Skip to main content

Showing 1–50 of 69 results for author: Valentí, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2401.11807  [pdf, ps, other

    math.LO cs.LO math.CO

    The weakness of finding descending sequences in ill-founded linear orders

    Authors: Jun Le Goh, Arno Pauly, Manlio Valenti

    Abstract: We prove that the Weihrauch degree of the problem of finding a bad sequence in a non-well quasi order ($\mathsf{BS}$) is strictly above that of finding a descending sequence in an ill-founded linear order ($\mathsf{DS}$). This corrects our mistaken claim in arXiv:2010.03840, which stated that they are Weihrauch equivalent. We prove that König's lemma $\mathsf{KL}$ and the problem… ▽ More

    Submitted 2 July, 2024; v1 submitted 22 January, 2024; originally announced January 2024.

    MSC Class: 03D30 03D78 06A75

  2. arXiv:2311.12676  [pdf, other

    math.LO cs.LO

    Minimal covers in the Weihrauch degrees

    Authors: Steffen Lempp, Joseph S. Miller, Arno Pauly, Mariya I. Soskova, Manlio Valenti

    Abstract: In this paper, we study the existence of minimal covers and strong minimal covers in the Weihrauch degrees. We characterize when a problem $f$ is a minimal cover or strong minimal cover of a problem $h$. We show that strong minimal covers only exist in the cone below $\mathsf{id}$ and that the Weihrauch lattice above $\mathsf{id}$ is dense. From this, we conclude that the degree of $\mathsf{id}$ i… ▽ More

    Submitted 21 November, 2023; originally announced November 2023.

    MSC Class: 03D30 03D78

  3. arXiv:2311.04215  [pdf, other

    cs.LG cs.AI eess.SP

    Wearable data from subjects playing Super Mario, sitting university exams, or performing physical exercise help detect acute mood episodes via self-supervised learning

    Authors: Filippo Corponi, Bryan M. Li, Gerard Anmella, Clàudia Valenzuela-Pascual, Ariadna Mas, Isabella Pacchiarotti, Marc Valentí, Iria Grande, Antonio Benabarre, Marina Garriga, Eduard Vieta, Allan H Young, Stephen M. Lawrie, Heather C. Whalley, Diego Hidalgo-Mazzei, Antonio Vergari

    Abstract: Personal sensing, leveraging data passively and near-continuously collected with wearables from patients in their ecological environment, is a promising paradigm to monitor mood disorders (MDs), a major determinant of worldwide disease burden. However, collecting and annotating wearable data is very resource-intensive. Studies of this kind can thus typically afford to recruit only a couple dozens… ▽ More

    Submitted 7 November, 2023; originally announced November 2023.

  4. arXiv:2311.00791  [pdf, ps, other

    cs.MA

    Where to Deploy an Airborne Relay in Unknown Environments: Feasible Locations for Throughput and LoS Enhancement

    Authors: Juan David Pabon, Matthew C. Valenti, Xi Yu

    Abstract: The deployment of heterogeneous teams of both air and ground mobile assets combines the advantages of mobility, sensing capability, and operational duration when performing complex tasks. Air assets in such teams act to relay information between ground assets but must maintain unblocked paths to enable high-capacity communication modes. Obstacles in the operational environment may block the line o… ▽ More

    Submitted 1 November, 2023; originally announced November 2023.

    Comments: IEEE Military Communications Conference 2023

  5. arXiv:2306.12572  [pdf, ps, other

    cs.CV eess.SP

    Uniqueness of Iris Pattern Based on AR Model

    Authors: Katelyn M. Hampel, **yu Zuo, Priyanka Das, Natalia A. Schmid, Stephanie Schuckers, Joseph Skufca, Matthew C. Valenti

    Abstract: The assessment of iris uniqueness plays a crucial role in analyzing the capabilities and limitations of iris recognition systems. Among the various methodologies proposed, Daugman's approach to iris uniqueness stands out as one of the most widely accepted. According to Daugman, uniqueness refers to the iris recognition system's ability to enroll an increasing number of classes while maintaining a… ▽ More

    Submitted 21 June, 2023; originally announced June 2023.

  6. Empirical Assessment of End-to-End Iris Recognition System Capacity

    Authors: Priyanka Das, Richard Plesh, Veeru Talreja, Natalia Schmid, Matthew Valenti, Joseph Skufca, Stephanie Schuckers

    Abstract: Iris is an established modality in biometric recognition applications including consumer electronics, e-commerce, border security, forensics, and de-duplication of identity at a national scale. In light of the expanding usage of biometric recognition, identity clash (when templates from two different people match) is an imperative factor of consideration for a system's deployment. This study explo… ▽ More

    Submitted 20 March, 2023; originally announced March 2023.

