Skip to main content

Showing 1–46 of 46 results for author: Shum, K

Searching in archive cs. Search in all archives.
.
  1. arXiv:2404.10681  [pdf, other

    cs.CV

    StyleCity: Large-Scale 3D Urban Scenes Stylization with Vision-and-Text Reference via Progressive Optimization

    Authors: Yingshu Chen, Huajian Huang, Tuan-Anh Vu, Ka Chun Shum, Sai-Kit Yeung

    Abstract: Creating large-scale virtual urban scenes with variant styles is inherently challenging. To facilitate prototypes of virtual production and bypass the need for complex materials and lighting setups, we introduce the first vision-and-text-driven texture stylization system for large-scale urban scenes, StyleCity. Taking an image and text as references, StyleCity stylizes a 3D textured mesh of a larg… ▽ More

    Submitted 16 April, 2024; originally announced April 2024.

    Comments: project page: https://chenyingshu.github.io/stylecity3d/

  2. arXiv:2401.00396  [pdf, other

    cs.CL

    RAGTruth: A Hallucination Corpus for Develo** Trustworthy Retrieval-Augmented Language Models

    Authors: Cheng Niu, Yuanhao Wu, Juno Zhu, Siliang Xu, Kashun Shum, Randy Zhong, Juntong Song, Tong Zhang

    Abstract: Retrieval-augmented generation (RAG) has become a main technique for alleviating hallucinations in large language models (LLMs). Despite the integration of RAG, LLMs may still present unsupported or contradictory claims to the retrieved contents. In order to develop effective hallucination prevention strategies under RAG, it is important to create benchmark datasets that can measure the extent of… ▽ More

    Submitted 17 May, 2024; v1 submitted 30 December, 2023; originally announced January 2024.

  3. arXiv:2311.18328  [pdf, other

    cs.CV cs.AI cs.GR

    Advances in 3D Neural Stylization: A Survey

    Authors: Yingshu Chen, Guocheng Shao, Ka Chun Shum, Binh-Son Hua, Sai-Kit Yeung

    Abstract: Modern artificial intelligence offers a novel and transformative approach to creating digital art across diverse styles and modalities like images, videos and 3D data, unleashing the power of creativity and revolutionizing the way that we perceive and interact with visual content. This paper reports on recent advances in stylized 3D asset creation and manipulation with the expressive power of neur… ▽ More

    Submitted 18 June, 2024; v1 submitted 30 November, 2023; originally announced November 2023.

  4. arXiv:2311.08364  [pdf, other

    cs.LG cs.AI cs.DM

    Plum: Prompt Learning using Metaheuristic

    Authors: Rui Pan, Shuo Xing, Shizhe Diao, Wenhe Sun, Xiang Liu, Kashun Shum, Renjie Pi, Jipeng Zhang, Tong Zhang

    Abstract: Since the emergence of large language models, prompt learning has become a popular method for optimizing and customizing these models. Special prompts, such as Chain-of-Thought, have even revealed previously unknown reasoning capabilities within these models. However, the progress of discovering effective prompts has been slow, driving a desire for general prompt optimization methods. Unfortunatel… ▽ More

    Submitted 30 June, 2024; v1 submitted 14 November, 2023; originally announced November 2023.

    Comments: Published at Findings of ACL 2024

  5. arXiv:2309.11281  [pdf, other

    cs.CV

    Language-driven Object Fusion into Neural Radiance Fields with Pose-Conditioned Dataset Updates

    Authors: Ka Chun Shum, Jaeyeon Kim, Binh-Son Hua, Duc Thanh Nguyen, Sai-Kit Yeung

    Abstract: Neural radiance field is an emerging rendering method that generates high-quality multi-view consistent images from a neural scene representation and volume rendering. Although neural radiance field-based techniques are robust for scene reconstruction, their ability to add or remove objects remains limited. This paper proposes a new language-driven approach for object manipulation with neural radi… ▽ More

    Submitted 31 March, 2024; v1 submitted 20 September, 2023; originally announced September 2023.

