Skip to main content

Showing 1–36 of 36 results for author: Ngo, K

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.05349  [pdf, other

    cs.CV

    Blurry-Consistency Segmentation Framework with Selective Stacking on Differential Interference Contrast 3D Breast Cancer Spheroid

    Authors: Thanh-Huy Nguyen, Thi Kim Ngan Ngo, Mai Anh Vu, Ting-Yuan Tu

    Abstract: The ability of three-dimensional (3D) spheroid modeling to study the invasive behavior of breast cancer cells has drawn increased attention. The deep learning-based image processing framework is very effective at speeding up the cell morphological analysis process. Out-of-focus photos taken while capturing 3D cells under several z-slices, however, could negatively impact the deep learning model. I… ▽ More

    Submitted 8 June, 2024; originally announced June 2024.

  2. arXiv:2405.07596  [pdf, ps, other

    cs.IT

    Local Mutual-Information Differential Privacy

    Authors: Khac-Hoang Ngo, Johan Östman, Alexandre Graell i Amat

    Abstract: Local mutual-information differential privacy (LMIDP) is a privacy notion that aims to quantify the reduction of uncertainty about the input data when the output of a privacy-preserving mechanism is revealed. We study the relation of LMIDP with local differential privacy (LDP), the de facto standard notion of privacy in context-independent (CI) scenarios, and with local information privacy (LIP),… ▽ More

    Submitted 13 May, 2024; originally announced May 2024.

    Comments: submitted to the IEEE Information Theory Workshop (ITW) 2024

  3. arXiv:2404.19552  [pdf, ps, other

    cs.IT

    Type-Based Unsourced Multiple Access

    Authors: Khac-Hoang Ngo, Deekshith Pathayappilly Krishnan, Kaan Okumus, Giuseppe Durisi, Erik G. Ström

    Abstract: We generalize the type-based multiple access framework proposed by Mergen and Tong (2006) to the case of unsourced multiple access. In the proposed framework, each device tracks the state of a physical/digital process, quantizes this state, and communicates it to a common receiver through a shared channel in an uncoordinated manner. The receiver aims to estimate the type of the states, i.e., the s… ▽ More

    Submitted 30 April, 2024; originally announced April 2024.

    Comments: submitted to the 25th IEEE International Workshop on Signal Processing Advances in Wireless Communications (SPAWC)

  4. arXiv:2404.18990  [pdf, ps, other

    cs.IT eess.SP

    Timely Status Updates in Slotted ALOHA Networks With Energy Harvesting

    Authors: Khac-Hoang Ngo, Giuseppe Durisi, Andrea Munari, Francisco Lázaro, Alexandre Graell i Amat

    Abstract: We investigate the age of information (AoI) in a scenario where energy-harvesting devices send status updates to a gateway following the slotted ALOHA protocol and receive no feedback. We let the devices adjust the transmission probabilities based on their current battery level. Using a Markovian analysis, we derive analytically the average AoI. We further provide an approximate analysis for accur… ▽ More

    Submitted 11 May, 2024; v1 submitted 29 April, 2024; originally announced April 2024.

    Comments: Submitted to IEEE Transaction of Communications. A short version [arXiv:[2310.00348] was presented at GLOBECOM 2023. Simulation code: https://github.com/khachoang1412/AoI_slottedALOHA_energyHarvesting. arXiv admin note: text overlap with arXiv:2310.00348

  5. arXiv:2403.17775  [pdf, ps, other

    cs.LG cs.CR

    Secure Aggregation is Not Private Against Membership Inference Attacks

    Authors: Khac-Hoang Ngo, Johan Östman, Giuseppe Durisi, Alexandre Graell i Amat

    Abstract: Secure aggregation (SecAgg) is a commonly-used privacy-enhancing mechanism in federated learning, affording the server access only to the aggregate of model updates while safeguarding the confidentiality of individual updates. Despite widespread claims regarding SecAgg's privacy-preserving capabilities, a formal analysis of its privacy is lacking, making such presumptions unjustified. In this pape… ▽ More

    Submitted 14 June, 2024; v1 submitted 26 March, 2024; originally announced March 2024.

