmer

    Abstract: The deformable and continuum nature of soft robots promises versatility and adaptability. However, control of modular, multi-limbed soft robots for terrestrial locomotion is challenging due to the complex robot structure, actuator mechanics and robot-environment interaction. Traditionally, soft robot control is performed by modeling kinematics using exact geometric equations and finite element ana… ▽ More

    Submitted 19 September, 2015; originally announced September 2015.

    Comments: IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS) 2015

  27. Energy Harvesting Transmitters that Heat Up: Throughput Maximization under Temperature Constraints

    Authors: Omur Ozel, Sennur Ulukus, Pulkit Grover

    Abstract: Motivated by damage due to heating in sensor operation, we consider the throughput optimal offline data scheduling problem in an energy harvesting transmitter such that the resulting temperature increase remains below a critical level. We model the temperature dynamics of the transmitter as a linear system and determine the optimal transmit power policy under such temperature constraints as well a… ▽ More

    Submitted 2 September, 2015; originally announced September 2015.

    Comments: Submitted to IEEE Transactions on Wireless Communications, August 2015

  28. arXiv:1508.01553  [pdf, ps, other

    cs.IT

    Graph Codes for Distributed Instant Message Collection in an Arbitrary Noisy Broadcast Network

    Authors: Yaoqing Yang, Soummya Kar, Pulkit Grover

    Abstract: We consider the problem of minimizing the number of broadcasts for collecting all sensor measurements at a sink node in a noisy broadcast sensor network. Focusing first on arbitrary network topologies, we provide (i) fundamental limits on the required number of broadcasts of data gathering, and (ii) a general in-network computing strategy to achieve an upper bound within factor $\log N$ of the fun… ▽ More

    Submitted 30 January, 2017; v1 submitted 6 August, 2015; originally announced August 2015.

    Comments: 60 pages. Submitted for publication

  29. arXiv:1506.07234  [pdf, other

    cs.IT cs.CC

    Computing Linear Transformations with Unreliable Components

    Authors: Yaoqing Yang, Pulkit Grover, Soummya Kar

    Abstract: We consider the problem of computing a binary linear transformation using unreliable components when all circuit components are unreliable. Two noise models of unreliable components are considered: probabilistic errors and permanent errors. We introduce the "ENCODED" technique that ensures that the error probability of the computation of the linear transformation is kept bounded below a small cons… ▽ More

    Submitted 13 May, 2017; v1 submitted 24 June, 2015; originally announced June 2015.

    Comments: Accepted by Transactions on Information Theory for future publication

  30. On the Total-Power Capacity of Regular-LDPC Codes with Iterative Message-Passing Decoders

    Authors: Karthik Ganesan, Pulkit Grover, Jan Rabaey, Andrea Goldsmith

    Abstract: Motivated by recently derived fundamental limits on total (transmit + decoding) power for coded communication with VLSI decoders, this paper investigates the scaling behavior of the minimum total power needed to communicate over AWGN channels as the target bit-error-probability tends to zero. We focus on regular-LDPC codes and iterative message-passing decoders. We analyze scaling behavior under t… ▽ More

    Submitted 18 November, 2015; v1 submitted 4 April, 2015; originally announced April 2015.

    Comments: 21 pages, 6 figures. To appear in JSAC Recent Advances In Capacity Approaching Codes

  31. Energy Harvesting Wireless Communications: A Review of Recent Advances

    Authors: Sennur Ulukus, Aylin Yener, Elza Erkip, Osvaldo Simeone, Michele Zorzi, Pulkit Grover, Kaibin Huang

    Abstract: This article summarizes recent contributions in the broad area of energy harvesting wireless communications. In particular, we provide the current state of the art for wireless networks composed of energy harvesting nodes, starting from the information-theoretic performance limits to transmission scheduling policies and resource allocation, medium access and networking issues. The emerging related… ▽ More

    Submitted 24 January, 2015; originally announced January 2015.