    Comments: CVPR 2024

  6. arXiv:2307.09621  [pdf, other

    cs.CV

    Conditional 360-degree Image Synthesis for Immersive Indoor Scene Decoration

    Authors: Ka Chun Shum, Hong-Wing Pang, Binh-Son Hua, Duc Thanh Nguyen, Sai-Kit Yeung

    Abstract: In this paper, we address the problem of conditional scene decoration for 360-degree images. Our method takes a 360-degree background photograph of an indoor scene and generates decorated images of the same scene in the panorama view. To do this, we develop a 360-aware object layout generator that learns latent object vectors in the 360-degree view to enable a variety of furniture arrangements for… ▽ More

    Submitted 18 July, 2023; originally announced July 2023.

    Comments: ICCV2023

  7. arXiv:2306.12420  [pdf, other

    cs.CL cs.AI

    LMFlow: An Extensible Toolkit for Finetuning and Inference of Large Foundation Models

    Authors: Shizhe Diao, Rui Pan, Hanze Dong, Ka Shun Shum, Jipeng Zhang, Wei Xiong, Tong Zhang

    Abstract: Foundation models have demonstrated a great ability to achieve general human-level intelligence far beyond traditional approaches. As the technique keeps attracting attention from the AI community, an increasing number of foundation models are becoming publicly accessible. However, a significant shortcoming of most of these models lies in their performance in specialized-domain and task-specific a… ▽ More

    Submitted 5 May, 2024; v1 submitted 21 June, 2023; originally announced June 2023.

    Comments: Published in NAACL 2024 Demo Track

  8. arXiv:2304.06767  [pdf, other

    cs.LG cs.AI cs.CL cs.CV stat.ML

    RAFT: Reward rAnked FineTuning for Generative Foundation Model Alignment

    Authors: Hanze Dong, Wei Xiong, Deepanshu Goyal, Yihan Zhang, Winnie Chow, Rui Pan, Shizhe Diao, Jipeng Zhang, Kashun Shum, Tong Zhang

    Abstract: Generative foundation models are susceptible to implicit biases that can arise from extensive unsupervised training data. Such biases can produce suboptimal samples, skewed outcomes, and unfairness, with potentially serious consequences. Consequently, aligning these models with human ethics and preferences is an essential step toward ensuring their responsible and effective deployment in real-worl… ▽ More

    Submitted 1 December, 2023; v1 submitted 13 April, 2023; originally announced April 2023.

    Comments: 29 pages, 12 figures, Published in Transactions on Machine Learning Research (TMLR)

  9. arXiv:2304.00762  [pdf, ps, other

    cs.IT

    The (r, δ)-Locality of Repeated-Root Cyclic Codes with Prime Power Lengths

    Authors: Wei Zhao, Weixian Li, Shenghao Yang, Kenneth W. Shum

    Abstract: Locally repairable codes (LRCs) are designed for distributed storage systems to reduce the repair bandwidth and disk I/O complexity during the storage node repair process. A code with $(r,δ)$-locality (also called an $(r,δ)$-LRC) can simultaneously repair up to $δ-1$ symbols in a codeword by accessing at most $r$ other symbols in the codeword. In this paper, we propose a new method to calculate th… ▽ More

    Submitted 5 May, 2024; v1 submitted 3 April, 2023; originally announced April 2023.

  10. arXiv:2302.12822  [pdf, other

    cs.CL

    Automatic Prompt Augmentation and Selection with Chain-of-Thought from Labeled Data

    Authors: KaShun Shum, Shizhe Diao, Tong Zhang

    Abstract: Chain-of-thought (CoT) advances the reasoning abilities of large language models (LLMs) and achieves superior performance in complex reasoning tasks. However, most CoT studies rely on carefully designed human-annotated rational chains to prompt LLMs, posing challenges for real-world applications where labeled data is available without rational chains. This paper proposes a new strategy, Automate-C… ▽ More

    Submitted 27 February, 2024; v1 submitted 24 February, 2023; originally announced February 2023.

    Comments: EMNLP 2023

  11. arXiv:2209.05800  [pdf, other

    cs.CV cs.GR cs.MM

    Time-of-Day Neural Style Transfer for Architectural Photographs

    Authors: Yingshu Chen, Tuan-Anh Vu, Ka-Chun Shum, Binh-Son Hua, Sai-Kit Yeung

    Abstract: Architectural photography is a genre of photography that focuses on capturing a building or structure in the foreground with dramatic lighting in the background. Inspired by recent successes in image-to-image translation methods, we aim to perform style transfer for architectural photographs. However, the special composition in architectural photography poses great challenges for style transfer in… ▽ More

    Submitted 27 October, 2022; v1 submitted 13 September, 2022; originally announced September 2022.

