Skip to main content

Showing 1–33 of 33 results for author: Mohajer, S

Searching in archive cs. Search in all archives.
.
  1. arXiv:2403.12419  [pdf, ps, other

    cs.IT

    Sparsity-Constrained Community-Based Group Testing

    Authors: Sarthak Jain, Martina Cardone, Soheil Mohajer

    Abstract: In this work, we consider the sparsity-constrained community-based group testing problem, where the population follows a community structure. In particular, the community consists of $F$ families, each with $M$ members. A number $k_f$ out of the $F$ families are infected, and a family is said to be infected if $k_m$ out of its $M$ members are infected. Furthermore, the sparsity constraint allows a… ▽ More

    Submitted 19 March, 2024; originally announced March 2024.

  2. arXiv:2402.00465  [pdf, ps, other

    cs.IT

    Coded Multi-User Information Retrieval with a Multi-Antenna Helper Node

    Authors: Milad Abolpour, MohammadJavad Salehi, Soheil Mohajer, Seyed Pooya Shariatpanahi, Antti Tölli

    Abstract: A novel coding design is proposed to enhance information retrieval in a wireless network of users with partial access to the data, in the sense of observation, measurement, computation, or storage. Information exchange in the network is assisted by a multi-antenna base station (BS), with no direct access to the data. Accordingly, the missing parts of data are exchanged among users through an uplin… ▽ More

    Submitted 1 February, 2024; originally announced February 2024.

    Comments: 10 pages

  3. arXiv:2401.17419  [pdf, other

    cs.IT

    Few-Shot Channel-Agnostic Analog Coding: A Near-Optimal Scheme

    Authors: Mohammad Ali Maddah-Ali, Soheil Mohajer

    Abstract: In this paper, we investigate the problem of transmitting an analog source to a destination over $N$ uses of an additive-white-Gaussian-noise (AWGN) channel, where $N$ is very small (in the order of 10 or even less). The proposed coding scheme is based on representing the source symbol using a novel progressive expansion technique, partitioning the digits of expansion into $N$ ordered sets, and fi… ▽ More

    Submitted 30 January, 2024; originally announced January 2024.

  4. arXiv:2305.06526  [pdf, ps, other

    cs.IT cs.DC

    Probabilistic Group Testing in Distributed Computing with Attacked Workers

    Authors: Sarthak Jain, Martina Cardone, Soheil Mohajer

    Abstract: The problem of distributed matrix-vector product is considered, where the server distributes the task of the computation among $n$ worker nodes, out of which $L$ are compromised (but non-colluding) and may return incorrect results. Specifically, it is assumed that the compromised workers are unreliable, that is, at any given time, each compromised worker may return an incorrect and correct result… ▽ More

    Submitted 10 May, 2023; originally announced May 2023.

  5. arXiv:2301.04753  [pdf, other

    cs.IT

    Cache-Aided $K$-User Broadcast Channels with State Information at Receivers

    Authors: Hadi Reisizadeh, Mohammad Ali Maddah-Ali, Soheil Mohajer

    Abstract: We study a $K$-user coded-caching broadcast problem in a joint source-channel coding framework. The transmitter observes a database of files that are being generated at a certain rate per channel use, and each user has a cache, which can store a fixed fraction of the generated symbols. In the delivery phase, the transmitter broadcasts a message so that the users can decode their desired files usin… ▽ More

    Submitted 11 October, 2023; v1 submitted 11 January, 2023; originally announced January 2023.

  6. arXiv:2201.01728  [pdf, other

    stat.ML cs.IT cs.LG

    Matrix Completion with Hierarchical Graph Side Information

    Authors: Adel Elmahdy, Junhyung Ahn, Changho Suh, Soheil Mohajer

    Abstract: We consider a matrix completion problem that exploits social or item similarity graphs as side information. We develop a universal, parameter-free, and computationally efficient algorithm that starts with hierarchical graph clustering and then iteratively refines estimates both on graph clustering and matrix ratings. Under a hierarchical stochastic block model that well respects practically-releva… ▽ More

    Submitted 1 January, 2022; originally announced January 2022.