    Journal ref: IEEE Transactions on Biometrics, Behavior, and Identity Science 2023

  7. arXiv:2211.10589  [pdf, ps, other

    cs.RO cs.ET cs.MA eess.SY

    Air-Aided Communication Between Ground Assets in a Poisson Forest

    Authors: Juan David Pabon, Shaikha Alkandari, Matthew C. Valenti, Xi Yu

    Abstract: Ground assets deployed in a cluttered environment with randomized obstacles (e.g., a forest) may experience line of sight (LoS) obstruction due to those obstacles. Air assets can be deployed in the vicinity to aid the communication by establishing two-hop paths between the ground assets. Obstacles that are taller than a position-dependent critical height may still obstruct the LoS between a ground… ▽ More

    Submitted 19 November, 2022; originally announced November 2022.

    Comments: Military Communications Conference, MILCOM 2022

  8. LDD: A Dataset for Grape Diseases Object Detection and Instance Segmentation

    Authors: Leonardo Rossi, Marco Valenti, Sara Elisabetta Legler, Andrea Prati

    Abstract: The Instance Segmentation task, an extension of the well-known Object Detection task, is of great help in many areas, such as precision agriculture: being able to automatically identify plant organs and the possible diseases associated with them, allows to effectively scale and automate crop monitoring and its diseases control. To address the problem related to early disease detection and diagnosi… ▽ More

    Submitted 21 June, 2022; originally announced June 2022.

    Journal ref: International Conference on Image Analysis and Processing. Springer, Cham, 2022

  9. Algebraic properties of the first-order part of a problem

    Authors: Giovanni Solda, Manlio Valenti

    Abstract: In this paper we study the notion of first-order part of a computational problem, first introduced by Dzhafarov, Solomon, and Yokoyama, which captures the "strongest computational problem with codomain $\mathbb{N}$ that is Weihrauch reducible to $f$". This operator is very useful to prove separation results, especially at the higher levels of the Weihrauch lattice. We explore the first-order part… ▽ More

    Submitted 25 March, 2023; v1 submitted 30 March, 2022; originally announced March 2022.

    Comments: 41 pages. Updated after reviewer comments

    MSC Class: 03D78 03D30 03D55

    Journal ref: Annals of Pure and Applied Logic Volume 174, Issue 7, July 2023, 103270

  10. arXiv:2111.01325  [pdf, other

    cs.CV eess.IV

    Attribute-Based Deep Periocular Recognition: Leveraging Soft Biometrics to Improve Periocular Recognition

    Authors: Veeru Talreja, Nasser M. Nasrabadi, Matthew C. Valenti

    Abstract: In recent years, periocular recognition has been developed as a valuable biometric identification approach, especially in wild environments (for example, masked faces due to COVID-19 pandemic) where facial recognition may not be applicable. This paper presents a new deep periocular recognition framework called attribute-based deep periocular recognition (ADPR), which predicts soft biometrics and i… ▽ More

    Submitted 1 November, 2021; originally announced November 2021.

    Comments: Accepted to be published in WACV 2022

  11. arXiv:2111.00603  [pdf, other

    cs.IT

    Optimization of a Millimeter-Wave UAV-to-Ground Network in Urban Deployments

    Authors: Enass Hriba, Matthew C. Valenti, Robert W. Heath Jr

    Abstract: An urban tactical wireless network is considered wherein the base stations are situated on unmanned aerial vehicles (UAVs) that provide connectivity to ground assets such as vehicles located on city streets. The UAVs are assumed to be randomly deployed at a fixed height according to a two-dimensional point process. Millimeter-wave (mmWave) frequencies are used to avail of large available bandwidth… ▽ More

    Submitted 31 October, 2021; originally announced November 2021.

  12. arXiv:2107.13742  [pdf, other

    cs.CV cs.AI

    Profile to Frontal Face Recognition in the Wild Using Coupled Conditional GAN

    Authors: Fariborz Taherkhani, Veeru Talreja, Jeremy Dawson, Matthew C. Valenti, Nasser M. Nasrabadi

    Abstract: In recent years, with the advent of deep-learning, face recognition has achieved exceptional success. However, many of these deep face recognition models perform much better in handling frontal faces compared to profile faces. The major reason for poor performance in handling of profile faces is that it is inherently difficult to learn pose-invariant deep representations that are useful for profil… ▽ More

    Submitted 29 July, 2021; originally announced July 2021.