    Comments: Updated version with corrected equations. Paper published at the International Conference on Computational Photography (ICCP) 2022. 12 pages of content with 6 pages of supplementary materials

  12. arXiv:2112.05377  [pdf, ps, other

    cs.IT

    Optimal Quaternary (r,delta)-Locally Repairable Codes Achieving the Singleton-type Bound

    Authors: Kenneth W. Shum, Jie Hao

    Abstract: Locally repairable codes enables fast repair of node failure in a distributed storage system. The code symbols in a codeword are stored in different storage nodes, such that a disk failure can be recovered by accessing a small fraction of the storage nodes. The number of storage nodes that are contacted during the repair of a failed node is a parameter called locality. We consider locally repairab… ▽ More

    Submitted 10 December, 2021; originally announced December 2021.

  13. arXiv:2111.12489  [pdf, ps, other

    cs.IT

    Repeated-root Constacyclic Codes with Optimal Locality

    Authors: Wei Zhao, Kenneth W. Shum, Shenghao Yang

    Abstract: A code is called a locally repairable code (LRC) if any code symbol is a function of a small fraction of other code symbols. When a locally repairable code is employed in a distributed storage systems, an erased symbol can be recovered by accessing only a small number of other symbols, and hence alleviating the network resources required during the repair process. In this paper we consider repeate… ▽ More

    Submitted 24 November, 2021; originally announced November 2021.

  14. arXiv:2009.11754  [pdf, ps, other

    cs.IT math.CO

    Multichannel Conflict-Avoiding Codes of Weights Three and Four

    Authors: Yuan-Hsun Lo, Kenneth W. Shum, Wing Shing Wong, Yi** Zhang

    Abstract: Conflict-avoiding codes (CACs) were introduced by Levenshtein as a single-channel transmission scheme for a multiple-access collision channel without feedback. When the number of simultaneously active source nodes is less than or equal to the weight of a CAC, it is able to provide a hard guarantee that each active source node transmits at least one packet successfully within a fixed time duration,… ▽ More

    Submitted 20 April, 2021; v1 submitted 24 September, 2020; originally announced September 2020.

    Comments: 12 pages. Accepted for publication in IEEE Transaction on Information Theory

    MSC Class: 94B25

  15. arXiv:2009.09190  [pdf, other

    cs.IT

    Schedule Sequence Design for Broadcast in Multi-channel Ad Hoc Networks

    Authors: Fang Liu, Kenneth W. Shum, Yi** Zhang, Wing Shing Wong

    Abstract: We consider a single-hop ad hoc network in which each node aims to broadcast packets to its neighboring nodes by using multiple slotted, TDD collision channels. There is no cooperation among the nodes. To ensure successful broadcast, we propose to pre-assign each node a periodic sequence to schedule transmissions and receptions at each time slot. These sequences are referred to as schedule sequenc… ▽ More

    Submitted 19 September, 2020; originally announced September 2020.

  16. arXiv:2005.07336  [pdf, other

    cs.IT

    Network Coding Based on Byte-wise Circular Shift and Integer Addition

    Authors: Kenneth W. Shum, Hanxu Hou

    Abstract: A novel implementation of a special class of Galois ring, in which the multiplication can be realized by a cyclic convolution, is applied to the construction of network codes. The primitive operations involved are byte-wise shifts and integer additions modulo a power of 2. Both of them can be executed efficiently in microprocessors. An illustration of how to apply this idea to array code is given… ▽ More

    Submitted 14 May, 2020; originally announced May 2020.

    Comments: Accepted for presentation in ISIT2020

  17. arXiv:2005.06823  [pdf, ps, other

    cs.IT

    On the Optimal Minimum Distance of Fractional Repetition Codes

    Authors: Bing Zhu, Kenneth W. Shum, Wei** Wang, Jianxin Wang

    Abstract: Fractional repetition (FR) codes are a class of repair efficient erasure codes that can recover a failed storage node with both optimal repair bandwidth and complexity. In this paper, we study the minimum distance of FR codes, which is the smallest number of nodes whose failure leads to the unrecoverable loss of the stored file. We consider upper bounds on the minimum distance and present several… ▽ More

    Submitted 14 May, 2020; originally announced May 2020.