    Comments: 53 pages, 3 figures, 1 table. Published in NeurIPS 2020. The first two authors contributed equally to this work. In this revision, achievability proof technique is updated and typos are corrected. arXiv admin note: substantial text overlap with arXiv:2109.05408

    Journal ref: Advances in Neural Information Processing Systems 33 (NeurIPS 2020)

  7. arXiv:2201.00313  [pdf, other

    cs.IT cs.CR cs.DC cs.NI

    Secure Determinant Codes for Distributed Storage Systems

    Authors: Adel Elmahdy, Michelle Kleckler, Soheil Mohajer

    Abstract: The information-theoretic secure exact-repair regenerating codes for distributed storage systems (DSSs) with parameters $(n,k=d,d,\ell)$ are studied in this paper. We consider distributed storage systems with $n$ nodes, in which the original data can be recovered from any subset of $k=d$ nodes, and the content of any node can be retrieved from those of any $d$ helper nodes. Moreover, we consider t… ▽ More

    Submitted 29 December, 2022; v1 submitted 2 January, 2022; originally announced January 2022.

    Comments: 22 pages, 8 figures. The first two authors contributed equally to this work. Accepted for publication at IEEE Transactions on Information Theory

  8. arXiv:2109.05408  [pdf, other

    cs.IT cs.LG stat.ML

    On the Fundamental Limits of Matrix Completion: Leveraging Hierarchical Similarity Graphs

    Authors: Junhyung Ahn, Adel Elmahdy, Soheil Mohajer, Changho Suh

    Abstract: We study the matrix completion problem that leverages hierarchical similarity graphs as side information in the context of recommender systems. Under a hierarchical stochastic block model that well respects practically-relevant social graphs and a low-rank rating matrix model, we characterize the exact information-theoretic limit on the number of observed matrix entries (i.e., optimal sample compl… ▽ More

    Submitted 11 September, 2021; originally announced September 2021.

    Comments: The first two authors contributed equally to this work. A preliminary version of this work was presented at the 2020 Advances in Neural Information Processing Systems Conference (NeurIPS 2020)

  9. arXiv:2105.03064  [pdf, other

    cs.IT

    When an Energy-Efficient Scheduling is Optimal for Half-Duplex Relay Networks?

    Authors: Sarthak Jain, Martina Cardone, Soheil Mohajer

    Abstract: This paper considers a diamond network with $n$ interconnected relays, namely a network where a source communicates with a destination by hop** information through $n$ communicating/interconnected relays. Specifically, the main focus of the paper is on characterizing sufficient conditions under which the $n+1$ states (out of the $2^{n}$ possible ones) in which at most one relay is transmitting s… ▽ More

    Submitted 12 August, 2021; v1 submitted 7 May, 2021; originally announced May 2021.

  10. arXiv:2001.02851  [pdf, other

    cs.IT

    Best Relay Selection in Gaussian Half-Duplex Diamond Networks

    Authors: Sarthak Jain, Soheil Mohajer, Martina Cardone

    Abstract: This paper considers Gaussian half-duplex diamond $n$-relay networks, where a source communicates with a destination by hop** information through one layer of $n$ non-communicating relays that operate in half-duplex. The main focus consists of investigating the following question: What is the contribution of a single relay on the approximate capacity of the entire network? In particular, approxi… ▽ More

    Submitted 9 January, 2020; originally announced January 2020.

    Comments: 30 pages, 5 figures, journal

  11. Cascade Codes For Distributed Storage Systems

    Authors: Mehran Elyasi, Soheil Mohajer

    Abstract: A novel coding scheme for exact repair-regenerating codes is presented in this paper. The codes proposed in this work can trade between the repair bandwidth of nodes (number of downloaded symbols from each surviving node in a repair process) and the required storage overhead of the system. These codes work for general system parameters $(n,k,d)$, which are the total number of nodes, the number of… ▽ More

    Submitted 19 October, 2020; v1 submitted 3 January, 2019; originally announced January 2019.