    Comments: accepted to the European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases (ECML PKDD) 2024

  6. arXiv:2402.04821  [pdf, other

    cs.LG

    E(3)-Equivariant Mesh Neural Networks

    Authors: Thuan Trang, Nhat Khang Ngo, Daniel Levy, Thieu N. Vo, Siamak Ravanbakhsh, Truong Son Hy

    Abstract: Triangular meshes are widely used to represent three-dimensional objects. As a result, many recent works have address the need for geometric deep learning on 3D mesh. However, we observe that the complexities in many of these architectures does not translate to practical performance, and simple deep models for geometric graphs are competitive in practice. Motivated by this observation, we minimall… ▽ More

    Submitted 18 February, 2024; v1 submitted 7 February, 2024; originally announced February 2024.

  7. arXiv:2312.09871  [pdf, other

    cs.LG q-bio.QM

    ChemTime: Rapid and Early Classification for Multivariate Time Series Classification of Chemical Sensors

    Authors: Alexander M. Moore, Randy C. Paffenroth, Kenneth T. Ngo, Joshua R. Uzarski

    Abstract: Multivariate time series data are ubiquitous in the application of machine learning to problems in the physical sciences. Chemiresistive sensor arrays are highly promising in chemical detection tasks relevant to industrial, safety, and military applications. Sensor arrays are an inherently multivariate time series data collection tool which demand rapid and accurate classification of arbitrary che… ▽ More

    Submitted 15 December, 2023; originally announced December 2023.

    Comments: 14 pages, 12 figures

  8. arXiv:2310.00348  [pdf, other

    cs.IT

    Age of Information in Slotted ALOHA With Energy Harvesting

    Authors: Khac-Hoang Ngo, Giuseppe Durisi, Alexandre Graell i Amat, Andrea Munari, Francisco Lázaro

    Abstract: We examine the age of information (AoI) of a status update system that incorporates energy harvesting and uses the slotted ALOHA protocol. We derive analytically the average AoI and the probability that the AoI exceeds a given threshold. Via numerical results, we investigate two strategies to minimize the age of information (AoI): transmitting a new update whenever possible to exploit every chance… ▽ More

    Submitted 30 September, 2023; originally announced October 2023.

    Comments: Accepted to IEEE Globecom 2023; simulation code: https://github.com/khachoang1412/AoI_slottedALOHA_energyHarvesting

  9. arXiv:2309.16685  [pdf, other

    q-bio.BM cs.LG

    Target-aware Variational Auto-encoders for Ligand Generation with Multimodal Protein Representation Learning

    Authors: Nhat Khang Ngo, Truong Son Hy

    Abstract: Without knowledge of specific pockets, generating ligands based on the global structure of a protein target plays a crucial role in drug discovery as it helps reduce the search space for potential drug-like candidates in the pipeline. However, contemporary methods require optimizing tailored networks for each protein, which is arduous and costly. To address this issue, we introduce TargetVAE, a ta… ▽ More

    Submitted 2 August, 2023; originally announced September 2023.

  10. arXiv:2306.14006  [pdf, ps, other

    cs.IT eess.SP

    Joint Communications and Sensing Design for Multi-Carrier MIMO Systems

    Authors: Nhan Thanh Nguyen, Nir Shlezinger, Khac-Hoang Ngo, Van-Dinh Nguyen, Markku Juntti

    Abstract: In conventional joint communications and sensing (JCAS) designs for multi-carrier multiple-input multiple-output (MIMO) systems, the dual-functional waveforms are often optimized for the whole frequency band, resulting in limited communications--sensing performance tradeoff. To overcome the limitation, we propose employing a subset of subcarriers for JCAS, while the communications function is perf… ▽ More

    Submitted 24 June, 2023; originally announced June 2023.