  18. arXiv:1901.03000  [pdf, other

    cs.IT cs.DC

    Capacity of Distributed Storage Systems with Clusters and Separate Nodes

    Authors: **gzhao Wang, Tinghan Wang, Yuan Luo, Kenneth W. Shum

    Abstract: In distributed storage systems (DSSs), the optimal tradeoff between node storage and repair bandwidth is an important issue for designing distributed coding strategies to ensure large scale data reliability. The capacity of DSSs is obtained as a function of node storage and repair bandwidth parameters, characterizing the tradeoff. There are lots of works on DSSs with clusters (racks) where the rep… ▽ More

    Submitted 9 January, 2019; originally announced January 2019.

  19. On the Duality and File Size Hierarchy of Fractional Repetition Codes

    Authors: Bing Zhu, Kenneth W. Shum, Hui Li

    Abstract: Distributed storage systems that deploy erasure codes can provide better features such as lower storage overhead and higher data reliability. In this paper, we focus on fractional repetition (FR) codes, which are a class of storage codes characterized by the features of uncoded exact repair and minimum repair bandwidth. We study the duality of FR codes, and investigate the relationship between the… ▽ More

    Submitted 6 August, 2018; originally announced August 2018.

    Comments: Submitted for possible journal publication

    Journal ref: The Computer Journal, vol. 62, no. 1, pp. 150-160, Jan. 2019

  20. arXiv:1805.02989  [pdf, other

    cs.IT

    On Secure Exact-repair Regenerating Codes with a Single Pareto Optimal Point

    Authors: Fangwei Ye, Shiqiu Liu, Kenneth W. Shum, Raymond W. Yeung

    Abstract: The problem of exact-repair regenerating codes against eavesdrop** attack is studied. The eavesdrop** model we consider is that the eavesdropper has the capability to observe the data involved in the repair of a subset of $\ell$ nodes. An $(n,k,d,\ell)$ secure exact-repair regenerating code is an $(n,k,d)$ exact-repair regenerating code that is secure under this eavesdrop** model. It has bee… ▽ More

    Submitted 8 May, 2018; originally announced May 2018.

    Comments: This paper will be presented in part in ISIT 2018

  21. arXiv:1803.03508  [pdf, other

    cs.IT

    A Unified Form of EVENODD and RDP Codes and Their Efficient Decoding

    Authors: Hanxu Hou, Yunghsiang S. Han, Kenneth W. Shum, Hui Li

    Abstract: Array codes have been widely employed in storage systems, such as Redundant Arrays of Inexpensive Disks (RAID). The row-diagonal parity (RDP) codes and EVENODD codes are two popular double-parity array codes. As the capacity of hard disks increases, better fault tolerance by using array codes with three or more parity disks is needed. Although many extensions of RDP codes and EVENODD codes have be… ▽ More

    Submitted 9 March, 2018; originally announced March 2018.

  22. arXiv:1802.04031  [pdf, other

    cs.IT

    Rack-Aware Regenerating Codes for Data Centers

    Authors: Hanxu Hou, Patrick P. C. Lee, Kenneth W. Shum, Yuchong Hu

    Abstract: Erasure coding is widely used for massive storage in data centers to achieve high fault tolerance and low storage redundancy. Since the cross-rack communication cost is often high, it is critical to design erasure codes that minimize the cross-rack repair bandwidth during failure repair. In this paper, we analyze the optimal trade-off between storage redundancy and cross-rack repair bandwidth spec… ▽ More

    Submitted 25 February, 2019; v1 submitted 12 February, 2018; originally announced February 2018.

  23. On the Duality of Fractional Repetition Codes

    Authors: Bing Zhu, Kenneth W. Shum, Hui Li

    Abstract: Erasure codes have emerged as an efficient technology for providing data redundancy in distributed storage systems. However, it is a challenging task to repair the failed storage nodes in erasure-coded storage systems, which requires large quantities of network resources. In this paper, we study fractional repetition (FR) codes, which enable the minimal repair complexity and also minimum repair ba… ▽ More

    Submitted 22 October, 2017; originally announced October 2017.