    Comments: arXiv admin note: substantial text overlap with arXiv:2005.02166

  13. Deep Hashing for Secure Multimodal Biometrics

    Authors: Veeru Talreja, Matthew Valenti, Nasser Nasrabadi

    Abstract: When compared to unimodal systems, multimodal biometric systems have several advantages, including lower error rate, higher accuracy, and larger population coverage. However, multimodal systems have an increased demand for integrity and privacy because they must store multiple biometric traits associated with each user. In this paper, we present a deep learning framework for feature-level fusion t… ▽ More

    Submitted 29 December, 2020; originally announced December 2020.

    Journal ref: IEEE Transactions on Information Forensics and Security,vol.16,pp.1306-1321,2021

  14. arXiv:2010.03840  [pdf, ps, other

    math.LO cs.LO math.CO

    Finding descending sequences through ill-founded linear orders

    Authors: Jun Le Goh, Arno Pauly, Manlio Valenti

    Abstract: In this work we investigate the Weihrauch degree of the problem $\mathsf{DS}$ of finding an infinite descending sequence through a given ill-founded linear order, which is shared by the problem $\mathsf{BS}$ of finding a bad sequence through a given non-well quasi-order. We show that $\mathsf{DS}$, despite being hard to solve (it has computable inputs with no hyperarithmetic solution), is rather w… ▽ More

    Submitted 24 January, 2024; v1 submitted 8 October, 2020; originally announced October 2020.

    Comments: Added errata. The problems $\mathsf{DS}$ and $\mathsf{BS}$ are not Weihrauch-equivalent, and the separation has been proved in arXiv:2401.11807. Please check the errata for the full list of changes

    MSC Class: 03D30 03D78 06A75

    Journal ref: J. symb. log. 86 (2021) 817-854

  15. arXiv:2005.02166  [pdf, other

    cs.CV

    PF-cpGAN: Profile to Frontal Coupled GAN for Face Recognition in the Wild

    Authors: Fariborz Taherkhani, Veeru Talreja, Jeremy Dawson, Matthew C. Valenti, Nasser M. Nasrabadi

    Abstract: In recent years, due to the emergence of deep learning, face recognition has achieved exceptional success. However, many of these deep face recognition models perform relatively poorly in handling profile faces compared to frontal faces. The major reason for this poor performance is that it is inherently difficult to learn large pose invariant deep representations that are useful for profile face… ▽ More

    Submitted 25 April, 2020; originally announced May 2020.

  16. arXiv:2004.03378  [pdf, other

    cs.CV

    Error-Corrected Margin-Based Deep Cross-Modal Hashing for Facial Image Retrieval

    Authors: Fariborz Taherkhani, Veeru Talreja, Matthew C. Valenti, Nasser M. Nasrabadi

    Abstract: Cross-modal hashing facilitates map** of heterogeneous multimedia data into a common Hamming space, which can beutilized for fast and flexible retrieval across different modalities. In this paper, we propose a novel cross-modal hashingarchitecture-deep neural decoder cross-modal hashing (DNDCMH), which uses a binary vector specifying the presence of certainfacial attributes as an input query to… ▽ More

    Submitted 3 April, 2020; originally announced April 2020.

    Comments: IEEE TRANSACTIONS ON BIOMETRICS, BEHAVIOR, AND IDENTITY SCIENCE, 2020

  17. arXiv:2003.04245  [pdf, ps, other

    math.LO cs.LO math.CO

    The open and clopen Ramsey theorems in the Weihrauch lattice

    Authors: Alberto Marcone, Manlio Valenti

    Abstract: We investigate the uniform computational content of the open and clopen Ramsey theorems in the Weihrauch lattice. While they are known to be equivalent to $\mathrm{ATR_0}$ from the point of view of reverse mathematics, there is not a canonical way to phrase them as multivalued functions. We identify 8 different multivalued functions (5 corresponding to the open Ramsey theorem and 3 corresponding t… ▽ More

    Submitted 12 January, 2021; v1 submitted 9 March, 2020; originally announced March 2020.

    Comments: Improved the presentation of lemmas 4.3 and 4.13. To appear in The Journal of Symbolic Logic

    MSC Class: 03D78 03D30 03B30 05C55

    Journal ref: J. symb. log. 86 (2021) 316-351

  18. arXiv:1912.01767  [pdf, other

    cs.IT eess.SP

    Millimeter Wave Massive MIMO Downlink Per-Group Communications with Hybrid Linear Precoding

    Authors: Thomas Ketseoglou, Matthew. C. Valenti, Ender Ayanoglu

    Abstract: We address the problem of analyzing and classifying in groups the downlink channel environment in a millimeter-wavelength cell, accounting for path loss, multipath fading, and User Equipment (UE) blocking, by employing a hybrid propagation and multipath fading model, thus using accurate inter-group interference modeling. The base station (BS) employs a large Uniform Planar Array (UPA) to facilitat… ▽ More

    Submitted 4 February, 2020; v1 submitted 3 December, 2019; originally announced December 2019.

