var bibbase_data = {"data":"\"Loading..\"\n\n
\n\n \n\n \n\n \n \n\n \n\n \n \n\n \n\n \n
\n generated by\n \n \"bibbase.org\"\n\n \n
\n \n\n
\n\n \n\n\n
\n\n Excellent! Next you can\n create a new website with this list, or\n embed it in an existing web page by copying & pasting\n any of the following snippets.\n\n
\n JavaScript\n (easiest)\n
\n \n <script src=\"https://bibbase.org/show?bib=https%3A%2F%2Fbibbase.org%2Fnetwork%2Ffiles%2Fe2kjGxYgtBo8SWSbC&authorFirst=1&nocache=1&fullnames=1&theme=bullets&group0=year&group1=type&owner={}&jsonp=1&jsonp=1\"></script>\n \n
\n\n PHP\n
\n \n <?php\n $contents = file_get_contents(\"https://bibbase.org/show?bib=https%3A%2F%2Fbibbase.org%2Fnetwork%2Ffiles%2Fe2kjGxYgtBo8SWSbC&authorFirst=1&nocache=1&fullnames=1&theme=bullets&group0=year&group1=type&owner={}&jsonp=1\");\n print_r($contents);\n ?>\n \n
\n\n iFrame\n (not recommended)\n
\n \n <iframe src=\"https://bibbase.org/show?bib=https%3A%2F%2Fbibbase.org%2Fnetwork%2Ffiles%2Fe2kjGxYgtBo8SWSbC&authorFirst=1&nocache=1&fullnames=1&theme=bullets&group0=year&group1=type&owner={}&jsonp=1\"></iframe>\n \n
\n\n

\n For more details see the documention.\n

\n
\n
\n\n
\n\n This is a preview! To use this list on your own web site\n or create a new web site from it,\n create a free account. The file will be added\n and you will be able to edit it in the File Manager.\n We will show you instructions once you've created your account.\n
\n\n
\n\n

To the site owner:

\n\n

Action required! Mendeley is changing its\n API. In order to keep using Mendeley with BibBase past April\n 14th, you need to:\n

    \n
  1. renew the authorization for BibBase on Mendeley, and
  2. \n
  3. update the BibBase URL\n in your page the same way you did when you initially set up\n this page.\n
  4. \n
\n

\n\n

\n \n \n Fix it now\n

\n
\n\n
\n\n\n
\n \n \n
\n
\n  \n 2023\n \n \n (3)\n \n \n
\n
\n \n \n
\n
\n  \n 1\n \n \n (1)\n \n \n
\n
\n \n \n
\n \n\n \n \n Antonious M. Girgis; and Suhas N. Diggavi.\n\n\n \n \n \n \n \n Multi-Message Shuffled Privacy in Federated Learning.\n \n \n \n \n\n\n \n\n\n\n CoRR, abs/2302.11152. 2023.\n \n\n\n\n
\n\n\n\n \n \n \"Multi-MessagePaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 12 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/corr/abs-2302-11152,\n  author       = {Antonious M. Girgis and\n                  Suhas N. Diggavi},\n  title        = {Multi-Message Shuffled Privacy in Federated Learning},\n  journal      = {CoRR},\n  volume       = {abs/2302.11152},\n  year         = {2023},\n  url          = {https://doi.org/10.48550/arXiv.2302.11152},\n  doi          = {10.48550/arXiv.2302.11152},\n  eprinttype    = {arXiv},\n  eprint       = {2302.11152},\n  type = {1},\n  tags = {journalSub,PFL},\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2\n \n \n (5)\n \n \n
\n
\n \n \n
\n \n\n \n \n Navjot Singh; Deepesh Data; Jemin George; and Suhas Diggavi.\n\n\n \n \n \n \n \n SPARQ-SGD: Event-Triggered and Compressed Communication in Decentralized Optimization.\n \n \n \n \n\n\n \n\n\n\n IEEE Trans. Autom. Control., 68(2): 721–736. 2023.\n \n\n\n\n
\n\n\n\n \n \n \"SPARQ-SGD:Paper\n  \n \n \n \"SPARQ-SGD: arxiv\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n  \n \n 10 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@ARTICLE{9691792,  \nauthor={Singh, Navjot and Data, Deepesh and George, Jemin and Diggavi, Suhas},  journal={IEEE Transactions on Automatic Control}, \ntitle={SPARQ-SGD: Event-Triggered and Compressed Communication in Decentralized Optimization}, \njournal={{IEEE} Trans. Autom. Control.},  \nvolume       = {68},\nnumber       = {2},\npages        = {721--736},\nyear         = {2023},\nurl          = {https://doi.org/10.1109/TAC.2022.3145576},\ndoi          = {10.1109/TAC.2022.3145576},\nabstract={In this paper, we propose and analyze SPARQ-SGD, a communication efficient algorithm for decentralized training of large-scale machine learning models over a graph with n nodes, where communication efficiency is achieved using compressed exchange of local model parameters among neighboring nodes, which is triggered only when an event (a locally computable condition) is satisfied. Specifically, in SPARQ-SGD, each node takes a fixed number of local gradient steps and then checks if the model parameters have significantly changed compared to its last update; only when the change is beyond a certain threshold (specified by a design criterion), it compresses its local model parameters using both quantization and sparsification and communicates them to its neighbors. We prove that SPARQ-SGD converges as O(1/nT) and O(1/sqrt(nT)) in the strongly-convex and non-convex settings, respectively, matching the convergence rates of plain decentralized SGD. This demonstrates that we get communication efficiency achieved by aggressive compression, local iterations, and event-triggered communication essentially for free.},  \nkeywords={},  \ndoi={10.1109/TAC.2022.3145576},  \nISSN={1558-2523},  \nmonth={},\ntype={2},\ntags={journal,DML,CEDL},\nurl_arxiv={https://arxiv.org/abs/1910.14280},\n}\n\n\n
\n
\n\n\n
\n In this paper, we propose and analyze SPARQ-SGD, a communication efficient algorithm for decentralized training of large-scale machine learning models over a graph with n nodes, where communication efficiency is achieved using compressed exchange of local model parameters among neighboring nodes, which is triggered only when an event (a locally computable condition) is satisfied. Specifically, in SPARQ-SGD, each node takes a fixed number of local gradient steps and then checks if the model parameters have significantly changed compared to its last update; only when the change is beyond a certain threshold (specified by a design criterion), it compresses its local model parameters using both quantization and sparsification and communicates them to its neighbors. We prove that SPARQ-SGD converges as O(1/nT) and O(1/sqrt(nT)) in the strongly-convex and non-convex settings, respectively, matching the convergence rates of plain decentralized SGD. This demonstrates that we get communication efficiency achieved by aggressive compression, local iterations, and event-triggered communication essentially for free.\n
\n\n\n
\n\n\n
\n \n\n \n \n Pavlos Nikolopoulos; Sundara Rajan Srinivasavaradhan; Tao Guo; Christina Fragouli; and Suhas N. Diggavi.\n\n\n \n \n \n \n Community-Aware Group Testing.\n \n \n \n\n\n \n\n\n\n IEEE Transactions on Information Theory, 69(7): 4361-4383. July 2023.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@ARTICLE{10057224,\n  author={Nikolopoulos, Pavlos and Srinivasavaradhan, Sundara Rajan and Guo, Tao and Fragouli, Christina and Diggavi, Suhas N.},\n  journal={IEEE Transactions on Information Theory}, \n  title={Community-Aware Group Testing}, \n  year={2023},\n  volume={69},\n  number={7},\n  pages={4361-4383},\n  abstract={Group testing is a technique that can reduce the number of tests needed to identify infected members in a population, by pooling together multiple diagnostic samples. Despite the variety and importance of prior results, traditional work on group testing has typically assumed independent infections. However, contagious diseases among humans, like SARS-CoV-2, have an important characteristic: infections are governed by community spread, and are therefore correlated. In this paper, we explore this observation and we argue that taking into account the community structure when testing can lead to significant savings in terms of the number of tests required to guarantee a given identification accuracy. To show that, we start with a simplistic (yet practical) infection model, where the entire population is organized in (possibly overlapping) communities and the infection probability of an individual depends on the communities (s)he participates in. Given this model, we compute new lower bounds on the number of tests for zero-error identification and design community-aware group testing algorithms that can be optimal under assumptions. Finally, we demonstrate significant benefits over traditional, community-agnostic group testing via simulations using both noiseless and noisy tests. Shorter versions of this article, which contained a subset of the material, were presented in the work by Nikolopoulos et al. (2021, 2021).},\n  keywords={},\n  doi={10.1109/TIT.2023.3250119},\n  ISSN={1557-9654},\n  month={July},\n  type={2},\n  tags={journal,PET},\n}\n\n\n
\n
\n\n\n
\n Group testing is a technique that can reduce the number of tests needed to identify infected members in a population, by pooling together multiple diagnostic samples. Despite the variety and importance of prior results, traditional work on group testing has typically assumed independent infections. However, contagious diseases among humans, like SARS-CoV-2, have an important characteristic: infections are governed by community spread, and are therefore correlated. In this paper, we explore this observation and we argue that taking into account the community structure when testing can lead to significant savings in terms of the number of tests required to guarantee a given identification accuracy. To show that, we start with a simplistic (yet practical) infection model, where the entire population is organized in (possibly overlapping) communities and the infection probability of an individual depends on the communities (s)he participates in. Given this model, we compute new lower bounds on the number of tests for zero-error identification and design community-aware group testing algorithms that can be optimal under assumptions. Finally, we demonstrate significant benefits over traditional, community-agnostic group testing via simulations using both noiseless and noisy tests. Shorter versions of this article, which contained a subset of the material, were presented in the work by Nikolopoulos et al. (2021, 2021).\n
\n\n\n
\n\n\n
\n \n\n \n \n Xuanyu Cao; Tamer Başar; Suhas Diggavi; Yonina C. Eldar; Khaled B. Letaief; H. Vincent Poor; and Junshan Zhang.\n\n\n \n \n \n \n Guest Editorial Communication-Efficient Distributed Learning Over Networks.\n \n \n \n\n\n \n\n\n\n IEEE Journal on Selected Areas in Communications, 41(4): 845-850. April 2023.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@ARTICLE{10075678,\n  author={Cao, Xuanyu and Başar, Tamer and Diggavi, Suhas and Eldar, Yonina C. and Letaief, Khaled B. and Poor, H. Vincent and Zhang, Junshan},\n  journal={IEEE Journal on Selected Areas in Communications}, \n  title={Guest Editorial Communication-Efficient Distributed Learning Over Networks}, \n  year={2023},\n  volume={41},\n  number={4},\n  pages={845-850},\n  abstract={Distributed machine learning is envisioned as the bedrock of future intelligent networks, where agents exchange information with each other to train models collaboratively without uploading data to a central processor. Despite its broad applicability, a downside of distributed learning is the need for iterative information exchange between agents, which may lead to high communication overhead unaffordable in many practical systems with limited communication resources. To resolve this communication bottleneck, we need to devise communication-efficient distributed learning algorithms and protocols that can reduce the communication cost and simultaneously achieve satisfactory learning/optimization performance. Accomplishing this goal necessitates synergistic techniques from a diverse set of fields, including optimization, machine learning, wireless communications, game theory, and network/graph theory. This Special Issue is dedicated to communication-efficient distributed learning from multiple perspectives, including fundamental theories, algorithm design and analysis, and practical considerations.},\n  keywords={},\n  doi={10.1109/JSAC.2023.3241848},\n  ISSN={1558-0008},\n  month={April},\n  type={2},\n  tags={journal,CEDL,DML},\n}\n\n
\n
\n\n\n
\n Distributed machine learning is envisioned as the bedrock of future intelligent networks, where agents exchange information with each other to train models collaboratively without uploading data to a central processor. Despite its broad applicability, a downside of distributed learning is the need for iterative information exchange between agents, which may lead to high communication overhead unaffordable in many practical systems with limited communication resources. To resolve this communication bottleneck, we need to devise communication-efficient distributed learning algorithms and protocols that can reduce the communication cost and simultaneously achieve satisfactory learning/optimization performance. Accomplishing this goal necessitates synergistic techniques from a diverse set of fields, including optimization, machine learning, wireless communications, game theory, and network/graph theory. This Special Issue is dedicated to communication-efficient distributed learning from multiple perspectives, including fundamental theories, algorithm design and analysis, and practical considerations.\n
\n\n\n
\n\n\n
\n \n\n \n \n Dhaivat Joshi; Suhas Diggavi; Mark J P Chaisson; and Sreeram Kannan.\n\n\n \n \n \n \n \n HQAlign: aligning nanopore reads for SV detection using current-level modeling.\n \n \n \n \n\n\n \n\n\n\n Bioinformatics, 39(10). September 2023.\n \n\n\n\n
\n\n\n\n \n \n \"HQAlign: arxiv\n  \n \n \n \"HQAlign: biorxiv\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n  \n \n 5 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{joshi2023hqalign,\n    author = {Joshi, Dhaivat and Diggavi, Suhas and Chaisson, Mark J P and Kannan, Sreeram},\n    title = "{HQAlign: aligning nanopore reads for SV detection using current-level modeling}",\n    journal = {Bioinformatics},\n    volume = {39},\n    number = {10},\n    year = {2023},\n    month = {September},\n    abstract = "{Detection of structural variants (SVs) from the alignment of sample DNA reads to the reference genome is an important problem in understanding human diseases. Long reads that can span repeat regions, along with an accurate alignment of these long reads play an important role in identifying novel SVs. Long-read sequencers, such as nanopore sequencing, can address this problem by providing very long reads but with high error rates, making accurate alignment challenging. Many errors induced by nanopore sequencing have a bias because of the physics of the sequencing process and proper utilization of these error characteristics can play an important role in designing a robust aligner for SV detection problems. In this article, we design and evaluate HQAlign, an aligner for SV detection using nanopore sequenced reads. The key ideas of HQAlign include (i) using base-called nanopore reads along with the nanopore physics to improve alignments for SVs, (ii) incorporating SV-specific changes to the alignment pipeline, and (iii) adapting these into existing state-of-the-art long-read aligner pipeline, minimap2 (v2.24), for efficient alignments.We show that HQAlign captures about 4\\\\%–6\\\\% complementary SVs across different datasets, which are missed by minimap2 alignments while having a standalone performance at par with minimap2 for real nanopore reads data. For the common SV calls between HQAlign and minimap2, HQAlign improves the start and the end breakpoint accuracy by about 10\\\\%–50\\\\% for SVs across different datasets. Moreover, HQAlign improves the alignment rate to 89.35\\\\% from minimap2 85.64\\\\% for nanopore reads alignment to recent telomere-to-telomere CHM13 assembly, and it improves to 86.65\\\\% from 83.48\\\\% for nanopore reads alignment to GRCh37 human genome.https://github.com/joshidhaivat/HQAlign.git.}",\n    issn = {1367-4811},\n    doi = {10.1093/bioinformatics/btad580},\n    url_arxiv={https://arxiv.org/abs/2301.03834},\n    url_biorxiv={https://doi.org/10.1101/2023.01.08.523172},\n    eprint = {https://academic.oup.com/bioinformatics/article-pdf/39/10/btad580/52147189/btad580.pdf},\n    tags={journal,BioInf,NDS},\n    type={2},\n}\n\n
\n
\n\n\n
\n Detection of structural variants (SVs) from the alignment of sample DNA reads to the reference genome is an important problem in understanding human diseases. Long reads that can span repeat regions, along with an accurate alignment of these long reads play an important role in identifying novel SVs. Long-read sequencers, such as nanopore sequencing, can address this problem by providing very long reads but with high error rates, making accurate alignment challenging. Many errors induced by nanopore sequencing have a bias because of the physics of the sequencing process and proper utilization of these error characteristics can play an important role in designing a robust aligner for SV detection problems. In this article, we design and evaluate HQAlign, an aligner for SV detection using nanopore sequenced reads. The key ideas of HQAlign include (i) using base-called nanopore reads along with the nanopore physics to improve alignments for SVs, (ii) incorporating SV-specific changes to the alignment pipeline, and (iii) adapting these into existing state-of-the-art long-read aligner pipeline, minimap2 (v2.24), for efficient alignments.We show that HQAlign captures about 4\\%–6\\% complementary SVs across different datasets, which are missed by minimap2 alignments while having a standalone performance at par with minimap2 for real nanopore reads data. For the common SV calls between HQAlign and minimap2, HQAlign improves the start and the end breakpoint accuracy by about 10\\%–50\\% for SVs across different datasets. Moreover, HQAlign improves the alignment rate to 89.35\\% from minimap2 85.64\\% for nanopore reads alignment to recent telomere-to-telomere CHM13 assembly, and it improves to 86.65\\% from 83.48\\% for nanopore reads alignment to GRCh37 human genome.https://github.com/joshidhaivat/HQAlign.git.\n
\n\n\n
\n\n\n
\n \n\n \n \n Xuanyu Cao; Tamer Basar; Suhas N. Diggavi; Yonina C. Eldar; Khaled B. Letaief; H. Vincent Poor; and Junshan Zhang.\n\n\n \n \n \n \n \n Communication-Efficient Distributed Learning: An Overview.\n \n \n \n \n\n\n \n\n\n\n IEEE J. Sel. Areas Commun., 41(4): 851–873. 2023.\n \n\n\n\n
\n\n\n\n \n \n \"Communication-EfficientPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 2 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/jsac/CaoBDELPZ23a,\n  author       = {Xuanyu Cao and\n                  Tamer Basar and\n                  Suhas N. Diggavi and\n                  Yonina C. Eldar and\n                  Khaled B. Letaief and\n                  H. Vincent Poor and\n                  Junshan Zhang},\n  title        = {Communication-Efficient Distributed Learning: An Overview},\n  journal      = {{IEEE} J. Sel. Areas Commun.},\n  volume       = {41},\n  number       = {4},\n  pages        = {851--873},\n  year         = {2023},\n  url          = {https://doi.org/10.1109/JSAC.2023.3242710},\n  doi          = {10.1109/JSAC.2023.3242710},\n  timestamp    = {Tue, 28 Mar 2023 19:50:24 +0200},\n  biburl       = {https://dblp.org/rec/journals/jsac/CaoBDELPZ23a.bib},\n  type    = {2},\n  tags = {journal,CEDL,DML}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 4\n \n \n (1)\n \n \n
\n
\n \n \n
\n \n\n \n \n Kaan Ozkara; Antonious M Girgis; Deepesh Data; and Suhas Diggavi.\n\n\n \n \n \n \n \n A Generative Framework for Personalized Learning and Estimation: Theory, Algorithms, and Privacy.\n \n \n \n \n\n\n \n\n\n\n in International Conference on Learning Representations (ICLR). 2023.\n \n\n\n\n
\n\n\n\n \n \n \"A arxiv\n  \n \n \n \"APaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n  \n \n 22 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{ozkara2022generative,\n  title={A Generative Framework for Personalized Learning and Estimation: Theory, Algorithms, and Privacy},\n  author={Ozkara, Kaan and Girgis, Antonious M and Data, Deepesh and Diggavi, Suhas},\n  journal={in International Conference on Learning Representations (ICLR)},\n  year={2023},\n  tags={conf,PFL},\n  type={4},\n  url_arxiv={https://arxiv.org/abs/2207.01771},\n  url={https://openreview.net/forum?id=FUiDMCr_W4o},\n  abstract={A distinguishing characteristic of federated learning is that the (local) client data could have statistical heterogeneity. This heterogeneity has motivated the design of personalized learning, where individual (personalized) models are trained, through collaboration. There have been various personalization methods proposed in literature, with seemingly very different forms and methods ranging from use of a single global model for local regularization and model interpolation, to use of multiple global models for personalized clustering, etc. In this work, we begin with a generative framework that could potentially unify several different algorithms as well as suggest new algorithms. We apply our generative framework to personalized estimation, and connect it to the classical empirical Bayes' methodology. We develop private personalized estimation under this framework. We then use our generative framework for learning, which unifies several known personalized FL algorithms and also suggests new ones; we propose and study a new algorithm AdaPeD based on a Knowledge Distillation, which numerically outperforms several known algorithms. We also develop privacy for personalized learning methods with guarantees for user-level privacy and composition. We numerically evaluate the performance as well as the privacy for both the estimation and learning problems, demonstrating the advantages of our proposed methods.},\n}\n\n
\n
\n\n\n
\n A distinguishing characteristic of federated learning is that the (local) client data could have statistical heterogeneity. This heterogeneity has motivated the design of personalized learning, where individual (personalized) models are trained, through collaboration. There have been various personalization methods proposed in literature, with seemingly very different forms and methods ranging from use of a single global model for local regularization and model interpolation, to use of multiple global models for personalized clustering, etc. In this work, we begin with a generative framework that could potentially unify several different algorithms as well as suggest new algorithms. We apply our generative framework to personalized estimation, and connect it to the classical empirical Bayes' methodology. We develop private personalized estimation under this framework. We then use our generative framework for learning, which unifies several known personalized FL algorithms and also suggests new ones; we propose and study a new algorithm AdaPeD based on a Knowledge Distillation, which numerically outperforms several known algorithms. We also develop privacy for personalized learning methods with guarantees for user-level privacy and composition. We numerically evaluate the performance as well as the privacy for both the estimation and learning problems, demonstrating the advantages of our proposed methods.\n
\n\n\n
\n\n\n\n\n\n
\n
\n\n\n\n\n
\n
\n\n
\n
\n  \n 2022\n \n \n (3)\n \n \n
\n
\n \n \n
\n
\n  \n 1\n \n \n (1)\n \n \n
\n
\n \n \n
\n \n\n \n \n Osama A Hanna; Antonious M Girgis; Christina Fragouli; and Suhas Diggavi.\n\n\n \n \n \n \n \n Differentially Private Stochastic Linear Bandits:(Almost) for Free.\n \n \n \n \n\n\n \n\n\n\n arXiv preprint arXiv:2207.03445. 2022.\n \n\n\n\n
\n\n\n\n \n \n \"Differentially arxiv\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n  \n \n 11 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{hanna2022differentially,\n  title={Differentially Private Stochastic Linear Bandits:(Almost) for Free},\n  author={Hanna, Osama A and Girgis, Antonious M and Fragouli, Christina and Diggavi, Suhas},\n  journal={arXiv preprint arXiv:2207.03445},\n  year={2022},\n  tags={journalSub,DML,PDL},\n  type={1},\n  url_arxiv={https://arxiv.org/abs/2207.03445},\n  abstract={In this paper, we propose differentially private algorithms for the problem of stochastic linear bandits in the central, local and shuffled models. In the central model, we achieve almost the same regret as the optimal non-private algorithms, which means we get privacy for free. In particular, we achieve a regret of Õ(T‾‾√+1ϵ) matching the known lower bound for private linear bandits, while the best previously known algorithm achieves Õ(1ϵT‾‾√). In the local case, we achieve a regret of Õ(1ϵT‾‾√) which matches the non-private regret for constant ϵ, but suffers a regret penalty when ϵ is small. In the shuffled model, we also achieve regret of Õ(T‾‾√+1ϵ) %for small ϵ as in the central case, while the best previously known algorithm suffers a regret of Õ(1ϵT3/5). Our numerical evaluation validates our theoretical results.},\n}\n\n
\n
\n\n\n
\n In this paper, we propose differentially private algorithms for the problem of stochastic linear bandits in the central, local and shuffled models. In the central model, we achieve almost the same regret as the optimal non-private algorithms, which means we get privacy for free. In particular, we achieve a regret of Õ(T‾‾√+1ϵ) matching the known lower bound for private linear bandits, while the best previously known algorithm achieves Õ(1ϵT‾‾√). In the local case, we achieve a regret of Õ(1ϵT‾‾√) which matches the non-private regret for constant ϵ, but suffers a regret penalty when ϵ is small. In the shuffled model, we also achieve regret of Õ(T‾‾√+1ϵ) %for small ϵ as in the central case, while the best previously known algorithm suffers a regret of Õ(1ϵT3/5). Our numerical evaluation validates our theoretical results.\n
\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2\n \n \n (2)\n \n \n
\n
\n \n \n
\n \n\n \n \n Joyson Sebastian; and Suhas Diggavi.\n\n\n \n \n \n \n \n On the Generalized Degrees of Freedom of the Noncoherent Interference Channel.\n \n \n \n \n\n\n \n\n\n\n IEEE Transactions on Wireless Communications, 21(9): 7011-7025. Sep. 2022.\n \n\n\n\n
\n\n\n\n \n \n \"On arxiv\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n  \n \n 2 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@ARTICLE{9725266,\n  author={Sebastian, Joyson and Diggavi, Suhas},\n  journal={IEEE Transactions on Wireless Communications}, \n  title={On the Generalized Degrees of Freedom of the Noncoherent Interference Channel}, \n  year={2022},\n  volume={21},\n  number={9},\n  pages={7011-7025},\n  abstract={We study the generalized degrees of freedom (gDoF) of the block-fading noncoherent 2-user interference channel (IC) with a coherence time of  $T$  symbol durations and symmetric fading statistics. We demonstrate that a standard training-based scheme for the noncoherent IC is suboptimal in several regimes. We study and analyze several alternate schemes: the first is a new noncoherent scheme using rate-splitting. We also consider a scheme that treats interference-as-noise (TIN) and a time division multiplexing (TDM) scheme. We show that a standard training-based scheme for the noncoherent IC is outperformed by one of these schemes in several regimes: our results demonstrate that in the very weak interference regime, the TIN scheme is the best; in the strong interference regime, the TDM scheme and the noncoherent rate-splitting scheme give better performance; in other cases either of the TIN, TDM or noncoherent rate-splitting scheme could be preferred. We also study the noncoherent IC with feedback and propose another noncoherent rate-splitting scheme. Again for the feedback case, our results demonstrate that a standard training-based scheme can be outperformed by other schemes.},\n  keywords={},\n  doi={10.1109/TWC.2022.3153893},\n  ISSN={1558-2248},\n  month={Sep.},\n  tags={journal,WiNetnew},\n  type={2},\n  url_arxiv={https://arxiv.org/abs/1812.03579},\n}\n\n
\n
\n\n\n
\n We study the generalized degrees of freedom (gDoF) of the block-fading noncoherent 2-user interference channel (IC) with a coherence time of $T$ symbol durations and symmetric fading statistics. We demonstrate that a standard training-based scheme for the noncoherent IC is suboptimal in several regimes. We study and analyze several alternate schemes: the first is a new noncoherent scheme using rate-splitting. We also consider a scheme that treats interference-as-noise (TIN) and a time division multiplexing (TDM) scheme. We show that a standard training-based scheme for the noncoherent IC is outperformed by one of these schemes in several regimes: our results demonstrate that in the very weak interference regime, the TIN scheme is the best; in the strong interference regime, the TDM scheme and the noncoherent rate-splitting scheme give better performance; in other cases either of the TIN, TDM or noncoherent rate-splitting scheme could be preferred. We also study the noncoherent IC with feedback and propose another noncoherent rate-splitting scheme. Again for the feedback case, our results demonstrate that a standard training-based scheme can be outperformed by other schemes.\n
\n\n\n
\n\n\n
\n \n\n \n \n S. Can; T. Basar; S. N. Diggavi; Y. C. Eldar; Letaief K. B.; H. V. Poor; and J. Zhang.\n\n\n \n \n \n \n Communication-Efficient Distributed Learning: An Overview.\n \n \n \n\n\n \n\n\n\n to appear in IEEE Journal of Selected Areas in Communications (JSAC), 2022.. 2022.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@ARTICLE{comm-efficientDL,\n  author={Can, S. and Basar, T. and Diggavi, S. N. and Eldar, Y. C. and Letaief K. B. and Poor, H. V. and Zhang, J.},\n  journal={to appear in IEEE Journal of Selected Areas in Communications (JSAC), 2022.}, \n  title={Communication-Efficient Distributed Learning: An Overview}, \n  year={2022},\n  keywords={},\n  doi={},\n  ISSN={},\n  month={},\n  tags={journal,CEDL,DML},\n  type={2},\n  }\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 4\n \n \n (7)\n \n \n
\n
\n \n \n
\n \n\n \n \n Antonious M. Girgis; Deepesh Data; and Suhas Diggavi.\n\n\n \n \n \n \n Distributed User-Level Private Mean Estimation.\n \n \n \n\n\n \n\n\n\n In IEEE International Symposium on Information Theory (ISIT), pages 2196-2201, 2022. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@INPROCEEDINGS{9834713,\n  author={Girgis, Antonious M. and Data, Deepesh and Diggavi, Suhas},\n  booktitle={IEEE International Symposium on Information Theory (ISIT)}, \n  title={Distributed User-Level Private Mean Estimation}, \n  year={2022},\n  volume={},\n  number={},\n  pages={2196-2201},\n  doi={10.1109/ISIT50566.2022.9834713},\n  type={4},\n  tags={conf,DML,PDL},\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n Mohamad Rida Rammal; Suhas Diggavi; and Ashutosh Sabharwal.\n\n\n \n \n \n \n 3D Orientation Estimation With Configurable Backscatter Arrays.\n \n \n \n\n\n \n\n\n\n In IEEE International Symposium on Information Theory (ISIT), pages 1832-1837, June 2022. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n  \n \n 2 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@INPROCEEDINGS{9834736,\n  author={Rammal, Mohamad Rida and Diggavi, Suhas and Sabharwal, Ashutosh},\n  booktitle={IEEE International Symposium on Information Theory (ISIT)}, \n  title={3D Orientation Estimation With Configurable Backscatter Arrays}, \n  year={2022},\n  volume={},\n  number={},\n  pages={1832-1837},\n  abstract={We consider the problem of estimating the orientation of a 3D object with the assistance of configurable backscatter tags. We explore the idea of designing tag response codes to improve the accuracy of orientation estimation. To minimize the difference between the true and estimated orientation, we propose two code design criteria. We also derive a lower bound on the worst-case error using Le Cam’s method and provide simulation results for multiple scenarios including perfect and imperfect channel knowledge, comparing the performance of various coding methods against the suggested designs.},\n  keywords={},\n  doi={10.1109/ISIT50566.2022.9834736},\n  ISSN={2157-8117},\n  month={June},\n  tags={conf,WiNetnew,WiIm},\n  type={4},\n}\n\n
\n
\n\n\n
\n We consider the problem of estimating the orientation of a 3D object with the assistance of configurable backscatter tags. We explore the idea of designing tag response codes to improve the accuracy of orientation estimation. To minimize the difference between the true and estimated orientation, we propose two code design criteria. We also derive a lower bound on the worst-case error using Le Cam’s method and provide simulation results for multiple scenarios including perfect and imperfect channel knowledge, comparing the performance of various coding methods against the suggested designs.\n
\n\n\n
\n\n\n
\n \n\n \n \n Osama A. Hanna; Xinlin Li; Christina Fragouli; and Suhas Diggavi.\n\n\n \n \n \n \n Can we break the dependency in distributed detection?.\n \n \n \n\n\n \n\n\n\n In IEEE International Symposium on Information Theory (ISIT), pages 2720-2725, June 2022. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n  \n \n 7 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@INPROCEEDINGS{9834790,\n  author={Hanna, Osama A. and Li, Xinlin and Fragouli, Christina and Diggavi, Suhas},\n  booktitle={IEEE International Symposium on Information Theory (ISIT)}, \n  title={Can we break the dependency in distributed detection?}, \n  year={2022},\n  volume={},\n  number={},\n  pages={2720-2725},\n  abstract={We consider a distributed detection problem where sensors observe dependent observations. We ask, if we can allow the sensors to locally exchange a few bits with each other, whether we can use these bits to "break" the dependency of the sensor observations, and thus reduce the dependent detection problem to the much better-studied and understood case of conditionally independent observations. To this end, we propose an optimization problem that we prove is equivalent to minimizing the dependency between the sensor observations. This problem is in general NP-hard, however, we show that for at least some cases of Gaussian distributions it can be solved efficiently. For general distributions, we propose to use alternating minimization and derive a constant factor approximation algorithm. Numerical evaluations indicate that our approach can offer significant improvement in detection accuracy over alternative schemes.},\n  keywords={},\n  doi={10.1109/ISIT50566.2022.9834790},\n  ISSN={2157-8117},\n  month={June},\n  tags={conf,CEDL,DML},\n  type={4},\n}\n\n
\n
\n\n\n
\n We consider a distributed detection problem where sensors observe dependent observations. We ask, if we can allow the sensors to locally exchange a few bits with each other, whether we can use these bits to \"break\" the dependency of the sensor observations, and thus reduce the dependent detection problem to the much better-studied and understood case of conditionally independent observations. To this end, we propose an optimization problem that we prove is equivalent to minimizing the dependency between the sensor observations. This problem is in general NP-hard, however, we show that for at least some cases of Gaussian distributions it can be solved efficiently. For general distributions, we propose to use alternating minimization and derive a constant factor approximation algorithm. Numerical evaluations indicate that our approach can offer significant improvement in detection accuracy over alternative schemes.\n
\n\n\n
\n\n\n
\n \n\n \n \n Sundara Rajan Srinivasavaradhan; Pavlos Nikolopoulos; Christina Fragouli; and Suhas Diggavi.\n\n\n \n \n \n \n \n Dynamic group testing to control and monitor disease progression in a population.\n \n \n \n \n\n\n \n\n\n\n In 2022 IEEE International Symposium on Information Theory (ISIT), pages 2255-2260, June 2022. \n \n\n\n\n
\n\n\n\n \n \n \"Dynamic arxiv\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n  \n \n 2 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@INPROCEEDINGS{9834823,\n  author={Srinivasavaradhan, Sundara Rajan and Nikolopoulos, Pavlos and Fragouli, Christina and Diggavi, Suhas},\n  booktitle={2022 IEEE International Symposium on Information Theory (ISIT)}, \n  title={Dynamic group testing to control and monitor disease progression in a population}, \n  year={2022},\n  volume={},\n  number={},\n  pages={2255-2260},\n  abstract={In this paper, we introduce a "discrete-time SIR stochastic block model" that also allows for group testing and interventions on a daily basis. Our model can be regarded as a discrete version of the well-known continuous-time SIR stochastic network model [1] and relies on a specific type of weighted graph to capture the underlying community spread. Given that infection model, we then formulate a dynamic group-testing problem by asking: (a) what is the minimum number of tests needed everyday to identify all infections? and (b) are there nonadaptive group testing strategies that achieve this with vanishing error probability? Our results show that one can leverage the knowledge of the community infection model to compute a lower bound on the number of tests and also inform nonadaptive group testing algorithms, so that they can achieve (almost) the same performance as complete individual testing with a much smaller number of tests. Moreover, these algorithms are order-optimal, under specific conditions.},\n  keywords={},\n  doi={10.1109/ISIT50566.2022.9834823},\n  ISSN={2157-8117},\n  month={June},\n  tags={conf,PET},\n  type={4},\n  url_arxiv={https://arxiv.org/abs/2106.10765},\n}\n\n
\n
\n\n\n
\n In this paper, we introduce a \"discrete-time SIR stochastic block model\" that also allows for group testing and interventions on a daily basis. Our model can be regarded as a discrete version of the well-known continuous-time SIR stochastic network model [1] and relies on a specific type of weighted graph to capture the underlying community spread. Given that infection model, we then formulate a dynamic group-testing problem by asking: (a) what is the minimum number of tests needed everyday to identify all infections? and (b) are there nonadaptive group testing strategies that achieve this with vanishing error probability? Our results show that one can leverage the knowledge of the community infection model to compute a lower bound on the number of tests and also inform nonadaptive group testing algorithms, so that they can achieve (almost) the same performance as complete individual testing with a much smaller number of tests. Moreover, these algorithms are order-optimal, under specific conditions.\n
\n\n\n
\n\n\n
\n \n\n \n \n Mohamad Rida Rammal; Alessandro Achille; Aditya Golatkar; Suhas Diggavi; and Stefano Soatto.\n\n\n \n \n \n \n \n On Leave-One-Out Conditional Mutual Information For Generalization.\n \n \n \n \n\n\n \n\n\n\n In Advances in Neural Information Processing Systems (NeurIPS), 2022. \n \n\n\n\n
\n\n\n\n \n \n \"On arxiv\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 20 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@INPROCEEDINGS{rammal2022leave,\n  title={On Leave-One-Out Conditional Mutual Information For Generalization},\n  author={Rammal, Mohamad Rida and Achille, Alessandro and Golatkar, Aditya and Diggavi, Suhas and Soatto, Stefano},\n  booktitle={Advances in Neural Information Processing Systems (NeurIPS)},\n  year={2022},\n  type={4},\n  tags={conf,MLIT,IT},\n  url_arxiv={https://arxiv.org/abs/2207.00581},\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n Y. Mao; D. Data; S. N. Diggavi; and P. Tabuada.\n\n\n \n \n \n \n Decentralized Learning Robust to Data Poisoning Attacks.\n \n \n \n\n\n \n\n\n\n In IEEE Control and Decision Conference (CDC), 2022. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@INPROCEEDINGS{mao2022decentralizedlearning,\n  title={Decentralized Learning Robust to Data Poisoning Attacks},\n  author={Mao, Y. and Data, D. and Diggavi, S. N. and Tabuada, P.},\n  booktitle={IEEE Control and Decision Conference (CDC)},\n  year={2022},\n  type={4},\n  tags={conf,SDL,DML},\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n Sundara Rajan Srinivasavaradhan; Pavlos Nikolopoulos; Christina Fragouli; and Suhas Diggavi.\n\n\n \n \n \n \n \n Improving Group Testing via Gradient Descent.\n \n \n \n \n\n\n \n\n\n\n IEEE International Symposium on Information theory,2243-2248. 2022.\n \n\n\n\n
\n\n\n\n \n \n \"Improving arxiv\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n  \n \n 10 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{srinivasavaradhan2022improving,\n  title={Improving Group Testing via Gradient Descent},\n  author={Srinivasavaradhan, Sundara Rajan and Nikolopoulos, Pavlos and Fragouli, Christina and Diggavi, Suhas},\n  journal={IEEE International Symposium on Information theory},\n  year={2022},\n  type={4},\n  tags={conf,PET},\n  pages={2243-2248},\n  url_arxiv={https://arxiv.org/abs/2201.12325},\n  abstract={We study the problem of group testing with non-identical, independent priors. So far, the pooling strategies that have been proposed in the literature take the following approach: a hand-crafted test design along with a decoding strategy is proposed, and guarantees are provided on how many tests are sufficient in order to identify all infections in a population. In this paper, we take a different, yet perhaps more practical, approach: we fix the decoder and the number of tests, and we ask, given these, what is the best test design one could use? We explore this question for the Definite Non-Defectives (DND) decoder. We formulate a (non-convex) optimization problem, where the objective function is the expected number of errors for a particular design. We find approximate solutions via gradient descent, which we further optimize with informed initialization. We illustrate through simulations that our method can achieve significant performance improvement over traditional approaches.},\n}\n\n
\n
\n\n\n
\n We study the problem of group testing with non-identical, independent priors. So far, the pooling strategies that have been proposed in the literature take the following approach: a hand-crafted test design along with a decoding strategy is proposed, and guarantees are provided on how many tests are sufficient in order to identify all infections in a population. In this paper, we take a different, yet perhaps more practical, approach: we fix the decoder and the number of tests, and we ask, given these, what is the best test design one could use? We explore this question for the Definite Non-Defectives (DND) decoder. We formulate a (non-convex) optimization problem, where the objective function is the expected number of errors for a particular design. We find approximate solutions via gradient descent, which we further optimize with informed initialization. We illustrate through simulations that our method can achieve significant performance improvement over traditional approaches.\n
\n\n\n
\n\n\n\n\n\n
\n
\n\n\n\n\n
\n
\n\n
\n
\n  \n 2021\n \n \n (4)\n \n \n
\n
\n \n \n
\n
\n  \n 1\n \n \n (3)\n \n \n
\n
\n \n \n
\n \n\n \n \n Navjot Singh; Xuanyu Cao; Suhas Diggavi; and Tamer Basar.\n\n\n \n \n \n \n \n Decentralized Multi-Task Stochastic Optimization With Compressed Communications.\n \n \n \n \n\n\n \n\n\n\n arXiv preprint arXiv:2112.12373. 2021.\n \n\n\n\n
\n\n\n\n \n \n \"Decentralized arxiv\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n  \n \n 3 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{singh2021decentralized,\n  title={Decentralized Multi-Task Stochastic Optimization With Compressed Communications},\n  author={Singh, Navjot and Cao, Xuanyu and Diggavi, Suhas and Basar, Tamer},\n  journal={arXiv preprint arXiv:2112.12373},\n  year={2021},\n  type={1},\n  tags={journalSub,CEDL,DML},\n  url_arxiv={https://arxiv.org/abs/2112.12373},\n  abstract={We consider a multi-agent network where each node has a stochastic (local) cost function that depends on the decision variable of that node and a random variable, and further the decision variables of neighboring nodes are pairwise constrained. There is an aggregate objective function for the network, composed additively of the expected values of the local cost functions at the nodes, and the overall goal of the network is to obtain the minimizing solution to this aggregate objective function subject to all the pairwise constraints. This is to be achieved at the node level using decentralized information and local computation, with exchanges of only compressed information allowed by neighboring nodes. The paper develops algorithms and obtains performance bounds for two different models of local information availability at the nodes: (i) sample feedback, where each node has direct access to samples of the local random variable to evaluate its local cost, and (ii) bandit feedback, where samples of the random variables are not available, but only the values of the local cost functions at two random points close to the decision are available to each node. For both models, with compressed communication between neighbors, we have developed decentralized saddle-point algorithms that deliver performances no different (in order sense) from those without communication compression; specifically, we show that deviation from the global minimum value and violations of the constraints are upper-bounded by (T−12) and (T−14), respectively, where T is the number of iterations. Numerical examples provided in the paper corroborate these bounds and demonstrate the communication efficiency of the proposed method.},\n}\n\n
\n
\n\n\n
\n We consider a multi-agent network where each node has a stochastic (local) cost function that depends on the decision variable of that node and a random variable, and further the decision variables of neighboring nodes are pairwise constrained. There is an aggregate objective function for the network, composed additively of the expected values of the local cost functions at the nodes, and the overall goal of the network is to obtain the minimizing solution to this aggregate objective function subject to all the pairwise constraints. This is to be achieved at the node level using decentralized information and local computation, with exchanges of only compressed information allowed by neighboring nodes. The paper develops algorithms and obtains performance bounds for two different models of local information availability at the nodes: (i) sample feedback, where each node has direct access to samples of the local random variable to evaluate its local cost, and (ii) bandit feedback, where samples of the random variables are not available, but only the values of the local cost functions at two random points close to the decision are available to each node. For both models, with compressed communication between neighbors, we have developed decentralized saddle-point algorithms that deliver performances no different (in order sense) from those without communication compression; specifically, we show that deviation from the global minimum value and violations of the constraints are upper-bounded by (T−12) and (T−14), respectively, where T is the number of iterations. Numerical examples provided in the paper corroborate these bounds and demonstrate the communication efficiency of the proposed method.\n
\n\n\n
\n\n\n
\n \n\n \n \n Mohamad Rida Rammal; Suhas Diggavi; and Ashutosh Sabharwal.\n\n\n \n \n \n \n \n Coded Estimation: Design of Backscatter Array Codes for 3D Orientation Estimation.\n \n \n \n \n\n\n \n\n\n\n arXiv preprint arXiv:2112.00883. 2021.\n \n\n\n\n
\n\n\n\n \n \n \"Coded arxiv\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n  \n \n 2 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{rammal2021coded,\n  title={Coded Estimation: Design of Backscatter Array Codes for 3D Orientation Estimation},\n  author={Rammal, Mohamad Rida and Diggavi, Suhas and Sabharwal, Ashutosh},\n  journal={arXiv preprint arXiv:2112.00883},\n  year={2021},\n  url_arxiv={https://arxiv.org/abs/2112.00883},\n  tags={journalSub,WiNetnew,WiIm},\n  type={1},\n  abstract={We consider the problem of estimating the orientation of a 3D object with the assistance of configurable backscatter tags. We explore the idea of designing tag response codes to improve the accuracy of orientation estimation. To minimize the difference between the true and estimated orientation, we propose two code design criteria. We also derive a lower bound on the worst-case error using Le Cam's method and provide simulation results for multiple scenarios including line-of-sight only and multipath, comparing the theoretical bounds to those achieved by the designs.},\n}\n\n
\n
\n\n\n
\n We consider the problem of estimating the orientation of a 3D object with the assistance of configurable backscatter tags. We explore the idea of designing tag response codes to improve the accuracy of orientation estimation. To minimize the difference between the true and estimated orientation, we propose two code design criteria. We also derive a lower bound on the worst-case error using Le Cam's method and provide simulation results for multiple scenarios including line-of-sight only and multipath, comparing the theoretical bounds to those achieved by the designs.\n
\n\n\n
\n\n\n
\n \n\n \n \n Kaan Ozkara; Navjot Singh; Deepesh Data; and Suhas Diggavi.\n\n\n \n \n \n \n \n QuPeL: Quantized Personalization with Applications to Federated Learning.\n \n \n \n \n\n\n \n\n\n\n arXiv preprint arXiv:2102.11786. 2021.\n \n\n\n\n
\n\n\n\n \n \n \"QuPeL: arxiv\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n  \n \n 18 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{ozkara2021qupel,\n  title = {QuPeL: Quantized Personalization with Applications to Federated Learning},\n  author = {Ozkara, Kaan and Singh, Navjot and Data, Deepesh and Diggavi, Suhas},\n  journal = {arXiv preprint arXiv:2102.11786},\n  year = {2021},\n  abstract = {Traditionally, federated learning (FL) aims to train a single global model while collaboratively using multiple clients and a server. Two natural challenges that FL algorithms face are heterogeneity in data across clients and collaboration of clients with {\\em diverse resources}. In this work, we introduce a \\textit{quantized} and \\textit{personalized} FL algorithm QuPeL that facilitates collective training with heterogeneous clients while respecting resource diversity. For personalization, we allow clients to learn \\textit{compressed personalized models} with different quantization parameters depending on their resources. Towards this, first we propose an algorithm for learning quantized models through a relaxed optimization problem, where quantization values are also optimized over. When each client participating in the (federated) learning process has different requirements of the quantized model (both in value and precision), we formulate a quantized personalization framework by introducing a penalty term for local client objectives against a globally trained model to encourage collaboration. We develop an alternating proximal gradient update for solving this quantized personalization problem, and we analyze its convergence properties. Numerically, we show that optimizing over the quantization levels increases the performance and we validate that QuPeL outperforms both FedAvg and local training of clients in a heterogeneous setting.},\n  tags = {journalSub,CEDL,DML},\n  url_arxiv = {https://arxiv.org/abs/2102.11786},\n  type = {1},\n}\n\n
\n
\n\n\n
\n Traditionally, federated learning (FL) aims to train a single global model while collaboratively using multiple clients and a server. Two natural challenges that FL algorithms face are heterogeneity in data across clients and collaboration of clients with \\em diverse resources. In this work, we introduce a quantized and personalized FL algorithm QuPeL that facilitates collective training with heterogeneous clients while respecting resource diversity. For personalization, we allow clients to learn compressed personalized models with different quantization parameters depending on their resources. Towards this, first we propose an algorithm for learning quantized models through a relaxed optimization problem, where quantization values are also optimized over. When each client participating in the (federated) learning process has different requirements of the quantized model (both in value and precision), we formulate a quantized personalization framework by introducing a penalty term for local client objectives against a globally trained model to encourage collaboration. We develop an alternating proximal gradient update for solving this quantized personalization problem, and we analyze its convergence properties. Numerically, we show that optimizing over the quantization levels increases the performance and we validate that QuPeL outperforms both FedAvg and local training of clients in a heterogeneous setting.\n
\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2\n \n \n (9)\n \n \n
\n
\n \n \n
\n \n\n \n \n Y. Mao; S. Diggavi; C. Fragouli; and P. Tabuada.\n\n\n \n \n \n \n Secure State-Reconstruction Over Networks Subject to Attacks.\n \n \n \n\n\n \n\n\n\n IEEE Control Systems Letters, 5(1): 157-162. Jan 2021.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n  \n \n 3 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@article{9112310,\n abstract = {Secure state-reconstruction is the problem of reconstructing the state of a linear time-invariant system from sensor measurements that have been corrupted by an adversary. Whereas most work focuses on attacks on sensors, we consider the more challenging case where attacks occur on sensors as well as on nodes and links of a network that transports sensor measurements to a receiver. In this letter we provide necessary and sufficient conditions for the secure state-reconstruction problem to be solvable in the presence of attacks on sensors and on the network.},\n author = {Y. {Mao} and S. {Diggavi} and C. {Fragouli} and P. {Tabuada}},\n doi = {10.1109/LCSYS.2020.3000853},\n issn = {2475-1456},\n journal = {IEEE Control Systems Letters},\n keywords = {control system security;linear systems;secure state-reconstruction;sensor measurements;linear time-invariant system;Receivers;Sensors;Relay networks (telecommunications);Observability;Indexes;Network coding;Fault tolerant systems;network analysis and control;fault detection},\n month = {Jan},\n number = {1},\n pages = {157-162},\n tags = {journal,CPS},\n title = {Secure State-Reconstruction Over Networks Subject to Attacks},\n type = {2},\n volume = {5},\n year = {2021}\n}\n\n
\n
\n\n\n
\n Secure state-reconstruction is the problem of reconstructing the state of a linear time-invariant system from sensor measurements that have been corrupted by an adversary. Whereas most work focuses on attacks on sensors, we consider the more challenging case where attacks occur on sensors as well as on nodes and links of a network that transports sensor measurements to a receiver. In this letter we provide necessary and sufficient conditions for the secure state-reconstruction problem to be solvable in the presence of attacks on sensors and on the network.\n
\n\n\n
\n\n\n
\n \n\n \n \n Antonious M. Girgis; Deepesh Data; Suhas Diggavi; Peter Kairouz; and Ananda Theertha Suresh.\n\n\n \n \n \n \n Shuffled Model of Federated Learning: Privacy, Accuracy and Communication Trade-Offs.\n \n \n \n\n\n \n\n\n\n IEEE Journal on Selected Areas in Information Theory, 2(1): 464-478. March 2021.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n  \n \n 2 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@ARTICLE{9344807,\n  author={Girgis, Antonious M. and Data, Deepesh and Diggavi, Suhas and Kairouz, Peter and Suresh, Ananda Theertha},\n  journal={IEEE Journal on Selected Areas in Information Theory}, \n  title={Shuffled Model of Federated Learning: Privacy, Accuracy and Communication Trade-Offs}, \n  year={2021},\n  volume={2},\n  number={1},\n  pages={464-478},\n  abstract={We consider a distributed empirical risk minimization (ERM) optimization problem with communication efficiency and privacy requirements, motivated by the federated learning (FL) framework (Kairouz et al., 2019). Unique challenges to the traditional ERM problem in the context of FL include  $\\textsf{(i)}$  need to provide privacy guarantees on clients’ data,  $\\textsf{(ii)}$  compress the communication between clients and the server, since clients might have low-bandwidth links,  $\\textsf{(iii)}$  work with a dynamic client population at each round of communication between the server and the clients, as a small fraction of clients are sampled at each round. To address these challenges we develop (optimal) communication-efficient schemes for private mean estimation for several  $\\ell _{p}$  spaces, enabling efficient gradient aggregation for each iteration of the optimization solution of the ERM. We also provide lower and upper bounds for mean estimation with privacy and communication constraints for arbitrary  $\\ell _{p}$  spaces. To get the overall communication, privacy, and optimization performance operation point, we combine this with privacy amplification opportunities inherent to this setup. Our solution takes advantage of the inherent privacy amplification provided by client sampling and data sampling at each client (through Stochastic Gradient Descent) as well as the recently developed privacy framework using anonymization, which effectively presents to the server responses that are randomly shuffled with respect to the clients. Putting these together, we demonstrate that one can get the same privacy, optimization-performance operating point developed in recent methods that use full-precision communication, but at a much lower communication cost, i.e., effectively getting communication efficiency for “free”.},\n  keywords={},\n  doi={10.1109/JSAIT.2021.3056102},\n  ISSN={2641-8770},\n  month={March},\n  type = {2},\n  tags={journal,DML,PDL},\n}\n\n\n
\n
\n\n\n
\n We consider a distributed empirical risk minimization (ERM) optimization problem with communication efficiency and privacy requirements, motivated by the federated learning (FL) framework (Kairouz et al., 2019). Unique challenges to the traditional ERM problem in the context of FL include $\\textsf{(i)}$ need to provide privacy guarantees on clients’ data, $\\textsf{(ii)}$ compress the communication between clients and the server, since clients might have low-bandwidth links, $\\textsf{(iii)}$ work with a dynamic client population at each round of communication between the server and the clients, as a small fraction of clients are sampled at each round. To address these challenges we develop (optimal) communication-efficient schemes for private mean estimation for several $\\ell _{p}$ spaces, enabling efficient gradient aggregation for each iteration of the optimization solution of the ERM. We also provide lower and upper bounds for mean estimation with privacy and communication constraints for arbitrary $\\ell _{p}$ spaces. To get the overall communication, privacy, and optimization performance operation point, we combine this with privacy amplification opportunities inherent to this setup. Our solution takes advantage of the inherent privacy amplification provided by client sampling and data sampling at each client (through Stochastic Gradient Descent) as well as the recently developed privacy framework using anonymization, which effectively presents to the server responses that are randomly shuffled with respect to the clients. Putting these together, we demonstrate that one can get the same privacy, optimization-performance operating point developed in recent methods that use full-precision communication, but at a much lower communication cost, i.e., effectively getting communication efficiency for “free”.\n
\n\n\n
\n\n\n
\n \n\n \n \n Navjot Singh; Deepesh Data; Jemin George; and Suhas Diggavi.\n\n\n \n \n \n \n \n SQuARM-SGD: Communication-Efficient Momentum SGD for Decentralized Optimization.\n \n \n \n \n\n\n \n\n\n\n IEEE Journal on Selected Areas in Information Theory, 2(3): 954-969. Sep. 2021.\n \n\n\n\n
\n\n\n\n \n \n \"SQuARM-SGD: arxiv\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n  \n \n 7 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@ARTICLE{9513259,\n  author={Singh, Navjot and Data, Deepesh and George, Jemin and Diggavi, Suhas},\n  journal={IEEE Journal on Selected Areas in Information Theory}, \n  title={SQuARM-SGD: Communication-Efficient Momentum SGD for Decentralized Optimization}, \n  year={2021},\n  volume={2},\n  number={3},\n  pages={954-969},\n  abstract={In this paper, we propose and analyze SQuARM-SGD, a communication-efficient algorithm for decentralized training of large-scale machine learning models over a network. In SQuARM-SGD, each node performs a fixed number of local SGD steps using Nesterov’s momentum and then sends sparsified and quantized updates to its neighbors regulated by a locally computable triggering criterion. We provide convergence guarantees of our algorithm for general (non-convex) and convex smooth objectives, which, to the best of our knowledge, is the first theoretical analysis for compressed decentralized SGD with momentum updates. We show that the convergence rate of SQuARM-SGD matches that of vanilla SGD. We empirically show that including momentum updates in SQuARM-SGD can lead to better test performance than the current state-of-the-art which does not consider momentum updates.},\n  keywords={},\n  doi={10.1109/JSAIT.2021.3103920},\n  ISSN={2641-8770},\n  month={Sep.},\n  tags = {journal,CEDL,DML},\n  type = {2},\n  url_arxiv = {https://arxiv.org/abs/2005.07041},\n  }\n\n
\n
\n\n\n
\n In this paper, we propose and analyze SQuARM-SGD, a communication-efficient algorithm for decentralized training of large-scale machine learning models over a network. In SQuARM-SGD, each node performs a fixed number of local SGD steps using Nesterov’s momentum and then sends sparsified and quantized updates to its neighbors regulated by a locally computable triggering criterion. We provide convergence guarantees of our algorithm for general (non-convex) and convex smooth objectives, which, to the best of our knowledge, is the first theoretical analysis for compressed decentralized SGD with momentum updates. We show that the convergence rate of SQuARM-SGD matches that of vanilla SGD. We empirically show that including momentum updates in SQuARM-SGD can lead to better test performance than the current state-of-the-art which does not consider momentum updates.\n
\n\n\n
\n\n\n
\n \n\n \n \n Osama A. Hanna; Yahya H. Ezzeldin; Christina Fragouli; and Suhas Diggavi.\n\n\n \n \n \n \n \n Quantization of Distributed Data for Learning.\n \n \n \n \n\n\n \n\n\n\n IEEE Journal on Selected Areas in Information Theory, 2(3): 987-1001. Sep. 2021.\n \n\n\n\n
\n\n\n\n \n \n \"Quantization arxiv\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n  \n \n 7 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@ARTICLE{9521982,\n  author={Hanna, Osama A. and Ezzeldin, Yahya H. and Fragouli, Christina and Diggavi, Suhas},\n  journal={IEEE Journal on Selected Areas in Information Theory}, \n  title={Quantization of Distributed Data for Learning}, \n  year={2021},\n  volume={2},\n  number={3},\n  pages={987-1001},\n  abstract={We consider machine learning applications that train a model by leveraging data distributed over a trusted network, where communication constraints can create a performance bottleneck. A number of recent approaches propose to overcome this bottleneck through compression of gradient updates. However, as models become larger, so does the size of the gradient updates. In this paper, we propose an alternate approach to learn from distributed data that quantizes data instead of gradients, and can support learning over applications where the size of gradient updates is prohibitive. Our approach leverages the dependency of the computed gradient on data samples, which lie in a much smaller space in order to perform the quantization in the smaller dimension data space. At the cost of an extra gradient computation, the gradient estimate can be refined by conveying the difference between the gradient at the quantized data point and the original gradient using a small number of bits. Lastly, in order to save communication, our approach adds a layer that decides whether to transmit a quantized data sample or not based on its importance for learning. We analyze the convergence of the proposed approach for smooth convex and non-convex objective functions and show that we can achieve order optimal convergence rates with communication that mostly depends on the data rather than the model (gradient) dimension. We use our proposed algorithm to train ResNet models on the CIFAR-10 and ImageNet datasets, and show that we can achieve an order of magnitude savings over gradient compression methods. These communication savings come at the cost of increasing computation at the learning agent, and thus our approach is beneficial in scenarios where communication load is the main problem.},\n  keywords={},\n  doi={10.1109/JSAIT.2021.3105359},\n  ISSN={2641-8770},\n  month={Sep.},\n  type={2},\n  tags={journal,DML,CEDL},\n  url_arxiv={https://arxiv.org/abs/2012.07913},\n}\n\n
\n
\n\n\n
\n We consider machine learning applications that train a model by leveraging data distributed over a trusted network, where communication constraints can create a performance bottleneck. A number of recent approaches propose to overcome this bottleneck through compression of gradient updates. However, as models become larger, so does the size of the gradient updates. In this paper, we propose an alternate approach to learn from distributed data that quantizes data instead of gradients, and can support learning over applications where the size of gradient updates is prohibitive. Our approach leverages the dependency of the computed gradient on data samples, which lie in a much smaller space in order to perform the quantization in the smaller dimension data space. At the cost of an extra gradient computation, the gradient estimate can be refined by conveying the difference between the gradient at the quantized data point and the original gradient using a small number of bits. Lastly, in order to save communication, our approach adds a layer that decides whether to transmit a quantized data sample or not based on its importance for learning. We analyze the convergence of the proposed approach for smooth convex and non-convex objective functions and show that we can achieve order optimal convergence rates with communication that mostly depends on the data rather than the model (gradient) dimension. We use our proposed algorithm to train ResNet models on the CIFAR-10 and ImageNet datasets, and show that we can achieve an order of magnitude savings over gradient compression methods. These communication savings come at the cost of increasing computation at the learning agent, and thus our approach is beneficial in scenarios where communication load is the main problem.\n
\n\n\n
\n\n\n
\n \n\n \n \n Pavlos Nikolopoulos; Sundara Rajan Srinivasavaradhan; Christina Fragouli; and Suhas N. Diggavi.\n\n\n \n \n \n \n Group Testing for Community Infections.\n \n \n \n\n\n \n\n\n\n IEEE BITS the Information Theory Magazine, 1(1): 57-68. Sep. 2021.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n  \n \n 4 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@ARTICLE{9609622,\n  author={Nikolopoulos, Pavlos and Srinivasavaradhan, Sundara Rajan and Fragouli, Christina and Diggavi, Suhas N.},\n  journal={IEEE BITS the Information Theory Magazine}, \n  title={Group Testing for Community Infections}, \n  year={2021},\n  volume={1},\n  number={1},\n  pages={57-68},\n  abstract={Group testing is the technique of pooling together diagnostic samples in order to increase the efficiency of medical testing. Traditionally, works in group testing assume that the infections are i.i.d. However, contagious diseases like COVID-19 are governed by community spread and hence the infections are correlated. This survey presents an overview of recent research progress that leverages the community structure to further improve the efficiency of group testing. We show that taking into account the side-information provided by the community structure may lead to significant savings—up to 60\\% fewer tests compared to traditional test designs. We review lower bounds and new approaches to encoding and decoding algorithms that take into account the community structure and integrate group testing into epidemiological modeling. Finally, we also discuss a few important open questions in this space.},\n  keywords={},\n  doi={10.1109/MBITS.2021.3126244},\n  ISSN={2692-4110},\n  month={Sep.},\n  tags={journal,PET},\n  type={2},\n  }\n\n
\n
\n\n\n
\n Group testing is the technique of pooling together diagnostic samples in order to increase the efficiency of medical testing. Traditionally, works in group testing assume that the infections are i.i.d. However, contagious diseases like COVID-19 are governed by community spread and hence the infections are correlated. This survey presents an overview of recent research progress that leverages the community structure to further improve the efficiency of group testing. We show that taking into account the side-information provided by the community structure may lead to significant savings—up to 60% fewer tests compared to traditional test designs. We review lower bounds and new approaches to encoding and decoding algorithms that take into account the community structure and integrate group testing into epidemiological modeling. Finally, we also discuss a few important open questions in this space.\n
\n\n\n
\n\n\n
\n \n\n \n \n Dhaivat Joshi; Shunfu Mao; Sreeram Kannan; and Suhas Diggavi.\n\n\n \n \n \n \n \n QAlign: Aligning nanopore reads accurately using current-level modeling.\n \n \n \n \n\n\n \n\n\n\n Bioinformatics, 37(5): 625-633. 12 2021.\n \n\n\n\n
\n\n\n\n \n \n \"QAlign: biorxiv\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n  \n \n 2 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{10.1093/bioinformatics/btaa875,\n author = {Joshi, Dhaivat and Mao, Shunfu and Kannan, Sreeram and Diggavi, Suhas},\n title = "{QAlign: aligning nanopore reads accurately using current-level modeling}",\n journal = {Bioinformatics},\n volume = {37},\n number = {5},\n pages = {625-633},\n year = {2020},\n month = {12},\n abstract = "{Efficient and accurate alignment of DNA/RNA sequence reads to each other or to a reference genome/transcriptome is an important problem in genomic analysis. Nanopore sequencing has emerged as a major sequencing technology and many long-read aligners have been designed for aligning nanopore reads. However, the high error rate makes accurate and efficient alignment difficult. Utilizing the noise and error characteristics inherent in the sequencing process properly can play a vital role in constructing a robust aligner. In this article, we design QAlign, a pre-processor that can be used with any long-read aligner for aligning long reads to a genome/transcriptome or to other long reads. The key idea in QAlign is to convert the nucleotide reads into discretized current levels that capture the error modes of the nanopore sequencer before running it through a sequence aligner.We show that QAlign is able to improve alignment rates from around 80\\\\% up to 90\\\\% with nanopore reads when aligning to the genome. We also show that QAlign improves the average overlap quality by 9.2, 2.5 and 10.8\\\\% in three real datasets for read-to-read alignment. Read-to-transcriptome alignment rates are improved from 51.6\\\\% to 75.4\\\\% and 82.6\\\\% to 90\\\\% in two real datasets.https://github.com/joshidhaivat/QAlign.git.Supplementary data are available at Bioinformatics online.}",\n issn = {1367-4803},\n doi = {10.1093/bioinformatics/btaa875},\n tags = {journal,BioInf,NDS},\n title = {{QAlign: Aligning nanopore reads accurately using current-level modeling}},\n type = {2},\n url_biorxiv = {https://www.biorxiv.org/content/10.1101/862813v2},\n year = {2021}\n}\n\n
\n
\n\n\n
\n Efficient and accurate alignment of DNA/RNA sequence reads to each other or to a reference genome/transcriptome is an important problem in genomic analysis. Nanopore sequencing has emerged as a major sequencing technology and many long-read aligners have been designed for aligning nanopore reads. However, the high error rate makes accurate and efficient alignment difficult. Utilizing the noise and error characteristics inherent in the sequencing process properly can play a vital role in constructing a robust aligner. In this article, we design QAlign, a pre-processor that can be used with any long-read aligner for aligning long reads to a genome/transcriptome or to other long reads. The key idea in QAlign is to convert the nucleotide reads into discretized current levels that capture the error modes of the nanopore sequencer before running it through a sequence aligner.We show that QAlign is able to improve alignment rates from around 80\\% up to 90\\% with nanopore reads when aligning to the genome. We also show that QAlign improves the average overlap quality by 9.2, 2.5 and 10.8\\% in three real datasets for read-to-read alignment. Read-to-transcriptome alignment rates are improved from 51.6\\% to 75.4\\% and 82.6\\% to 90\\% in two real datasets.https://github.com/joshidhaivat/QAlign.git.Supplementary data are available at Bioinformatics online.\n
\n\n\n
\n\n\n
\n \n\n \n \n G. K. Agarwal; M. Karmoose; S. Diggavi; C. Fragouli; and P. Tabuada.\n\n\n \n \n \n \n \n Distortion based Light-weight Security for Cyber-Physical Systems.\n \n \n \n \n\n\n \n\n\n\n IEEE Transactions on Automatic Control, 66(4): 1588-1601. 2021.\n \n\n\n\n
\n\n\n\n \n \n \"Distortion arxiv\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n  \n \n 2 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{agarwal2020distortion,\n abstract = {In Cyber-Physical Systems (CPS), inference based on communicated data is of critical significance as it can be used to manipulate or damage the control operations by adversaries. This calls for efficient mechanisms for secure transmission of data since control systems are becoming increasingly distributed over larger geographical areas. Distortion based security, recently proposed as one candidate for secure transmissions in CPS, is not only more appropriate for these applications but also quite frugal in terms of prior requirements on shared keys. In this paper, we propose distortion-based metrics to protect CPS communication and show that it is possible to confuse adversaries with just a few bits of pre-shared keys. In particular, we will show that a linear dynamical system can communicate its state in a manner that prevents an eavesdropper from accurately learning the state.},\n author = {Agarwal, G. K. and Karmoose, M. and Diggavi, S. and Fragouli, C. and Tabuada, P.},\n doi = {10.1109/TAC.2020.3006814},\n journal = {IEEE Transactions on Automatic Control},\n tags = {journal,CPS},\n title = {Distortion based Light-weight Security for Cyber-Physical Systems},\n type = {2},\n url_arxiv = {https://arxiv.org/abs/2006.15998},\n year = {2021},\n volume={66},\n number={4},\n pages={1588-1601},\n}\n\n