    Comments: Accepted by the 2017 IEEE Information Theory Workshop (ITW 2017)

  24. arXiv:1611.03012  [pdf, ps, other

    cs.IT math.CO

    New CRT sequence sets for a collision channel without feedback

    Authors: Yi** Zhang, Yuan-Hsun Lo, Kenneth W. Shum, Wing Shing Wong

    Abstract: Protocol sequences are binary and periodic sequences used for deterministic multiple access in a collision channel without feedback. In this paper, we focus on user-irrepressible (UI) protocol sequences that can guarantee a positive individual throughput per sequence period with probability one for a slot-synchronous channel, regardless of the delay offsets among the users. As the sequence period… ▽ More

    Submitted 4 July, 2017; v1 submitted 9 November, 2016; originally announced November 2016.

    Comments: 21 pages, 1 figure, 4 tables

  25. arXiv:1607.08322  [pdf, ps, other

    cs.IT cs.DC

    Cooperative Repair of Multiple Node Failures in Distributed Storage Systems

    Authors: Kenneth W. Shum, Junyu Chen

    Abstract: Cooperative regenerating codes are designed for repairing multiple node failures in distributed storage systems. In contrast to the original repair model of regenerating codes, which are for the repair of single node failure, data exchange among the new nodes is enabled. It is known that further reduction in repair bandwidth is possible with cooperative repair. Currently in the literature, we have… ▽ More

    Submitted 28 July, 2016; originally announced July 2016.

    Comments: Accepted for publication in Int. J. Information and Coding Theory (special issue on Information and Coding Theory for Data Storage). Part of this paper was presented in "Repairing multiple failures in the Suh-Ramchandran regenerating codes", IEEE Symp. on Information Theory, Istanbul, July 2013

  26. arXiv:1604.06567  [pdf, ps, other

    cs.IT

    Concurrent Regenerating Codes and Scalable Application in Network Storage

    Authors: Huayu Zhang, Hui Li, Hanxu Hou, K. W. Shum, ShuoYen Robert Li

    Abstract: To recover simultaneous multiple failures in erasure coded storage systems, Patrick Lee et al introduce concurrent repair based minimal storage regenerating codes to reduce repair traffic. The architecture of this approach is simpler and more practical than that of the cooperative mechanism in non-fully distributed environment, hence this paper unifies such class of regenerating codes as concurren… ▽ More

    Submitted 22 April, 2016; originally announced April 2016.

    Comments: 12 pages, 7 figures

  27. arXiv:1601.05595  [pdf, ps, other

    cs.IT

    Bounds and Constructions of Locally Repairable Codes: Parity-check Matrix Approach

    Authors: Jie Hao, Shu-Tao Xia, Kenneth W. Shum, Bin Chen, Fang-Wei Fu, Yi-Xian Yang

    Abstract: A $q$-ary $(n,k,r)$ locally repairable code (LRC) is an $[n,k,d]$ linear code over $\mathbb{F}_q$ such that every code symbol can be recovered by accessing at most $r$ other code symbols. The well-known Singleton-like bound says that $d \le n-k-\lceil k/r\rceil +2$ and an LRC is said to be optimal if it attains this bound. In this paper, we study the bounds and constructions of LRCs from the view… ▽ More

    Submitted 22 October, 2019; v1 submitted 21 January, 2016; originally announced January 2016.

    Comments: 18 pages

    ACM Class: E.4

  28. HFR Code: A Flexible Replication Scheme for Cloud Storage Systems

    Authors: Bing Zhu, Hui Li, Kenneth W. Shum, Shuo-Yen Robert Li

    Abstract: Fractional repetition (FR) codes are a family of repair-efficient storage codes that provide exact and uncoded node repair at the minimum bandwidth regenerating point. The advantageous repair properties are achieved by a tailor-made two-layer encoding scheme which concatenates an outer maximum-distance-separable (MDS) code and an inner repetition code. In this paper, we generalize the application… ▽ More

    Submitted 12 September, 2015; originally announced September 2015.