  12. Determinant Codes with Helper-Independent Repair for Single and Multiple Failures

    Authors: Mehran Elyasi, Soheil Mohajer

    Abstract: Determinant codes are a class of exact-repair regenerating codes for distributed storage systems with parameters (n, k = d, d). These codes cover the entire trade-off between per-node storage and repair-bandwidth. In an earlier work of the authors, the repair data of the determinant code sent by a helper node to repair a failed node depends on the identity of the other helper nodes participating i… ▽ More

    Submitted 7 March, 2019; v1 submitted 3 December, 2018; originally announced December 2018.

  13. arXiv:1808.02780  [pdf, other

    cs.IT

    Cache Aided Communications with Multiple Antennas at Finite SNR

    Authors: Itsik Bergel, Soheil Mohajer

    Abstract: We study the problem of cache-aided communication for cellular networks with multi-user and multiple antennas at finite signal-to-noise ratio. Users are assumed to have non-symmetric links, modeled by wideband fading channels. We show that the problem can be formulated as a linear program, whose solution provides a joint cache allocation along with pre-fetching and fetching schemes that minimize t… ▽ More

    Submitted 8 August, 2018; originally announced August 2018.

    Comments: 19 pages, 4 figures, submitted to IEEE Journal on Selected Areas in Communications

  14. arXiv:1807.04255  [pdf, other

    cs.IT cs.DC cs.LG

    On the Fundamental Limits of Coded Data Shuffling for Distributed Machine Learning

    Authors: Adel Elmahdy, Soheil Mohajer

    Abstract: We consider the data shuffling problem in a distributed learning system, in which a master node is connected to a set of worker nodes, via a shared link, in order to communicate a set of files to the worker nodes. The master node has access to a database of files. In every shuffling iteration, each worker node processes a new subset of files, and has excess storage to partially cache the remaining… ▽ More

    Submitted 20 June, 2020; v1 submitted 11 July, 2018; originally announced July 2018.

    Comments: This work has been published in IEEE Transactions on Information Theory. A preliminary version of this work was presented at IEEE International Symposium on Information Theory (ISIT), Jun. 2018

    Journal ref: IEEE Transactions on Information Theory, vol. 66, no. 5, pp. 3098-3131, May 2020

  15. arXiv:1711.02770  [pdf, ps, other

    cs.IT

    Bandwidth Adaptive & Error Resilient MBR Exact Repair Regenerating Codes

    Authors: Kaveh Mahdaviani, Ashish Khisti, Soheil Mohajer

    Abstract: Regenerating codes are efficient methods for distributed storage in storage networks, where node failures are common. They guarantee low cost data reconstruction and repair through accessing only a predefined number of arbitrarily chosen storage nodes in the network. In this work we consider two simultaneous extensions to the original regenerating codes framework introduced in [1]; i) both data re… ▽ More

    Submitted 7 November, 2017; originally announced November 2017.

    Comments: This manuscript is submitted to the IEEE Transactions on Information Theory

  16. arXiv:1708.06012  [pdf, ps, other

    cs.IT

    Product Matrix Minimum Storage Regenerating Codes with Flexible Number of Helpers

    Authors: Kaveh Mahdaviani, Soheil Mohajer, Ashish Khisti

    Abstract: In coding for distributed storage systems, efficient data reconstruction and repair through accessing a predefined number of arbitrarily chosen storage nodes is guaranteed by regenerating codes. Traditionally, code parameters, specially the number of helper nodes participating in a repair process, are predetermined. However, depending on the state of the system and network traffic, it is desirable… ▽ More

    Submitted 28 December, 2017; v1 submitted 20 August, 2017; originally announced August 2017.

