Skip to main content

Showing 1–15 of 15 results for author: Ravi, J

Searching in archive cs. Search in all archives.
.
  1. arXiv:2405.12945  [pdf, other

    cs.DM cs.CG math.CO

    Improved upper bounds for the Heilbronn's Problem for $k$-gons

    Authors: Rishikesh Gajjala, Jayanth Ravi

    Abstract: The Heilbronn triangle problem asks for the placement of $n$ points in a unit square that maximizes the smallest area of a triangle formed by any three of those points. In $1972$, Schmidt considered a natural generalization of this problem. He asked for the placement of $n$ points in a unit square that maximizes the smallest area of the convex hull formed by any four of those points. He showed a l… ▽ More

    Submitted 21 May, 2024; originally announced May 2024.

    Comments: To appear in the Canadian Conference on Computational Geometry (CCCG) 2024

  2. arXiv:2403.03537  [pdf, other

    cs.IT

    On the Second-Order Asymptotics of the Hoeffding Test and Other Divergence Tests

    Authors: K. V. Harsha, Jithin Ravi, Tobias Koch

    Abstract: Consider a binary statistical hypothesis testing problem, where $n$ independent and identically distributed random variables $Z^n$ are either distributed according to the null hypothesis $P$ or the alternative hypothesis $Q$, and only $P$ is known. A well-known test that is suitable for this case is the so-called Hoeffding test, which accepts $P$ if the Kullback-Leibler (KL) divergence between the… ▽ More

    Submitted 12 April, 2024; v1 submitted 6 March, 2024; originally announced March 2024.

    Comments: Submitted to the IEEE Transactions on Information Theory

  3. arXiv:2401.11932  [pdf, other

    cs.DC

    Accelerating Causal Algorithms for Industrial-scale Data: A Distributed Computing Approach with Ray Framework

    Authors: Vishal Verma, Vinod Reddy, Jaiprakash Ravi

    Abstract: The increasing need for causal analysis in large-scale industrial datasets necessitates the development of efficient and scalable causal algorithms for real-world applications. This paper addresses the challenge of scaling causal algorithms in the context of conducting causal analysis on extensive datasets commonly encountered in industrial settings. Our proposed solution involves enhancing the sc… ▽ More

    Submitted 22 January, 2024; originally announced January 2024.

    ACM Class: C.4; E.2; I.2.1

  4. arXiv:2205.05631  [pdf, ps, other

    cs.IT

    Second-Order Asymptotics of Hoeffding-Like Hypothesis Tests

    Authors: K. V. Harsha, Jithin Ravi, Tobias Koch

    Abstract: We consider a binary statistical hypothesis testing problem, where $n$ independent and identically distributed random variables $Z^n$ are either distributed according to the null hypothesis $P$ or the alternate hypothesis $Q$, and only $P$ is known. For this problem, a well-known test is the Hoeffding test, which accepts $P$ if the Kullback-Leibler (KL) divergence between the empirical distributio… ▽ More

    Submitted 11 May, 2022; originally announced May 2022.

    Comments: 26 pages. Submitted to the 2022 IEEE Information Theory Workshop

  5. arXiv:2101.07127  [pdf, other

    cs.IT

    Fundamental Limits of Demand-Private Coded Caching

    Authors: Chinmay Gurjarpadhye, Jithin Ravi, Sneha Kamath, Bikash Kumar Dey, Nikhil Karamchandani

    Abstract: We consider the coded caching problem with an additional privacy constraint that a user should not get any information about the demands of the other users. We first show that a demand-private scheme for $N$ files and $K$ users can be obtained from a non-private scheme that serves only a subset of the demands for the $N$ files and $NK$ users problem. We further use this fact to construct a demand-… ▽ More

    Submitted 18 January, 2021; originally announced January 2021.

    Comments: 43 pages, 6 figures

  6. arXiv:2012.10350  [pdf, other

    cs.IT

    Scaling Laws for Gaussian Random Many-Access Channels

    Authors: Jithin Ravi, Tobias Koch

    Abstract: This paper considers a Gaussian multiple-access channel with random user activity where the total number of users $\ell_n$ and the average number of active users $k_n$ may grow with the blocklength $n$. For this channel, it studies the maximum number of bits that can be transmitted reliably per unit-energy as a function of $\ell_n$ and $k_n$. When all users are active with probability one, i.e.,… ▽ More

    Submitted 2 September, 2021; v1 submitted 18 December, 2020; originally announced December 2020.

    Comments: 50 pages. Submitted to the IEEE Transactions on Information Theory. Revised paper according to the comments by the reviewers. This article supersedes our previous submissions arXiv:1904.11742 and arXiv:2005.07436

  7. arXiv:2006.00257  [pdf, other

    cs.IT

    Private Index Coding

    Authors: Varun Narayanan, Jithin Ravi, Vivek K. Mishra, Bikash Kumar Dey, Nikhil Karamchandani, Vinod M. Prabhakaran

    Abstract: We study the fundamental problem of index coding under an additional privacy constraint that requires each receiver to learn nothing more about the collection of messages beyond its demanded messages from the server and what is available to it as side information. To enable such private communication, we allow the use of a collection of independent secret keys, each of which is shared amongst a su… ▽ More

    Submitted 30 May, 2020; originally announced June 2020.