\n
\n\n\n
\n In Cyber-Physical Systems (CPS), inference based on communicated data is of critical significance as it can be used to manipulate or damage the control operations by adversaries. This calls for efficient mechanisms for secure transmission of data since control systems are becoming increasingly distributed over larger geographical areas. Distortion based security, recently proposed as one candidate for secure transmissions in CPS, is not only more appropriate for these applications but also quite frugal in terms of prior requirements on shared keys. In this paper, we propose distortion-based metrics to protect CPS communication and show that it is possible to confuse adversaries with just a few bits of pre-shared keys. In particular, we will show that a linear dynamical system can communicate its state in a manner that prevents an eavesdropper from accurately learning the state.\n
\n\n\n
\n\n\n
\n \n\n \n \n Deepesh Data; Linqi Song; and Suhas N. Diggavi.\n\n\n \n \n \n \n \n Data Encoding for Byzantine-Resilient Distributed Optimization.\n \n \n \n \n\n\n \n\n\n\n IEEE Transactions on Information Theory, 67(2): 1117-1140. Feb 2021.\n \n\n\n\n
\n\n\n\n \n \n \"Data arxiv\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n  \n \n 3 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/corr/abs-1907-02664,\n abstract = {We study distributed optimization in the presence of Byzantine adversaries, where both data and computation are distributed among m worker machines, t of which may be corrupt. The compromised nodes may collaboratively and arbitrarily deviate from their pre-specified programs, and a designated (master) node iteratively computes the model/parameter vector for generalized linear models. In this work, we primarily focus on two iterative algorithms: Proximal Gradient Descent (PGD) and Coordinate Descent (CD). Gradient descent (GD) is a special case of these algorithms. PGD is typically used in the data-parallel setting, where data is partitioned across different samples, whereas, CD is used in the model-parallelism setting, where data is partitioned across the parameter space.  In this paper, we propose a method based on data encoding and error correction over real numbers to combat adversarial attacks. We can tolerate up to t≤⌊m−12⌋ corrupt worker nodes, which is information-theoretically optimal. We give deterministic guarantees, and our method does not assume any probability distribution on the data. We develop a {\\em sparse} encoding scheme which enables computationally efficient data encoding and decoding. We demonstrate a trade-off between the corruption threshold and the resource requirements (storage, computational, and communication complexity). As an example, for t≤m3, our scheme incurs only a {\\em constant} overhead on these resources, over that required by the plain distributed PGD/CD algorithms which provide no adversarial protection. To the best of our knowledge, ours is the first paper that makes CD secure against adversarial attacks.  Our encoding scheme extends efficiently to the data streaming model and for stochastic gradient descent (SGD). We also give experimental results to show the efficacy of our proposed schemes.},\n author = {Deepesh Data and\nLinqi Song and\nSuhas N. Diggavi},\n eprint = {1907.02664},\n journal = {IEEE Transactions on Information Theory},\n tags = {journal,SDL,DML},\n title = {Data Encoding for Byzantine-Resilient Distributed Optimization},\n type = {2},\n url_arxiv = {http://arxiv.org/abs/1907.02664},\n volume = {},\n year = {2021},\n volume={67},\n number={2},\n pages={1117-1140},\n doi = {10.1109/TIT.2020.3035868},\n ISSN={1557-9654},\n month={Feb},\n}\n\n
\n
\n\n\n
\n We study distributed optimization in the presence of Byzantine adversaries, where both data and computation are distributed among m worker machines, t of which may be corrupt. The compromised nodes may collaboratively and arbitrarily deviate from their pre-specified programs, and a designated (master) node iteratively computes the model/parameter vector for generalized linear models. In this work, we primarily focus on two iterative algorithms: Proximal Gradient Descent (PGD) and Coordinate Descent (CD). Gradient descent (GD) is a special case of these algorithms. PGD is typically used in the data-parallel setting, where data is partitioned across different samples, whereas, CD is used in the model-parallelism setting, where data is partitioned across the parameter space. In this paper, we propose a method based on data encoding and error correction over real numbers to combat adversarial attacks. We can tolerate up to t≤⌊m−12⌋ corrupt worker nodes, which is information-theoretically optimal. We give deterministic guarantees, and our method does not assume any probability distribution on the data. We develop a \\em sparse encoding scheme which enables computationally efficient data encoding and decoding. We demonstrate a trade-off between the corruption threshold and the resource requirements (storage, computational, and communication complexity). As an example, for t≤m3, our scheme incurs only a \\em constant overhead on these resources, over that required by the plain distributed PGD/CD algorithms which provide no adversarial protection. To the best of our knowledge, ours is the first paper that makes CD secure against adversarial attacks. Our encoding scheme extends efficiently to the data streaming model and for stochastic gradient descent (SGD). We also give experimental results to show the efficacy of our proposed schemes.\n
\n\n\n
\n\n\n
\n \n\n \n \n Sundara Rajan Srinivasavaradhan; Michelle Du; Suhas Diggavi; and Christina Fragouli.\n\n\n \n \n \n \n \n Algorithms for reconstruction over single and multiple deletion channels.\n \n \n \n \n\n\n \n\n\n\n IEEE Transactions on Information Theory, 67(6): 3389-3410. June 2021.\n \n\n\n\n
\n\n\n\n \n \n \"Algorithms arxiv\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n  \n \n 5 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{srinivasavaradhan2020algorithms,\n abstract = {Recent advances in DNA sequencing technology and DNA storage systems have rekindled the interest in deletion channels. Multiple recent works have looked at variants of sequence reconstruction over a single and over multiple deletion channels, a notoriously difficult problem due to its highly combinatorial nature. Although works in theoretical computer science have provided algorithms which guarantee perfect reconstruction with multiple independent observations from the deletion channel, they are only applicable in the large blocklength regime and more restrictively, when the number of observations is also large. Indeed, with only a few observations, perfect reconstruction of the input sequence may not even be possible in most cases. In such situations, maximum likelihood (ML) and maximum aposteriori (MAP) estimates for the deletion channels are natural questions that arise and these have remained open to the best of our knowledge. In this work, we take steps to answer the two aforementioned questions. Specifically: 1. We show that solving for the ML estimate over the single deletion channel (which can be cast as a discrete optimization problem) is equivalent to solving its relaxation, a continuous optimization problem; 2. We exactly compute the symbolwise posterior distributions (under some assumptions on the priors) for both the single as well as multiple deletion channels. As part of our contributions, we also introduce tools to visualize and analyze error events, which we believe could be useful in other related problems concerning deletion channels.},\n author = {Srinivasavaradhan, Sundara Rajan and Du, Michelle and Diggavi, Suhas and Fragouli, Christina},\n journal = {IEEE Transactions on Information Theory},\n volume={67},\n number={6},\n pages={3389-3410},\n doi={10.1109/TIT.2020.3033513},\n tags = {journal,BioInf,IT,NDS},\n title = {Algorithms for reconstruction over single and multiple deletion channels},\n type = {2},\n url_arxiv = {https://arxiv.org/abs/2005.14388},\n ISSN={1557-9654},\n month={June},\n year = {2021}\n}\n\n
\n
\n\n\n
\n Recent advances in DNA sequencing technology and DNA storage systems have rekindled the interest in deletion channels. Multiple recent works have looked at variants of sequence reconstruction over a single and over multiple deletion channels, a notoriously difficult problem due to its highly combinatorial nature. Although works in theoretical computer science have provided algorithms which guarantee perfect reconstruction with multiple independent observations from the deletion channel, they are only applicable in the large blocklength regime and more restrictively, when the number of observations is also large. Indeed, with only a few observations, perfect reconstruction of the input sequence may not even be possible in most cases. In such situations, maximum likelihood (ML) and maximum aposteriori (MAP) estimates for the deletion channels are natural questions that arise and these have remained open to the best of our knowledge. In this work, we take steps to answer the two aforementioned questions. Specifically: 1. We show that solving for the ML estimate over the single deletion channel (which can be cast as a discrete optimization problem) is equivalent to solving its relaxation, a continuous optimization problem; 2. We exactly compute the symbolwise posterior distributions (under some assumptions on the priors) for both the single as well as multiple deletion channels. As part of our contributions, we also introduce tools to visualize and analyze error events, which we believe could be useful in other related problems concerning deletion channels.\n
\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 4\n \n \n (10)\n \n \n
\n
\n \n \n
\n \n\n \n \n Pavlos Nikolopoulos; Sundara Rajan Srinivasavaradhan; Tao Guo; Christina Fragouli; and Suhas Diggavi.\n\n\n \n \n \n \n \n Group testing for overlapping communities.\n \n \n \n \n\n\n \n\n\n\n In ICC 2021 - IEEE International Conference on Communications, pages 1-7, June 2021. \n \n\n\n\n
\n\n\n\n \n \n \"Group arxiv\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n  \n \n 2 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@INPROCEEDINGS{9500791,\n  author={Nikolopoulos, Pavlos and Srinivasavaradhan, Sundara Rajan and Guo, Tao and Fragouli, Christina and Diggavi, Suhas},\n  booktitle={ICC 2021 - IEEE International Conference on Communications}, \n  title={Group testing for overlapping communities}, \n  year={2021},\n  volume={},\n  number={},\n  pages={1-7},\n  abstract={In this paper, we propose algorithms that leverage a known community structure to make group testing more efficient. We consider a population organized in connected communities: each individual participates in one or more communities, and the infection probability of each individual depends on the communities (s)he participates in. Use cases include students who participate in several classes, and workers who share common spaces. Group testing reduces the number of tests needed to identify the infected individuals by pooling diagnostic samples and testing them together. We show that making testing algorithms aware of the community structure, can significantly reduce the number of tests needed both for adaptive and non-adaptive group testing.},\n  keywords={},\n  doi={10.1109/ICC42927.2021.9500791},\n  ISSN={1938-1883},\n  month={June},\n tags = {conf,PET},\n type = {4},\n url_arxiv = {https://arxiv.org/abs/2012.02804},\n year = {2021},\n}\n\n
\n
\n\n\n
\n In this paper, we propose algorithms that leverage a known community structure to make group testing more efficient. We consider a population organized in connected communities: each individual participates in one or more communities, and the infection probability of each individual depends on the communities (s)he participates in. Use cases include students who participate in several classes, and workers who share common spaces. Group testing reduces the number of tests needed to identify the infected individuals by pooling diagnostic samples and testing them together. We show that making testing algorithms aware of the community structure, can significantly reduce the number of tests needed both for adaptive and non-adaptive group testing.\n
\n\n\n
\n\n\n
\n \n\n \n \n Navjot Singh; Deepesh Data; Jemin George; and Suhas Diggavi.\n\n\n \n \n \n \n \n SQuARM-SGD: Communication-Efficient Momentum SGD for Decentralized Optimization.\n \n \n \n \n\n\n \n\n\n\n In 2021 IEEE International Symposium on Information Theory (ISIT), pages 1212-1217, July 2021. \n \n\n\n\n
\n\n\n\n \n \n \"SQuARM-SGD: arxiv\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n  \n \n 7 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@INPROCEEDINGS{9517986,\n  author={Singh, Navjot and Data, Deepesh and George, Jemin and Diggavi, Suhas},\n  booktitle={2021 IEEE International Symposium on Information Theory (ISIT)}, \n  title={SQuARM-SGD: Communication-Efficient Momentum SGD for Decentralized Optimization}, \n  year={2021},\n  volume={},\n  number={},\n  pages={1212-1217},\n  abstract={In this paper, we propose and analyze SQuARM-SGD, a communication-efficient algorithm for decentralized training of large-scale machine learning models over a network. In SQuARM-SGD, each node performs a fixed number of local SGD steps using Nesterov's momentum and then sends sparsified and quantized updates to its neighbors regulated by a locally computable triggering criterion. We provide convergence guarantees of our algorithm for general smooth objectives, which, to the best of our knowledge, is the first theoretical analysis for compressed decentralized SGD with momentum updates. We show that SQuARM-SGD converges at rate, matching that of vanilla distributed SGD. We empirically show that SQuARM-SGD saves significantly in total communicated bits over state-of-the-art without sacrificing much on accuracy.},\n  keywords={},\n  doi={10.1109/ISIT45174.2021.9517986},\n  ISSN={},\n  month={July},\n  tags = {conf,CEDL,DML},\n  type = {4},\n  url_arxiv = {https://arxiv.org/abs/2005.07041},\n  }\n\n
\n
\n\n\n
\n In this paper, we propose and analyze SQuARM-SGD, a communication-efficient algorithm for decentralized training of large-scale machine learning models over a network. In SQuARM-SGD, each node performs a fixed number of local SGD steps using Nesterov's momentum and then sends sparsified and quantized updates to its neighbors regulated by a locally computable triggering criterion. We provide convergence guarantees of our algorithm for general smooth objectives, which, to the best of our knowledge, is the first theoretical analysis for compressed decentralized SGD with momentum updates. We show that SQuARM-SGD converges at rate, matching that of vanilla distributed SGD. We empirically show that SQuARM-SGD saves significantly in total communicated bits over state-of-the-art without sacrificing much on accuracy.\n
\n\n\n
\n\n\n
\n \n\n \n \n Antonious M Girgis; Deepesh Data; and Suhas Diggavi.\n\n\n \n \n \n \n \n Renyi Differential Privacy of the Subsampled Shuffle Model in Distributed Learning.\n \n \n \n \n\n\n \n\n\n\n Advances in Neural Information Processing Systems, 34. 2021.\n \n\n\n\n
\n\n\n\n \n \n \"Renyi arxiv\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n  \n \n 1 download\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{girgis2021renyidiff,\n  title={Renyi Differential Privacy of the Subsampled Shuffle Model in Distributed Learning},\n  author={Girgis, Antonious M and Data, Deepesh and Diggavi, Suhas},\n  journal={Advances in Neural Information Processing Systems},\n  volume={34},\n  year={2021},\n  tags={conf,PDL,DML},\n  type={4},\n  url_arxiv={https://arxiv.org/abs/2107.08763},\n  abstract={We study privacy in a distributed learning framework, where clients collaboratively build a learning model iteratively through interactions with a server from whom we need privacy. Motivated by stochastic optimization and the federated learning (FL) paradigm, we focus on the case where a small fraction of data samples are randomly sub-sampled in each round to participate in the learning process, which also enables privacy amplification. To obtain even stronger local privacy guarantees, we study this in the shuffle privacy model, where each client randomizes its response using a local differentially private (LDP) mechanism and the server only receives a random permutation (shuffle) of the clients’ responses without their association to each client. The principal result of this paper is a privacy-optimization performance trade-off for discrete randomization mechanisms in this sub-sampled shuffle privacy model. This is enabled through a new theoretical technique to analyze the Renyi Differential Privacy (RDP) of the sub-sampled shuffle model. We numerically demonstrate that, for important regimes, with composition our bound yields significant improvement in privacy guarantee over the state-of-the-art approximate Differential Privacy (DP) guarantee (with strong composition) for sub-sampled shuffled models. We also demonstrate numerically significant improvement in privacy-learning performance operating point using real data sets.},\n}\n\n
\n
\n\n\n
\n We study privacy in a distributed learning framework, where clients collaboratively build a learning model iteratively through interactions with a server from whom we need privacy. Motivated by stochastic optimization and the federated learning (FL) paradigm, we focus on the case where a small fraction of data samples are randomly sub-sampled in each round to participate in the learning process, which also enables privacy amplification. To obtain even stronger local privacy guarantees, we study this in the shuffle privacy model, where each client randomizes its response using a local differentially private (LDP) mechanism and the server only receives a random permutation (shuffle) of the clients’ responses without their association to each client. The principal result of this paper is a privacy-optimization performance trade-off for discrete randomization mechanisms in this sub-sampled shuffle privacy model. This is enabled through a new theoretical technique to analyze the Renyi Differential Privacy (RDP) of the sub-sampled shuffle model. We numerically demonstrate that, for important regimes, with composition our bound yields significant improvement in privacy guarantee over the state-of-the-art approximate Differential Privacy (DP) guarantee (with strong composition) for sub-sampled shuffled models. We also demonstrate numerically significant improvement in privacy-learning performance operating point using real data sets.\n
\n\n\n
\n\n\n
\n \n\n \n \n Antonious M. Girgis; Deepesh Data; Suhas Diggavi; Ananda Theertha Suresh; and Peter Kairouz.\n\n\n \n \n \n \n \n On the Renyi Differential Privacy of the Shuffle Model.\n \n \n \n \n\n\n \n\n\n\n In Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, of CCS '21, pages 2321–2341, New York, NY, USA, 2021. Association for Computing Machinery\n \n\n\n\n
\n\n\n\n \n \n \"OnPaper\n  \n \n \n \"On arxiv\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n  \n \n 6 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{10.1145/3460120.3484794,\nauthor = {Girgis, Antonious M. and Data, Deepesh and Diggavi, Suhas and Suresh, Ananda Theertha and Kairouz, Peter},\ntitle = {On the Renyi Differential Privacy of the Shuffle Model},\nyear = {2021},\nisbn = {9781450384544},\npublisher = {Association for Computing Machinery},\naddress = {New York, NY, USA},\nurl = {https://doi.org/10.1145/3460120.3484794},\ndoi = {10.1145/3460120.3484794},\nabstract = {The central question studied in this paper is R\\'{e}nyi Differential Privacy (RDP) guarantees for general discrete local randomizers in the shuffle privacy model. In the shuffle model, each of the n clients randomizes its response using a local differentially private (LDP) mechanism and the untrusted server only receives a random permutation (shuffle) of the client responses without association to each client. The principal result in this paper is the first direct RDP bounds for general discrete local randomization in the shuffle privacy model, and we develop new analysis techniques for deriving our results which could be of independent interest. In applications, such an RDP guarantee is most useful when we use it for composing several private interactions. We numerically demonstrate that, for important regimes, with composition our bound yields an improvement in privacy guarantee by a factor of $8times$ over the state-of-the-art approximate Differential Privacy (DP) guarantee (with standard composition) for shuffle models. Moreover, combining with Poisson subsampling, our result leads to at least $10times$ improvement over subsampled approximate DP with standard composition.},\nbooktitle = {Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security},\npages = {2321–2341},\nnumpages = {21},\nkeywords = {distributed learning, renyi divergence, privacy amplification via shuffling, privacy composition, differential privacy},\nlocation = {Virtual Event, Republic of Korea},\nseries = {CCS '21},\n  url_arxiv = {https://arxiv.org/abs/2105.05180},\n  tags = {conf,PDL,DML},\n  type = {4},\n}\n\n
\n
\n\n\n
\n The central question studied in this paper is Rényi Differential Privacy (RDP) guarantees for general discrete local randomizers in the shuffle privacy model. In the shuffle model, each of the n clients randomizes its response using a local differentially private (LDP) mechanism and the untrusted server only receives a random permutation (shuffle) of the client responses without association to each client. The principal result in this paper is the first direct RDP bounds for general discrete local randomization in the shuffle privacy model, and we develop new analysis techniques for deriving our results which could be of independent interest. In applications, such an RDP guarantee is most useful when we use it for composing several private interactions. We numerically demonstrate that, for important regimes, with composition our bound yields an improvement in privacy guarantee by a factor of $8times$ over the state-of-the-art approximate Differential Privacy (DP) guarantee (with standard composition) for shuffle models. Moreover, combining with Poisson subsampling, our result leads to at least $10times$ improvement over subsampled approximate DP with standard composition.\n
\n\n\n
\n\n\n
\n \n\n \n \n Kaan Ozkara; Navjot Singh; Deepesh Data; and Suhas Diggavi.\n\n\n \n \n \n \n \n QuPeD: Quantized Personalization via Distillation with Applications to Federated Learning.\n \n \n \n \n\n\n \n\n\n\n Advances in Neural Information Processing Systems, 34. 2021.\n \n\n\n\n
\n\n\n\n \n \n \"QuPeD: arxiv\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n  \n \n 8 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{ozkara2021quped,\n  title={QuPeD: Quantized Personalization via Distillation with Applications to Federated Learning},\n  author={Ozkara, Kaan and Singh, Navjot and Data, Deepesh and Diggavi, Suhas},\n  journal={Advances in Neural Information Processing Systems},\n  volume={34},\n  year={2021},\n  tags = {conf,CEDL,DML,PFL},\n  url_arxiv = {https://arxiv.org/abs/2107.13892},\n  type = {4},\n  abstract={Traditionally, federated learning (FL) aims to train a single global model while collaboratively using multiple clients and a server. Two natural challenges that FL algorithms face are heterogeneity in data across clients and collaboration of clients with diverse resources. In this work, we introduce a quantized and personalized FL algorithm QuPeD that facilitates collective (personalized model compression) training via knowledge distillation (KD) among clients who have access to heterogeneous data and resources. For personalization, we allow clients to learn compressed personalized models with different quantization parameters and model dimensions/structures. Towards this, first we propose an algorithm for learning quantized models through a relaxed optimization problem, where quantization values are also optimized over. When each client participating in the (federated) learning process has different requirements for the compressed model (both in model dimension and precision), we formulate a compressed personalization framework by introducing knowledge distillation loss for local client objectives collaborating through a global model. We develop an alternating proximal gradient update for solving this compressed personalization problem, and analyze its convergence properties. Numerically, we validate that QuPeD outperforms competing personalized FL methods, FedAvg, and local training of clients in various heterogeneous settings.},\n}\n\n
\n
\n\n\n
\n Traditionally, federated learning (FL) aims to train a single global model while collaboratively using multiple clients and a server. Two natural challenges that FL algorithms face are heterogeneity in data across clients and collaboration of clients with diverse resources. In this work, we introduce a quantized and personalized FL algorithm QuPeD that facilitates collective (personalized model compression) training via knowledge distillation (KD) among clients who have access to heterogeneous data and resources. For personalization, we allow clients to learn compressed personalized models with different quantization parameters and model dimensions/structures. Towards this, first we propose an algorithm for learning quantized models through a relaxed optimization problem, where quantization values are also optimized over. When each client participating in the (federated) learning process has different requirements for the compressed model (both in model dimension and precision), we formulate a compressed personalization framework by introducing knowledge distillation loss for local client objectives collaborating through a global model. We develop an alternating proximal gradient update for solving this compressed personalization problem, and analyze its convergence properties. Numerically, we validate that QuPeD outperforms competing personalized FL methods, FedAvg, and local training of clients in various heterogeneous settings.\n
\n\n\n
\n\n\n
\n \n\n \n \n Deepesh Data; and Suhas Diggavi.\n\n\n \n \n \n \n \n Byzantine-Resilient High-Dimensional SGD with Local Iterations on Heterogeneous Data.\n \n \n \n \n\n\n \n\n\n\n Proceedings International Conference on Machine Learning (ICML). 2021.\n \n\n\n\n
\n\n\n\n \n \n \"Byzantine-Resilient arxiv\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n  \n \n 3 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{data2020byzantine2,\n abstract = {We study stochastic gradient descent (SGD) with local iterations in the presence of malicious/Byzantine clients, motivated by the federated learning. The clients, instead of communicating with the central server in every iteration, maintain their local models, which they update by taking several SGD iterations based on their own datasets and then communicate the net update with the server, thereby achieving communication-efficiency. Furthermore, only a subset of clients communicate with the server, and this subset may be different at different synchronization times. The Byzantine clients may collaborate and send arbitrary vectors to the server to disrupt the learning process. To combat the adversary, we employ an efficient high-dimensional robust mean estimation algorithm from Steinhardt et al.~\\cite[ITCS 2018]{Resilience_SCV18} at the server to filter-out corrupt vectors; and to analyze the outlier-filtering procedure, we develop a novel matrix concentration result that may be of independent interest. \nWe provide convergence analyses for strongly-convex and non-convex smooth objectives in the heterogeneous data setting, where different clients may have different local datasets, and we do not make any probabilistic assumptions on data generation. We believe that ours is the first Byzantine-resilient algorithm and analysis with local iterations. We derive our convergence results under minimal assumptions of bounded variance for SGD and bounded gradient dissimilarity (which captures heterogeneity among local datasets). We also extend our results to the case when clients compute full-batch gradients.},\n author = {Data, Deepesh and Diggavi, Suhas},\n journal = {Proceedings International Conference on Machine Learning (ICML)},\n tags = {conf,SDL,DML},\n title = {Byzantine-Resilient High-Dimensional SGD with Local Iterations on Heterogeneous Data},\n type = {4},\n url_arxiv = {https://arxiv.org/abs/2006.13041},\n year = {2021}\n}\n\n
\n
\n\n\n
\n We study stochastic gradient descent (SGD) with local iterations in the presence of malicious/Byzantine clients, motivated by the federated learning. The clients, instead of communicating with the central server in every iteration, maintain their local models, which they update by taking several SGD iterations based on their own datasets and then communicate the net update with the server, thereby achieving communication-efficiency. Furthermore, only a subset of clients communicate with the server, and this subset may be different at different synchronization times. The Byzantine clients may collaborate and send arbitrary vectors to the server to disrupt the learning process. To combat the adversary, we employ an efficient high-dimensional robust mean estimation algorithm from Steinhardt et al. i̧te[ITCS 2018]Resilience_SCV18 at the server to filter-out corrupt vectors; and to analyze the outlier-filtering procedure, we develop a novel matrix concentration result that may be of independent interest. We provide convergence analyses for strongly-convex and non-convex smooth objectives in the heterogeneous data setting, where different clients may have different local datasets, and we do not make any probabilistic assumptions on data generation. We believe that ours is the first Byzantine-resilient algorithm and analysis with local iterations. We derive our convergence results under minimal assumptions of bounded variance for SGD and bounded gradient dissimilarity (which captures heterogeneity among local datasets). We also extend our results to the case when clients compute full-batch gradients.\n
\n\n\n
\n\n\n
\n \n\n \n \n Pavlos Nikolopoulos; Tao Guo; Sundara Rajan Srinivasavaradhan; Christina Fragouli; and Suhas Diggavi.\n\n\n \n \n \n \n \n Group testing for connected communities.\n \n \n \n \n\n\n \n\n\n\n Proceedings of The 24th International Conference on Artificial Intelligence and Statistics, 130: 2341–2349. 13–15 Apr 2021.\n \n\n\n\n
\n\n\n\n \n \n \"Group arxiv\n  \n \n \n \"GroupPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n  \n \n 6 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{nikolopoulos2021community,\n  title = {Group testing for connected communities},\n  author = {Nikolopoulos, Pavlos and Guo, Tao and Srinivasavaradhan, Sundara Rajan and Fragouli, Christina and Diggavi, Suhas},\n  journal = {Proceedings of The 24th International Conference on Artificial Intelligence and Statistics},\n  year = {2021},\n  pages =   {2341--2349},\n  type = {4},\n  tags = {conf,PET},\n  url_arxiv = {https://arxiv.org/abs/2007.08111},\n  volume =   {130},\n  series =   {Proceedings of Machine Learning Research},\n  month =   {13--15 Apr},\n  publisher =    {PMLR},\n  url = {http://proceedings.mlr.press/v130/nikolopoulos21a.html},\n  abstract =   { In this paper, we propose algorithms that leverage a known community structure to make group testing more efficient. We consider a population organized in disjoint communities: each individual participates in a community, and its infection probability depends on the community (s)he participates in. Use cases include families, students who participate in several classes, and workers who share common spaces. Group testing reduces the number of tests needed to identify the infected individuals by pooling diagnostic samples and testing them together. We show that if we design the testing strategy taking into account the community structure, we can significantly reduce the number of tests needed for adaptive and non-adaptive group testing, and can improve the reliability in cases where tests are noisy.}\n}\n\n
\n
\n\n\n
\n In this paper, we propose algorithms that leverage a known community structure to make group testing more efficient. We consider a population organized in disjoint communities: each individual participates in a community, and its infection probability depends on the community (s)he participates in. Use cases include families, students who participate in several classes, and workers who share common spaces. Group testing reduces the number of tests needed to identify the infected individuals by pooling diagnostic samples and testing them together. We show that if we design the testing strategy taking into account the community structure, we can significantly reduce the number of tests needed for adaptive and non-adaptive group testing, and can improve the reliability in cases where tests are noisy.\n
\n\n\n
\n\n\n
\n \n\n \n \n Antonious M Girgis; Deepesh Data; Suhas Diggavi; Peter Kairouz; and Ananda Theertha Suresh.\n\n\n \n \n \n \n \n Shuffled Model of Federated Learning: Privacy, Communication and Accuracy Trade-offs.\n \n \n \n \n\n\n \n\n\n\n Proceedings of The 24th International Conference on Artificial Intelligence and Statistics,2521–2529. 2021.\n \n\n\n\n
\n\n\n\n \n \n \"Shuffled arxiv\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n  \n \n 4 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{girgis2020shuffledpreprint,\n abstract = {We consider a distributed empirical risk minimization (ERM) optimization problem with communication efficiency and privacy requirements, motivated by the federated learning (FL) framework. Unique challenges to the traditional ERM problem in the context of FL include (i) need to provide privacy guarantees on clients' data, (ii) compress the communication between clients and the server, since clients might have low-bandwidth links, (iii) work with a dynamic client population at each round of communication between the server and the clients, as a small fraction of clients are sampled at each round. To address these challenges we develop (optimal) communication-efficient schemes for private mean estimation for several ℓp spaces, enabling efficient gradient aggregation for each iteration of the optimization solution of the ERM. We also provide lower and upper bounds for mean estimation with privacy and communication constraints for arbitrary ℓp spaces. To get the overall communication, privacy, and optimization performance operation point, we combine this with privacy amplification opportunities inherent to this setup. Our solution takes advantage of the inherent privacy amplification provided by client sampling and data sampling at each client (through Stochastic Gradient Descent) as well as the recently developed privacy framework using anonymization, which effectively presents to the server responses that are randomly shuffled with respect to the clients. Putting these together, we demonstrate that one can get the same privacy, optimization-performance operating point developed in recent methods that use full-precision communication, but at a much lower communication cost, i.e., effectively getting communication efficiency for "free".},\n author = {Girgis, Antonious M and Data, Deepesh and Diggavi, Suhas and Kairouz, Peter and Suresh, Ananda Theertha},\n journal = {Proceedings of The 24th International Conference on Artificial Intelligence and Statistics},\n pages={2521--2529},\n tags = {conf,DML,PDL},\n organization={PMLR},\n title = {Shuffled Model of Federated Learning: Privacy, Communication and Accuracy Trade-offs},\n type = {4},\n url_arxiv = {https://arxiv.org/abs/2008.07180},\n year = {2021},\n}\n\n
\n
\n\n\n
\n We consider a distributed empirical risk minimization (ERM) optimization problem with communication efficiency and privacy requirements, motivated by the federated learning (FL) framework. Unique challenges to the traditional ERM problem in the context of FL include (i) need to provide privacy guarantees on clients' data, (ii) compress the communication between clients and the server, since clients might have low-bandwidth links, (iii) work with a dynamic client population at each round of communication between the server and the clients, as a small fraction of clients are sampled at each round. To address these challenges we develop (optimal) communication-efficient schemes for private mean estimation for several ℓp spaces, enabling efficient gradient aggregation for each iteration of the optimization solution of the ERM. We also provide lower and upper bounds for mean estimation with privacy and communication constraints for arbitrary ℓp spaces. To get the overall communication, privacy, and optimization performance operation point, we combine this with privacy amplification opportunities inherent to this setup. Our solution takes advantage of the inherent privacy amplification provided by client sampling and data sampling at each client (through Stochastic Gradient Descent) as well as the recently developed privacy framework using anonymization, which effectively presents to the server responses that are randomly shuffled with respect to the clients. Putting these together, we demonstrate that one can get the same privacy, optimization-performance operating point developed in recent methods that use full-precision communication, but at a much lower communication cost, i.e., effectively getting communication efficiency for \"free\".\n
\n\n\n
\n\n\n
\n \n\n \n \n Antonious Girgis; Deepesh Data; and Suhas Diggavi.\n\n\n \n \n \n \n Differentially Private Federated Learning with Shuffling and Client Self-Sampling.\n \n \n \n\n\n \n\n\n\n In IEEE International Symposium on Information Theory (ISIT), 2021. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{girgis2021differentially,\n  title={Differentially Private Federated Learning with Shuffling and Client Self-Sampling},\n  author={Girgis, Antonious and Data, Deepesh and Diggavi, Suhas},\n  booktitle={IEEE International Symposium on Information Theory (ISIT)},\n  year={2021},\n  type={4},\n  tags={conf,PDL,DML},\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n Sundar Srinivasavaradhan; Pavlos Nikolopoulos; Christina Fragouli; and Suhas N. Diggavi.\n\n\n \n \n \n \n An Entropy Reduction Approach to Continual Testing.\n \n \n \n\n\n \n\n\n\n In IEEE International Symposium on Information Theory (ISIT), 2021. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 1 download\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{sundar2021entropy,\n  title={An Entropy Reduction Approach to Continual Testing},\n  author={Srinivasavaradhan, Sundar and Nikolopoulos, Pavlos and Fragouli, Christina and Diggavi, Suhas N.},\n  booktitle={IEEE International Symposium on Information Theory (ISIT)},\n  year={2021},\n  type={4},\n  tags={conf,PET},\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 7\n \n \n (1)\n \n \n
\n
\n \n \n
\n \n\n \n \n Suhas Diggavi; Abbas El Gamal; Ioannis Kontoyiannis; Ajit Paranjpe; and Murali Subbarao.\n\n\n \n \n \n \n Joy Thomas: Legacy, Foundation and the IT Society.\n \n \n \n\n\n \n\n\n\n IEEE BITS the Information Theory Magazine, 1(1): 85-88. Sep. 2021.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@ARTICLE{9527149,\n  author={Diggavi, Suhas and Gamal, Abbas El and Kontoyiannis, Ioannis and Paranjpe, Ajit and Subbarao, Murali},\n  journal={IEEE BITS the Information Theory Magazine}, \n  title={Joy Thomas: Legacy, Foundation and the IT Society}, \n  year={2021},\n  volume={1},\n  number={1},\n  pages={85-88},\n  abstract={In this article, we commemorate Joy Thomas, who sadly passed away in 2020. Joy is best known for his seminal textbook Elements of Information Theory, coauthored with his Ph.D. advisor, the late Thomas Cover. We also catalog some of Joy’s technical contributions to information theory and to its practice. Joy also made an impact on industry through several successful startups. In recognition of Joy’s contribution to the exposition of information theory, the IEEE Information Theory Society Board of Governors has agreed to establish the Joy Thomas IEEE Information Theory Society Tutorial Paper Award. The Joy Thomas Foundation, established to honor Joy’s legacy of excellence and giving back, will sponsor this award.},\n  keywords={},\n  doi={10.1109/MBITS.2021.3108946},\n  ISSN={2692-4110},\n  month={Sep.},\n  tags={perspectives},\n  type={7},\n  }\n\n
\n
\n\n\n
\n In this article, we commemorate Joy Thomas, who sadly passed away in 2020. Joy is best known for his seminal textbook Elements of Information Theory, coauthored with his Ph.D. advisor, the late Thomas Cover. We also catalog some of Joy’s technical contributions to information theory and to its practice. Joy also made an impact on industry through several successful startups. In recognition of Joy’s contribution to the exposition of information theory, the IEEE Information Theory Society Board of Governors has agreed to establish the Joy Thomas IEEE Information Theory Society Tutorial Paper Award. The Joy Thomas Foundation, established to honor Joy’s legacy of excellence and giving back, will sponsor this award.\n
\n\n\n
\n\n\n\n\n\n
\n
\n\n\n\n\n
\n
\n\n
\n
\n  \n 2020\n \n \n (4)\n \n \n
\n
\n \n \n
\n
\n  \n 1\n \n \n (1)\n \n \n
\n
\n \n \n
\n \n\n \n \n Deepesh Data; and Suhas Diggavi.\n\n\n \n \n \n \n \n Byzantine-Resilient SGD in High Dimensions on Heterogeneous Data.\n \n \n \n \n\n\n \n\n\n\n arXiv preprint arXiv:2005.07866. 2020.\n \n\n\n\n
\n\n\n\n \n \n \"Byzantine-Resilient arxiv\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n  \n \n 1 download\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{data2020byzantine1,\n abstract = {We study distributed stochastic gradient descent (SGD) in the master-worker architecture under Byzantine attacks. We consider the heterogeneous data model, where different workers may have different local datasets, and we do not make any probabilistic assumptions on data generation. At the core of our algorithm, we use the polynomial-time outlier-filtering procedure for robust mean estimation proposed by Steinhardt et al. (ITCS 2018) to filter-out corrupt gradients. In order to be able to apply their filtering procedure in our {\\em heterogeneous} data setting where workers compute {\\em stochastic} gradients, we derive a new matrix concentration result, which may be of independent interest. \nWe provide convergence analyses for smooth strongly-convex and non-convex objectives. We derive our results under the bounded variance assumption on local stochastic gradients and a {\\em deterministic} condition on datasets, namely, gradient dissimilarity; and for both these quantities, we provide concrete bounds in the statistical heterogeneous data model. We give a trade-off between the mini-batch size for stochastic gradients and the approximation error. Our algorithm can tolerate up to 14 fraction Byzantine workers. It can find approximate optimal parameters in the strongly-convex setting exponentially fast and reach to an approximate stationary point in the non-convex setting with a linear speed, thus, matching the convergence rates of vanilla SGD in the Byzantine-free setting. \nWe also propose and analyze a Byzantine-resilient SGD algorithm with gradient compression, where workers send k random coordinates of their gradients. Under mild conditions, we show a d/k-factor saving in communication bits as well as decoding complexity over our compression-free algorithm without affecting its convergence rate (order-wise) and the approximation error.},\n author = {Data, Deepesh and Diggavi, Suhas},\n journal = {arXiv preprint arXiv:2005.07866},\n tags = {journalSub,SDL,DML},\n title = {Byzantine-Resilient SGD in High Dimensions on Heterogeneous Data},\n type = {1},\n url_arxiv = {https://arxiv.org/abs/2005.07866},\n year = {2020}\n}\n\n
\n
\n\n\n
\n We study distributed stochastic gradient descent (SGD) in the master-worker architecture under Byzantine attacks. We consider the heterogeneous data model, where different workers may have different local datasets, and we do not make any probabilistic assumptions on data generation. At the core of our algorithm, we use the polynomial-time outlier-filtering procedure for robust mean estimation proposed by Steinhardt et al. (ITCS 2018) to filter-out corrupt gradients. In order to be able to apply their filtering procedure in our \\em heterogeneous data setting where workers compute \\em stochastic gradients, we derive a new matrix concentration result, which may be of independent interest. We provide convergence analyses for smooth strongly-convex and non-convex objectives. We derive our results under the bounded variance assumption on local stochastic gradients and a \\em deterministic condition on datasets, namely, gradient dissimilarity; and for both these quantities, we provide concrete bounds in the statistical heterogeneous data model. We give a trade-off between the mini-batch size for stochastic gradients and the approximation error. Our algorithm can tolerate up to 14 fraction Byzantine workers. It can find approximate optimal parameters in the strongly-convex setting exponentially fast and reach to an approximate stationary point in the non-convex setting with a linear speed, thus, matching the convergence rates of vanilla SGD in the Byzantine-free setting. We also propose and analyze a Byzantine-resilient SGD algorithm with gradient compression, where workers send k random coordinates of their gradients. Under mild conditions, we show a d/k-factor saving in communication bits as well as decoding complexity over our compression-free algorithm without affecting its convergence rate (order-wise) and the approximation error.\n
\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2\n \n \n (6)\n \n \n
\n
\n \n \n
\n \n\n \n \n J. Sebastian; and S. N. Diggavi.\n\n\n \n \n \n \n Generalized Degrees Freedom of Noncoherent MIMO Channels With Asymmetric Link Strengths.\n \n \n \n\n\n \n\n\n\n IEEE Transactions on Information Theory, 66(7): 4431-4448. July 2020.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@article{9023963,\n abstract = {We study the generalized degrees of freedom (gDoF) of block-fading noncoherent multiple input multiple output (MIMO) channels with asymmetric distributions of link strengths and a coherence time of T symbol durations. We derive the optimal signaling structure for communication for the asymmetric MIMO channel, which is distinct from that for the MIMO channel with independent and identically distributed (i.i.d.) links. We extend the existing results for the single input multiple output (SIMO) channel with i.i.d. links to the asymmetric case, proving that selecting the statistically best antenna is gDoFoptimal. Using the gDoF result for the SIMO channel, we prove that for T = 1, the gDoF is zero for MIMO channels with arbitrary link strengths. We show that selecting the statistically best antenna is gDoF-optimal for the multiple input single output (MISO) channel. We also derive the gDoF for the 2 x 2 MIMO channel with different exponents in the direct and cross links. In this setting, we show that it is always necessary to use both the antennas to achieve the gDoF, in contrast to the results for the 2 x 2 MIMO channel with i.i.d. links. We show that having weaker crosslinks, gives gDoF gain compared to the case with i.i.d. links. For the noncoherent MIMO channel with i.i.d. links, the traditional method of training each transmit antenna independently is degrees of freedom (DoF) optimal, whereas we observe that for the asymmetric 2 x 2 MIMO channel, the traditional training is not gDoF-optimal. We extend this observation to a larger MxM MIMO channel by demonstrating a strategy that can achieve larger gDoF than a traditional trainingbased method.},\n author = {J. {Sebastian} and S. N. {Diggavi}},\n doi = {10.1109/TIT.2020.2978183},\n issn = {1557-9654},\n journal = {IEEE Transactions on Information Theory},\n keywords = {MIMO communication;MISO communication;SIMO communication;transmitting antennas;generalized degrees freedom;noncoherent MIMO channel;asymmetric link strengths;block-fading noncoherent multiple input multiple output channels;asymmetric distributions;optimal signaling structure;asymmetric MIMO channel;single input multiple output channel;asymmetric case;SIMO channel;arbitrary link strengths;multiple input single output channel;direct links;cross links;gDoF gain;degrees of freedom optimal;MxM MIMO channel;MIMO communication;Signal to noise ratio;Fading channels;Transmitting antennas;Coherence;MISO communication;Degrees of freedom (DoF);multiple antennas;time-varying channels;noncoherent communication},\n month = {July},\n number = {7},\n pages = {4431-4448},\n tags = {journal,IT,ANIT,WiNetnew,NCWN,WNIF},\n title = {Generalized Degrees Freedom of Noncoherent MIMO Channels With Asymmetric Link Strengths},\n type = {2},\n volume = {66},\n year = {2020}\n}\n\n
\n
\n\n\n
\n We study the generalized degrees of freedom (gDoF) of block-fading noncoherent multiple input multiple output (MIMO) channels with asymmetric distributions of link strengths and a coherence time of T symbol durations. We derive the optimal signaling structure for communication for the asymmetric MIMO channel, which is distinct from that for the MIMO channel with independent and identically distributed (i.i.d.) links. We extend the existing results for the single input multiple output (SIMO) channel with i.i.d. links to the asymmetric case, proving that selecting the statistically best antenna is gDoFoptimal. Using the gDoF result for the SIMO channel, we prove that for T = 1, the gDoF is zero for MIMO channels with arbitrary link strengths. We show that selecting the statistically best antenna is gDoF-optimal for the multiple input single output (MISO) channel. We also derive the gDoF for the 2 x 2 MIMO channel with different exponents in the direct and cross links. In this setting, we show that it is always necessary to use both the antennas to achieve the gDoF, in contrast to the results for the 2 x 2 MIMO channel with i.i.d. links. We show that having weaker crosslinks, gives gDoF gain compared to the case with i.i.d. links. For the noncoherent MIMO channel with i.i.d. links, the traditional method of training each transmit antenna independently is degrees of freedom (DoF) optimal, whereas we observe that for the asymmetric 2 x 2 MIMO channel, the traditional training is not gDoF-optimal. We extend this observation to a larger MxM MIMO channel by demonstrating a strategy that can achieve larger gDoF than a traditional trainingbased method.\n
\n\n\n
\n\n\n
\n \n\n \n \n J. Sebastian; and S. Diggavi.\n\n\n \n \n \n \n \n Generalized Degrees of Freedom of Noncoherent Diamond Networks.\n \n \n \n \n\n\n \n\n\n\n IEEE Transactions on Information Theory, 66(8): 5228-5260. Aug 2020.\n \n\n\n\n
\n\n\n\n \n \n \"Generalized arxiv\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n  \n \n 3 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@article{9046857,\n abstract = {We study the generalized degrees of freedom (gDoF) of the noncoherent diamond (parallel relay) wireless network with asymmetric distributions of link strengths. We use the noncoherent block-fading model introduced by Marzetta and Hochwald, where no channel state information is available at the transmitters or at the receivers and the channels remain constant for a coherence time of T symbol durations. We first derive an upper bound for the capacity of this channel and then derive the optimal structure for the solution of the upper bound optimization problem. Using the optimal structure, we solve the upper bound optimization problem in terms of its gDoF. Using insights from our upper bound signaling solution, we devise an achievability strategy based on a novel scheme that we call train-scale quantize-map-forward (TS-QMF). This scheme uses training in the links from the source to the relays, scaling and quantizing at the relays combined with nontraining-based schemes. We show the optimality of this scheme by comparing it to the upper bound in terms of the gDoF. In noncoherent point-to-point multiple-input-multiple-output (MIMO) channels, where the fading realization is unknown to the transmitter and the receiver, an important tradeoff between communication and channel learning was revealed by Zheng and Tse, by demonstrating that not all the available antennas might be used, as it is suboptimal to learn all their channel parameters. Our results in this paper for the diamond network demonstrate that in certain regimes of relative channel strengths, the gDoF-optimal scheme uses a subnetwork, demonstrating a similar tradeoff between channel learning and communication. In some regimes, it is gDoF-optimal to do relay selection, i.e., use a part of the network. In the other regimes, even when it is essential to use the entire network, it is suboptimal to learn the channel states for all the links in the network, i.e., traditional training-based schemes are suboptimal in these regimes.},\n author = {J. {Sebastian} and S. {Diggavi}},\n doi = {10.1109/TIT.2020.2983169},\n issn = {1557-9654},\n journal = {IEEE Transactions on Information Theory},\n keywords = {channel capacity;fading channels;learning (artificial intelligence);MIMO communication;optimisation;quantisation (signal);radio receivers;radio transmitters;relay networks (telecommunication);telecommunication computing;noncoherent point-to-point MIMO channel;noncoherent point-to-point multiple-input-multiple-output channel;TS-QMF;bound signaling solution;bound optimization problem;channel capacity;Hochwald;Marzetta;block-fading model;asymmetric distribution;noncoherent diamond wireless network;generalized degrees of freedom;noncoherent diamond network;gDoF-optimal scheme;train-scale quantize-map-forward;channel state information;Signal to noise ratio;Relays;Diamond;MIMO communication;Upper bound;Fading channels;Wireless networks;Noncoherent communication;degrees of freedom (DoF);relay channels;diamond network;time-varying channels},\n month = {Aug},\n number = {8},\n pages = {5228-5260},\n tags = {journal,IT,ANIT,WiNetnew,NCWN,WNIF},\n title = {Generalized Degrees of Freedom of Noncoherent Diamond Networks},\n type = {2},\n url_arxiv = {https://arxiv.org/abs/1802.02667},\n volume = {66},\n year = {2020}\n}\n\n
\n
\n\n\n
\n We study the generalized degrees of freedom (gDoF) of the noncoherent diamond (parallel relay) wireless network with asymmetric distributions of link strengths. We use the noncoherent block-fading model introduced by Marzetta and Hochwald, where no channel state information is available at the transmitters or at the receivers and the channels remain constant for a coherence time of T symbol durations. We first derive an upper bound for the capacity of this channel and then derive the optimal structure for the solution of the upper bound optimization problem. Using the optimal structure, we solve the upper bound optimization problem in terms of its gDoF. Using insights from our upper bound signaling solution, we devise an achievability strategy based on a novel scheme that we call train-scale quantize-map-forward (TS-QMF). This scheme uses training in the links from the source to the relays, scaling and quantizing at the relays combined with nontraining-based schemes. We show the optimality of this scheme by comparing it to the upper bound in terms of the gDoF. In noncoherent point-to-point multiple-input-multiple-output (MIMO) channels, where the fading realization is unknown to the transmitter and the receiver, an important tradeoff between communication and channel learning was revealed by Zheng and Tse, by demonstrating that not all the available antennas might be used, as it is suboptimal to learn all their channel parameters. Our results in this paper for the diamond network demonstrate that in certain regimes of relative channel strengths, the gDoF-optimal scheme uses a subnetwork, demonstrating a similar tradeoff between channel learning and communication. In some regimes, it is gDoF-optimal to do relay selection, i.e., use a part of the network. In the other regimes, even when it is essential to use the entire network, it is suboptimal to learn the channel states for all the links in the network, i.e., traditional training-based schemes are suboptimal in these regimes.\n
\n\n\n
\n\n\n
\n \n\n \n \n D. Basu; D. Data; C. Karakus; and S. N. Diggavi.\n\n\n \n \n \n \n \n Qsparse-Local-SGD: Distributed SGD With Quantization, Sparsification, and Local Computations.\n \n \n \n \n\n\n \n\n\n\n IEEE Journal on Selected Areas in Information Theory, 1(1): 217-226. May 2020.\n \n\n\n\n
\n\n\n\n \n \n \"Qsparse-Local-SGD: arxiv\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n  \n \n 3 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@article{9057579,\n abstract = {Communication bottleneck has been identified as a significant issue in distributed optimization of large-scale learning models. Recently, several approaches to mitigate this problem have been proposed, including different forms of gradient compression or computing local models and mixing them iteratively. In this paper, we propose Qsparse-local-SGD algorithm, which combines aggressive sparsification with quantization and local computation along with error compensation, by keeping track of the difference between the true and compressed gradients. We propose both synchronous and asynchronous implementations of Qsparse-local-SGD. We analyze convergence for Qsparse-local-SGD in the distributed setting for smooth non-convex and convex objective functions. We demonstrate that Qsparse-local-SGD converges at the same rate as vanilla distributed SGD for many important classes of sparsifiers and quantizers. We use Qsparse-local-SGD to train ResNet-50 on ImageNet and show that it results in significant savings over the state-of-the-art, in the number of bits transmitted to reach target accuracy.},\n author = {D. {Basu} and D. {Data} and C. {Karakus} and S. N. {Diggavi}},\n doi = {10.1109/JSAIT.2020.2985917},\n issn = {2641-8770},\n journal = {IEEE Journal on Selected Areas in Information Theory},\n keywords = {concave programming;convex programming;gradient methods;learning (artificial intelligence);optimisation;stochastic processes;stochastic gradient descent;convex objective functions;nonconvex objective functions;error compensation;sparsification;Qsparse-local-SGD;distributed setting;compressed gradients;true gradients;gradient compression;large-scale learning models;distributed optimization;quantization;vanilla distributed SGD;Quantization (signal);Convergence;Computational modeling;Stochastic processes;Training;Peer-to-peer computing;Optimization;Distributed optimization and learning;stochastic optimization;communication efficient training methods},\n month = {May},\n number = {1},\n pages = {217-226},\n tags = {journal,CEDL,DML},\n title = {Qsparse-Local-SGD: Distributed SGD With Quantization, Sparsification, and Local Computations},\n type = {2},\n url_arxiv = {https://arxiv.org/abs/1906.02367},\n volume = {1},\n year = {2020}\n}\n\n
\n
\n\n\n
\n Communication bottleneck has been identified as a significant issue in distributed optimization of large-scale learning models. Recently, several approaches to mitigate this problem have been proposed, including different forms of gradient compression or computing local models and mixing them iteratively. In this paper, we propose Qsparse-local-SGD algorithm, which combines aggressive sparsification with quantization and local computation along with error compensation, by keeping track of the difference between the true and compressed gradients. We propose both synchronous and asynchronous implementations of Qsparse-local-SGD. We analyze convergence for Qsparse-local-SGD in the distributed setting for smooth non-convex and convex objective functions. We demonstrate that Qsparse-local-SGD converges at the same rate as vanilla distributed SGD for many important classes of sparsifiers and quantizers. We use Qsparse-local-SGD to train ResNet-50 on ImageNet and show that it results in significant savings over the state-of-the-art, in the number of bits transmitted to reach target accuracy.\n
\n\n\n
\n\n\n
\n \n\n \n \n O. A. Hanna; Y. H. Ezzeldin; T. Sadjadpour; C. Fragouli; and S. Diggavi.\n\n\n \n \n \n \n \n On Distributed Quantization for Classification.\n \n \n \n \n\n\n \n\n\n\n IEEE Journal on Selected Areas in Information Theory, 1(1): 237-249. May 2020.\n \n\n\n\n
\n\n\n\n \n \n \"On arxiv\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n  \n \n 2 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@article{9061031,\n abstract = {We consider the problem of distributed feature quantization, where the goal is to enable a pretrained classifier at a central node to carry out its classification on features that are gathered from distributed nodes through communication constrained channels. We propose the design of distributed quantization schemes specifically tailored to the classification task: unlike quantization schemes that help the central node reconstruct the original signal as accurately as possible, our focus is not reconstruction accuracy, but instead correct classification. Our work does not make any a priori distributional assumptions on the data, but instead uses training data for the quantizer design. Our main contributions include: we prove NP-hardness of finding optimal quantizers in the general case; we design an optimal scheme for a special case; we propose quantization algorithms, that leverage discrete neural representations and training data, and can be designed in polynomial-time for any number of features, any number of classes, and arbitrary division of features across the distributed nodes. We find that tailoring the quantizers to the classification task can offer significant savings: as compared to alternatives, we can achieve more than a factor of two reduction in terms of the number of bits communicated, for the same classification accuracy.},\n author = {O. A. {Hanna} and Y. H. {Ezzeldin} and T. {Sadjadpour} and C. {Fragouli} and S. {Diggavi}},\n doi = {10.1109/JSAIT.2020.2986467},\n issn = {2641-8770},\n journal = {IEEE Journal on Selected Areas in Information Theory},\n keywords = {computational complexity;optimisation;quantisation (signal);signal classification;signal reconstruction;signal representation;distributed feature quantization;pretrained classifier;central node;distributed nodes;communication constrained channels;classification task;quantizer design;quantization algorithms;neural representations;training data;distributed quantization;NP-hardness;signal reconstruction;Quantization (signal);Image reconstruction;Training;Testing;Information theory;Task analysis;Training data;Distributed quantization;inference;communication-bounded inference;quantization with deep learning},\n month = {May},\n number = {1},\n pages = {237-249},\n tags = {journal,DML,CEDL},\n title = {On Distributed Quantization for Classification},\n type = {2},\n url_arxiv = {https://arxiv.org/abs/1911.00216},\n volume = {1},\n year = {2020}\n}\n\n
\n
\n\n\n
\n We consider the problem of distributed feature quantization, where the goal is to enable a pretrained classifier at a central node to carry out its classification on features that are gathered from distributed nodes through communication constrained channels. We propose the design of distributed quantization schemes specifically tailored to the classification task: unlike quantization schemes that help the central node reconstruct the original signal as accurately as possible, our focus is not reconstruction accuracy, but instead correct classification. Our work does not make any a priori distributional assumptions on the data, but instead uses training data for the quantizer design. Our main contributions include: we prove NP-hardness of finding optimal quantizers in the general case; we design an optimal scheme for a special case; we propose quantization algorithms, that leverage discrete neural representations and training data, and can be designed in polynomial-time for any number of features, any number of classes, and arbitrary division of features across the distributed nodes. We find that tailoring the quantizers to the classification task can offer significant savings: as compared to alternatives, we can achieve more than a factor of two reduction in terms of the number of bits communicated, for the same classification accuracy.\n
\n\n\n
\n\n\n
\n \n\n \n \n Antonious M Girgis; Deepesh Data; Kamalika Chaudhuri; Christina Fragouli; and Suhas Diggavi.\n\n\n \n \n \n \n \n Successive Refinement of Privacy.\n \n \n \n \n\n\n \n\n\n\n IEEE Journal on Selected Areas in Information Theory (JSAIT), 1(3): 745-759. 2020.\n \n\n\n\n
\n\n\n\n \n \n \"Successive arxiv\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n  \n \n 2 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{girgis2020successive,\n abstract = {This work examines a novel question: how much randomness is needed to achieve local differential privacy (LDP)? A motivating scenario is providing {\\em multiple levels of privacy} to multiple analysts, either for distribution or for heavy-hitter estimation, using the \\emph{same} (randomized) output. We call this setting \\emph{successive refinement of privacy}, as it provides hierarchical access to the raw data with different privacy levels. For example, the same randomized output could enable one analyst to reconstruct the input, while another can only estimate the distribution subject to LDP requirements. This extends the classical Shannon (wiretap) security setting to local differential privacy. We provide (order-wise) tight characterizations of privacy-utility-randomness trade-offs in several cases for distribution estimation, including the standard LDP setting under a randomness constraint. We also provide a non-trivial privacy mechanism for multi-level privacy. Furthermore, we show that we cannot reuse random keys over time while preserving privacy of each user.},\n author = {Girgis, Antonious M and Data, Deepesh and Chaudhuri, Kamalika and Fragouli, Christina and Diggavi, Suhas},\n journal = {IEEE Journal on Selected Areas in Information Theory (JSAIT)},\n tags = {journal,DML,PDL},\n title = {Successive Refinement of Privacy},\n type = {2},\n url_arxiv = {https://arxiv.org/abs/2005.11651},\n year = {2020},\n doi={10.1109/JSAIT.2020.3040403},\n volume={1},\n number={3},\n pages={745-759},\n}\n\n
\n
\n\n\n
\n This work examines a novel question: how much randomness is needed to achieve local differential privacy (LDP)? A motivating scenario is providing \\em multiple levels of privacy to multiple analysts, either for distribution or for heavy-hitter estimation, using the \\emphsame (randomized) output. We call this setting \\emphsuccessive refinement of privacy, as it provides hierarchical access to the raw data with different privacy levels. For example, the same randomized output could enable one analyst to reconstruct the input, while another can only estimate the distribution subject to LDP requirements. This extends the classical Shannon (wiretap) security setting to local differential privacy. We provide (order-wise) tight characterizations of privacy-utility-randomness trade-offs in several cases for distribution estimation, including the standard LDP setting under a randomness constraint. We also provide a non-trivial privacy mechanism for multi-level privacy. Furthermore, we show that we cannot reuse random keys over time while preserving privacy of each user.\n
\n\n\n
\n\n\n
\n \n\n \n \n Mehrdad Showkatbakhsh; Yasser Shoukry; Suhas N. Diggavi; and Paulo Tabuada.\n\n\n \n \n \n \n \n Securing state reconstruction under sensor and actuator attacks: Theory and design.\n \n \n \n \n\n\n \n\n\n\n Automatica, 116: 108920. 2020.\n \n\n\n\n
\n\n\n\n \n \n \"Securing link\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n\n\n\n
\n
@article{SHOWKATBAKHSH2020108920,\n abstract = {This paper discusses the problem of reconstructing the state of a linear time invariant system when some of its actuators and sensors are compromised by an adversarial agent. In the model considered in this paper, the adversarial agent attacks an input (output) by manipulating its value arbitrarily, i.e., we impose no constraints (statistical or otherwise) on how control commands (sensor measurements) are changed by the adversary other than a bound on the number of attacked actuators and sensors In the first part of this paper, we introduce the notion of sparse strong observability and we show that is a necessary and sufficient condition for correctly reconstructing the state despite the considered attacks. In the second half of this work, we propose an observer to harness the complexity of this intrinsically combinatorial problem, by leveraging satisfiability modulo theory solving. Numerical simulations illustrate the effectiveness and scalability of our observer.},\n author = {Mehrdad Showkatbakhsh and Yasser Shoukry and Suhas N. Diggavi and Paulo Tabuada},\n doi = {https://doi.org/10.1016/j.automatica.2020.108920},\n issn = {0005-1098},\n journal = {Automatica},\n keywords = {Cyber–physical security, State reconstruction, Security monitoring},\n pages = {108920},\n tags = {journal,CPS},\n title = {Securing state reconstruction under sensor and actuator attacks: Theory and design},\n type = {2},\n url_link = {http://www.sciencedirect.com/science/article/pii/S0005109820301187},\n volume = {116},\n year = {2020}\n}\n\n
\n
\n\n\n
\n This paper discusses the problem of reconstructing the state of a linear time invariant system when some of its actuators and sensors are compromised by an adversarial agent. In the model considered in this paper, the adversarial agent attacks an input (output) by manipulating its value arbitrarily, i.e., we impose no constraints (statistical or otherwise) on how control commands (sensor measurements) are changed by the adversary other than a bound on the number of attacked actuators and sensors In the first part of this paper, we introduce the notion of sparse strong observability and we show that is a necessary and sufficient condition for correctly reconstructing the state despite the considered attacks. In the second half of this work, we propose an observer to harness the complexity of this intrinsically combinatorial problem, by leveraging satisfiability modulo theory solving. Numerical simulations illustrate the effectiveness and scalability of our observer.\n
\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 3\n \n \n (3)\n \n \n
\n
\n \n \n
\n \n\n \n \n Suhas Diggavi; and Paulo Tabuada.\n\n\n \n \n \n \n A Coding Theoretic View of Secure State Reconstruction.\n \n \n \n\n\n \n\n\n\n Modeling and Design of Secure Internet of Things,357–369. 2020.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{diggavi2020coding,\n author = {Diggavi, Suhas and Tabuada, Paulo},\n doi = {10.1002/9781119593386.ch15},\n journal = {Modeling and Design of Secure Internet of Things},\n pages = {357--369},\n publisher = {Wiley Online Library},\n tags = {BookChap,CPS},\n title = {A Coding Theoretic View of Secure State Reconstruction},\n type = {3},\n year = {2020}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n J. Hachem; U. Niesen; and S. Diggavi.\n\n\n \n \n \n \n Caching for Interference Networks: A Separation Architecture.\n \n \n \n\n\n \n\n\n\n Edge Caching for Mobile Networks. 2020.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{hachem2020caching,\n author = {Hachem, J. and Niesen, U. and Diggavi, S.},\n editor = {Poor, Vince and Chen, Wei},\n journal = {Edge Caching for Mobile Networks},\n publisher = {Institute of Engineering and Technology (IET) Press},\n tags = {BookChap,CCWN,IT,ANIT,WiNetnew,SCS},\n title = {Caching for Interference Networks: A Separation Architecture},\n type = {3},\n year = {2020}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n Jad Hachem; Nikhil Karamchandani; Suhas Diggavi; and Sharayu Moharir.\n\n\n \n \n \n \n Coded Caching for Heterogeneous Wireless Networks.\n \n \n \n\n\n \n\n\n\n Wireless Edge Caching: Modeling, Analysis and Optimization. 2020.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{hachem2020coded,\n author = {Hachem, Jad and Karamchandani, Nikhil and Diggavi, Suhas and Moharir, Sharayu},\n editor = {Vu, Thang and Chatzinotas, Symeon and Bastug, Ejder and Quek, Tony Q. S.},\n journal = {Wireless Edge Caching: Modeling, Analysis and Optimization},\n publishers = {Cambridge University Press},\n tags = {BookChap,CCWN,IT},\n title = {Coded Caching for Heterogeneous Wireless Networks},\n type = {3},\n year = {2020}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 4\n \n \n (6)\n \n \n
\n
\n \n \n