    Comments: IEEE Information Theory Workshop (ITW) 2017

  17. arXiv:1708.03402  [pdf, ps, other

    cs.IT

    Product Matrix MSR Codes with Bandwidth Adaptive Exact Repair

    Authors: Kaveh Mahdaviani, Soheil Mohajer, Ashish Khisti

    Abstract: In a distributed storage systems (DSS) with $k$ systematic nodes, robustness against node failure is commonly provided by storing redundancy in a number of other nodes and performing repair mechanism to reproduce the content of the failed nodes. Efficiency is then achieved by minimizing the storage overhead and the amount of data transmission required for data reconstruction and repair, provided b… ▽ More

    Submitted 28 December, 2017; v1 submitted 10 August, 2017; originally announced August 2017.

  18. arXiv:1604.04961  [pdf, other

    cs.IT

    Role of a Relay in Bursty Multiple Access Channels

    Authors: Sunghyun Kim, Soheil Mohajer, Changho Suh

    Abstract: We investigate the role of a relay in multiple access channels (MACs) with bursty user traffic, where intermittent data traffic restricts the users to bursty transmissions. As our main result, we characterize the degrees of freedom (DoF) region of a $K$-user bursty multi-input multi-output (MIMO) Gaussian MAC with a relay, where Bernoulli random states are introduced to govern bursty user transmis… ▽ More

    Submitted 17 April, 2016; originally announced April 2016.

    Comments: 26 pages, 13 figures, submitted to the IEEE Transactions on Information Theory

  19. arXiv:1510.02032  [pdf, other

    cs.IT

    A Probabilistic Approach Towards Exact-Repair Regeneration Codes

    Authors: Mehran Elyasi, Soheil Mohajer

    Abstract: Regeneration codes with exact-repair property for distributed storage systems is studied in this paper. For exact- repair problem, the achievable points of (α,β) tradeoff match with the outer bound only for minimum storage regenerating (MSR), minimum bandwidth regenerating (MBR), and some specific values of n, k, and d. Such tradeoff is characterized in this work for general (n, k, k), (i.e., k =… ▽ More

    Submitted 7 October, 2015; originally announced October 2015.

  20. On X-Channels with Feedback and Delayed CSI

    Authors: Ravi Tandon, Soheil Mohajer, H. Vincent Poor, Shlomo Shamai

    Abstract: The sum degrees of freedom (DoF) of the two-user MIMO X-channel is characterized in the presence of output feedback and delayed channel state information (CSI). The number of antennas at each transmitters is assumed to be M and the number of antennas at each of the receivers is assumed to be N. It is shown that the sum DoF of the two-user MIMO X-channel is the same as the sum DoF of a two-user MIM… ▽ More

    Submitted 30 January, 2012; originally announced January 2012.

    Comments: Submitted to IEEE ISIT 2012 on Jan 22, 2012

  21. arXiv:1110.6487  [pdf, ps, other

    cs.IT

    On the Feedback Capacity of the Fully Connected $K$-User Interference Channel

    Authors: Soheil Mohajer, Ravi Tandon, H. Vincent Poor

    Abstract: The symmetric K user interference channel with fully connected topology is considered, in which (a) each receiver suffers interference from all other (K-1) transmitters, and (b) each transmitter has causal and noiseless feedback from its respective receiver. The number of generalized degrees of freedom (GDoF) is characterized in terms of α, where the interference-to-noise ratio (INR) is given by I… ▽ More

    Submitted 21 December, 2012; v1 submitted 28 October, 2011; originally announced October 2011.

    Comments: 20 pages, 4 figures, to appear in IEEE Transactions on Information Theory

  22. Degrees of Freedom Region of the MIMO Interference Channel with Output Feedback and Delayed CSIT

    Authors: Ravi Tandon, Soheil Mohajer, H. Vincent Poor, Shlomo Shamai

    Abstract: The two-user multiple-input multiple-output (MIMO) interference channel (IC) with arbitrary number of antennas at each terminal is considered and the degrees of freedom (DoF) region is characterized in the presence of noiseless channel output feedback from each receiver to its respective transmitter and availability of delayed channel state information at the transmitters (CSIT). It is shown that… ▽ More

    Submitted 25 October, 2012; v1 submitted 25 September, 2011; originally announced September 2011.