    Comments: Accepted for publication in IET Communications, Jul. 2015

    Journal ref: IET Communications, vol. 9, no. 17, pp. 2095-2100, Nov. 2015

  29. arXiv:1306.0710  [pdf, ps, other

    cs.IT

    On the Optimum Cyclic Subcode Chains of $\mathcal{RM}(2,m)^*$ for Increasing Message Length

    Authors: Xiaogang Liu, Yuan Luo, Kenneth W. Shum

    Abstract: The distance profiles of linear block codes can be employed to design variational coding scheme for encoding message with variational length and getting lower decoding error probability by large minimum Hamming distance. %, e.g. the design of TFCI in CDMA and the researches on the second-order Reed-Muller code $\mathcal{RM}(2,m)$, etc. Considering convenience for encoding, we focus on the distan… ▽ More

    Submitted 4 June, 2013; originally announced June 2013.

    Comments: 10pages, 2 tables

  30. arXiv:1305.3358  [pdf, other

    cs.IT

    Symmetry in Distributed Storage Systems

    Authors: Satyajit Thakor, Terence Chan, Kenneth W. Shum

    Abstract: The max-flow outer bound is achievable by regenerating codes for functional repair distributed storage system. However, the capacity of exact repair distributed storage system is an open problem. In this paper, the linear programming bound for exact repair distributed storage systems is formulated. A notion of symmetrical sets for a set of random variables is given and equalities of joint entropie… ▽ More

    Submitted 15 May, 2013; originally announced May 2013.

    Comments: Accepted, ISIT 2013

  31. arXiv:1303.6046  [pdf, ps, other

    cs.IT

    Optimized-Cost Repair in Multi-hop Distributed Storage Systems with Network Coding

    Authors: Majid Gerami, Ming Xiao, Mikael Skoglund, Kenneth W. Shum, Dengsheng Lin

    Abstract: In distributed storage systems reliability is achieved through redundancy stored at different nodes in the network. Then a data collector can reconstruct source information even though some nodes fail. To maintain reliability, an autonomous and efficient protocol should be used to repair the failed node. The repair process causes traffic and consequently transmission cost in the network. Recent re… ▽ More

    Submitted 25 March, 2013; originally announced March 2013.

    Comments: (Submitted)

  32. arXiv:1302.1256  [pdf, ps, other

    cs.IT

    Repairing Multiple Failures in the Suh-Ramchandran Regenerating Codes

    Authors: Junyu Chen, Kenneth W. Shum

    Abstract: Using the idea of interference alignment, Suh and Ramchandran constructed a class of minimum-storage regenerating codes which can repair one systematic or one parity-check node with optimal repair bandwidth. With the same code structure, we show that in addition to single node failure, double node failures can be repaired collaboratively with optimal repair bandwidth as well. We give an example of… ▽ More

    Submitted 14 May, 2013; v1 submitted 5 February, 2013; originally announced February 2013.

    Comments: IEEE Int. Symp. Inf. Theory, 2013

  33. arXiv:1208.2787  [pdf, ps, other

    cs.IT

    Analysis and Construction of Functional Regenerating Codes with Uncoded Repair for Distributed Storage Systems

    Authors: Yuchong Hu, Patrick P. C. Lee, Kenneth W. Shum

    Abstract: Modern distributed storage systems apply redundancy coding techniques to stored data. One form of redundancy is based on regenerating codes, which can minimize the repair bandwidth, i.e., the amount of data transferred when repairing a failed storage node. Existing regenerating codes mainly require surviving storage nodes encode data during repair. In this paper, we study functional minimum storag… ▽ More

    Submitted 21 January, 2013; v1 submitted 14 August, 2012; originally announced August 2012.

    Comments: 9 pages; IEEE INFOCOM (2013)

  34. arXiv:1207.6762  [pdf, ps, other

    cs.IT

    Cooperative Regenerating Codes

    Authors: Kenneth W. Shum, Yuchong Hu

    Abstract: One of the design objectives in distributed storage system is the minimization of the data traffic during the repair of failed storage nodes. By repairing multiple failures simultaneously and cooperatively, further reduction of repair traffic is made possible. A closed-form expression of the optimal tradeoff between the repair traffic and the amount of storage in each node for cooperative repair i… ▽ More

    Submitted 18 July, 2013; v1 submitted 29 July, 2012; originally announced July 2012.