  19. arXiv:1911.05490  [pdf, other

    cs.IT eess.SP

    The Potential Gains of Macrodiversity in mmWave Cellular Networks with Correlated Blocking

    Authors: Enass Hriba, Matthew C. Valenti

    Abstract: At millimeter wave (mmWave) frequencies, signals are prone to blocking by objects in the environment, which causes paths to go from line-of-sight (LOS) to non-LOS (NLOS). We consider macrodiversity as a strategy to improve the performance of mmWave cellular systems, where the user attempts to connect with two or more base stations. An accurate analysis of macrodiversity must account for the possib… ▽ More

    Submitted 1 November, 2019; originally announced November 2019.

  20. arXiv:1908.02706  [pdf, other

    cs.CV

    Zero-Shot Deep Hashing and Neural Network Based Error Correction for Face Template Protection

    Authors: Veeru Talreja, Matthew C. Valenti, Nasser M. Nasrabadi

    Abstract: In this paper, we present a novel architecture that integrates a deep hashing framework with a neural network decoder (NND) for application to face template protection. It improves upon existing face template protection techniques to provide better matching performance with one-shot and multi-shot enrollment. A key novelty of our proposed architecture is that the framework can also be used with ze… ▽ More

    Submitted 5 August, 2019; originally announced August 2019.

    Comments: arXiv admin note: text overlap with arXiv:1902.04149

  21. arXiv:1908.01790  [pdf, other

    cs.CV cs.LG eess.IV

    Attribute-Guided Coupled GAN for Cross-Resolution Face Recognition

    Authors: Veeru Talreja, Fariborz Taherkhani, Matthew C Valenti, Nasser M Nasrabadi

    Abstract: In this paper, we propose a novel attribute-guided cross-resolution (low-resolution to high-resolution) face recognition framework that leverages a coupled generative adversarial network (GAN) structure with adversarial training to find the hidden relationship between the low-resolution and high-resolution images in a latent common embedding subspace. The coupled GAN framework consists of two sub-… ▽ More

    Submitted 5 August, 2019; originally announced August 2019.

  22. arXiv:1902.04149  [pdf, other

    cs.CV cs.LG eess.IV

    Learning to Authenticate with Deep Multibiometric Hashing and Neural Network Decoding

    Authors: Veeru Talreja, Sobhan Soleymani, Matthew C. Valenti, Nasser M. Nasrabadi

    Abstract: In this paper, we propose a novel multimodal deep hashing neural decoder (MDHND) architecture, which integrates a deep hashing framework with a neural network decoder (NND) to create an effective multibiometric authentication system. The MDHND consists of two separate modules: a multimodal deep hashing (MDH) module, which is used for feature-level fusion and binarization of multiple biometrics, an… ▽ More

    Submitted 7 March, 2019; v1 submitted 11 February, 2019; originally announced February 2019.

    Comments: To be published in Proc. IEEE ICC 2019

  23. arXiv:1902.04139  [pdf, other

    cs.CV cs.IR cs.LG

    Using Deep Cross Modal Hashing and Error Correcting Codes for Improving the Efficiency of Attribute Guided Facial Image Retrieval

    Authors: Veeru Talreja, Fariborz Taherkhani, Matthew C. Valenti, Nasser M. Nasrabadi

    Abstract: With benefits of fast query speed and low storage cost, hashing-based image retrieval approaches have garnered considerable attention from the research community. In this paper, we propose a novel Error-Corrected Deep Cross Modal Hashing (CMH-ECC) method which uses a bitmap specifying the presence of certain facial attributes as an input query to retrieve relevant face images from the database. In… ▽ More

    Submitted 11 February, 2019; originally announced February 2019.

    Comments: To be published in Proc. IEEE Global SIP 2018

  24. arXiv:1809.08372  [pdf, other

    cs.IT

    The Impact of Correlated Blocking on Millimeter-Wave Personal Networks

    Authors: Enass Hriba, Matthew C. Valenti

    Abstract: Due to its potential to support high data rates at low latency with reasonable interference isolation, millimeter-wave (mmWave) communications has emerged as a promising solution for wireless personal-area networks (WPAN) and an enabler for emerging applications such as high-resolution untethered virtual reality. At mmWave, signals are prone to blockage by objects in the environment, including hum… ▽ More

    Submitted 21 September, 2018; originally announced September 2018.