    Comments: Accepted for publication in IEEE Transactions on Information Theory

  23. On the Symmetric Feedback Capacity of the K-user Cyclic Z-Interference Channel

    Authors: Ravi Tandon, Soheil Mohajer, H. Vincent Poor

    Abstract: The K-user cyclic Z-interference channel models a situation in which the kth transmitter causes interference only to the (k-1)th receiver in a cyclic manner, e.g., the first transmitter causes interference only to the Kth receiver. The impact of noiseless feedback on the capacity of this channel is studied by focusing on the Gaussian cyclic Z-interference channel. To this end, the symmetric feedba… ▽ More

    Submitted 21 December, 2012; v1 submitted 7 September, 2011; originally announced September 2011.

    Comments: Accepted for publication in IEEE Transactions on Information Theory

  24. Smart Meter Privacy: A Utility-Privacy Framework

    Authors: S. Raj Rajagopalan, Lalitha Sankar, Soheil Mohajer, H. Vincent Poor

    Abstract: End-user privacy in smart meter measurements is a well-known challenge in the smart grid. The solutions offered thus far have been tied to specific technologies such as batteries or assumptions on data usage. Existing solutions have also not quantified the loss of benefit (utility) that results from any such privacy-preserving approach. Using tools from information theory, a new framework is prese… ▽ More

    Submitted 10 August, 2011; originally announced August 2011.

    Comments: Accepted for publication and presentation at the IEEE SmartGridComm. 2011

  25. arXiv:1005.0404  [pdf, ps, other

    cs.IT

    Approximate Capacity of Gaussian Interference-Relay Networks with Weak Cross Links

    Authors: Soheil Mohajer, Suhas N. Diggavi, Christina Fragouli, David N. C. Tse

    Abstract: In this paper we study a Gaussian relay-interference network, in which relay (helper) nodes are to facilitate competing information flows over a wireless network. We focus on a two-stage relay-interference network where there are weak cross-links, causing the networks to behave like a chain of Z Gaussian channels. For these Gaussian ZZ and ZS networks, we establish an approximate characterization… ▽ More

    Submitted 3 May, 2010; originally announced May 2010.

    Comments: 66 pages, 19 figures, submitted to IEEE Trans. on Information Theory

  26. arXiv:1001.1658  [pdf, ps, other

    cs.IT

    On the Capacity of Non-Coherent Network Coding

    Authors: Mahdi Jafari Siavoshani, Soheil Mohajer, Christina Fragouli, Suhas Diggavi

    Abstract: We consider the problem of multicasting information from a source to a set of receivers over a network where intermediate network nodes perform randomized network coding operations on the source packets. We propose a channel model for the non-coherent network coding introduced by Koetter and Kschischang in [6], that captures the essence of such a network operation, and calculate the capacity as a… ▽ More

    Submitted 16 November, 2010; v1 submitted 11 January, 2010; originally announced January 2010.

  27. arXiv:1001.1445  [pdf, other

    cs.DM cs.IT

    Graph-Constrained Group Testing

    Authors: Mahdi Cheraghchi, Amin Karbasi, Soheil Mohajer, Venkatesh Saligrama

    Abstract: Non-adaptive group testing involves grou** arbitrary subsets of $n$ items into different pools. Each pool is then tested and defective items are identified. A fundamental question involves minimizing the number of pools required to identify at most $d$ defective items. Motivated by applications in network tomography, sensor networks and infection propagation, a variation of group testing problem… ▽ More

    Submitted 22 July, 2011; v1 submitted 9 January, 2010; originally announced January 2010.

    Comments: Full version to appear in IEEE Transactions on Information Theory. A preliminary summary of this work appeared (under the same title) in proceedings of the 2010 IEEE International Symposium on Information Theory

  28. arXiv:0911.4880  [pdf, ps, other

    cs.IT

    An Estimation Theoretic Approach for Sparsity Pattern Recovery in the Noisy Setting

    Authors: Ali Hormati, Amin Karbasi, Soheil Mohajer, Martin Vetterli

    Abstract: Compressed sensing deals with the reconstruction of sparse signals using a small number of linear measurements. One of the main challenges in compressed sensing is to find the support of a sparse signal. In the literature, several bounds on the scaling law of the number of measurements for successful support recovery have been derived where the main focus is on random Gaussian measurement matric… ▽ More

    Submitted 25 November, 2009; originally announced November 2009.