\n \n\n \n \n Kenneth Chang; Nathaniel Raymondi; Ashutosh Sabharwal; and Suhas Diggavi.\n\n\n \n \n \n \n \" Wireless Paint\": Code Design for 3D Orientation Estimation with Backscatter Arrays.\n \n \n \n\n\n \n\n\n\n In 2020 IEEE International Symposium on Information Theory (ISIT), pages 1224–1229, 2020. IEEE\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{chang2020wireless,\n author = {Chang, Kenneth and Raymondi, Nathaniel and Sabharwal, Ashutosh and Diggavi, Suhas},\n booktitle = {2020 IEEE International Symposium on Information Theory (ISIT)},\n organization = {IEEE},\n pages = {1224--1229},\n tags = {conf,WiNetnew,WiIm},\n title = {" Wireless Paint": Code Design for 3D Orientation Estimation with Backscatter Arrays},\n type = {4},\n year = {2020}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n Deepesh Data; and Suhas Diggavi.\n\n\n \n \n \n \n On Byzantine-Resilient High-Dimensional Stochastic Gradient Descent.\n \n \n \n\n\n \n\n\n\n In 2020 IEEE International Symposium on Information Theory (ISIT), pages 2628–2633, 2020. IEEE\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{data2020byzantine,\n abstract = {We study stochastic gradient descent (SGD) in the master-worker architecture under Byzantine attacks. Building upon the recent advances in algorithmic high-dimensional robust statistics, in each SGD iteration, master employs a non-trivial decoding to estimate the true gradient from the unbiased stochastic gradients received from workers, some of which may be corrupt. We provide convergence analyses for both strongly-convex and non-convex smooth objectives under standard SGD assumptions. We can control the approximation error of our solution in both these settings by the mini-batch size of stochastic gradients; and we can make the approximation error as small as we want, provided that workers use a sufficiently large mini-batch size. Our algorithm can tolerate less than 1/3 fraction of Byzantine workers. It can approximately find the optimal parameters in the strongly-convex setting exponentially fast, and reaches to an approximate stationary point in the non-convex setting with linear speed, i.e., with a rate of 1/T, thus, matching the convergence rates of vanilla SGD in the Byzantine-free setting.},\n author = {Data, Deepesh and Diggavi, Suhas},\n booktitle = {2020 IEEE International Symposium on Information Theory (ISIT)},\n organization = {IEEE},\n pages = {2628--2633},\n tags = {conf,SDL,DML},\n title = {On Byzantine-Resilient High-Dimensional Stochastic Gradient Descent},\n type = {4},\n doi = {10.1109/ISIT44484.2020.9174363},\n year = {2020}\n}\n\n
\n
\n\n\n
\n We study stochastic gradient descent (SGD) in the master-worker architecture under Byzantine attacks. Building upon the recent advances in algorithmic high-dimensional robust statistics, in each SGD iteration, master employs a non-trivial decoding to estimate the true gradient from the unbiased stochastic gradients received from workers, some of which may be corrupt. We provide convergence analyses for both strongly-convex and non-convex smooth objectives under standard SGD assumptions. We can control the approximation error of our solution in both these settings by the mini-batch size of stochastic gradients; and we can make the approximation error as small as we want, provided that workers use a sufficiently large mini-batch size. Our algorithm can tolerate less than 1/3 fraction of Byzantine workers. It can approximately find the optimal parameters in the strongly-convex setting exponentially fast, and reaches to an approximate stationary point in the non-convex setting with linear speed, i.e., with a rate of 1/T, thus, matching the convergence rates of vanilla SGD in the Byzantine-free setting.\n
\n\n\n
\n\n\n
\n \n\n \n \n Antonious M Girgis; Deepesh Data; and Suhas Diggavi.\n\n\n \n \n \n \n Hiding identities: Estimation under local differential privacy.\n \n \n \n\n\n \n\n\n\n In 2020 IEEE International Symposium on Information Theory (ISIT), pages 914–919, 2020. IEEE\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{girgis2020hiding,\n abstract = {In this paper, we study an estimation problem under the local differential privacy (LDP) framework: There is an ordered list of d values (e.g., real numbers); a set of n users, where each user observes an element from this list and each value in the list is observed by at least one user; and an untrusted server, who wants to estimate the values that the users possess, without learning (in the sense of LDP) the actual value that each user has and its corresponding index in the list. Towards this, we propose two LDP estimation schemes: The first one is under the assumption that the server knows the number of users that observe each value; and the second one is for the general scenario, in which the server does not have this prior information. We show that the minimax risk decreases with the total number of users under a very mild condition on the number of users observing each value.},\n author = {Girgis, Antonious M and Data, Deepesh and Diggavi, Suhas},\n booktitle = {2020 IEEE International Symposium on Information Theory (ISIT)},\n organization = {IEEE},\n pages = {914--919},\n tags = {conf,DML,PDL},\n title = {Hiding identities: Estimation under local differential privacy},\n type = {4},\n doi = {10.1109/ISIT44484.2020.9174332},\n year = {2020}\n}\n\n
\n
\n\n\n
\n In this paper, we study an estimation problem under the local differential privacy (LDP) framework: There is an ordered list of d values (e.g., real numbers); a set of n users, where each user observes an element from this list and each value in the list is observed by at least one user; and an untrusted server, who wants to estimate the values that the users possess, without learning (in the sense of LDP) the actual value that each user has and its corresponding index in the list. Towards this, we propose two LDP estimation schemes: The first one is under the assumption that the server knows the number of users that observe each value; and the second one is for the general scenario, in which the server does not have this prior information. We show that the minimax risk decreases with the total number of users under a very mild condition on the number of users observing each value.\n
\n\n\n
\n\n\n
\n \n\n \n \n Antonious M Girgis; Deepesh Data; Suhas Diggavi; Peter Kairouz; and Ananda Theertha Suresh.\n\n\n \n \n \n \n \n Shuffled Model of Federated Learning: Privacy, Communication and Accuracy Trade-offs.\n \n \n \n \n\n\n \n\n\n\n NeurIPS Privacy-preserving Machine Learning workshop (PPML). 2020.\n \n\n\n\n
\n\n\n\n \n \n \"Shuffled arxiv\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n  \n \n 3 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{girgis2020shuffled,\n abstract = {We consider a distributed empirical risk minimization (ERM) optimization problem with communication efficiency and privacy requirements, motivated by the federated learning (FL) framework. Unique challenges to the traditional ERM problem in the context of FL include (i) need to provide privacy guarantees on clients' data, (ii) compress the communication between clients and the server, since clients might have low-bandwidth links, (iii) work with a dynamic client population at each round of communication between the server and the clients, as a small fraction of clients are sampled at each round. To address these challenges we develop (optimal) communication-efficient schemes for private mean estimation for several ℓp spaces, enabling efficient gradient aggregation for each iteration of the optimization solution of the ERM. We also provide lower and upper bounds for mean estimation with privacy and communication constraints for arbitrary ℓp spaces. To get the overall communication, privacy, and optimization performance operation point, we combine this with privacy amplification opportunities inherent to this setup. Our solution takes advantage of the inherent privacy amplification provided by client sampling and data sampling at each client (through Stochastic Gradient Descent) as well as the recently developed privacy framework using anonymization, which effectively presents to the server responses that are randomly shuffled with respect to the clients. Putting these together, we demonstrate that one can get the same privacy, optimization-performance operating point developed in recent methods that use full-precision communication, but at a much lower communication cost, i.e., effectively getting communication efficiency for "free".},\n author = {Girgis, Antonious M and Data, Deepesh and Diggavi, Suhas and Kairouz, Peter and Suresh, Ananda Theertha},\n journal = {NeurIPS Privacy-preserving Machine Learning workshop (PPML)},\n tags = {conf,DML,PDL},\n title = {Shuffled Model of Federated Learning: Privacy, Communication and Accuracy Trade-offs},\n type = {4},\n url_arxiv = {https://arxiv.org/abs/2008.07180},\n year = {2020}\n}\n\n
\n
\n\n\n
\n We consider a distributed empirical risk minimization (ERM) optimization problem with communication efficiency and privacy requirements, motivated by the federated learning (FL) framework. Unique challenges to the traditional ERM problem in the context of FL include (i) need to provide privacy guarantees on clients' data, (ii) compress the communication between clients and the server, since clients might have low-bandwidth links, (iii) work with a dynamic client population at each round of communication between the server and the clients, as a small fraction of clients are sampled at each round. To address these challenges we develop (optimal) communication-efficient schemes for private mean estimation for several ℓp spaces, enabling efficient gradient aggregation for each iteration of the optimization solution of the ERM. We also provide lower and upper bounds for mean estimation with privacy and communication constraints for arbitrary ℓp spaces. To get the overall communication, privacy, and optimization performance operation point, we combine this with privacy amplification opportunities inherent to this setup. Our solution takes advantage of the inherent privacy amplification provided by client sampling and data sampling at each client (through Stochastic Gradient Descent) as well as the recently developed privacy framework using anonymization, which effectively presents to the server responses that are randomly shuffled with respect to the clients. Putting these together, we demonstrate that one can get the same privacy, optimization-performance operating point developed in recent methods that use full-precision communication, but at a much lower communication cost, i.e., effectively getting communication efficiency for \"free\".\n
\n\n\n
\n\n\n
\n \n\n \n \n Navjot Singh; Deepesh Data; Jemin George; and Suhas Diggavi.\n\n\n \n \n \n \n \n SPARQ-SGD: Event-Triggered and Compressed Communication in Decentralized Stochastic Optimization.\n \n \n \n \n\n\n \n\n\n\n 2020 59th IEEE Conference on Decision and Control (CDC),3449-3456. 2020.\n \n\n\n\n
\n\n\n\n \n \n \"SPARQ-SGD: arxiv\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n  \n \n 2 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{singh2019sparq,\n abstract = {In this paper, we propose and analyze SPARQ-SGD, which is an event-triggered and compressed algorithm for decentralized training of large-scale machine learning models. Each node can locally compute a condition (event) which triggers a communication where quantized and sparsified local model parameters are sent. In SPARQ-SGD each node takes at least a fixed number (H) of local gradient steps and then checks if the model parameters have significantly changed compared to its last update; it communicates further compressed model parameters only when there is a significant change, as specified by a (design) criterion. We prove that the SPARQ-SGD converges as O(1nT) and O(1nT√) in the strongly-convex and non-convex settings, respectively, demonstrating that such aggressive compression, including event-triggered communication, model sparsification and quantization does not affect the overall convergence rate as compared to uncompressed decentralized training; thereby theoretically yielding communication efficiency for "free". We evaluate SPARQ-SGD over real datasets to demonstrate significant amount of savings in communication over the state-of-the-art.},\n author = {Singh, Navjot and Data, Deepesh and George, Jemin and Diggavi, Suhas},\n journal = {2020 59th IEEE Conference on Decision and Control (CDC)},\n tags = {conf,CEDL,DML},\n title = {SPARQ-SGD: Event-Triggered and Compressed Communication in Decentralized Stochastic Optimization},\n type = {4},\n url_arxiv = {https://arxiv.org/abs/1910.14280},\n year = {2020},\n pages={3449-3456},\n doi={10.1109/CDC42340.2020.9303828},\n ISSN={2576-2370},\n}\n\n
\n
\n\n\n
\n In this paper, we propose and analyze SPARQ-SGD, which is an event-triggered and compressed algorithm for decentralized training of large-scale machine learning models. Each node can locally compute a condition (event) which triggers a communication where quantized and sparsified local model parameters are sent. In SPARQ-SGD each node takes at least a fixed number (H) of local gradient steps and then checks if the model parameters have significantly changed compared to its last update; it communicates further compressed model parameters only when there is a significant change, as specified by a (design) criterion. We prove that the SPARQ-SGD converges as O(1nT) and O(1nT√) in the strongly-convex and non-convex settings, respectively, demonstrating that such aggressive compression, including event-triggered communication, model sparsification and quantization does not affect the overall convergence rate as compared to uncompressed decentralized training; thereby theoretically yielding communication efficiency for \"free\". We evaluate SPARQ-SGD over real datasets to demonstrate significant amount of savings in communication over the state-of-the-art.\n
\n\n\n
\n\n\n
\n \n\n \n \n Sundara Rajan Srinivasavaradhan; Suhas Diggavi; and Christina Fragouli.\n\n\n \n \n \n \n Equivalence of ml decoding to a continuous optimization problem.\n \n \n \n\n\n \n\n\n\n In 2020 IEEE International Symposium on Information Theory (ISIT), pages 343–348, 2020. IEEE\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n  \n \n 2 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{srinivasavaradhan2020equivalence,\n abstract = {Maximum likelihood (ML) and symbolwise maximum aposteriori (MAP) estimation for discrete input sequences play a central role in a number of applications that arise in communications, information and coding theory. Many instances of these problems are proven to be intractable, for example through reduction to NP-complete integer optimization problems. In this work, we prove that the ML estimation of a discrete input sequence (with no assumptions on the encoder/channel used) is equivalent to the solution of a continuous non-convex optimization problem, and that this formulation is closely related to the computation of symbolwise MAP estimates. This equivalence is particularly useful in situations where a function we term the expected likelihood is efficiently computable. In such situations, we give a ML heuristic and show numerics for sequence estimation over the deletion channel.},\n author = {Srinivasavaradhan, Sundara Rajan and Diggavi, Suhas and Fragouli, Christina},\n booktitle = {2020 IEEE International Symposium on Information Theory (ISIT)},\n organization = {IEEE},\n pages = {343--348},\n tags = {conf,BioInf,IT,NDS},\n title = {Equivalence of ml decoding to a continuous optimization problem},\n type = {4},\n doi = {10.1109/ISIT44484.2020.9174130},\n year = {2020}\n}\n\n
\n
\n\n\n
\n Maximum likelihood (ML) and symbolwise maximum aposteriori (MAP) estimation for discrete input sequences play a central role in a number of applications that arise in communications, information and coding theory. Many instances of these problems are proven to be intractable, for example through reduction to NP-complete integer optimization problems. In this work, we prove that the ML estimation of a discrete input sequence (with no assumptions on the encoder/channel used) is equivalent to the solution of a continuous non-convex optimization problem, and that this formulation is closely related to the computation of symbolwise MAP estimates. This equivalence is particularly useful in situations where a function we term the expected likelihood is efficiently computable. In such situations, we give a ML heuristic and show numerics for sequence estimation over the deletion channel.\n
\n\n\n
\n\n\n\n\n\n
\n
\n\n\n\n\n
\n
\n\n
\n
\n  \n 2019\n \n \n (2)\n \n \n
\n
\n \n \n
\n
\n  \n 2\n \n \n (3)\n \n \n
\n
\n \n \n
\n \n\n \n \n Can Karakus; Yifan Sun; Suhas N Diggavi; and Wotao Yin.\n\n\n \n \n \n \n \n Redundancy Techniques for Straggler Mitigation in Distributed Optimization and Learning.\n \n \n \n \n\n\n \n\n\n\n J. Mach. Learn. Res., 20(72): 1–47. 2019.\n \n\n\n\n
\n\n\n\n \n \n \"Redundancy arxiv\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n  \n \n 6 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{karakus2019redundancy,\n abstract = {Performance of distributed optimization and learning systems is bottlenecked by "straggler" nodes and slow communication links, which significantly delay computation. We propose a distributed optimization framework where the dataset is "encoded" to have an over-complete representation with built-in redundancy, and the straggling nodes in the system are dynamically left out of the computation at every iteration, whose loss is compensated by the embedded redundancy. We show that oblivious application of several popular optimization algorithms on encoded data, including gradient descent, L-BFGS, proximal gradient under data parallelism, and coordinate descent under model parallelism, converge to either approximate or exact solutions of the original problem when stragglers are treated as erasures. These convergence results are deterministic, i.e., they establish sample path convergence for arbitrary sequences of delay patterns or distributions on the nodes, and are independent of the tail behavior of the delay distribution. We demonstrate that equiangular tight frames have desirable properties as encoding matrices, and propose efficient mechanisms for encoding large-scale data. We implement the proposed technique on Amazon EC2 clusters, and demonstrate its performance over several learning problems, including matrix factorization, LASSO, ridge regression and logistic regression, and compare the proposed method with uncoded, asynchronous, and data replication strategies.},\n author = {Karakus, Can and Sun, Yifan and Diggavi, Suhas N and Yin, Wotao},\n journal = {J. Mach. Learn. Res.},\n number = {72},\n pages = {1--47},\n tags = {journal,DML,EncOpt},\n title = {Redundancy Techniques for Straggler Mitigation in Distributed Optimization and Learning.},\n type = {2},\n url_arxiv = {https://arxiv.org/abs/1803.05397},\n volume = {20},\n year = {2019}\n}\n\n
\n
\n\n\n
\n Performance of distributed optimization and learning systems is bottlenecked by \"straggler\" nodes and slow communication links, which significantly delay computation. We propose a distributed optimization framework where the dataset is \"encoded\" to have an over-complete representation with built-in redundancy, and the straggling nodes in the system are dynamically left out of the computation at every iteration, whose loss is compensated by the embedded redundancy. We show that oblivious application of several popular optimization algorithms on encoded data, including gradient descent, L-BFGS, proximal gradient under data parallelism, and coordinate descent under model parallelism, converge to either approximate or exact solutions of the original problem when stragglers are treated as erasures. These convergence results are deterministic, i.e., they establish sample path convergence for arbitrary sequences of delay patterns or distributions on the nodes, and are independent of the tail behavior of the delay distribution. We demonstrate that equiangular tight frames have desirable properties as encoding matrices, and propose efficient mechanisms for encoding large-scale data. We implement the proposed technique on Amazon EC2 clusters, and demonstrate its performance over several learning problems, including matrix factorization, LASSO, ridge regression and logistic regression, and compare the proposed method with uncoded, asynchronous, and data replication strategies.\n
\n\n\n
\n\n\n
\n \n\n \n \n Mohammed Karmoose; Christina Fragouli; Suhas Diggavi; Rafael Misoczki; Lily L Yang; and Zhenliang Zhang.\n\n\n \n \n \n \n Using mm-waves for secret key establishment.\n \n \n \n\n\n \n\n\n\n IEEE Communications Letters, 23(6): 1077–1080. 2019.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{karmoose2019using,\n abstract = {The fact that millimeter-wave (mmWave) communication needs to be directional is usually perceived as a challenge; in this letter, we argue that it enables efficient secret key sharing that is unconditionally secure from passive eavesdroppers by building on packet erasures. We showcase the potential of our approach in two setups: 5G networks and vehicle platooning. In both cases, with the right choice of parameters, we can potentially establish keys in the order of tenths of Mb/s. These first results are based on some simplifying assumptions, yet we believe that they give incentives to further explore such techniques.},\n author = {Karmoose, Mohammed and Fragouli, Christina and Diggavi, Suhas and Misoczki, Rafael and Yang, Lily L and Zhang, Zhenliang},\n journal = {IEEE Communications Letters},\n number = {6},\n pages = {1077--1080},\n publisher = {IEEE},\n tags = {journal,WNS,WiNetnew},\n title = {Using mm-waves for secret key establishment},\n type = {2},\n doi = {10.1109/LCOMM.2019.2909918},\n volume = {23},\n year = {2019}\n}\n\n
\n
\n\n\n
\n The fact that millimeter-wave (mmWave) communication needs to be directional is usually perceived as a challenge; in this letter, we argue that it enables efficient secret key sharing that is unconditionally secure from passive eavesdroppers by building on packet erasures. We showcase the potential of our approach in two setups: 5G networks and vehicle platooning. In both cases, with the right choice of parameters, we can potentially establish keys in the order of tenths of Mb/s. These first results are based on some simplifying assumptions, yet we believe that they give incentives to further explore such techniques.\n
\n\n\n
\n\n\n
\n \n\n \n \n Wei-Che Wang; Yair Yona; Yizhang Wu; Suhas N Diggavi; and Puneet Gupta.\n\n\n \n \n \n \n SLATE: A Secure Lightweight Entity Authentication Hardware Primitive.\n \n \n \n\n\n \n\n\n\n IEEE Transactions on Information Forensics and Security, 15: 276–285. 2019.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{wang2019slate,\n abstract = {Lightweight cryptography has become more and more important in recent years because of the rise of the Internet of Things (IoT) and usage of smart mobile devices. In this paper, we propose a novel secure lightweight entity authentication hardware primitive called SLATE, where its area is about 50% to more than 3X smaller than existing lightweight ciphers and strong physical unclonable functions (PUFs), respectively. Even though the authentication of SLATE is done through challenge response pair (CRP) verification similar to strong PUFs, the source of the key for SLATE must be coming from any existing secret key storage used for any ciphers. A main advantage of SLATE over most existing strong PUFs being an entity authentication primitive is that SLATE is resistant to known attacks to strong PUFs or logic obfuscations, such as model building attacks and Boolean satisfiability (SAT) attacks. Furthermore, we show that the implementation cost of SLATE with a 176-bit key and 244 CRPs is only 663 gate equivalents (GEs). Compared with lightweight ciphers and existing secure strong PUFs, we show that SLATE is a practical security primitive for resource constrained systems for its extremely small footprint and security. Finally, we show that SLATE is information theoretically secure when valid CRPs are communicated through insecure channels.},\n author = {Wang, Wei-Che and Yona, Yair and Wu, Yizhang and Diggavi, Suhas N and Gupta, Puneet},\n journal = {IEEE Transactions on Information Forensics and Security},\n pages = {276--285},\n publisher = {IEEE},\n tags = {journal,HS},\n title = {SLATE: A Secure Lightweight Entity Authentication Hardware Primitive},\n type = {2},\n doi = {10.1109/TIFS.2019.2919393},\n volume = {15},\n year = {2019}\n}\n\n
\n
\n\n\n
\n Lightweight cryptography has become more and more important in recent years because of the rise of the Internet of Things (IoT) and usage of smart mobile devices. In this paper, we propose a novel secure lightweight entity authentication hardware primitive called SLATE, where its area is about 50% to more than 3X smaller than existing lightweight ciphers and strong physical unclonable functions (PUFs), respectively. Even though the authentication of SLATE is done through challenge response pair (CRP) verification similar to strong PUFs, the source of the key for SLATE must be coming from any existing secret key storage used for any ciphers. A main advantage of SLATE over most existing strong PUFs being an entity authentication primitive is that SLATE is resistant to known attacks to strong PUFs or logic obfuscations, such as model building attacks and Boolean satisfiability (SAT) attacks. Furthermore, we show that the implementation cost of SLATE with a 176-bit key and 244 CRPs is only 663 gate equivalents (GEs). Compared with lightweight ciphers and existing secure strong PUFs, we show that SLATE is a practical security primitive for resource constrained systems for its extremely small footprint and security. Finally, we show that SLATE is information theoretically secure when valid CRPs are communicated through insecure channels.\n
\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 4\n \n \n (6)\n \n \n
\n
\n \n \n
\n \n\n \n \n Debraj Basu; Deepesh Data; Can Karakus; and Suhas Diggavi.\n\n\n \n \n \n \n \n Qsparse-local-SGD: Distributed SGD with quantization, sparsification and local computations.\n \n \n \n \n\n\n \n\n\n\n In Advances in Neural Information Processing Systems, pages 14695–14706, 2019. \n \n\n\n\n
\n\n\n\n \n \n \"Qsparse-local-SGD: arxiv\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{basu2019qsparse,\n abstract = {Communication bottleneck has been identified as a significant issue in distributed optimization of large-scale learning models. Recently, several approaches to mitigate this problem have been proposed, including different forms of gradient compression or computing local models and mixing them iteratively. In this paper, we propose \\emph{Qsparse-local-SGD} algorithm, which combines aggressive sparsification with quantization and local computation along with error compensation, by keeping track of the difference between the true and compressed gradients. We propose both synchronous and asynchronous implementations of \\emph{Qsparse-local-SGD}. We analyze convergence for \\emph{Qsparse-local-SGD} in the \\emph{distributed} setting for smooth non-convex and convex objective functions. We demonstrate that \\emph{Qsparse-local-SGD} converges at the same rate as vanilla distributed SGD for many important classes of sparsifiers and quantizers. We use \\emph{Qsparse-local-SGD} to train ResNet-50 on ImageNet and show that it results in significant savings over the state-of-the-art, in the number of bits transmitted to reach target accuracy.},\n author = {Basu, Debraj and Data, Deepesh and Karakus, Can and Diggavi, Suhas},\n booktitle = {Advances in Neural Information Processing Systems},\n pages = {14695--14706},\n tags = {conf,CEDL,DML},\n title = {Qsparse-local-SGD: Distributed SGD with quantization, sparsification and local computations},\n type = {4},\n url_arxiv = {https://arxiv.org/abs/1906.02367},\n year = {2019}\n}\n\n
\n
\n\n\n
\n Communication bottleneck has been identified as a significant issue in distributed optimization of large-scale learning models. Recently, several approaches to mitigate this problem have been proposed, including different forms of gradient compression or computing local models and mixing them iteratively. In this paper, we propose \\emphQsparse-local-SGD algorithm, which combines aggressive sparsification with quantization and local computation along with error compensation, by keeping track of the difference between the true and compressed gradients. We propose both synchronous and asynchronous implementations of \\emphQsparse-local-SGD. We analyze convergence for \\emphQsparse-local-SGD in the \\emphdistributed setting for smooth non-convex and convex objective functions. We demonstrate that \\emphQsparse-local-SGD converges at the same rate as vanilla distributed SGD for many important classes of sparsifiers and quantizers. We use \\emphQsparse-local-SGD to train ResNet-50 on ImageNet and show that it results in significant savings over the state-of-the-art, in the number of bits transmitted to reach target accuracy.\n
\n\n\n
\n\n\n
\n \n\n \n \n Deepesh Data; and Suhas Diggavi.\n\n\n \n \n \n \n Byzantine-Tolerant Distributed Coordinate Descent.\n \n \n \n\n\n \n\n\n\n In 2019 IEEE International Symposium on Information Theory (ISIT), pages 2724–2728, 2019. IEEE\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{data2019byzantine,\n abstract = {We study distributed coordinate descent (CD) in the master-worker architecture under adversarial attacks, where the data is partitioned (across the parameter space) and distributed among m worker nodes (t of which can be maliciously corrupt), which update some coordinates of their part of the parameter vector, in parallel and iteratively, using CD updates, with the help of the master. We propose a method based on data encoding and real error correction to combat the adversary. Our method can tolerate up to ⌈m-1/2⌉ corrupt nodes, which is information-theoretically optimal. Our design gives a trade-off between the resiliency t, the required redundancy, and the computation at master and worker nodes. For example, with constant overhead in the storage and computational complexity over that required by the plain distributed CD, we can tolerate up to m/3 corrupt nodes. We design a sparse encoding scheme, which yields low encoding complexity.},\n author = {Data, Deepesh and Diggavi, Suhas},\n booktitle = {2019 IEEE International Symposium on Information Theory (ISIT)},\n organization = {IEEE},\n pages = {2724--2728},\n tags = {conf,SDL,DML},\n title = {Byzantine-Tolerant Distributed Coordinate Descent},\n type = {4},\n doi = {10.1109/ISIT.2019.8849217},\n year = {2019}\n}\n\n
\n
\n\n\n
\n We study distributed coordinate descent (CD) in the master-worker architecture under adversarial attacks, where the data is partitioned (across the parameter space) and distributed among m worker nodes (t of which can be maliciously corrupt), which update some coordinates of their part of the parameter vector, in parallel and iteratively, using CD updates, with the help of the master. We propose a method based on data encoding and real error correction to combat the adversary. Our method can tolerate up to ⌈m-1/2⌉ corrupt nodes, which is information-theoretically optimal. Our design gives a trade-off between the resiliency t, the required redundancy, and the computation at master and worker nodes. For example, with constant overhead in the storage and computational complexity over that required by the plain distributed CD, we can tolerate up to m/3 corrupt nodes. We design a sparse encoding scheme, which yields low encoding complexity.\n
\n\n\n
\n\n\n
\n \n\n \n \n Deepesh Data; Linqi Song; and Suhas Diggavi.\n\n\n \n \n \n \n Data encoding methods for byzantine-resilient distributed optimization.\n \n \n \n\n\n \n\n\n\n In 2019 IEEE International Symposium on Information Theory (ISIT), pages 2719–2723, 2019. IEEE\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{data2019data,\n abstract = {We consider distributed gradient computation, where both data and computation are distributed among m worker machines, t of which can be Byzantine adversaries, and a designated (master) node computes the model/parameter vector for generalized linear models, iteratively, using proximal gradient descent (PGD), of which gradient descent (GD) is a special case. The Byzantine adversaries can (collaboratively) deviate arbitrarily from their gradient computation. To solve this, we propose a method based on data encoding and (real) error correction to combat the adversarial behavior. We can tolerate up to t ≤ [m-1/2] corrupt worker nodes, which is information-theoretically optimal. Our method does not assume any probability distribution on the data. We develop a sparse encoding scheme which enables computationally efficient data encoding. We demonstrate a trade-off between the number of adversaries tolerated and the resource requirement (storage and computational complexity). As an example, our scheme incurs a constant overhead (storage and computational complexity) over that required by the distributed PGD algorithm, without adversaries, for t ≤ m/3 . Our encoding works as efficiently in the streaming data etting as it does in the},\n author = {Data, Deepesh and Song, Linqi and Diggavi, Suhas},\n booktitle = {2019 IEEE International Symposium on Information Theory (ISIT)},\n organization = {IEEE},\n pages = {2719--2723},\n tags = {conf,SDL,DML},\n title = {Data encoding methods for byzantine-resilient distributed optimization},\n type = {4},\n doi = {10.1109/ISIT.2019.8849857},\n year = {2019}\n}\n\n
\n
\n\n\n
\n We consider distributed gradient computation, where both data and computation are distributed among m worker machines, t of which can be Byzantine adversaries, and a designated (master) node computes the model/parameter vector for generalized linear models, iteratively, using proximal gradient descent (PGD), of which gradient descent (GD) is a special case. The Byzantine adversaries can (collaboratively) deviate arbitrarily from their gradient computation. To solve this, we propose a method based on data encoding and (real) error correction to combat the adversarial behavior. We can tolerate up to t ≤ [m-1/2] corrupt worker nodes, which is information-theoretically optimal. Our method does not assume any probability distribution on the data. We develop a sparse encoding scheme which enables computationally efficient data encoding. We demonstrate a trade-off between the number of adversaries tolerated and the resource requirement (storage and computational complexity). As an example, our scheme incurs a constant overhead (storage and computational complexity) over that required by the distributed PGD algorithm, without adversaries, for t ≤ m/3 . Our encoding works as efficiently in the streaming data etting as it does in the\n
\n\n\n
\n\n\n
\n \n\n \n \n Yahya H Ezzeldin; Christina Fragouli; and Suhas Diggavi.\n\n\n \n \n \n \n Quantizing Signals for Linear Classification.\n \n \n \n\n\n \n\n\n\n In 2019 IEEE International Symposium on Information Theory (ISIT), pages 912–916, 2019. IEEE\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n  \n \n 1 download\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{ezzeldin2019quantizing,\n abstract = {In many machine learning applications, once we have learned a classifier, in order to apply it, we may still need to gather features from distributed sensors over communication constrained channels. In this paper, we propose a polynomial complexity algorithm for feature quantization tailored to minimizing the classification error of a linear classifier. Our scheme produces scalar quantizers that are well-tailored to delay-sensitive applications, operates on the same training data used to learn the classifier, and allows each distributed sensor to operate independently of each other. Numerical evaluation indicates up to 65% benefits over alternative approaches. Additionally, we provide an example where, jointly designing the linear classifier and the quantization scheme, can outperform sequential designs.},\n author = {Ezzeldin, Yahya H and Fragouli, Christina and Diggavi, Suhas},\n booktitle = {2019 IEEE International Symposium on Information Theory (ISIT)},\n organization = {IEEE},\n pages = {912--916},\n tags = {conf,DML,CEDL},\n title = {Quantizing Signals for Linear Classification},\n type = {4},\n doi = {10.1109/ISIT.2019.8849589},\n year = {2019}\n}\n\n
\n
\n\n\n
\n In many machine learning applications, once we have learned a classifier, in order to apply it, we may still need to gather features from distributed sensors over communication constrained channels. In this paper, we propose a polynomial complexity algorithm for feature quantization tailored to minimizing the classification error of a linear classifier. Our scheme produces scalar quantizers that are well-tailored to delay-sensitive applications, operates on the same training data used to learn the classifier, and allows each distributed sensor to operate independently of each other. Numerical evaluation indicates up to 65% benefits over alternative approaches. Additionally, we provide an example where, jointly designing the linear classifier and the quantization scheme, can outperform sequential designs.\n
\n\n\n
\n\n\n
\n \n\n \n \n Abhin Shah; Nikhil Karamchandani; and Suhas Diggavi.\n\n\n \n \n \n \n Coded Caching: Global vs Local Content Popularity.\n \n \n \n\n\n \n\n\n\n In 2019 16th Canadian Workshop on Information Theory (CWIT), pages 1–6, 2019. IEEE\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{shah2019coded,\n abstract = {In the coded caching problem a file server with N files is connected through an error-free broadcast link to K users, each equipped with a local cache. The placement and delivery phases can be jointly optimized to create simultaneous multicasting opportunities among users that request different files. We examine the model where we have multiple user classes and users belonging to different user classes have different demand popularities. We develop placement schemes based on either the global popularity of the files or the local popularity of the files and for each of these placement schemes, we examine delivery schemes based on either the user perspective or the file perspective. We analyze the server transmission rates for these schemes and identify parameter regimes where schemes working with local content popularity profiles do better than those utilizing only the global popularity.},\n author = {Shah, Abhin and Karamchandani, Nikhil and Diggavi, Suhas},\n booktitle = {2019 16th Canadian Workshop on Information Theory (CWIT)},\n organization = {IEEE},\n pages = {1--6},\n tags = {conf,CCWN},\n title = {Coded Caching: Global vs Local Content Popularity},\n type = {4},\n doi = {10.1109/CWIT.2019.8929932},\n year = {2019}\n}\n\n
\n
\n\n\n
\n In the coded caching problem a file server with N files is connected through an error-free broadcast link to K users, each equipped with a local cache. The placement and delivery phases can be jointly optimized to create simultaneous multicasting opportunities among users that request different files. We examine the model where we have multiple user classes and users belonging to different user classes have different demand popularities. We develop placement schemes based on either the global popularity of the files or the local popularity of the files and for each of these placement schemes, we examine delivery schemes based on either the user perspective or the file perspective. We analyze the server transmission rates for these schemes and identify parameter regimes where schemes working with local content popularity profiles do better than those utilizing only the global popularity.\n
\n\n\n
\n\n\n
\n \n\n \n \n Sundara R Srinivasavaradhan; Michelle Du; Suhas Diggavi; and Christina Fragouli.\n\n\n \n \n \n \n Symbolwise map for multiple deletion channels.\n \n \n \n\n\n \n\n\n\n In 2019 IEEE International Symposium on Information Theory (ISIT), pages 181–185, 2019. IEEE\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{srinivasavaradhan2019symbolwise,\n abstract = {We consider the problem of reconstructing a sequence from fixed number of deleted versions of itself (also called traces). The problem is motivated from recent developments in de novo DNA sequencing technologies. The main contribution of this work is to provide a polynomial time algorithm for symbolwise MAP decoding with multiple traces. The algorithm leverages a dynamic program on the edit graph. We also develop a heuristic with reduced time complexity using similar ideas and provide preliminary numerical evaluations.},\n author = {Srinivasavaradhan, Sundara R and Du, Michelle and Diggavi, Suhas and Fragouli, Christina},\n booktitle = {2019 IEEE International Symposium on Information Theory (ISIT)},\n organization = {IEEE},\n pages = {181--185},\n tags = {conf,BioInf,IT,NDS},\n title = {Symbolwise map for multiple deletion channels},\n type = {4},\n doi = {10.1109/ISIT.2019.8849567},\n year = {2019}\n}\n\n
\n
\n\n\n
\n We consider the problem of reconstructing a sequence from fixed number of deleted versions of itself (also called traces). The problem is motivated from recent developments in de novo DNA sequencing technologies. The main contribution of this work is to provide a polynomial time algorithm for symbolwise MAP decoding with multiple traces. The algorithm leverages a dynamic program on the edit graph. We also develop a heuristic with reduced time complexity using similar ideas and provide preliminary numerical evaluations.\n
\n\n\n
\n\n\n\n\n\n
\n
\n\n\n\n\n
\n
\n\n
\n
\n  \n 2018\n \n \n (3)\n \n \n
\n
\n \n \n
\n
\n  \n 1\n \n \n (1)\n \n \n
\n
\n \n \n
\n \n\n \n \n Joyson Sebastian; and Suhas Diggavi.\n\n\n \n \n \n \n \n On the Generalized Degrees of Freedom of Noncoherent Interference Channel.\n \n \n \n \n\n\n \n\n\n\n arXiv preprint arXiv:1812.03579. 2018.\n \n\n\n\n
\n\n\n\n \n \n \"On arxiv\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{sebastian2018generalized,\n abstract = {We study the generalized degrees of freedom (gDoF) of the block-fading noncoherent 2-user interference channel (IC) with a coherence time of T symbol durations and symmetric fading statistics. We demonstrate that a natural training-based scheme, to operate the noncoherent IC, is suboptimal in several regimes. As an alternate scheme, we propose a new noncoherent rate-splitting scheme. We also consider treating interference-as-noise (TIN) scheme and a time division multiplexing (TDM) scheme. We observe that a standard training-based scheme for IC is outperformed by one of these schemes in several regimes: our results demonstrate that for low average interference-to-noise ratio (INR), TIN is best; for high INR, TDM and the noncoherent rate-splitting give better performance. We also study the noncoherent IC with feedback and propose a noncoherent rate-splitting scheme. Again for the feedback case as well, our results demonstrate that a natural training-based scheme can be outperformed by other schemes.},\n author = {Sebastian, Joyson and Diggavi, Suhas},\n journal = {arXiv preprint arXiv:1812.03579},\n tags = {journalSub,IT,ANIT,WiNetnew,NCWN},\n title = {On the Generalized Degrees of Freedom of Noncoherent Interference Channel},\n type = {1},\n url_arxiv = {https://arxiv.org/abs/1812.03579},\n year = {2018}\n}\n\n
\n
\n\n\n
\n We study the generalized degrees of freedom (gDoF) of the block-fading noncoherent 2-user interference channel (IC) with a coherence time of T symbol durations and symmetric fading statistics. We demonstrate that a natural training-based scheme, to operate the noncoherent IC, is suboptimal in several regimes. As an alternate scheme, we propose a new noncoherent rate-splitting scheme. We also consider treating interference-as-noise (TIN) scheme and a time division multiplexing (TDM) scheme. We observe that a standard training-based scheme for IC is outperformed by one of these schemes in several regimes: our results demonstrate that for low average interference-to-noise ratio (INR), TIN is best; for high INR, TDM and the noncoherent rate-splitting give better performance. We also study the noncoherent IC with feedback and propose a noncoherent rate-splitting scheme. Again for the feedback case as well, our results demonstrate that a natural training-based scheme can be outperformed by other schemes.\n
\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2\n \n \n (7)\n \n \n
\n
\n \n \n
\n \n\n \n \n W. Mao; S. N. Diggavi; and S. Kannan.\n\n\n \n \n \n \n \n Models and Information-Theoretic Bounds for Nanopore Sequencing.\n \n \n \n \n\n\n \n\n\n\n IEEE Transactions on Information Theory, 64(4): 3216-3236. April 2018.\n \n\n\n\n
\n\n\n\n \n \n \"Models arxiv\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n  \n \n 5 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@article{8301564,\n abstract = {Nanopore sequencing is an emerging new technology for sequencing Deoxyribonucleic acid (DNA), which can read long fragments of DNA (~50000 bases), in contrast to most current short-read sequencing technologies which can only read hundreds of bases. While nanopore sequencers can acquire long reads, the high error rates (20\\%-30\\%) pose a technical challenge. In a nanopore sequencer, a DNA is migrated through a nanopore, and current variations are measured. The DNA sequence is inferred from this observed current pattern using an algorithm called a base-caller. In this paper, we propose a mathematical model for the “channel” from the input DNA sequence to the observed current, and calculate bounds on the information extraction capacity of the nanopore sequencer. This model incorporates impairments, such as (non-linear) intersymbol interference, deletions, and random response. These information bounds have two-fold application: 1) The decoding rate with a uniform input distribution can be used to calculate the average size of the plausible list of DNA sequences given an observed current trace. This bound can be used to benchmark existing base-calling algorithms, as well as serving a performance objective to design better nanopores. 2) When the nanopore sequencer is used as a reader in a DNA storage system, the storage capacity is quantified by our bounds.},\n author = {W. {Mao} and S. N. {Diggavi} and S. {Kannan}},\n doi = {10.1109/TIT.2018.2809001},\n issn = {1557-9654},\n journal = {IEEE Transactions on Information Theory},\n keywords = {biology computing;DNA;genomics;intersymbol interference;molecular biophysics;nanobiotechnology;nanopore sequencing;sequencing Deoxyribonucleic acid;sequencing technologies;nanopore sequencer;input DNA sequences;base-calling algorithms;DNA storage system;storage capacity;DNA;Sequential analysis;Decoding;Nanobioscience;Current measurement;Reliability;Mathematical model;Deoxyribonucleic acid (DNA) sequencing;bioinformatics;base calling;channel with synchronization errors;deletion channel;finite state channels},\n month = {April},\n number = {4},\n pages = {3216-3236},\n tags = {journal,IT,BioInf,NDS},\n title = {Models and Information-Theoretic Bounds for Nanopore Sequencing},\n type = {2},\n url_arxiv = {https://arxiv.org/abs/1705.11154},\n volume = {64},\n year = {2018}\n}\n\n
\n
\n\n\n
\n Nanopore sequencing is an emerging new technology for sequencing Deoxyribonucleic acid (DNA), which can read long fragments of DNA ( 50000 bases), in contrast to most current short-read sequencing technologies which can only read hundreds of bases. While nanopore sequencers can acquire long reads, the high error rates (20%-30%) pose a technical challenge. In a nanopore sequencer, a DNA is migrated through a nanopore, and current variations are measured. The DNA sequence is inferred from this observed current pattern using an algorithm called a base-caller. In this paper, we propose a mathematical model for the “channel” from the input DNA sequence to the observed current, and calculate bounds on the information extraction capacity of the nanopore sequencer. This model incorporates impairments, such as (non-linear) intersymbol interference, deletions, and random response. These information bounds have two-fold application: 1) The decoding rate with a uniform input distribution can be used to calculate the average size of the plausible list of DNA sequences given an observed current trace. This bound can be used to benchmark existing base-calling algorithms, as well as serving a performance objective to design better nanopores. 2) When the nanopore sequencer is used as a reader in a DNA storage system, the storage capacity is quantified by our bounds.\n
\n\n\n
\n\n\n
\n \n\n \n \n J. Hachem; U. Niesen; and S. Diggavi.\n\n\n \n \n \n \n \n Energy-Efficiency Gains of Caching for Interference Channels.\n \n \n \n \n\n\n \n\n\n\n IEEE Communications Letters, 22(7): 1434-1437. July 2018.\n \n\n\n\n
\n\n\n\n \n \n \"Energy-Efficiency arxiv\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n  \n \n 1 download\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@article{8335768,\n abstract = {This letter initiates the study of energy-efficiency gains provided by caching. We focus on the cache-aided Gaussian interference channel in the low-SNR regime. We propose a strategy that creates content overlaps at the transmitter caches to allow for co-operation between the transmitters. This co-operation yields a beamforming gain, which has to be traded off against a multicasting gain. We evaluate the performance of this strategy and show its approximate optimality in both the single-receiver case and the single-transmitter case.},\n author = {J. {Hachem} and U. {Niesen} and S. {Diggavi}},\n doi = {10.1109/LCOMM.2018.2822694},\n issn = {1558-2558},\n journal = {IEEE Communications Letters},\n keywords = {array signal processing;cache storage;channel capacity;energy conservation;Gaussian channels;multicast communication;radio networks;radiofrequency interference;telecommunication power management;wireless channels;energy-efficiency gains;cache-aided Gaussian interference channel;low-SNR regime;transmitter caches;co-operation yields;beamforming gain;multicasting gain;Transmitters;Receivers;Multicast communication;Array signal processing;Libraries;Interference channels;Network coding;wireless networks;content distribution networks},\n month = {July},\n number = {7},\n pages = {1434-1437},\n tags = {journal,CCWN,IT,ANIT,WiNetnew,SCS},\n title = {Energy-Efficiency Gains of Caching for Interference Channels},\n type = {2},\n url_arxiv = {https://arxiv.org/abs/1808.00653},\n volume = {22},\n year = {2018}\n}\n\n
\n
\n\n\n
\n This letter initiates the study of energy-efficiency gains provided by caching. We focus on the cache-aided Gaussian interference channel in the low-SNR regime. We propose a strategy that creates content overlaps at the transmitter caches to allow for co-operation between the transmitters. This co-operation yields a beamforming gain, which has to be traded off against a multicasting gain. We evaluate the performance of this strategy and show its approximate optimality in both the single-receiver case and the single-transmitter case.\n
\n\n\n
\n\n\n
\n \n\n \n \n J. Sebastian; C. Karakus; and S. Diggavi.\n\n\n \n \n \n \n \n Approximate Capacity of Fast Fading Interference Channels With no Instantaneous CSIT.\n \n \n \n \n\n\n \n\n\n\n IEEE Transactions on Communications, 66(12): 6015-6027. Dec 2018.\n \n\n\n\n
\n\n\n\n \n \n \"Approximate arxiv\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n  \n \n 4 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@article{8429509,\n abstract = {We develop a characterization of fading models, which assigns a number called logarithmic Jensen's gap to a given fading model. We show that as a consequence of a finite logarithmic Jensen's gap, an approximate capacity region can be obtained for fast fading interference channels (FF-ICs) for several scenarios. We illustrate three instances where a constant capacity gap can be obtained as a function of the logarithmic Jensen's gap. First, for an FF-IC with neither feedback nor instantaneous channel state information at transmitter (CSIT), if the fading distribution has finite logarithmic Jensen's gap, we show that a rate-splitting scheme based on the average interference-to-noise ratio can achieve its approximate capacity. Second, we show that a similar scheme can achieve the approximate capacity of FF-IC with feedback and delayed CSIT, if the fading distribution has finite logarithmic Jensen's gap. Third, when this condition holds, we show that point-to-point codes can achieve approximate capacity for a class of FF-ICs with feedback. We prove that the logarithmic Jensen's gap is finite for common fading models, including Rayleigh and Nakagami fading, thereby obtaining the approximate capacity region of FF-IC with these fading models.},\n author = {J. {Sebastian} and C. {Karakus} and S. {Diggavi}},\n doi = {10.1109/TCOMM.2018.2864266},\n issn = {1558-0857},\n journal = {IEEE Transactions on Communications},\n keywords = {approximation theory;channel capacity;diversity reception;fading channels;Gaussian channels;MIMO communication;Nakagami channels;radio transmitters;radiofrequency interference;Rayleigh channels;fast fading interference channels;finite logarithmic Jensen's gap;approximate capacity region;FF-IC;constant capacity gap;instantaneous channel state information;fading distribution;common fading models;Rayleigh channels;Receivers;Transmitters;Integrated circuit modeling;Interference;Interference channels;fast fading;capacity region;rate-splitting},\n month = {Dec},\n number = {12},\n pages = {6015-6027},\n tags = {journal,ANIT,WiNetnew,NCWN,WNIF},\n title = {Approximate Capacity of Fast Fading Interference Channels With no Instantaneous CSIT},\n type = {2},\n url_arxiv = {https://arxiv.org/abs/1706.03659},\n volume = {66},\n year = {2018}\n}\n\n
\n
\n\n\n
\n We develop a characterization of fading models, which assigns a number called logarithmic Jensen's gap to a given fading model. We show that as a consequence of a finite logarithmic Jensen's gap, an approximate capacity region can be obtained for fast fading interference channels (FF-ICs) for several scenarios. We illustrate three instances where a constant capacity gap can be obtained as a function of the logarithmic Jensen's gap. First, for an FF-IC with neither feedback nor instantaneous channel state information at transmitter (CSIT), if the fading distribution has finite logarithmic Jensen's gap, we show that a rate-splitting scheme based on the average interference-to-noise ratio can achieve its approximate capacity. Second, we show that a similar scheme can achieve the approximate capacity of FF-IC with feedback and delayed CSIT, if the fading distribution has finite logarithmic Jensen's gap. Third, when this condition holds, we show that point-to-point codes can achieve approximate capacity for a class of FF-ICs with feedback. We prove that the logarithmic Jensen's gap is finite for common fading models, including Rayleigh and Nakagami fading, thereby obtaining the approximate capacity region of FF-IC with these fading models.\n
\n\n\n
\n\n\n
\n \n\n \n \n Tarek Abdelzaher; Nora Ayanian; Tamer Basar; Suhas Diggavi; Jana Diesner; Deepak Ganesan; Ramesh Govindan; Susmit Jha; Tancrede Lepoint; Benjamin Marlin; and others.\n\n\n \n \n \n \n Toward an internet of battlefield things: a resilience perspective.\n \n \n \n\n\n \n\n\n\n Computer, 51(11): 24–36. 2018.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{abdelzaher2018toward,\n abstract = {The Internet of Battlefield Things (IoBT) might be one of the most expensive cyber-physical systems of the next decade, yet much research remains to develop its fundamental enablers. A challenge that distinguishes the IoBT from its civilian counterparts is resilience to a much larger spectrum of threats.},\n author = {Abdelzaher, Tarek and Ayanian, Nora and Basar, Tamer and Diggavi, Suhas and Diesner, Jana and Ganesan, Deepak and Govindan, Ramesh and Jha, Susmit and Lepoint, Tancrede and Marlin, Benjamin and others},\n journal = {Computer},\n number = {11},\n pages = {24--36},\n publisher = {IEEE},\n tags = {journal,CPS,DML},\n title = {Toward an internet of battlefield things: a resilience perspective},\n type = {2},\n doi = {10.1109/MC.2018.2876048},\n volume = {51},\n year = {2018}\n}\n\n
\n
\n\n\n
\n The Internet of Battlefield Things (IoBT) might be one of the most expensive cyber-physical systems of the next decade, yet much research remains to develop its fundamental enablers. A challenge that distinguishes the IoBT from its civilian counterparts is resilience to a much larger spectrum of threats.\n
\n\n\n
\n\n\n
\n \n\n \n \n W. C. Wang; Y. Yona; S. Diggavi; and P. Gupta.\n\n\n \n \n \n \n \n Design and Analysis of Stability-Guaranteed PUFs.\n \n \n \n \n\n\n \n\n\n\n IEEE Transactions on Information Forensics and Security, 13(4): 978-992. 2018.\n \n\n\n\n
\n\n\n\n \n \n \"Design arxiv\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DesignAnalysisPUFs2017,\n abstract = {The lack of stability is one of the major limitations that constrains PUF from being put in widespread practical use. In this paper, we propose a weak PUF and a strong PUF that are both completely stable with 0% intra-distance. These PUFs are called Locally Enhanced Defectivity (LED)PUF. The source of randomness of a LEDPUF is extracted from locally enhance defectivity without affecting other parts of the chip. A LEDPUF is a pure functional PUF that does not require any kinds of correction schemes as conventional parametric PUFs do. A weak LEDPUF is constructed by forming arrays of Directed Self Assembly (DSA) random connections is presented, and the strong LEDPUF is implemented by using the weak LEDPUF as the key of a keyed-hash message authentication code (HMAC). Our simulation and statistical results show that the entropy of the weak LEDPUF bits is close to ideal, and the inter-distances of both weak and strong LEDPUFs are about 50%, which means that these LEDPUFs are not only stable but also unique. We develop a new unified framework for evaluating the level of security of PUFs, based on password security, by using information theoretic tools of guesswork. The guesswork model allows to quantitatively compare, with a single unified metric, PUFs with varying levels of stability, bias and available side information. In addition, it generalizes other measures to evaluate the security level such as min-entropy and mutual information. We evaluate guesswork-based security of some measured SRAM and Ring Oscillator PUFs as an example and compare them with LEDPUF to show that stability has a more severe impact on the PUF security than biased responses. Furthermore, we find the guesswork of three new problems: Guesswork under probability of attack failure, the guesswork of idealized version of a message authentication code, and the guesswork of strong PUFs that are used for authentication.},\n author = {W. C. Wang and Y. Yona and S. Diggavi and P. Gupta},\n file = {:papers:designanalysispufs2017.pdf},\n journal = {IEEE Transactions on Information Forensics and Security},\n number = {4},\n pages = {978-992},\n tags = {journal,IT,Hardware},\n title = {Design and Analysis of Stability-Guaranteed PUFs},\n type = {2},\n url_arxiv = {https://arxiv.org/abs/1701.05637},\n volume = {13},\n year = {2018}\n}\n\n
\n
\n\n\n
\n The lack of stability is one of the major limitations that constrains PUF from being put in widespread practical use. In this paper, we propose a weak PUF and a strong PUF that are both completely stable with 0% intra-distance. These PUFs are called Locally Enhanced Defectivity (LED)PUF. The source of randomness of a LEDPUF is extracted from locally enhance defectivity without affecting other parts of the chip. A LEDPUF is a pure functional PUF that does not require any kinds of correction schemes as conventional parametric PUFs do. A weak LEDPUF is constructed by forming arrays of Directed Self Assembly (DSA) random connections is presented, and the strong LEDPUF is implemented by using the weak LEDPUF as the key of a keyed-hash message authentication code (HMAC). Our simulation and statistical results show that the entropy of the weak LEDPUF bits is close to ideal, and the inter-distances of both weak and strong LEDPUFs are about 50%, which means that these LEDPUFs are not only stable but also unique. We develop a new unified framework for evaluating the level of security of PUFs, based on password security, by using information theoretic tools of guesswork. The guesswork model allows to quantitatively compare, with a single unified metric, PUFs with varying levels of stability, bias and available side information. In addition, it generalizes other measures to evaluate the security level such as min-entropy and mutual information. We evaluate guesswork-based security of some measured SRAM and Ring Oscillator PUFs as an example and compare them with LEDPUF to show that stability has a more severe impact on the PUF security than biased responses. Furthermore, we find the guesswork of three new problems: Guesswork under probability of attack failure, the guesswork of idealized version of a message authentication code, and the guesswork of strong PUFs that are used for authentication.\n
\n\n\n
\n\n\n
\n \n\n \n \n Jad Hachem; Nikhil Karamchandani; Sharayu Moharir; and Suhas N Diggavi.\n\n\n \n \n \n \n \n Caching with partial adaptive matching.\n \n \n \n \n\n\n \n\n\n\n IEEE Journal on Selected Areas in Communications, 36(8): 1831–1842. 2018.\n \n\n\n\n
\n\n\n\n \n \n \"Caching arxiv\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{hachem2018caching,\n abstract = {We study the caching problem when we are allowed to match each user to one of a subset of caches after its request is revealed. We focus on non-uniformly popular content, specifically when the file popularities obey a Zipf distribution. We study two extremal schemes: one focusing on coded server transmissions while ignoring matching capabilities and the other focusing on adaptive matching while ignoring potential coding opportunities. We derive the rates achieved by these schemes and characterize the regimes in which one outperforms the other. We also compare them to information-theoretic outer bounds and finally propose a hybrid scheme that generalizes ideas from the two schemes and performs at least as well as either of them in most memory regimes.},\n author = {Hachem, Jad and Karamchandani, Nikhil and Moharir, Sharayu and Diggavi, Suhas N},\n journal = {IEEE Journal on Selected Areas in Communications},\n number = {8},\n pages = {1831--1842},\n publisher = {IEEE},\n tags = {journal,CCWN,IT},\n title = {Caching with partial adaptive matching},\n type = {2},\n url_arxiv = {https://arxiv.org/abs/1705.03852},\n doi = {10.1109/JSAC.2018.2845018},\n volume = {36},\n year = {2018}\n}\n\n
\n
\n\n\n
\n We study the caching problem when we are allowed to match each user to one of a subset of caches after its request is revealed. We focus on non-uniformly popular content, specifically when the file popularities obey a Zipf distribution. We study two extremal schemes: one focusing on coded server transmissions while ignoring matching capabilities and the other focusing on adaptive matching while ignoring potential coding opportunities. We derive the rates achieved by these schemes and characterize the regimes in which one outperforms the other. We also compare them to information-theoretic outer bounds and finally propose a hybrid scheme that generalizes ideas from the two schemes and performs at least as well as either of them in most memory regimes.\n
\n\n\n
\n\n\n
\n \n\n \n \n Jad Hachem; Urs Niesen; and Suhas N Diggavi.\n\n\n \n \n \n \n \n Degrees of freedom of cache-aided wireless interference networks.\n \n \n \n \n\n\n \n\n\n\n IEEE Transactions on Information Theory, 64(7): 5359–5380. 2018.\n \n\n\n\n
\n\n\n\n \n \n \"Degrees arxiv\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n  \n \n 1 download\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{hachem2018degrees,\n abstract = {We study the role of caches in wireless interference networks. We focus on content caching and delivery across a Gaussian interference network, where both transmitters and receivers are equipped with caches. We provide a constant-factor approximation of the system's degrees of freedom (DoF), for arbitrary number of transmitters, number of receivers, content library size, receiver cache size, and transmitter cache size (as long as the transmitters combined can store the entire content library among them). We demonstrate approximate optimality with respect to information-theoretic bounds that do not impose any restrictions on the caching and delivery strategies. Our characterization reveals three key insights. First, the approximate DoF is achieved using a strategy that separates the physical and network layers. This separation architecture is thus approximately optimal. Second, we show that increasing transmitter cache memory beyond what is needed to exactly store the entire library between all transmitters does not provide more than a constant-factor benefit to the DoF. A consequence is that transmit zero-forcing is not needed for approximate optimality. Third, we derive an interesting tradeoff between the receiver memory and the number of transmitters needed for approximately maximal performance. In particular, if each receiver can store a constant fraction of the content library, then only a constant number of transmitters are needed. Our solution to the caching problem requires formulating and solving a new communication problem, the symmetric multiple multicast X-channel, for which we provide an exact DoF characterization.},\n author = {Hachem, Jad and Niesen, Urs and Diggavi, Suhas N},\n journal = {IEEE Transactions on Information Theory},\n number = {7},\n pages = {5359--5380},\n publisher = {IEEE},\n tags = {journal,CCWN,IT,WiNetnew,SCS,ANIT},\n title = {Degrees of freedom of cache-aided wireless interference networks},\n type = {2},\n url_arxiv = {https://arxiv.org/abs/1606.03175},\n doi = {10.1109/TIT.2018.2825321},\n volume = {64},\n year = {2018}\n}\n\n
\n
\n\n\n
\n We study the role of caches in wireless interference networks. We focus on content caching and delivery across a Gaussian interference network, where both transmitters and receivers are equipped with caches. We provide a constant-factor approximation of the system's degrees of freedom (DoF), for arbitrary number of transmitters, number of receivers, content library size, receiver cache size, and transmitter cache size (as long as the transmitters combined can store the entire content library among them). We demonstrate approximate optimality with respect to information-theoretic bounds that do not impose any restrictions on the caching and delivery strategies. Our characterization reveals three key insights. First, the approximate DoF is achieved using a strategy that separates the physical and network layers. This separation architecture is thus approximately optimal. Second, we show that increasing transmitter cache memory beyond what is needed to exactly store the entire library between all transmitters does not provide more than a constant-factor benefit to the DoF. A consequence is that transmit zero-forcing is not needed for approximate optimality. Third, we derive an interesting tradeoff between the receiver memory and the number of transmitters needed for approximately maximal performance. In particular, if each receiver can store a constant fraction of the content library, then only a constant number of transmitters are needed. Our solution to the caching problem requires formulating and solving a new communication problem, the symmetric multiple multicast X-channel, for which we provide an exact DoF characterization.\n
\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 4\n \n \n (7)\n \n \n
\n
\n \n \n
\n \n\n \n \n Y. Shoukry; S. Mishra; Z. Luo; and S. Diggavi.\n\n\n \n \n \n \n Sybil Attack Resilient Traffic Networks: A Physics-Based Trust Propagation Approach.\n \n \n \n\n\n \n\n\n\n In 2018 ACM/IEEE 9th International Conference on Cyber-Physical Systems (ICCPS), pages 43-54, April 2018. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@inproceedings{8443720,\n abstract = {We study a crowdsourcing aided road traffic estimation setup, where a fraction of users (vehicles) are malicious, and report wrong sensory information, or even worse, report the presence of Sybil (ghost) vehicles that do not physically exist. The motivation for such attacks lies in the possibility of creating a "virtual" congestion that can influence routing algorithms, leading to "actual" congestion and chaos. We propose a Sybil attack-resilient traffic estimation and routing algorithm that is resilient against such attacks. In particular, our algorithm leverages noisy information from legacy sensing infrastructure, along with the dynamics and proximity graph of vehicles inferred from crowdsourced data. Furthermore, the scalability of our algorithm is based on efficient Boolean Satisfiability (SAT) solvers. We validated our algorithm using real traffic data from the Italian city of Bologna. Our algorithm led to a significant reduction in average travel time in the presence of Sybil attacks, including cases where the travel time was reduced from about an hour to a few minutes.},\n author = {Y. {Shoukry} and S. {Mishra} and Z. {Luo} and S. {Diggavi}},\n booktitle = {2018 ACM/IEEE 9th International Conference on Cyber-Physical Systems (ICCPS)},\n doi = {10.1109/ICCPS.2018.00013},\n issn = {},\n keywords = {computability;graph theory;road traffic;telecommunication network routing;telecommunication security;crowdsourced data;traffic data;Sybil attack resilient traffic networks;physics-based trust propagation approach;crowdsourcing aided road traffic estimation setup;Sybil vehicles;virtual congestion;routing algorithms;chaos;routing algorithm;sensory information;noisy information;real traffic data;proximity graph;Automobiles;Routing;Roads;Heuristic algorithms;Estimation;Intelligent sensors;Secure Smart transportation systems;Sybil attacks;resilient routing},\n month = {April},\n number = {},\n pages = {43-54},\n tags = {conf,CPS},\n title = {Sybil Attack Resilient Traffic Networks: A Physics-Based Trust Propagation Approach},\n type = {4},\n volume = {},\n year = {2018}\n}\n\n
\n
\n\n\n
\n We study a crowdsourcing aided road traffic estimation setup, where a fraction of users (vehicles) are malicious, and report wrong sensory information, or even worse, report the presence of Sybil (ghost) vehicles that do not physically exist. The motivation for such attacks lies in the possibility of creating a \"virtual\" congestion that can influence routing algorithms, leading to \"actual\" congestion and chaos. We propose a Sybil attack-resilient traffic estimation and routing algorithm that is resilient against such attacks. In particular, our algorithm leverages noisy information from legacy sensing infrastructure, along with the dynamics and proximity graph of vehicles inferred from crowdsourced data. Furthermore, the scalability of our algorithm is based on efficient Boolean Satisfiability (SAT) solvers. We validated our algorithm using real traffic data from the Italian city of Bologna. Our algorithm led to a significant reduction in average travel time in the presence of Sybil attacks, including cases where the travel time was reduced from about an hour to a few minutes.\n
\n\n\n
\n\n\n
\n \n\n \n \n Tarek Abdelzaher; Nora Ayanian; Tamer Basar; Suhas Diggavi; Jana Diesner; Deepak Ganesan; Ramesh Govindan; Susmit Jha; Tancrede Lepoint; Ben Marlin; and others.\n\n\n \n \n \n \n Will distributed computing revolutionize peace? the emergence of battlefield iot.\n \n \n \n\n\n \n\n\n\n In 2018 IEEE 38th International Conference on Distributed Computing Systems (ICDCS), pages 1129–1138, 2018. IEEE\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{abdelzaher2018will,\n abstract = {An upcoming frontier for distributed computing might literally save lives in future military operations. In civilian scenarios, significant efficiencies were gained from interconnecting devices into networked services and applications that automate much of everyday life from smart homes to intelligent transportation. The ecosystem of such applications and services is collectively called the Internet of Things (IoT). Can similar benefits be gained in a military context by developing an IoT for the battlefield? This paper describes unique challenges in such a context as well as potential risks, mitigation strategies, and benefits.},\n author = {Abdelzaher, Tarek and Ayanian, Nora and Basar, Tamer and Diggavi, Suhas and Diesner, Jana and Ganesan, Deepak and Govindan, Ramesh and Jha, Susmit and Lepoint, Tancrede and Marlin, Ben and others},\n booktitle = {2018 IEEE 38th International Conference on Distributed Computing Systems (ICDCS)},\n organization = {IEEE},\n pages = {1129--1138},\n tags = {conf,CPS,DML},\n title = {Will distributed computing revolutionize peace? the emergence of battlefield iot},\n type = {4},\n doi = {10.1109/ICDCS.2018.00112},\n year = {2018}\n}\n\n
\n
\n\n\n
\n An upcoming frontier for distributed computing might literally save lives in future military operations. In civilian scenarios, significant efficiencies were gained from interconnecting devices into networked services and applications that automate much of everyday life from smart homes to intelligent transportation. The ecosystem of such applications and services is collectively called the Internet of Things (IoT). Can similar benefits be gained in a military context by developing an IoT for the battlefield? This paper describes unique challenges in such a context as well as potential risks, mitigation strategies, and benefits.\n
\n\n\n
\n\n\n
\n \n\n \n \n Gaurav Kumar Agarwal; Mohammed Karmoose; Suhas Diggavi; Christina Fragouli; and Paulo Tabuada.\n\n\n \n \n \n \n \n Distorting an adversary's view in cyber-physical systems.\n \n \n \n \n\n\n \n\n\n\n In 2018 IEEE Conference on Decision and Control (CDC), pages 1476–1481, 2018. IEEE\n \n\n\n\n
\n\n\n\n \n \n \"Distorting arxiv\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{agarwal2018distorting,\n abstract = {In Cyber- Physical Systems (CPSs), inference based on communicated data is of critical significance as it can be used to manipulate or damage the control operations by adversaries. This calls for efficient mechanisms for secure transmission of data since control systems are becoming increasingly distributed over larger geographical areas. Distortion based security, recently proposed as one candidate for CPSs security, is not only more appropriate for these applications but also quite frugal in terms of prior requirements on shared keys. In this paper, we propose distortion-based metrics to protect CPSs communication and show that it is possible to confuse adversaries with just a few bits of pre-shared keys.},\n author = {Agarwal, Gaurav Kumar and Karmoose, Mohammed and Diggavi, Suhas and Fragouli, Christina and Tabuada, Paulo},\n booktitle = {2018 IEEE Conference on Decision and Control (CDC)},\n organization = {IEEE},\n pages = {1476--1481},\n tags = {conf,CPS},\n title = {Distorting an adversary's view in cyber-physical systems},\n type = {4},\n url_arxiv = {https://arxiv.org/abs/1809.04580},\n doi = {10.1109/CDC.2018.8619457},\n year = {2018}\n}\n\n
\n
\n\n\n