    Comments: 7 pages, 8 figures, in IEEE Military Commun. Conf. (MILCOM), 2018

  25. arXiv:1807.03921  [pdf, ps, other

    cs.IT cs.NI

    Outage Correlation in Finite and Clustered Wireless Networks

    Authors: S. Talarico, M. C. Valenti, M. Di Renzo

    Abstract: Future wireless networks are expected to adopt many different network technologies and architectures that promise to greatly enhance data rate and provide ubiquitous coverage for end users, all while enabling higher spectral efficiency. These benefits come with an increased risk of co-channel interference and possible correlation in the aggregated interference, which impacts the communication perf… ▽ More

    Submitted 19 July, 2018; v1 submitted 10 July, 2018; originally announced July 2018.

    Comments: 7 pages, and 3 figures - in IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC) 2018

  26. arXiv:1801.10370  [pdf, other

    cs.IT

    Noncoherent LDPC-Coded Physical-Layer Network Coding using Multitone FSK

    Authors: Terry Ferrett, Matthew C. Valenti

    Abstract: A noncoherent two-way relaying system is developed using physical-layer network coding for improved throughput over conventional relaying in a fading channel. Energy-efficient noncoherent operation is achieved using multitone frequency shift keying (FSK). A novel soft-output demodulator is developed for the relay, and corresponding achievable exchange rates are found for Rayleigh fading and AWGN c… ▽ More

    Submitted 31 January, 2018; originally announced January 2018.

  27. arXiv:1710.09183  [pdf, other

    cs.DC cs.CV

    Biometrics-as-a-Service: A Framework to Promote Innovative Biometric Recognition in the Cloud

    Authors: Veeru Talreja, Terry Ferrett, Matthew C. Valenti, Arun Ross

    Abstract: Biometric recognition, or simply biometrics, is the use of biological attributes such as face, fingerprints or iris in order to recognize an individual in an automated manner. A key application of biometrics is authentication; i.e., using said biological attributes to provide access by verifying the claimed identity of an individual. This paper presents a framework for Biometrics-as-a-Service (Baa… ▽ More

    Submitted 25 October, 2017; originally announced October 2017.

  28. arXiv:1709.00521  [pdf, ps, other

    cs.IT

    Accurately Accounting for Random Blockage in Device-to-Device mmWave Networks

    Authors: Enass Hriba, Matthew C. Valenti, Kiran Venugopal, Robert W. Heath, Jr

    Abstract: Millimeter-wave systems are characterized by the use of highly directional antennas and the presence of blockages, which significantly alter the path-loss and small-scale fading parameters. The received power of each interferer depends on the direction it points and whether it is line-of-sight (LOS), non-LOS (i.e., partially blocked), or completely blocked. While interferers that are sufficiently… ▽ More

    Submitted 1 September, 2017; originally announced September 2017.

    Comments: Accepted by GLOBECOM 2017, Singapore

  29. arXiv:1708.02314  [pdf, other

    cs.AI cs.CV cs.IT

    Multibiometric Secure System Based on Deep Learning

    Authors: Veeru Talreja, Matthew C. Valenti, Nasser M. Nasrabadi

    Abstract: In this paper, we propose a secure multibiometric system that uses deep neural networks and error-correction coding. We present a feature-level fusion framework to generate a secure multibiometric template from each user's multiple biometrics. Two fusion architectures, fully connected architecture and bilinear architecture, are implemented to develop a robust multibiometric shared representation.… ▽ More

    Submitted 7 August, 2017; originally announced August 2017.

    Comments: To be published in Proc. IEEE Global SIP 2017

  30. arXiv:1703.01432  [pdf, other

    cs.IT

    Noncoherent Analog Network Coding using LDPC-coded FSK

    Authors: Terry Ferrett, Matthew C. Valenti

    Abstract: Analog network coding (ANC) is a throughput increasing technique for the two-way relay channel (TWRC) whereby two end nodes transmit simultaneously to a relay at the same time and band, followed by the relay broadcasting the received sum of signals to the end nodes. Coherent reception under ANC is challenging due to requiring oscillator synchronization for all nodes, a problem further exacerbated… ▽ More

    Submitted 4 March, 2017; originally announced March 2017.

    Comments: Submitted to IEEE International Conference on Communications (ICC) 2017

  31. arXiv:1702.00776  [pdf, ps, other

    cs.IT

    Complexity-Aware Scheduling for an LDPC Encoded C-RAN Uplink

    Authors: Kyle Whetzel, Matthew C. Valenti

    Abstract: Centralized Radio Access Network (C-RAN) is a new paradigm for wireless networks that centralizes the signal processing in a computing cloud, allowing commodity computational resources to be pooled. While C-RAN improves utilization and efficiency, the computational load occasionally exceeds the available resources, creating a computational outage. This paper provides a mathematical characterizatio… ▽ More

    Submitted 2 February, 2017; originally announced February 2017.