    Comments: This paper was accepted to presented at the 22nd IEEE Statistical Signal Processing (SSP) workshop (Hanoi, Vietnam)

  11. arXiv:2306.06620  [pdf, other

    cs.SE cs.AI

    ARIST: An Effective API Argument Recommendation Approach

    Authors: Son Nguyen, Cuong Tran Manh, Kien T. Tran, Tan M. Nguyen, Thu-Trang Nguyen, Kien-Tuan Ngo, Hieu Dinh Vo

    Abstract: Learning and remembering to use APIs are difficult. Several techniques have been proposed to assist developers in using APIs. Most existing techniques focus on recommending the right API methods to call, but very few techniques focus on recommending API arguments. In this paper, we propose ARIST, a novel automated argument recommendation approach which suggests arguments by predicting developers'… ▽ More

    Submitted 11 June, 2023; originally announced June 2023.

  12. arXiv:2304.08396  [pdf, other

    cs.SE

    Code-centric Learning-based Just-In-Time Vulnerability Detection

    Authors: Son Nguyen, Thu-Trang Nguyen, Thanh Trong Vu, Thanh-Dat Do, Kien-Tuan Ngo, Hieu Dinh Vo

    Abstract: Attacks against computer systems exploiting software vulnerabilities can cause substantial damage to the cyber-infrastructure of our modern society and economy. To minimize the consequences, it is vital to detect and fix vulnerabilities as soon as possible. Just-in-time vulnerability detection (JIT-VD) discovers vulnerability-prone ("dangerous") commits to prevent them from being merged into sourc… ▽ More

    Submitted 17 April, 2023; originally announced April 2023.

  13. arXiv:2302.11720  [pdf, ps, other

    cs.IT

    Irregular Repetition Slotted ALOHA Over the Binary Adder Channel

    Authors: Khac-Hoang Ngo, Alexandre Graell i Amat, Giuseppe Durisi

    Abstract: We propose an irregular repetition slotted ALOHA (IRSA) based random-access protocol for the binary adder channel (BAC). The BAC captures important physical-layer concepts, such as packet generation, per-slot decoding, and information rate, which are neglected in the commonly considered collision channel model. We divide a frame into slots and let users generate a packet, to be transmitted over a… ▽ More

    Submitted 22 February, 2023; originally announced February 2023.

    Comments: accepted to IEEE International Conference on Communication (ICC) 2023

  14. arXiv:2302.11026  [pdf, other

    cs.IT

    Unsourced Multiple Access with Common Alarm Messages: Network Slicing for Massive and Critical IoT

    Authors: Khac-Hoang Ngo, Giuseppe Durisi, Alexandre Graell i Amat, Petar Popovski, Anders E. Kalor, Beatriz Soret

    Abstract: We investigate the coexistence of massive and critical Internet of Things (IoT) services in the context of the unsourced multiple access (UMA) framework introduced by Polyanskiy (2017), where all users employ a common codebook and the receiver returns an unordered list of decoded codewords. This setup is suitably modified to introduce heterogeneous traffic. Specifically, to model the massive IoT s… ▽ More

    Submitted 13 October, 2023; v1 submitted 21 February, 2023; originally announced February 2023.

    Comments: IEEE Transactions on Communications

  15. arXiv:2302.08680  [pdf, other

    cs.LG

    Modeling Polypharmacy and Predicting Drug-Drug Interactions using Deep Generative Models on Multimodal Graphs

    Authors: Nhat Khang Ngo, Truong Son Hy, Risi Kondor

    Abstract: Latent representations of drugs and their targets produced by contemporary graph autoencoder models have proved useful in predicting many types of node-pair interactions on large networks, including drug-drug, drug-target, and target-target interactions. However, most existing approaches model either the node's latent spaces in which node distributions are rigid or do not effectively capture the i… ▽ More

    Submitted 16 February, 2023; originally announced February 2023.