    Comments: 29 pages, 13 figures, submitted to IEEE Trans. Inform. Theory

  35. arXiv:1205.5324  [pdf, ps, other

    cs.IT cs.CC

    Linear Network Code for Erasure Broadcast Channel with Feedback: Complexity and Algorithms

    Authors: Chi Wan Sung, Linyu Huang, Ho Yuet Kwan, Kenneth W. Shum

    Abstract: This paper investigates the construction of linear network codes for broadcasting a set of data packets to a number of users. The links from the source to the users are modeled as independent erasure channels. Users are allowed to inform the source node whether a packet is received correctly via feedback channels. In order to minimize the number of packet transmissions until all users have receive… ▽ More

    Submitted 8 December, 2013; v1 submitted 23 May, 2012; originally announced May 2012.

    Comments: 18 pages, 11 figures, submitted to IEEE Trans. Information Theory

  36. arXiv:1202.0859  [pdf, other

    cs.IT cs.CR

    Imperfect Secrecy in Wiretap Channel II

    Authors: Fan Cheng, Raymond W. Yeung, Kenneth W. Shum

    Abstract: In a point-to-point communication system which consists of a sender, a receiver and a set of noiseless channels, the sender wishes to transmit a private message to the receiver through the channels which may be eavesdropped by a wiretapper. The set of wiretap sets is arbitrary. The wiretapper can access any one but not more than one wiretap set. From each wiretap set, the wiretapper can obtain som… ▽ More

    Submitted 12 October, 2014; v1 submitted 3 February, 2012; originally announced February 2012.

    Comments: Submitted to the IEEE Transactions on Information Theory

  37. arXiv:1107.5645  [pdf, ps, other

    cs.IT cs.DC

    Minimization of Storage Cost in Distributed Storage Systems with Repair Consideration

    Authors: Quan Yu, Kenneth W. Shum, Chi Wan Sung

    Abstract: In a distributed storage system, the storage costs of different storage nodes, in general, can be different. How to store a file in a given set of storage nodes so as to minimize the total storage cost is investigated. By analyzing the min-cut constraints of the information flow graph, the feasible region of the storage capacities of the nodes can be determined. The storage cost minimization can t… ▽ More

    Submitted 28 July, 2011; originally announced July 2011.

    Comments: 5 pages, 4 figures, to appear in Proc. IEEE GLOBECOM, 2011

  38. Generation of Innovative and Sparse Encoding Vectors for Broadcast Systems with Feedback

    Authors: Ho Yuet Kwan, Kenneth W. Shum, Chi Wan Sung

    Abstract: In the application of linear network coding to wireless broadcasting with feedback, we prove that the problem of determining the existence of an innovative encoding vector is NP-complete when the finite field size is two. When the finite field size is larger than or equal to the number of users, it is shown that we can always find an encoding vector which is both innovative and sparse. The sparsit… ▽ More

    Submitted 24 May, 2011; v1 submitted 17 February, 2011; originally announced February 2011.

    Comments: 5 pages, 4 figures, accepted for publication in the Proc. of IEEE ISIT 2011

  39. arXiv:1102.1609  [pdf, ps, other

    cs.IT cs.DC

    Exact Minimum-Repair-Bandwidth Cooperative Regenerating Codes for Distributed Storage Systems

    Authors: Kenneth W. Shum, Yuchong Hu

    Abstract: In order to provide high data reliability, distributed storage systems disperse data with redundancy to multiple storage nodes. Regenerating codes is a new class of erasure codes to introduce redundancy for the purpose of improving the data repair performance in distributed storage. Most of the studies on regenerating codes focus on the single-failure recovery, but it is not uncommon to see two or… ▽ More

    Submitted 31 May, 2011; v1 submitted 8 February, 2011; originally announced February 2011.

    Comments: 5 pages, 4 figures, presented at IEEE ISIT 2011

  40. Cooperative Regenerating Codes for Distributed Storage Systems

    Authors: Kenneth W. Shum

    Abstract: When there are multiple node failures in a distributed storage system, regenerating the failed storage nodes individually in a one-by-one manner is suboptimal as far as repair-bandwidth minimization is concerned. If data exchange among the newcomers is enabled, we can get a better tradeoff between repair bandwidth and the storage per node. An explicit and optimal construction of cooperative regene… ▽ More

    Submitted 7 February, 2011; v1 submitted 27 January, 2011; originally announced January 2011.

