Skip to main content

Showing 1–7 of 7 results for author: Ly, H

Searching in archive cs. Search in all archives.
.
  1. arXiv:2305.06042  [pdf, other

    cs.LG

    Blockwise Principal Component Analysis for monotone missing data imputation and dimensionality reduction

    Authors: Tu T. Do, Mai Anh Vu, Tuan L. Vo, Hoang Thien Ly, Thu Nguyen, Steven A. Hicks, Michael A. Riegler, Pål Halvorsen, Binh T. Nguyen

    Abstract: Monotone missing data is a common problem in data analysis. However, imputation combined with dimensionality reduction can be computationally expensive, especially with the increasing size of datasets. To address this issue, we propose a Blockwise principal component analysis Imputation (BPI) framework for dimensionality reduction and imputation of monotone missing data. The framework conducts Pri… ▽ More

    Submitted 10 January, 2024; v1 submitted 10 May, 2023; originally announced May 2023.

  2. arXiv:2205.15150  [pdf, ps, other

    cs.LG stat.ML

    Principal Component Analysis based frameworks for efficient missing data imputation algorithms

    Authors: Thu Nguyen, Hoang Thien Ly, Michael Alexander Riegler, Pål Halvorsen, Hugo L. Hammer

    Abstract: Missing data is a commonly occurring problem in practice. Many imputation methods have been developed to fill in the missing entries. However, not all of them can scale to high-dimensional data, especially the multiple imputation techniques. Meanwhile, the data nowadays tends toward high-dimensional. Therefore, in this work, we propose Principal Component Analysis Imputation (PCAI), a simple but v… ▽ More

    Submitted 19 March, 2023; v1 submitted 30 May, 2022; originally announced May 2022.

  3. arXiv:2202.05057  [pdf, other

    cs.SE

    A VM/Containerized Approach for Scaling TinyML Applications

    Authors: Meelis Lootus, Kartik Thakore, Sam Leroux, Geert Trooskens, Akshay Sharma, Holly Ly

    Abstract: Although deep neural networks are typically computationally expensive to use, technological advances in both the design of hardware platforms and of neural network architectures, have made it possible to use powerful models on edge devices. To enable widespread adoption of edge based machine learning, we introduce a set of open-source tools that make it easy to deploy, update and monitor machine l… ▽ More

    Submitted 10 February, 2022; originally announced February 2022.

    Comments: Presented at the tinyML 2021 Research Symposium

  4. arXiv:1909.12695  [pdf, other

    eess.SP cs.IT

    Joint Optimization of Execution Latency and Energy Consumption for Mobile Edge Computing with Data Compression and Task Allocation

    Authors: Minh Hoang Ly, Thinh Quang Dinh, Ha Hoang Kha

    Abstract: In this paper, we consider the mobile edge offloading scenario consisting of one mobile device (MD) with multiple independent tasks and various remote edge devices. In order to save energy, the user's device can offload the tasks to available access points for edge computing. Data compression is applied to reduce offloaded data size prior to wireless transmission to minimize the execution latency.… ▽ More

    Submitted 10 October, 2019; v1 submitted 27 September, 2019; originally announced September 2019.

    Comments: ISEE 2019

  5. Secure Symmetrical Multilevel Diversity Coding

    Authors: Anantharaman Balasubramanian, Hung D. Ly, Shuo Li, Tie Liu, Scott L. Miller

    Abstract: Symmetrical Multilevel Diversity Coding (SMDC) is a network compression problem introduced by Roche (1992) and Yeung (1995). In this setting, a simple separate coding strategy known as superposition coding was shown to be optimal in terms of achieving the minimum sum rate (Roche, Yeung, and Hau, 1997) and the entire admissible rate region (Yeung and Zhang, 1999) of the problem. This paper consider… ▽ More

    Submitted 9 January, 2012; originally announced January 2012.

    Comments: Submitted to the IEEE Transactions on Information Theory in May 2011. Minor revision made to the current version in January 2012

  6. arXiv:1102.1475  [pdf, ps, other

    cs.IT

    Security Embedding Codes

    Authors: Hung D. Ly, Tie Liu, Yufei Blankenship

    Abstract: This paper considers the problem of simultaneously communicating two messages, a high-security message and a low-security message, to a legitimate receiver, referred to as the security embedding problem. An information-theoretic formulation of the problem is presented. A coding scheme that combines rate splitting, superposition coding, nested binning and channel prefixing is considered and is show… ▽ More

    Submitted 7 February, 2011; originally announced February 2011.

    Comments: Submitted to the IEEE Transactions on Information Forensics and Security

  7. Multiple-Input Multiple-Output Gaussian Broadcast Channels with Common and Confidential Messages

    Authors: Hung D. Ly, Tie Liu, Yingbin Liang

    Abstract: This paper considers the problem of the multiple-input multiple-output (MIMO) Gaussian broadcast channel with two receivers (receivers 1 and 2) and two messages: a common message intended for both receivers and a confidential message intended only for receiver 1 but needing to be kept asymptotically perfectly secure from receiver 2. A matrix characterization of the secrecy capacity region is est… ▽ More

    Submitted 15 July, 2009; originally announced July 2009.

    Comments: Submitted to the IEEE Transactions on Information Theory, July 2009