    Comments: arXiv admin note: substantial text overlap with arXiv:2209.09941

  16. Multiresolution Graph Transformers and Wavelet Positional Encoding for Learning Hierarchical Structures

    Authors: Nhat Khang Ngo, Truong Son Hy, Risi Kondor

    Abstract: Contemporary graph learning algorithms are not well-defined for large molecules since they do not consider the hierarchical interactions among the atoms, which are essential to determine the molecular properties of macromolecules. In this work, we propose Multiresolution Graph Transformers (MGT), the first graph transformer architecture that can learn to represent large molecules at multiple scale… ▽ More

    Submitted 21 July, 2023; v1 submitted 16 February, 2023; originally announced February 2023.

  17. arXiv:2302.04917  [pdf, other

    cs.LG

    ChemVise: Maximizing Out-of-Distribution Chemical Detection with the Novel Application of Zero-Shot Learning

    Authors: Alexander M. Moore, Randy C. Paffenroth, Ken T. Ngo, Joshua R. Uzarski

    Abstract: Accurate chemical sensors are vital in medical, military, and home safety applications. Training machine learning models to be accurate on real world chemical sensor data requires performing many diverse, costly experiments in controlled laboratory settings to create a data set. In practice even expensive, large data sets may be insufficient for generalization of a trained model to a real-world te… ▽ More

    Submitted 9 February, 2023; originally announced February 2023.

    Comments: 12 pages, 14 figures

  18. arXiv:2209.09941  [pdf, other

    q-bio.BM cs.LG

    Predicting Drug-Drug Interactions using Deep Generative Models on Graphs

    Authors: Nhat Khang Ngo, Truong Son Hy, Risi Kondor

    Abstract: Latent representations of drugs and their targets produced by contemporary graph autoencoder-based models have proved useful in predicting many types of node-pair interactions on large networks, including drug-drug, drug-target, and target-target interactions. However, most existing approaches model the node's latent spaces in which node distributions are rigid and disjoint; these limitations hind… ▽ More

    Submitted 30 October, 2022; v1 submitted 14 September, 2022; originally announced September 2022.

  19. arXiv:2203.10227  [pdf, other

    cs.DC

    Has Your FaaS Application Been Decommissioned Yet? -- A Case Study on the Idle Timeout in Function as a Service Infrastructure

    Authors: Kim Long Ngo, Joydeep Mukherjee, Zhen Ming Jiang, Marin Litoiu

    Abstract: Function as a Service (FaaS) is a new cloud technology with automated resource management. Different from traditional cloud computing, each FaaS cloud function can only run a fixed period of time before being decommissioned. Furthermore, FaaS cloud providers often update their platforms (e.g., idle timeout). These changes and their associated impact are not transparent and could potentially impact… ▽ More

    Submitted 18 March, 2022; originally announced March 2022.

    Comments: 5 pages, 1 figure

  20. arXiv:2202.06365  [pdf, ps, other

    cs.IT

    Unsourced Multiple Access With Random User Activity

    Authors: Khac-Hoang Ngo, Alejandro Lancho, Giuseppe Durisi, Alexandre Graell i Amat

    Abstract: To account for the massive uncoordinated random access scenario, which is relevant for the Internet of Things, Polyanskiy (2017) proposed a novel formulation of the multiple-access problem, commonly referred to as unsourced multiple access, where all users employ a common codebook and the receiver decodes up to a permutation of the messages. We extend this seminal work to the case where the number… ▽ More

    Submitted 22 February, 2023; v1 submitted 13 February, 2022; originally announced February 2022.

    Comments: accepted to IEEE Transactions on Information Theory; simulation code available at: https://github.com/khachoang1412/UMA_random_user_activity. arXiv admin note: text overlap with arXiv:2103.09721

  21. arXiv:2112.01182  [pdf, ps, other

    cs.IT

    Age of Information in Prioritized Random Access

    Authors: Khac-Hoang Ngo, Giuseppe Durisi, Alexandre Graell i Amat

    Abstract: Age of information (AoI) is a performance metric that captures the freshness of status updates. While AoI has been studied thoroughly for point-to-point links, the impact of modern random-access protocols on this metric is still unclear. In this paper, we extend the recent results by Munari to prioritized random access where devices are divided into different classes according to different AoI req… ▽ More

    Submitted 2 December, 2021; originally announced December 2021.