    Comments: 46 pages, 10 figures

  8. arXiv:2005.07436  [pdf, ps, other

    cs.IT

    Capacity per Unit-Energy of Gaussian Random Many-Access Channels

    Authors: Jithin Ravi, Tobias Koch

    Abstract: We consider a Gaussian multiple-access channel with random user activity where the total number of users $\ell_n$ and the average number of active users $k_n$ may be unbounded. For this channel, we characterize the maximum number of bits that can be transmitted reliably per unit-energy in terms of $\ell_n$ and $k_n$. We show that if $k_n\log \ell_n$ is sublinear in $n$, then each user can achieve… ▽ More

    Submitted 12 July, 2020; v1 submitted 15 May, 2020; originally announced May 2020.

    Comments: Presented in part at the IEEE International Symposium on Information Theory (ISIT) 2020

  9. arXiv:1911.06995  [pdf, other

    cs.IT

    Demand-Private Coded Caching and the Exact Trade-off for N=K=2

    Authors: Sneha Kamath, Jithin Ravi, Bikash Kumar Dey

    Abstract: The distributed coded caching problem has been studied extensively in the recent past. While the known coded caching schemes achieve an improved transmission rate, they violate the privacy of the users since in these schemes the demand of one user is revealed to others in the delivery phase. In this paper, we consider the coded caching problem under the constraint that the demands of the other use… ▽ More

    Submitted 18 February, 2020; v1 submitted 16 November, 2019; originally announced November 2019.

    Comments: 8 pages, 2 figures

  10. arXiv:1904.11742  [pdf, other

    cs.IT

    Capacity per Unit-Energy of Gaussian Many-Access Channels

    Authors: Jithin Ravi, Tobias Koch

    Abstract: We consider a Gaussian multiple-access channel where the number of transmitters grows with the blocklength $n$. For this setup, the maximum number of bits that can be transmitted reliably per unit-energy is analyzed. We show that if the number of users is of an order strictly above $n/\log n$, then the users cannot achieve any positive rate per unit-energy. In contrast, if the number of users is o… ▽ More

    Submitted 26 April, 2019; originally announced April 2019.

    Comments: This work will be presented in part at 2019 IEEE International Symposium on Information Theory, Paris, France

  11. Interactive Secure Function Computation

    Authors: Deepesh Data, Gowtham R. Kurri, Jithin Ravi, Vinod M. Prabhakaran

    Abstract: We consider interactive computation of randomized functions between two users with the following privacy requirement: the interaction should not reveal to either user any extra information about the other user's input and output other than what can be inferred from the user's own input and output. We also consider the case where privacy is required against only one of the users. For both cases, we… ▽ More

    Submitted 9 March, 2020; v1 submitted 10 December, 2018; originally announced December 2018.

    Comments: 30 pages. Revised based on comments from the reviewers

  12. arXiv:1610.00867  [pdf, other

    cs.IT

    Broadcast Function Computation with Complementary Side Information

    Authors: Jithin Ravi, Bikash Kumar Dey

    Abstract: We consider the function computation problem in a three node network with one encoder and two decoders. The encoder has access to two correlated sources $X$ and $Y$. The encoder encodes $X^n$ and $Y^n$ into a message which is given to two decoders. Decoder 1 and decoder 2 have access to $X$ and $Y$ respectively, and they want to compute two functions $f(X,Y)$ and $g(X,Y)$ respectively using the en… ▽ More

    Submitted 4 October, 2016; originally announced October 2016.

    Comments: Accepted to IEEE GLOBECOM NetCod 2016

  13. arXiv:1609.07923  [pdf, other

    cs.IT

    Function Computation through a Bidirectional Relay

    Authors: Jithin Ravi, Bikash Kumar Dey

    Abstract: We consider a function computation problem in a three node wireless network. Nodes A and B observe two correlated sources $X$ and $Y$ respectively, and want to compute a function $f(X,Y)$. To achieve this, nodes A and B send messages to a relay node C at rates $R_A$ and $R_B$ respectively. The relay C then broadcasts a message to A and B at rate $R_C$. We allow block coding, and study the achievab… ▽ More

    Submitted 27 October, 2018; v1 submitted 26 September, 2016; originally announced September 2016.

  14. arXiv:1508.00664  [pdf, other

    cs.IT

    Oblivious Transfer over Wireless Channels

    Authors: Jithin Ravi, Bikash Kumar Dey, Emanuele Viterbo

    Abstract: We consider the problem of oblivious transfer (OT) over OFDM and MIMO wireless communication systems where only the receiver knows the channel state information. The sender and receiver also have unlimited access to a noise-free real channel. Using a physical layer approach, based on the properties of the noisy fading channel, we propose a scheme that enables the transmitter to send obliviously on… ▽ More

    Submitted 4 August, 2015; originally announced August 2015.

    Comments: Submitted to Transactions on Communications

  15. arXiv:1411.6835  [pdf, other

    cs.IT

    Zero-Error Function Computation through a Bidirectional Relay

    Authors: Jithin Ravi, Bikash Kumar Dey

    Abstract: We consider zero error function computation in a three node wireless network. Nodes A and B observe $X$ and $Y$ respectively, and want to compute a function $f(X,Y)$ with zero error. To achieve this, nodes A and B send messages to a relay node C at rates $R_A$ and $R_B$ respectively. The relay C then broadcasts a message to A and B at rate $R_C$ to help them compute $f(X,Y)$ with zero error. We al… ▽ More

    Submitted 25 November, 2014; originally announced November 2014.

    Comments: Submitted to ITW 2015