    Comments: Conference on Information Sciences and Systems (CISS) 2017, to appear

  32. arXiv:1610.08173  [pdf, other

    cs.IT

    Controlled Barrage Regions: Stochastic Modeling, Analysis, and Optimization

    Authors: Salvatore Talarico, Matthew C. Valenti, Thomas R. Halford

    Abstract: A barrage relay network (BRN) is a broadcast oriented ad hoc network involving autonomous cooperative communication, a slotted time-division frame format, and a coarse slot-level synchronization. While inherently a broadcast protocol, BRNs can support unicast transmission by superimposing a plurality of controlled barrage regions (CBRs) onto the network. Within each CBRs, a new packet is injected… ▽ More

    Submitted 6 November, 2016; v1 submitted 26 October, 2016; originally announced October 2016.

    Comments: 7 pages, 3 images, in Military Communication Conference (MILCOM). arXiv admin note: substantial text overlap with arXiv:1408.5928

  33. Analysis of a Frequency-Hop** Millimeter-Wave Cellular Uplink

    Authors: Don Torrieri, Salvatore Talarico, Matthew C. Valenti

    Abstract: Fifth-generation (5G) cellular networks are expected to exhibit at least three primary physical-layer differences relative to fourth-generation ones: millimeter-wave propagation, massive antenna arrays, and densification of base stations. As in fourth-generation systems, such as LTE, 5G systems are likely to continue to use single-carrier frequency division multiple-access (SC-FDMA) on the uplink… ▽ More

    Submitted 7 August, 2016; v1 submitted 27 July, 2016; originally announced July 2016.

    Comments: 24 pages, 10 figures, 1 Table, 23 references, accepted to IEEE Transactions on Wireless Communications

  34. Frequency Hop** on a 5G Millimeter-Wave Uplink

    Authors: Salvatore Talarico, Matthew C. Valenti

    Abstract: In order to overcome the anticipated tremendous growth in the volume of mobile data traffic, the next generation of cellular networks will need to exploit the large bandwidth offered by the millimeter-wave (mmWave) band. A key distinguishing characteristic of mmWave is its use of highly directional and steerable antennas. In addition, future networks will be highly densified through the proliferat… ▽ More

    Submitted 10 December, 2015; v1 submitted 1 December, 2015; originally announced December 2015.

    Comments: 5 pages, 1 table and 4 figures, accepted to IEEE Asilomar Conf. on Signals, Sys, & Computers (Asilomar), 2015

  35. arXiv:1512.02819  [pdf, other

    cs.IT

    Reduced Complexity Detection for Network-Coded Slotted ALOHA using Sphere Decoding

    Authors: Terry Ferrett, Matthew C. Valenti

    Abstract: Network-coded slotted ALOHA (NCSA) is a re- finement to the classic slotted ALOHA protocol which im- proves throughput by enabling multiple source transmissions per ALOHA slot using physical-layer network coding (PNC). The receiver detects the network-coded combination of bits during every slot and recovers information bits by solving a system of linear equations. This work develops a receiver cap… ▽ More

    Submitted 9 December, 2015; originally announced December 2015.

    Comments: 5 pages, submitted to Asilomar conference 2015

  36. arXiv:1512.00506  [pdf, other

    cs.IT

    Analysis of Millimeter Wave Networked Wearables in Crowded Environments

    Authors: Kiran Venugopal, Matthew C. Valenti, Robert W. Heath Jr

    Abstract: The millimeter wave (mmWave) band has the potential to provide high throughput among wearable devices. When mmWave wearable networks are used in crowded environments, such as on a bus or train, antenna directivity and orientation hold the key to achieving Gbps rates. Previous work using stochastic geometry often assumes an infinite number of interfering nodes drawn from a Poisson Point Process (PP… ▽ More

    Submitted 1 December, 2015; originally announced December 2015.

    Comments: 5 pages, 7 figures. Presented at Asilomar Conference on Signals, Systems, and Computers, Nov. 2015

  37. Performance Comparisons of Geographic Routing Protocols in Mobile Ad Hoc Networks

    Authors: Don Torrieri, Salvatore Talarico, Matthew C. Valenti

    Abstract: Geographic routing protocols greatly reduce the requirements of topology storage and provide flexibility in the accommodation of the dynamic behavior of mobile ad hoc networks. This paper presents performance evaluations and comparisons of two geographic routing protocols and the popular AODV protocol. The tradeoffs among the average path reliabilities, average conditional delays, average conditio… ▽ More

    Submitted 3 September, 2015; originally announced September 2015.