    Comments: 6 pages, 3 figures, presented in Asilomar 2021

  22. arXiv:2111.10690  [pdf, other

    cs.NI cs.CG eess.SY

    Network Graph Generation through Adaptive Clustering and Infection Dynamics: A Step Towards Global Connectivity

    Authors: Aniq Ur Rahman, Fares Fourati, Khac-Hoang Ngo, Anish **dal, Mohamed-Slim Alouini

    Abstract: More than 40% of the world's population is not connected to the internet, majorly due to the lack of adequate infrastructure. Our work aims to bridge this digital divide by proposing solutions for network deployment in remote areas. Specifically, a number of access points (APs) are deployed as an interface between the users and backhaul nodes (BNs). The main challenges include designing the number… ▽ More

    Submitted 20 November, 2021; originally announced November 2021.

    Comments: 6 pages, 8 figures, 2 algorithms

  23. Ranking Warnings of Static Analysis Tools Using Representation Learning

    Authors: Kien-Tuan Ngo, Dinh-Truong Do, Thu-Trang Nguyen, Hieu Dinh Vo

    Abstract: Static analysis tools are frequently used to detect potential vulnerabilities in software systems. However, an inevitable problem of these tools is their large number of warnings with a high false positive rate, which consumes time and effort for investigating. In this paper, we present DeFP, a novel method for ranking static analysis warnings. Based on the intuition that warnings which have simil… ▽ More

    Submitted 7 October, 2021; originally announced October 2021.

    Comments: Published in Proceedings of the 28th Asia-Pacific Software Engineering Conference (APSEC'21)

  24. A Variability Fault Localization Approach for Software Product Lines

    Authors: Thu-Trang Nguyen, Kien-Tuan Ngo, Son Nguyen, Hieu Dinh Vo

    Abstract: Software fault localization is one of the most expensive, tedious, and time-consuming activities in program debugging. This activity becomes even much more challenging in Software Product Line (SPL) systems due to variability of failures. These unexpected behaviors are induced by variability faults which can only be exposed under some combinations of system features. The interaction among these fe… ▽ More

    Submitted 21 September, 2021; originally announced September 2021.

    Comments: Published in IEEE Transactions on Software Engineering (Early Access)

  25. arXiv:2109.01335  [pdf, other

    cs.IT eess.SP

    Low-Latency and Secure Computation Offloading Assisted by Hybrid Relay-Reflecting Intelligent Surface

    Authors: Khac-Hoang Ngo, Nhan Thanh Nguyen, Thinh Quang Dinh, Trong-Minh Hoang, Markku Juntti

    Abstract: Recently, the hybrid relay-reflecting intelligent surface (HRRIS) has been introduced as a spectral- and energy-efficient architecture to assist wireless communication systems. In the HRRIS, a single or few active relay elements are deployed along with a large number of passive reflecting elements, allowing it to not only reflect but also amplify the incident signals. In this work, we investigate… ▽ More

    Submitted 3 September, 2021; originally announced September 2021.

    Comments: 6 pages, accepted to 2021 International Conference On Advanced Technologies For Communications

  26. Variability Fault Localization: A Benchmark

    Authors: Kien-Tuan Ngo, Thu-Trang Nguyen, Son Nguyen, Hieu Dinh Vo

    Abstract: Software fault localization is one of the most expensive, tedious, and time-consuming activities in program debugging. This activity becomes even much more challenging in Software Product Line (SPL) systems due to the variability of failures in SPL systems. These unexpected behaviors are caused by variability faults which can only be exposed under some combinations of system features. Although loc… ▽ More

    Submitted 21 September, 2021; v1 submitted 9 July, 2021; originally announced July 2021.