\n In Cyber- Physical Systems (CPSs), inference based on communicated data is of critical significance as it can be used to manipulate or damage the control operations by adversaries. This calls for efficient mechanisms for secure transmission of data since control systems are becoming increasingly distributed over larger geographical areas. Distortion based security, recently proposed as one candidate for CPSs security, is not only more appropriate for these applications but also quite frugal in terms of prior requirements on shared keys. In this paper, we propose distortion-based metrics to protect CPSs communication and show that it is possible to confuse adversaries with just a few bits of pre-shared keys.\n
\n\n\n
\n\n\n
\n \n\n \n \n Deepesh Data; Linqi Song; and Suhas Diggavi.\n\n\n \n \n \n \n Data encoding for Byzantine-resilient distributed gradient descent.\n \n \n \n\n\n \n\n\n\n In 2018 56th Annual Allerton Conference on Communication, Control, and Computing (Allerton), pages 863–870, 2018. IEEE\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{data2018data,\n abstract = {We consider distributed gradient computation, where both data and computation are distributed among m worker machines, t of which can be Byzantine adversaries, and a designated (master) node computes the model/parameter vector, iteratively using gradient descent (GD). The Byzantine adversaries can (collaboratively) deviate arbitrarily from their gradient computation. To solve this, we propose a method based on data encoding and (real) error correction to combat the adversarial behavior. We can tolerate up to t ≤ [m-1/2] corrupt worker nodes, which is information-theoretically optimal. Our method does not assume any probability distribution on the data. We develop a sparse encoding scheme which enables computationally efficient data encoding. We demonstrate a trade-off between the number of adversaries tolerated and the resource requirement (storage and computational complexity). As an example, our scheme incurs a constant overhead (storage and computational complexity) over that required by the distributed GD algorithm, without adversaries, for t ≤ m/3.},\n author = {Data, Deepesh and Song, Linqi and Diggavi, Suhas},\n booktitle = {2018 56th Annual Allerton Conference on Communication, Control, and Computing (Allerton)},\n organization = {IEEE},\n pages = {863--870},\n tags = {conf,SDL,DML},\n title = {Data encoding for Byzantine-resilient distributed gradient descent},\n type = {4},\n doi = {10.1109/ALLERTON.2018.8636017},\n year = {2018}\n}\n\n
\n
\n\n\n
\n We consider distributed gradient computation, where both data and computation are distributed among m worker machines, t of which can be Byzantine adversaries, and a designated (master) node computes the model/parameter vector, iteratively using gradient descent (GD). The Byzantine adversaries can (collaboratively) deviate arbitrarily from their gradient computation. To solve this, we propose a method based on data encoding and (real) error correction to combat the adversarial behavior. We can tolerate up to t ≤ [m-1/2] corrupt worker nodes, which is information-theoretically optimal. Our method does not assume any probability distribution on the data. We develop a sparse encoding scheme which enables computationally efficient data encoding. We demonstrate a trade-off between the number of adversaries tolerated and the resource requirement (storage and computational complexity). As an example, our scheme incurs a constant overhead (storage and computational complexity) over that required by the distributed GD algorithm, without adversaries, for t ≤ m/3.\n
\n\n\n
\n\n\n
\n \n\n \n \n Mehrdad Showkatbakhsh; Can Karakus; and Suhas Diggavi.\n\n\n \n \n \n \n \n Privacy-Utility Trade-off of Linear Regression under Random Projections and Additive Noise.\n \n \n \n \n\n\n \n\n\n\n In 2018 IEEE International Symposium on Information Theory (ISIT), pages 186–190, 2018. IEEE\n \n\n\n\n
\n\n\n\n \n \n \"Privacy-Utility arxiv\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n  \n \n 2 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{showkatbakhsh2018privacy,\n abstract = {Data privacy is an important concern in machine learning, and is fundamentally at odds with the task of training useful learning models, which typically require acquisition of large amounts of private user data. One possible way of fulfilling the machine learning task while preserving user privacy is to train the model on a transformed, noisy version of the data, which does not reveal the data itself directly to the training procedure. In this work, we analyze the privacy-utility tradeoff of two such schemes for the problem of linear regression: additive noise, and random projections. In contrast to previous work, we consider a recently proposed notion of differential privacy that is based on conditional mutual information (MI-DP), which is stronger than the conventional (ε,δ) -differential privacy, and use relative objective error as the utility metric. We find that projecting the data to a lower-dimensional subspace before adding noise attains a better trade-off in general. We also make a connection between privacy problem and (non-coherent) SIMO, which has been extensively studied in wireless communication, and use tools from there for the analysis. We present numerical results demonstrating the performance of the schemes.},\n author = {Showkatbakhsh, Mehrdad and Karakus, Can and Diggavi, Suhas},\n booktitle = {2018 IEEE International Symposium on Information Theory (ISIT)},\n organization = {IEEE},\n pages = {186--190},\n tags = {conf,PDL},\n title = {Privacy-Utility Trade-off of Linear Regression under Random Projections and Additive Noise},\n type = {4},\n url_arxiv = {https://arxiv.org/abs/1902.04688},\n doi = {10.1109/ISIT.2018.8437722},\n year = {2018}\n}\n\n
\n
\n\n\n
\n Data privacy is an important concern in machine learning, and is fundamentally at odds with the task of training useful learning models, which typically require acquisition of large amounts of private user data. One possible way of fulfilling the machine learning task while preserving user privacy is to train the model on a transformed, noisy version of the data, which does not reveal the data itself directly to the training procedure. In this work, we analyze the privacy-utility tradeoff of two such schemes for the problem of linear regression: additive noise, and random projections. In contrast to previous work, we consider a recently proposed notion of differential privacy that is based on conditional mutual information (MI-DP), which is stronger than the conventional (ε,δ) -differential privacy, and use relative objective error as the utility metric. We find that projecting the data to a lower-dimensional subspace before adding noise attains a better trade-off in general. We also make a connection between privacy problem and (non-coherent) SIMO, which has been extensively studied in wireless communication, and use tools from there for the analysis. We present numerical results demonstrating the performance of the schemes.\n
\n\n\n
\n\n\n
\n \n\n \n \n Sundara Rajan Srinivasavaradhan; Michelle Du; Suhas Diggavi; and Christina Fragouli.\n\n\n \n \n \n \n On maximum likelihood reconstruction over multiple deletion channels.\n \n \n \n\n\n \n\n\n\n In 2018 IEEE International Symposium on Information Theory (ISIT), pages 436–440, 2018. IEEE\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{srinivasavaradhan2018maximum,\n abstract = {The problem of reconstructing a sequence when observed through multiple looks over deletion channels occurs in “de novo” DNA sequencing. The DNA could be sequenced multiple times, yielding several “looks” of it, but each time the sequencer could be noisy with (independent) deletion impairments. The main goal of this paper is to develop reconstruction algorithms for a sequence observed through the lens of a fixed number of deletion channels. We use the probabilistic model of the deletion channels to develop both symbol-wise and sequence maximum likelihood decoding criteria, and algorithms motivated by them. Numerical evaluations demonstrate improvement in terms of edit distance error, over earlier algorithms.},\n author = {Srinivasavaradhan, Sundara Rajan and Du, Michelle and Diggavi, Suhas and Fragouli, Christina},\n booktitle = {2018 IEEE International Symposium on Information Theory (ISIT)},\n organization = {IEEE},\n pages = {436--440},\n tags = {conf,BioInf,IT,NDS},\n title = {On maximum likelihood reconstruction over multiple deletion channels},\n type = {4},\n doi = {10.1109/ISIT.2018.8437519},\n year = {2018}\n}\n\n
\n
\n\n\n
\n The problem of reconstructing a sequence when observed through multiple looks over deletion channels occurs in “de novo” DNA sequencing. The DNA could be sequenced multiple times, yielding several “looks” of it, but each time the sequencer could be noisy with (independent) deletion impairments. The main goal of this paper is to develop reconstruction algorithms for a sequence observed through the lens of a fixed number of deletion channels. We use the probabilistic model of the deletion channels to develop both symbol-wise and sequence maximum likelihood decoding criteria, and algorithms motivated by them. Numerical evaluations demonstrate improvement in terms of edit distance error, over earlier algorithms.\n
\n\n\n
\n\n\n
\n \n\n \n \n Alimzhan Sultangazin; Suhas Diggavi; and Paulo Tabuada.\n\n\n \n \n \n \n Protecting the privacy of networked multi-agent systems controlled over the cloud.\n \n \n \n\n\n \n\n\n\n In 2018 27th International Conference on Computer Communication and Networks (ICCCN), pages 1–7, 2018. IEEE\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{sultangazin2018protecting,\n abstract = {The vision of an Internet-of-Things calls for combining the increasing connectivity of devices at the edge with the ability to compute either at the edge or on more powerful servers in the network. There is great interest in exploring the feasibility of these ideas when devices such as quadcopters or ground robots at the edge are controlled over the cloud, i.e., by leveraging computational power available elsewhere in the network. One of the main difficulties, especially in the context of the Internet-of-Battlefield- Things is the need to keep the data private. In this paper we propose a solution to this problem by extending previous results by the authors from a single system controlled over the cloud to networks of systems that are controlled and coordinated over the cloud. We propose a noncryptographic lightweight encoding scheme that ensures the privacy of the data exchanged by all the participating parties.},\n author = {Sultangazin, Alimzhan and Diggavi, Suhas and Tabuada, Paulo},\n booktitle = {2018 27th International Conference on Computer Communication and Networks (ICCCN)},\n organization = {IEEE},\n pages = {1--7},\n tags = {conf,CPS},\n title = {Protecting the privacy of networked multi-agent systems controlled over the cloud},\n type = {4},\n doi = {10.1109/ICCCN.2018.8487355},\n year = {2018}\n}\n\n
\n
\n\n\n
\n The vision of an Internet-of-Things calls for combining the increasing connectivity of devices at the edge with the ability to compute either at the edge or on more powerful servers in the network. There is great interest in exploring the feasibility of these ideas when devices such as quadcopters or ground robots at the edge are controlled over the cloud, i.e., by leveraging computational power available elsewhere in the network. One of the main difficulties, especially in the context of the Internet-of-Battlefield- Things is the need to keep the data private. In this paper we propose a solution to this problem by extending previous results by the authors from a single system controlled over the cloud to networks of systems that are controlled and coordinated over the cloud. We propose a noncryptographic lightweight encoding scheme that ensures the privacy of the data exchanged by all the participating parties.\n
\n\n\n
\n\n\n\n\n\n
\n
\n\n\n\n\n
\n
\n\n
\n
\n  \n 2017\n \n \n (3)\n \n \n
\n
\n \n \n
\n
\n  \n 1\n \n \n (1)\n \n \n
\n
\n \n \n
\n \n\n \n \n J. Sebastian; C. Karakus; and S. N. Diggavi.\n\n\n \n \n \n \n Approximate Capacity of Fading Gaussian Interference Channels with Point-to-Point Codes.\n \n \n \n\n\n \n\n\n\n Preprint. June 2017.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{Joyson_twc17,\n author = {Sebastian, J. and Karakus, C. and Diggavi, S. N.},\n file = {:papers:twc17_ic_p2p.pdf},\n journal = {Preprint},\n month = {June},\n tags = {journalSub,WiIntMgmt,IT,WiNet},\n title = {Approximate Capacity of Fading Gaussian Interference Channels with Point-to-Point Codes},\n type = {1},\n year = {2017}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2\n \n \n (7)\n \n \n
\n
\n \n \n
\n \n\n \n \n J. Hachem; N. Karamchandani; and S. N. Diggavi.\n\n\n \n \n \n \n Coded Caching for Multi-level Popularity and Access.\n \n \n \n\n\n \n\n\n\n IEEE Transactions on Information Theory, 63(5): 3108-3141. May 2017.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@article{7865913,\n author = {J. Hachem and N. Karamchandani and S. N. Diggavi},\n doi = {10.1109/TIT.2017.2664817},\n file = {:papers:jad_multilevel.pdf},\n issn = {0018-9448},\n journal = {IEEE Transactions on Information Theory},\n keywords = {cache storage;cellular radio;content management;cache memory sharing;coded caching-and-delivery scheme;joint content delivery and storage design;local-coverage wireless access point deployment;multilevel access;multilevel popularity;non-cut-set bound;order-optimal scheme;sliding-window entropy inequality;sparsely distributed large-coverage macrocell base station;wireless architecture;wireless content;Cache memory;Computer architecture;Context;IEEE 802.11 Standard;Internet;Wireless networks;Content distribution networks;cache memory;network coding},\n month = {May},\n number = {5},\n pages = {3108-3141},\n tags = {journal,IT,Caching,WiNet},\n title = {Coded Caching for Multi-level Popularity and Access},\n type = {2},\n volume = {63},\n year = {2017}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n S. Mishra; I. Wang; and S. N. Diggavi.\n\n\n \n \n \n \n Harnessing Bursty Interference in Multicarrier Systems With Output Feedback.\n \n \n \n\n\n \n\n\n\n IEEE Transactions on Information Theory, 63(7): 4430-4452. July 2017.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@article{7911284,\n abstract = {We study parallel two-user interference channels when the interference is bursty and feedback is available from the respective receivers. Presence of interference in each subcarrier is modeled as a memoryless Bernoulli random state. The states across subcarriers are drawn from an arbitrary joint distribution with the same marginal probability for each subcarrier and instantiated independent and identically distributed (i.i.d.) over time. For the linear deterministic setup with symmetric interference in each subcarrier, we give a complete characterization of the capacity region. For the analogous setup with Gaussian noise, we give outer bounds and a tight generalized degrees of freedom characterization. We propose a novel helping mechanism, which enables subcarriers in very strong interference regime to help in recovering interfered signals for subcarriers in strong and weak interference regimes. Depending on the interference and burstiness regime, the inner bounds either employ the proposed helping mechanism to code across subcarriers or treat the subcarriers separately. The outer bounds demonstrate a connection to a subset entropy inequality by Madiman and Tetali.},\n author = {S. {Mishra} and I. {Wang} and S. N. {Diggavi}},\n doi = {10.1109/TIT.2017.2697866},\n issn = {1557-9654},\n journal = {IEEE Transactions on Information Theory},\n keywords = {Gaussian noise;probability;radio networks;radiofrequency interference;harnessing bursty interference;multicarrier systems;output feedback;interference channels;respective receivers;memoryless Bernoulli random state;arbitrary joint distribution;probability;symmetric interference;capacity region;Gaussian noise;subset entropy inequality;wireless networks;Receivers;Interference channels;Output feedback;Encoding;Channel models;Niobium;Interference channel;bursty interference;feedback;multicarrier systems},\n month = {July},\n number = {7},\n pages = {4430-4452},\n tags = {journal,IT,ANIT,WNIF},\n title = {Harnessing Bursty Interference in Multicarrier Systems With Output Feedback},\n type = {2},\n volume = {63},\n year = {2017}\n}\n\n
\n
\n\n\n
\n We study parallel two-user interference channels when the interference is bursty and feedback is available from the respective receivers. Presence of interference in each subcarrier is modeled as a memoryless Bernoulli random state. The states across subcarriers are drawn from an arbitrary joint distribution with the same marginal probability for each subcarrier and instantiated independent and identically distributed (i.i.d.) over time. For the linear deterministic setup with symmetric interference in each subcarrier, we give a complete characterization of the capacity region. For the analogous setup with Gaussian noise, we give outer bounds and a tight generalized degrees of freedom characterization. We propose a novel helping mechanism, which enables subcarriers in very strong interference regime to help in recovering interfered signals for subcarriers in strong and weak interference regimes. Depending on the interference and burstiness regime, the inner bounds either employ the proposed helping mechanism to code across subcarriers or treat the subcarriers separately. The outer bounds demonstrate a connection to a subset entropy inequality by Madiman and Tetali.\n
\n\n\n
\n\n\n
\n \n\n \n \n C. Tian; J. Chen; S. N. Diggavi; and S. Shamai Shitz.\n\n\n \n \n \n \n Matched Multiuser Gaussian Source Channel Communications via Uncoded Schemes.\n \n \n \n\n\n \n\n\n\n IEEE Transactions on Information Theory, 63(7): 4155-4171. July 2017.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n  \n \n 1 download\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@article{7920290,\n abstract = {We investigate whether uncoded schemes are optimal for Gaussian sources on multiuser Gaussian channels. Particularly, we consider two problems: the first is to send correlated Gaussian sources on a Gaussian broadcast channel where each receiver is interested in reconstructing only one source component (or one specific linear function of the sources) under the mean squared error distortion measure; the second is to send correlated Gaussian sources on a Gaussian multiple-access channel, where each transmitter observes a noisy combination of the sources, and the receiver wishes to reconstruct the individual source components (or individual linear functions) under the mean squared error distortion measure. It is shown that when the channel parameters satisfy certain general conditions, the induced distortion tuples are on the boundary of the achievable distortion region, and thus optimal. Instead of following the conventional approach of attempting to characterize the achievable distortion region, we ask the question whether and how a match can be effectively determined. This decision problem formulation helps to circumvent the difficult optimization problem often embedded in region characterization problems, and it also leads us to focus on the critical conditions in the outer bounds that make the inequalities become equalities, which effectively decouple the overall problem into several simpler sub-problems. Optimality results previously unknown in the literature are obtained using this novel approach. Explicit and novel outer bounds are derived for the two problems as the byproducts of our investigation.},\n author = {C. {Tian} and J. {Chen} and S. N. {Diggavi} and S. {Shamai Shitz}},\n doi = {10.1109/TIT.2017.2701807},\n issn = {1557-9654},\n journal = {IEEE Transactions on Information Theory},\n keywords = {broadcast channels;Gaussian channels;mean square error methods;multiuser channels;matched multiuser Gaussian source channel communications;uncoded schemes;Gaussian broadcast channel;mean squared error distortion measure;correlated Gaussian sources;Gaussian multiple-access channel;mean squared error distortion;distortion tuples;optimization problem;region characterization problems;Distortion;Distortion measurement;Optimization;Receivers;Noise measurement;Decoding;Encoding;Broadcast;multiple access;combined source-channel coding},\n month = {July},\n number = {7},\n pages = {4155-4171},\n tags = {journal,IT,SCS},\n title = {Matched Multiuser Gaussian Source Channel Communications via Uncoded Schemes},\n type = {2},\n volume = {63},\n year = {2017}\n}\n\n
\n
\n\n\n
\n We investigate whether uncoded schemes are optimal for Gaussian sources on multiuser Gaussian channels. Particularly, we consider two problems: the first is to send correlated Gaussian sources on a Gaussian broadcast channel where each receiver is interested in reconstructing only one source component (or one specific linear function of the sources) under the mean squared error distortion measure; the second is to send correlated Gaussian sources on a Gaussian multiple-access channel, where each transmitter observes a noisy combination of the sources, and the receiver wishes to reconstruct the individual source components (or individual linear functions) under the mean squared error distortion measure. It is shown that when the channel parameters satisfy certain general conditions, the induced distortion tuples are on the boundary of the achievable distortion region, and thus optimal. Instead of following the conventional approach of attempting to characterize the achievable distortion region, we ask the question whether and how a match can be effectively determined. This decision problem formulation helps to circumvent the difficult optimization problem often embedded in region characterization problems, and it also leads us to focus on the critical conditions in the outer bounds that make the inequalities become equalities, which effectively decouple the overall problem into several simpler sub-problems. Optimality results previously unknown in the literature are obtained using this novel approach. Explicit and novel outer bounds are derived for the two problems as the byproducts of our investigation.\n
\n\n\n
\n\n\n
\n \n\n \n \n C. Karakus; and S. Diggavi.\n\n\n \n \n \n \n Enhancing Multiuser MIMO Through Opportunistic D2D Cooperation.\n \n \n \n\n\n \n\n\n\n IEEE Transactions on Wireless Communications, 16(9): 5616-5629. Sep. 2017.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@article{7942013,\n abstract = {We propose a cellular architecture that combines multiuser MIMO downlink with opportunistic use of unlicensed Industrial, Scientific, and Medical Radio (ISM) bands to establish device-to-device (D2D) cooperation. The architecture consists of a physical-layer cooperation scheme based on forming downlink virtual MIMO channels through D2D relaying, and a novel resource allocation strategy for such D2D-enabled networks. We prove the approximate optimality of the physical-layer scheme, and demonstrate that such cooperation boosts the effective SNR of the weakest user in the system, especially in the many-user regime, due to multiuser diversity. To harness this physical-layer scheme, we formulate the cooperative user scheduling and the relay selection problem using the network utility maximization framework. For such a cooperative network, we propose a novel utility metric that jointly captures fairness in throughput and the cost of relaying in the system. We propose a joint user scheduling and relay selection algorithm, which we prove to be asymptotically optimal. We study the architecture through system-level simulations over a wide range of scenarios. The highlight of these simulations is an approximately 6× improvement in data rate for cell-edge (bottom fifth-percentile) users (over the state-of-the-art) while still improving the overall throughput, and considering various system constraints.},\n author = {C. {Karakus} and S. {Diggavi}},\n doi = {10.1109/TWC.2017.2712649},\n issn = {1558-2248},\n journal = {IEEE Transactions on Wireless Communications},\n keywords = {cellular radio;cooperative communication;MIMO communication;multiuser channels;relay networks (telecommunication);resource allocation;telecommunication scheduling;cellular architecture;multiuser MIMO downlink;unlicensed Industrial Scientific and Medical Radio bands;unlicensed ISM bands;device-to-device cooperation;D2D cooperation;physical-layer cooperation scheme;downlink virtual MIMO channels;D2D relaying;resource allocation strategy;D2D-enabled networks;physical-layer scheme;many-user regime;multiuser diversity;cooperative user scheduling;network utility maximization framework;joint user scheduling algorithm;relay selection algorithm;system-level simulations;cell-edge users;Device-to-device communication;Downlink;Computer architecture;Throughput;MIMO;Relays;Base stations;D2D;opportunistic scheduling;multiuser MIMO;ISM bands;user cooperation},\n month = {Sep.},\n number = {9},\n pages = {5616-5629},\n tags = {journal,WiNetnew,WiNet},\n title = {Enhancing Multiuser MIMO Through Opportunistic D2D Cooperation},\n type = {2},\n volume = {16},\n year = {2017}\n}\n\n
\n
\n\n\n
\n We propose a cellular architecture that combines multiuser MIMO downlink with opportunistic use of unlicensed Industrial, Scientific, and Medical Radio (ISM) bands to establish device-to-device (D2D) cooperation. The architecture consists of a physical-layer cooperation scheme based on forming downlink virtual MIMO channels through D2D relaying, and a novel resource allocation strategy for such D2D-enabled networks. We prove the approximate optimality of the physical-layer scheme, and demonstrate that such cooperation boosts the effective SNR of the weakest user in the system, especially in the many-user regime, due to multiuser diversity. To harness this physical-layer scheme, we formulate the cooperative user scheduling and the relay selection problem using the network utility maximization framework. For such a cooperative network, we propose a novel utility metric that jointly captures fairness in throughput and the cost of relaying in the system. We propose a joint user scheduling and relay selection algorithm, which we prove to be asymptotically optimal. We study the architecture through system-level simulations over a wide range of scenarios. The highlight of these simulations is an approximately 6× improvement in data rate for cell-edge (bottom fifth-percentile) users (over the state-of-the-art) while still improving the overall throughput, and considering various system constraints.\n
\n\n\n
\n\n\n
\n \n\n \n \n Shaunak Mishra; Yasser Shoukry; Nikhil Karamchandani; Suhas N Diggavi; and Paulo Tabuada.\n\n\n \n \n \n \n Secure state estimation against sensor attacks in the presence of noise.\n \n \n \n\n\n \n\n\n\n IEEE Transactions on Control of Network Systems, 4(1): 49–59. 2017.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{mishra2017secure,\n author = {Mishra, Shaunak and Shoukry, Yasser and Karamchandani, Nikhil and Diggavi, Suhas N and Tabuada, Paulo},\n file = {:papers:mishra_secure.pdf},\n journal = {IEEE Transactions on Control of Network Systems},\n number = {1},\n pages = {49--59},\n publisher = {IEEE},\n tags = {journal,IT,SecureCPS},\n title = {Secure state estimation against sensor attacks in the presence of noise},\n type = {2},\n volume = {4},\n year = {2017}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n Manoj Mishra; Bikash Kumar Dey; Vinod M Prabhakaran; and Suhas N Diggavi.\n\n\n \n \n \n \n Wiretapped Oblivious Transfer.\n \n \n \n\n\n \n\n\n\n IEEE Transactions on Information Theory, 63(4): 2560–2595. 2017.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{mishra2017wiretapped,\n author = {Mishra, Manoj and Dey, Bikash Kumar and Prabhakaran, Vinod M and Diggavi, Suhas N},\n journal = {IEEE Transactions on Information Theory},\n number = {4},\n pages = {2560--2595},\n publisher = {IEEE},\n tags = {journal,IT,WNS},\n title = {Wiretapped Oblivious Transfer},\n type = {2},\n volume = {63},\n year = {2017}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n Mahdi Jafari Siavoshani; Shaunak Mishra; Christina Fragouli; and Suhas N Diggavi.\n\n\n \n \n \n \n Multi-Party Secret Key Agreement Over State-Dependent Wireless Broadcast Channels.\n \n \n \n\n\n \n\n\n\n IEEE Transactions on Information Forensics and Security, 12(2): 323–337. 2017.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{siavoshani2017multi,\n author = {Siavoshani, Mahdi Jafari and Mishra, Shaunak and Fragouli, Christina and Diggavi, Suhas N},\n file = {:papers:siavoshani_secretkey.pdf},\n journal = {IEEE Transactions on Information Forensics and Security},\n number = {2},\n pages = {323--337},\n publisher = {IEEE},\n tags = {journal,IT,WiNetSec},\n title = {Multi-Party Secret Key Agreement Over State-Dependent Wireless Broadcast Channels},\n type = {2},\n volume = {12},\n year = {2017}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 4\n \n \n (10)\n \n \n
\n
\n \n \n
\n \n\n \n \n Jad Hachem; Nikhil Karamchandani; Sharayu Moharir; and Suhas Diggavi.\n\n\n \n \n \n \n Coded Caching With Partial Adaptive Matching.\n \n \n \n\n\n \n\n\n\n In 2017 IEEE International Symposium on Information Theory (ISIT), June 2017. \n available on arXiv:1705.03852 [cs.IT]\n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{adaptive,\n author = {Jad Hachem and Nikhil Karamchandani and Sharayu Moharir and Suhas Diggavi},\n booktitle = {2017 IEEE International Symposium on Information Theory (ISIT)},\n file = {:papers:jad_adaptive.pdf},\n month = {June},\n note = {available on arXiv:1705.03852 [cs.IT]},\n tags = {conf,IT,Caching,WiNet},\n title = {Coded Caching With Partial Adaptive Matching},\n type = {4},\n year = {2017}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n C. Karakus; Y. Sun; and S. N. Diggavi.\n\n\n \n \n \n \n Encoded Distributed Optimization.\n \n \n \n\n\n \n\n\n\n In 2017 IEEE International Symposium on Information Theory, June 2017. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{dist_opt_isit,\n author = {Karakus, C.  and Sun, Y. and Diggavi, S. N.},\n booktitle = {2017 IEEE International Symposium on Information Theory},\n file = {:papers:isit17_dist_opt.pdf},\n month = {June},\n tags = {conf,IT,optimization},\n title = {Encoded Distributed Optimization},\n type = {4},\n year = {2017}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n Jad Hachem; Nikhil Karamchandani; Sharayu Moharir; and Suhas Diggavi.\n\n\n \n \n \n \n Caching with partial matching under Zipf demands.\n \n \n \n\n\n \n\n\n\n In 2017 IEEE Information Theory Workshop (ITW), pages 61–65, 2017. IEEE\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{hachem2017caching,\n author = {Hachem, Jad and Karamchandani, Nikhil and Moharir, Sharayu and Diggavi, Suhas},\n booktitle = {2017 IEEE Information Theory Workshop (ITW)},\n organization = {IEEE},\n pages = {61--65},\n tags = {conf,CCWN,IT},\n title = {Caching with partial matching under Zipf demands},\n type = {4},\n year = {2017}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n J. Sebastian; A. Sengupta; and S. N. Diggavi.\n\n\n \n \n \n \n On Capacity of Noncoherent MIMO with Asymmetric Link Strengths.\n \n \n \n\n\n \n\n\n\n In 2017 IEEE International Symposium on Information Theory (ISIT), June 2017. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{Joyson_isit17,\n author = {Sebastian, J. and Sengupta, A. and Diggavi, S. N.},\n booktitle = {2017 IEEE International Symposium on Information Theory (ISIT)},\n file = {:papers:isit17_noncoherent.pdf},\n month = {June},\n tags = {conf,WiIntMgmt,IT,WiNet,Noncoherent},\n title = {On Capacity of Noncoherent MIMO with Asymmetric Link Strengths},\n type = {4},\n year = {2017}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n Can Karakus; Yifan Sun; Suhas Diggavi; and Wotao Yin.\n\n\n \n \n \n \n Straggler mitigation in distributed optimization through data encoding.\n \n \n \n\n\n \n\n\n\n In Advances in Neural Information Processing Systems, pages 5434–5442, 2017. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{karakus2017straggler,\n author = {Karakus, Can and Sun, Yifan and Diggavi, Suhas and Yin, Wotao},\n booktitle = {Advances in Neural Information Processing Systems},\n pages = {5434--5442},\n tags = {conf,DML,EncOpt},\n title = {Straggler mitigation in distributed optimization through data encoding},\n type = {4},\n year = {2017}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n Wei Mao; Suhas Diggavi; and Sreeram Kannan.\n\n\n \n \n \n \n Models and information-theoretic bounds for nanopore sequencing.\n \n \n \n\n\n \n\n\n\n 2017.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@conference{Mao-Diggavi-Kannan-nanopore-isit,\n author = {Mao, Wei and Diggavi, Suhas and Kannan, Sreeram},\n booktitle = {2017 IEEE International Symposium on Information Theory Proceedings (ISIT)},\n file = {:papers:isit_nanopore.pdf},\n tags = {conf,IT,Nanopore},\n title = {Models and information-theoretic bounds for nanopore sequencing},\n type = {4},\n year = {2017}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n Y. Yona; and S. Diggavi.\n\n\n \n \n \n \n The Effect of Bias on the Guesswork of Hash Functions.\n \n \n \n\n\n \n\n\n\n In 2017 IEEE International Symposium on Information Theory Proceedings, 2017. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{PCISIT2017,\n author = {Y. Yona and S. Diggavi},\n booktitle = {2017 IEEE International Symposium on Information Theory Proceedings},\n file = {:papers:pcisit2017.pdf},\n tags = {conf,IT,Hardware},\n title = {The Effect of Bias on the Guesswork of Hash Functions},\n type = {4},\n year = {2017}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n Mehrdad Showkatbakhsh; Yasser Shoukry; Robert H Chen; Suhas Diggavi; and Paulo Tabuada.\n\n\n \n \n \n \n An SMT-based approach to secure state estimation under sensor and actuator attacks.\n \n \n \n\n\n \n\n\n\n In 2017 IEEE 56th Annual Conference on Decision and Control (CDC), pages 157–162, 2017. IEEE\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{showkatbakhsh2017smt,\n author = {Showkatbakhsh, Mehrdad and Shoukry, Yasser and Chen, Robert H and Diggavi, Suhas and Tabuada, Paulo},\n booktitle = {2017 IEEE 56th Annual Conference on Decision and Control (CDC)},\n organization = {IEEE},\n pages = {157--162},\n tags = {conf,CPS},\n title = {An SMT-based approach to secure state estimation under sensor and actuator attacks},\n type = {4},\n year = {2017}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n Chi-Yo Tsai; Gaurav Kumar Agarwal; Christina Fragouli; and Suhas Diggavi.\n\n\n \n \n \n \n A distortion based approach for protecting inferences.\n \n \n \n\n\n \n\n\n\n In 2017 IEEE international symposium on information theory (ISIT), pages 1913–1917, 2017. IEEE\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{tsai2017distortion,\n author = {Tsai, Chi-Yo and Agarwal, Gaurav Kumar and Fragouli, Christina and Diggavi, Suhas},\n booktitle = {2017 IEEE international symposium on information theory (ISIT)},\n organization = {IEEE},\n pages = {1913--1917},\n tags = {conf,CPS},\n title = {A distortion based approach for protecting inferences},\n type = {4},\n year = {2017}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n Wei-Che Wang; Yair Yona; Yizhang Wu; Szu-Yao Hung; Suhas Diggavi; and Puneet Gupta.\n\n\n \n \n \n \n Implementation of stable PUFs using gate oxide breakdown.\n \n \n \n\n\n \n\n\n\n In 2017 Asian Hardware Oriented Security and Trust Symposium (AsianHOST), pages 13–18, 2017. IEEE\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{wang2017implementation,\n author = {Wang, Wei-Che and Yona, Yair and Wu, Yizhang and Hung, Szu-Yao and Diggavi, Suhas and Gupta, Puneet},\n booktitle = {2017 Asian Hardware Oriented Security and Trust Symposium (AsianHOST)},\n organization = {IEEE},\n pages = {13--18},\n tags = {conf,HS},\n title = {Implementation of stable PUFs using gate oxide breakdown},\n type = {4},\n year = {2017}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n\n\n\n
\n
\n\n
\n
\n  \n 2016\n \n \n (3)\n \n \n
\n
\n \n \n
\n
\n  \n 1\n \n \n (2)\n \n \n
\n
\n \n \n
\n \n\n \n \n Yair Yona; and Suhas Diggavi.\n\n\n \n \n \n \n Password Cracking: The Effect of Bias on the Average Guesswork of Hash Functions.\n \n \n \n\n\n \n\n\n\n Preprint. 2016.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{PasswordCrackin2016,\n author = {Yona, Yair and Diggavi, Suhas},\n file = {:papers:passwordcrackin2016.pdf},\n journal = {Preprint},\n tags = {journalSub,IT,Hardware},\n title = {Password Cracking: The Effect of Bias on the Average Guesswork of Hash Functions},\n type = {1},\n year = {2016}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n Yasser Shoukry; Paul Martin; Yair Yona; Suhas Diggavi; and Mani Srivastava.\n\n\n \n \n \n \n \n Attack Resilience and Recovery using Physical Challenge Response Authentication for Active Sensors Under Integrity Attacks.\n \n \n \n \n\n\n \n\n\n\n Preprint. 2016.\n \n\n\n\n
\n\n\n\n \n \n \"Attack arxiv\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{Phisical_Challange_Response_Auth2016,\n abstract = {Embedded sensing systems are pervasively used in life- and security-critical systems such as those found in airplanes, automobiles, and healthcare. Traditional security mechanisms for these sensors focus on data encryption and other post-processing techniques, but the sensors themselves often remain vulnerable to attacks in the physical/analog domain. If an adversary manipulates a physical/analog signal prior to digitization, no amount of digital security mechanisms after the fact can help. Fortunately, nature imposes fundamental constraints on how these analog signals can behave. This work presents PyCRA, a physical challenge-response authentication scheme designed to protect active sensing systems against physical attacks occurring in the analog domain. PyCRA provides security for active sensors by continually challenging the surrounding environment via random but deliberate physical probes. By analyzing the responses to these probes, and by using the fact that the adversary cannot change the underlying laws of physics, we provide an authentication mechanism that not only detects malicious attacks but provides resilience against them. We demonstrate the effectiveness of PyCRA through several case studies using two sensing systems: (1) magnetic sensors like those found wheel speed sensors in robotics and automotive, and (2) commercial RFID tags used in many security-critical applications. Finally, we outline methods and theoretical proofs for further enhancing the resilience of PyCRA to active attacks by means of a confusion phase---a period of low signal to noise ratio that makes it more difficult for an attacker to correctly identify and respond to PyCRA's physical challenges. In doing so, we evaluate both the robustness and the limitations of PyCRA, concluding by outlining practical considerations as well as further applications for the proposed authentication mechanism.},\n author = {Shoukry, Yasser and Martin, Paul and Yona, Yair and Diggavi, Suhas and Srivastava, Mani},\n file = {:papers:physical_challange_response_auth2016.pdf},\n journal = {Preprint},\n tags = {journalSub,IT,Hardware},\n title = {Attack Resilience and Recovery using Physical Challenge Response Authentication for Active Sensors Under Integrity Attacks},\n type = {1},\n url_arxiv = {https://arxiv.org/abs/1605.02062},\n year = {2016}\n}\n\n
\n
\n\n\n
\n Embedded sensing systems are pervasively used in life- and security-critical systems such as those found in airplanes, automobiles, and healthcare. Traditional security mechanisms for these sensors focus on data encryption and other post-processing techniques, but the sensors themselves often remain vulnerable to attacks in the physical/analog domain. If an adversary manipulates a physical/analog signal prior to digitization, no amount of digital security mechanisms after the fact can help. Fortunately, nature imposes fundamental constraints on how these analog signals can behave. This work presents PyCRA, a physical challenge-response authentication scheme designed to protect active sensing systems against physical attacks occurring in the analog domain. PyCRA provides security for active sensors by continually challenging the surrounding environment via random but deliberate physical probes. By analyzing the responses to these probes, and by using the fact that the adversary cannot change the underlying laws of physics, we provide an authentication mechanism that not only detects malicious attacks but provides resilience against them. We demonstrate the effectiveness of PyCRA through several case studies using two sensing systems: (1) magnetic sensors like those found wheel speed sensors in robotics and automotive, and (2) commercial RFID tags used in many security-critical applications. Finally, we outline methods and theoretical proofs for further enhancing the resilience of PyCRA to active attacks by means of a confusion phase—a period of low signal to noise ratio that makes it more difficult for an attacker to correctly identify and respond to PyCRA's physical challenges. In doing so, we evaluate both the robustness and the limitations of PyCRA, concluding by outlining practical considerations as well as further applications for the proposed authentication mechanism.\n
\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2\n \n \n (3)\n \n \n
\n
\n \n \n
\n \n\n \n \n Shirin Saeedi Bidokhti; Vinod M Prabhakaran; and Suhas N Diggavi.\n\n\n \n \n \n \n Capacity results for multicasting nested message sets over combination networks.\n \n \n \n\n\n \n\n\n\n IEEE Transactions on Information Theory, 62(9): 4968–4992. 2016.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{bidokhti2016capacity,\n author = {Bidokhti, Shirin Saeedi and Prabhakaran, Vinod M and Diggavi, Suhas N},\n journal = {IEEE Transactions on Information Theory},\n number = {9},\n pages = {4968--4992},\n publisher = {IEEE},\n tags = {journal,IT},\n title = {Capacity results for multicasting nested message sets over combination networks},\n type = {2},\n volume = {62},\n year = {2016}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n László Czap; Vinod M Prabhakaran; Christina Fragouli; and Suhas N Diggavi.\n\n\n \n \n \n \n An LP Characterization of the Secret-message Capacity of Three Erasure Networks With Feedback.\n \n \n \n\n\n \n\n\n\n IEEE Transactions on Information Theory, 62(5): 2430–2480. 2016.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{czap2016lp,\n author = {Czap, L{\\'a}szl{\\'o} and Prabhakaran, Vinod M and Fragouli, Christina and Diggavi, Suhas N},\n journal = {IEEE Transactions on Information Theory},\n number = {5},\n pages = {2430--2480},\n publisher = {IEEE},\n tags = {journal,IT,WNS},\n title = {An LP Characterization of the Secret-message Capacity of Three Erasure Networks With Feedback},\n type = {2},\n volume = {62},\n year = {2016}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n Nikhil Karamchandani; Urs Niesen; Mohammad Ali Maddah-Ali; and Suhas N Diggavi.\n\n\n \n \n \n \n Hierarchical coded caching.\n \n \n \n\n\n \n\n\n\n IEEE Transactions on Information Theory, 62(6): 3212–3229. 2016.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{karamchandani2016hierarchical,\n author = {Karamchandani, Nikhil and Niesen, Urs and Maddah-Ali, Mohammad Ali and Diggavi, Suhas N},\n file = {:papers:karam_hier.pdf},\n journal = {IEEE Transactions on Information Theory},\n number = {6},\n pages = {3212--3229},\n publisher = {IEEE},\n tags = {journal,IT,Caching,WiNet},\n title = {Hierarchical coded caching},\n type = {2},\n volume = {62},\n year = {2016}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 4\n \n \n (6)\n \n \n
\n
\n \n \n
\n \n\n \n \n J. Hachem; U. Niesen; and S. Diggavi.\n\n\n \n \n \n \n A layered caching architecture for the interference channel.\n \n \n \n\n\n \n\n\n\n In 2016 IEEE International Symposium on Information Theory (ISIT), pages 415-419, July 2016. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 1 download\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@inproceedings{7541332,\n author = {J. Hachem and U. Niesen and S. Diggavi},\n booktitle = {2016 IEEE International Symposium on Information Theory (ISIT)},\n doi = {10.1109/ISIT.2016.7541332},\n file = {:papers:jad_layered.pdf},\n keywords = {Gaussian channels;radio receivers;radio transmitters;radiofrequency interference;wireless channels;degrees-of-freedom;layered architecture;layered caching architecture;network layer;physical layer;radio receiver;radio transmitter;two-user Gaussian interference channel;Cache memory;Computer architecture;Interference channels;Physical layer;Receivers;Servers;Transmitters},\n month = {July},\n pages = {415-419},\n tags = {conf,IT,Caching,WiNet},\n title = {A layered caching architecture for the interference channel},\n type = {4},\n year = {2016}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n Mehrdad Showkatbakhsh; Paulo Tabuada; and Suhas N. Diggavi.\n\n\n \n \n \n \n Secure system identification.\n \n \n \n\n\n \n\n\n\n In 54th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2016, Monticello, IL, USA, September 27-30, 2016, pages 1137–1141, 2016. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/allerton/ShowkatbakhshTD16,\n abstract = {This work is concerned with the identification of linear time-invariant systems in the presence of an adversarial agent that attacks sensor measurements. The attacker is omniscient and we impose no restrictions (statistical or otherwise) on how the adversary alters the sensor measurements. We work in a noisy scenario where, in addition to the attacks, the sensor measurements are also affected by additive noise. Given a bound on the number of attacked sensors, and under a certain observability condition, we show that we can still construct a model that is useful for stabilization. Furthermore, we show that this model is closely related to the original system.},\n author = {Mehrdad Showkatbakhsh and\nPaulo Tabuada and\nSuhas N. Diggavi},\n bibsource = {dblp computer science bibliography, http://dblp.org},\n biburl = {http://dblp.uni-trier.de/rec/bib/conf/allerton/ShowkatbakhshTD16},\n booktitle = {54th Annual Allerton Conference on Communication, Control, and Computing,\nAllerton 2016, Monticello, IL, USA, September 27-30, 2016},\n crossref = {DBLP:conf/allerton/2016},\n doi = {10.1109/ALLERTON.2016.7852363},\n file = {:papers:mehrdad_allerton16.pdf},\n pages = {1137--1141},\n tags = {conf,IT,SecureCPS},\n timestamp = {Fri, 17 Feb 2017 10:49:47 +0100},\n title = {Secure system identification},\n type = {4},\n year = {2016}\n}\n\n
\n
\n\n\n
\n This work is concerned with the identification of linear time-invariant systems in the presence of an adversarial agent that attacks sensor measurements. The attacker is omniscient and we impose no restrictions (statistical or otherwise) on how the adversary alters the sensor measurements. We work in a noisy scenario where, in addition to the attacks, the sensor measurements are also affected by additive noise. Given a bound on the number of attacked sensors, and under a certain observability condition, we show that we can still construct a model that is useful for stabilization. Furthermore, we show that this model is closely related to the original system.\n
\n\n\n
\n\n\n
\n \n\n \n \n Mehrdad Showkatbakhsh; Paulo Tabuada; and Suhas N. Diggavi.\n\n\n \n \n \n \n System identification in the presence of adversarial outputs.\n \n \n \n\n\n \n\n\n\n In 55th IEEE Conference on Decision and Control, CDC 2016, Las Vegas, NV, USA, December 12-14, 2016, pages 7177–7182, 2016. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/cdc/ShowkatbakhshTD16,\n author = {Mehrdad Showkatbakhsh and\nPaulo Tabuada and\nSuhas N. Diggavi},\n bibsource = {dblp computer science bibliography, http://dblp.org},\n biburl = {http://dblp.uni-trier.de/rec/bib/conf/cdc/ShowkatbakhshTD16},\n booktitle = {55th {IEEE} Conference on Decision and Control, CDC 2016, Las Vegas,\nNV, USA, December 12-14, 2016},\n crossref = {DBLP:conf/cdc/2016},\n doi = {10.1109/CDC.2016.7799376},\n file = {:papers:mehrdad_cdc16.pdf},\n pages = {7177--7182},\n tags = {conf,IT,SecureCPS},\n timestamp = {Tue, 03 Jan 2017 15:16:45 +0100},\n title = {System identification in the presence of adversarial outputs},\n type = {4},\n year = {2016}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n W. C. Wang; Y. Yona; S. Diggavi; and P. Gupta.\n\n\n \n \n \n \n LEDPUF: Stability-guaranteed physical unclonable functions through locally enhanced defectivity.\n \n \n \n\n\n \n\n\n\n In 2016 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), pages 25-30, May 2016. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@inproceedings{HOST2016,\n author = {W. C. Wang and Y. Yona and S. Diggavi and P. Gupta},\n booktitle = {2016 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)},\n doi = {10.1109/HST.2016.7495551},\n file = {:papers:ledpuf.pdf},\n keywords = {Entropy;Hardware;Noise measurement;Semiconductor device measurement;Shape;Silicon;Temperature measurement},\n month = {May},\n pages = {25-30},\n tags = {conf,IT,Hardware},\n title = {LEDPUF: Stability-guaranteed physical unclonable functions through locally enhanced defectivity},\n type = {4},\n year = {2016}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n J. Sebastian; C. Karakus; and S. N. Diggavi.\n\n\n \n \n \n \n Approximately achieving the feedback interference channel capacity with point-to-point codes.\n \n \n \n\n\n \n\n\n\n In 2016 IEEE International Symposium on Information Theory (ISIT), pages 715-719, July 2016. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{Joyson_AF_isit,\n author = {Sebastian, J. and Karakus, C. and Diggavi, S. N.},\n booktitle = {2016 IEEE International Symposium on Information Theory (ISIT)},\n file = {:papers:isit16_ic_p2p.pdf},\n month = {July},\n pages = {715-719},\n tags = {conf,WiIntMgmt,IT,WiNet,Noncoherent},\n title = {Approximately achieving the feedback interference channel capacity with point-to-point codes},\n type = {4},\n year = {2016}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n Nikhil Karamchandani; Suhas Diggavi; Giuseppe Caire; and Shlomo Shamai.\n\n\n \n \n \n \n Rate and delay for coded caching with carrier aggregation.\n \n \n \n\n\n \n\n\n\n In 2016 IEEE International Symposium on Information Theory (ISIT), pages 2724–2728, 2016. IEEE\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{karamchandani2016rate,\n author = {Karamchandani, Nikhil and Diggavi, Suhas and Caire, Giuseppe and Shamai, Shlomo},\n booktitle = {2016 IEEE International Symposium on Information Theory (ISIT)},\n organization = {IEEE},\n pages = {2724--2728},\n tags = {conf,CCWN},\n title = {Rate and delay for coded caching with carrier aggregation},\n type = {4},\n year = {2016}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n\n\n\n
\n
\n\n
\n
\n  \n 2015\n \n \n (3)\n \n \n
\n
\n \n \n
\n
\n  \n 2\n \n \n (6)\n \n \n
\n
\n \n \n
\n \n\n \n \n László Czap; Christina Fragouli; Vinod M Prabhakaran; and Suhas Diggavi.\n\n\n \n \n \n \n Secure network coding with erasures and feedback.\n \n \n \n\n\n \n\n\n\n IEEE Transactions on Information Theory, 61(4): 1667–1686. 2015.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{czap2015secure,\n author = {Czap, L{\\'a}szl{\\'o} and Fragouli, Christina and Prabhakaran, Vinod M and Diggavi, Suhas},\n journal = {IEEE Transactions on Information Theory},\n number = {4},\n pages = {1667--1686},\n publisher = {IEEE},\n tags = {journal,IT,WNS},\n title = {Secure network coding with erasures and feedback},\n type = {2},\n doi = {http://dx.doi.org/10.1109/TIT.2015.2402272},\n volume = {61},\n year = {2015}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n Christina Fragouli; Vinod M. Prabhakaran; László Czap; and Suhas N. Diggavi.\n\n\n \n \n \n \n Wireless Network Security: Building on Erasures.\n \n \n \n\n\n \n\n\n\n Proceedings of the IEEE, 103(10): 1826–1840. 2015.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/pieee/FragouliPCD15,\n author = {Christina Fragouli and\nVinod M. Prabhakaran and\nL{\\'{a}}szl{\\'{o}} Czap and\nSuhas N. Diggavi},\n bibsource = {dblp computer science bibliography, http://dblp.org},\n biburl = {http://dblp.uni-trier.de/rec/bib/journals/pieee/FragouliPCD15},\n file = {:papers:winetsec_boe.pdf},\n journal = {Proceedings of the IEEE},\n number = {10},\n pages = {1826--1840},\n tags = {journal,WiNetSec,IT},\n timestamp = {Tue, 22 Sep 2015 10:37:29 +0200},\n title = {Wireless Network Security: Building on Erasures},\n type = {2},\n doi = {http://dx.doi.org/10.1109/JPROC.2015.2438312},\n volume = {103},\n year = {2015}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n László Czap; Vinod M. Prabhakaran; Christina Fragouli; and Suhas N. Diggavi.\n\n\n \n \n \n \n \n Secret Communication Over Broadcast Erasure Channels With State-Feedback.\n \n \n \n \n\n\n \n\n\n\n IEEE Transactions on Information Theory, 61(9): 4788–4808. 2015.\n \n\n\n\n
\n\n\n\n \n \n \"Secret arxiv\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/tit/CzapPFD15,\n abstract = {We consider a 1-to-K communication scenario, where a source transmits private messages to K receivers through a broadcast erasure channel, and the receivers feed back strictly causally and publicly their channel states after each transmission. We explore the achievable rate region when we require that the message to each receiver remains secret - in the information theoretical sense - from all the other receivers. We characterize the capacity of secure communication in all the cases where the capacity of the 1-to-K communication scenario without the requirement of security is known. As a special case, we characterize the secret-message capacity of a single receiver point-to-point erasure channel with public state-feedback in the presence of a passive eavesdropper. \nWe find that in all cases where we have an exact characterization, we can achieve the capacity by using linear complexity two-phase schemes: in the first phase we create appropriate secret keys, and in the second phase we use them to encrypt each message. We find that the amount of key we need is smaller than the size of the message, and equal to the amount of encrypted message the potential eavesdroppers jointly collect. Moreover, we prove that a dishonest receiver that provides deceptive feedback cannot diminish the rate experienced by the honest receivers. \nWe also develop a converse proof which reflects the two-phase structure of our achievability scheme. As a side result, our technique leads to a new outer bound proof for the non-secure communication problem.},\n author = {L{\\'{a}}szl{\\'{o}} Czap and\nVinod M. Prabhakaran and\nChristina Fragouli and\nSuhas N. Diggavi},\n bibsource = {dblp computer science bibliography, http://dblp.org},\n biburl = {http://dblp.uni-trier.de/rec/bib/journals/tit/CzapPFD15},\n doi = {10.1109/TIT.2015.2449838},\n file = {:papers:SecretCom_Czap.pdf},\n journal = {IEEE Transactions on Information Theory},\n number = {9},\n pages = {4788--4808},\n tags = {journal,WiNetSec,IT},\n timestamp = {Thu, 20 Aug 2015 14:54:38 +0200},\n title = {Secret Communication Over Broadcast Erasure Channels With State-Feedback},\n type = {2},\n url_arxiv = {https://arxiv.org/abs/1408.1800},\n volume = {61},\n year = {2015}\n}\n\n
\n
\n\n\n
\n We consider a 1-to-K communication scenario, where a source transmits private messages to K receivers through a broadcast erasure channel, and the receivers feed back strictly causally and publicly their channel states after each transmission. We explore the achievable rate region when we require that the message to each receiver remains secret - in the information theoretical sense - from all the other receivers. We characterize the capacity of secure communication in all the cases where the capacity of the 1-to-K communication scenario without the requirement of security is known. As a special case, we characterize the secret-message capacity of a single receiver point-to-point erasure channel with public state-feedback in the presence of a passive eavesdropper. We find that in all cases where we have an exact characterization, we can achieve the capacity by using linear complexity two-phase schemes: in the first phase we create appropriate secret keys, and in the second phase we use them to encrypt each message. We find that the amount of key we need is smaller than the size of the message, and equal to the amount of encrypted message the potential eavesdroppers jointly collect. Moreover, we prove that a dishonest receiver that provides deceptive feedback cannot diminish the rate experienced by the honest receivers. We also develop a converse proof which reflects the two-phase structure of our achievability scheme. As a side result, our technique leads to a new outer bound proof for the non-secure communication problem.\n
\n\n\n
\n\n\n
\n \n\n \n \n Can Karakus; I-Hsiang Wang; and Suhas N. Diggavi.\n\n\n \n \n \n \n \n Gaussian Interference Channel With Intermittent Feedback.\n \n \n \n \n\n\n \n\n\n\n IEEE Transactions on Information Theory, 61(9): 4663–4699. 2015.\n \n\n\n\n
\n\n\n\n \n \n \"Gaussian arxiv\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/tit/KarakusWD15,\n abstract = {We investigate how to exploit intermittent feedback for interference management by studying the two-user Gaussian interference channel (IC). We approximately characterize (within a universal constant) the capacity region for the Gaussian IC with intermittent feedback. We exactly characterize the the capacity region of the linear deterministic version of the problem, which gives us insight into the Gaussian problem. We find that the characterization only depends on the forward channel parameters and the marginal probability distribution of each feedback link. The result shows that passive and unreliable feedback can be harnessed to provide multiplicative capacity gain in Gaussian interference channels. We find that when the feedback links are active with sufficiently large probabilities, the perfect feedback sum-capacity is achieved to within a constant gap. In contrast to other schemes developed for interference channel with feedback, our achievable scheme makes use of quantize-map-and-forward to relay the information obtained through feedback, performs forward decoding, and does not use structured codes. We also develop new outer bounds enabling us to obtain the (approximate) characterization of the capacity region.},\n author = {Can Karakus and\nI-Hsiang Wang and\nSuhas N. Diggavi},\n bibsource = {dblp computer science bibliography, http://dblp.org},\n biburl = {http://dblp.uni-trier.de/rec/bib/journals/tit/KarakusWD15},\n doi = {10.1109/TIT.2015.2452915},\n file = {:papers:kwd_it15.pdf},\n journal = {IEEE Transactions on Information Theory},\n number = {9},\n pages = {4663--4699},\n tags = {journal,WiIntMgmt,IT,WiNet,WNIF},\n timestamp = {Thu, 20 Aug 2015 14:54:38 +0200},\n title = {Gaussian Interference Channel With Intermittent Feedback},\n type = {2},\n url_arxiv = {https://arxiv.org/abs/1408.4590},\n volume = {61},\n year = {2015}\n}\n\n
\n
\n\n\n
\n We investigate how to exploit intermittent feedback for interference management by studying the two-user Gaussian interference channel (IC). We approximately characterize (within a universal constant) the capacity region for the Gaussian IC with intermittent feedback. We exactly characterize the the capacity region of the linear deterministic version of the problem, which gives us insight into the Gaussian problem. We find that the characterization only depends on the forward channel parameters and the marginal probability distribution of each feedback link. The result shows that passive and unreliable feedback can be harnessed to provide multiplicative capacity gain in Gaussian interference channels. We find that when the feedback links are active with sufficiently large probabilities, the perfect feedback sum-capacity is achieved to within a constant gap. In contrast to other schemes developed for interference channel with feedback, our achievable scheme makes use of quantize-map-and-forward to relay the information obtained through feedback, performs forward decoding, and does not use structured codes. We also develop new outer bounds enabling us to obtain the (approximate) characterization of the capacity region.\n
\n\n\n
\n\n\n
\n \n\n \n \n Ritesh Kolte; Ayfer Özgür; and Suhas N. Diggavi.\n\n\n \n \n \n \n \n When Are Dynamic Relaying Strategies Necessary in Half-Duplex Wireless Networks?.\n \n \n \n \n\n\n \n\n\n\n IEEE Transactions on Information Theory, 61(4): 1720–1738. 2015.\n \n\n\n\n
\n\n\n\n \n \n \"When arxiv\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/tit/KolteOD15,\n abstract = {We study a simple question: when are dynamic relaying strategies essential in optimizing the diversity-multiplexing tradeoff (DMT) in half-duplex wireless relay networks? This is motivated by apparently two contrasting results even for a simple 3 node network, with a single half-duplex relay. When all channels are assumed to be i.i.d. fading, a static schedule where the relay listens half the time and transmits half the time combined with quantize-map-forward (QMF) relaying is known to achieve the full-duplex performance. However, when there is no direct link between source and destination, a dynamic-decode-forward (DDF) strategy is needed to achieve the optimal tradeoff. In this case, a static schedule is strictly suboptimal and the optimal tradeoff is significantly worse than the full-duplex performance. In this paper we study the general case when the direct link is neither as strong as the other links nor fully non-existent, and identify regimes where dynamic schedules are necessary and those where static schedules are enough. We identify 4 qualitatively different regimes for the single relay channel where the tradeoff between diversity and multiplexing is significantly different. We show that in all these regimes one of the above two strategies is sufficient to achieve the optimal tradeoff by developing a new upper bound on the best achievable tradeoff under channel state information available only at the receivers. A natural next question is whether these two strategies are sufficient to achieve the DMT of more general half-duplex wireless networks. We propose a generalization of the two existing schemes through a dynamic QMF (DQMF) strategy, where the relay listens for a fraction of time depending on received CSI but not long enough to be able to decode. We show that such a DQMF strategy is needed to achieve the optimal DMT in a parallel channel with two relays.},\n author = {Ritesh Kolte and\nAyfer {\\"{O}}zg{\\"{u}}r and\nSuhas N. Diggavi},\n bibsource = {dblp computer science bibliography, http://dblp.org},\n biburl = {http://dblp.uni-trier.de/rec/bib/journals/tit/KolteOD15},\n doi = {10.1109/TIT.2015.2402163},\n file = {:papers:KolteAD_IT15.pdf},\n journal = {IEEE Transactions on Information Theory},\n number = {4},\n pages = {1720--1738},\n tags = {journal,IT,WiNet},\n timestamp = {Thu, 20 Aug 2015 14:54:38 +0200},\n title = {When Are Dynamic Relaying Strategies Necessary in Half-Duplex Wireless Networks?},\n type = {2},\n url_arxiv = {https://arxiv.org/abs/1405.1782},\n volume = {61},\n year = {2015}\n}\n\n
\n
\n\n\n
\n We study a simple question: when are dynamic relaying strategies essential in optimizing the diversity-multiplexing tradeoff (DMT) in half-duplex wireless relay networks? This is motivated by apparently two contrasting results even for a simple 3 node network, with a single half-duplex relay. When all channels are assumed to be i.i.d. fading, a static schedule where the relay listens half the time and transmits half the time combined with quantize-map-forward (QMF) relaying is known to achieve the full-duplex performance. However, when there is no direct link between source and destination, a dynamic-decode-forward (DDF) strategy is needed to achieve the optimal tradeoff. In this case, a static schedule is strictly suboptimal and the optimal tradeoff is significantly worse than the full-duplex performance. In this paper we study the general case when the direct link is neither as strong as the other links nor fully non-existent, and identify regimes where dynamic schedules are necessary and those where static schedules are enough. We identify 4 qualitatively different regimes for the single relay channel where the tradeoff between diversity and multiplexing is significantly different. We show that in all these regimes one of the above two strategies is sufficient to achieve the optimal tradeoff by developing a new upper bound on the best achievable tradeoff under channel state information available only at the receivers. A natural next question is whether these two strategies are sufficient to achieve the DMT of more general half-duplex wireless networks. We propose a generalization of the two existing schemes through a dynamic QMF (DQMF) strategy, where the relay listens for a fraction of time depending on received CSI but not long enough to be able to decode. We show that such a DQMF strategy is needed to achieve the optimal DMT in a parallel channel with two relays.\n
\n\n\n
\n\n\n
\n \n\n \n \n Ritesh Kolte; Ayfer Özgür; and Suhas Diggavi.\n\n\n \n \n \n \n When are dynamic relaying strategies necessary in half-duplex wireless networks?.\n \n \n \n\n\n \n\n\n\n IEEE Transactions on Information Theory, 61(4): 1720–1738. 2015.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{kolte2015dynamic,\n author = {Kolte, Ritesh and {\\"O}zg{\\"u}r, Ayfer and Diggavi, Suhas},\n journal = {IEEE Transactions on Information Theory},\n number = {4},\n pages = {1720--1738},\n publisher = {IEEE},\n tags = {journal,WiNet,WNIF},\n title = {When are dynamic relaying strategies necessary in half-duplex wireless networks?},\n type = {2},\n volume = {61},\n year = {2015}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 4\n \n \n (10)\n \n \n
\n
\n \n \n
\n \n\n \n \n J. Hachem; N. Karamchandani; and S. Diggavi.\n\n\n \n \n \n \n \n Content caching and delivery over heterogeneous wireless networks.\n \n \n \n \n\n\n \n\n\n\n In Computer Communications (INFOCOM), 2015 IEEE Conference on, pages 756-764, April 2015. \n \n\n\n\n
\n\n\n\n \n \n \"Content arxiv\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{7218445,\n abstract = {Emerging heterogeneous wireless architectures consist of a dense deployment of local-coverage wireless access points (APs) with high data rates, along with sparsely-distributed, large-coverage macro-cell base stations (BS). We design a coded caching-and-delivery scheme for such architectures that equips APs with storage, enabling content pre-fetching prior to knowing user demands. Users requesting content are served by connecting to local APs with cached content, as well as by listening to a BS broadcast transmission. For any given content popularity profile, the goal is to design the caching-and-delivery scheme so as to optimally trade off the transmission cost at the BS against the storage cost at the APs and the user cost of connecting to multiple APs. We design a coded caching scheme for non-uniform content popularity that dynamically allocates user access to APs based on requested content. We demonstrate the approximate optimality of our scheme with respect to information-theoretic bounds. We numerically evaluate it on a YouTube dataset and quantify the trade-off between transmission rate, storage, and access cost. Our numerical results also suggest the intriguing possibility that, to gain most of the benefits of coded caching, it suffices to divide the content into a small number of popularity classes.},\n author = {Hachem, J. and Karamchandani, N. and Diggavi, S.},\n booktitle = {Computer Communications (INFOCOM), 2015 IEEE Conference on},\n month = {April},\n pages = {756-764},\n tags = {conf,Caching,IT,WiNet},\n title = {Content caching and delivery over heterogeneous wireless networks},\n type = {4},\n url_arxiv = {http://arxiv.org/abs/1404.6560},\n year = {2015}\n}\n\n
\n
\n\n\n
\n Emerging heterogeneous wireless architectures consist of a dense deployment of local-coverage wireless access points (APs) with high data rates, along with sparsely-distributed, large-coverage macro-cell base stations (BS). We design a coded caching-and-delivery scheme for such architectures that equips APs with storage, enabling content pre-fetching prior to knowing user demands. Users requesting content are served by connecting to local APs with cached content, as well as by listening to a BS broadcast transmission. For any given content popularity profile, the goal is to design the caching-and-delivery scheme so as to optimally trade off the transmission cost at the BS against the storage cost at the APs and the user cost of connecting to multiple APs. We design a coded caching scheme for non-uniform content popularity that dynamically allocates user access to APs based on requested content. We demonstrate the approximate optimality of our scheme with respect to information-theoretic bounds. We numerically evaluate it on a YouTube dataset and quantify the trade-off between transmission rate, storage, and access cost. Our numerical results also suggest the intriguing possibility that, to gain most of the benefits of coded caching, it suffices to divide the content into a small number of popularity classes.\n
\n\n\n
\n\n\n
\n \n\n \n \n J. Hachem; N. Karamchandani; and S. Diggavi.\n\n\n \n \n \n \n \n Effect of number of users in multi-level coded caching.\n \n \n \n \n\n\n \n\n\n\n In Information Theory (ISIT), 2015 IEEE International Symposium on, pages 1701-1705, June 2015. \n \n\n\n\n
\n\n\n\n \n \n \"Effect arxiv\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{7282746,\n abstract = {It has been recently established that joint design of content delivery and storage (coded caching) can significantly improve performance over conventional caching. This has also been extended to the case when content has non-uniform popularity through several models. In this paper we focus on a multi-level popularity model, where content is divided into levels based on popularity. We consider two extreme cases of user distribution across caches for the multi-level popularity model: a single user per cache (single-user setup) versus a large number of users per cache (multi-user setup). When the capacity approximation is universal (independent of number of popularity levels as well as number of users, files and caches), we demonstrate a dichotomy in the order-optimal strategies for these two extreme cases. In the multi-user case, sharing memory among the levels is order-optimal, whereas for the single-user case clustering popularity levels and allocating all the memory to them is the order-optimal scheme. In proving these results, we develop new information-theoretic lower bounds for the problem.},\n author = {Hachem, J. and Karamchandani, N. and Diggavi, S.},\n booktitle = {Information Theory (ISIT), 2015 IEEE International Symposium on},\n month = {June},\n pages = {1701-1705},\n tags = {conf,Caching,IT,WiNet},\n title = {Effect of number of users in multi-level coded caching},\n type = {4},\n url_arxiv = {http://arxiv.org/abs/1504.05931},\n year = {2015}\n}\n\n
\n
\n\n\n
\n It has been recently established that joint design of content delivery and storage (coded caching) can significantly improve performance over conventional caching. This has also been extended to the case when content has non-uniform popularity through several models. In this paper we focus on a multi-level popularity model, where content is divided into levels based on popularity. We consider two extreme cases of user distribution across caches for the multi-level popularity model: a single user per cache (single-user setup) versus a large number of users per cache (multi-user setup). When the capacity approximation is universal (independent of number of popularity levels as well as number of users, files and caches), we demonstrate a dichotomy in the order-optimal strategies for these two extreme cases. In the multi-user case, sharing memory among the levels is order-optimal, whereas for the single-user case clustering popularity levels and allocating all the memory to them is the order-optimal scheme. In proving these results, we develop new information-theoretic lower bounds for the problem.\n
\n\n\n
\n\n\n
\n \n\n \n \n S. Mishra; Y. Shoukry; N. Karamchandani; S. Diggavi; and P. Tabuada.\n\n\n \n \n \n \n Secure state estimation: Optimal guarantees against sensor attacks in the presence of noise.\n \n \n \n\n\n \n\n\n\n In Information Theory (ISIT), 2015 IEEE International Symposium on, pages 2929-2933, June 2015. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{7282993,\n author = {Mishra, S. and Shoukry, Y. and Karamchandani, N. and Diggavi, S. and Tabuada, P.},\n booktitle = {Information Theory (ISIT), 2015 IEEE International Symposium on},\n file = {:papers:sse_mskdt.pdf},\n month = {June},\n pages = {2929-2933},\n tags = {conf,IT,SecureCPS},\n title = {Secure state estimation: Optimal guarantees against sensor attacks in the presence of noise},\n type = {4},\n year = {2015}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n Jingwen Bai; Suhas N. Diggavi; and Ashutosh Sabharwal.\n\n\n \n \n \n \n On degrees-of-freedom of multi-user MIMO full-duplex network.\n \n \n \n\n\n \n\n\n\n In IEEE International Symposium on Information Theory, ISIT 2015, Hong Kong, China, June 14-19, 2015, pages 864–868, 2015. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/isit/BaiDS15,\n author = {Jingwen Bai and\nSuhas N. Diggavi and\nAshutosh Sabharwal},\n bibsource = {dblp computer science bibliography, http://dblp.org},\n biburl = {http://dblp.uni-trier.de/rec/bib/conf/isit/BaiDS15},\n booktitle = {IEEE International Symposium on Information Theory, ISIT 2015,\nHong Kong, China, June 14-19, 2015},\n crossref = {DBLP:conf/isit/2015},\n doi = {10.1109/ISIT.2015.7282578},\n file = {:papers:bds_fd.pdf},\n pages = {864--868},\n tags = {conf,WiIntMgmt,IT,WiNet},\n timestamp = {Mon, 12 Oct 2015 09:21:34 +0200},\n title = {On degrees-of-freedom of multi-user MIMO full-duplex network},\n type = {4},\n year = {2015}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n Can Karakus; and Suhas N. Diggavi.\n\n\n \n \n \n \n Opportunistic scheduling for full-duplex uplink-downlink networks.\n \n \n \n\n\n \n\n\n\n In IEEE International Symposium on Information Theory, ISIT 2015, Hong Kong, China, June 14-19, 2015, pages 1019–1023, 2015. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/isit/KarakusD15,\n author = {Can Karakus and\nSuhas N. Diggavi},\n bibsource = {dblp computer science bibliography, http://dblp.org},\n biburl = {http://dblp.uni-trier.de/rec/bib/conf/isit/KarakusD15},\n booktitle = {IEEE International Symposium on Information Theory, ISIT 2015,\nHong Kong, China, June 14-19, 2015},\n crossref = {DBLP:conf/isit/2015},\n doi = {10.1109/ISIT.2015.7282609},\n file = {:papers:isit15_fd_kd.pdf},\n pages = {1019--1023},\n tags = {conf,WiIntMgmt,IT,WiNet},\n timestamp = {Mon, 12 Oct 2015 09:21:34 +0200},\n title = {Opportunistic scheduling for full-duplex uplink-downlink networks},\n type = {4},\n year = {2015}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n Manoj Mishra; Bikash Kumar Dey; Vinod M. Prabhakaran; and Suhas N. Diggavi.\n\n\n \n \n \n \n \n On the oblivious transfer capacity of the degraded wiretapped binary erasure channel.\n \n \n \n \n\n\n \n\n\n\n In IEEE International Symposium on Information Theory, ISIT 2015, Hong Kong, China, June 14-19, 2015, pages 1169–1173, 2015. \n \n\n\n\n