    Comments: To appear in the IEEE Journal of Selected Areas in Communications (Special Issue: Wireless Communications Powered by Energy Harvesting and Wireless Energy Transfer)

  32. arXiv:1411.4253  [pdf, other

    cs.IT

    Energy-efficient Decoders for Compressive Sensing: Fundamental Limits and Implementations

    Authors: Tongxin Li, Mayank Bakshi, Pulkit Grover

    Abstract: The fundamental problem considered in this paper is "What is the \textit{energy} consumed for the implementation of a \emph{compressive sensing} decoding algorithm on a circuit?". Using the "information-friction" framework, we examine the smallest amount of \textit{bit-meters} as a measure for the energy consumed by a circuit. We derive a fundamental lower bound for the implementation of compressi… ▽ More

    Submitted 16 February, 2015; v1 submitted 16 November, 2014; originally announced November 2014.

    Comments: Submitted to ISIT2015; 23 pages, 12 figures

  33. arXiv:1401.1059  [pdf, other

    cs.IT cs.CC math-ph

    "Information-Friction" and its implications on minimum energy required for communication

    Authors: Pulkit Grover

    Abstract: Just as there are frictional losses associated with moving masses on a surface, what if there were frictional losses associated with moving information on a substrate? Indeed, many modes of communication suffer from such frictional losses. We propose to model these losses as proportional to "bit-meters," i.e., the product of mass of information (i.e., the number of bits) and the distance of inform… ▽ More

    Submitted 1 September, 2014; v1 submitted 6 January, 2014; originally announced January 2014.

    Comments: Accepted in IEEE Trans. Information Theory; preliminary version presented at ISIT '13

  34. Information embedding and the triple role of control

    Authors: Pulkit Grover, Aaron B. Wagner, Anant Sahai

    Abstract: We consider the problem of information embedding where the encoder modifies a white Gaussian host signal in a power-constrained manner to encode a message, and the decoder recovers both the embedded message and the modified host signal. This partially extends the recent work of Sumszyk and Steinberg to the continuous-alphabet Gaussian setting. Through a control-theoretic lens, we observe that the… ▽ More

    Submitted 20 June, 2013; originally announced June 2013.

    Comments: Revised version submitted to IEEE Trans. Info Theory

  35. arXiv:1010.4855  [pdf, other

    cs.IT cs.CC

    Towards a communication-theoretic understanding of system-level power consumption

    Authors: Pulkit Grover, Kristen Ann Woyach, Anant Sahai

    Abstract: Traditional communication theory focuses on minimizing transmit power. However, communication links are increasingly operating at shorter ranges where transmit power can be significantly smaller than the power consumed in decoding. This paper models the required decoding power and investigates the minimization of total system power from two complementary perspectives. First, an isolated point-to… ▽ More

    Submitted 16 February, 2011; v1 submitted 23 October, 2010; originally announced October 2010.

    Comments: 24 pages, 13 figures, revision of our submission to JSAC Special issue on energy-efficient wireless communications

  36. arXiv:1010.4854  [pdf, other

    cs.IT eess.SY math.OC

    Implicit and explicit communication in decentralized control

    Authors: Pulkit Grover, Anant Sahai

    Abstract: There has been substantial progress recently in understanding toy problems of purely implicit signaling. These are problems where the source and the channel are implicit -- the message is generated endogenously by the system, and the plant itself is used as a channel. In this paper, we explore how implicit and explicit communication can be used synergistically to reduce control costs. The setting… ▽ More

    Submitted 23 October, 2010; originally announced October 2010.

    Comments: Presented at Allerton'10

  37. arXiv:1009.2528  [pdf, other

    cs.IT eess.SY

    Is Witsenhausen's counterexample a relevant toy?

    Authors: Pulkit Grover, Anant Sahai

    Abstract: This paper answers a question raised by Doyle on the relevance of the Witsenhausen counterexample as a toy decentralized control problem. The question has two sides, the first of which focuses on the lack of an external channel in the counterexample. Using existing results, we argue that the core difficulty in the counterexample is retained even in the presence of such a channel. The second side q… ▽ More

    Submitted 13 September, 2010; originally announced September 2010.