    Comments: Published in Proceedings of the 25th ACM International Systems and Software Product Line Conference - Volume A (SPLC '21)

  27. arXiv:2104.09711  [pdf, other

    cs.IT

    Transmit Correlation Diversity: Generalization, New Techniques, and Improved Bounds

    Authors: Fan Zhang, Khac-Hoang Ngo, Sheng Yang, Aria Nosratinia

    Abstract: When the users in a MIMO broadcast channel experience different spatial transmit correlation matrices, a class of gains is produced that is denoted transmit correlation diversity. This idea was conceived for channels in which transmit correlation matrices have mutually exclusive eigenspaces, allowing non-interfering training and transmission. This paper broadens the scope of transmit correlation d… ▽ More

    Submitted 19 April, 2021; originally announced April 2021.

  28. arXiv:2103.09721  [pdf, ps, other

    cs.IT

    Massive Uncoordinated Access With Random User Activity

    Authors: Khac-Hoang Ngo, Alejandro Lancho, Giuseppe Durisi, Alexandre Graell i Amat

    Abstract: We extend the seminal work by Polyanskiy (2017) on massive uncoordinated access to the case where the number of active users is random and unknown a priori. We define a random-access code accounting for both misdetection (MD) and false alarm (FA), and derive a random-coding achievability bound for the Gaussian multiple-access channel. Our bound captures the fundamental trade-off between MD and FA… ▽ More

    Submitted 13 February, 2022; v1 submitted 17 March, 2021; originally announced March 2021.

    Comments: 12 pages, 3 figures; presented in IEEE International Symposium on Information Theory (ISIT) 2021; simulation code available at: https://github.com/khachoang1412/UMA_random_user_activity

  29. arXiv:2009.11556  [pdf, ps, other

    cs.IT

    The Optimal DoF for the Noncoherent MIMO Channel with Generic Block Fading

    Authors: Khac-Hoang Ngo, Sheng Yang, Maxime Guillaud

    Abstract: The high-SNR capacity of the noncoherent MIMO channel has been derived for the case of independent and identically distributed (IID) Rayleigh block fading by exploiting the Gaussianity of the channel matrix. This implies the optimal degrees of freedom (DoF), i.e., the capacity pre-log factor. Nevertheless, as far as the optimal DoF is concerned, IID Rayleigh fading is apparently a sufficient but n… ▽ More

    Submitted 11 January, 2021; v1 submitted 24 September, 2020; originally announced September 2020.

    Comments: 5 pages, accepted to IEEE Information Theory Workshop (ITW) 2020

  30. arXiv:2009.11548  [pdf, other

    cs.IT

    Joint Constellation Design for Noncoherent MIMO Multiple-Access Channels

    Authors: Khac-Hoang Ngo, Sheng Yang, Maxime Guillaud, Alexis Decurninge

    Abstract: We consider the joint constellation design problem for the noncoherent multiple-input multiple-output multiple-access channel (MAC). By analyzing the noncoherent maximum-likelihood detection error, we propose novel design criteria so as to minimize the error probability. As a baseline approach, we adapt several existing design criteria for the point-to-point channel to the MAC. Furthermore, we pro… ▽ More

    Submitted 5 July, 2022; v1 submitted 24 September, 2020; originally announced September 2020.

    Comments: 24 double-column pages, 11 figures, to appear in IEEE Transactions on Information Theory

  31. arXiv:2001.04970  [pdf, ps, other

    cs.IT

    Joint Constellation Design for the Two-User Non-Coherent Multiple-Access Channel

    Authors: Khac-Hoang Ngo, Sheng Yang, Maxime Guillaud, Alexis Decurninge

    Abstract: We consider the joint constellation design problem for the two-user non-coherent multiple-access channel (MAC). Based on an analysis on the non-coherent maximum-likelihood (ML) detection error, we propose novel design criteria so as to minimize the error probability. Based on these criteria, we propose a simple and efficient construction consisting in partitioning a single-user constellation. Nume… ▽ More

    Submitted 16 January, 2020; v1 submitted 14 January, 2020; originally announced January 2020.