\n\n\n\n \n \n \"On arxiv\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/isit/MishraDPD15,\n abstract = {We study oblivious transfer (OT) between Alice and Bob in the presence of an eavesdropper Eve over a degraded wiretapped binary erasure channel from Alice to Bob and Eve. In addition to the privacy goals of oblivious transfer between Alice and Bob, we require privacy of Alice and Bob's private data from Eve. In previous work we derived the OT capacity (in the honest-but-curious model) of the wiretapped binary independent erasure channel where the erasure processes of Bob and Eve are independent. Here we derive a lower bound on the OT capacity in the same secrecy model when the wiretapped binary erasure channel is degraded in favour of Bob.},\n author = {Manoj Mishra and\nBikash Kumar Dey and\nVinod M. Prabhakaran and\nSuhas N. Diggavi},\n bibsource = {dblp computer science bibliography, http://dblp.org},\n biburl = {http://dblp.uni-trier.de/rec/bib/conf/isit/MishraDPD15},\n booktitle = {IEEE International Symposium on Information Theory, ISIT 2015,\nHong Kong, China, June 14-19, 2015},\n crossref = {DBLP:conf/isit/2015},\n doi = {10.1109/ISIT.2015.7282639},\n file = {:papers:isit15_mdpd.pdf},\n pages = {1169--1173},\n tags = {conf,IT},\n timestamp = {Mon, 12 Oct 2015 09:21:34 +0200},\n title = {On the oblivious transfer capacity of the degraded wiretapped binary erasure channel},\n type = {4},\n url_arxiv = {https://arxiv.org/abs/1504.04499},\n year = {2015}\n}\n\n
\n
\n\n\n
\n We study oblivious transfer (OT) between Alice and Bob in the presence of an eavesdropper Eve over a degraded wiretapped binary erasure channel from Alice to Bob and Eve. In addition to the privacy goals of oblivious transfer between Alice and Bob, we require privacy of Alice and Bob's private data from Eve. In previous work we derived the OT capacity (in the honest-but-curious model) of the wiretapped binary independent erasure channel where the erasure processes of Bob and Eve are independent. Here we derive a lower bound on the OT capacity in the same secrecy model when the wiretapped binary erasure channel is degraded in favour of Bob.\n
\n\n\n
\n\n\n
\n \n\n \n \n Chao Tian; Jun Chen; Suhas N. Diggavi; and Shlomo Shamai.\n\n\n \n \n \n \n \n Matched multiuser Gaussian source-channel communications via uncoded schemes.\n \n \n \n \n\n\n \n\n\n\n In IEEE International Symposium on Information Theory, ISIT 2015, Hong Kong, China, June 14-19, 2015, pages 476–480, 2015. \n \n\n\n\n
\n\n\n\n \n \n \"Matched arxiv\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/isit/TianCDS15,\n abstract = {We investigate whether uncoded schemes are optimal for Gaussian sources on multiuser Gaussian channels. Particularly, we consider two problems: the first is to send correlated Gaussian sources on a Gaussian broadcast channel where each receiver is interested in reconstructing only one source component (or one specific linear function of the sources) under the mean squared error distortion measure; the second is to send correlated Gaussian sources on a Gaussian multiple-access channel, where each transmitter observes a noisy combination of the source, and the receiver wishes to reconstruct the individual source components (or individual linear functions) under the mean squared error distortion measure. It is shown that when the channel parameters match certain general conditions, the induced distortion tuples are on the boundary of the achievable distortion region, and thus optimal. Instead of following the conventional approach of attempting to characterize the achievable distortion region, we ask the question whether and how a match can be effectively determined. This decision problem formulation helps to circumvent the difficult optimization problem often embedded in region characterization problems, and it also leads us to focus on the critical conditions in the outer bounds that make the inequalities become equalities, which effectively decouple the overall problem into several simpler sub-problems. Optimality results previously unknown in the literature are obtained using this novel approach. As a byproduct of the investigation, novel outer bounds are derived for these two problems.},\n author = {Chao Tian and\nJun Chen and\nSuhas N. Diggavi and\nShlomo Shamai},\n bibsource = {dblp computer science bibliography, http://dblp.org},\n biburl = {http://dblp.uni-trier.de/rec/bib/conf/isit/TianCDS15},\n booktitle = {IEEE International Symposium on Information Theory, ISIT 2015,\nHong Kong, China, June 14-19, 2015},\n crossref = {DBLP:conf/isit/2015},\n doi = {10.1109/ISIT.2015.7282500},\n pages = {476--480},\n tags = {conf, IT},\n timestamp = {Mon, 12 Oct 2015 09:21:34 +0200},\n title = {Matched multiuser Gaussian source-channel communications via uncoded\nschemes},\n type = {4},\n url_arxiv = {https://arxiv.org/abs/1502.05428},\n year = {2015}\n}\n\n
\n
\n\n\n
\n We investigate whether uncoded schemes are optimal for Gaussian sources on multiuser Gaussian channels. Particularly, we consider two problems: the first is to send correlated Gaussian sources on a Gaussian broadcast channel where each receiver is interested in reconstructing only one source component (or one specific linear function of the sources) under the mean squared error distortion measure; the second is to send correlated Gaussian sources on a Gaussian multiple-access channel, where each transmitter observes a noisy combination of the source, and the receiver wishes to reconstruct the individual source components (or individual linear functions) under the mean squared error distortion measure. It is shown that when the channel parameters match certain general conditions, the induced distortion tuples are on the boundary of the achievable distortion region, and thus optimal. Instead of following the conventional approach of attempting to characterize the achievable distortion region, we ask the question whether and how a match can be effectively determined. This decision problem formulation helps to circumvent the difficult optimization problem often embedded in region characterization problems, and it also leads us to focus on the critical conditions in the outer bounds that make the inequalities become equalities, which effectively decouple the overall problem into several simpler sub-problems. Optimality results previously unknown in the literature are obtained using this novel approach. As a byproduct of the investigation, novel outer bounds are derived for these two problems.\n
\n\n\n
\n\n\n
\n \n\n \n \n Manoj Mishra; Bikash Kumar Dey; Vinod M Prabhakaran; and Suhas Diggavi.\n\n\n \n \n \n \n On the oblivious transfer capacity of the degraded wiretapped binary erasure channel.\n \n \n \n\n\n \n\n\n\n In 2015 IEEE International Symposium on Information Theory (ISIT), pages 1169–1173, 2015. IEEE\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{mishra2015oblivious,\n author = {Mishra, Manoj and Dey, Bikash Kumar and Prabhakaran, Vinod M and Diggavi, Suhas},\n booktitle = {2015 IEEE International Symposium on Information Theory (ISIT)},\n organization = {IEEE},\n pages = {1169--1173},\n tags = {conf,IT,WNS},\n title = {On the oblivious transfer capacity of the degraded wiretapped binary erasure channel},\n type = {4},\n year = {2015}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n Y. Shoukry; P. Martin; Y. Yona; S. Diggavi; and M. Srivastava.\n\n\n \n \n \n \n PyCRA: Physical Challenge-Response Authentication For Active Sensors Under Spoofing Attacks.\n \n \n \n\n\n \n\n\n\n In The 22nd ACM Conference on Computer and Communications Security (CCS 2015), pages 1004-1015, October 2015. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{PyCRA,\n author = {Shoukry, Y. and Martin, P. and Yona, Y. and Diggavi, S. and Srivastava, M.},\n booktitle = {The 22nd ACM Conference on Computer and Communications Security (CCS 2015)},\n file = {:papers:pycra.pdf},\n month = {October},\n pages = {1004-1015},\n tags = {conf,IT,SecureCPS,Hardware},\n title = {PyCRA: Physical Challenge-Response Authentication For Active Sensors Under Spoofing Attacks},\n type = {4},\n year = {2015}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n J. Sebastian; C. Karakus; S. Diggavi; and I.-H. Wang.\n\n\n \n \n \n \n Rate splitting is approximately optimal for fading gaussian interference channels.\n \n \n \n\n\n \n\n\n\n In Allerton Conference on Communication, Control and Computing, 2015, October 2015. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{sebastianKDW15,\n author = {Sebastian, J. and Karakus, C. and Diggavi, S. and Wang, I.-H.},\n booktitle = {Allerton Conference on Communication, Control and Computing, 2015},\n file = {:papers:allerton15_fading.pdf},\n month = {October},\n tags = {conf,WiIntMgmt,IT,WiNet},\n title = {Rate splitting is approximately optimal for fading gaussian interference channels},\n type = {4},\n year = {2015}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 5\n \n \n (1)\n \n \n
\n
\n \n \n
\n \n\n \n \n A Salman Avestimehr; Suhas N Diggavi; Chao Tian; and David NC Tse.\n\n\n \n \n \n \n An approximation approach to network information theory.\n \n \n \n\n\n \n\n\n\n Foundations and Trends in Communications and Information Theory, 12(1-2): 1–183. 2015.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{avestimehr2015approximation,\n author = {Avestimehr, A Salman and Diggavi, Suhas N and Tian, Chao and Tse, David NC},\n journal = {Foundations and Trends in Communications and Information Theory},\n number = {1-2},\n pages = {1--183},\n publisher = {Now Publishers Inc. Hanover, MA, USA},\n tags = {monograph,ANIT},\n title = {An approximation approach to network information theory},\n type = {5},\n volume = {12},\n year = {2015}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n\n\n\n
\n
\n\n
\n
\n  \n 2014\n \n \n (2)\n \n \n
\n
\n \n \n
\n
\n  \n 2\n \n \n (3)\n \n \n
\n
\n \n \n
\n \n\n \n \n Chao Tian; Jun Chen; S.N. Diggavi; and S. Shamai.\n\n\n \n \n \n \n \n Optimality and Approximate Optimality of Source-Channel Separation in Networks.\n \n \n \n \n\n\n \n\n\n\n Information Theory, IEEE Transactions on, 60(2): 904-918. Feb 2014.\n \n\n\n\n
\n\n\n\n \n \n \"Optimality arxiv\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n  \n \n 1 download\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{6671968,\n abstract = {We consider the source-channel separation architecture for lossy source coding in communication networks. It is shown that the separation approach is optimal in two general scenarios and is approximately optimal in a third scenario. The two scenarios for which separation is optimal complement each other: the first is when the memoryless sources at source nodes are arbitrarily correlated, each of which is to be reconstructed at possibly multiple destinations within certain distortions, but the channels in this network are synchronized, orthogonal, and memoryless point-to-point channels; the second is when the memoryless sources are mutually independent, each of which is to be reconstructed only at one destination within a certain distortion, but the channels are general, including multi-user channels, such as multiple access, broadcast, interference, and relay channels, possibly with feedback. The third scenario, for which we demonstrate approximate optimality of source-channel separation, generalizes the second scenario by allowing each source to be reconstructed at multiple destinations with different distortions. For this case, the loss from optimality using the separation approach can be upper-bounded when a difference distortion measure is taken, and in the special case of quadratic distortion measure, this leads to universal constant bounds.},\n author = {Chao Tian and Jun Chen and Diggavi, S.N. and Shamai, S.},\n doi = {10.1109/TIT.2013.2291787},\n issn = {0018-9448},\n journal = {Information Theory, IEEE Transactions on},\n month = {Feb},\n number = {2},\n pages = {904-918},\n tags = {journal,SrcChan,IT},\n title = {Optimality and Approximate Optimality of Source-Channel Separation in Networks},\n type = {2},\n url_arxiv = {http://arxiv.org/abs/1004.2648},\n volume = {60},\n year = {2014}\n}\n\n
\n
\n\n\n
\n We consider the source-channel separation architecture for lossy source coding in communication networks. It is shown that the separation approach is optimal in two general scenarios and is approximately optimal in a third scenario. The two scenarios for which separation is optimal complement each other: the first is when the memoryless sources at source nodes are arbitrarily correlated, each of which is to be reconstructed at possibly multiple destinations within certain distortions, but the channels in this network are synchronized, orthogonal, and memoryless point-to-point channels; the second is when the memoryless sources are mutually independent, each of which is to be reconstructed only at one destination within a certain distortion, but the channels are general, including multi-user channels, such as multiple access, broadcast, interference, and relay channels, possibly with feedback. The third scenario, for which we demonstrate approximate optimality of source-channel separation, generalizes the second scenario by allowing each source to be reconstructed at multiple destinations with different distortions. For this case, the loss from optimality using the separation approach can be upper-bounded when a difference distortion measure is taken, and in the special case of quadratic distortion measure, this leads to universal constant bounds.\n
\n\n\n
\n\n\n
\n \n\n \n \n H. Fawzi; P. Tabuada; and S. Diggavi.\n\n\n \n \n \n \n \n Secure Estimation and Control for Cyber-Physical Systems Under Adversarial Attacks.\n \n \n \n \n\n\n \n\n\n\n Automatic Control, IEEE Transactions on, 59(6): 1454-1467. June 2014.\n \n\n\n\n
\n\n\n\n \n \n \"Secure arxiv\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n  \n \n 1 download\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{6727407,\n abstract = {The vast majority of today's critical infrastructure is supported by numerous feedback control loops and an attack on these control loops can have disastrous consequences. This is a major concern since modern control systems are becoming large and decentralized and thus more vulnerable to attacks. This paper is concerned with the estimation and control of linear systems when some of the sensors or actuators are corrupted by an attacker. We give a new simple characterization of the maximum number of attacks that can be detected and corrected as a function of the pair (A,C) of the system and we show in particular that it is impossible to accurately reconstruct the state of a system if more than half the sensors are attacked. In addition, we show how the design of a secure local control loop can improve the resilience of the system. When the number of attacks is smaller than a threshold, we propose an efficient algorithm inspired from techniques in compressed sensing to estimate the state of the plant despite attacks. We give a theoretical characterization of the performance of this algorithm and we show on numerical simulations that the method is promising and allows to reconstruct the state accurately despite attacks. Finally, we consider the problem of designing output-feedback controllers that stabilize the system despite sensor attacks. We show that a principle of separation between estimation and control holds and that the design of resilient output feedback controllers can be reduced to the design of resilient state estimators.},\n author = {Fawzi, H. and Tabuada, P. and Diggavi, S.},\n doi = {10.1109/TAC.2014.2303233},\n issn = {0018-9286},\n journal = {Automatic Control, IEEE Transactions on},\n month = {June},\n number = {6},\n pages = {1454-1467},\n tags = {journal,SecureCPS},\n title = {Secure Estimation and Control for Cyber-Physical Systems Under Adversarial Attacks},\n type = {2},\n url_arxiv = {http://arxiv.org/abs/1205.5073},\n volume = {59},\n year = {2014}\n}\n\n
\n
\n\n\n
\n The vast majority of today's critical infrastructure is supported by numerous feedback control loops and an attack on these control loops can have disastrous consequences. This is a major concern since modern control systems are becoming large and decentralized and thus more vulnerable to attacks. This paper is concerned with the estimation and control of linear systems when some of the sensors or actuators are corrupted by an attacker. We give a new simple characterization of the maximum number of attacks that can be detected and corrected as a function of the pair (A,C) of the system and we show in particular that it is impossible to accurately reconstruct the state of a system if more than half the sensors are attacked. In addition, we show how the design of a secure local control loop can improve the resilience of the system. When the number of attacks is smaller than a threshold, we propose an efficient algorithm inspired from techniques in compressed sensing to estimate the state of the plant despite attacks. We give a theoretical characterization of the performance of this algorithm and we show on numerical simulations that the method is promising and allows to reconstruct the state accurately despite attacks. Finally, we consider the problem of designing output-feedback controllers that stabilize the system despite sensor attacks. We show that a principle of separation between estimation and control holds and that the design of resilient output feedback controllers can be reduced to the design of resilient state estimators.\n
\n\n\n
\n\n\n
\n \n\n \n \n D. Tschopp; S N. Diggavi; and M. Grossglauser.\n\n\n \n \n \n \n \n Hierarchical Routing over Dynamic Wireless Networks.\n \n \n \n \n\n\n \n\n\n\n Random Structures and Algorithms. July 2014.\n \n\n\n\n
\n\n\n\n \n \n \"Hierarchical arxiv\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n  \n \n 1 download\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{TDGj09,\n abstract = {Wireless network topologies change over time and maintaining routes requires frequent updates. Updates are\ncostly in terms of consuming throughput available for data transmission, which is precious in wireless networks.\nIn this paper, we ask whether there exist low-overhead schemes that produce near-optimal routes. We show that random geometric graphs and variants have a nice property that they\nare doubling metric spaces, with high probability. This enables us to design hierarchical routing schemes with provable performance that account for the user mobility and scale well with network size.},\n author = {D. Tschopp and S N. Diggavi and M. Grossglauser},\n file = {:papers:tdgrouting09.pdf},\n journal = {Random Structures and Algorithms},\n label = {tdg_j09},\n month = {July},\n note = {},\n pages = {},\n tags = {journal,WiNet,CSalgo,DynamWiNet,MetricEmb,WiNetRouting},\n title = {Hierarchical Routing over Dynamic Wireless Networks},\n type = {2},\n url_arxiv = {http://arxiv.org/abs/0909.2504},\n volume = {},\n year = {2014}\n}\n\n
\n
\n\n\n
\n Wireless network topologies change over time and maintaining routes requires frequent updates. Updates are costly in terms of consuming throughput available for data transmission, which is precious in wireless networks. In this paper, we ask whether there exist low-overhead schemes that produce near-optimal routes. We show that random geometric graphs and variants have a nice property that they are doubling metric spaces, with high probability. This enables us to design hierarchical routing schemes with provable performance that account for the user mobility and scale well with network size.\n
\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 4\n \n \n (8)\n \n \n
\n
\n \n \n
\n \n\n \n \n S. Brahma; M. Duarte; A Sengupta; I-Hsiang Wang; C. Fragouli; and S. Diggavi.\n\n\n \n \n \n \n QUILT: A Decode/Quantize-Interleave-Transmit approach to cooperative relaying.\n \n \n \n\n\n \n\n\n\n In INFOCOM, 2014 Proceedings IEEE, pages 2508-2516, April 2014. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{6848197,\n abstract = {Physical layer cooperation of a source with a relay can significantly boost the performance of a wireless connection. However, the best practical relaying scheme can vary depending on the relative strengths of the channels that connect the source, relay and destination. This paper proposes and evaluates QUILT, a system for physical-layer relaying that seamlessly adapts to the underlying network configuration to achieve competitive or better performance as compared to the best current approaches. QUILT combines on-demand, opportunistic use of Decode-Forward (DF) or Quantize-Map-Forward (QMF) followed by interleaving at the relay, with hybrid decoding at the destination that extracts information from received frames even if these are not decodable. We theoretically quantify how our design choices for QUILT affect the system performance. We also deploy QUILT on the WarpLab software radio platform, and show through over-the-air experiments up to 5 times FER improvement over the next best cooperative protocol.},\n author = {Brahma, S. and Duarte, M. and Sengupta, A and I-Hsiang Wang and Fragouli, C. and Diggavi, S.},\n booktitle = {INFOCOM, 2014 Proceedings IEEE},\n doi = {10.1109/INFOCOM.2014.6848197},\n file = {:papers:quilt.pdf},\n month = {April},\n pages = {2508-2516},\n tags = {conf,WiNet,WiNetInfFlow},\n title = {QUILT: A Decode/Quantize-Interleave-Transmit approach to cooperative relaying},\n type = {4},\n year = {2014}\n}\n\n
\n
\n\n\n
\n Physical layer cooperation of a source with a relay can significantly boost the performance of a wireless connection. However, the best practical relaying scheme can vary depending on the relative strengths of the channels that connect the source, relay and destination. This paper proposes and evaluates QUILT, a system for physical-layer relaying that seamlessly adapts to the underlying network configuration to achieve competitive or better performance as compared to the best current approaches. QUILT combines on-demand, opportunistic use of Decode-Forward (DF) or Quantize-Map-Forward (QMF) followed by interleaving at the relay, with hybrid decoding at the destination that extracts information from received frames even if these are not decodable. We theoretically quantify how our design choices for QUILT affect the system performance. We also deploy QUILT on the WarpLab software radio platform, and show through over-the-air experiments up to 5 times FER improvement over the next best cooperative protocol.\n
\n\n\n
\n\n\n
\n \n\n \n \n J. Hachem; N. Karamchandani; and S. Diggavi.\n\n\n \n \n \n \n \n Multi-level coded caching.\n \n \n \n \n\n\n \n\n\n\n In Information Theory (ISIT), 2014 IEEE International Symposium on, pages 56-60, June 2014. \n \n\n\n\n
\n\n\n\n \n \n \"Multi-level arxiv\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{6874794,\n abstract = {Recent work has demonstrated that, for content caching, joint design of storage and delivery can yield significant benefits over conventional caching approaches. This is based on storing content in the caches in a way that creates coded-multicast opportunities even among users with different demands. Such a coded-caching scheme has been shown to be order-optimal for a caching system with single-level content, i.e., one where all content is uniformly popular. In this work, we consider a system with content divided into multiple levels, based on varying degrees of popularity. The main contribution of this work is the derivation of an information-theoretic outer bound for the multi-level setup, and the demonstration that, under some natural regularity conditions, a memory-sharing scheme, which operates each level in isolation according to a single-level coded caching scheme, is in fact order-optimal with respect to this outer bound.},\n author = {Hachem, J. and Karamchandani, N. and Diggavi, S.},\n booktitle = {Information Theory (ISIT), 2014 IEEE International Symposium on},\n doi = {10.1109/ISIT.2014.6874794},\n month = {June},\n pages = {56-60},\n tags = {conf,Caching,IT,WiNet},\n title = {Multi-level coded caching},\n type = {4},\n url_arxiv = {http://arxiv.org/abs/1404.6563},\n year = {2014}\n}\n\n
\n
\n\n\n
\n Recent work has demonstrated that, for content caching, joint design of storage and delivery can yield significant benefits over conventional caching approaches. This is based on storing content in the caches in a way that creates coded-multicast opportunities even among users with different demands. Such a coded-caching scheme has been shown to be order-optimal for a caching system with single-level content, i.e., one where all content is uniformly popular. In this work, we consider a system with content divided into multiple levels, based on varying degrees of popularity. The main contribution of this work is the derivation of an information-theoretic outer bound for the multi-level setup, and the demonstration that, under some natural regularity conditions, a memory-sharing scheme, which operates each level in isolation according to a single-level coded caching scheme, is in fact order-optimal with respect to this outer bound.\n
\n\n\n
\n\n\n
\n \n\n \n \n S. Mishra; I-Hsiang Wang; and S. Diggavi.\n\n\n \n \n \n \n \n Harnessing bursty interference in multicarrier systems with feedback.\n \n \n \n \n\n\n \n\n\n\n In Information Theory (ISIT), 2014 IEEE International Symposium on, pages 671-675, June 2014. \n \n\n\n\n
\n\n\n\n \n \n \"Harnessing arxiv\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{6874917,\n abstract = {We study parallel symmetric 2-user interference channels when the interference is bursty and feedback is available from the respective receivers. Presence of interference in each subcarrier is modeled as a memoryless Bernoulli random state. The states across subcarriers are drawn from an arbitrary joint distribution with the same marginal probability for each subcarrier and instantiated i.i.d. over time. For the linear deterministic setup, we give a complete characterization of the capacity region. For the setup with Gaussian noise, we give outer bounds and a tight generalized degrees of freedom characterization. We propose a novel helping mechanism which enables subcarriers in very strong interference regime to help in recovering interfered signals for subcarriers in strong and weak interference regimes. Depending on the interference and burstiness regime, the inner bounds either employ the proposed helping mechanism to code across subcarriers or treat the subcarriers separately. The outer bounds demonstrate a connection to a subset entropy inequality by Madiman and Tetali [4].},\n author = {Mishra, S. and I-Hsiang Wang and Diggavi, S.},\n booktitle = {Information Theory (ISIT), 2014 IEEE International Symposium on},\n doi = {10.1109/ISIT.2014.6874917},\n month = {June},\n pages = {671-675},\n tags = {conf,WiIntMgmt,IT,WNIF},\n title = {Harnessing bursty interference in multicarrier systems with feedback},\n type = {4},\n url_arxiv = {http://arxiv.org/abs/1404.6044},\n year = {2014}\n}\n\n
\n
\n\n\n
\n We study parallel symmetric 2-user interference channels when the interference is bursty and feedback is available from the respective receivers. Presence of interference in each subcarrier is modeled as a memoryless Bernoulli random state. The states across subcarriers are drawn from an arbitrary joint distribution with the same marginal probability for each subcarrier and instantiated i.i.d. over time. For the linear deterministic setup, we give a complete characterization of the capacity region. For the setup with Gaussian noise, we give outer bounds and a tight generalized degrees of freedom characterization. We propose a novel helping mechanism which enables subcarriers in very strong interference regime to help in recovering interfered signals for subcarriers in strong and weak interference regimes. Depending on the interference and burstiness regime, the inner bounds either employ the proposed helping mechanism to code across subcarriers or treat the subcarriers separately. The outer bounds demonstrate a connection to a subset entropy inequality by Madiman and Tetali [4].\n
\n\n\n
\n\n\n
\n \n\n \n \n L. Czap; V.M. Prabhakaran; S. Diggavi; and C. Fragouli.\n\n\n \n \n \n \n Triangle network secrecy.\n \n \n \n\n\n \n\n\n\n In Information Theory (ISIT), 2014 IEEE International Symposium on, pages 781-785, June 2014. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n  \n \n 1 download\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{6874939,\n abstract = {We characterize the secret message capacity of the triangle network, that consists of a source, a relay and a destination connected through orthogonal erasure channels. A passive eavesdropper, Eve, wiretaps any one of the three channels. The source and the relay can each generate unlimited private randomness; the relay and the destination can publicly provide strictly causal channel state information. Our achievable scheme is expressed through a linear program (LP) with 11 inequalities that captures a minimal set of secret key generation methods and the use of them for message encryption. Our outer bound is expressed also through a linear program, in this case with 41 constraints, constructed from general information inequalities. We prove that the optimal value of the outer bound LP is no larger than that of the scheme LP, which implies that the solution of the achievable scheme LP is the capacity. We find that equipping the relay with private randomness increases the secrecy rate by more than 40\\% in some cases and that cut-set bounds, directly applied in the network, are not always tight. Because the derivation of the inner and outer bound are both lengthy, we describe in this paper the achievability scheme, outline the outer bound, and provide the full derivations online [1]. We also make available Matlab functions that take as input the erasure probabilities and evaluate the inner and outer bounds.},\n author = {Czap, L. and Prabhakaran, V.M. and Diggavi, S. and Fragouli, C.},\n booktitle = {Information Theory (ISIT), 2014 IEEE International Symposium on},\n doi = {10.1109/ISIT.2014.6874939},\n file = {:papers:tri_net_sec.pdf},\n month = {June},\n pages = {781-785},\n tags = {conf,WiNetSec,IT},\n title = {Triangle network secrecy},\n type = {4},\n year = {2014}\n}\n\n
\n
\n\n\n
\n We characterize the secret message capacity of the triangle network, that consists of a source, a relay and a destination connected through orthogonal erasure channels. A passive eavesdropper, Eve, wiretaps any one of the three channels. The source and the relay can each generate unlimited private randomness; the relay and the destination can publicly provide strictly causal channel state information. Our achievable scheme is expressed through a linear program (LP) with 11 inequalities that captures a minimal set of secret key generation methods and the use of them for message encryption. Our outer bound is expressed also through a linear program, in this case with 41 constraints, constructed from general information inequalities. We prove that the optimal value of the outer bound LP is no larger than that of the scheme LP, which implies that the solution of the achievable scheme LP is the capacity. We find that equipping the relay with private randomness increases the secrecy rate by more than 40% in some cases and that cut-set bounds, directly applied in the network, are not always tight. Because the derivation of the inner and outer bound are both lengthy, we describe in this paper the achievability scheme, outline the outer bound, and provide the full derivations online [1]. We also make available Matlab functions that take as input the erasure probabilities and evaluate the inner and outer bounds.\n
\n\n\n
\n\n\n
\n \n\n \n \n M. Mishra; B.K. Dey; V.M. Prabhakaran; and S. Diggavi.\n\n\n \n \n \n \n \n The oblivious transfer capacity of the wiretapped binary erasure channel.\n \n \n \n \n\n\n \n\n\n\n In Information Theory (ISIT), 2014 IEEE International Symposium on, pages 1539-1543, June 2014. \n \n\n\n\n
\n\n\n\n \n \n \"The arxiv\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{6875091,\n abstract = {We consider oblivious transfer between Alice and Bob in the presence of an eavesdropper Eve when there is a broadcast channel from Alice to Bob and Eve. In addition to the secrecy constraints of Alice and Bob, Eve should not learn the private data of Alice and Bob. When the broadcast channel consists of two independent binary erasure channels, we derive the oblivious transfer capacity for both 2-privacy (where the eavesdropper may collude with either party) and 1-privacy (where there are no collusions).},\n author = {Mishra, M. and Dey, B.K. and Prabhakaran, V.M. and Diggavi, S.},\n booktitle = {Information Theory (ISIT), 2014 IEEE International Symposium on},\n doi = {10.1109/ISIT.2014.6875091},\n month = {June},\n pages = {1539-1543},\n tags = {conf,IT,WiNetSec},\n title = {The oblivious transfer capacity of the wiretapped binary erasure channel},\n type = {4},\n url_arxiv = {http://arxiv.org/abs/1404.6614},\n year = {2014}\n}\n\n
\n
\n\n\n
\n We consider oblivious transfer between Alice and Bob in the presence of an eavesdropper Eve when there is a broadcast channel from Alice to Bob and Eve. In addition to the secrecy constraints of Alice and Bob, Eve should not learn the private data of Alice and Bob. When the broadcast channel consists of two independent binary erasure channels, we derive the oblivious transfer capacity for both 2-privacy (where the eavesdropper may collude with either party) and 1-privacy (where there are no collusions).\n
\n\n\n
\n\n\n
\n \n\n \n \n N. Karamchandani; U. Niesen; M.A Maddah-Ali; and S. Diggavi.\n\n\n \n \n \n \n \n Hierarchical coded caching.\n \n \n \n \n\n\n \n\n\n\n In Information Theory (ISIT), 2014 IEEE International Symposium on, pages 2142-2146, June 2014. \n \n\n\n\n
\n\n\n\n \n \n \"Hierarchical arxiv\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{6875212,\n abstract = {It has recently been demonstrated that for single-layer cache networks, jointly designing caching and delivery can enable significant benefits over conventional caching. This was based on strategically designing the cached content to induce coded multicasting opportunities even among users with different demands and without foreknowledge of the user demands. In this work, we extend this coded caching approach to a multi-hop hierarchical content delivery network with two layers of caches. We propose a new caching scheme that combines two basic approaches. The first approach provides coded multicasting opportunities within each layer (through decoding and forwarding); the second approach provides coded multicasting opportunities across multiple layers (through strategic forwarding without decoding). By striking the right balance between these two approaches, we show that the proposed scheme achieves the optimal communication rates to within a constant multiplicative and additive gap. We further show that there is no tension between the rates in each of the two layers up to the aforementioned gap. Thus, both layers can simultaneously operate at approximately the minimum rate.},\n author = {Karamchandani, N. and Niesen, U. and Maddah-Ali, M.A and Diggavi, S.},\n booktitle = {Information Theory (ISIT), 2014 IEEE International Symposium on},\n doi = {10.1109/ISIT.2014.6875212},\n file = {:papers:hier_caching.pdf},\n month = {June},\n pages = {2142-2146},\n tags = {conf,Caching,IT,WiNet},\n title = {Hierarchical coded caching},\n type = {4},\n url_arxiv = {http://arxiv.org/abs/1403.7007},\n year = {2014}\n}\n\n
\n
\n\n\n
\n It has recently been demonstrated that for single-layer cache networks, jointly designing caching and delivery can enable significant benefits over conventional caching. This was based on strategically designing the cached content to induce coded multicasting opportunities even among users with different demands and without foreknowledge of the user demands. In this work, we extend this coded caching approach to a multi-hop hierarchical content delivery network with two layers of caches. We propose a new caching scheme that combines two basic approaches. The first approach provides coded multicasting opportunities within each layer (through decoding and forwarding); the second approach provides coded multicasting opportunities across multiple layers (through strategic forwarding without decoding). By striking the right balance between these two approaches, we show that the proposed scheme achieves the optimal communication rates to within a constant multiplicative and additive gap. We further show that there is no tension between the rates in each of the two layers up to the aforementioned gap. Thus, both layers can simultaneously operate at approximately the minimum rate.\n
\n\n\n
\n\n\n
\n \n\n \n \n J. Chen; A. Ozgur; and S.N. Diggavi.\n\n\n \n \n \n \n Feedback through overhearing.\n \n \n \n\n\n \n\n\n\n In Annual Allerton Conference on Communication, Control, and Computing (Allerton), Sep 2014. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{chenozgur14,\n abstract = {In this paper we examine the value of feedback that comes from overhearing, without dedicated feedback resources. We focus on a simple model for this purpose: a deterministic two-hop interference channel, where feedback comes from overhearing the forward-links. A new aspect brought by this setup is the dual-role of the relay signal. While the relay signal needs to convey the source message to its corresponding destination, it can also provide a feedback signal which can potentially increase the capacity of the first hop. We derive inner and outer bounds on the sum capacity which match for a large range of the parameter values. Our results identify the parameter ranges where overhearing can provide non-negative capacity gain and can even achieve the performance with dedicated-feedback resources. The results also provide insights into which transmissions are most useful to overhear.},\n author = {Chen, J. and Ozgur, A. and Diggavi, S.N.},\n booktitle = {Annual Allerton Conference on Communication, Control, and Computing (Allerton)},\n file = {:papers:fto_cod.pdf},\n month = {Sep},\n tags = {conf,IT,WiNet,WiNetInfFlow},\n title = {Feedback through overhearing},\n type = {4},\n year = {2014}\n}\n\n
\n
\n\n\n
\n In this paper we examine the value of feedback that comes from overhearing, without dedicated feedback resources. We focus on a simple model for this purpose: a deterministic two-hop interference channel, where feedback comes from overhearing the forward-links. A new aspect brought by this setup is the dual-role of the relay signal. While the relay signal needs to convey the source message to its corresponding destination, it can also provide a feedback signal which can potentially increase the capacity of the first hop. We derive inner and outer bounds on the sum capacity which match for a large range of the parameter values. Our results identify the parameter ranges where overhearing can provide non-negative capacity gain and can even achieve the performance with dedicated-feedback resources. The results also provide insights into which transmissions are most useful to overhear.\n
\n\n\n
\n\n\n
\n \n\n \n \n M. Mishra; B. Dey; V. Prabhakaran; and S.N. Diggavi.\n\n\n \n \n \n \n On the oblivious transfer capacity region of the binary erasure broadcast channel.\n \n \n \n\n\n \n\n\n\n In IEEE Information Theory Workshop (ITW) 2014, Nov 2014. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{mishradey14,\n author = {Mishra, M. and Dey, B. and Prabhakaran, V. and Diggavi, S.N.},\n booktitle = {IEEE Information Theory Workshop (ITW) 2014},\n file = {:papers:isit14_mdpd.pdf},\n month = {Nov},\n tags = {conf,IT,WiNetSec},\n title = {On the oblivious transfer capacity region of the binary erasure broadcast channel},\n type = {4},\n year = {2014}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n\n\n\n
\n
\n\n
\n
\n  \n 2013\n \n \n (2)\n \n \n
\n
\n \n \n
\n
\n  \n 2\n \n \n (3)\n \n \n
\n
\n \n \n
\n \n\n \n \n U. Niesen; and S.N. Diggavi.\n\n\n \n \n \n \n \n The Approximate Capacity of the Gaussian n-Relay Diamond Network.\n \n \n \n \n\n\n \n\n\n\n Information Theory, IEEE Transactions on, 59(2): 845-859. Feb 2013.\n \n\n\n\n
\n\n\n\n \n \n \"The arxiv\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{6304926,\n abstract = {We consider the Gaussian “diamond” or parallel relay network, in which a source node transmits a message to a destination node with the help of N relays. Even for the symmetric setting, in which the channel gains to the relays are identical and the channel gains from the relays are identical, the capacity of this channel is unknown in general. The best known capacity approximation is up to an additive gap of order N bits and up to a multiplicative gap of order N2, with both gaps independent of the channel gains. In this paper, we approximate the capacity of the symmetric Gaussian N-relay diamond network up to an additive gap of 1.8 bits and up to a multiplicative gap of a factor 14. Both gaps are independent of the channel gains and, unlike the best previously known result, are also independent of the number of relays N in the network. Achievability is based on bursty amplify-and-forward, showing that this simple scheme is uniformly approximately optimal, both in the low-rate as well as in the high-rate regimes. The upper bound on capacity is based on a careful evaluation of the cut-set bound. We also present approximation results for the asymmetric Gaussian N-relay diamond network. In particular, we show that bursty amplify-and-forward combined with optimal relay selection achieves a rate within a factor O(log4(N)) of capacity with preconstant in the order notation independent of the channel gains.},\n author = {Niesen, U. and Diggavi, S.N.},\n doi = {10.1109/TIT.2012.2219154},\n issn = {0018-9448},\n journal = {Information Theory, IEEE Transactions on},\n month = {Feb},\n number = {2},\n pages = {845-859},\n tags = {journal,WiNet,IT,approxIT},\n title = {The Approximate Capacity of the Gaussian n-Relay Diamond Network},\n type = {2},\n url_arxiv = {http://arxiv.org/abs/1008.3813},\n volume = {59},\n year = {2013}\n}\n\n
\n
\n\n\n
\n We consider the Gaussian “diamond” or parallel relay network, in which a source node transmits a message to a destination node with the help of N relays. Even for the symmetric setting, in which the channel gains to the relays are identical and the channel gains from the relays are identical, the capacity of this channel is unknown in general. The best known capacity approximation is up to an additive gap of order N bits and up to a multiplicative gap of order N2, with both gaps independent of the channel gains. In this paper, we approximate the capacity of the symmetric Gaussian N-relay diamond network up to an additive gap of 1.8 bits and up to a multiplicative gap of a factor 14. Both gaps are independent of the channel gains and, unlike the best previously known result, are also independent of the number of relays N in the network. Achievability is based on bursty amplify-and-forward, showing that this simple scheme is uniformly approximately optimal, both in the low-rate as well as in the high-rate regimes. The upper bound on capacity is based on a careful evaluation of the cut-set bound. We also present approximation results for the asymmetric Gaussian N-relay diamond network. In particular, we show that bursty amplify-and-forward combined with optimal relay selection achieves a rate within a factor O(log4(N)) of capacity with preconstant in the order notation independent of the channel gains.\n
\n\n\n
\n\n\n
\n \n\n \n \n N. Karamchandani; U. Niesen; and S. Diggavi.\n\n\n \n \n \n \n \n Computation over Mismatched Channels.\n \n \n \n \n\n\n \n\n\n\n Selected Areas in Communications, IEEE Journal on, 31(4): 666-677. April 2013.\n \n\n\n\n
\n\n\n\n \n \n \"Computation arxiv\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{6481621,\n abstract = {We consider the problem of distributed computation of a target function over a two-user deterministic multiple-access channel. If the target and channel functions are matched (i.e., compute the same function), significant performance gains can be obtained by jointly designing the communication and computation tasks. However, in most situations there is mismatch between these two functions. In this work, we analyze the impact of this mismatch on the performance gains achievable with joint communication and computation designs over separation-based designs. We show that for most pairs of target and channel functions there is no such gain, and separation of communication and computation is optimal.},\n author = {Karamchandani, N. and Niesen, U. and Diggavi, S.},\n doi = {10.1109/JSAC.2013.130405},\n issn = {0733-8716},\n journal = {Selected Areas in Communications, IEEE Journal on},\n month = {April},\n number = {4},\n pages = {666-677},\n tags = {journal,IT},\n title = {Computation over Mismatched Channels},\n type = {2},\n url_arxiv = {http://arxiv.org/abs/1204.5059},\n volume = {31},\n year = {2013}\n}\n\n
\n
\n\n\n
\n We consider the problem of distributed computation of a target function over a two-user deterministic multiple-access channel. If the target and channel functions are matched (i.e., compute the same function), significant performance gains can be obtained by jointly designing the communication and computation tasks. However, in most situations there is mismatch between these two functions. In this work, we analyze the impact of this mismatch on the performance gains achievable with joint communication and computation designs over separation-based designs. We show that for most pairs of target and channel functions there is no such gain, and separation of communication and computation is optimal.\n
\n\n\n
\n\n\n
\n \n\n \n \n A Ozgur; and S.N. Diggavi.\n\n\n \n \n \n \n Approximately Achieving Gaussian Relay Network Capacity With Lattice-Based QMF Codes.\n \n \n \n\n\n \n\n\n\n Information Theory, IEEE Transactions on, 59(12): 8275-8294. Dec 2013.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{6587830,\n abstract = {Recently, a new relaying strategy, quantize-map-and-forward (QMF) scheme, has been demonstrated to approximately achieve (within an additive constant number of bits) the Gaussian relay network capacity, universally, i.e., for arbitrary topologies, channel gains, and SNRs. This was established using Gaussian codebooks for transmission and random mappings at the relays. In this paper, we develop structured lattice codes that implement the QMF strategy. The main result of this paper is that such structured lattice codes can approximately achieve the Gaussian relay network capacity universally, again within an additive constant. In addition, we establish a similar result for half-duplex networks, where we demonstrate that one can approximately achieve the capacity using fixed transmit-receive (TX-RX) schedules for the relays with no transmit power optimization across the different TX-RX states of the network.},\n author = {Ozgur, A and Diggavi, S.N.},\n doi = {10.1109/TIT.2013.2280167},\n file = {:papers:lattice_qmf.pdf},\n issn = {0018-9448},\n journal = {Information Theory, IEEE Transactions on},\n month = {Dec},\n number = {12},\n pages = {8275-8294},\n tags = {journal,approxIT,WiNet,IT,WiNetInfFlow},\n title = {Approximately Achieving Gaussian Relay Network Capacity With Lattice-Based QMF Codes},\n type = {2},\n volume = {59},\n year = {2013}\n}\n\n
\n
\n\n\n
\n Recently, a new relaying strategy, quantize-map-and-forward (QMF) scheme, has been demonstrated to approximately achieve (within an additive constant number of bits) the Gaussian relay network capacity, universally, i.e., for arbitrary topologies, channel gains, and SNRs. This was established using Gaussian codebooks for transmission and random mappings at the relays. In this paper, we develop structured lattice codes that implement the QMF strategy. The main result of this paper is that such structured lattice codes can approximately achieve the Gaussian relay network capacity universally, again within an additive constant. In addition, we establish a similar result for half-duplex networks, where we demonstrate that one can approximately achieve the capacity using fixed transmit-receive (TX-RX) schedules for the relays with no transmit power optimization across the different TX-RX states of the network.\n
\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 4\n \n \n (17)\n \n \n
\n
\n \n \n
\n \n\n \n \n I Safaka; C. Fragouli; K. Argyraki; and S. Diggavi.\n\n\n \n \n \n \n Exchanging pairwise secrets efficiently.\n \n \n \n\n\n \n\n\n\n In INFOCOM, 2013 Proceedings IEEE, pages 2265-2273, April 2013. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{6567030,\n abstract = {We consider the problem where a group of wireless nodes, connected to the same broadcast domain, want to create pairwise secrets, in the presence of an adversary Eve, who tries to listen in and steal these secrets. Existing solutions assume that Eve cannot perform certain computations (e.g., large-integer factorization) in useful time. We ask the question: can we solve this problem without assuming anything about Eve's computational capabilities? We propose a simple secret-agreement protocol, where the wireless nodes keep exchanging bits until they have agreed on pairwise secrets that Eve cannot reconstruct with very high probability. Our protocol relies on Eve's limited network presence (the fact that she cannot be located at an arbitrary number of points in the network at the same time), but assumes nothing about her computational capabilities. We formally show that, under standard theoretical assumptions, our protocol is information-theoretically secure (it leaks zero information to Eve about the secrets). Using a small wireless testbed of smart-phones, we provide experimental evidence that it is feasible for 5 nodes to create thousands of secret bits per second, with their secrecy being independent from the adversary's capabilities.},\n author = {Safaka, I and Fragouli, C. and Argyraki, K. and Diggavi, S.},\n booktitle = {INFOCOM, 2013 Proceedings IEEE},\n doi = {10.1109/INFCOM.2013.6567030},\n file = {:papers:exchanging_secrets.pdf},\n issn = {0743-166X},\n month = {April},\n pages = {2265-2273},\n tags = {conf,WiNetSec,IT},\n title = {Exchanging pairwise secrets efficiently},\n type = {4},\n year = {2013}\n}\n\n
\n
\n\n\n
\n We consider the problem where a group of wireless nodes, connected to the same broadcast domain, want to create pairwise secrets, in the presence of an adversary Eve, who tries to listen in and steal these secrets. Existing solutions assume that Eve cannot perform certain computations (e.g., large-integer factorization) in useful time. We ask the question: can we solve this problem without assuming anything about Eve's computational capabilities? We propose a simple secret-agreement protocol, where the wireless nodes keep exchanging bits until they have agreed on pairwise secrets that Eve cannot reconstruct with very high probability. Our protocol relies on Eve's limited network presence (the fact that she cannot be located at an arbitrary number of points in the network at the same time), but assumes nothing about her computational capabilities. We formally show that, under standard theoretical assumptions, our protocol is information-theoretically secure (it leaks zero information to Eve about the secrets). Using a small wireless testbed of smart-phones, we provide experimental evidence that it is feasible for 5 nodes to create thousands of secret bits per second, with their secrecy being independent from the adversary's capabilities.\n
\n\n\n
\n\n\n
\n \n\n \n \n L. Czap; V.M. Prabhakaran; S. Diggavi; and C. Fragouli.\n\n\n \n \n \n \n Securing broadcast against dishonest receivers.\n \n \n \n\n\n \n\n\n\n In Network Coding (NetCod), 2013 International Symposium on, pages 1-6, June 2013. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{6570819,\n abstract = {Consider a sender, Alice, who wants to transmit private messages to two receivers, Bob and Calvin, using unreliable wireless broadcast transmissions and short public feedback from Bob and Calvin. In [1], we assumed that Bob and Calvin provide honest feedback, and characterized the secure capacity region of the private messages under the requirement that Bob and Calvin do not learn each other's message. In this paper, we assume that Bob (or Calvin) may provide dishonest feedback; or even control the input message distributions, as is commonly assumed in cryptography literature. We characterize the capacity region in the case of dishonest adversaries, as well as an achievable region for the case when the adversary has complete control on the distribution of the messages. We also design polynomial time protocols for both cases, that rely on the use of coding techniques to mix and secure the private messages. As a side result, we define an extended notion of semantic security for this problem and using a similar approach to [2], we show the equivalence of different security notions.},\n author = {Czap, L. and Prabhakaran, V.M. and Diggavi, S. and Fragouli, C.},\n booktitle = {Network Coding (NetCod), 2013 International Symposium on},\n doi = {10.1109/NetCod.2013.6570819},\n file = {:papers:securing_bc.pdf},\n month = {June},\n pages = {1-6},\n tags = {conf,WiNetSec,IT},\n title = {Securing broadcast against dishonest receivers},\n type = {4},\n year = {2013}\n}\n\n
\n
\n\n\n
\n Consider a sender, Alice, who wants to transmit private messages to two receivers, Bob and Calvin, using unreliable wireless broadcast transmissions and short public feedback from Bob and Calvin. In [1], we assumed that Bob and Calvin provide honest feedback, and characterized the secure capacity region of the private messages under the requirement that Bob and Calvin do not learn each other's message. In this paper, we assume that Bob (or Calvin) may provide dishonest feedback; or even control the input message distributions, as is commonly assumed in cryptography literature. We characterize the capacity region in the case of dishonest adversaries, as well as an achievable region for the case when the adversary has complete control on the distribution of the messages. We also design polynomial time protocols for both cases, that rely on the use of coding techniques to mix and secure the private messages. As a side result, we define an extended notion of semantic security for this problem and using a similar approach to [2], we show the equivalence of different security notions.\n
\n\n\n
\n\n\n
\n \n\n \n \n I-Hsiang Wang; and S. Diggavi.\n\n\n \n \n \n \n Interference channels with bursty traffic and delayed feedback.\n \n \n \n\n\n \n\n\n\n In Signal Processing Advances in Wireless Communications (SPAWC), 2013 IEEE 14th Workshop on, pages 205-209, June 2013. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{6612041,\n abstract = {In this paper we study interference management in wireless networks with bursty user traffic. In each time slot, whether a user is on or off for transmission is governed by its own Bernoulli random state. At each transmitter, the states of activities of other users are only available via feedback. We investigate a canonical two-user bursty Gaussian interference channel (IC) with three different feedback models: (1) no feedback, (2) delayed state feedback, and (3) channel output feedback. In all three cases, we characterize the capacity region of the bursty Gaussian IC to within a bounded gap. It turns out that the near-optimal transmit strategies in the non-bursty IC suffice to establish the approximate characterization of capacity in all three cases. In other words, traffic burstiness does not change the high-SNR optimality of the schemes as long as receivers keep track of user activities. Moreover, the capacity region with delayed state feedback is within a bounded gap to that without feedback, and therefore delayed state feedback does not provide significant improvement at high SNR.},\n author = {I-Hsiang Wang and Diggavi, S.},\n booktitle = {Signal Processing Advances in Wireless Communications (SPAWC), 2013 IEEE 14th Workshop on},\n doi = {10.1109/SPAWC.2013.6612041},\n file = {:papers:bursty_ic_spawc.pdf},\n issn = {1948-3244},\n month = {June},\n pages = {205-209},\n tags = {conf,WiIntMgmt,IT,WiNet},\n title = {Interference channels with bursty traffic and delayed feedback},\n type = {4},\n year = {2013}\n}\n\n
\n
\n\n\n
\n In this paper we study interference management in wireless networks with bursty user traffic. In each time slot, whether a user is on or off for transmission is governed by its own Bernoulli random state. At each transmitter, the states of activities of other users are only available via feedback. We investigate a canonical two-user bursty Gaussian interference channel (IC) with three different feedback models: (1) no feedback, (2) delayed state feedback, and (3) channel output feedback. In all three cases, we characterize the capacity region of the bursty Gaussian IC to within a bounded gap. It turns out that the near-optimal transmit strategies in the non-bursty IC suffice to establish the approximate characterization of capacity in all three cases. In other words, traffic burstiness does not change the high-SNR optimality of the schemes as long as receivers keep track of user activities. Moreover, the capacity region with delayed state feedback is within a bounded gap to that without feedback, and therefore delayed state feedback does not provide significant improvement at high SNR.\n
\n\n\n
\n\n\n
\n \n\n \n \n I-Hsiang Wang; Changho Suh; S. Diggavi; and P. Viswanath.\n\n\n \n \n \n \n Bursty interference channel with feedback.\n \n \n \n\n\n \n\n\n\n In Information Theory Proceedings (ISIT), 2013 IEEE International Symposium on, pages 21-25, July 2013. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{6620180,\n abstract = {We explore the benefit of feedback for physical layer interference management in wireless networks without centralized upper layer control mechanisms. Lack of coordination in the upper layer could make the interference experienced in the physical layer bursty. To understand how to harness such burstiness with feedback, we investigate a two-user bursty interference channel (IC), where the presence of interference is governed by a Bernoulli random state. We completely characterize the capacity region of the symmetric two-user linear deterministic bursty IC with feedback. The proposed two-phase scheme exploits feedback either for refining the previous interfered reception or for relaying additional information to the legitimate receiver of the other user. Matching outer bounds are derived by novel techniques that take the effect of delayed state information into account. We also use insights from the deterministic case to characterize the approximate symmetric capacity for the symmetric Gaussian bursty IC with feedback in the weak interference regime.},\n author = {I-Hsiang Wang and Changho Suh and Diggavi, S. and Viswanath, P.},\n booktitle = {Information Theory Proceedings (ISIT), 2013 IEEE International Symposium on},\n doi = {10.1109/ISIT.2013.6620180},\n file = {:papers:bursty_ic.pdf},\n issn = {2157-8095},\n month = {July},\n pages = {21-25},\n tags = {conf,WiIntMgmt,IT,WiNet},\n title = {Bursty interference channel with feedback},\n type = {4},\n year = {2013}\n}\n\n
\n
\n\n\n
\n We explore the benefit of feedback for physical layer interference management in wireless networks without centralized upper layer control mechanisms. Lack of coordination in the upper layer could make the interference experienced in the physical layer bursty. To understand how to harness such burstiness with feedback, we investigate a two-user bursty interference channel (IC), where the presence of interference is governed by a Bernoulli random state. We completely characterize the capacity region of the symmetric two-user linear deterministic bursty IC with feedback. The proposed two-phase scheme exploits feedback either for refining the previous interfered reception or for relaying additional information to the legitimate receiver of the other user. Matching outer bounds are derived by novel techniques that take the effect of delayed state information into account. We also use insights from the deterministic case to characterize the approximate symmetric capacity for the symmetric Gaussian bursty IC with feedback in the weak interference regime.\n
\n\n\n
\n\n\n
\n \n\n \n \n C. Karakus; I-Hsiang Wang; and S. Diggavi.\n\n\n \n \n \n \n \n Interference channel with intermittent feedback.\n \n \n \n \n\n\n \n\n\n\n In Information Theory Proceedings (ISIT), 2013 IEEE International Symposium on, pages 26-30, July 2013. \n \n\n\n\n
\n\n\n\n \n \n \"Interference arxiv\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{6620181,\n abstract = {We investigate how to exploit intermittent feedback for interference management. Focusing on the two-user linear deterministic interference channel, we completely characterize the capacity region. We find that the characterization only depends on the forward channel parameters and the marginal probability distribution of each feedback link. The scheme we propose makes use of block Markov encoding and quantize-map-and-forward at the transmitters, and backward decoding at the receivers. Matching outer bounds are derived based on novel genie-aided techniques. As a consequence, the perfect-feedback capacity can be achieved once the two feedback links are active with large enough probabilities.},\n author = {Karakus, C. and I-Hsiang Wang and Diggavi, S.},\n booktitle = {Information Theory Proceedings (ISIT), 2013 IEEE International Symposium on},\n doi = {10.1109/ISIT.2013.6620181},\n issn = {2157-8095},\n month = {July},\n pages = {26-30},\n tags = {conf,WiIntMgmt,IT,WiNet},\n title = {Interference channel with intermittent feedback},\n type = {4},\n url_arxiv = {http://arxiv.org/abs/1305.3265},\n year = {2013}\n}\n\n
\n
\n\n\n
\n We investigate how to exploit intermittent feedback for interference management. Focusing on the two-user linear deterministic interference channel, we completely characterize the capacity region. We find that the characterization only depends on the forward channel parameters and the marginal probability distribution of each feedback link. The scheme we propose makes use of block Markov encoding and quantize-map-and-forward at the transmitters, and backward decoding at the receivers. Matching outer bounds are derived based on novel genie-aided techniques. As a consequence, the perfect-feedback capacity can be achieved once the two feedback links are active with large enough probabilities.\n
\n\n\n
\n\n\n
\n \n\n \n \n J. Hachem; I-Hsiang Wang; C. Fragouli; and S. Diggavi.\n\n\n \n \n \n \n \n Coding with encoding uncertainty.\n \n \n \n \n\n\n \n\n\n\n In Information Theory Proceedings (ISIT), 2013 IEEE International Symposium on, pages 276-280, July 2013. \n \n\n\n\n
\n\n\n\n \n \n \"Coding arxiv\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{6620231,\n abstract = {We study the channel coding problem when errors and uncertainty occur in the encoding process. For simplicity we assume the channel between the encoder and the decoder is perfect. Focusing on linear block codes, we model the encoding uncertainty as erasures on the edges in the factor graph of the encoder generator matrix. We first take a worst-case approach and find the maximum tolerable number of erasures for perfect error correction. Next, we take a probabilistic approach and derive a sufficient condition on the rate of a set of codes, such that decoding error probability vanishes as blocklength tends to infinity. In both scenarios, due to the inherent asymmetry of the problem, we derive the results from first principles, which indicates that robustness to encoding errors requires new properties of codes different from classical properties.},\n author = {Hachem, J. and I-Hsiang Wang and Fragouli, C. and Diggavi, S.},\n booktitle = {Information Theory Proceedings (ISIT), 2013 IEEE International Symposium on},\n doi = {10.1109/ISIT.2013.6620231},\n issn = {2157-8095},\n month = {July},\n pages = {276-280},\n tags = {conf,IT},\n title = {Coding with encoding uncertainty},\n type = {4},\n url_arxiv = {http://arxiv.org/abs/1305.3733},\n year = {2013}\n}\n\n
\n
\n\n\n
\n We study the channel coding problem when errors and uncertainty occur in the encoding process. For simplicity we assume the channel between the encoder and the decoder is perfect. Focusing on linear block codes, we model the encoding uncertainty as erasures on the edges in the factor graph of the encoder generator matrix. We first take a worst-case approach and find the maximum tolerable number of erasures for perfect error correction. Next, we take a probabilistic approach and derive a sufficient condition on the rate of a set of codes, such that decoding error probability vanishes as blocklength tends to infinity. In both scenarios, due to the inherent asymmetry of the problem, we derive the results from first principles, which indicates that robustness to encoding errors requires new properties of codes different from classical properties.\n
\n\n\n
\n\n\n
\n \n\n \n \n S. Mishra; I-Hsiang Wang; and S. Diggavi.\n\n\n \n \n \n \n \n Opportunistic interference management for multicarrier systems.\n \n \n \n \n\n\n \n\n\n\n In Information Theory Proceedings (ISIT), 2013 IEEE International Symposium on, pages 389-393, July 2013. \n \n\n\n\n
\n\n\n\n \n \n \"Opportunistic arxiv\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{6620254,\n abstract = {We study opportunistic interference management when there is bursty interference in parallel 2-user linear deterministic interference channels. A degraded message set communication problem is formulated to exploit the burstiness of interference in M subcarriers allocated to each user. We focus on symmetric rate requirements based on the number of interfered subcarriers rather than the exact set of interfered subcarriers. Inner bounds are obtained using erasure coding, signal-scale alignment and Han-Kobayashi coding strategy. Tight outer bounds for a variety of regimes are obtained using the El Gamal-Costa injective interference channel bounds and a sliding window subset entropy inequality [7]. The result demonstrates an application of techniques from multilevel diversity coding to interference channels. We also conjecture outer bounds indicating the sub-optimality of erasure coding across subcarriers in certain regimes.},\n author = {Mishra, S. and I-Hsiang Wang and Diggavi, S.},\n booktitle = {Information Theory Proceedings (ISIT), 2013 IEEE International Symposium on},\n doi = {10.1109/ISIT.2013.6620254},\n issn = {2157-8095},\n month = {July},\n pages = {389-393},\n tags = {conf,WiIntMgmt,IT,WiNet},\n title = {Opportunistic interference management for multicarrier systems},\n type = {4},\n url_arxiv = {http://arxiv.org/abs/1305.2985},\n year = {2013}\n}\n\n
\n
\n\n\n
\n We study opportunistic interference management when there is bursty interference in parallel 2-user linear deterministic interference channels. A degraded message set communication problem is formulated to exploit the burstiness of interference in M subcarriers allocated to each user. We focus on symmetric rate requirements based on the number of interfered subcarriers rather than the exact set of interfered subcarriers. Inner bounds are obtained using erasure coding, signal-scale alignment and Han-Kobayashi coding strategy. Tight outer bounds for a variety of regimes are obtained using the El Gamal-Costa injective interference channel bounds and a sliding window subset entropy inequality [7]. The result demonstrates an application of techniques from multilevel diversity coding to interference channels. We also conjecture outer bounds indicating the sub-optimality of erasure coding across subcarriers in certain regimes.\n
\n\n\n
\n\n\n
\n \n\n \n \n S. Mishra; C. Fragouli; V. Prabhakaran; and S. Diggavi.\n\n\n \n \n \n \n \n Using feedback for secrecy over graphs.\n \n \n \n \n\n\n \n\n\n\n In Information Theory Proceedings (ISIT), 2013 IEEE International Symposium on, pages 2399-2403, July 2013. \n \n\n\n\n
\n\n\n\n \n \n \"Using arxiv\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{6620656,\n abstract = {We study the problem of secure message multicasting over graphs in the presence of a passive (node) adversary who tries to eavesdrop in the network. We show that use of feedback, facilitated through the existence of cycles or undirected edges, enables higher rates than possible in directed acyclic graphs of the same mincut. We demonstrate this using code constructions for canonical combination networks (CCNs). We also provide general outer bounds as well as schemes for node adversaries over CCNs.},\n author = {Mishra, S. and Fragouli, C. and Prabhakaran, V. and Diggavi, S.},\n booktitle = {Information Theory Proceedings (ISIT), 2013 IEEE International Symposium on},\n doi = {10.1109/ISIT.2013.6620656},\n issn = {2157-8095},\n month = {July},\n pages = {2399-2403},\n tags = {conf,WiNetSec,IT},\n title = {Using feedback for secrecy over graphs},\n type = {4},\n url_arxiv = {http://arxiv.org/abs/1305.3051},\n year = {2013}\n}\n\n
\n
\n\n\n
\n We study the problem of secure message multicasting over graphs in the presence of a passive (node) adversary who tries to eavesdrop in the network. We show that use of feedback, facilitated through the existence of cycles or undirected edges, enables higher rates than possible in directed acyclic graphs of the same mincut. We demonstrate this using code constructions for canonical combination networks (CCNs). We also provide general outer bounds as well as schemes for node adversaries over CCNs.\n
\n\n\n
\n\n\n
\n \n\n \n \n S.S. Bidokhti; V.M. Prabhakaran; and S.N. Diggavi.\n\n\n \n \n \n \n A block Markov encoding scheme for broadcasting nested message sets.\n \n \n \n\n\n \n\n\n\n In Information Theory Proceedings (ISIT), 2013 IEEE International Symposium on, pages 2975-2979, July 2013. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{6620771,\n abstract = {Encoding schemes for broadcasting two nested message sets are studied. We start with a simple class of deterministic broadcast channels for which (variants of) linear superposition coding are optimal in several cases [1], [2]. Such schemes are sub-optimal in general, and we propose a block Markov encoding scheme which achieves (for some deterministic channels) rates not achievable by the previous schemes in [1], [2]. We adapt this block Markov encoding scheme to general broadcast channels, and show that it achieves a rate-region which includes the previously known rate-regions1.},\n author = {Bidokhti, S.S. and Prabhakaran, V.M. and Diggavi, S.N.},\n booktitle = {Information Theory Proceedings (ISIT), 2013 IEEE International Symposium on},\n doi = {10.1109/ISIT.2013.6620771},\n file = {:papers:bme_broadcast.pdf},\n issn = {2157-8095},\n month = {July},\n pages = {2975-2979},\n tags = {conf,IT},\n title = {A block Markov encoding scheme for broadcasting nested message sets},\n type = {4},\n year = {2013}\n}\n\n
\n
\n\n\n
\n Encoding schemes for broadcasting two nested message sets are studied. We start with a simple class of deterministic broadcast channels for which (variants of) linear superposition coding are optimal in several cases [1], [2]. Such schemes are sub-optimal in general, and we propose a block Markov encoding scheme which achieves (for some deterministic channels) rates not achievable by the previous schemes in [1], [2]. We adapt this block Markov encoding scheme to general broadcast channels, and show that it achieves a rate-region which includes the previously known rate-regions1.\n
\n\n\n
\n\n\n
\n \n\n \n \n L. Czap; V.M. Prabhakaran; S. Diggavi; and C. Fragouli.\n\n\n \n \n \n \n Exploiting common randomness: A resource for network secrecy.\n \n \n \n\n\n \n\n\n\n In Information Theory Workshop (ITW), 2013 IEEE, pages 1-5, Sept 2013. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{6691232,\n abstract = {We investigate the problem of secure communication in a simple network with three communicating parties, two distributed sources who communicate over orthogonal channels to one destination node. The cooperation between the sources is restricted to a rate limited common random source they both observe. The communication channels are erasure channels with strictly causal channel state information of the destination available publicly. A passive adversary is present in the system eavesdropping on any one of the channels. We design a linear scheme that ensures secrecy against the eavesdropper. By deriving an outer bound for the problem we prove that the scheme is optimal in certain special cases.},\n author = {Czap, L. and Prabhakaran, V.M. and Diggavi, S. and Fragouli, C.},\n booktitle = {Information Theory Workshop (ITW), 2013 IEEE},\n doi = {10.1109/ITW.2013.6691232},\n file = {:papers:common_randomness.pdf},\n month = {Sept},\n pages = {1-5},\n tags = {conf,WiNetSec,IT},\n title = {Exploiting common randomness: A resource for network secrecy},\n type = {4},\n year = {2013}\n}\n\n