    Comments: preprint for paper that will appear in proceedings of 49th IEEE Conference on Decision and Control (CDC) 2010, Atlanta, Georgia

  38. Information embedding meets distributed control

    Authors: Pulkit Grover, Aaron B. Wagner, Anant Sahai

    Abstract: We consider the problem of information embedding where the encoder modifies a white Gaussian host signal in a power-constrained manner to encode the message, and the decoder recovers both the embedded message and the modified host signal. This extends the recent work of Sumszyk and Steinberg to the continuous-alphabet Gaussian setting. We show that a dirty-paper-coding based strategy achieves th… ▽ More

    Submitted 2 March, 2010; originally announced March 2010.

    Comments: 19 pages, 7 figures. Presented at ITW'10. Submitted to IEEE Transactions on Information Theory

  39. arXiv:1003.0514  [pdf, other

    cs.IT cs.CC math.OC

    The finite-dimensional Witsenhausen counterexample

    Authors: Pulkit Grover, Se Yong Park, Anant Sahai

    Abstract: Recently, a vector version of Witsenhausen's counterexample was considered and it was shown that in that limit of infinite vector length, certain quantization-based control strategies are provably within a constant factor of the optimal cost for all possible problem parameters. In this paper, finite vector lengths are considered with the dimension being viewed as an additional problem parameter.… ▽ More

    Submitted 2 March, 2010; originally announced March 2010.

    Comments: 32 pages, 7 figures, 1 table. Presented at ConCom 2009, Seoul, Korea. Submitted to IEEE Transactions on Automatic Control

  40. arXiv:0805.2423  [pdf, ps, other

    cs.IT

    Green Codes: Energy-Efficient Short-Range Communication

    Authors: Pulkit Grover, Anant Sahai

    Abstract: A green code attempts to minimize the total energy per-bit required to communicate across a noisy channel. The classical information-theoretic approach neglects the energy expended in processing the data at the encoder and the decoder and only minimizes the energy required for transmissions. Since there is no cost associated with using more degrees of freedom, the traditionally optimal strategy… ▽ More

    Submitted 15 May, 2008; originally announced May 2008.

    Comments: Accepted at International Symposium on Information Theory (ISIT) 2008

  41. arXiv:0801.0352  [pdf, ps, other

    cs.IT

    The price of certainty: "waterslide curves" and the gap to capacity

    Authors: Anant Sahai, Pulkit Grover

    Abstract: The classical problem of reliable point-to-point digital communication is to achieve a low probability of error while kee** the rate high and the total power consumption small. Traditional information-theoretic analysis uses `waterfall' curves to convey the revolutionary idea that unboundedly low probabilities of bit-error are attainable using only finite transmit power. However, practitioners… ▽ More

    Submitted 2 January, 2008; originally announced January 2008.

    Comments: 37 pages, 13 figures. Submitted to IEEE Transactions on Information Theory. This version corrects a subtle bug in the proofs of the original submission and improves the bounds significantly

    Report number: UCB/EECS-2008-1

  42. arXiv:cs/0702073  [pdf, ps, other

    cs.IT cs.CC

    Tradeoff between decoding complexity and rate for codes on graphs

    Authors: Pulkit Grover

    Abstract: We consider transmission over a general memoryless channel, with bounded decoding complexity per bit under message passing decoding. We show that the achievable rate is bounded below capacity if there is a finite success in the decoding in a specified number of operations per bit at the decoder for some codes on graphs. These codes include LDPC and LDGM codes. Good performance with low decoding… ▽ More

    Submitted 12 February, 2007; originally announced February 2007.

  43. arXiv:cs/0702071  [pdf, ps, other

    cs.IT

    What is needed to exploit knowledge of primary transmissions?

    Authors: Pulkit Grover, Anant Sahai

    Abstract: Recently, Tarokh and others have raised the possibility that a cognitive radio might know the interference signal being transmitted by a strong primary user in a non-causal way, and use this knowledge to increase its data rates. However, there is a subtle difference between knowing the signal transmitted by the primary and the actual interference at our receiver since there is a wireless channel… ▽ More

    Submitted 12 February, 2007; originally announced February 2007.

    Comments: Combination of two papers submitted to ISIT'07 and DySPAN '07