    Comments: 8 pages, 3 figures, extended version of a paper submitted to the 2020 IEEE International Symposium on Information Theory (ISIT)

  32. arXiv:1905.11152  [pdf, ps, other

    cs.IT

    Multi-User Detection Based on Expectation Propagation for the Non-Coherent SIMO Multiple Access Channel

    Authors: Khac-Hoang Ngo, Maxime Guillaud, Alexis Decurninge, Sheng Yang, Philip Schniter

    Abstract: We consider the non-coherent single-input multiple-output (SIMO) multiple access channel with general signaling under spatially correlated Rayleigh block fading. We propose a novel soft-output multi-user detector that computes an approximate marginal posterior of each transmitted signal using only the knowledge about the channel distribution. Our detector is based on expectation propagation (EP) a… ▽ More

    Submitted 3 June, 2020; v1 submitted 27 May, 2019; originally announced May 2019.

    Comments: to appear in the IEEE Transactions on Wireless Communications

  33. arXiv:1905.08745  [pdf, other

    cs.IT

    Cube-Split: A Structured Grassmannian Constellation for Non-Coherent SIMO Communications

    Authors: Khac-Hoang Ngo, Alexis Decurninge, Maxime Guillaud, Sheng Yang

    Abstract: In this paper, we propose a practical structured constellation for non-coherent communication with a single transmit antenna over Rayleigh flat and block fading channel without instantaneous channel state information. The constellation symbols belong to the Grassmannian of lines and are defined up to a complex scaling. The constellation is generated by partitioning the Grassmannian of lines into a… ▽ More

    Submitted 4 June, 2020; v1 submitted 21 May, 2019; originally announced May 2019.

    Comments: appeared in the IEEE Transactions on Wireless Communications

  34. arXiv:1806.04102  [pdf, other

    cs.IT

    The Optimal DoF Region for the Two-User Non-Coherent SIMO Multiple-Access Channel

    Authors: Khac-Hoang Ngo, Sheng Yang, Maxime Guillaud

    Abstract: The optimal degree-of-freedom (DoF) region of the non-coherent multiple-access channels is still unknown in general. In this paper, we make some progress by deriving the entire optimal DoF region in the case of the two-user single-input multiple-output (SIMO) generic block fading channels. The achievability is based on a simple training-based scheme. The novelty of our result lies in the converse… ▽ More

    Submitted 11 June, 2018; originally announced June 2018.

    Comments: 9 pages, extended version (with proofs) of a paper submitted to 2018 IEEE Information Theory Workshop (ITW 2018)

  35. arXiv:1703.06538  [pdf, ps, other

    cs.IT

    Scalable Content Delivery with Coded Caching in Multi-Antenna Fading Channels

    Authors: Khac-Hoang Ngo, Sheng Yang, Mari Kobayashi

    Abstract: We consider the content delivery problem in a fading multi-input single-output channel with cache-aided users. We are interested in the scalability of the equivalent content delivery rate when the number of users, $K$, is large. Analytical results show that, using coded caching and wireless multicasting, without channel state information at the transmitter (CSIT), linear scaling of the content del… ▽ More

    Submitted 3 June, 2020; v1 submitted 19 March, 2017; originally announced March 2017.

    Comments: appeared in the IEEE Transactions on Wireless Communications

  36. arXiv:1702.02179  [pdf, other

    cs.IT

    Opportunistic Content Delivery in Fading Broadcast Channels

    Authors: Asma Ghorbel, Khac-Hoang Ngo, Richard Combes, Mari Kobayashi, Sheng Yang

    Abstract: We consider content delivery over fading broadcast channels. A server wants to transmit K files to K users, each equipped with a cache of finite size. Using the coded caching scheme of Maddah-Ali and Niesen, we design an opportunistic delivery scheme where the long-term sum content delivery rate scales with K the number of users in the system. The proposed delivery scheme combines superposition co… ▽ More

    Submitted 7 February, 2017; originally announced February 2017.

    Comments: 7 pages, 2 figures, extended version of a paper submitted to ISIT 2017