  29. arXiv:0911.2346  [pdf, ps, other

    cs.IT

    Asymmetric Multilevel Diversity Coding and Asymmetric Gaussian Multiple Descriptions

    Authors: Soheil Mohajer, Chao Tian, Suhas N. Diggavi

    Abstract: We consider the asymmetric multilevel diversity (A-MLD) coding problem, where a set of $2^K-1$ information sources, ordered in a decreasing level of importance, is encoded into $K$ messages (or descriptions). There are $2^K-1$ decoders, each of which has access to a non-empty subset of the encoded messages. Each decoder is required to reproduce the information sources up to a certain importance… ▽ More

    Submitted 12 November, 2009; originally announced November 2009.

    Comments: 42 pages, 9 figures, submitted to IEEE transactions on Information Theory

  30. arXiv:0812.1597  [pdf, ps, other

    cs.IT

    Transmission Techniques for Relay-Interference Networks

    Authors: Soheil Mohajer, Suhas N. Diggavi, Christina Fragouli, David N. C. Tse

    Abstract: In this paper we study the relay-interference wireless network, in which relay (helper) nodes are to facilitate competing information flows over a wireless network. We examine this in the context of a deterministic wireless interaction model, which eliminates the channel noise and focuses on the signal interactions. Using this model, we show that almost all the known schemes such as interference… ▽ More

    Submitted 8 December, 2008; originally announced December 2008.

    Comments: 8 pages, 8 figures, presented at 46. Allerton Conf. On Comm., Control, and Computing 2008

  31. Approximating the Gaussian Multiple Description Rate Region Under Symmetric Distortion Constraints

    Authors: Chao Tian, Soheil Mohajer, Suhas N. Diggavi

    Abstract: We consider multiple description coding for the Gaussian source with K descriptions under the symmetric mean squared error distortion constraints, and provide an approximate characterization of the rate region. We show that the rate region can be sandwiched between two polytopes, between which the gap can be upper bounded by constants dependent on the number of descriptions, but independent of t… ▽ More

    Submitted 20 October, 2008; originally announced October 2008.

    Comments: 46 pages, 5 figures, submitted to IEEE Trans. on Information Theory

  32. arXiv:0706.3480  [pdf, ps, other

    cs.IT

    Tight Bounds on the Average Length, Entropy, and Redundancy of Anti-Uniform Huffman Codes

    Authors: Soheil Mohajer, Ali Kakhbod

    Abstract: In this paper we consider the class of anti-uniform Huffman codes and derive tight lower and upper bounds on the average length, entropy, and redundancy of such codes in terms of the alphabet size of the source. The Fibonacci distributions are introduced which play a fundamental role in AUH codes. It is shown that such distributions maximize the average length and the entropy of the code for a g… ▽ More

    Submitted 23 June, 2007; originally announced June 2007.

    Comments: 9 pages, 2 figures

    Journal ref: IET Communications, vol. 5, no. 9, pp. 1213-1219, 2011

  33. Tight Bounds on the Redundancy of Huffman Codes

    Authors: Soheil Mohajer, Payam Pakzad, Ali Kakhbod

    Abstract: In this paper we study the redundancy of Huffman codes. In particular, we consider sources for which the probability of one of the source symbols is known. We prove a conjecture of Ye and Yeung regarding the upper bound on the redundancy of such Huffman codes, which yields in a tight upper bound. We also derive a tight lower bound for the redundancy under the same assumption. We further apply th… ▽ More

    Submitted 14 June, 2012; v1 submitted 4 August, 2005; originally announced August 2005.

    Comments: 23 pages, 7 figures, accepted for publication in IEEE Transaction on Information Theory