    Comments: 11 pages, 13 figures, to appear on IEEE Transactions On Communications

  38. Performance Analysis of Fifth-Generation Cellular Uplink

    Authors: Don Torrieri, Salvatore Talarico, Matthew C. Valenti

    Abstract: Fifth-generation cellular networks are expected to exhibit at least three primary physical-layer differences relative to fourth-generation ones: millimeter-wave propagation, antenna-array directionality, and densification of base stations. In this paper, the effects of these differences on the performance of single-carrier frequency-domain multiple-access uplink systems with frequency hop** are… ▽ More

    Submitted 24 August, 2015; originally announced August 2015.

    Comments: 6 pages, 5 figures, IEEE Military Commun. Conf. (MILCOM), 2015

  39. arXiv:1508.05694  [pdf, ps, other

    cs.IT cs.NI

    Optimization of an Adaptive Frequency-Hop** Network

    Authors: Salvatore Talarico, Matthew C. Valenti, Don Torrieri

    Abstract: This paper proposes a methodology for optimizing a frequency-hop** network that uses continuous-phase frequency-shift keying and adaptive capacity-approaching channel coding. The optimization takes into account the spatial distribution of the interfering mobiles, Nakagami fading, and lognormal shadowing. It includes the effects of both co-channel interference and adjacent-channel interference, w… ▽ More

    Submitted 24 August, 2015; originally announced August 2015.

    Comments: 6 pages, 4 figures, 1 table, IEEE Military Commun. Conf. (MILCOM), 2015

  40. arXiv:1507.01971  [pdf, ps, other

    cs.NI cs.IT

    Computationally Aware Sum-Rate Optimal Scheduling for Centralized Radio Access Networks

    Authors: Peter Rost, Andreas Maeder, Matthew C. Valenti, Salvatore Talarico

    Abstract: In a centralized or cloud radio access network, certain portions of the digital baseband processing of a group of several radio access points are executed at a central data center. Centralizing the processing improves the flexibility, scalability, and utilization of computational assets. However, the performance depends critically on how the limited data processing resources are allocated to serve… ▽ More

    Submitted 24 August, 2015; v1 submitted 7 July, 2015; originally announced July 2015.

    Comments: 6 pages, 5 figures, 1 table, IEEE Global Telecommunication Conference (GLOBECOM), 2015

  41. Device-to-Device Millimeter Wave Communications: Interference, Coverage, Rate, and Finite Topologies

    Authors: Kiran Venugopal, Matthew C. Valenti, Robert W. Heath Jr

    Abstract: Emerging applications involving device-to-device communication among wearable electronics require Gbps throughput, which can be achieved by utilizing millimeter wave (mmWave) frequency bands. When many such communicating devices are indoors in close proximity, like in a train car or airplane cabin, interference can be a serious impairment. This paper uses stochastic geometry to analyze the perform… ▽ More

    Submitted 9 June, 2016; v1 submitted 23 June, 2015; originally announced June 2015.

    Comments: 32 pages, 17 figures, Submitted to IEEE Transactions on Wireless Communications

  42. The Complexity-Rate Tradeoff of Centralized Radio Access Networks

    Authors: Peter Rost, Salvatore Talarico, Matthew C. Valenti

    Abstract: In a centralized RAN, the signals from multiple RAPs are processed centrally in a data center. Centralized RAN enables advanced interference coordination strategies while leveraging the elastic provisioning of data processing resources. It is particularly well suited for dense deployments, such as within a large building where the RAPs are connected via fibre and many cells are underutilized. This… ▽ More

    Submitted 9 August, 2015; v1 submitted 30 March, 2015; originally announced March 2015.

    Comments: 13 pages, 8 figures, 25 references, accepted to IEEE Transactions on Wireless Communications

    MSC Class: 94A05

  43. arXiv:1502.05784  [pdf, other

    cs.IT

    LDPC Code Design for Noncoherent Physical Layer Network Coding

    Authors: Terry Ferrett, Matthew C. Valenti

    Abstract: This work considers optimizing LDPC codes in the physical-layer network coded two-way relay channel using noncoherent FSK modulation. The error-rate performance of channel decoding at the relay node during the multiple-access phase was improved through EXIT-based optimization of Tanner graph variable node degree distributions. Codes drawn from the DVB-S2 and WiMAX standards were used as a basis fo… ▽ More

    Submitted 20 February, 2015; originally announced February 2015.

    Comments: Six pages, submitted to 2015 IEEE International Conference on Communications

  44. Performance Analysis of Geographic Routing Protocols in Ad Hoc Networks

    Authors: Don Torrieri, Salvatore Talarico, Matthew C. Valenti

    Abstract: Geographic routing protocols greatly reduce the requirements of topology storage and provide flexibility in the accommodation of the dynamic behavior of ad hoc networks. This paper presents performance evaluations and comparisons of two geographic routing protocols and the popular AODV protocol. The trade-offs among the average path reliabilities, average conditional delays, average conditional nu… ▽ More

    Submitted 8 December, 2014; originally announced December 2014.