    Comments: 5 pages, 7 figures, to appear in Proc. IEEE ICC, 2011

  41. Construction and Applications of CRT Sequences

    Authors: Kenneth W. Shum, Wing Shing Wong

    Abstract: Protocol sequences are used for channel access in the collision channel without feedback. Each user accesses the channel according to a deterministic zero-one pattern, called the protocol sequence. In order to minimize fluctuation of throughput due to delay offsets, we want to construct protocol sequences whose pairwise Hamming cross-correlation is as close to a constant as possible. In this paper… ▽ More

    Submitted 8 November, 2010; v1 submitted 29 June, 2010; originally announced June 2010.

    Comments: 16 pages, 5 figures. Some typos in Section V are corrected

    Journal ref: IEEE Trans. on Information Theory, vol. 56, no. 11, p.5780-5795, Nov, 2010

  42. arXiv:1004.4713  [pdf, ps, other

    cs.IT cs.DM

    Construction of Short Protocol Sequences with Worst-Case Throughput Guarantee

    Authors: Kenneth W. Shum, Wing Shing Wong

    Abstract: Protocol sequences are used in channel access for the multiple-access collision channel without feedback. A new construction of protocol sequences with a guarantee of worst-case system throughput is proposed. The construction is based on Chinese remainder theorem. The Hamming crosscorrelation is proved to be concentrated around the mean. The sequence period is much shorter than existing protocol s… ▽ More

    Submitted 27 April, 2010; originally announced April 2010.

    Comments: Conference paper submitted to 2010 IEEE Int. Symp. on Information Theory

  43. arXiv:1003.0953  [pdf, ps, other

    cs.IT

    Information Flow in One-Dimensional Vehicular Ad Hoc Networks

    Authors: Chi Wan Sung, Kenneth W. Shum, Wing Ho Yuen

    Abstract: We consider content distribution in vehicular ad hoc networks. We assume that a file is encoded using fountain code, and the encoded message is cached at infostations. Vehicles are allowed to download data packets from infostations, which are placed along a highway. In addition, two vehicles can exchange packets with each other when they are in proximity. As long as a vehicle has received enough… ▽ More

    Submitted 3 March, 2010; originally announced March 2010.

  44. A General Upper Bound on the Size of Constant-Weight Conflict-Avoiding Codes

    Authors: Kenneth W. Shum, Wing Shing Wong, Chung Shue Chen

    Abstract: Conflict-avoiding codes are used in the multiple-access collision channel without feedback. The number of codewords in a conflict-avoiding code is the number of potential users that can be supported in the system. In this paper, a new upper bound on the size of conflict-avoiding codes is proved. This upper bound is general in the sense that it is applicable to all code lengths and all Hamming weig… ▽ More

    Submitted 6 November, 2010; v1 submitted 27 October, 2009; originally announced October 2009.

    Comments: 10 pages, 1 figure

    Journal ref: IEEE Trans. Inform. Theory, vol. 56, no.7, p.3265-3276, Jul, 2010

  45. arXiv:0909.5007  [pdf, ps, other

    cs.IT

    Achieving Capacity of Bi-Directional Tandem Collision Network by Joint Medium-Access Control and Channel-Network Coding

    Authors: Kenneth W. Shum, Chi Wan Sung

    Abstract: In ALOHA-type packetized network, the transmission times of packets follow a stochastic process. In this paper, we advocate a deterministic approach for channel multiple-access. Each user is statically assigned a periodic protocol signal, which takes value either zero or one, and transmit packets whenever the value of the protocol signal is equal to one. On top of this multiple-access protocol,… ▽ More

    Submitted 28 September, 2009; originally announced September 2009.

    Comments: Submitted to IEEE Trans. Information Theory

  46. arXiv:cs/0611015  [pdf, ps, other

    cs.IT

    On the Fairness of Rate Allocation in Gaussian Multiple Access Channel and Broadcast Channel

    Authors: Kenneth W. Shum, Chi Wan Sung

    Abstract: The capacity region of a channel consists of all achievable rate vectors. Picking a particular point in the capacity region is synonymous with rate allocation. The issue of fairness in rate allocation is addressed in this paper. We review several notions of fairness, including max-min fairness, proportional fairness and Nash bargaining solution. Their efficiencies for general multiuser channels… ▽ More

    Submitted 3 November, 2006; originally announced November 2006.

    Comments: 26 pages