\n
\n\n\n
\n We investigate the problem of secure communication in a simple network with three communicating parties, two distributed sources who communicate over orthogonal channels to one destination node. The cooperation between the sources is restricted to a rate limited common random source they both observe. The communication channels are erasure channels with strictly causal channel state information of the destination available publicly. A passive adversary is present in the system eavesdropping on any one of the channels. We design a linear scheme that ensures secrecy against the eavesdropper. By deriving an outer bound for the problem we prove that the scheme is optimal in certain special cases.\n
\n\n\n
\n\n\n
\n \n\n \n \n C. Karakus; I-Hsiang Wang; and S. Diggavi.\n\n\n \n \n \n \n An achievable rate region for Gaussian interference channel with intermittent feedback.\n \n \n \n\n\n \n\n\n\n In Communication, Control, and Computing (Allerton), 2013 51st Annual Allerton Conference on, pages 203-210, Oct 2013. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{6736525,\n abstract = {We consider the two-user Gaussian interference channel with intermittent channel output feedback. We derive an achievable rate region that corresponds to the capacity region of the linear deterministic version of the problem. The result shows that passive and unreliable feedback can be harnessed to provide multiplicative capacity gain in Gaussian interference channels. In contrast to other schemes developed for interference channel with feedback, our achievable scheme makes use of quantize-map-and-forward to relay the information obtained through feedback, performs forward decoding, and does not use structured codes. We find that when the feedback links are active with sufficiently large probabilities, the perfect feedback sum-capacity is achieved to within a constant gap.},\n author = {Karakus, C. and I-Hsiang Wang and Diggavi, S.},\n booktitle = {Communication, Control, and Computing (Allerton), 2013 51st Annual Allerton Conference on},\n doi = {10.1109/Allerton.2013.6736525},\n file = {:papers:ach_gicifb.pdf},\n month = {Oct},\n pages = {203-210},\n tags = {conf,WiIntMgmt,IT,WiNet,WNIF},\n title = {An achievable rate region for Gaussian interference channel with intermittent feedback},\n type = {4},\n year = {2013}\n}\n\n
\n
\n\n\n
\n We consider the two-user Gaussian interference channel with intermittent channel output feedback. We derive an achievable rate region that corresponds to the capacity region of the linear deterministic version of the problem. The result shows that passive and unreliable feedback can be harnessed to provide multiplicative capacity gain in Gaussian interference channels. In contrast to other schemes developed for interference channel with feedback, our achievable scheme makes use of quantize-map-and-forward to relay the information obtained through feedback, performs forward decoding, and does not use structured codes. We find that when the feedback links are active with sufficiently large probabilities, the perfect feedback sum-capacity is achieved to within a constant gap.\n
\n\n\n
\n\n\n
\n \n\n \n \n L. Czap; C. Fragouli; V.M. Prabhakaran; and S. Diggavi.\n\n\n \n \n \n \n Secure network coding with erasures and feedback.\n \n \n \n\n\n \n\n\n\n In Communication, Control, and Computing (Allerton), 2013 51st Annual Allerton Conference on, pages 1517-1524, Oct 2013. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{6736707,\n abstract = {Secure network coding assumes that the underlying network links are lossless, thus it can be applied over lossy networks after channel error correction. Yet it is well known that channel losses, such as packet erasures, can be constructively used for secrecy over a link. We address here the challenge of extending these results for arbitrary networks. We provide achievability schemes over erasure networks with feedback, that outperform the alternative approach of channel error correction followed by secure message transmission separation. We derive outer bounds on the securely achievable rate and as a consequence we show optimality of our proposed scheme in some special cases.},\n author = {Czap, L. and Fragouli, C. and Prabhakaran, V.M. and Diggavi, S.},\n booktitle = {Communication, Control, and Computing (Allerton), 2013 51st Annual Allerton Conference on},\n doi = {10.1109/Allerton.2013.6736707},\n file = {:papers:secure_netcod.pdf},\n month = {Oct},\n pages = {1517-1524},\n tags = {conf,WiNetSec,IT},\n title = {Secure network coding with erasures and feedback},\n type = {4},\n year = {2013}\n}\n\n
\n
\n\n\n
\n Secure network coding assumes that the underlying network links are lossless, thus it can be applied over lossy networks after channel error correction. Yet it is well known that channel losses, such as packet erasures, can be constructively used for secrecy over a link. We address here the challenge of extending these results for arbitrary networks. We provide achievability schemes over erasure networks with feedback, that outperform the alternative approach of channel error correction followed by secure message transmission separation. We derive outer bounds on the securely achievable rate and as a consequence we show optimality of our proposed scheme in some special cases.\n
\n\n\n
\n\n\n
\n \n\n \n \n A Sahai; S. Diggavi; and A Sabharwal.\n\n\n \n \n \n \n On uplink/downlink full-duplex networks.\n \n \n \n\n\n \n\n\n\n In Signals, Systems and Computers, 2013 Asilomar Conference on, pages 14-18, Nov 2013. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{6810219,\n abstract = {Recent results in wireless full-duplex promise rate gains over the half-duplex counterpart when two nodes exchange messages with each other. However, when multiple full-duplex nodes operate simultaneously, the resulting network has increased internode interference compared to the half-duplex counterpart. The increased internode interference can potentially limit the rate gain achievable due to introduction of full-duplex capability. In this paper, we present new interference management strategies tha handle internode interference for full-duplex enabled network and achieve rate gains over its half-duplex counterpart.},\n author = {Sahai, A and Diggavi, S. and Sabharwal, A},\n booktitle = {Signals, Systems and Computers, 2013 Asilomar Conference on},\n doi = {10.1109/ACSSC.2013.6810219},\n file = {:papers:asilomar_ul_dl_fd.pdf},\n month = {Nov},\n pages = {14-18},\n tags = {conf,WiIntMgmt,IT},\n title = {On uplink/downlink full-duplex networks},\n type = {4},\n year = {2013}\n}\n\n
\n
\n\n\n
\n Recent results in wireless full-duplex promise rate gains over the half-duplex counterpart when two nodes exchange messages with each other. However, when multiple full-duplex nodes operate simultaneously, the resulting network has increased internode interference compared to the half-duplex counterpart. The increased internode interference can potentially limit the rate gain achievable due to introduction of full-duplex capability. In this paper, we present new interference management strategies tha handle internode interference for full-duplex enabled network and achieve rate gains over its half-duplex counterpart.\n
\n\n\n
\n\n\n
\n \n\n \n \n Katerina Argyraki; Suhas Diggavi; Melissa Duarte; Christina Fragouli; Marios Gatzianas; and Panagiotis Kostopoulos.\n\n\n \n \n \n \n Creating secrets out of erasures.\n \n \n \n\n\n \n\n\n\n In Proceedings of the 19th annual international conference on Mobile computing & networking, pages 429–440, Sep 2013. ACM\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{argyraki2013creating,\n abstract = {Current security systems often rely on the adversary's computational limitations. Wireless networks offer the opportunity for a different, complementary kind of security, which relies on the adversary's limited network presence (i.e., that the adversary cannot be located at many different points in the network at the same time). We present a system that leverages this opportunity to enable n wireless nodes to create a shared secret S, in a way that an eavesdropper, Eve, obtains very little information on S. Our system consists of two steps: (1) The nodes transmit packets following a special pattern, such that Eve learns very little about a given fraction of the transmitted packets. This is achieved through a combination of beam forming (from many different sources) and wiretap codes. (2) The nodes participate in a protocol that reshuffles the information known to each node, such that the nodes end up sharing a secret that Eve knows very little about. Our protocol is easily implementable in existing wireless devices and scales well with the number of nodes; these properties are achieved through a combination of public feedback, broadcasting, and network coding. We evaluate our system through a 5-node testbed. We demonstrate that a group of wireless nodes can generate thousands of new shared secret bits per second, with their secrecy being independent of the adversary's computational capabilities.},\n author = {Argyraki, Katerina and Diggavi, Suhas and Duarte, Melissa and Fragouli, Christina and Gatzianas, Marios and Kostopoulos, Panagiotis},\n booktitle = {Proceedings of the 19th annual international conference on Mobile computing \\& networking},\n file = {:papers:creating_secrets.pdf},\n month = {Sep},\n organization = {ACM},\n pages = {429--440},\n tags = {conf,WiNetSec,IT},\n title = {Creating secrets out of erasures},\n type = {4},\n year = {2013}\n}\n\n
\n
\n\n\n
\n Current security systems often rely on the adversary's computational limitations. Wireless networks offer the opportunity for a different, complementary kind of security, which relies on the adversary's limited network presence (i.e., that the adversary cannot be located at many different points in the network at the same time). We present a system that leverages this opportunity to enable n wireless nodes to create a shared secret S, in a way that an eavesdropper, Eve, obtains very little information on S. Our system consists of two steps: (1) The nodes transmit packets following a special pattern, such that Eve learns very little about a given fraction of the transmitted packets. This is achieved through a combination of beam forming (from many different sources) and wiretap codes. (2) The nodes participate in a protocol that reshuffles the information known to each node, such that the nodes end up sharing a secret that Eve knows very little about. Our protocol is easily implementable in existing wireless devices and scales well with the number of nodes; these properties are achieved through a combination of public feedback, broadcasting, and network coding. We evaluate our system through a 5-node testbed. We demonstrate that a group of wireless nodes can generate thousands of new shared secret bits per second, with their secrecy being independent of the adversary's computational capabilities.\n
\n\n\n
\n\n\n
\n \n\n \n \n Melissa Duarte; Ayan Sengupta; Siddhartha Brahma; Christina Fragouli; and Suhas Diggavi.\n\n\n \n \n \n \n Quantize-map-forward (QMF) relaying: an experimental study.\n \n \n \n\n\n \n\n\n\n In Proceedings of the fourteenth ACM international symposium on Mobile ad hoc networking and computing, pages 227–236, Jul 2013. ACM\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{duarte2013quantize,\n abstract = {We present the design and experimental evaluation of a wireless system that exploits relaying in the context of WiFi. We opt for WiFi given its popularity and wide spread use for a number of applications, such as smart homes. Our testbed consists of three nodes, a source, a relay and a destination, that operate using the physical layer procedures of IEEE802.11. We deploy three main competing strategies that have been proposed for relaying, Decode-and-Forward (DF), Amplify-and-Forward (AF) and Quantize-Map-Forward (QMF). QMF is the most recently introduced of the three, and although it was shown in theory to approximately achieve the capacity of arbitrary wireless networks, its performance in practice had not been evaluated. We present in this work experimental results---to the best of our knowledge, the first ones---that compare QMF, AF and DF in a realistic indoor setting. We find that QMF is a competitive scheme to the other two, offering in some cases up to 12\\% throughput benefits and up to 60\\% improvement in frame error-rates over the next best scheme.},\n author = {Duarte, Melissa and Sengupta, Ayan and Brahma, Siddhartha and Fragouli, Christina and Diggavi, Suhas},\n booktitle = {Proceedings of the fourteenth ACM international symposium on Mobile ad hoc networking and computing},\n file = {:papers:qmf_experimental.pdf},\n month = {Jul},\n organization = {ACM},\n pages = {227--236},\n tags = {conf,WiNet,WiNetInfFlow},\n title = {Quantize-map-forward (QMF) relaying: an experimental study},\n type = {4},\n year = {2013}\n}\n\n
\n
\n\n\n
\n We present the design and experimental evaluation of a wireless system that exploits relaying in the context of WiFi. We opt for WiFi given its popularity and wide spread use for a number of applications, such as smart homes. Our testbed consists of three nodes, a source, a relay and a destination, that operate using the physical layer procedures of IEEE802.11. We deploy three main competing strategies that have been proposed for relaying, Decode-and-Forward (DF), Amplify-and-Forward (AF) and Quantize-Map-Forward (QMF). QMF is the most recently introduced of the three, and although it was shown in theory to approximately achieve the capacity of arbitrary wireless networks, its performance in practice had not been evaluated. We present in this work experimental results—to the best of our knowledge, the first ones—that compare QMF, AF and DF in a realistic indoor setting. We find that QMF is a competitive scheme to the other two, offering in some cases up to 12% throughput benefits and up to 60% improvement in frame error-rates over the next best scheme.\n
\n\n\n
\n\n\n
\n \n\n \n \n Achaleshwar Sahai; Suhas Diggavi; and Ashutosh Sabharwal.\n\n\n \n \n \n \n On degrees-of-freedom of full-duplex uplink/downlink channel.\n \n \n \n\n\n \n\n\n\n In Information Theory Workshop (ITW), 2013 IEEE, pages 1–5, Sep 2013. IEEE\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{sahai2013degrees,\n abstract = {Feasibility of full-duplex opens up the possibility of applying it to cellular networks to operate uplink and downlink simultaneously for multiple users. However, simultaneous operation of uplink and downlink poses a new challenge of intra-cell inter-node interference. In this paper, we identify scenarios where inter-node interference can be managed to provide significant gain in degrees of freedom over the conventional half-duplex cellular design.},\n author = {Sahai, Achaleshwar and Diggavi, Suhas and Sabharwal, Ashutosh},\n booktitle = {Information Theory Workshop (ITW), 2013 IEEE},\n file = {:papers:fd_ul_dl.pdf},\n month = {Sep},\n organization = {IEEE},\n pages = {1--5},\n tags = {conf,WiIntMgmt,IT,WiNet},\n title = {On degrees-of-freedom of full-duplex uplink/downlink channel},\n type = {4},\n year = {2013}\n}\n\n
\n
\n\n\n
\n Feasibility of full-duplex opens up the possibility of applying it to cellular networks to operate uplink and downlink simultaneously for multiple users. However, simultaneous operation of uplink and downlink poses a new challenge of intra-cell inter-node interference. In this paper, we identify scenarios where inter-node interference can be managed to provide significant gain in degrees of freedom over the conventional half-duplex cellular design.\n
\n\n\n
\n\n\n
\n \n\n \n \n I.-H. Wang; and S.N. Diggavi.\n\n\n \n \n \n \n Managing bursty interference with feedback.\n \n \n \n\n\n \n\n\n\n In IEEE Information Theory Workshop (ITW) 2013, Sep 2013. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{wangdiggavi13,\n author = {Wang, I.-H. and Diggavi, S.N.},\n booktitle = {IEEE Information Theory Workshop (ITW) 2013},\n month = {Sep},\n tags = {conf,IT,WiIntMgmt,WiNet},\n title = {Managing bursty interference with feedback},\n type = {4},\n year = {2013}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n\n\n\n
\n
\n\n
\n
\n  \n 2012\n \n \n (2)\n \n \n
\n
\n \n \n
\n
\n  \n 2\n \n \n (3)\n \n \n
\n
\n \n \n
\n \n\n \n \n M.J. Siavoshani; C. Fragouli; and S.N. Diggavi.\n\n\n \n \n \n \n \n Subspace Properties of Network Coding and Their Applications.\n \n \n \n \n\n\n \n\n\n\n Information Theory, IEEE Transactions on, 58(5): 2599-2619. May 2012.\n \n\n\n\n
\n\n\n\n \n \n \"Subspace arxiv\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{6142074,\n abstract = {Systems that employ network coding for content distribution convey to the receivers linear combinations of the source packets. If we assume randomized network coding, during this process, the network nodes collect random subspaces of the space spanned by the source packets. We establish several fundamental properties of the random subspaces induced in such a system and show that these subspaces implicitly carry topological information about the network and its state that can be passively collected and inferred. We leverage this information toward a number of applications that are interesting in their own right, such as topology inference, bottleneck discovery in peer-to-peer systems, and locating Byzantine attackers. We thus argue that randomized network coding, apart from its better known properties for improving information delivery rate, can additionally facilitate network management and control.},\n author = {Siavoshani, M.J. and Fragouli, C. and Diggavi, S.N.},\n doi = {10.1109/TIT.2012.2184656},\n issn = {0018-9448},\n journal = {Information Theory, IEEE Transactions on},\n month = {May},\n number = {5},\n pages = {2599-2619},\n tags = {journal,NetCod,IT},\n title = {Subspace Properties of Network Coding and Their Applications},\n type = {2},\n url_arxiv = {http://arxiv.org/abs/1106.5387},\n volume = {58},\n year = {2012}\n}\n\n
\n
\n\n\n
\n Systems that employ network coding for content distribution convey to the receivers linear combinations of the source packets. If we assume randomized network coding, during this process, the network nodes collect random subspaces of the space spanned by the source packets. We establish several fundamental properties of the random subspaces induced in such a system and show that these subspaces implicitly carry topological information about the network and its state that can be passively collected and inferred. We leverage this information toward a number of applications that are interesting in their own right, such as topology inference, bottleneck discovery in peer-to-peer systems, and locating Byzantine attackers. We thus argue that randomized network coding, apart from its better known properties for improving information delivery rate, can additionally facilitate network management and control.\n
\n\n\n
\n\n\n
\n \n\n \n \n Yue Zhao; Chee-wei Tan; AS. Avestimehr; S.N. Diggavi; and G.J. Pottie.\n\n\n \n \n \n \n On the Maximum Achievable Sum-Rate With Successive Decoding in Interference Channels.\n \n \n \n\n\n \n\n\n\n Information Theory, IEEE Transactions on, 58(6): 3798-3820. June 2012.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{6165364,\n abstract = {In this paper, we investigate the maximum achievable sum-rate of the two-user Gaussian interference channel with Gaussian superposition coding and successive decoding. We first examine an approximate deterministic formulation of the problem, and introduce the complementarity conditions that capture the use of Gaussian coding and successive decoding. In the deterministic channel problem, we find the constrained sum-capacity and its achievable schemes with the minimum number of messages, first in symmetric channels, and then in general asymmetric channels. We show that the constrained sum-capacity oscillates as a function of the cross link gain parameters between the information theoretic sum-capacity and the sum-capacity with interference treated as noise. Furthermore, we show that if the number of messages of either of the two users is fewer than the minimum number required to achieve the constrained sum-capacity, the maximum achievable sum-rate drops to that with interference treated as noise. We provide two algorithms to translate the optimal schemes in the deterministic channel model to the Gaussian channel model. We also derive two upper bounds on the maximum achievable sum-rate of the Gaussian Han-Kobayashi schemes, which automatically upper bound the maximum achievable sum-rate using successive decoding of Gaussian codewords. Numerical evaluations show that, similar to the deterministic channel results, the maximum achievable sum-rate with successive decoding in the Gaussian channels oscillates between that with Han-Kobayashi schemes and that with single message schemes.},\n author = {Yue Zhao and Chee-wei Tan and Avestimehr, AS. and Diggavi, S.N. and Pottie, G.J.},\n doi = {10.1109/TIT.2012.2190040},\n file = {:papers:suc_dec_ic.pdf},\n issn = {0018-9448},\n journal = {Information Theory, IEEE Transactions on},\n month = {June},\n number = {6},\n pages = {3798-3820},\n tags = {journal,WiIntMgmt,IT},\n title = {On the Maximum Achievable Sum-Rate With Successive Decoding in Interference Channels},\n type = {2},\n volume = {58},\n year = {2012}\n}\n\n
\n
\n\n\n
\n In this paper, we investigate the maximum achievable sum-rate of the two-user Gaussian interference channel with Gaussian superposition coding and successive decoding. We first examine an approximate deterministic formulation of the problem, and introduce the complementarity conditions that capture the use of Gaussian coding and successive decoding. In the deterministic channel problem, we find the constrained sum-capacity and its achievable schemes with the minimum number of messages, first in symmetric channels, and then in general asymmetric channels. We show that the constrained sum-capacity oscillates as a function of the cross link gain parameters between the information theoretic sum-capacity and the sum-capacity with interference treated as noise. Furthermore, we show that if the number of messages of either of the two users is fewer than the minimum number required to achieve the constrained sum-capacity, the maximum achievable sum-rate drops to that with interference treated as noise. We provide two algorithms to translate the optimal schemes in the deterministic channel model to the Gaussian channel model. We also derive two upper bounds on the maximum achievable sum-rate of the Gaussian Han-Kobayashi schemes, which automatically upper bound the maximum achievable sum-rate using successive decoding of Gaussian codewords. Numerical evaluations show that, similar to the deterministic channel results, the maximum achievable sum-rate with successive decoding in the Gaussian channels oscillates between that with Han-Kobayashi schemes and that with single message schemes.\n
\n\n\n
\n\n\n
\n \n\n \n \n A Khisti; S.N. Diggavi; and Gregory W. Wornell.\n\n\n \n \n \n \n Secret-Key Generation Using Correlated Sources and Channels.\n \n \n \n\n\n \n\n\n\n Information Theory, IEEE Transactions on, 58(2): 652-670. Feb 2012.\n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{kdw_j11,\n abstract = {We study the secret-key capacity in a joint source-channel coding setup-the terminals are connected over a discrete memoryless channel and have access to side information, modelled as a pair of discrete memoryless source sequences. As our main result, we establish the upper and lower bounds on the secret-key capacity. In the lower bound expression, the equivocation terms of the source and channel components are functionally additive even though the coding scheme generates a single secret-key by jointly taking into account the source and channel equivocations. Our bounds coincide, thus establishing the capacity, when the underlying wiretap channel can be decomposed into a set of independent, parallel, and reversely degraded channels. For the case of parallel Gaussian channels and jointly Gaussian sources we show that Gaussian codebooks achieve the secret-key capacity. In addition, when the eavesdropper also observes a correlated side information sequence, we establish the secret-key capacity when both the source and channel of the eavesdropper are a degraded version of the legitimate receiver. We finally also treat the case when a public discussion channel is available, propose a separation based coding scheme, and establish its optimality when the channel output symbols of the legitimate receiver and eavesdropper are conditionally independent given the input.},\n author = {Khisti, A and Diggavi, S.N. and Wornell, Gregory W.},\n doi = {10.1109/TIT.2011.2173629},\n file = {:papers:secret_keygen.pdf},\n issn = {0018-9448},\n journal = {Information Theory, IEEE Transactions on},\n label = {kdw_j11},\n month = {Feb},\n number = {2},\n pages = {652-670},\n tags = {journal,ITsecrecy,KeyGen,IT,WiNetSec,SrcChanSec},\n title = {Secret-Key Generation Using Correlated Sources and Channels},\n type = {2},\n volume = {58},\n year = {2012}\n}\n\n
\n
\n\n\n
\n We study the secret-key capacity in a joint source-channel coding setup-the terminals are connected over a discrete memoryless channel and have access to side information, modelled as a pair of discrete memoryless source sequences. As our main result, we establish the upper and lower bounds on the secret-key capacity. In the lower bound expression, the equivocation terms of the source and channel components are functionally additive even though the coding scheme generates a single secret-key by jointly taking into account the source and channel equivocations. Our bounds coincide, thus establishing the capacity, when the underlying wiretap channel can be decomposed into a set of independent, parallel, and reversely degraded channels. For the case of parallel Gaussian channels and jointly Gaussian sources we show that Gaussian codebooks achieve the secret-key capacity. In addition, when the eavesdropper also observes a correlated side information sequence, we establish the secret-key capacity when both the source and channel of the eavesdropper are a degraded version of the legitimate receiver. We finally also treat the case when a public discussion channel is available, propose a separation based coding scheme, and establish its optimality when the channel output symbols of the legitimate receiver and eavesdropper are conditionally independent given the input.\n
\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 4\n \n \n (9)\n \n \n
\n
\n \n \n
\n \n\n \n \n L. Czap; V.M. Prabhakaran; S. Diggavi; and C. Fragouli.\n\n\n \n \n \n \n On interactive secrecy over erasure networks.\n \n \n \n\n\n \n\n\n\n In Communications Control and Signal Processing (ISCCSP), 2012 5th International Symposium on, pages 1-4, May 2012. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{6217871,\n abstract = {In this short review paper we summarize some of our recent results on interactive message secrecy for broadcast erasure channels.},\n author = {Czap, L. and Prabhakaran, V.M. and Diggavi, S. and Fragouli, C.},\n booktitle = {Communications Control and Signal Processing (ISCCSP), 2012 5th International Symposium on},\n doi = {10.1109/ISCCSP.2012.6217871},\n file = {:papers:interactive_secrecy.pdf},\n month = {May},\n pages = {1-4},\n tags = {conf,WiNetSec},\n title = {On interactive secrecy over erasure networks},\n type = {4},\n year = {2012}\n}\n\n
\n
\n\n\n
\n In this short review paper we summarize some of our recent results on interactive message secrecy for broadcast erasure channels.\n
\n\n\n
\n\n\n
\n \n\n \n \n S.S. Bidokhti; V.M. Prabhakaran; and S.N. Diggavi.\n\n\n \n \n \n \n \n Is non-unique decoding necessary?.\n \n \n \n \n\n\n \n\n\n\n In Information Theory Proceedings (ISIT), 2012 IEEE International Symposium on, pages 398-402, July 2012. \n \n\n\n\n
\n\n\n\n \n \n \"Is arxiv\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{6284217,\n abstract = {In mutiterminal communication systems, signals carrying messages meant for different destinations are often observed together at any given destination receiver. Han and Kobayashi (1981) proposed a receiving strategy which performs a joint unique decoding of messages of interest along with a subset of messages which are not of interest. It is now well-known that this provides an achievable region which is, in general, larger than if the receiver treats all messages not of interest as noise. Nair and El Gamal (2009) and Chong, Motani, Garg, and El Gamal (2008) independently proposed a generalization called indirect or non-unique decoding where the receiver uses the codebook structure of the messages to only uniquely decode its messages of interest. Indirect (non-unique) decoding has since been used in various scenarios. The main result in this paper is to provide an interpretation and a systematic proof technique for why indirect decoding, in all known cases where it has been employed, can be replaced by a particularly designed joint unique decoding strategy, without any penalty from a rate region viewpoint1.},\n author = {Bidokhti, S.S. and Prabhakaran, V.M. and Diggavi, S.N.},\n booktitle = {Information Theory Proceedings (ISIT), 2012 IEEE International Symposium on},\n doi = {10.1109/ISIT.2012.6284217},\n issn = {2157-8095},\n month = {July},\n pages = {398-402},\n tags = {conf,IT},\n title = {Is non-unique decoding necessary?},\n type = {4},\n url_arxiv = {http://arxiv.org/abs/1312.4378},\n year = {2012}\n}\n\n
\n
\n\n\n
\n In mutiterminal communication systems, signals carrying messages meant for different destinations are often observed together at any given destination receiver. Han and Kobayashi (1981) proposed a receiving strategy which performs a joint unique decoding of messages of interest along with a subset of messages which are not of interest. It is now well-known that this provides an achievable region which is, in general, larger than if the receiver treats all messages not of interest as noise. Nair and El Gamal (2009) and Chong, Motani, Garg, and El Gamal (2008) independently proposed a generalization called indirect or non-unique decoding where the receiver uses the codebook structure of the messages to only uniquely decode its messages of interest. Indirect (non-unique) decoding has since been used in various scenarios. The main result in this paper is to provide an interpretation and a systematic proof technique for why indirect decoding, in all known cases where it has been employed, can be replaced by a particularly designed joint unique decoding strategy, without any penalty from a rate region viewpoint1.\n
\n\n\n
\n\n\n
\n \n\n \n \n A Ozgur; and S. Diggavi.\n\n\n \n \n \n \n Dynamic QMF for half-duplex relay networks.\n \n \n \n\n\n \n\n\n\n In Information Theory Proceedings (ISIT), 2012 IEEE International Symposium on, pages 413-417, July 2012. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{6284220,\n abstract = {The value of relay nodes to enhance the error performance versus rate trade-off in wireless networks has been studied extensively. However, wireless nodes currently are constrained to only transmit or receive at a given frequency, i.e., half-duplex constraint. The diversity-multiplexing tradeoff (DMT) for half-duplex networks are less understood. In the special cases where the DMT is currently known, such as the relay channel and the line network, it is achieved by either dynamic decoding or a quantize-map-forward (QMF) strategy with a fixed half-duplex schedule. The main question we investigate in this paper is whether these two strategies are sufficient to achieve the DMT of half-duplex wireless networks or we need new strategies for general setups. We propose a generalization of the two existing schemes through a dynamic QMF strategy and show that in a parallel relay channel it outperforms both earlier schemes. We also establish the DMT for the relay channel with multiple relays and multiple antennas in some special cases.},\n author = {Ozgur, A and Diggavi, S.},\n booktitle = {Information Theory Proceedings (ISIT), 2012 IEEE International Symposium on},\n doi = {10.1109/ISIT.2012.6284220},\n file = {:papers:dynamic_qmf.pdf},\n issn = {2157-8095},\n month = {July},\n pages = {413-417},\n tags = {conf,WiNet,IT,WiNetInfFlow},\n title = {Dynamic QMF for half-duplex relay networks},\n type = {4},\n year = {2012}\n}\n\n
\n
\n\n\n
\n The value of relay nodes to enhance the error performance versus rate trade-off in wireless networks has been studied extensively. However, wireless nodes currently are constrained to only transmit or receive at a given frequency, i.e., half-duplex constraint. The diversity-multiplexing tradeoff (DMT) for half-duplex networks are less understood. In the special cases where the DMT is currently known, such as the relay channel and the line network, it is achieved by either dynamic decoding or a quantize-map-forward (QMF) strategy with a fixed half-duplex schedule. The main question we investigate in this paper is whether these two strategies are sufficient to achieve the DMT of half-duplex wireless networks or we need new strategies for general setups. We propose a generalization of the two existing schemes through a dynamic QMF strategy and show that in a parallel relay channel it outperforms both earlier schemes. We also establish the DMT for the relay channel with multiple relays and multiple antennas in some special cases.\n
\n\n\n
\n\n\n
\n \n\n \n \n L. Czap; V.M. Prabhakaran; S. Diggavi; and C. Fragouli.\n\n\n \n \n \n \n Broadcasting private messages securely.\n \n \n \n\n\n \n\n\n\n In Information Theory Proceedings (ISIT), 2012 IEEE International Symposium on, pages 428-432, July 2012. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{6284224,\n abstract = {Consider a source, Alice, broadcasting private messages to multiple receivers through a broadcast erasure channel; users send back to Alice public feedback that she causally uses to decide the coding strategy for her following transmissions. Recently, the multiple unicast capacity region for this problem has been exactly characterized for a number of special cases; namely the 2-user, 3-user, symmetric K-user, and one-sidedly fair K-user [1], [2]. In this paper, we show that for all the cases where such characterizations exist, we can also optimally characterize the “secure” communication rates, where the message that Alice transmits to each user is information theoretically secure from the other users, even if these collude. We show that a simple, two-phase strategy, where appropriate amounts of secret keys are first generated and then consumed, matches a new outer bound we derive.},\n author = {Czap, L. and Prabhakaran, V.M. and Diggavi, S. and Fragouli, C.},\n booktitle = {Information Theory Proceedings (ISIT), 2012 IEEE International Symposium on},\n doi = {10.1109/ISIT.2012.6284224},\n file = {:papers:bc_private_msg.pdf},\n issn = {2157-8095},\n month = {July},\n pages = {428-432},\n tags = {conf,WiNetSec,IT},\n title = {Broadcasting private messages securely},\n type = {4},\n year = {2012}\n}\n\n
\n
\n\n\n
\n Consider a source, Alice, broadcasting private messages to multiple receivers through a broadcast erasure channel; users send back to Alice public feedback that she causally uses to decide the coding strategy for her following transmissions. Recently, the multiple unicast capacity region for this problem has been exactly characterized for a number of special cases; namely the 2-user, 3-user, symmetric K-user, and one-sidedly fair K-user [1], [2]. In this paper, we show that for all the cases where such characterizations exist, we can also optimally characterize the “secure” communication rates, where the message that Alice transmits to each user is information theoretically secure from the other users, even if these collude. We show that a simple, two-phase strategy, where appropriate amounts of secret keys are first generated and then consumed, matches a new outer bound we derive.\n
\n\n\n
\n\n\n
\n \n\n \n \n I-Hsiang Wang; and S. Diggavi.\n\n\n \n \n \n \n On degrees of freedom of layered two unicast networks with delayed CSIT.\n \n \n \n\n\n \n\n\n\n In Information Theory Proceedings (ISIT), 2012 IEEE International Symposium on, pages 46-50, July 2012. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{6284233,\n abstract = {In this paper we study the two unicast information flow problem over layered Gaussian networks with arbitrary number of nodes and connectivity, under the model of delayed channel state information (CSI) at transmitters and instantaneous CSI at receivers. We show that similar to the case with instantaneous CSI at transmitters (CSIT), the degrees of freedom (DoF) region is strictly larger than the time-sharing DoF region if and only if there is no omniscient node, definition of which only depends on the topology of the network. Moreover, as in the case with instantaneous CSIT, 2/3 DoF per user is always achievable when there is no omniscient node in the network.},\n author = {I-Hsiang Wang and Diggavi, S.},\n booktitle = {Information Theory Proceedings (ISIT), 2012 IEEE International Symposium on},\n doi = {10.1109/ISIT.2012.6284233},\n file = {:papers:dof_2_unicast.pdf},\n issn = {2157-8095},\n month = {July},\n pages = {46-50},\n tags = {conf,WiNet,IT},\n title = {On degrees of freedom of layered two unicast networks with delayed CSIT},\n type = {4},\n year = {2012}\n}\n\n
\n
\n\n\n
\n In this paper we study the two unicast information flow problem over layered Gaussian networks with arbitrary number of nodes and connectivity, under the model of delayed channel state information (CSI) at transmitters and instantaneous CSI at receivers. We show that similar to the case with instantaneous CSI at transmitters (CSIT), the degrees of freedom (DoF) region is strictly larger than the time-sharing DoF region if and only if there is no omniscient node, definition of which only depends on the topology of the network. Moreover, as in the case with instantaneous CSIT, 2/3 DoF per user is always achievable when there is no omniscient node in the network.\n
\n\n\n
\n\n\n
\n \n\n \n \n H. Fawzi; P. Tabuada; and S. Diggavi.\n\n\n \n \n \n \n Security for control systems under sensor and actuator attacks.\n \n \n \n\n\n \n\n\n\n In Decision and Control (CDC), 2012 IEEE 51st Annual Conference on, pages 3412-3417, Dec 2012. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n  \n \n 1 download\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{6426811,\n abstract = {We consider the problem of estimation and control of a linear system when some of the sensors or actuators are attacked by a malicious agent. In our previous work [1] we studied systems with no control inputs and we formulated the estimation problem as a dynamic error correction problem with sparse attack vectors. In this paper we extend our study and look at the role of inputs and control. We first show that it is possible to increase the resilience of the system to attacks by changing the dynamics of the system using state-feedback while having (almost) total freedom in placing the new poles of the system. We then look at the problem of stabilizing a plant using output-feedback despite attacks on sensors, and we show that a principle of separation of estimation and control holds. Finally we look at the effect of attacks on actuators in addition to attacks on sensors: we characterize the resilience of the system with respect to actuator and sensor attacks and we formulate an efficient optimization-based decoder to estimate the state of the system despite attacks on actuators and sensors.},\n author = {Fawzi, H. and Tabuada, P. and Diggavi, S.},\n booktitle = {Decision and Control (CDC), 2012 IEEE 51st Annual Conference on},\n doi = {10.1109/CDC.2012.6426811},\n file = {:papers:security_cdc.pdf},\n issn = {0743-1546},\n month = {Dec},\n pages = {3412-3417},\n tags = {conf,SecureCPS},\n title = {Security for control systems under sensor and actuator attacks},\n type = {4},\n year = {2012}\n}\n\n
\n
\n\n\n
\n We consider the problem of estimation and control of a linear system when some of the sensors or actuators are attacked by a malicious agent. In our previous work [1] we studied systems with no control inputs and we formulated the estimation problem as a dynamic error correction problem with sparse attack vectors. In this paper we extend our study and look at the role of inputs and control. We first show that it is possible to increase the resilience of the system to attacks by changing the dynamics of the system using state-feedback while having (almost) total freedom in placing the new poles of the system. We then look at the problem of stabilizing a plant using output-feedback despite attacks on sensors, and we show that a principle of separation of estimation and control holds. Finally we look at the effect of attacks on actuators in addition to attacks on sensors: we characterize the resilience of the system with respect to actuator and sensor attacks and we formulate an efficient optimization-based decoder to estimate the state of the system despite attacks on actuators and sensors.\n
\n\n\n
\n\n\n
\n \n\n \n \n N. Karamchandani; U. Niesen; and S. Diggavi.\n\n\n \n \n \n \n Computation over mismatched channels.\n \n \n \n\n\n \n\n\n\n In Communication, Control, and Computing (Allerton), 2012 50th Annual Allerton Conference on, pages 1042-1048, Oct 2012. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{6483333,\n abstract = {We consider the problem of distributed computation of a target function over a multiple-access channel. If the target and channel functions are matched (i.e., compute the same function), significant performance gains can be obtained by jointly designing the computation and communication tasks. However, in most situations there is mismatch between these two functions. In this work, we analyze the impact of this mismatch on the performance gains achievable with joint computation and communication designs over separation-based designs. We show that for most pairs of target and channel functions there is no such gain, and separation of computation and communication is optimal.},\n author = {Karamchandani, N. and Niesen, U. and Diggavi, S.},\n booktitle = {Communication, Control, and Computing (Allerton), 2012 50th Annual Allerton Conference on},\n doi = {10.1109/Allerton.2012.6483333},\n file = {:papers:comp_mismatch_allerton.pdf},\n month = {Oct},\n pages = {1042-1048},\n tags = {conf,IT},\n title = {Computation over mismatched channels},\n type = {4},\n year = {2012}\n}\n\n
\n
\n\n\n
\n We consider the problem of distributed computation of a target function over a multiple-access channel. If the target and channel functions are matched (i.e., compute the same function), significant performance gains can be obtained by jointly designing the computation and communication tasks. However, in most situations there is mismatch between these two functions. In this work, we analyze the impact of this mismatch on the performance gains achievable with joint computation and communication designs over separation-based designs. We show that for most pairs of target and channel functions there is no such gain, and separation of computation and communication is optimal.\n
\n\n\n
\n\n\n
\n \n\n \n \n Yue Zhao; S.N. Diggavi; A Goldsmith; and H.V. Poor.\n\n\n \n \n \n \n Convex optimization for precoder design in MIMO interference networks.\n \n \n \n\n\n \n\n\n\n In Communication, Control, and Computing (Allerton), 2012 50th Annual Allerton Conference on, pages 1213-1219, Oct 2012. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{6483356,\n abstract = {Optimal precoder design for weighted sum-rate maximization in multiple-input multiple-output interference networks is studied. For this well known non-convex optimization problem, convex approximations based on interference alignment are developed, for both single-beam and multi-beam cases. Precoder design methods that consist of two phases, an interference alignment phase and a post-alignment optimization phase, are proposed. The interference alignment solution is taken as the input to the post-alignment optimization phase. For post-alignment weighted sum-rate maximization, novel iterative distributed algorithms are proposed based on the developed convex approximations. Simulation results show that the proposed algorithms achieve promising weighted sum-rate gains over existing interference alignment algorithms. Interestingly, for the multi-beam case, significant gain is achieved at all SNRs, including the high SNR regime.},\n author = {Yue Zhao and Diggavi, S.N. and Goldsmith, A and Poor, H.V.},\n booktitle = {Communication, Control, and Computing (Allerton), 2012 50th Annual Allerton Conference on},\n doi = {10.1109/Allerton.2012.6483356},\n file = {:papers:convex_opt_precoder.pdf},\n month = {Oct},\n pages = {1213-1219},\n tags = {conf,WiNet,IT},\n title = {Convex optimization for precoder design in MIMO interference networks},\n type = {4},\n year = {2012}\n}\n\n
\n
\n\n\n
\n Optimal precoder design for weighted sum-rate maximization in multiple-input multiple-output interference networks is studied. For this well known non-convex optimization problem, convex approximations based on interference alignment are developed, for both single-beam and multi-beam cases. Precoder design methods that consist of two phases, an interference alignment phase and a post-alignment optimization phase, are proposed. The interference alignment solution is taken as the input to the post-alignment optimization phase. For post-alignment weighted sum-rate maximization, novel iterative distributed algorithms are proposed based on the developed convex approximations. Simulation results show that the proposed algorithms achieve promising weighted sum-rate gains over existing interference alignment algorithms. Interestingly, for the multi-beam case, significant gain is achieved at all SNRs, including the high SNR regime.\n
\n\n\n
\n\n\n
\n \n\n \n \n Iris Safaka; Christina Fragouli; Katerina Argyraki; and Suhas Diggavi.\n\n\n \n \n \n \n Creating shared secrets out of thin air.\n \n \n \n\n\n \n\n\n\n In Proceedings of the 11th ACM Workshop on Hot Topics in Networks, pages 73–78, Oct 2012. ACM\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{safaka2012creating,\n abstract = {Current security systems typically rely on the adversary's computational limitations (e.g., the fact that it cannot invert a hash function or perform large-integer factorization). Wireless networks offer the opportunity for a different, complementary kind of security, which relies not on the adversary's computational limitations, but on its limited network presence (i.e., that the adversary cannot be located at many different points in the network at the same time). We take a first step toward designing and building a wireless security system that leverages this opportunity: We consider the problem where a group of n nodes, connected to the same broadcast wireless network, want to agree on a shared secret (e.g., an encryption key), in the presence of an adversary Eve who tries to listen in and steal the secret. We propose a secret-agreement protocol, where the n nodes of the group keep exchanging bits until they have all agreed on a bit sequence that Eve cannot reconstruct (with very high probability). We provide experimental evidence---to the best of our knowledge, the first one---that a group of wireless nodes can generate thousands of new shared secret bits per second, with their secrecy being independent of the adversary's computational capabilities.},\n author = {Safaka, Iris and Fragouli, Christina and Argyraki, Katerina and Diggavi, Suhas},\n booktitle = {Proceedings of the 11th ACM Workshop on Hot Topics in Networks},\n file = {:papers:secrets_thin_air.pdf},\n month = {Oct},\n organization = {ACM},\n pages = {73--78},\n tags = {conf,WiNetSec,IT},\n title = {Creating shared secrets out of thin air},\n type = {4},\n year = {2012}\n}\n\n
\n
\n\n\n
\n Current security systems typically rely on the adversary's computational limitations (e.g., the fact that it cannot invert a hash function or perform large-integer factorization). Wireless networks offer the opportunity for a different, complementary kind of security, which relies not on the adversary's computational limitations, but on its limited network presence (i.e., that the adversary cannot be located at many different points in the network at the same time). We take a first step toward designing and building a wireless security system that leverages this opportunity: We consider the problem where a group of n nodes, connected to the same broadcast wireless network, want to agree on a shared secret (e.g., an encryption key), in the presence of an adversary Eve who tries to listen in and steal the secret. We propose a secret-agreement protocol, where the n nodes of the group keep exchanging bits until they have all agreed on a bit sequence that Eve cannot reconstruct (with very high probability). We provide experimental evidence—to the best of our knowledge, the first one—that a group of wireless nodes can generate thousands of new shared secret bits per second, with their secrecy being independent of the adversary's computational capabilities.\n
\n\n\n
\n\n\n\n\n\n
\n
\n\n\n\n\n
\n
\n\n
\n
\n  \n 2011\n \n \n (2)\n \n \n
\n
\n \n \n
\n
\n  \n 2\n \n \n (7)\n \n \n
\n
\n \n \n
\n \n\n \n \n S. Avestimehr; S N. Diggavi; and D N C. Tse.\n\n\n \n \n \n \n \n Wireless network information flow: a deterministic approach.\n \n \n \n \n\n\n \n\n\n\n IEEE Transactions on Information Theory, 57(4). April 2011.\n \n\n\n\n
\n\n\n\n \n \n \"Wireless arxiv\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{ADTj10,\n abstract = {This paper approximately resolves the information flow over wireless (Gaussian) relay networks to within a constant number of bits. It introduced the linear deterministic model and established a max-flow min-cut result for linear deterministic networks. The insights from the deterministic approach led to the approximate max-flow min-cut characterization for noisy Gaussian networks, through the introduction of a new relaying\nstrategy called {\\em quantize-map-forward} (QMF).},\n author = {S. Avestimehr and S N. Diggavi and D N C. Tse},\n file = {:papers:wirelessnetinfflow.pdf},\n journal = {IEEE Transactions on Information Theory},\n label = {adtj10},\n month = {April},\n note = {},\n number = {4},\n pages = {},\n tags = {journal,DetApprox,ITapprox,WiNet,IT,WiNetInfFlow},\n title = {Wireless network information flow: a deterministic approach},\n type = {2},\n url_arxiv = {http://arxiv.org/abs/0906.5394},\n volume = {57},\n year = {2011}\n}\n\n
\n
\n\n\n
\n This paper approximately resolves the information flow over wireless (Gaussian) relay networks to within a constant number of bits. It introduced the linear deterministic model and established a max-flow min-cut result for linear deterministic networks. The insights from the deterministic approach led to the approximate max-flow min-cut characterization for noisy Gaussian networks, through the introduction of a new relaying strategy called \\em quantize-map-forward (QMF).\n
\n\n\n
\n\n\n
\n \n\n \n \n S. Dusad; and S N. Diggavi.\n\n\n \n \n \n \n \n On successive refinement of diversity for fading ISI channels.\n \n \n \n \n\n\n \n\n\n\n IEEE Transactions on Communications, 59: 1820-1829. December 2011.\n \n\n\n\n
\n\n\n\n \n \n \"On arxiv\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DDj11,\n abstract = {We show that the diversity-multiplexing tradeoff in fading inter-symbol interference (ISI) channels with a single degree of freedom (MISO/SIMO) is\nsuccessively refinable. This demonstrates that ideal opportunistic codes can be designed\nasymptotically in SNR.},\n author = {S. Dusad and S N. Diggavi},\n file = {:papers:ddsucrefisi.pdf},\n journal = {IEEE Transactions on Communications},\n month = {December},\n pages = {1820-1829},\n tags = {journal,DivEmb,SucRefDiv,STcodes,OppComm,DegMsgSet},\n title = {On successive refinement of diversity for fading ISI channels},\n type = {2},\n url_arxiv = {http://arxiv.org/abs/0912.4556},\n volume = {59},\n year = {2011}\n}\n\n
\n
\n\n\n
\n We show that the diversity-multiplexing tradeoff in fading inter-symbol interference (ISI) channels with a single degree of freedom (MISO/SIMO) is successively refinable. This demonstrates that ideal opportunistic codes can be designed asymptotically in SNR.\n
\n\n\n
\n\n\n
\n \n\n \n \n M. Jafarisiavoshani; S. Mohajer; C. Fragouli; and S N. Diggavi.\n\n\n \n \n \n \n \n Capacity of noncoherent multisource network coding.\n \n \n \n \n\n\n \n\n\n\n IEEE Transactions on Information Theory, 57(2). February 2011.\n \n\n\n\n
\n\n\n\n \n \n \"Capacity arxiv\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{JMFDj11,\n abstract = {We propose a channel model for the non-coherent network coding introduced by Koetter and Kschischang.  The model captures the essence of such a network operation, and we use it to calculate the capacity of non-coherent network codes as a function of network parameters. We prove that use of subspace coding is optimal, and show that, in\nsome cases, the capacity-achieving distribution uses subspaces of several dimensions, where the employed dimensions depend on the packet length.},\n author = {M. Jafarisiavoshani and S. Mohajer and C. Fragouli and S N. Diggavi},\n file = {:papers:jmfdnoncoherent10.pdf},\n journal = {IEEE Transactions on Information Theory},\n month = {February},\n number = {2},\n pages = {},\n tags = {journal,NonCohComm,NetCod,Subsp,IT},\n title = {Capacity of noncoherent multisource network coding},\n type = {2},\n url_arxiv = {http://arxiv.org/abs/1001.1658},\n volume = {57},\n year = {2011}\n}\n\n
\n
\n\n\n
\n We propose a channel model for the non-coherent network coding introduced by Koetter and Kschischang. The model captures the essence of such a network operation, and we use it to calculate the capacity of non-coherent network codes as a function of network parameters. We prove that use of subspace coding is optimal, and show that, in some cases, the capacity-achieving distribution uses subspaces of several dimensions, where the employed dimensions depend on the packet length.\n
\n\n\n
\n\n\n
\n \n\n \n \n A. Khisti; S N. Diggavi; and G W. Wornell.\n\n\n \n \n \n \n \n Secret-key agreement over wiretap channels with random state parameters.\n \n \n \n \n\n\n \n\n\n\n IEEE Transactions on Information Forensics and Security, 6: 672-681. Sep 2011.\n \n\n\n\n
\n\n\n\n \n \n \"Secret-key arxiv\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{KDWj10,\n author = {A. Khisti and S N. Diggavi and G W. Wornell},\n journal = {IEEE Transactions  on Information Forensics and Security},\n month = {Sep},\n note = {},\n pages = {672-681},\n tags = {journal,ITsecrecy,KeyGen,IT,WiNetSec},\n title = {Secret-key agreement over wiretap channels with random state parameters},\n type = {2},\n url_arxiv = {http://arxiv.org/abs/1009.3052},\n volume = {6},\n year = {2011}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n S. Mohajer; S N. Diggavi; C. Fragouli; and D. Tse.\n\n\n \n \n \n \n \n Approximate capacity region for a class of relay-interference networks.\n \n \n \n \n\n\n \n\n\n\n IEEE Transactions on Information Theory, 57(5): 2837-2864. May 2011.\n \n\n\n\n
\n\n\n\n \n \n \"Approximate arxiv\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{MDFTj10,\n abstract = {In this paper we study  two-stage Gaussian \nrelay-interference networks where there are weak cross-links, causing the networks to behave like a chain\nof Z Gaussian channels. Our main result is an approximate characterization of the capacity region for  such networks. We propose a new interference management scheme, termed interference\nneutralization, which is implemented using structured lattice codes. This scheme allows for over-the-air\ninterference removal, without the transmitters having complete access the interfering signals.},\n author = {S. Mohajer and S N. Diggavi and C. Fragouli and D. Tse},\n file = {:papers:relayinterference_revised.pdf},\n journal = {IEEE Transactions on Information Theory},\n label = {mdft_js10},\n month = {May},\n note = {},\n number = {5},\n pages = {2837-2864},\n tags = {journal,DetApprox,ITapprox,WiNet,IT,WiNetInfFlow,RelayInt,LatticeChan},\n title = {Approximate capacity region for a class of relay-interference networks},\n type = {2},\n url_arxiv = {http://arxiv.org/abs/1005.0404},\n volume = {57},\n year = {2011}\n}\n\n
\n
\n\n\n
\n In this paper we study two-stage Gaussian relay-interference networks where there are weak cross-links, causing the networks to behave like a chain of Z Gaussian channels. Our main result is an approximate characterization of the capacity region for such networks. We propose a new interference management scheme, termed interference neutralization, which is implemented using structured lattice codes. This scheme allows for over-the-air interference removal, without the transmitters having complete access the interfering signals.\n
\n\n\n
\n\n\n
\n \n\n \n \n C. Tian; S. Diggavi; and S. Shamai.\n\n\n \n \n \n \n \n The Achievable Distortion Region of Sending a Bivariate Gaussian Source on the Gaussian Broadcast Channel.\n \n \n \n \n\n\n \n\n\n\n Information Theory, IEEE Transactions on, 57(10): 6419-6427. Oct 2011.\n \n\n\n\n
\n\n\n\n \n \n \"The arxiv\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{tcds_js10,\n abstract = {We provide a complete characterization of the achievable distortion region for the problem of sending a bivariate Gaussian source over bandwidth-matched Gaussian broadcast channels, where each receiver is interested in only one component of the source. This setting naturally generalizes the simple single Gaussian source bandwidth-matched broadcast problem for which the uncoded scheme is known to be optimal. We show that a hybrid scheme can achieve the optimum for the bivariate case, but neither an uncoded scheme alone nor a separation-based scheme alone is sufficient. We further show that in this joint source channel coding setting, the Gaussian scenario is the worst scenario among the sources and channel noises with the same covariances.},\n author = {Tian, C. and Diggavi, S. and Shamai, S.},\n doi = {10.1109/TIT.2011.2165801},\n issn = {0018-9448},\n journal = {Information Theory, IEEE Transactions on},\n label = {tcds_js10},\n month = {Oct},\n number = {10},\n pages = {6419-6427},\n tags = {journal,NDC,WiNet,IT},\n title = {The Achievable Distortion Region of Sending a Bivariate Gaussian Source on the Gaussian Broadcast Channel},\n type = {2},\n url_arxiv = {http://arxiv.org/abs/1006.0644},\n volume = {57},\n year = {2011}\n}\n\n
\n
\n\n\n
\n We provide a complete characterization of the achievable distortion region for the problem of sending a bivariate Gaussian source over bandwidth-matched Gaussian broadcast channels, where each receiver is interested in only one component of the source. This setting naturally generalizes the simple single Gaussian source bandwidth-matched broadcast problem for which the uncoded scheme is known to be optimal. We show that a hybrid scheme can achieve the optimum for the bivariate case, but neither an uncoded scheme alone nor a separation-based scheme alone is sufficient. We further show that in this joint source channel coding setting, the Gaussian scenario is the worst scenario among the sources and channel noises with the same covariances.\n
\n\n\n
\n\n\n
\n \n\n \n \n C. Tian; S N. Diggavi; and S. Shamai(Shitz).\n\n\n \n \n \n \n \n Approximate Characterizations for the Gaussian Broadcasting Distortion Region.\n \n \n \n \n\n\n \n\n\n\n IEEE Transactions on Information Theory, 57(1): 124-136. January 2011.\n \n\n\n\n
\n\n\n\n \n \n \"Approximate arxiv\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{TDSj10a,\n abstract = {We show that source-channel separation is approximately optimal for transmitting\na Gaussian source over a bandwidth mismatched Gaussian channel, for quadratic distortion\nmeasures. Furthermore, we show that the results can be extended to\ngeneral broadcast channels, and the performance of the source-channel\nseparation based approach is also within the same\nconstant multiplicative factors of the optimum.},\n author = {C. Tian and  S N. Diggavi and S. Shamai(Shitz)},\n file = {:papers:gaussianscbc_final.pdf},\n journal = {IEEE Transactions on Information Theory},\n label = {tds_j11a},\n month = {January},\n note = {},\n number = {1},\n pages = {124-136},\n tags = {journal,SrcChan,ApproxIT,NDC,IT},\n title = {Approximate Characterizations for the Gaussian Broadcasting Distortion Region},\n type = {2},\n url_arxiv = {http://arxiv.org/abs/0906.3183},\n volume = {57},\n year = {2011}\n}\n\n
\n
\n\n\n
\n We show that source-channel separation is approximately optimal for transmitting a Gaussian source over a bandwidth mismatched Gaussian channel, for quadratic distortion measures. Furthermore, we show that the results can be extended to general broadcast channels, and the performance of the source-channel separation based approach is also within the same constant multiplicative factors of the optimum.\n
\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 4\n \n \n (9)\n \n \n
\n
\n \n \n
\n \n\n \n \n Yue Zhao; Chee-wei Tan; AS. Avestimehr; S.N. Diggavi; and G.J. Pottie.\n\n\n \n \n \n \n On the sum-capacity with successive decoding in interference channels.\n \n \n \n\n\n \n\n\n\n In Information Theory Proceedings (ISIT), 2011 IEEE International Symposium on, pages 1494-1498, July 2011. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{6033790,\n abstract = {In this paper, we investigate the sum-capacity of the two-user Gaussian interference channel with Gaussian superposition coding and successive decoding. We first examine an approximate deterministic formulation of the problem, and introduce the complementarity conditions that capture the use of Gaussian coding and successive decoding. In the deterministic channel problem, we show that the constrained sum-capacity oscillates as a function of the cross link gain parameters between the information theoretic sum-capacity and the sum-capacity with interference treated as noise. Furthermore, we show that if the number of messages of either user is fewer than the minimum number required to achieve the constrained sum-capacity, the maximum achievable sum-rate drops to that with interference treated as noise. We translate the optimal schemes in the deterministic channel model to the Gaussian channel model, and also derive two upper bounds on the constrained sum-capacity. Numerical evaluations show that the constrained sum-capacity in the Gaussian channels oscillates between the sum-capacity with Gaussian Han-Kobayashi schemes and that with single message schemes.},\n author = {Yue Zhao and Chee-wei Tan and Avestimehr, AS. and Diggavi, S.N. and Pottie, G.J.},\n booktitle = {Information Theory Proceedings (ISIT), 2011 IEEE International Symposium on},\n doi = {10.1109/ISIT.2011.6033790},\n file = {:papers:suc_dec_ic_isit.pdf},\n issn = {2157-8095},\n month = {July},\n pages = {1494-1498},\n tags = {conf,WiIntMgmt,IT,WiNet},\n title = {On the sum-capacity with successive decoding in interference channels},\n type = {4},\n year = {2011}\n}\n\n
\n
\n\n\n
\n In this paper, we investigate the sum-capacity of the two-user Gaussian interference channel with Gaussian superposition coding and successive decoding. We first examine an approximate deterministic formulation of the problem, and introduce the complementarity conditions that capture the use of Gaussian coding and successive decoding. In the deterministic channel problem, we show that the constrained sum-capacity oscillates as a function of the cross link gain parameters between the information theoretic sum-capacity and the sum-capacity with interference treated as noise. Furthermore, we show that if the number of messages of either user is fewer than the minimum number required to achieve the constrained sum-capacity, the maximum achievable sum-rate drops to that with interference treated as noise. We translate the optimal schemes in the deterministic channel model to the Gaussian channel model, and also derive two upper bounds on the constrained sum-capacity. Numerical evaluations show that the constrained sum-capacity in the Gaussian channels oscillates between the sum-capacity with Gaussian Han-Kobayashi schemes and that with single message schemes.\n
\n\n\n
\n\n\n
\n \n\n \n \n M.J. Siavoshani; S. Mishra; S.N. Diggavi; and C. Fragouli.\n\n\n \n \n \n \n Group secret key agreement over state-dependent wireless broadcast channels.\n \n \n \n\n\n \n\n\n\n In Information Theory Proceedings (ISIT), 2011 IEEE International Symposium on, pages 1960-1964, July 2011. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{6033895,\n abstract = {We consider a group of m trusted nodes that aim to create a shared secret key K, using a state-dependent wireless broadcast channel that exists from one of the honest nodes to the rest of the nodes including a passive eavesdropper Eve. All of the trusted nodes can also discuss over a cost-free and unlimited rate public channel which is also observed by Eve. For this setup, we develop an information-theoretically secure secret key agreement protocol. We show the optimality of this protocol for linear deterministic wireless broadcast channels as well as in the high-SNR regime for wireless channels with large dynamic range over channel states.},\n author = {Siavoshani, M.J. and Mishra, S. and Diggavi, S.N. and Fragouli, C.},\n booktitle = {Information Theory Proceedings (ISIT), 2011 IEEE International Symposium on},\n doi = {10.1109/ISIT.2011.6033895},\n file = {:papers:group_secret_key.pdf},\n issn = {2157-8095},\n month = {July},\n pages = {1960-1964},\n tags = {conf,WiNetSec,IT},\n title = {Group secret key agreement over state-dependent wireless broadcast channels},\n type = {4},\n year = {2011}\n}\n\n
\n
\n\n\n
\n We consider a group of m trusted nodes that aim to create a shared secret key K, using a state-dependent wireless broadcast channel that exists from one of the honest nodes to the rest of the nodes including a passive eavesdropper Eve. All of the trusted nodes can also discuss over a cost-free and unlimited rate public channel which is also observed by Eve. For this setup, we develop an information-theoretically secure secret key agreement protocol. We show the optimality of this protocol for linear deterministic wireless broadcast channels as well as in the high-SNR regime for wireless channels with large dynamic range over channel states.\n
\n\n\n
\n\n\n
\n \n\n \n \n U. Niesen; and S. Diggavi.\n\n\n \n \n \n \n The approximate capacity of the Gaussian N-relay diamond network.\n \n \n \n\n\n \n\n\n\n In Information Theory Proceedings (ISIT), 2011 IEEE International Symposium on, pages 259-263, July 2011. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n  \n \n 1 download\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{6034040,\n abstract = {We consider the Gaussian “diamond” or parallel relay network, in which a source node transmits a message to a destination node with the help of N relays. Even for the symmetric setting, in which the channel gains to the relays are identical and the channel gains from the relays are identical, the capacity of this channel is unknown in general. The best known capacity approximation is up to an additive gap of order N bits and up to a multiplicative gap of order N2, with both gaps independent of the channel gains. In this paper, we approximate the capacity of the symmetric Gaussian N-relay diamond network up to an additive gap of 1.8 bits and up to a multiplicative gap of a factor 14. Both gaps are independent of the channel gains, and, unlike the best previously known result, are also independent of the number of relays N in the network. Achievability is based on bursty amplify-and-forward, showing that this simple scheme is uniformly approximately optimal, both in the low-rate as well as high-rate regimes. The upper bound on capacity is based on a careful evaluation of the cut-set bound.},\n author = {Niesen, U. and Diggavi, S.},\n booktitle = {Information Theory Proceedings (ISIT), 2011 IEEE International Symposium on},\n doi = {10.1109/ISIT.2011.6034040},\n file = {:papers:nrelay_diamond_isit.pdf},\n issn = {2157-8095},\n month = {July},\n pages = {259-263},\n tags = {conf,approxIT,IT,WiNet},\n title = {The approximate capacity of the Gaussian N-relay diamond network},\n type = {4},\n year = {2011}\n}\n\n
\n
\n\n\n
\n We consider the Gaussian “diamond” or parallel relay network, in which a source node transmits a message to a destination node with the help of N relays. Even for the symmetric setting, in which the channel gains to the relays are identical and the channel gains from the relays are identical, the capacity of this channel is unknown in general. The best known capacity approximation is up to an additive gap of order N bits and up to a multiplicative gap of order N2, with both gaps independent of the channel gains. In this paper, we approximate the capacity of the symmetric Gaussian N-relay diamond network up to an additive gap of 1.8 bits and up to a multiplicative gap of a factor 14. Both gaps are independent of the channel gains, and, unlike the best previously known result, are also independent of the number of relays N in the network. Achievability is based on bursty amplify-and-forward, showing that this simple scheme is uniformly approximately optimal, both in the low-rate as well as high-rate regimes. The upper bound on capacity is based on a careful evaluation of the cut-set bound.\n
\n\n\n
\n\n\n
\n \n\n \n \n A Sengupta; S. Brahma; A Ozgur; C. Fragouli; and S. Diggavi.\n\n\n \n \n \n \n Graph-based codes for Quantize-Map-and-Forward relaying.\n \n \n \n\n\n \n\n\n\n In Information Theory Workshop (ITW), 2011 IEEE, pages 140-144, Oct 2011. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{6089363,\n abstract = {We present a structured Quantize-Map-and-Forward (QMF) scheme for cooperative communication over wireless networks, that employs LDPC ensembles for the node operations and message-passing algorithms for decoding. We demonstrate through extensive simulation results over the full-duplex parallel relay network, that our scheme, with no transmit channel state information, offers a robust performance over fading channels and achieves the full diversity order of our network at moderate SNRs.},\n author = {Sengupta, A and Brahma, S. and Ozgur, A and Fragouli, C. and Diggavi, S.},\n booktitle = {Information Theory Workshop (ITW), 2011 IEEE},\n doi = {10.1109/ITW.2011.6089363},\n file = {:papers:graph_qmf.pdf},\n month = {Oct},\n pages = {140-144},\n tags = {conf,IT,WiNet,WiNetInfFlow},\n title = {Graph-based codes for Quantize-Map-and-Forward relaying},\n type = {4},\n year = {2011}\n}\n\n
\n
\n\n\n
\n We present a structured Quantize-Map-and-Forward (QMF) scheme for cooperative communication over wireless networks, that employs LDPC ensembles for the node operations and message-passing algorithms for decoding. We demonstrate through extensive simulation results over the full-duplex parallel relay network, that our scheme, with no transmit channel state information, offers a robust performance over fading channels and achieves the full diversity order of our network at moderate SNRs.\n
\n\n\n
\n\n\n
\n \n\n \n \n L. Czap; V.M. Prabhakaran; C. Fragouli; and S. Diggavi.\n\n\n \n \n \n \n Secret message capacity of erasure broadcast channels with feedback.\n \n \n \n\n\n \n\n\n\n In Information Theory Workshop (ITW), 2011 IEEE, pages 65-69, Oct 2011. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{6089579,\n abstract = {We characterize the secret message capacity of a wiretapped erasure channel where causal channel state information of the honest nodes is publicly available. In doing so, we establish an intimate connection between message secrecy and secret key generation for the same channel setup. We propose a linear coding scheme that has polynomial encoding/decoding complexity, and prove a converse that shows the optimality of our scheme. Our work also demonstrates the value of causal public feedback, which has previously been shown for the secret key generation problem.},\n author = {Czap, L. and Prabhakaran, V.M. and Fragouli, C. and Diggavi, S.},\n booktitle = {Information Theory Workshop (ITW), 2011 IEEE},\n file = {:papers:secret_erasure_bc.pdf},\n month = {Oct},\n pages = {65-69},\n tags = {conf,WiNetSec,IT},\n title = {Secret message capacity of erasure broadcast channels with feedback},\n type = {4},\n year = {2011}\n}\n\n
\n
\n\n\n
\n We characterize the secret message capacity of a wiretapped erasure channel where causal channel state information of the honest nodes is publicly available. In doing so, we establish an intimate connection between message secrecy and secret key generation for the same channel setup. We propose a linear coding scheme that has polynomial encoding/decoding complexity, and prove a converse that shows the optimality of our scheme. Our work also demonstrates the value of causal public feedback, which has previously been shown for the secret key generation problem.\n
\n\n\n
\n\n\n
\n \n\n \n \n H. Fawzi; P. Tabuada; and S. Diggavi.\n\n\n \n \n \n \n Secure state-estimation for dynamical systems under active adversaries.\n \n \n \n\n\n \n\n\n\n In Communication, Control, and Computing (Allerton), 2011 49th Annual Allerton Conference on, pages 337-344, Sept 2011. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n  \n \n 1 download\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{6120187,\n abstract = {We consider the problem of state-estimation of a linear dynamical system when some of the sensor measurements are corrupted by an adversarial attacker. The errors injected by the attacker in the sensor measurements can be arbitrary and are not assumed to follow a specific model (in particular they can be of arbitrary magnitude). We first characterize the number of attacked sensors that can be tolerated so that the state of the system can still be correctly recovered by any decoding algorithm. We then propose a specific computationally feasible decoding algorithm and we give a characterization of the number of errors this decoder can correct. For this we use ideas from compressed sensing and error correction over the reals and we exploit the dynamical nature of the problem. We show using numerical simulations that this decoder performs very well in practice and allows to correct a large number of errors.},\n author = {Fawzi, H. and Tabuada, P. and Diggavi, S.},\n booktitle = {Communication, Control, and Computing (Allerton), 2011 49th Annual Allerton Conference on},\n doi = {10.1109/Allerton.2011.6120187},\n file = {:papers:secure_state_estimate.pdf},\n month = {Sept},\n pages = {337-344},\n tags = {conf,SecureCPS},\n title = {Secure state-estimation for dynamical systems under active adversaries},\n type = {4},\n year = {2011}\n}\n\n