    Comments: 6 pages, 7 figures, IEEE Military Commun. Conf. (MILCOM), 2014. arXiv admin note: substantial text overlap with arXiv:1309.3582

  45. arXiv:1409.4470  [pdf

    cs.NI

    Adaptive Content Control for Communication amongst Cooperative Automated Vehicles

    Authors: Mohammad Fanaei, Amin Tahmasbi-Sarvestani, Yaser P. Fallah, Gaurav Bansal, Matthew C. Valenti, John B. Kenney

    Abstract: Cooperative automated vehicles exchange information to assist each other in creating a more precise and extended view of their surroundings, with the aim of improving automated-driving decisions. This paper addresses the need for scalable communication among these vehicles. To this end, a general communication framework is proposed through which automated cars exchange information derived from mul… ▽ More

    Submitted 15 September, 2014; originally announced September 2014.

    Comments: 7 Pages, 10 Figures, Sixth International Symposium on Wireless Vehicular Communications (WiVEC'2014)

  46. Unicast Barrage Relay Networks: Outage Analysis and Optimization

    Authors: Salvatore Talarico, Matthew C. Valenti, Thomas R. Halford

    Abstract: Barrage relays networks (BRNs) are ad hoc networks built on a rapid cooperative flooding primitive as opposed to the traditional point-to-point link abstraction. Controlled barrage regions (CBRs) can be used to contain this flooding primitive for unicast and multicast, thereby enabling spatial reuse. In this paper, the behavior of individual CBRs is described as a Markov process that models the po… ▽ More

    Submitted 22 October, 2015; v1 submitted 25 August, 2014; originally announced August 2014.

    Comments: 7 pages, 4 figures, 1 table, in IEEE Military Commun. Conf. (MILCOM), 2014

  47. arXiv:1407.1830  [pdf, ps, other

    cs.NI cs.IT

    The Role of Computational Outage in Dense Cloud-Based Centralized Radio Access Networks

    Authors: Matthew C. Valenti, Salvatore Talarico, Peter Rost

    Abstract: Centralized radio access network architectures consolidate the baseband operation towards a cloud-based platform, thereby allowing for efficient utilization of computing assets, effective inter-cell coordination, and exploitation of global channel state information. This paper considers the interplay between computational efficiency and data throughput that is fundamental to centralized RAN. It in… ▽ More

    Submitted 6 July, 2014; originally announced July 2014.

    Comments: 7 pages, 10 figures, IEEE Global Telecommunication Conference (GLOBECOM), 2014, to appear

  48. arXiv:1404.2380  [pdf, other

    cs.IT

    A Direct Approach to Computing Spatially Averaged Outage Probability

    Authors: Matthew C. Valenti, Don Torrieri, Salvatore Talarico

    Abstract: This letter describes a direct method for computing the spatially averaged outage probability of a network with interferers located according to a point process and signals subject to fading. Unlike most common approaches, it does not require transforms such as a Laplace transform. Examples show how to directly obtain the outage probability in the presence of Rayleigh fading in networks whose inte… ▽ More

    Submitted 23 April, 2014; v1 submitted 9 April, 2014; originally announced April 2014.

    Comments: 4 pages, 2 figures, accepted to IEEE Communications Letters

  49. Effects of Spatial Randomness on Locating a Point Source with Distributed Sensors

    Authors: Mohammad Fanaei, Matthew C. Valenti, Natalia A. Schmid

    Abstract: Most studies that consider the problem of estimating the location of a point source in wireless sensor networks assume that the source location is estimated by a set of spatially distributed sensors, whose locations are fixed. Motivated by the fact that the observation quality and performance of the localization algorithm depend on the location of the sensors, which could be randomly distributed,… ▽ More

    Submitted 17 March, 2014; originally announced March 2014.

    Comments: 7 Pages, 5 Figures, To appear at the 2014 IEEE International Conference on Communications (ICC'14) Workshop on Advances in Network Localization and Navigation (ANLN), Invited Paper

  50. Optimal Power Allocation for Distributed BLUE Estimation with Linear Spatial Collaboration

    Authors: Mohammad Fanaei, Matthew C. Valenti, Abbas Jamalipour, Natalia A. Schmid

    Abstract: This paper investigates the problem of linear spatial collaboration for distributed estimation in wireless sensor networks. In this context, the sensors share their local noisy (and potentially spatially correlated) observations with each other through error-free, low cost links based on a pattern defined by an adjacency matrix. Each sensor connected to a central entity, known as the fusion center… ▽ More

    Submitted 8 March, 2014; originally announced March 2014.

    Comments: 5 Pages, 2 Figures, To appear at the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP) 2014