\n
\n\n\n
\n We consider the problem of state-estimation of a linear dynamical system when some of the sensor measurements are corrupted by an adversarial attacker. The errors injected by the attacker in the sensor measurements can be arbitrary and are not assumed to follow a specific model (in particular they can be of arbitrary magnitude). We first characterize the number of attacked sensors that can be tolerated so that the state of the system can still be correctly recovered by any decoding algorithm. We then propose a specific computationally feasible decoding algorithm and we give a characterization of the number of errors this decoder can correct. For this we use ideas from compressed sensing and error correction over the reals and we exploit the dynamical nature of the problem. We show using numerical simulations that this decoder performs very well in practice and allows to correct a large number of errors.\n
\n\n\n
\n\n\n
\n \n\n \n \n S. Mohajer; S.N. Diggavi; H.V. Poor; and S. Shamai.\n\n\n \n \n \n \n On the parallel relay wire-tap network.\n \n \n \n\n\n \n\n\n\n In Communication, Control, and Computing (Allerton), 2011 49th Annual Allerton Conference on, pages 418-425, Sept 2011. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{6120197,\n abstract = {Information-theoretic secrecy is studied for a parallel relay (diamond) network, in which a transmitter wishes to communicate to a receiver through two relay nodes. While there is no direct link between the transmitter and receiver and all flow of information has to be transmitted through the relays, the message has to be kept secret from each of them. The exact secrecy capacity is characterized for the network under the linear deterministic model. The problem is then studied when each terminal is equipped with multiple antennas, and the channels are parallel Gaussian links. Lower and upper bounds for the secrecy capacity are derived, and the gap is bounded by a constant independent of the channel parameters and SNR. This results in an approximate characterization for the secrecy capacity of the parallel Gaussian diamond network.},\n author = {Mohajer, S. and Diggavi, S.N. and Poor, H.V. and Shamai, S.},\n booktitle = {Communication, Control, and Computing (Allerton), 2011 49th Annual Allerton Conference on},\n doi = {10.1109/Allerton.2011.6120197},\n file = {:papers:parallel_wiretap.pdf},\n month = {Sept},\n pages = {418-425},\n tags = {conf,IT,WiNetSec,WiNet},\n title = {On the parallel relay wire-tap network},\n type = {4},\n year = {2011}\n}\n\n
\n
\n\n\n
\n Information-theoretic secrecy is studied for a parallel relay (diamond) network, in which a transmitter wishes to communicate to a receiver through two relay nodes. While there is no direct link between the transmitter and receiver and all flow of information has to be transmitted through the relays, the message has to be kept secret from each of them. The exact secrecy capacity is characterized for the network under the linear deterministic model. The problem is then studied when each terminal is equipped with multiple antennas, and the channels are parallel Gaussian links. Lower and upper bounds for the secrecy capacity are derived, and the gap is bounded by a constant independent of the channel parameters and SNR. This results in an approximate characterization for the secrecy capacity of the parallel Gaussian diamond network.\n
\n\n\n
\n\n\n
\n \n\n \n \n A Khisti; and S.N. Diggavi.\n\n\n \n \n \n \n A remark on secret-key generation over correlated fading channels.\n \n \n \n\n\n \n\n\n\n In GLOBECOM Workshops (GC Wkshps), 2011 IEEE, pages 864-868, Dec 2011. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{6162578,\n abstract = {We study secret-key agreement with public discussion over a flat-fading wiretap channel model. The fading gains are correlated across the receivers and sampled independently at each time. Perfect receiver channel state information (CSI) is assumed, whereas a noisy CSI of the main channel is also available to the transmitter. We propose lower and upper bounds on the capacity. Our lower bound is achieved by a coding scheme that involves a separate binning of the receiver CSI sequence and its channel output sequence. In general it improves upon the joint-binning schemes considered in earlier works. Our upper and lower bounds coincide, establishing the capacity, when either the transmitter has no CSI or when the channel gains of the legitimate receiver and the eavesdropper are statistically independent.},\n author = {Khisti, A and Diggavi, S.N.},\n booktitle = {GLOBECOM Workshops (GC Wkshps), 2011 IEEE},\n doi = {10.1109/GLOCOMW.2011.6162578},\n file = {:papers:remark_secret_keygen.pdf},\n month = {Dec},\n pages = {864-868},\n tags = {conf,WiNetSec,IT},\n title = {A remark on secret-key generation over correlated fading channels},\n type = {4},\n year = {2011}\n}\n\n
\n
\n\n\n
\n We study secret-key agreement with public discussion over a flat-fading wiretap channel model. The fading gains are correlated across the receivers and sampled independently at each time. Perfect receiver channel state information (CSI) is assumed, whereas a noisy CSI of the main channel is also available to the transmitter. We propose lower and upper bounds on the capacity. Our lower bound is achieved by a coding scheme that involves a separate binning of the receiver CSI sequence and its channel output sequence. In general it improves upon the joint-binning schemes considered in earlier works. Our upper and lower bounds coincide, establishing the capacity, when either the transmitter has no CSI or when the channel gains of the legitimate receiver and the eavesdropper are statistically independent.\n
\n\n\n
\n\n\n
\n \n\n \n \n Dominique Tschopp; Suhas Diggavi; Payam Delgosha; and Soheil Mohajer.\n\n\n \n \n \n \n Randomized algorithms for comparison-based search.\n \n \n \n\n\n \n\n\n\n In Advances in Neural Information Processing Systems, pages 2231–2239, Dec 2011. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{tschopp2011randomized,\n author = {Tschopp, Dominique and Diggavi, Suhas and Delgosha, Payam and Mohajer, Soheil},\n booktitle = {Advances in Neural Information Processing Systems},\n file = {:papers:rand_alg_search.pdf},\n month = {Dec},\n pages = {2231--2239},\n tags = {conf,CSalgo,DynamWiNet},\n title = {Randomized algorithms for comparison-based search},\n type = {4},\n year = {2011}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n\n\n\n
\n
\n\n
\n
\n  \n 2010\n \n \n (2)\n \n \n
\n
\n \n \n
\n
\n  \n 2\n \n \n (3)\n \n \n
\n
\n \n \n
\n \n\n \n \n L. Keller; M. Jafarisiavoshani; C. Fragouli; A. Argyraki; and S N. Diggavi.\n\n\n \n \n \n \n Joint identity-message coding for sensor networks.\n \n \n \n\n\n \n\n\n\n IEEE Journal on Selected Areas in Communications, 28(7): 1083–1093. September 2010.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{KJFADj10,\n abstract = {In a significant class of sensor-network applications,\nthe identities of the reporting sensors constitute the bulk of\nthe communicated data, whereas the message itself can be as\nsmall as a single bit. or to track incremental environmental changes at fixed\nlocations. In such scenarios, the traditional network-protocol\nparadigm of separately specifying the source identity and the\nmessage in distinct fields leads to inefficient communication.\nThis work addresses the question of how communication\nshould happen in such identity-aware sensor networks.},\n author = {L. Keller and M. Jafarisiavoshani and  C. Fragouli and A. Argyraki and S N. Diggavi},\n file = {:papers:jmfdnoncoherent10.pdf},\n journal = {IEEE Journal on Selected Areas in Communications},\n month = {September},\n note = {},\n number = {7},\n pages = {1083--1093},\n tags = {journal,SensNet,IDmsg,NetCod},\n title = {Joint identity-message coding for sensor networks},\n type = {2},\n volume = {28},\n year = {2010}\n}\n\n
\n
\n\n\n
\n In a significant class of sensor-network applications, the identities of the reporting sensors constitute the bulk of the communicated data, whereas the message itself can be as small as a single bit. or to track incremental environmental changes at fixed locations. In such scenarios, the traditional network-protocol paradigm of separately specifying the source identity and the message in distinct fields leads to inefficient communication. This work addresses the question of how communication should happen in such identity-aware sensor networks.\n
\n\n\n
\n\n\n
\n \n\n \n \n Y. Li; C. Tian; S N. Diggavi; M. Chiang; and A. R. Calderbank.\n\n\n \n \n \n \n Network Resource Allocation for Competing Multiple-Description Transmissions.\n \n \n \n\n\n \n\n\n\n IEEE Transactions on Communications, 58(5): 1493–1504. MAY 2010.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{LTDCCj10,\n abstract = {We study end-to-end network utility maximization (NUM) approach to allocate\nresources to multiple flows, each encoding multiple description data compression streams,\nby taking into account the end-to-end distortion measures.},\n author = {Y. Li and C. Tian and S N. Diggavi and M. Chiang and  A. R. Calderbank},\n file = {:papers:competingmd_final.pdf},\n journal = {IEEE Transactions on Communications},\n month = {MAY},\n note = {},\n number = {5},\n pages = {1493--1504},\n tags = {journal,MDnum,NDC,MDC},\n title = {Network Resource Allocation for Competing Multiple-Description Transmissions},\n type = {2},\n volume = {58},\n year = {2010}\n}\n\n
\n
\n\n\n
\n We study end-to-end network utility maximization (NUM) approach to allocate resources to multiple flows, each encoding multiple description data compression streams, by taking into account the end-to-end distortion measures.\n
\n\n\n
\n\n\n
\n \n\n \n \n S. Mohajer; C. Tian; and S N. Diggavi.\n\n\n \n \n \n \n \n Asymmetric Multilevel Diversity Coding and Gaussian Multiple Descriptions.\n \n \n \n \n\n\n \n\n\n\n IEEE Transactions on Information Theory, 9: 4367-4387. September 2010.\n \n\n\n\n
\n\n\n\n \n \n \"Asymmetric arxiv\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{MTDj10a,\n abstract = {This paper introduces the asymmetric multi-level lossless data compression\nproblem and gives a complete characterization for the three-description version. It then\nuses insights from this characterization to provide an approximate characterization for\nthe 3-description asymmetric multiple description problem.},\n author = {S. Mohajer and C. Tian and S N. Diggavi},\n file = {:papers:asymmd.pdf},\n journal = {IEEE Transactions on Information Theory},\n month = {September},\n note = {},\n pages = {4367-4387},\n tags = {journal,AsymMDapprox,ApproxIT,NDC,MDapprox,IT},\n title = {Asymmetric Multilevel Diversity Coding and  Gaussian Multiple Descriptions},\n type = {2},\n url_arxiv = {http://arxiv.org/abs/0911.2346},\n volume = {9},\n year = {2010}\n}\n\n
\n
\n\n\n
\n This paper introduces the asymmetric multi-level lossless data compression problem and gives a complete characterization for the three-description version. It then uses insights from this characterization to provide an approximate characterization for the 3-description asymmetric multiple description problem.\n
\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 4\n \n \n (13)\n \n \n
\n
\n \n \n
\n \n\n \n \n U. Niesen; and S. Diggavi.\n\n\n \n \n \n \n Non-coherent hierarchical cooperation.\n \n \n \n\n\n \n\n\n\n In Communication, Control, and Computing (Allerton), 2010 48th Annual Allerton Conference on, pages 507-513, Sept 2010. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{5706949,\n abstract = {Hierarchical cooperation is a communication strategy introduced recently by Özgür et al., where it was shown to significantly outperform standard multi-hop communication in some wireless scenarios. To achieve this gain over multi-hop communication, full availability of channel state information at all the nodes in the network is required. In this paper, we investigate the impact of absence of channel state information on the performance of hierarchical cooperation. If the product of coherence time and coherence bandwidth of the wireless channel is on the order of the number of nodes in the network, we show that non-coherent hierarchical cooperation achieves the same order rate as the coherent version. If the product is smaller than the number of nodes, we show that non-coherent hierarchical cooperation can still yield sizable gains over multihop communication, but may not achieve the same order rate as the coherent version.},\n author = {Niesen, U. and Diggavi, S.},\n booktitle = {Communication, Control, and Computing (Allerton), 2010 48th Annual Allerton Conference on},\n doi = {10.1109/ALLERTON.2010.5706949},\n month = {Sept},\n pages = {507-513},\n tags = {conf,WiNet,IT},\n title = {Non-coherent hierarchical cooperation},\n type = {4},\n year = {2010}\n}\n\n
\n
\n\n\n
\n Hierarchical cooperation is a communication strategy introduced recently by Özgür et al., where it was shown to significantly outperform standard multi-hop communication in some wireless scenarios. To achieve this gain over multi-hop communication, full availability of channel state information at all the nodes in the network is required. In this paper, we investigate the impact of absence of channel state information on the performance of hierarchical cooperation. If the product of coherence time and coherence bandwidth of the wireless channel is on the order of the number of nodes in the network, we show that non-coherent hierarchical cooperation achieves the same order rate as the coherent version. If the product is smaller than the number of nodes, we show that non-coherent hierarchical cooperation can still yield sizable gains over multihop communication, but may not achieve the same order rate as the coherent version.\n
\n\n\n
\n\n\n
\n \n\n \n \n M.J. Siavoshani; C. Fragouli; S. Diggavi; U. Pulleti; and K. Argyraki.\n\n\n \n \n \n \n Group secret key generation over broadcast erasure channels.\n \n \n \n\n\n \n\n\n\n In Signals, Systems and Computers (ASILOMAR), 2010 Conference Record of the Forty Fourth Asilomar Conference on, pages 719-723, Nov 2010. \n \n\n\n\n
\n\n\n\n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{5757657,\n abstract = {We consider a group of m trusted nodes that aim to create a shared secret key K over a wireless channel in the presence an eavesdropper Eve. We assume an erasure broadcast channel from one of the honest nodes to the rest of them including Eve. All of the trusted nodes can also discuss over a cost-free public channel which is observed by Eve. For this setup we characterize the secret key generation capacity and propose an achievability scheme that is computationally efficient and employs techniques from network coding. Surprisingly, whether we have m = 2 nodes, or an arbitrary number m of nodes, we can establish a shared secret key among them at the same rate, independently of m.},\n author = {Siavoshani, M.J. and Fragouli, C. and Diggavi, S. and Pulleti, U. and Argyraki, K.},\n booktitle = {Signals, Systems and Computers (ASILOMAR), 2010 Conference Record of the Forty Fourth Asilomar Conference on},\n doi = {10.1109/ACSSC.2010.5757657},\n issn = {1058-6393},\n month = {Nov},\n pages = {719-723},\n tags = {conf,IT,WiNetSec},\n title = {Group secret key generation over broadcast erasure channels},\n type = {4},\n year = {2010}\n}\n\n
\n
\n\n\n
\n We consider a group of m trusted nodes that aim to create a shared secret key K over a wireless channel in the presence an eavesdropper Eve. We assume an erasure broadcast channel from one of the honest nodes to the rest of them including Eve. All of the trusted nodes can also discuss over a cost-free public channel which is observed by Eve. For this setup we characterize the secret key generation capacity and propose an achievability scheme that is computationally efficient and employs techniques from network coding. Surprisingly, whether we have m = 2 nodes, or an arbitrary number m of nodes, we can establish a shared secret key among them at the same rate, independently of m.\n
\n\n\n
\n\n\n
\n \n\n \n \n M. Jafarisiavoshani; C. Fragouli; S N. Diggavi; U. Pulleti; and K. Argyraki.\n\n\n \n \n \n \n Group secret key generation over broadcast erasure channels (invited talk).\n \n \n \n\n\n \n\n\n\n In Proc. Asilomar Conference on Signals, Systems and Computers, Pacific Grove, CA, November 2010. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{JFDPA10,\n author = {M. Jafarisiavoshani and C. Fragouli and S N. Diggavi and U. Pulleti and K. Argyraki},\n booktitle = {Proc. Asilomar Conference on Signals, Systems and  Computers, Pacific Grove, CA},\n month = {November},\n note = {},\n pages = {},\n tags = {conf},\n title = {Group secret key generation over broadcast erasure channels (invited talk)},\n type = {4},\n year = {2010}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n S. Mohajer; and S N. Diggavi.\n\n\n \n \n \n \n Gaussian diamond network with adversarial jammer.\n \n \n \n\n\n \n\n\n\n In IEEE Information Theory Workshop (ITW), Dublin, Ireland, pages 1–5, September 2010. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{MDc10a,\n abstract = {We study the problem where there is a single adversarial node which injects\nsignals to disrupt this communication in a parallel relay network. Like the source, it can\nonly influence the destination through the relays. We develop\nan approximate characterization of the reliable transmission\nrate in the presence of such an adversary. A deterministic version\nof the same problem is solved exactly, yielding insights which are\nused in the approximate characterization.},\n author = {S. Mohajer and S N. Diggavi},\n booktitle = {IEEE Information Theory Workshop (ITW), Dublin, Ireland},\n file = {:papers:md_itw10.pdf},\n month = {September},\n note = {},\n pages = {1--5},\n tags = {conf,DetApprox,WiNet,IT,WiNetInfFlow,WiNetErrCorr,Byzantine,SelConf},\n title = {Gaussian diamond network with adversarial jammer},\n type = {4},\n year = {2010}\n}\n\n
\n
\n\n\n
\n We study the problem where there is a single adversarial node which injects signals to disrupt this communication in a parallel relay network. Like the source, it can only influence the destination through the relays. We develop an approximate characterization of the reliable transmission rate in the presence of such an adversary. A deterministic version of the same problem is solved exactly, yielding insights which are used in the approximate characterization.\n
\n\n\n
\n\n\n
\n \n\n \n \n S. Mohajer; C. Tian; and S.N. Diggavi.\n\n\n \n \n \n \n On source transmission over deterministic relay networks.\n \n \n \n\n\n \n\n\n\n In IEEE Information Theory Workshop (ITW) Cairo, January 2010. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{MTDp10,\n abstract = {Lossless transmission of a set of correlated sources\nover a deterministic relay network is considered for two traffic\nrequirements. In distributed multicast, the set of sources are\nto be delivered to a set of destinations. The source exchange\nrequires all the nodes with access to sources to be able to\nreconstruct all other sources observed at other nodes. We develop\nachievable regions and outer bounds for both these situations. For\nlinear deterministic networks, these bounds coincide, yielding a\ncharacterization.},\n author = {S. Mohajer and C. Tian and S.N. Diggavi},\n booktitle = {IEEE Information Theory Workshop (ITW) Cairo},\n file = {:papers:mtd_itw10_final.pdf},\n month = {January},\n note = {},\n pages = {},\n tags = {conf,DetApprox,ITapprox,WiNet,IT,WiNetInfFlow,SrcChan,SrcChanSep,NDC,InfExch,SelConf},\n title = {On source transmission over deterministic relay networks},\n type = {4},\n year = {2010}\n}\n\n
\n
\n\n\n
\n Lossless transmission of a set of correlated sources over a deterministic relay network is considered for two traffic requirements. In distributed multicast, the set of sources are to be delivered to a set of destinations. The source exchange requires all the nodes with access to sources to be able to reconstruct all other sources observed at other nodes. We develop achievable regions and outer bounds for both these situations. For linear deterministic networks, these bounds coincide, yielding a characterization.\n
\n\n\n
\n\n\n
\n \n\n \n \n U. Niesen; and S N. Diggavi.\n\n\n \n \n \n \n Non-Coherent Hierarchical Cooperation.\n \n \n \n\n\n \n\n\n\n In Proceedings of Allerton Conference on Communication, Control, and Computing, Illinois, September 2010. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{NDc10,\n abstract = {Hierarchical cooperation, introduced by Ozgur, Leveque and Tse showed\nthat linear scaling is possible in wireless network capacity, asymptotically in network size.\nIn this paper, we investigate the impact of absence of channel state information\non the performance of hierarchical cooperation. If the product\nof coherence time and coherence bandwidth of the wireless\nchannel is on the order of the number of nodes in the network,\nwe show that non-coherent hierarchical cooperation achieves\nthe same order rate as the coherent version. If the product is\nsmaller than the number of nodes, we show that non-coherent\nhierarchical cooperation can still yield sizable gains over multihop\ncommunication, but may not achieve the same order rate\nas the coherent version.},\n author = {U. Niesen and S N. Diggavi},\n booktitle = {Proceedings of Allerton Conference on Communication, Control, and Computing, Illinois},\n file = {:papers:ndallerton10final.pdf},\n month = {September},\n note = {},\n pages = {},\n tags = {conf,WiNet,DynamWiNet,NonCohComm,SelConf},\n title = {Non-Coherent Hierarchical Cooperation},\n type = {4},\n year = {2010}\n}\n\n
\n
\n\n\n
\n Hierarchical cooperation, introduced by Ozgur, Leveque and Tse showed that linear scaling is possible in wireless network capacity, asymptotically in network size. In this paper, we investigate the impact of absence of channel state information on the performance of hierarchical cooperation. If the product of coherence time and coherence bandwidth of the wireless channel is on the order of the number of nodes in the network, we show that non-coherent hierarchical cooperation achieves the same order rate as the coherent version. If the product is smaller than the number of nodes, we show that non-coherent hierarchical cooperation can still yield sizable gains over multihop communication, but may not achieve the same order rate as the coherent version.\n
\n\n\n
\n\n\n
\n \n\n \n \n A. Ozgur; and S N. Diggavi.\n\n\n \n \n \n \n \n Approximately achieving Gaussian relay network capacity with lattice codes.\n \n \n \n \n\n\n \n\n\n\n In Proc. of IEEE ISIT 2010, Austin, Texas, pages 669–673, June 2010. \n \n\n\n\n
\n\n\n\n \n \n \"Approximately arxiv\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{ODp10,\n abstract = {An approximate max-flow min-cut result for arbitrary wireless relay\nnetwork was recently established using Gaussian codebooks for\ntransmission and random mappings at the relays. In this paper,\nwe show that the approximation result can be established\nby using lattices for transmission and quantization along with\nstructured mappings at the relays. This also extended the original scalar quantizer\nanalysis to vector quantizers and obtained a slightly better approximation constant.},\n author = {A. Ozgur and S N. Diggavi},\n booktitle = {Proc. of IEEE ISIT 2010, Austin, Texas},\n file = {:papers:od_isit10.pdf},\n month = {June},\n note = {},\n pages = {669--673},\n tags = {conf,DetApprox,ITapprox,WiNet,IT,WiNetInfFlow,SelConf,LatticeChan},\n title = {Approximately achieving Gaussian relay network capacity with lattice codes},\n type = {4},\n url_arxiv = {http://arxiv.org/abs/1005.1284},\n year = {2010}\n}\n\n
\n
\n\n\n
\n An approximate max-flow min-cut result for arbitrary wireless relay network was recently established using Gaussian codebooks for transmission and random mappings at the relays. In this paper, we show that the approximation result can be established by using lattices for transmission and quantization along with structured mappings at the relays. This also extended the original scalar quantizer analysis to vector quantizers and obtained a slightly better approximation constant.\n
\n\n\n
\n\n\n
\n \n\n \n \n E. Perron; S N. Diggavi; and I E. Telatar.\n\n\n \n \n \n \n On information theoretic secrecy for networks.\n \n \n \n\n\n \n\n\n\n In International Zurich Seminar on Communications (IZS), March 2010. \n Invited paper surveying our results on wireless relay network secrecy.\n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{PDTc10a,\n author = {E. Perron and S N. Diggavi and I E. Telatar},\n booktitle = {International Zurich Seminar on Communications (IZS)},\n file = {:papers:pdtizs10.pdf},\n label = {pdt_c10a},\n month = {March},\n note = {Invited paper surveying our results on wireless relay network secrecy.},\n pages = {},\n tags = {conf,ITsecrecy,WiNet,IT,WiNetInfFlow,SelConf},\n title = {On information theoretic secrecy for networks},\n type = {4},\n year = {2010}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n E. Perron; S N. Diggavi; and I E. Telatar.\n\n\n \n \n \n \n On cooperative secrecy for discrete memoryless relay networks.\n \n \n \n\n\n \n\n\n\n In Proc. of IEEE ISIT 2010, Austin, Texas, pages 2573 - 2577, June 2010. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{PDTc10b,\n abstract = {In this paper we consider information-theoretically\nsecure communication between two special nodes (“source” and\n“destination”) in a memoryless network with authenticated relays,\nwhere the secrecy is with respect to a class of eavesdroppers.\nWe develop achievable secrecy rates when authenticated relays\nalso help increase secrecy rate by inserting noise into the network.},\n author = {E. Perron and S N. Diggavi and I E. Telatar},\n booktitle = {Proc. of IEEE ISIT 2010, Austin, Texas},\n file = {:papers:pdtisit10.pdf},\n label = {pdt_c10b},\n month = {June},\n note = {},\n pages = {2573 - 2577},\n tags = {conf,ITsecrecy,WiNet,IT,WiNetInfFlow,SelConf},\n title = {On cooperative secrecy for discrete memoryless relay networks},\n type = {4},\n year = {2010}\n}\n\n
\n
\n\n\n
\n In this paper we consider information-theoretically secure communication between two special nodes (“source” and “destination”) in a memoryless network with authenticated relays, where the secrecy is with respect to a class of eavesdroppers. We develop achievable secrecy rates when authenticated relays also help increase secrecy rate by inserting noise into the network.\n
\n\n\n
\n\n\n
\n \n\n \n \n C. Tian; J. Chen; S N. Diggavi; and S. Shamai.\n\n\n \n \n \n \n Optimality and approximate optimality of source-channel separation in networks.\n \n \n \n\n\n \n\n\n\n In Proc. of IEEE ISIT 2010, Austin, Texas, pages 495–499, June 2010. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{TCDSc10a,\n author = {C. Tian and  J. Chen and S N. Diggavi and S. Shamai},\n booktitle = {Proc. of IEEE ISIT 2010, Austin, Texas},\n month = {June},\n note = {},\n pages = {495--499},\n tags = {conf,SrcChan,ITapprox,NDC,IT},\n title = {Optimality and approximate optimality of source-channel \nseparation in networks},\n type = {4},\n year = {2010}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n C. Tian; J. Chen; S N. Diggavi; and S. Shamai.\n\n\n \n \n \n \n On source-channel separation in networks.\n \n \n \n\n\n \n\n\n\n In International Conference on Signal Processing and Communications (SPCOM), pages 1–5, June 2010. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{TCDSc10b,\n abstract = {We consider the source-channel separation architecture\nfor lossy source coding in communication networks. It\nis shown that the separation approach is optimal when the\nmemoryless sources at source nodes are arbitrarily correlated,\neach of which is to be reconstructed at possibly multiple\ndestinations within certain distortions, and the channels in this\nnetwork are synchronized, orthogonal and memoryless (i.e., noisy\ngraphs).},\n author = {C. Tian and  J. Chen and S N. Diggavi and S. Shamai},\n booktitle = {International Conference on Signal Processing and Communications (SPCOM)},\n file = {:papers:tcdsspcom10.pdf},\n month = {June},\n note = {},\n pages = {1--5},\n tags = {conf,SrcChan,ITapprox,NDC,IT,SelConf},\n title = {On source-channel separation in networks},\n type = {4},\n year = {2010}\n}\n\n
\n
\n\n\n
\n We consider the source-channel separation architecture for lossy source coding in communication networks. It is shown that the separation approach is optimal when the memoryless sources at source nodes are arbitrarily correlated, each of which is to be reconstructed at possibly multiple destinations within certain distortions, and the channels in this network are synchronized, orthogonal and memoryless (i.e., noisy graphs).\n
\n\n\n
\n\n\n
\n \n\n \n \n D. Tschopp; and S N. Diggavi.\n\n\n \n \n \n \n \n Facebrowsing: Search and navigation through comparisons.\n \n \n \n \n\n\n \n\n\n\n In Information Theory and Applications workshop (ITA), UCSD, San Diego, California, pages 1–10, February 2010. \n \n\n\n\n
\n\n\n\n \n \n \"Facebrowsing: arxiv\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{TDc10,\n abstract = {This explores ideas of nearest neighbor search through comparisons. \nThe problem is motivated by the problem of navigating an image database with human\nassistance. We develop both theoretical bounds, provable algorithms and preliminary\nexperimental results.},\n author = {D. Tschopp and S N. Diggavi,},\n booktitle = {Information Theory and Applications workshop (ITA), UCSD, San Diego, California},\n file = {:papers:td_ita2010_final.pdf},\n month = {February},\n note = {},\n pages = {1--10},\n tags = {conf,CSalgo,MetricEmb,MClearning,SelConf},\n title = {Facebrowsing: Search and navigation through comparisons},\n type = {4},\n url_arxiv = {http://arxiv.org/abs/0909.2194},\n year = {2010}\n}\n\n
\n
\n\n\n
\n This explores ideas of nearest neighbor search through comparisons. The problem is motivated by the problem of navigating an image database with human assistance. We develop both theoretical bounds, provable algorithms and preliminary experimental results.\n
\n\n\n
\n\n\n
\n \n\n \n \n C. Tian; S N. Diggavi; and S. Shamai.\n\n\n \n \n \n \n The achievable distortion region of bivariate Gaussian source on Gaussian broadcast channel.\n \n \n \n\n\n \n\n\n\n In Proc. of IEEE ISIT 2010, Austin, Texas, pages 146–150, June 2010. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{TDSc10a,\n author = {C. Tian and  S N. Diggavi and S. Shamai},\n booktitle = {Proc. of IEEE ISIT 2010, Austin, Texas},\n month = {June},\n note = {},\n pages = {146--150},\n tags = {conf,SrcChan,NDC,IT},\n title = {The achievable distortion region of bivariate Gaussian source on \nGaussian broadcast channel},\n type = {4},\n year = {2010}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n\n\n\n
\n
\n\n
\n
\n  \n 2009\n \n \n (2)\n \n \n
\n
\n \n \n
\n
\n  \n 2\n \n \n (5)\n \n \n
\n
\n \n \n
\n \n\n \n \n J. Chen; C. Tian; and S N. Diggavi.\n\n\n \n \n \n \n Multiple Description Coding for Stationary Sources.\n \n \n \n\n\n \n\n\n\n IEEE Transactions on Information Theory, 55(6): 2868–2881. June 2009.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{CTDj10,\n abstract = {We characterize the rate region of the two-description multiple description coding for stationary Gaussian sources under the squared error distortion measure.},\n author = {J. Chen and C. Tian and  S N. Diggavi},\n file = {:papers:it_mdstationary_submitted.pdf},\n journal = {IEEE Transactions on Information Theory},\n month = {June},\n note = {},\n number = {6},\n pages = {2868--2881},\n tags = {journal,StatMDC,NDC,IT,MDC},\n title = {Multiple Description Coding for Stationary Sources},\n type = {2},\n volume = {55},\n year = {2009}\n}\n\n
\n
\n\n\n
\n We characterize the rate region of the two-description multiple description coding for stationary Gaussian sources under the squared error distortion measure.\n
\n\n\n
\n\n\n
\n \n\n \n \n J. Goseling; C. Fragouli; and S N. Diggavi.\n\n\n \n \n \n \n Network Coding for Undirected Information Exchange.\n \n \n \n\n\n \n\n\n\n IEEE Communication Letters, 13(1): 25–27. January 2009.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{GFDj09,\n author = {J. Goseling and C. Fragouli and S N. Diggavi},\n journal = {IEEE Communication Letters},\n month = {January},\n note = {},\n number = {1},\n pages = {25--27},\n tags = {journal,InfExch,NetCod},\n title = {Network Coding for Undirected Information Exchange},\n type = {2},\n volume = {13},\n year = {2009}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n K M Z. Islam; P. Rabiei; N. Al-Dhahir; S N. Diggavi; and A R. Calderbank.\n\n\n \n \n \n \n Linear Diversity-Embedding STBC : Systems Issues and Applications.\n \n \n \n\n\n \n\n\n\n IEEE Transactions on Communications, 57(6): 1578–1583. June 2009.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{IRADC09,\n author = {K M Z. Islam and P. Rabiei and N. Al-Dhahir and S N. Diggavi and A R. Calderbank},\n file = {:papers:tcommdivembfinal.pdf},\n journal = {IEEE Transactions on Communications},\n month = {June},\n note = {},\n number = {6},\n pages = {1578--1583},\n tags = {journal,DivEmb,OppComm,STcodes},\n title = {Linear Diversity-Embedding STBC : Systems Issues and Applications},\n type = {2},\n volume = {57},\n year = {2009}\n}\n\n
\n
\n\n\n\n
\n\n\n \n\n\n
\n \n\n \n \n C. Tian; S. Mohajer; and S N. Diggavi.\n\n\n \n \n \n \n \n Approximating the Gaussian Multiple Description Rate Region Under Symmetric Distortion.\n \n \n \n \n\n\n \n\n\n\n IEEE Transactions on Information Theory, 55(8): 3869–3891. August 2009.\n \n\n\n\n
\n\n\n\n \n \n \"Approximating arxiv\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{TMDj09a,\n abstract = {Approximately solves symmetric Gaussian multiple description problem to within a bit, by sandwiching the MD rate region between two polytopes separated by at most a fraction of a bit.},\n author = {C. Tian and S. Mohajer and  S N. Diggavi},\n file = {:papers:approximatemdregion.pdf},\n journal = {IEEE Transactions on Information Theory},\n label = {tmdj09a},\n month = {August},\n note = {},\n number = {8},\n pages = {3869--3891},\n tags = {journal,SymmMDapprox,ApproxIT,NDC,MDapprox,IT},\n title = {Approximating the Gaussian Multiple Description Rate Region Under Symmetric Distortion},\n type = {2},\n url_arxiv = {http://arxiv.org/abs/0810.3631},\n volume = {55},\n year = {2009}\n}\n\n
\n
\n\n\n
\n Approximately solves symmetric Gaussian multiple description problem to within a bit, by sandwiching the MD rate region between two polytopes separated by at most a fraction of a bit.\n
\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 4\n \n \n (15)\n \n \n
\n
\n \n \n
\n \n\n \n \n M. Jafarisiavoshani; C. Fragouli; and S N. Diggavi.\n\n\n \n \n \n \n Code construction for multiple sources network coding.\n \n \n \n\n\n \n\n\n\n In ACM MobiHoc S3 '09: Proceedings of the 2009 MobiHoc S3 workshop on MobiHoc S3,New Orleans, Louisiana, pages 21–24, May 2009. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{JFDj09,\n author = {M. Jafarisiavoshani and  C. Fragouli and S N. Diggavi},\n booktitle = {ACM MobiHoc S3 '09: Proceedings of the 2009 MobiHoc S3 workshop on MobiHoc S3,New Orleans, Louisiana},\n month = {May},\n note = {},\n pages = {21--24},\n tags = {conf,NonCohComm,NetCod,Subsp,CodTh},\n title = {Code construction for multiple sources network coding},\n type = {4},\n year = {2009}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n M. Jafarisiavoshani; L. Keller; A. Argyraki; C. Fragouli; and S N. Diggavi.\n\n\n \n \n \n \n Identity aware sensor networks.\n \n \n \n\n\n \n\n\n\n In IEEE INFOCOM 2009, Rio de Janeiro, Brazil, pages 2177–2185, April 2009. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{JKAFDp09,\n author = {M. Jafarisiavoshani and L. Keller and A. Argyraki and C. Fragouli and S N. Diggavi},\n booktitle = {IEEE INFOCOM 2009, Rio de Janeiro, Brazil},\n month = {April},\n note = {},\n pages = {2177--2185},\n tags = {conf,SensNet,IDmsg,NetCod},\n title = {Identity aware sensor networks},\n type = {4},\n year = {2009}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n M. Jafarisiavoshani; S. Mohajer; C. Fragouli; and S N. Diggavi.\n\n\n \n \n \n \n On the Capacity of Non-Coherent Network Coding.\n \n \n \n\n\n \n\n\n\n In IEEE International Symposium on Information Theory (ISIT), Seoul, Korea, pages 273–277, June 2009. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{JMFDj09,\n author = {M. Jafarisiavoshani and S. Mohajer and C. Fragouli and S N. Diggavi},\n booktitle = {IEEE International Symposium on Information Theory (ISIT), Seoul, Korea},\n month = {June},\n note = {},\n pages = {273--277},\n tags = {conf,NonCohComm,NetCod,Subsp,IT},\n title = {On the Capacity of Non-Coherent Network Coding},\n type = {4},\n year = {2009}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n A. Khisti; S N. Diggavi; and G W. Wornell.\n\n\n \n \n \n \n Secret key agreement using asymmetry in channel state knowledge.\n \n \n \n\n\n \n\n\n\n In IEEE International Symposium on Information Theory (ISIT), Seoul, Korea, pages 2286–2290, June 2009. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{KTWj09,\n author = {A. Khisti and S N. Diggavi and G W. Wornell},\n booktitle = {IEEE International Symposium on Information Theory (ISIT), Seoul, Korea},\n month = {June},\n note = {},\n pages = {2286--2290},\n tags = {conf,ITsecrecy,KeyGen,IT,WiNetSec},\n title = {Secret key agreement using asymmetry in channel state knowledge},\n type = {4},\n year = {2009}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n S. Mohajer; S N. Diggavi; C. Fragouli; and D. Tse.\n\n\n \n \n \n \n Capacity of Deterministic Z-Chain Relay-Interference Network.\n \n \n \n\n\n \n\n\n\n In IEEE Information Theory Workshop (ITW), Volos, Greece, pages 331–335, June 2009. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{MDFSj09,\n author = {S. Mohajer and S N. Diggavi and C. Fragouli and D. Tse},\n booktitle = {IEEE Information Theory Workshop (ITW), Volos, Greece},\n month = {June},\n note = {},\n pages = {331--335},\n tags = {conf,DetApprox,ITapprox,WiNet,IT,WiNetInfFlow,RelayInt},\n title = {Capacity of Deterministic Z-Chain Relay-Interference Network},\n type = {4},\n year = {2009}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n S. Mohajer; and S N. Diggavi.\n\n\n \n \n \n \n Deterministic approach to wireless network error correction.\n \n \n \n\n\n \n\n\n\n In IEEE Information Theory Workshop (ITW), Volos, Greece, pages 5–9, June 2009. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{MDj09,\n author = {S. Mohajer and S N. Diggavi},\n booktitle = {IEEE Information Theory Workshop (ITW), Volos, Greece},\n month = {June},\n note = {},\n pages = {5--9},\n tags = {conf,DetApprox,WiNet,IT,WiNetInfFlow,WiNetErrCorr,Byzantine},\n title = {Deterministic approach to wireless network error correction},\n type = {4},\n year = {2009}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n S. Mohajer; S N. Diggavi; and D. Tse.\n\n\n \n \n \n \n Approximate Capacity of a Class of Gaussian Relay-Interference Networks.\n \n \n \n\n\n \n\n\n\n In IEEE International Symposium on Information Theory (ISIT), Seoul, Korea, pages 31–35, June 2009. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{MDTj09,\n author = {S. Mohajer and S N. Diggavi and D. Tse},\n booktitle = {IEEE International Symposium on Information Theory (ISIT), Seoul, Korea},\n month = {June},\n note = {},\n pages = {31--35},\n tags = {conf,DetApprox,ITapprox,WiNet,IT,WiNetInfFlow,RelayInt,LatticeChan},\n title = {Approximate Capacity of a Class of Gaussian Relay-Interference Networks},\n type = {4},\n year = {2009}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n S. Mohajer; M. Jafarisiavoshani; S N. Diggavi; ; and C. Fragouli.\n\n\n \n \n \n \n On the Capacity of Multisource Non-Coherent Network Coding.\n \n \n \n\n\n \n\n\n\n In IEEE Information Theory Workshop (ITW), Volos, Greece, pages 130–134, June 2009. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{MJDFj09,\n author = {S. Mohajer and M. Jafarisiavoshani and S N. Diggavi and and C. Fragouli},\n booktitle = {IEEE Information Theory Workshop (ITW), Volos, Greece},\n month = {June},\n note = {},\n pages = {130--134},\n tags = {conf,NonCohComm,NetCod,Subsp,IT},\n title = {On the Capacity of Multisource Non-Coherent Network Coding},\n type = {4},\n year = {2009}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n E. Perron; S N. Diggavi; and E. Telatar.\n\n\n \n \n \n \n On noise insertion strategies for wireless network secrecy.\n \n \n \n\n\n \n\n\n\n In Information Theory and Applications workshop (ITA), UCSD, San Diego, California, pages 77–84, February 2009. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{PDTc09d,\n abstract = {This paper studies the idea of noise insertion by authenticated relays through friendly jamming. We develop the secrecy rate achievable in arbitrary (deterministic) networks when there are relays actively helping secrecy.},\n author = {E. Perron and S N. Diggavi and E. Telatar,},\n booktitle = {Information Theory and Applications workshop (ITA), UCSD, San Diego, California},\n file = {:papers:pdtita09final.pdf},\n label = {pdtc09d},\n month = {February},\n note = {},\n pages = {77--84},\n tags = {conf,ITsecrecy,IT,WiNetSec,WiNetInfFlow,ITapprox,WiNet},\n title = {On noise insertion strategies for wireless network secrecy},\n type = {4},\n year = {2009}\n}\n\n
\n
\n\n\n
\n This paper studies the idea of noise insertion by authenticated relays through friendly jamming. We develop the secrecy rate achievable in arbitrary (deterministic) networks when there are relays actively helping secrecy.\n
\n\n\n
\n\n\n
\n \n\n \n \n E. Perron; S N. Diggavi; and I E. Telatar.\n\n\n \n \n \n \n Lossy Source Coding with Gaussian or Erased Side-Information.\n \n \n \n\n\n \n\n\n\n In IEEE International Symposium on Information Theory (ISIT), Seoul, Korea, pages 1035–1039, June 2009. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{PDTj09b,\n abstract = {In this paper we find properties that are shared\nbetween two seemingly unrelated lossy source coding setups with\nside-information. The first setup is when the source and sideinformation\nare jointly Gaussian and the distortion measure is\nquadratic. The second setup is when the side-information is an\nerased version of the source. We begin with the observation\nthat in both these cases the Wyner-Ziv and conditional ratedistortion\nfunctions are equal. Next, we consider the case when\nthere are two decoders with access to different side-information\nsources. For the case when the encoder has access to the sideinformation\nwe establish bounds on the rate-distortion function\nand a sufficient condition for tightness. Under this condition,\nwe find a characterization of the rate-distortion function for\nphysically degraded side-information. This characterization holds\nfor both the Gaussian and erasure setups.},\n author = {E. Perron and S N. Diggavi and I E. Telatar},\n booktitle = {IEEE International Symposium on Information Theory (ISIT), Seoul, Korea},\n file = {:papers:pdtencsiisit09.pdf|},\n label = {pdt_c09b},\n month = {June},\n note = {},\n pages = {1035--1039},\n tags = {conf,RDSI,NDC,IT,SelConf},\n title = {Lossy Source Coding with Gaussian or Erased Side-Information},\n type = {4},\n year = {2009}\n}\n\n
\n
\n\n\n
\n In this paper we find properties that are shared between two seemingly unrelated lossy source coding setups with side-information. The first setup is when the source and sideinformation are jointly Gaussian and the distortion measure is quadratic. The second setup is when the side-information is an erased version of the source. We begin with the observation that in both these cases the Wyner-Ziv and conditional ratedistortion functions are equal. Next, we consider the case when there are two decoders with access to different side-information sources. For the case when the encoder has access to the sideinformation we establish bounds on the rate-distortion function and a sufficient condition for tightness. Under this condition, we find a characterization of the rate-distortion function for physically degraded side-information. This characterization holds for both the Gaussian and erasure setups.\n
\n\n\n
\n\n\n
\n \n\n \n \n E. Perron; S N. Diggavi; and E. Telatar.\n\n\n \n \n \n \n On the interference-multiple-access channel.\n \n \n \n\n\n \n\n\n\n In IEEE International Conference on Communications (ICC), Dresden, Germany, pages 31–35, June 2009. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{PDTj09c,\n abstract = {We introduce the interference-multiple-access channel,\nwhich is a discrete memoryless channel with two transmitters\nand two receivers, similar to the interference channel. One\nreceiver is required to decode the information encoded at one\ntransmitter, the other receiver is required to decode the messages\nfrom both transmitters. We provide an inner bound on the\ncapacity region of this channel, as well as an outer bound for a\nspecial class of such channels. For this class, we also quantify the\ngap between inner and outer bound and show that the bounds\nmatch for a semi-deterministic channel, providing a complete\ncharacterization. For the Gaussian case, we show that the gap is\nat most 1 bit, yielding an approximate characterization.},\n author = {E. Perron and S N. Diggavi and E. Telatar},\n booktitle = {IEEE International Conference on Communications (ICC), Dresden, Germany},\n file = {:papers:pdt_icc09.pdf},\n month = {June},\n note = {},\n pages = {31--35},\n tags = {conf,ITapprox,WiNet,IT,WiNetInfFlow,IntChan,SelConf},\n title = {On the interference-multiple-access channel},\n type = {4},\n year = {2009}\n}\n\n
\n
\n\n\n
\n We introduce the interference-multiple-access channel, which is a discrete memoryless channel with two transmitters and two receivers, similar to the interference channel. One receiver is required to decode the information encoded at one transmitter, the other receiver is required to decode the messages from both transmitters. We provide an inner bound on the capacity region of this channel, as well as an outer bound for a special class of such channels. For this class, we also quantify the gap between inner and outer bound and show that the bounds match for a semi-deterministic channel, providing a complete characterization. For the Gaussian case, we show that the gap is at most 1 bit, yielding an approximate characterization.\n
\n\n\n
\n\n\n
\n \n\n \n \n E. Perron; S N. Diggavi; and I E. Telatar.\n\n\n \n \n \n \n On cooperative wireless network secrecy.\n \n \n \n\n\n \n\n\n\n In IEEE INFOCOM 2009, Rio de Janeiro, Brazil, April 2009. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{PDTp09,\n abstract = {In this paper we consider\nsecret communication between two special nodes (“source” and\n“destination”) in a wireless network with authenticated relays:\nthe message communicated to the destination is to be kept\ninformation-theoretically (unconditionally) secret from any eavesdropper\nwithin a class. Since the transmissions are broadcast and\ninterfere with each other, complex signal interactions occur. We\ndevelop cooperative schemes which utilize these interactions in\nwireless communication over networks with arbitrary topology,\nand give provable unconditional secrecy guarantees.},\n author = {E. Perron and S N. Diggavi and I E. Telatar},\n booktitle = {IEEE INFOCOM 2009, Rio de Janeiro, Brazil},\n file = {:papers:pdtwireless_net_secrecy08.pdf},\n label = {pdt_c09a},\n month = {April},\n note = {},\n pages = {},\n tags = {conf,ITsecrecy,IT,WiNetSec,WiNetInfFlow,WiNet,SelConf},\n title = {On cooperative wireless network secrecy},\n type = {4},\n year = {2009}\n}\n\n
\n
\n\n\n
\n In this paper we consider secret communication between two special nodes (“source” and “destination”) in a wireless network with authenticated relays: the message communicated to the destination is to be kept information-theoretically (unconditionally) secret from any eavesdropper within a class. Since the transmissions are broadcast and interfere with each other, complex signal interactions occur. We develop cooperative schemes which utilize these interactions in wireless communication over networks with arbitrary topology, and give provable unconditional secrecy guarantees.\n
\n\n\n
\n\n\n
\n \n\n \n \n E. Perron; S N. Diggavi; and I E. Telatar.\n\n\n \n \n \n \n A multiple access approach for the compound wiretap channel.\n \n \n \n\n\n \n\n\n\n In IEEE Information Theory Workshop (ITW), Taormina, Italy, pages 11–15, October 2009. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{PDTp09a,\n abstract = {The compound wiretap channel generalizes the\nclassical problem in broadcast information-theoretic secrecy by\nallowing a class of potential eavesdroppers. In this paper we\npresent a new coding scheme that generalizes known approaches\nto this problem. The scheme prefixes an artificial multiple\naccess channel to the transmission scheme in order to design a\nstructured transmit codebook. The idea is that such a structure\ncan potentially increase the perfect secrecy rate for the legitimate\nusers in the presence of the class of eavesdroppers.},\n author = {E. Perron and S N. Diggavi and I E. Telatar},\n booktitle = {IEEE Information Theory Workshop (ITW), Taormina, Italy},\n file = {:papers:pdt09mac_wiretap.pdf},\n month = {October},\n note = {},\n pages = {11--15},\n tags = {conf,ITsecrecy,IT,WiNetSec,SelConf},\n title = {A multiple access approach for the compound wiretap channel},\n type = {4},\n year = {2009}\n}\n\n
\n
\n\n\n
\n The compound wiretap channel generalizes the classical problem in broadcast information-theoretic secrecy by allowing a class of potential eavesdroppers. In this paper we present a new coding scheme that generalizes known approaches to this problem. The scheme prefixes an artificial multiple access channel to the transmission scheme in order to design a structured transmit codebook. The idea is that such a structure can potentially increase the perfect secrecy rate for the legitimate users in the presence of the class of eavesdroppers.\n
\n\n\n
\n\n\n
\n \n\n \n \n S. Saeedi; S N. Diggavi; C. Fragouli; and V. Prabhakaran.\n\n\n \n \n \n \n On degraded two message set broadcasting.\n \n \n \n\n\n \n\n\n\n In IEEE Information Theory Workshop (ITW) Taormina, Italy, pages 406–410, October 2009. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{SDFPp09,\n abstract = {Abstract—We consider the two message set problem, where a\nsource broadcasts a common message W1 to an arbitrary set of\nreceivers U and a private message W2 to a subset of the receivers\nP !U . Transmissions occur over linear deterministic channels.\nFor the case where at most two receivers do not require the\nprivate message, we give an exact characterization of the capacity\nregion, where achievability is through linear coding.},\n author = {S. Saeedi and S N. Diggavi and C. Fragouli and V. Prabhakaran},\n booktitle = {IEEE Information Theory Workshop (ITW) Taormina, Italy},\n file = {:papers:sdfpitw09.pdf},\n month = {October},\n note = {},\n pages = {406--410},\n tags = {conf,DetApprox,IT,DegMsgSet,OppComm,SelConf},\n title = {On degraded two message set broadcasting},\n type = {4},\n year = {2009}\n}\n\n
\n
\n\n\n
\n Abstract—We consider the two message set problem, where a source broadcasts a common message W1 to an arbitrary set of receivers U and a private message W2 to a subset of the receivers P !U . Transmissions occur over linear deterministic channels. For the case where at most two receivers do not require the private message, we give an exact characterization of the capacity region, where achievability is through linear coding.\n
\n\n\n
\n\n\n
\n \n\n \n \n C. Tian; S N. Diggavi; and S. Shamai.\n\n\n \n \n \n \n An Approximate Characterization For the Gaussian Broadcasting Distortion Region.\n \n \n \n\n\n \n\n\n\n In IEEE International Symposium on Information Theory (ISIT), Seoul, Korea, pages 2477–2481, June 2009. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{TDSj09,\n author = {C. Tian and S N. Diggavi and S. Shamai,},\n booktitle = {IEEE International Symposium on Information Theory (ISIT), Seoul, Korea},\n month = {June},\n note = {},\n pages = {2477--2481},\n tags = {conf,SrcChan,ApproxIT,NDC,IT},\n title = {An Approximate Characterization For the Gaussian Broadcasting Distortion Region},\n type = {4},\n year = {2009}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n\n\n\n
\n
\n\n
\n
\n  \n 2008\n \n \n (4)\n \n \n
\n
\n \n \n
\n
\n  \n 2\n \n \n (6)\n \n \n
\n
\n \n \n
\n \n\n \n \n S N. Diggavi; A R. Calderbank; S. Dusad; and N. Al-Dhahir.\n\n\n \n \n \n \n Diversity Embedded Space-Time Codes.\n \n \n \n\n\n \n\n\n\n IEEE Transactions on Information Theory, 54(1): 33–50. January 2008.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DCDAj08,\n abstract = {This paper introduces diversity embedded codes, which are space-time codes\nthat simultaneously give different levels of diversity protection to different information\nstreams. The paper provides algebraic constructions based on binary codes designed for\nrank distance and lifts them to the complex domain. It also gives several example of\nlinear diversity embedded codes.},\n author = {S N. Diggavi and A R. Calderbank and S. Dusad and  N. Al-Dhahir},\n file = {:papers:dcdafinalversion.pdf},\n journal = {IEEE Transactions on Information Theory},\n label = {ddca_j08},\n month = {January},\n note = {},\n number = {1},\n pages = {33--50},\n tags = {journal,DivEmb,OppComm,RankDistCod,CodTh,STcodes},\n title = {Diversity Embedded Space-Time Codes},\n type = {2},\n volume = {54},\n year = {2008}\n}\n\n
\n
\n\n\n
\n This paper introduces diversity embedded codes, which are space-time codes that simultaneously give different levels of diversity protection to different information streams. The paper provides algebraic constructions based on binary codes designed for rank distance and lifts them to the complex domain. It also gives several example of linear diversity embedded codes.\n
\n\n\n
\n\n\n
\n \n\n \n \n S. Dusad; S N. Diggavi; N. Al-Dhahir; and A R. Calderbank.\n\n\n \n \n \n \n Diversity-Embedded Codes : Theory and practice.\n \n \n \n\n\n \n\n\n\n IEEE Journal on Selected Topics in Signal Processing, 2(2): 202–219. April 2008.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DDACj08,\n abstract = {This paper develops in a unified way the theory for diversity embedded codes\nfor broadband (ISI) channels, both from an information theory viewpoint as well as an\nalgebraic coding perspective. It also develops practical aspects by connecting it to unequal\nerror protection for image transmission as well as using diversity embedded codes in conjunction with NUM.},\n author = {S. Dusad and S N. Diggavi and N. Al-Dhahir and A R. Calderbank},\n file = {:papers:ddac.pdf},\n journal = {IEEE Journal on Selected Topics in Signal Processing},\n month = {April},\n note = {},\n number = {2},\n pages = {202--219},\n tags = {journal,DivEmb,OppComm,RankDistCod,CodTh,SucRefDiv,DegMsgSet,STcodes},\n title = {Diversity-Embedded Codes : Theory and practice},\n type = {2},\n volume = {2},\n year = {2008}\n}\n\n
\n
\n\n\n
\n This paper develops in a unified way the theory for diversity embedded codes for broadband (ISI) channels, both from an information theory viewpoint as well as an algebraic coding perspective. It also develops practical aspects by connecting it to unequal error protection for image transmission as well as using diversity embedded codes in conjunction with NUM.\n
\n\n\n
\n\n\n
\n \n\n \n \n S. Dusad; S N. Diggavi; and A R. Calderbank.\n\n\n \n \n \n \n \n Embedded Rank Distance Codes for ISI channels.\n \n \n \n \n\n\n \n\n\n\n IEEE Transactions on Information Theory, 54(11): 4866–4886. November 2008.\n \n\n\n\n
\n\n\n\n \n \n \"Embedded arxiv\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DDCj08,\n abstract = {This paper introduces the problem of diversity embedded codes for inter-symbol\ninterference (ISI) channels and gives algebraic constructions for them. These constructions\nare based on designing binary rank-distance codes with a specific (Toeplitz-like) constraint\nand lifting them to the complex domain through set-partitioning maps. As a special case\nthese algebraic constructions also give rate-diversity optimal codes for transmission over\nISI channels when there are transmit alphabet constraints.},\n author = {S. Dusad and S N. Diggavi and A R. Calderbank},\n file = {:papers:ddcfinalrankdist.pdf},\n journal = {IEEE Transactions on Information Theory},\n month = {November},\n note = {},\n number = {11},\n pages = {4866--4886},\n tags = {journal,DivEmb,OppComm,RankDistCod,CodTh,STcodes},\n title = {Embedded Rank Distance Codes for ISI channels},\n type = {2},\n url_arxiv = {http://arxiv.org/abs/0707.4311},\n volume = {54},\n year = {2008}\n}\n\n
\n
\n\n\n
\n This paper introduces the problem of diversity embedded codes for inter-symbol interference (ISI) channels and gives algebraic constructions for them. These constructions are based on designing binary rank-distance codes with a specific (Toeplitz-like) constraint and lifting them to the complex domain through set-partitioning maps. As a special case these algebraic constructions also give rate-diversity optimal codes for transmission over ISI channels when there are transmit alphabet constraints.\n
\n\n\n
\n\n\n
\n \n\n \n \n C. Tian; J. Chen; and S N. Diggavi.\n\n\n \n \n \n \n \n Multiuser successive refinement and multiple description coding.\n \n \n \n \n\n\n \n\n\n\n IEEE Transactions on Information Theory, 54(2): 921–931. February 2008.\n \n\n\n\n
\n\n\n\n \n \n \"Multiuser arxiv\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{TCDj08,\n abstract = {We study the multi-user successive refinement problem (posed in Pradhan and Ramchandran, 2002), where the users are connected to a central server through links with different noiseless capacities. Each user requires to reconstruct the source in a scalable manner. We provide the best known achievable strategy for the two-user, two-layer case and the complete characterization of the rate-distortion region for the Gaussian source under the mean-squared error (MSE) distortion measure.},\n author = {C. Tian and J. Chen and S N. Diggavi,},\n file = {:papers:multiusersr.pdf},\n journal = {IEEE Transactions on Information Theory},\n label = {tcd_j08},\n month = {February},\n note = {},\n number = {2},\n pages = {921--931},\n tags = {journal,RDSI,NDC,RDmultiserSucRef,IT,MDC},\n title = {Multiuser successive refinement and multiple description coding},\n type = {2},\n url_arxiv = {http://arxiv.org/abs/0707.4133},\n volume = {54},\n year = {2008}\n}\n\n
\n
\n\n\n
\n We study the multi-user successive refinement problem (posed in Pradhan and Ramchandran, 2002), where the users are connected to a central server through links with different noiseless capacities. Each user requires to reconstruct the source in a scalable manner. We provide the best known achievable strategy for the two-user, two-layer case and the complete characterization of the rate-distortion region for the Gaussian source under the mean-squared error (MSE) distortion measure.\n
\n\n\n
\n\n\n
\n \n\n \n \n C. Tian; and S N. Diggavi.\n\n\n \n \n \n \n \n Side-information scalable source coding.\n \n \n \n \n\n\n \n\n\n\n IEEE Transactions on Information Theory, 54(12): 5591–5608. December 2008.\n \n\n\n\n
\n\n\n\n \n \n \"Side-information arxiv\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{TDj08,\n abstract = {We introduce the problem of side-information scalable data compression\nIn this problem, the encoder constructs a progressive description, such that the receiver with high quality side information will be able to truncate the bit-stream and reconstruct in the rate distortion sense, while the receiver with low quality\nside information will have to receive further data in order to decode. We provide a complete characterization of the\nrate distortion region for the important quadratic Gaussian case with multiple jointly Gaussian side-informations,\nwhere the side information quality does not have to be monotonic along the scalable coding order. Inner and outer bounds are provided to\nthe rate distortion region for general discrete memoryless sources.},\n author = {C. Tian and S N. Diggavi},\n file = {:papers:siscalable_tiandiggavi.pdf},\n journal = {IEEE Transactions on Information Theory},\n label = {td_j08},\n month = {December},\n note = {},\n number = {12},\n pages = {5591--5608},\n tags = {journal,RDSI,NDC,ScalableSIcod,IT},\n title = {Side-information scalable source coding},\n type = {2},\n url_arxiv = {http://arxiv.org/abs/0707.4597},\n volume = {54},\n year = {2008}\n}\n\n
\n
\n\n\n
\n We introduce the problem of side-information scalable data compression In this problem, the encoder constructs a progressive description, such that the receiver with high quality side information will be able to truncate the bit-stream and reconstruct in the rate distortion sense, while the receiver with low quality side information will have to receive further data in order to decode. We provide a complete characterization of the rate distortion region for the important quadratic Gaussian case with multiple jointly Gaussian side-informations, where the side information quality does not have to be monotonic along the scalable coding order. Inner and outer bounds are provided to the rate distortion region for general discrete memoryless sources.\n
\n\n\n
\n\n\n
\n \n\n \n \n C. Tian; A. Steiner; S. Shamai(Shitz); and S N. Diggavi.\n\n\n \n \n \n \n Successive Refinement via Broadcasting: Optimizing Expected Distortion of a Gaussian Source over a Gaussian Fading Channel.\n \n \n \n\n\n \n\n\n\n IEEE Transactions on Information Theory, 54(7): 2903–2918. July 2008.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{TSSDj08,\n abstract = {We consider the problem of transmitting a Gaussian\nsource on a slowly fading Gaussian channel, subject to the mean\nsquared error distortion measure.  We propose an\nefficient algorithm to compute the optimal expected distortion at the\nreceiver in linear time O(M), when the total number of possible discrete fading\nstates is M. We also provide a derivation of the optimal\npower allocation when the fading state is a continuum, using the\nclassical variational method.},\n author = {C. Tian and A. Steiner and S. Shamai(Shitz) and S N. Diggavi},\n file = {:papers:distortionbc_tssdfinal.pdf},\n journal = {IEEE Transactions on Information Theory},\n month = {July},\n note = {},\n number = {7},\n pages = {2903--2918},\n tags = {journal,SrcChan,IT},\n title = {Successive Refinement via Broadcasting: Optimizing Expected Distortion of a Gaussian Source over a Gaussian Fading Channel},\n type = {2},\n volume = {54},\n year = {2008}\n}\n\n
\n
\n\n\n
\n We consider the problem of transmitting a Gaussian source on a slowly fading Gaussian channel, subject to the mean squared error distortion measure. We propose an efficient algorithm to compute the optimal expected distortion at the receiver in linear time O(M), when the total number of possible discrete fading states is M. We also provide a derivation of the optimal power allocation when the fading state is a continuum, using the classical variational method.\n
\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 3\n \n \n (1)\n \n \n
\n
\n \n \n
\n \n\n \n \n Y. Zhang; Z. Ge; S N. Diggavi; Z M. Mao; M. Roughan; V. Vaishampayan; W. Willinger; and Y. Zhang.\n\n\n \n \n \n \n Internet traffic and multiresolution analysis.\n \n \n \n\n\n \n\n\n\n Internet traffic and multiresolution analysis. Institute of Mathematical Statistics (IMS) edition, 2008.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inbook{ZGDMRVWZib08,\n abstract = {This is an initial study into the behavior of traffic matrices at different scales of \nresolution.},\n author = {Y. Zhang and Z. Ge and S N. Diggavi and Z M. Mao and M. Roughan and V. Vaishampayan and W. Willinger and Y. Zhang},\n booktitle = {Festschrift for Thomas Kurtz},\n edition = {Institute of Mathematical Statistics (IMS)},\n file = {:papers:waltertraffic.pdf},\n label = {zgdmrvwz_b08},\n note = {},\n pages = {},\n series = {},\n tags = {BookChap,NetEngr},\n title = {Internet traffic and multiresolution analysis},\n type = {3},\n volume = {},\n year = {2008}\n}\n\n
\n
\n\n\n
\n This is an initial study into the behavior of traffic matrices at different scales of resolution.\n
\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 4\n \n \n (13)\n \n \n
\n
\n \n \n
\n \n\n \n \n S. Avestimehr; S N. Diggavi; and D N C. Tse.\n\n\n \n \n \n \n Approximate characterization of capacity in Gaussian relay networks.\n \n \n \n\n\n \n\n\n\n In IEEE International Wireless Communications and Mobile Computing Conference (IWCMC), Crete, Greece, pages 56–61, August 2008. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{ADTj08a,\n author = {S. Avestimehr and S N. Diggavi and D N C. Tse, },\n booktitle = {IEEE International Wireless Communications and Mobile Computing Conference (IWCMC), Crete, Greece},\n month = {August},\n note = {},\n pages = {56--61},\n tags = {conf,DetApprox,ITapprox,WiNet,IT,WiNetInfFlow},\n title = {Approximate characterization of capacity in Gaussian relay networks},\n type = {4},\n year = {2008}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n S. Avestimehr; S N. Diggavi; and D N C. Tse.\n\n\n \n \n \n \n Approximate Capacity of Gaussian Relay Networks.\n \n \n \n\n\n \n\n\n\n In IEEE International Symposium on Information Theory (ISIT), Toronto, Canada, pages 474–478, July 2008. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{ADTj08b,\n author = {S. Avestimehr and S N. Diggavi and D N C. Tse},\n booktitle = {IEEE International Symposium on Information Theory (ISIT), Toronto, Canada},\n month = {July},\n note = {},\n pages = {474--478},\n tags = {conf,DetApprox,ITapprox,WiNet,IT,WiNetInfFlow},\n title = {Approximate Capacity of Gaussian Relay Networks},\n type = {4},\n year = {2008}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n S. Avestimehr; S N. Diggavi; and D N C. Tse.\n\n\n \n \n \n \n Information flow over compound wireless relay networks.\n \n \n \n\n\n \n\n\n\n In IEEE Zurich Seminar on Communications (IZS), Zurich, Switzerland, pages 92, March 2008. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{ADTj08c,\n author = {S. Avestimehr and S N. Diggavi and D N C. Tse},\n booktitle = {IEEE Zurich Seminar on Communications (IZS), Zurich, Switzerland},\n month = {March},\n note = {},\n pages = {92},\n tags = {conf,DetApprox,ITapprox,WiNet,IT,WiNetInfFlow},\n title = {Information flow over compound wireless relay networks},\n type = {4},\n year = {2008}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n S. Dusad; and S N. Diggavi.\n\n\n \n \n \n \n Successive refinement of diversity for fading ISI MISO channels.\n \n \n \n\n\n \n\n\n\n In IEEE International Symposium on Information Theory (ISIT), Toronto, Canada, pages 1273–1277, July 2008. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DDj08,\n author = {S. Dusad and S N. Diggavi,},\n booktitle = {IEEE International Symposium on Information Theory (ISIT), Toronto, Canada},\n month = {July},\n note = {},\n pages = {1273--1277},\n tags = {conf,DivEmb,SucRefDiv,STcodes,OppComm,DegMsgSet},\n title = {Successive refinement of diversity for fading ISI MISO channels},\n type = {4},\n year = {2008}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n M. Jafarisiavoshani; C. Fragouli; and S N. Diggavi.\n\n\n \n \n \n \n On locating Byzantine attackers.\n \n \n \n\n\n \n\n\n\n In IEEE Network Coding Workshop (NetCod), Hong Kong, pages 1–6, January 2008. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{JFDj08,\n author = {M. Jafarisiavoshani and C. Fragouli and S N. Diggavi,},\n booktitle = {IEEE Network Coding Workshop (NetCod), Hong Kong},\n month = {January},\n note = {},\n pages = {1--6},\n tags = {conf,NonCohComm,NetCod,Subsp,NetEngr,NetErrCorr,Byzantine},\n title = {On locating Byzantine attackers},\n type = {4},\n year = {2008}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n A. Khisti; S N. Diggavi; and G W. Wornell.\n\n\n \n \n \n \n Secret key generation with correlated sources and noisy channels.\n \n \n \n\n\n \n\n\n\n In IEEE International Symposium on Information Theory (ISIT), Toronto, Canada, pages 1005–1009, July 2008. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{KDWj08,\n author = {A. Khisti and S N. Diggavi and G W. Wornell,},\n booktitle = {IEEE International Symposium on Information Theory (ISIT), Toronto, Canada},\n month = {July},\n note = {},\n pages = {1005--1009},\n tags = {conf,ITsecrecy,KeyGen,IT,WiNetSec,SrcChanSec},\n title = {Secret key generation with correlated sources and noisy channels},\n type = {4},\n year = {2008}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n Y. Li; C. Tian; S N. Diggavi; M. Chiang; and A. R. Calderbank.\n\n\n \n \n \n \n Network Resource Allocation for Competing Multiple-Description Transmissions.\n \n \n \n\n\n \n\n\n\n In IEEE Globecom, New Orleans, pages 1-6, November 2008. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{LTDCCj08,\n author = {Y. Li and C. Tian and S N. Diggavi and M. Chiang and A. R. Calderbank},\n booktitle = {IEEE Globecom, New Orleans},\n month = {November},\n note = {},\n pages = {1-6},\n tags = {conf,MDnum,NDC,MDC},\n title = {Network Resource Allocation for Competing Multiple-Description Transmissions},\n type = {4},\n year = {2008}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n S. Mohajer; S N. Diggavi; C. Fragouli; and D. Tse.\n\n\n \n \n \n \n Transmission techniques for relay-interference networks.\n \n \n \n\n\n \n\n\n\n In Proceedings of Allerton Conference on Communication, Control, and Computing, Illinois, pages 464–474, September 2008. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{MDFTj08,\n author = {S. Mohajer and S N. Diggavi and C. Fragouli and D. Tse},\n booktitle = {Proceedings of Allerton Conference on Communication, Control, and Computing, Illinois},\n month = {September},\n note = {},\n pages = {464--474},\n tags = {conf,DetApprox,ITapprox,WiNet,IT,WiNetInfFlow,RelayInt},\n title = {Transmission techniques for relay-interference networks},\n type = {4},\n year = {2008}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n S. Mohajer; C. Tian; and S.N. Diggavi.\n\n\n \n \n \n \n Asymmetric Multilevel Diversity Coding.\n \n \n \n\n\n \n\n\n\n In IEEE Data Compression Conference (DCC), Snowbird, Utah, pages 402–411, March 2008. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{MTDj08,\n author = {S. Mohajer and C. Tian and S.N. Diggavi},\n booktitle = {IEEE Data Compression Conference (DCC), Snowbird, Utah},\n month = {March},\n note = {},\n pages = {402--411},\n tags = {conf,AsymMDapprox,ApproxIT,NDC,MDapprox,IT},\n title = {Asymmetric Multilevel Diversity Coding},\n type = {4},\n year = {2008}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n E. Perron; S N. Diggavi; and E. Telatar.\n\n\n \n \n \n \n Wireless network secrecy with public feedback.\n \n \n \n\n\n \n\n\n\n In Proceedings of Allerton Conference on Communication, Control, and Computing, Illinois, pages 753–760, September 2008. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{PDTj08,\n abstract = {We study a line network with an eavesdropper having access to the\nrelay transmission. We assume that there could also be a public feedback channel from the destination. We develop achievable strategies to achieve certain rate-equivocation pairs.},\n author = {E. Perron and S N. Diggavi and E. Telatar},\n booktitle = {Proceedings of Allerton Conference on Communication, Control, and Computing, Illinois},\n file = {:papers:pdt_allerton08.pdf},\n month = {September},\n note = {},\n pages = {753--760},\n tags = {conf,ITsecrecy,IT,WiNetSec,WiNetInfFlow,WiNet,InteractiveSec,SelConf},\n title = {Wireless network secrecy with public feedback},\n type = {4},\n year = {2008}\n}\n\n
\n
\n\n\n
\n We study a line network with an eavesdropper having access to the relay transmission. We assume that there could also be a public feedback channel from the destination. We develop achievable strategies to achieve certain rate-equivocation pairs.\n
\n\n\n
\n\n\n
\n \n\n \n \n A. Sabharwal; and S N. Diggavi.\n\n\n \n \n \n \n Compound Gaussian multiple access channels with noisy feedback.\n \n \n \n\n\n \n\n\n\n In Proceedings of Allerton Conference on Communication, Control, and Computing, Illinois, pages 887–894, September 2008. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{SDj08,\n author = {A. Sabharwal and S N. Diggavi},\n booktitle = {Proceedings of Allerton Conference on Communication, Control, and Computing, Illinois},\n month = {September},\n note = {},\n pages = {887--894},\n tags = {conf,DetApprox,WiNet,Feedback},\n title = {Compound Gaussian multiple access channels with noisy feedback},\n type = {4},\n year = {2008}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n D. Tschopp; S N. Diggavi; and M. Grossglauser.\n\n\n \n \n \n \n Routing in mobile wireless networks.\n \n \n \n\n\n \n\n\n\n In IEEE Zurich Seminar on Communications (IZS), Zurich, Switzerland, pages 38, March 2008. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{TDGj08,\n author = {D. Tschopp and S N. Diggavi and M. Grossglauser},\n booktitle = {IEEE Zurich Seminar on Communications (IZS), Zurich, Switzerland},\n month = {March},\n note = {},\n pages = {38},\n tags = {conf,WiNet,CSalgo,DynamWiNet,MetricEmb,WiNetRouting},\n title = {Routing in mobile wireless networks},\n type = {4},\n year = {2008}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n C. Tian; S. Mohajer; and S N. Diggavi.\n\n\n \n \n \n \n On the Gaussian $K$-description problem under symmetric distortion constraints.\n \n \n \n\n\n \n\n\n\n In Information Theory and Applications Workshop, UCSD, San Diego, California, pages 401–406, January 2008. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{TMDj08,\n author = {C. Tian and S. Mohajer and S N. Diggavi},\n booktitle = {Information Theory and Applications Workshop, UCSD, San Diego, California},\n month = {January},\n note = {},\n pages = {401--406},\n tags = {conf,SymmMDapprox,ApproxIT,NDC,MDapprox,IT},\n title = {On the Gaussian $K$-description problem under symmetric distortion constraints},\n type = {4},\n year = {2008}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 6\n \n \n (2)\n \n \n
\n
\n \n \n
\n \n\n \n \n Naofal Al-Dhahir; Suhas N. Diggavi; and Anastasios Stamoulis.\n\n\n \n \n \n \n US Patent Number US 7,450,656: Method for communicating via a channel characterized by parameters that vary in time within a transmission block.\n \n \n \n\n\n \n\n\n\n November 2008.\n US Patent Number US 7,450,656\n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@misc{Dp08a,\n author = {Naofal Al-Dhahir and Suhas N. Diggavi and  Anastasios Stamoulis},\n label = {ads_p08a},\n month = {November},\n note = {US Patent  Number US 7,450,656},\n tags = {patent},\n title = {US Patent  Number US 7,450,656: Method for communicating via a channel characterized by parameters that vary in time within a transmission block},\n type = {6},\n year = {2008}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n Dominique Tschopp; Suhas N. Diggavi; Matthias Grossglauser; and Joerg Widmer.\n\n\n \n \n \n \n European Patent Number EP1883185: Method and apparatus for beacon management for routing on virtual coordinates.\n \n \n \n\n\n \n\n\n\n November 2008.\n European Patent Number EP1883185\n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@misc{Dp08b,\n author = {Dominique Tschopp and Suhas N. Diggavi and Matthias Grossglauser and Joerg Widmer},\n month = {November},\n note = {European Patent Number EP1883185},\n tags = {patent,DynamWiNet},\n title = {European Patent Number EP1883185: Method and apparatus for beacon management for routing on virtual coordinates},\n type = {6},\n year = {2008}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n\n\n\n
\n
\n\n
\n
\n  \n 2007\n \n \n (3)\n \n \n
\n
\n \n \n
\n
\n  \n 3\n \n \n (1)\n \n \n
\n
\n \n \n
\n \n\n \n \n J. Chui; S. Das; N. Al-Dhahir; S N. Diggavi; and A R. Calderbank.\n\n\n \n \n \n \n Space-time codes and application in WiMAX.\n \n \n \n\n\n \n\n\n\n Space-time codes and application in WiMAX. 2007.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inbook{CDADCib07,\n author = {J. Chui and S. Das and N. Al-Dhahir and S N. Diggavi and A R. Calderbank},\n booktitle = {Handbook of WiMAX},\n editors = {S. Ahson and M.  Ilyas, CRC Press},\n note = {},\n pages = {},\n series = {},\n tags = {BookChap,STcodes},\n title = {Space-time codes and application in WiMAX},\n type = {3},\n volume = {},\n year = {2007}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 4\n \n \n (14)\n \n \n
\n
\n \n \n
\n \n\n \n \n S. Avestimehr; S N. Diggavi; and D N C. Tse.\n\n\n \n \n \n \n A deterministic model for wireless relay networks and its capacity.\n \n \n \n\n\n \n\n\n\n In IEEE Information Theory Workshop (ITW) Bergen, Norway, pages 6–11, July 2007. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{ADTj07,\n author = {S. Avestimehr and S N. Diggavi and D N C. Tse},\n booktitle = {IEEE Information Theory Workshop (ITW) Bergen, Norway},\n month = {July},\n note = {},\n pages = {6--11},\n tags = {conf,DetApprox,ITapprox,WiNet,IT,WiNetInfFlow},\n title = {A deterministic model for wireless relay networks and its capacity},\n type = {4},\n year = {2007}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n S. Avestimehr; S N. Diggavi; and D N C. Tse.\n\n\n \n \n \n \n Wireless network information flow.\n \n \n \n\n\n \n\n\n\n In Proceedings of Allerton Conference on Communication, Control, and Computing, Illinois, September 2007. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{ADTj07a,\n author = {S. Avestimehr and S N. Diggavi and D N C. Tse},\n booktitle = {Proceedings of Allerton Conference on Communication, Control, and Computing, Illinois},\n label = {adt_allerton07a},\n month = {September},\n note = {},\n pages = {},\n tags = {conf,DetApprox,ITapprox,WiNet,IT,WiNetInfFlow},\n title = {Wireless network information flow},\n type = {4},\n year = {2007}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n S. Avestimehr; S N. Diggavi; and D N C. Tse.\n\n\n \n \n \n \n A Deterministic Approach to Wireless Relay Networks.\n \n \n \n\n\n \n\n\n\n In Proceedings of Allerton Conference on Communication, Control, and Computing, Illinois, Sept 2007. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{ADTj07b,\n author = {S. Avestimehr and S N. Diggavi and D N C. Tse},\n booktitle = {Proceedings of Allerton Conference on Communication, Control, and Computing, Illinois},\n label = {adt_allerton07b},\n month = {Sept},\n note = {},\n pages = {},\n tags = {conf,DetApprox,ITapprox,WiNet,IT,WiNetInfFlow},\n title = {A Deterministic Approach to Wireless Relay Networks},\n type = {4},\n year = {2007}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n J. Chen; C. Tian; and S N. Diggavi.\n\n\n \n \n \n \n Multiple description coding for stationary sources.\n \n \n \n\n\n \n\n\n\n In IEEE Data Compression Conference (DCC), Snowbird, Utah, pages 73–82, 2007 2007. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{CTDj07,\n author = {J. Chen and C. Tian and S N. Diggavi,},\n booktitle = { IEEE Data Compression Conference (DCC), Snowbird, Utah},\n month = {2007},\n note = {},\n pages = {73--82},\n tags = {conf,StatMDC,NDC,IT,MDC},\n title = {Multiple description coding for stationary sources},\n type = {4},\n year = {2007}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n S. Dusad; S N. Diggavi; and A R. Calderbank.\n\n\n \n \n \n \n Rank distance codes for ISI channels.\n \n \n \n\n\n \n\n\n\n In IEEE Information Theory Workshop (ITW) Bergen, Norway, pages 32–36, July 2007. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DDCj07,\n author = {S. Dusad and S N. Diggavi and A R. Calderbank},\n booktitle = {IEEE Information Theory Workshop (ITW) Bergen, Norway},\n month = {July},\n note = {},\n pages = {32--36},\n tags = {conf,DivEmb,OppComm,RankDistCod,CodTh},\n title = {Rank distance codes for ISI channels},\n type = {4},\n year = {2007}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n S N. Diggavi; M. Mitzenmacher; and H D. Pfister.\n\n\n \n \n \n \n Capacity upper bounds for the deletion channel.\n \n \n \n\n\n \n\n\n\n In IEEE International Symposium on Information Theory (ISIT), Nice,France, pages 1716–1720, June 2007. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DMPj07,\n abstract = {We present upper bounds on the capacity of the i.i.d.\nbinary deletion channel, where each bit is independently deleted\nwith a fixed probability d. We provide a general approach that\ngives a numerical answer for fixed d, and provide an argument\nthat gives asymptotic upper bounds as d goes to 1. These appear\nto be the first non-trivial upper bounds for this probabilistic\ndeletion channel.},\n author = {S N. Diggavi and M. Mitzenmacher and H D. Pfister},\n booktitle = {IEEE International Symposium on Information Theory (ISIT), Nice,France},\n file = {:papers:delubisit07.pdf},\n month = {June},\n note = {},\n pages = {1716--1720},\n tags = {conf,DelChan,IT,SelConf},\n title = {Capacity upper bounds for the deletion channel},\n type = {4},\n year = {2007}\n}\n\n
\n
\n\n\n
\n We present upper bounds on the capacity of the i.i.d. binary deletion channel, where each bit is independently deleted with a fixed probability d. We provide a general approach that gives a numerical answer for fixed d, and provide an argument that gives asymptotic upper bounds as d goes to 1. These appear to be the first non-trivial upper bounds for this probabilistic deletion channel.\n
\n\n\n
\n\n\n
\n \n\n \n \n C. Fragouli; A. Markoupoulou; R. Srinivasan; and S N. Diggavi.\n\n\n \n \n \n \n Network monitoring: It depends on your points of view.\n \n \n \n\n\n \n\n\n\n In Information Theory and its applications workshop, UCSD, San Diego, January 2007. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{FMSDj07,\n author = {C. Fragouli and A. Markoupoulou and R. Srinivasan and S N. Diggavi},\n booktitle = {Information Theory and its applications workshop, UCSD, San Diego},\n label = {fmsd_c07},\n month = {January},\n note = {},\n pages = {},\n tags = {conf,NetCod,NetEngr},\n title = {Network monitoring: It depends on your points of view},\n type = {4},\n year = {2007}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n M. Jafarisiavoshani; C. Fragouli; S N. Diggavi; and C. Gkantsidis.\n\n\n \n \n \n \n Bottleneck discovery and overlay management in network coded peer-to-peer systems.\n \n \n \n\n\n \n\n\n\n In ACM SIGCOMM Workshop on Internet Network Management (INM), Kyoto, Japan,, pages 293–298, Aug 2007. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{JFDGj07,\n author = {M. Jafarisiavoshani and C. Fragouli and S N. Diggavi and C. Gkantsidis},\n booktitle = {ACM SIGCOMM Workshop on Internet Network Management (INM), Kyoto, Japan,},\n label = {jfdg_c07},\n month = {Aug},\n note = {},\n pages = {293--298},\n tags = {conf,NonCohComm,NetCod,Subsp,NetEngr,NetErrCorr},\n title = {Bottleneck discovery and overlay management in network coded peer-to-peer systems},\n type = {4},\n year = {2007}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n M. Jafarisiavoshani; C. Fragouli; and S N. Diggavi.\n\n\n \n \n \n \n Subspace properties of randomized network coding.\n \n \n \n\n\n \n\n\n\n In IEEE Information Theory Workshop (ITW) Bergen, Norway, pages 17–21, July 2007. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{JFDj07,\n author = {M. Jafarisiavoshani and C. Fragouli and S N. Diggavi},\n booktitle = {IEEE Information Theory Workshop (ITW) Bergen, Norway},\n label = {jfd_c07},\n month = {July},\n note = {},\n pages = {17--21},\n tags = {conf,NonCohComm,NetCod,Subsp,NetEngr},\n title = {Subspace properties of randomized network coding},\n type = {4},\n year = {2007}\n}\n\n
\n
\n\n\n\n
\n\n\n \n\n\n
\n \n\n \n \n V. Prabhakaran; S N. Diggavi; and D N C. Tse.\n\n\n \n \n \n \n MIMO Broadcasting with degraded message sets: A Deterministic Approach.\n \n \n \n\n\n \n\n\n\n In Proceedings of Allerton Conference on Communication, Control, and Computing, Illinois, September 2007. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{PDTj07,\n abstract = {In this paper we study the nested (degraded) message\nset problem, where user $i$ requires messages\n$W_1, . . . ,W_i$. We study this for a MIMO linear deterministic\nbroadcast channel model, which is motivated by some recent\nsuccesses in using such models to obtain insights into approximate\ncharacterizations for the Gaussian relay and interference\nchannels. We establish the complete solution for the K = 3\nuser nested message problem for the MIMO linear deterministic\nbroadcast channel. We also establish some extremal points for\nthe general K-user case, where there are only two messages of\ninterest.},\n author = {V. Prabhakaran and S N. Diggavi and D N C. Tse},\n booktitle = {Proceedings of Allerton Conference on Communication, Control, and Computing, Illinois},\n file = {:papers:degmsgsetbc07.pdf},\n month = {September},\n note = {},\n pages = {},\n tags = {conf,DetApprox,IT,DegMsgSet,OppComm,SelConf},\n title = {MIMO Broadcasting with degraded message sets: A Deterministic Approach},\n type = {4},\n year = {2007}\n}\n\n
\n
\n\n\n
\n In this paper we study the nested (degraded) message set problem, where user $i$ requires messages $W_1, . . . ,W_i$. We study this for a MIMO linear deterministic broadcast channel model, which is motivated by some recent successes in using such models to obtain insights into approximate characterizations for the Gaussian relay and interference channels. We establish the complete solution for the K = 3 user nested message problem for the MIMO linear deterministic broadcast channel. We also establish some extremal points for the general K-user case, where there are only two messages of interest.\n
\n\n\n
\n\n\n
\n \n\n \n \n D. Tschopp; S N. Diggavi; M. Grossglauser; and J. Widmer.\n\n\n \n \n \n \n Robust Routing for Dynamic Wireless Networks Based onStable Embeddings.\n \n \n \n\n\n \n\n\n\n In Information Theory and its applications workshop, UCSD, San Diego, pages 124–131, January 2007. \n invited paper\n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{TDGWj07,\n author = {D. Tschopp and S N. Diggavi and M. Grossglauser and J. Widmer,},\n booktitle = {Information Theory and its applications workshop, UCSD, San Diego},\n file = {:papers:tdgwita2007.pdf},\n month = {January},\n note = {invited paper},\n pages = {124--131},\n tags = {conf,WiNet,CSalgo,DynamWiNet,MetricEmb,WiNetRouting,SelConf},\n title = {Robust Routing for Dynamic Wireless Networks Based onStable Embeddings},\n type = {4},\n year = {2007}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n C. Tian; and S N. Diggavi.\n\n\n \n \n \n \n On scalable source coding with decoder side informations.\n \n \n \n\n\n \n\n\n\n In IEEE International Symposium on Information Theory (ISIT), Nice,France, pages 1461–1465, June 2007. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{TDj07,\n author = {C. Tian and S N. Diggavi},\n booktitle = {IEEE International Symposium on Information Theory (ISIT), Nice,France},\n month = {June},\n note = {},\n pages = {1461--1465},\n tags = {conf,RDSI,NDC,ScalableSIcod,IT},\n title = {On scalable source coding with decoder side informations},\n type = {4},\n year = {2007}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n C. Tian; A. Steiner; S. Shamai; and S N. Diggavi.\n\n\n \n \n \n \n Expected distortion for Gaussian source with broadcast transmission strategy over a fading channel.\n \n \n \n\n\n \n\n\n\n In IEEE Information Theory Workshop (ITW) Bergen, Norway, pages 42–46, July 2007. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{TSSDj07,\n author = {C. Tian and A. Steiner and S. Shamai and S N. Diggavi},\n booktitle = {IEEE Information Theory Workshop (ITW) Bergen, Norway},\n month = {July},\n note = {},\n pages = {42--46},\n tags = {conf,SrcChan,IT},\n title = {Expected distortion for Gaussian source with broadcast transmission strategy over a fading channel},\n type = {4},\n year = {2007}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 6\n \n \n (2)\n \n \n
\n
\n \n \n
\n \n\n \n \n Naofal Al-Dhahir; Suhas N. Diggavi; and Anastasios Stamoulis.\n\n\n \n \n \n \n US Patent Number US 7,173,975: Estimation of a frequency selective channel with parameters that vary within a transmission block.\n \n \n \n\n\n \n\n\n\n February 2007.\n US Patent Number US 7,173,975\n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@misc{Dp08,\n author = {Naofal Al-Dhahir and Suhas N. Diggavi and  Anastasios Stamoulis},\n label = {ads_p07a},\n month = {February},\n note = {US Patent Number US 7,173,975},\n tags = {patent},\n title = {US Patent Number US 7,173,975: Estimation of a frequency selective channel with parameters that vary within a transmission block},\n type = {6},\n year = {2007}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n Gregory G. Raleigh; Suhas N. Diggavi; V K. Jones; and A. Paulraj.\n\n\n \n \n \n \n US Patent Number US 7,286,855: Method and apparatus for adaptive transmission beamforming in a wireless communication system.\n \n \n \n\n\n \n\n\n\n October 2007.\n US Patent Number US 7,286,855\n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@misc{RDJPp07,\n author = {Gregory G. Raleigh and Suhas N. Diggavi and  V K. Jones and A. Paulraj},\n label = {rdjp_p07},\n month = {October},\n note = {US Patent Number US 7,286,855},\n tags = {patent},\n title = {US Patent Number US 7,286,855: Method and apparatus for adaptive transmission beamforming in a wireless communication system},\n type = {6},\n year = {2007}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n\n\n\n
\n
\n\n
\n
\n  \n 2006\n \n \n (4)\n \n \n
\n
\n \n \n
\n
\n  \n 2\n \n \n (1)\n \n \n
\n
\n \n \n
\n \n\n \n \n S N. Diggavi; and M. Grossglauser.\n\n\n \n \n \n \n Information transmission over a finite buffer channel.\n \n \n \n\n\n \n\n\n\n IEEE Transactions on Information Theory, 52(3): 1226–1237. March 2006.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DGj06,\n abstract = {This paper was motivated by the transmission of information over finite buffer\nchannels. Analyzing the capacity of such channels naturally led us to the study of {\\em deletion} channels. In deletion channels, in contrast to erasure channels, symbols of the\ntransmitted sequence are removed, and the receiver does {\\em not} know which symbols\nhave been deleted. This was a classic problem from the 1960s in the context of modeling\nsynchronization errors. This paper gave the best known (at the time of publication) \nlower bounds to capacity of deletion channels since the 1960s. It also studied erasure channels with arbitrary memory in the erasure process. It showed that even when the erasure\nprocess has memory, feedback does not increase the capacity.},\n author = {S N. Diggavi and M. Grossglauser},\n file = {:papers:ps:finbuf.pdf},\n journal = {IEEE Transactions on Information Theory},\n label = {dg_j06},\n month = {March},\n note = {},\n number = {3},\n pages = {1226--1237},\n tags = {journal,DelChan,IT},\n title = {Information transmission over a finite buffer channel},\n type = {2},\n volume = {52},\n year = {2006}\n}\n\n
\n
\n\n\n
\n This paper was motivated by the transmission of information over finite buffer channels. Analyzing the capacity of such channels naturally led us to the study of \\em deletion channels. In deletion channels, in contrast to erasure channels, symbols of the transmitted sequence are removed, and the receiver does \\em not know which symbols have been deleted. This was a classic problem from the 1960s in the context of modeling synchronization errors. This paper gave the best known (at the time of publication) lower bounds to capacity of deletion channels since the 1960s. It also studied erasure channels with arbitrary memory in the erasure process. It showed that even when the erasure process has memory, feedback does not increase the capacity.\n
\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 3\n \n \n (2)\n \n \n
\n
\n \n \n
\n \n\n \n \n N. Al-Dhahir; A R. Calderbank; and S N. Diggavi.\n\n\n \n \n \n \n Space-time coding for wireless communications: Principles and Applications.\n \n \n \n\n\n \n\n\n\n Space-time coding for wireless communications: Principles and Applications, pages 140–185. E. Biglieri \\em et al Cambridge University Press edition, 2006.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inbook{ACDib06,\n abstract = {This was a survey on space-time codes and signal processing with a focus\non recent (when the chapter was written) developments.},\n author = {N. Al-Dhahir and A R. Calderbank and S N. Diggavi},\n booktitle = {MIMO wireless communications},\n edition = {E. Biglieri {\\em et al} Cambridge University Press},\n file = {:papers:acdbookchapter.pdf},\n pages = {140--185},\n series = {},\n tags = {BookChap,STcodes},\n title = {Space-time coding for wireless communications: Principles and Applications},\n type = {3},\n volume = {},\n year = {2006}\n}\n\n
\n
\n\n\n
\n This was a survey on space-time codes and signal processing with a focus on recent (when the chapter was written) developments.\n
\n\n\n
\n\n\n
\n \n\n \n \n S N. Diggavi.\n\n\n \n \n \n \n Diversity in Communication: From source coding to wireless networks.\n \n \n \n\n\n \n\n\n\n Diversity in Communication: From source coding to wireless networks, pages 243–286. Simon Haykin, Jose Principe, Terry Sejnowski, and John McWhirter, MIT Press edition, 2006.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inbook{Dib06,\n abstract = {This paper brings together how diversity plays a role in diverse topics like\nsource coding, physical layer wireless communication and mobility in wireless networks.},\n author = {S N. Diggavi},\n booktitle = {Brain and Systems: New Directions in Statistical Signal Processing},\n edition = {Simon Haykin, Jose Principe, Terry Sejnowski, and John McWhirter, MIT Press},\n file = {:papers:divincomm.pdf},\n label = {d_b06},\n pages = {243--286},\n series = {},\n tags = {BookChap,DivInComm,STcodes,MDC,WiNet},\n title = {Diversity in Communication: From source coding to wireless networks},\n type = {3},\n volume = {},\n year = {2006}\n}\n\n
\n
\n\n\n
\n This paper brings together how diversity plays a role in diverse topics like source coding, physical layer wireless communication and mobility in wireless networks.\n
\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 4\n \n \n (9)\n \n \n
\n
\n \n \n
\n \n\n \n \n S. Dusad; S N. Diggavi; and A R. Calderbank.\n\n\n \n \n \n \n Cross Layer Utility of Diversity Embedded Codes.\n \n \n \n\n\n \n\n\n\n In IEEE Conference on Information Sciences and Systems, Princeton, March 2006. \n invited paper\n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DDCj06,\n author = {S. Dusad and S N. Diggavi and A R. Calderbank},\n booktitle = {IEEE Conference on Information Sciences and Systems, Princeton},\n month = {March},\n note = {invited paper},\n pages = {},\n tags = {conf,DivEmb,OppComm,SrcChan},\n title = {Cross Layer Utility of Diversity Embedded Codes},\n type = {4},\n year = {2006}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n S. Dusad; and S N. Diggavi.\n\n\n \n \n \n \n On successive refinement of diversity for fading ISI channels.\n \n \n \n\n\n \n\n\n\n In Proceedings of Allerton Conference on Communication, Control, and Computing, Illinois, September 2006. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DDj06,\n author = {S. Dusad and S N. Diggavi,},\n booktitle = {Proceedings of Allerton Conference on Communication, Control, and Computing, Illinois},\n month = {September},\n note = {},\n pages = {},\n tags = {conf,DivEmb,SucRefDiv,STcodes,OppComm,DegMsgSet},\n title = {On successive refinement of diversity for fading ISI channels},\n type = {4},\n year = {2006}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n S N. Diggavi; and D N C. Tse.\n\n\n \n \n \n \n On opportunistic codes and broadcast codes with degraded message sets.\n \n \n \n\n\n \n\n\n\n In IEEE Information Theory Workshop, Uruguay, pages 227–231, March 2006. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DTc06,\n abstract = {Diversity embedded codes are opportunistic codes\nwhich take advantage of good channel realizations while ensuring\nat least part of the information is received reliably for bad\nchannels. We establish a connection between these codes and\ndegraded message set broadcast codes. We characterize the\nachievable rate region for the parallel Gaussian degraded message\nset broadcast problem, when only the strongest user needs\nthe private information. Using this, we partially characterize the\nset of achievable rate-diversity tuples for the diversity embedded\nproblem for parallel fading channels. This shows that the diversity-multiplexing\ntradeoff for the parallel fading channel is not successively refinable.},\n author = {S N. Diggavi and D N C. Tse},\n booktitle = { IEEE Information Theory Workshop, Uruguay},\n file = {:papers:digtseitw06.pdf},\n month = {March},\n note = {},\n pages = {227--231},\n tags = {conf,DivEmb,SucRefDiv,STcodes,OppComm,DegMsgSet,SelConf},\n title = {On opportunistic codes and broadcast codes with degraded message sets},\n type = {4},\n year = {2006}\n}\n\n
\n
\n\n\n
\n Diversity embedded codes are opportunistic codes which take advantage of good channel realizations while ensuring at least part of the information is received reliably for bad channels. We establish a connection between these codes and degraded message set broadcast codes. We characterize the achievable rate region for the parallel Gaussian degraded message set broadcast problem, when only the strongest user needs the private information. Using this, we partially characterize the set of achievable rate-diversity tuples for the diversity embedded problem for parallel fading channels. This shows that the diversity-multiplexing tradeoff for the parallel fading channel is not successively refinable.\n
\n\n\n
\n\n\n
\n \n\n \n \n C. Fragouli; A. Markoupoulou; and S N. Diggavi.\n\n\n \n \n \n \n Topology inference using network coding.\n \n \n \n\n\n \n\n\n\n In Proceedings of Allerton Conference on Communication, Control, and Computing, Illinois, September 2006. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{FMDj06,\n author = {C. Fragouli and A. Markoupoulou and S N. Diggavi},\n booktitle = {Proceedings of Allerton Conference on Communication, Control, and Computing, Illinois},\n label = {fmd_c06},\n month = {September},\n note = {},\n pages = {},\n tags = {conf,NetCod,NetEngr},\n title = {Topology inference using network coding},\n type = {4},\n year = {2006}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n E. Perron; S N. Diggavi; and I E. Telatar.\n\n\n \n \n \n \n On the Role of Encoder Side-Information in Source Coding for Multiple Decoders.\n \n \n \n\n\n \n\n\n\n In IEEE International Symposium on Information Theory, Seattle, 2006. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{PDTc06,\n author = {E. Perron and S N. Diggavi and I E. Telatar,},\n booktitle = {IEEE International Symposium on Information Theory, Seattle},\n label = {pdt_c06},\n month = {},\n note = {},\n pages = {},\n tags = {conf,RDSI,NDC,IT},\n title = {On the Role of Encoder Side-Information in Source Coding for Multiple Decoders},\n type = {4},\n year = {2006}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n C. Tian; J. Chen; and S N. Diggavi.\n\n\n \n \n \n \n Multiuser successive refinement and multiple description coding.\n \n \n \n\n\n \n\n\n\n In IEEE Information Theory Workshop (ITW), Chengdu, China, pages 293–297, October 2006. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{TCDj06,\n author = { C. Tian and J. Chen and S N. Diggavi},\n booktitle = {IEEE   Information Theory Workshop (ITW), Chengdu, China},\n month = {October},\n note = {},\n pages = {293--297},\n tags = {conf,RDSI,NDC,RDmultiserSucRef,IT,MDC},\n title = {Multiuser successive refinement and multiple description coding},\n type = {4},\n year = {2006}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n C.Tian; and S N. Diggavi.\n\n\n \n \n \n \n On scalable source coding for multiple decoders with side-information.\n \n \n \n\n\n \n\n\n\n In Information Theory and Applications Workshop, San Diego, February 2006. \n invited paper\n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{TDc06,\n author = {C.Tian and S N. Diggavi},\n booktitle = {Information Theory and Applications Workshop, San Diego},\n month = {February},\n note = {invited paper},\n pages = {},\n tags = {conf,RDSI,NDC,ScalableSIcod,IT},\n title = {On scalable source coding for multiple decoders with side-information},\n type = {4},\n year = {2006}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n C.Tian; and S N. Diggavi.\n\n\n \n \n \n \n Multistage successive refinement for Wyner-Ziv source coding with degraded side information.\n \n \n \n\n\n \n\n\n\n In IEEE International Symposium on Information Theory, Seattle, July 2006. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{TDj06,\n author = {C.Tian and S N. Diggavi},\n booktitle = {IEEE International Symposium on Information Theory, Seattle},\n label = {td_j06},\n month = {July},\n note = {},\n pages = {},\n tags = {conf,RDSI,NDC,MultistageWZsucref,IT},\n title = {Multistage successive refinement for Wyner-Ziv source coding with degraded side information},\n type = {4},\n year = {2006}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n D. Vasudevan; C.Tian; and S N. Diggavi.\n\n\n \n \n \n \n Lossy source coding for a cascade communication system with side-informations.\n \n \n \n\n\n \n\n\n\n In Proceedings of Allerton Conference on Communication, Control, and Computing, Illinois, September 2006. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{VDj06,\n abstract = {We investigate source coding in a cascade\ncommunication system consisting of an encoder, a relay\nand an end terminal, where both the relay and the\nend terminal wish to reconstruct source X with certain\nfidelities. Additionally, side-informations Z and Y are\navailable at the relay and the end terminal, respectively.\nThe side-information Z at the relay is a physically degraded\nversion of side-information Y at the end terminal. We give an exact characterization for\nthe Gaussian quadratic distortion version of the problem and develop inner and outer bounds\nfor the general case.},\n author = {D. Vasudevan and C.Tian and S N. Diggavi},\n booktitle = {Proceedings of Allerton Conference on Communication, Control, and Computing, Illinois},\n file = {:papers:cascadeallerton06.pdf},\n month = {September},\n note = {},\n pages = {},\n tags = {conf,RDSI,NDC,ScalableSIcod,IT,SelConf},\n title = {Lossy source coding for a cascade communication system with side-informations},\n type = {4},\n year = {2006}\n}\n\n
\n
\n\n\n
\n We investigate source coding in a cascade communication system consisting of an encoder, a relay and an end terminal, where both the relay and the end terminal wish to reconstruct source X with certain fidelities. Additionally, side-informations Z and Y are available at the relay and the end terminal, respectively. The side-information Z at the relay is a physically degraded version of side-information Y at the end terminal. We give an exact characterization for the Gaussian quadratic distortion version of the problem and develop inner and outer bounds for the general case.\n
\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 6\n \n \n (1)\n \n \n
\n
\n \n \n
\n \n\n \n \n Naofal Al-Dhahir; Suhas N. Diggavi; and Anastasios Stamoulis.\n\n\n \n \n \n \n US Patent Number US 7,130,355: Amelioration of Inter-Carrier Interference in OFDM.\n \n \n \n\n\n \n\n\n\n October 2006.\n US Patent Number US 7,130,355 \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@misc{Dp06,\n author = {Naofal Al-Dhahir and Suhas N. Diggavi and  Anastasios Stamoulis},\n label = {ads_p06},\n month = {October},\n note = {US Patent  Number US 7,130,355 },\n tags = {patent},\n title = {US Patent  Number US 7,130,355: Amelioration of Inter-Carrier Interference in OFDM},\n type = {6},\n year = {2006}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n\n\n\n
\n
\n\n
\n
\n  \n 2005\n \n \n (2)\n \n \n
\n
\n \n \n
\n
\n  \n 2\n \n \n (4)\n \n \n
\n
\n \n \n
\n \n\n \n \n L. Becchetti; S N. Diggavi; S. Leonardi; A. Marchetti-Spaccamela; S. Muthukrishnan; T. Nandagopal; and A. Vitaletti.\n\n\n \n \n \n \n Downlink Scheduling for Multirate Wireless Networks.\n \n \n \n\n\n \n\n\n\n Networks, 45(1): 9–22. January 2005.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{BDLMMNVj05,\n abstract = {This studied the online scheduling problem of allocating time or frequency slots\nto multiple users in a wireless broadcast channel. The study was from a CS algorithms viewpoint, with criteria such as delay (average/maximal) and {\\em stretch} (relative delay).\nWe gave a  resource-augmented competitive analysis of many scheduling algorithms, and \ndemonstrated that a small amount of overprovisioning (resource-augmentation) will make\nthe scheduling algorithms competitive to the off-line optimal, even for adversarial demand\ninputs.},\n author = {L. Becchetti and S N. Diggavi and S. Leonardi and A. Marchetti-Spaccamela and S. Muthukrishnan and T. Nandagopal and A. Vitaletti},\n file = {:papers:dimacs.pdf},\n journal = {Networks},\n label = {ParSchedj05},\n month = {January},\n note = {},\n number = {1},\n pages = {9--22},\n tags = {journal,WiNet,CSalgo,ParSched},\n title = {Downlink Scheduling for Multirate Wireless Networks},\n type = {2},\n volume = {45},\n year = {2005}\n}\n\n
\n
\n\n\n
\n This studied the online scheduling problem of allocating time or frequency slots to multiple users in a wireless broadcast channel. The study was from a CS algorithms viewpoint, with criteria such as delay (average/maximal) and \\em stretch (relative delay). We gave a resource-augmented competitive analysis of many scheduling algorithms, and demonstrated that a small amount of overprovisioning (resource-augmentation) will make the scheduling algorithms competitive to the off-line optimal, even for adversarial demand inputs.\n
\n\n\n
\n\n\n
\n \n\n \n \n Robert Calderbank; Sushanta Das; N Al-Dhahir; Suhas Diggavi; and others.\n\n\n \n \n \n \n Construction and analysis of a new quaternionic space-time code for $4 $ transmit antennas.\n \n \n \n\n\n \n\n\n\n Communications in Information & Systems, 5(1): 97–122. 2005.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{calderbank2005construction,\n author = {Calderbank, Robert and Das, Sushanta and Al-Dhahir, N and Diggavi, Suhas and others},\n journal = {Communications in Information \\& Systems},\n label = {cdad_j05},\n number = {1},\n pages = {97--122},\n publisher = {International Press of Boston},\n tags = {journal},\n title = {Construction and analysis of a new quaternionic space-time code for $4 $ transmit antennas},\n type = {2},\n volume = {5},\n year = {2005}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n S N. Diggavi; M. Grossglauser; and D N C. Tse.\n\n\n \n \n \n \n One-dimensional mobility increases capacity of wireless adhoc networks.\n \n \n \n\n\n \n\n\n\n IEEE Transactions on Information Theory, 51(11): 3947–3854. November 2005.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DGTj05,\n abstract = {This paper studies the scaling capacity of asymptotically large wireless networks.\nIt shows that even restricted one-dimensional mobility allows the total capacity of the wireless\nnetwork scales linearly with the number of nodes. This implies that per-node capacity scales\nas a constant, demonstrating that even restricted mobility can be used to provide non-diminishing throughput for large-scale wireless networks. This is demonstrated by utilizing the multi-user diversity which is instantiated through node-mobility.},\n author = {S N. Diggavi and M. Grossglauser and D N C. Tse},\n file = {:papers:gc.pdf},\n journal = {IEEE Transactions on Information Theory},\n label = {dgt_j05},\n month = {November},\n note = {},\n number = {11},\n pages = {3947--3854},\n tags = {journal,WiNet,1Dmob,DynamWiNet},\n title = {One-dimensional mobility increases capacity of wireless adhoc networks},\n type = {2},\n volume = {51},\n year = {2005}\n}\n\n
\n
\n\n\n
\n This paper studies the scaling capacity of asymptotically large wireless networks. It shows that even restricted one-dimensional mobility allows the total capacity of the wireless network scales linearly with the number of nodes. This implies that per-node capacity scales as a constant, demonstrating that even restricted mobility can be used to provide non-diminishing throughput for large-scale wireless networks. This is demonstrated by utilizing the multi-user diversity which is instantiated through node-mobility.\n
\n\n\n
\n\n\n
\n \n\n \n \n F. Oggier; N J A. Sloane; S N. Diggavi; and A R. Calderbank.\n\n\n \n \n \n \n Non-intersecting subspaces with finite alphabet.\n \n \n \n\n\n \n\n\n\n IEEE Transactions on Information Theory, 51(12): 4320–4325. December 2005.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{OSDCj05,\n abstract = {This paper was motivated by non-coherent space-time codes with\nfixed transmit alphabet constraints. To obtain maximal diversity order, the subspaces\nrepresented by the space-time codeword matrix needs to be non-intersecting. This led\nto the study of how many non-intersecting subspaces can be constructed from a finite\nalphabet.},\n author = {F. Oggier and N J A. Sloane and S N. Diggavi and A R. Calderbank,},\n file = {:papers:ps:subsp.pdf},\n journal = {IEEE Transactions on Information Theory},\n label = {osdc_j05},\n month = {December},\n note = {},\n number = {12},\n pages = {4320--4325},\n tags = {journal,NonCohComm,STcodes,Subsp},\n title = {Non-intersecting subspaces with finite alphabet},\n type = {2},\n volume = {51},\n year = {2005}\n}\n\n
\n
\n\n\n
\n This paper was motivated by non-coherent space-time codes with fixed transmit alphabet constraints. To obtain maximal diversity order, the subspaces represented by the space-time codeword matrix needs to be non-intersecting. This led to the study of how many non-intersecting subspaces can be constructed from a finite alphabet.\n
\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 4\n \n \n (5)\n \n \n
\n
\n \n \n
\n \n\n \n \n A R. Calderbank; S. Das; N. Al-Dhahir; and S N. Diggavi.\n\n\n \n \n \n \n A Novel Full-Rate Full-Diversity STBC with Application to WiMAX.\n \n \n \n\n\n \n\n\n\n In Proceedings of IEEE Vehicular Technology Conference, Dallas, Texas, USA, pages 1791–1795, September 2005. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{CDADj05,\n author = {A R. Calderbank and S.  Das and N. Al-Dhahir and S N. Diggavi},\n booktitle = {Proceedings of IEEE Vehicular Technology Conference, Dallas, Texas, USA},\n month = {September},\n note = {},\n pages = {1791--1795},\n tags = {conf,quaternions,STcodes},\n title = {A Novel Full-Rate Full-Diversity STBC with Application to WiMAX},\n type = {4},\n year = {2005}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n S. Chen; S N. Diggavi; S. Dusad; and S. Muthukrishnan.\n\n\n \n \n \n \n Efficient String Matching Algorithms for Combinatorial Universal Denoising.\n \n \n \n\n\n \n\n\n\n In IEEE Data Compression Conference (DCC), Snowbird, Utah, pages 153–162, March 2005. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{CDDMj05,\n abstract = {Inspired by the combinatorial denoising method DUDE, we present efficient algorithms for\nimplementing this idea for arbitrary contexts or for using it within subsequences. We also propose\neffective, efficient denoising error estimators so we can find the best denoising of an input sequence\nover different context lengths. Our methods are simple, drawing from string matching methods and\nradix sorting. We also present experimental results of our proposed algorithms.},\n author = {S. Chen and S N. Diggavi and S. Dusad and S. Muthukrishnan},\n booktitle = {IEEE   Data Compression Conference (DCC), Snowbird, Utah},\n file = {:papers:strmtch.pdf},\n label = {cddm_c05},\n month = {March},\n note = {},\n pages = {153--162},\n tags = {conf,CSalgo,Denoising,SP,SelConf},\n title = {Efficient String Matching Algorithms for Combinatorial Universal Denoising},\n type = {4},\n year = {2005}\n}\n\n
\n
\n\n\n
\n Inspired by the combinatorial denoising method DUDE, we present efficient algorithms for implementing this idea for arbitrary contexts or for using it within subsequences. We also propose effective, efficient denoising error estimators so we can find the best denoising of an input sequence over different context lengths. Our methods are simple, drawing from string matching methods and radix sorting. We also present experimental results of our proposed algorithms.\n
\n\n\n
\n\n\n
\n \n\n \n \n S. Das; N. Al-Dhahir; S N. Diggavi; and A R. Calderbank.\n\n\n \n \n \n \n Opportunistic Space-Time Block Codes.\n \n \n \n\n\n \n\n\n\n In Proceedings of IEEE Vehicular Technology Conference, Dallas, Texas, USA, pages 2025–2029, September 2005. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DADCj05,\n author = {S.  Das and N. Al-Dhahir and S N. Diggavi and A R. Calderbank},\n booktitle = {Proceedings of IEEE Vehicular Technology Conference, Dallas, Texas, USA},\n month = {September},\n note = {},\n pages = {2025--2029},\n tags = {conf,DivEmb,OppComm,STcodes},\n title = {Opportunistic Space-Time Block Codes},\n type = {4},\n year = {2005}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n S N. Diggavi; S. Dusad; A. R. Calderbank; and N. Al-Dhahir.\n\n\n \n \n \n \n On Diversity Embedded codes.\n \n \n \n\n\n \n\n\n\n In Proceedings of Allerton Conference on Communication, Control, and Computing, Illinois, September 2005. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DDCAj05,\n author = {S N. Diggavi and S. Dusad and A. R. Calderbank and N. Al-Dhahir},\n booktitle = {Proceedings of Allerton Conference on Communication, Control, and Computing, Illinois},\n month = {September},\n note = {},\n pages = {},\n tags = {conf,DivEmb,OppComm,RankDistCod,CodTh,SucRefDiv,DegMsgSet},\n title = {On Diversity Embedded codes},\n type = {4},\n year = {2005}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n S N. Diggavi; and D N C. Tse.\n\n\n \n \n \n \n Fundamental limits of diversity embedded codes over fading channels.\n \n \n \n\n\n \n\n\n\n In IEEE International Symposium on Information Theory, Adelaide, Australia, pages 510–514, September 2005. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DTj05,\n abstract = {This paper shows that the diversity multiplexing tradeoff for flat fading\nchannels with a single degree of freedom (MISO/SIMO) is successively refinable.},\n author = {S N. Diggavi and D N C. Tse},\n booktitle = {IEEE International Symposium on Information Theory, Adelaide, Australia},\n file = {:papers:sucrefisit05.pdf},\n month = {September},\n note = {},\n pages = {510--514},\n tags = {conf,DivEmb,SucRefDiv,STcodes,OppComm,DegMsgSet,SelConf},\n title = {Fundamental limits of diversity embedded codes over fading channels},\n type = {4},\n year = {2005}\n}\n\n
\n
\n\n\n
\n This paper shows that the diversity multiplexing tradeoff for flat fading channels with a single degree of freedom (MISO/SIMO) is successively refinable.\n
\n\n\n
\n\n\n\n\n\n
\n
\n\n\n\n\n
\n
\n\n
\n
\n  \n 2004\n \n \n (3)\n \n \n
\n
\n \n \n
\n
\n  \n 2\n \n \n (1)\n \n \n
\n
\n \n \n
\n \n\n \n \n S N. Diggavi; N. Al-Dhahir; A. Stamoulis; and A R. Calderbank.\n\n\n \n \n \n \n Great Expectations: The value of spatial diversity to wireless networks.\n \n \n \n\n\n \n\n\n\n Proceedings of the IEEE, 92(2): 217–270. February 2004.\n This paper won the 2006 IEEE Donald Fink Prize prize paper award, which is an IEEE-wide paper award across all IEEE journals and magazines.\n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DASCj04,\n abstract = {Spatial diversity is realized through multiple independently fading transmit/receive antenna paths in single-user communications; through independently fading links in multi-user communications; through multiple independent routing paths in networks.\nAdopting spatial diversity as a central theme, we study its information-theoretic foundations, then we examine its benefits across the physical (signal transmission/coding and receiver signal processing) and networking (resource allocation, routing, and applications) layers.},\n author = {S N. Diggavi and N. Al-Dhahir and A. Stamoulis and A R. Calderbank,},\n file = {:papers:procieee.pdf},\n journal = {Proceedings of the IEEE},\n label = {dasc_j04},\n month = {February},\n note = {This paper won the  2006 IEEE Donald Fink Prize prize paper award, which is an IEEE-wide paper award across all IEEE journals and magazines.},\n number = {2},\n pages = {217--270},\n tags = {journal,WiNet,ProcIEEE04,FinkAward,STcodes},\n title = {Great Expectations: The value of spatial diversity to wireless networks},\n type = {2},\n volume = {92},\n year = {2004}\n}\n\n
\n
\n\n\n
\n Spatial diversity is realized through multiple independently fading transmit/receive antenna paths in single-user communications; through independently fading links in multi-user communications; through multiple independent routing paths in networks. Adopting spatial diversity as a central theme, we study its information-theoretic foundations, then we examine its benefits across the physical (signal transmission/coding and receiver signal processing) and networking (resource allocation, routing, and applications) layers.\n
\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 3\n \n \n (1)\n \n \n
\n
\n \n \n
\n \n\n \n \n S N. Diggavi; N. Al-Dhahir; and A R. Calderbank.\n\n\n \n \n \n \n Diversity embedded multiple antenna communications.\n \n \n \n\n\n \n\n\n\n Volume 66 of Series on Discrete Mathematics and Theoretical Computer Science. Diversity embedded multiple antenna communications, pages 285–302. 2004.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inbook{DACib04,\n abstract = {Diversity embedded codes give different levels of diversity protection to \ndifferent information streams. This was the short paper that introduced diversity embedded codes.},\n author = {S N. Diggavi and N. Al-Dhahir and A R. Calderbank},\n booktitle = {AMS edited volume on ``Network Information Theory},\n editors = {P. Gupta G. Kramer and A J. van Wijngaarden},\n file = {{:papers:dimacschap.pdf|}},\n pages = {285--302},\n series = {Series on Discrete Mathematics and Theoretical Computer Science},\n tags = {BookChap,DivEmb,STcodes,OppComm},\n title = {Diversity embedded multiple antenna communications},\n type = {3},\n volume = {66},\n year = {2004}\n}\n\n
\n
\n\n\n
\n Diversity embedded codes give different levels of diversity protection to different information streams. This was the short paper that introduced diversity embedded codes.\n
\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 4\n \n \n (5)\n \n \n
\n
\n \n \n
\n \n\n \n \n A R. Calderbank; S N. Diggavi; and N.Al-Dhahir.\n\n\n \n \n \n \n Space-Time Signaling based on Kerdock and Delsarte-Goethals Codes.\n \n \n \n\n\n \n\n\n\n In IEEE International Conference on Communications (ICC), Paris, pages 483–487, June 2004. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{CDAj04,\n author = {A R. Calderbank and S N. Diggavi and N.Al-Dhahir},\n booktitle = {IEEE International Conference on Communications (ICC), Paris},\n month = {June},\n note = {},\n pages = {483--487},\n tags = {conf,DivEmb,OppComm,RankDistCod,CodTh},\n title = {Space-Time Signaling based on Kerdock and Delsarte-Goethals Codes},\n type = {4},\n year = {2004}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n A R. Calderbank; S N. Diggavi; S. Das; and N. Al-Dhahir.\n\n\n \n \n \n \n Construction and Analysis of a New 4x4 Orthogonal Space-Time Block Code.\n \n \n \n\n\n \n\n\n\n In IEEE International Symposium on Information Theory (ISIT) Chicago, pages 310, June-July 2004. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{CDDAj04,\n author = {A R. Calderbank and S N. Diggavi and S. Das and N. Al-Dhahir,},\n booktitle = {IEEE International Symposium on Information Theory (ISIT) Chicago},\n month = {June-July},\n note = {},\n pages = {310},\n tags = {conf,quaternions,STcodes},\n title = {Construction and Analysis of a New 4x4 Orthogonal Space-Time Block Code},\n type = {4},\n year = {2004}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n S N. Diggavi; and D N C. Tse.\n\n\n \n \n \n \n On successive refinement of diversity.\n \n \n \n\n\n \n\n\n\n In Allerton Conference on Communication, Control, and Computing, Illinois, September 2004. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DTj04,\n author = {S N. Diggavi and D N C. Tse},\n booktitle = {Allerton Conference on Communication, Control, and Computing, Illinois},\n month = {September},\n note = {},\n pages = {},\n tags = {conf,DivEmb,SucRefDiv,STcodes,OppComm,DegMsgSet},\n title = {On successive refinement of diversity},\n type = {4},\n year = {2004}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n S N. Diggavi; and V A. Vaishampayan.\n\n\n \n \n \n \n On multiple description source coding with decoder side information.\n \n \n \n\n\n \n\n\n\n In IEEE Information Theory Workshop (ITW), San Antonio, October 2004. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DVj04,\n abstract = {We formulate a multi-terminal source coding\nproblem, where we are required to construct a multiple description\nsource code for a source sequence when side information\nabout dependent random processes is available at the decoder\nonly, or at both the decoder and the encoder. We describe\nan achievable rate-distortion region for these problems. In the quadratic Gaussian\ncase, and when there is common side information among\nthe decoders, we show that the rate region when both the encoder\nand decoder have access to the side information coincides\nwith that of decoder–only side information. This is analogous\nto the single-description (Wyner-Ziv) case, and an explicit\ncharacterization of the rate-distortion region is provided\nfor this case.},\n author = {S N. Diggavi and V A. Vaishampayan},\n booktitle = {IEEE   Information Theory Workshop (ITW), San Antonio},\n file = {:papers:ps:mdsi.pdf},\n month = {October},\n note = {},\n pages = {},\n tags = {conf,RDSI,NDC,IT,MDC,SelConf},\n title = {On multiple description source coding with decoder side information},\n type = {4},\n year = {2004}\n}\n\n
\n
\n\n\n
\n We formulate a multi-terminal source coding problem, where we are required to construct a multiple description source code for a source sequence when side information about dependent random processes is available at the decoder only, or at both the decoder and the encoder. We describe an achievable rate-distortion region for these problems. In the quadratic Gaussian case, and when there is common side information among the decoders, we show that the rate region when both the encoder and decoder have access to the side information coincides with that of decoder–only side information. This is analogous to the single-description (Wyner-Ziv) case, and an explicit characterization of the rate-distortion region is provided for this case.\n
\n\n\n
\n\n\n
\n \n\n \n \n F. Oggier; N J A. Sloane; S N. Diggavi; and A R. Calderbank.\n\n\n \n \n \n \n Non-intersecting subspaces with finite alphabet.\n \n \n \n\n\n \n\n\n\n In IEEE International Symposium on Information Theory (ISIT) Chicago, pages 455, June-July 2004. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{OSDCj04,\n author = { F. Oggier and N J A. Sloane and S N. Diggavi and A R. Calderbank},\n booktitle = {IEEE International Symposium on Information Theory (ISIT) Chicago},\n month = {June-July},\n note = {},\n pages = {455},\n tags = {conf,NonCohComm,STcodes,Subsp},\n title = {Non-intersecting subspaces with finite alphabet},\n type = {4},\n year = {2004}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n\n\n\n
\n
\n\n
\n
\n  \n 2003\n \n \n (4)\n \n \n
\n
\n \n \n
\n
\n  \n 2\n \n \n (1)\n \n \n
\n
\n \n \n
\n \n\n \n \n Suhas N Diggavi; Naofal Al-Dhahir; and A. Robert Calderbank.\n\n\n \n \n \n \n Algebraic properties of space-time block codes in intersymbol interference multiple-access channels.\n \n \n \n\n\n \n\n\n\n IEEE Transactions on Information Theory, 49(10): 2403–2414. 2003.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{diggavi2003algebraic,\n author = {Diggavi, Suhas N and Al-Dhahir, Naofal and Calderbank, A. Robert},\n journal = {IEEE Transactions on Information Theory},\n label = {dac_j03},\n number = {10},\n pages = {2403--2414},\n publisher = {IEEE},\n tags = {journal},\n title = {Algebraic properties of space-time block codes in intersymbol interference multiple-access channels},\n type = {2},\n volume = {49},\n year = {2003}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 3\n \n \n (1)\n \n \n
\n
\n \n \n
\n \n\n \n \n S N. Diggavi; N. Al-Dhahir; and A R. Calderbank.\n\n\n \n \n \n \n Diversity Order of Space-Time Block Codes in Inter-Symbol Interference Multiple-Access Channels.\n \n \n \n\n\n \n\n\n\n Volume 62 of Series on Discrete Mathematics and Theoretical Computer Science. Diversity Order of Space-Time Block Codes in Inter-Symbol Interference Multiple-Access Channels. 2003.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inbook{DACib03,\n author = {S N. Diggavi and N. Al-Dhahir and A R. Calderbank},\n booktitle = {AMS edited volume on Multiantenna Channels: Capacity, Coding and Signal Processing},\n editors = {J. Foschini and S. Verdu},\n series = {Series on Discrete Mathematics and Theoretical Computer Science},\n tags = {BookChap,STcodes,ISIMAC,quaternions},\n title = {Diversity Order of Space-Time Block Codes in Inter-Symbol Interference Multiple-Access Channels},\n type = {3},\n volume = {62},\n year = {2003}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 4\n \n \n (4)\n \n \n
\n
\n \n \n
\n \n\n \n \n B. Beferull-Lozano; and S N. Diggavi.\n\n\n \n \n \n \n Nested trellis codes and shaping for the transmitter side-information problem.\n \n \n \n\n\n \n\n\n\n In IEEE International Symposium on Information Theory (ISIT), Yokohama, Japan, pages 183, July 2003. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{BDj03,\n author = {B. Beferull-Lozano and S N. Diggavi},\n booktitle = {IEEE International Symposium on Information Theory (ISIT), Yokohama, Japan},\n month = {July},\n note = {},\n pages = {183},\n tags = {conf},\n title = {Nested trellis codes and shaping for the transmitter side-information problem},\n type = {4},\n year = {2003}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n S N. Diggavi; N. Al-Dhahir; and A R. Calderbank.\n\n\n \n \n \n \n Multiuser Joint Equalization and Decoding of Space-Time Codes.\n \n \n \n\n\n \n\n\n\n In IEEE International Conference on Communications (ICC), Anchorage, Alaska, pages 2643–2647, May 2003. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DACj03,\n author = {S N. Diggavi and N. Al-Dhahir and A R. Calderbank},\n booktitle = {IEEE International Conference on Communications (ICC), Anchorage, Alaska},\n month = {May},\n note = {},\n pages = {2643--2647},\n tags = {conf,ISIMAC,STcodes,quaternions},\n title = {Multiuser Joint Equalization and Decoding of Space-Time Codes},\n type = {4},\n year = {2003}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n X. Gao; S N. Diggavi; and S. Muthukrishnan.\n\n\n \n \n \n \n LHP: An end-to-end reliable transport protocol over wireless data networks.\n \n \n \n\n\n \n\n\n\n In IEEE International Conference on Communications (ICC), Anchorage, Alaska, pages 66–70, May 2003. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{GDMj03,\n abstract = {Implementing end-to-end TCP in wireless networks faces\ntwo problems. First, it is well known that TCP can not distinguish packet losses\ndue to link failures and that due to network congestion. Second, TCP congestion\ncontrol mechanism does not deal effectively with large amount of out-oforder\npacket retransmissions; this problem has received less attention in literature.\nIn this paper, we present solutions to both these problems. In particular,\nwe present a Link-Layer Header Protection (LHP) protocol which implements\nExplicit Loss Notification (ELN) in a simple, scalable manner, addressing the\nfirst problem. We also modify the congestion control mechanism to incorporate\nknowledge of ELN and packet loss pattern into retransmission decisions, solving\nthe second problem. We combine both these solutions with TCP to present\nscalable, reliable end-to-end wireless transport protocol.},\n author = {X. Gao and S N. Diggavi and S. Muthukrishnan},\n booktitle = {IEEE International Conference on Communications (ICC), Anchorage, Alaska},\n file = {:papers:lhp.pdf},\n label = {gdm_c03},\n month = {May},\n note = {},\n pages = {66--70},\n tags = {conf,WiNet,TCP,SelConf},\n title = {LHP: An end-to-end reliable transport protocol over wireless data networks},\n type = {4},\n year = {2003}\n}\n\n
\n
\n\n\n
\n Implementing end-to-end TCP in wireless networks faces two problems. First, it is well known that TCP can not distinguish packet losses due to link failures and that due to network congestion. Second, TCP congestion control mechanism does not deal effectively with large amount of out-oforder packet retransmissions; this problem has received less attention in literature. In this paper, we present solutions to both these problems. In particular, we present a Link-Layer Header Protection (LHP) protocol which implements Explicit Loss Notification (ELN) in a simple, scalable manner, addressing the first problem. We also modify the congestion control mechanism to incorporate knowledge of ELN and packet loss pattern into retransmission decisions, solving the second problem. We combine both these solutions with TCP to present scalable, reliable end-to-end wireless transport protocol.\n
\n\n\n
\n\n\n
\n \n\n \n \n G. Varadhan; S. Krishnan; S N. Diggavi; Y. Kim; and D. Manocha.\n\n\n \n \n \n \n Efficient Max-norm Distance Computation and Reliable Voxelization.\n \n \n \n\n\n \n\n\n\n In Eurographics Symposium on Geometry Processing, Aachen, Germany, pages 116–126, June 2003. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{VKDKMj03,\n author = {G. Varadhan and S. Krishnan and S N. Diggavi and Y. Kim and D. Manocha},\n booktitle = {Eurographics Symposium on Geometry Processing, Aachen, Germany},\n label = {vkdkm_c03},\n month = {June},\n note = {},\n pages = {116--126},\n tags = {conf,SP,Graphics},\n title = {Efficient Max-norm Distance Computation and Reliable Voxelization},\n type = {4},\n year = {2003}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 6\n \n \n (1)\n \n \n
\n
\n \n \n
\n \n\n \n \n Gregory G. Raleigh; Suhas N. Diggavi; V K. Jones; and A. Paulraj.\n\n\n \n \n \n \n US Patent Number US 6,665,545: Method and apparatus for adaptive transmission beamforming in a wireless communication system.\n \n \n \n\n\n \n\n\n\n December 2003.\n US Patent Number US 6,665,545\n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@misc{RDJPp03,\n author = {Gregory G. Raleigh and Suhas N. Diggavi and  V K. Jones and A. Paulraj},\n month = {December},\n note = {US Patent Number US  6,665,545},\n tags = {patent},\n title = {US Patent Number US  6,665,545: Method and apparatus for adaptive transmission beamforming in a wireless communication system},\n type = {6},\n year = {2003}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n\n\n\n
\n
\n\n
\n
\n  \n 2002\n \n \n (2)\n \n \n
\n
\n \n \n
\n
\n  \n 2\n \n \n (2)\n \n \n
\n
\n \n \n
\n \n\n \n \n S N. Diggavi; N J A. Sloane; and V A. Vaishampayan.\n\n\n \n \n \n \n Asymmetric Multiple Description Lattice Vector Quantizers.\n \n \n \n\n\n \n\n\n\n IEEE Transactions on Information Theory, 48(1): 174–191. January 2002.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DSVj02,\n abstract = {This designs asymmetric multiple description lattice quantizers, which covers\nthe entire range of the distortion profile, from symmetric to successive refinement. We present a solution to the labeling problem, which is an important part of the construction. We show that this construction is optimal in the high-rate regime, by comparing it to the information-theoretic bounds.},\n author = {S N. Diggavi and N J A. Sloane and V A. Vaishampayan},\n file = {:papers:ps:final_mdc.pdf},\n journal = {IEEE Transactions on Information Theory},\n month = {January},\n note = {},\n number = {1},\n pages = {174--191},\n tags = {journal,NDC,IT,MDC,LatticeSrc},\n title = {Asymmetric Multiple Description Lattice Vector Quantizers},\n type = {2},\n volume = {48},\n year = {2002}\n}\n\n
\n
\n\n\n
\n This designs asymmetric multiple description lattice quantizers, which covers the entire range of the distortion profile, from symmetric to successive refinement. We present a solution to the labeling problem, which is an important part of the construction. We show that this construction is optimal in the high-rate regime, by comparing it to the information-theoretic bounds.\n
\n\n\n
\n\n\n
\n \n\n \n \n C. Fragouli; N. Al-Dhahir; S N. Diggavi; and W. Turin.\n\n\n \n \n \n \n Prefiltered M-BJCR equalizer for MIMO frequency selective channels.\n \n \n \n\n\n \n\n\n\n IEEE Transactions on Communications, 50(5): 742–753. May 2002.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{FADTj02,\n author = {C. Fragouli and N. Al-Dhahir and S N. Diggavi and W. Turin},\n file = {:papers:ps:mbcjr.pdf},\n journal = {IEEE Transactions on Communications},\n label = {fadt_j02},\n month = {May},\n note = {},\n number = {5},\n pages = {742--753},\n tags = {journal,SP,STWC,STcodes},\n title = {Prefiltered M-BJCR equalizer for MIMO frequency selective channels},\n type = {2},\n volume = {50},\n year = {2002}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 4\n \n \n (7)\n \n \n
\n
\n \n \n
\n \n\n \n \n N. Al-Dhahir; and S N. Diggavi.\n\n\n \n \n \n \n On achievable rates on time-varying frequency-selective channels.\n \n \n \n\n\n \n\n\n\n In Conference on Information Sciences and Systems, Princeton, New Jersey, pages 860–865, March 2002. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{ADj02,\n author = {N. Al-Dhahir and S N. Diggavi,},\n booktitle = {Conference on Information Sciences and Systems, Princeton, New Jersey},\n label = {ad_c02},\n month = {March},\n note = {},\n pages = {860--865},\n tags = {conf,WiNet,IT,STWC},\n title = {On achievable rates on time-varying frequency-selective channels},\n type = {4},\n year = {2002}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n L.Becchetti; S N. Diggavi; S. Leonardi; A. Marchetti-Spaccamela; S. Muthukrishnan; T. Nandagopal; and A.Vitaletti.\n\n\n \n \n \n \n Parallel scheduling problems in next generation wireless networks.\n \n \n \n\n\n \n\n\n\n In ACM Symp. Par. Alg. and Arch. (SPAA), pages 238–247, August 2002. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{BDLMMNVj02,\n author = {L.Becchetti and S N. Diggavi and S. Leonardi and A. Marchetti-Spaccamela and S. Muthukrishnan and T. Nandagopal and A.Vitaletti},\n booktitle = {ACM Symp. Par. Alg. and Arch. (SPAA)},\n file = {:papers:ps:spaa02.pdf},\n label = {spaa02},\n month = {August},\n note = {},\n pages = {238--247},\n tags = {conf,WiNet,CSalgo,ParSched},\n title = {Parallel scheduling problems in next generation wireless networks},\n type = {4},\n year = {2002}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n S N. Diggavi; N. Al-Dhahir; A. Stamoulis; and A R. Calderbank.\n\n\n \n \n \n \n Differential Space-Time Transmission for Frequency-Selective Channels.\n \n \n \n\n\n \n\n\n\n In Conference on Information Sciences and Systems, Princeton, New Jersey, pages 259–264, March 2002. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DASCj02,\n author = {S N. Diggavi and N. Al-Dhahir and A. Stamoulis and A R. Calderbank},\n booktitle = {Conference on Information Sciences and Systems, Princeton, New Jersey},\n label = {dasc_j02},\n month = {March},\n note = {},\n pages = {259--264},\n tags = {conf,STcodes,DiffSTC,SP,STWC},\n title = {Differential Space-Time Transmission for Frequency-Selective Channels},\n type = {4},\n year = {2002}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n S N. Diggavi; N. Al-Dhahir; and A. Stamoulis.\n\n\n \n \n \n \n Inter-carrier interference for MIMO OFDM.\n \n \n \n\n\n \n\n\n\n In IEEE International Conference on Communications, New York, pages 485–489, May 2002. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DASj02,\n author = {S N. Diggavi and N. Al-Dhahir and A. Stamoulis},\n booktitle = {IEEE International Conference on Communications, New York},\n month = {May},\n note = {},\n pages = {485--489},\n tags = {conf,MIMOofdm,ICIofdm,SP,STWC},\n title = {Inter-carrier interference for MIMO OFDM},\n type = {4},\n year = {2002}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n S N. Diggavi; and M. Grossglauser.\n\n\n \n \n \n \n Bounds on capacity of deletion channels.\n \n \n \n\n\n \n\n\n\n In IEEE International Symposium on Information Theory (ISIT), Lausanne, pages 421, June 2002. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DGj02,\n author = {S N. Diggavi and M. Grossglauser},\n booktitle = {IEEE International Symposium on Information Theory (ISIT), Lausanne},\n month = {June},\n note = {},\n pages = {421},\n tags = {conf,DelChan,IT},\n title = {Bounds on capacity of deletion channels},\n type = {4},\n year = {2002}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n S N. Diggavi; M. Grossglauser; and D N C. Tse.\n\n\n \n \n \n \n Even one-dimensional mobility increases capacity of wireless adhoc networks.\n \n \n \n\n\n \n\n\n\n In IEEE International Symposium on Information Theory (ISIT), Lausanne, pages 352, June 2002. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DGTj02,\n author = {S N. Diggavi and M. Grossglauser and D N C. Tse},\n booktitle = {IEEE International Symposium on Information Theory (ISIT), Lausanne},\n label = {dgt_c02},\n month = {June},\n note = {},\n pages = {352},\n tags = {conf,WiNet,1Dmob,DynamWiNet},\n title = {Even one-dimensional mobility increases capacity of wireless adhoc networks},\n type = {4},\n year = {2002}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n A. Stamoulis; S N. Diggavi; and N. Al-Dhahir.\n\n\n \n \n \n \n Estimation of fast-fading channels in OFDM.\n \n \n \n\n\n \n\n\n\n In IEEE Wireless Communications and Networking Conference, Florida, pages 465–470, March 2002. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{SDAj02,\n author = {A. Stamoulis and S N. Diggavi and N. Al-Dhahir},\n booktitle = {IEEE Wireless Communications and Networking Conference, Florida},\n month = {March},\n note = {},\n pages = {465--470},\n tags = {conf,MIMOofdm,ICIofdm,SP,STWC},\n title = {Estimation of fast-fading channels in OFDM},\n type = {4},\n year = {2002}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n\n\n\n
\n
\n\n
\n
\n  \n 2001\n \n \n (2)\n \n \n
\n
\n \n \n
\n
\n  \n 2\n \n \n (3)\n \n \n
\n
\n \n \n
\n \n\n \n \n N. Al-Dhahir; and S N. Diggavi.\n\n\n \n \n \n \n Maximum Throughput Loss of Noisy ISI Channels Due to Narrowband Interference.\n \n \n \n\n\n \n\n\n\n IEEE Communication Letters, 5(6): 233–235. June 2001.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{ADj01,\n abstract = {Narrowband interference (NBI) could occur in transmission media such as twisted pair or coaxial cable. We analyzed the effect of such interference on the data throughput for finite-blocklength transmission over noisy inter-symbol interference channels. It was shown that the worst narrowband interference spreads its power over the “sweet spots” of the signal (i.e. where the signal puts highest power). More precisely, the auto-correlation matrix of worst-case narrowband (rank-deficient) interference is shown to have the same eigendirections as the signal. Moreover, if the rank of the covariance matrix of the NBI is M<N (where N is the rank of the signal and M is dimension of the space) then the worst interferer is shown to put its power along the M largest eigendirections of the signal.},\n author = {N. Al-Dhahir and S N. Diggavi},\n file = {:papers:ps:nbi.pdf},\n journal = {IEEE Communication Letters},\n label = {ad_j01},\n month = {June},\n note = {},\n number = {6},\n pages = {233--235},\n tags = {journal,WorstNoise,RobComm,IT},\n title = {Maximum Throughput Loss of Noisy ISI Channels Due to Narrowband Interference},\n type = {2},\n volume = {5},\n year = {2001}\n}\n\n
\n
\n\n\n
\n Narrowband interference (NBI) could occur in transmission media such as twisted pair or coaxial cable. We analyzed the effect of such interference on the data throughput for finite-blocklength transmission over noisy inter-symbol interference channels. It was shown that the worst narrowband interference spreads its power over the “sweet spots” of the signal (i.e. where the signal puts highest power). More precisely, the auto-correlation matrix of worst-case narrowband (rank-deficient) interference is shown to have the same eigendirections as the signal. Moreover, if the rank of the covariance matrix of the NBI is M\n\n\n
\n\n\n
\n \n\n \n \n S N. Diggavi; and T M. Cover.\n\n\n \n \n \n \n Worst additive noise under covariance constraints.\n \n \n \n\n\n \n\n\n\n IEEE Transactions on Information Theory, 47(7): 3072–3081. November 2001.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DCj01,\n abstract = {This paper started with a simple question: is the maximum entropy noise the worst noise for additive channels? In the case of scalar channels with a power constraint\non the noise, this is true, as is well known. However, we show that in the vector case, with\ncovariance constraints, the answer is yes and no. Yes, if the transmit power is large enough\nand no otherwise. Along the way we give a solution to the mutual information game with\ncovariance constraints and show that Gaussian solutions form saddle points, but there could\nalso be other saddlepoints. We also demonstrate that the information rates can be achieved\nusing mismatched (Gaussian) decoders.},\n author = {S N. Diggavi and T M. Cover,},\n file = {:papers:ps:worstnoise.pdf},\n journal = {IEEE Transactions on Information Theory},\n label = {dc_j01},\n month = {November},\n note = {},\n number = {7},\n pages = {3072--3081},\n tags = {journal,WorstNoise,RobComm,IT},\n title = {Worst additive noise under covariance constraints},\n type = {2},\n volume = {47},\n year = {2001}\n}\n\n
\n
\n\n\n
\n This paper started with a simple question: is the maximum entropy noise the worst noise for additive channels? In the case of scalar channels with a power constraint on the noise, this is true, as is well known. However, we show that in the vector case, with covariance constraints, the answer is yes and no. Yes, if the transmit power is large enough and no otherwise. Along the way we give a solution to the mutual information game with covariance constraints and show that Gaussian solutions form saddle points, but there could also be other saddlepoints. We also demonstrate that the information rates can be achieved using mismatched (Gaussian) decoders.\n
\n\n\n
\n\n\n
\n \n\n \n \n S N. Diggavi.\n\n\n \n \n \n \n On achievable performance over spatial diversity fading channels.\n \n \n \n\n\n \n\n\n\n IEEE Transactions on Information Theory, 47(1): 308–325. January 2001.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{Dj01,\n abstract = {This is an early study of the capacity of MIMO channels inspired by the work\nof Telatar and Foschini. It shows that the capacity grows linearly in the number of transmit\nand receive antennas (degrees of freedom) either when the SNR becomes large or when\nthe number of antennas in the MIMO system becomes large. It shows that the linear rate\ngrowth can be achieved by simpler linear detector structures, such as a matched filter\nreceiver. However, it shows that the price paid for simple matched filter receivers is that\nthe SNR growth flattens. It also examines the case where the channel matrix has a \nconstant expected Frobenius norm. In this case, even with isotropic fading, it is shown that\nthe capacity of MIMO channels does not grow linear in the number of antennas, but grows\nlinearly in SNR. Finally, the effect of time-variation within a transmission block for ISI fading\nchannels is examined in terms of capacity.},\n author = {S N. Diggavi},\n file = {:papers:ps:fading.pdf},\n journal = {IEEE Transactions on Information Theory},\n label = {d_j01},\n month = {January},\n note = {},\n number = {1},\n pages = {308--325},\n tags = {journal,MIMO,,STcodes,IT,STWC},\n title = {On achievable performance over spatial diversity fading channels},\n type = {2},\n volume = {47},\n year = {2001}\n}\n\n
\n
\n\n\n
\n This is an early study of the capacity of MIMO channels inspired by the work of Telatar and Foschini. It shows that the capacity grows linearly in the number of transmit and receive antennas (degrees of freedom) either when the SNR becomes large or when the number of antennas in the MIMO system becomes large. It shows that the linear rate growth can be achieved by simpler linear detector structures, such as a matched filter receiver. However, it shows that the price paid for simple matched filter receivers is that the SNR growth flattens. It also examines the case where the channel matrix has a constant expected Frobenius norm. In this case, even with isotropic fading, it is shown that the capacity of MIMO channels does not grow linear in the number of antennas, but grows linearly in SNR. Finally, the effect of time-variation within a transmission block for ISI fading channels is examined in terms of capacity.\n
\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 4\n \n \n (2)\n \n \n
\n
\n \n \n
\n \n\n \n \n S N. Diggavi; and M.Grossglauser.\n\n\n \n \n \n \n On transmission over deletion channels.\n \n \n \n\n\n \n\n\n\n In Allerton Conference on Communication, Control, and Computing, Illinois, October 2001. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DGj01,\n abstract = {This paper develops the best known (at the time of publication) capacity lower\nbounds to the deletion channel since the 1960s. It also makes a connection between deletion\nchannels and the well studied problem of the length of the longest common subsequence.\nIt shows that the capacity of the deletion channel for large alphabet size is close to the\ncorresponding erasure channel, though the coding schemes for the two channels are \ndrastically different.},\n author = {S N. Diggavi and M.Grossglauser},\n booktitle = {Allerton Conference on Communication, Control, and Computing, Illinois},\n file = {:papers:ps:allerton01.pdf},\n month = {October},\n note = {},\n pages = {},\n tags = {conf,DelChan,IT,SelConf},\n title = {On transmission over deletion channels},\n type = {4},\n year = {2001}\n}\n\n
\n
\n\n\n
\n This paper develops the best known (at the time of publication) capacity lower bounds to the deletion channel since the 1960s. It also makes a connection between deletion channels and the well studied problem of the length of the longest common subsequence. It shows that the capacity of the deletion channel for large alphabet size is close to the corresponding erasure channel, though the coding schemes for the two channels are drastically different.\n
\n\n\n
\n\n\n
\n \n\n \n \n C. Fragouli; N. Al-Dhahir; S N. Diggavi; and W. Turin.\n\n\n \n \n \n \n Prefiltered Space-Time M-BCJR Equalizer for Frequency-Selective Channels.\n \n \n \n\n\n \n\n\n\n In Conference on Information Sciences and Systems, Baltimore, Maryland, March 2001. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{FADTj01,\n author = {C. Fragouli and N. Al-Dhahir and S N. Diggavi and W. Turin},\n booktitle = {Conference on Information Sciences and Systems, Baltimore, Maryland},\n month = {March},\n note = {},\n pages = {},\n tags = {conf,SP,STWC,STcodes},\n title = {Prefiltered Space-Time M-BCJR Equalizer for Frequency-Selective Channels},\n type = {4},\n year = {2001}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n\n\n\n
\n
\n\n
\n
\n  \n 2000\n \n \n (2)\n \n \n
\n
\n \n \n
\n
\n  \n 4\n \n \n (3)\n \n \n
\n
\n \n \n
\n \n\n \n \n N. Al-Dhahir; and S N. Diggavi.\n\n\n \n \n \n \n Worst-Case Narrow-Band Interference over Noisy Dispersive Channels.\n \n \n \n\n\n \n\n\n\n In IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP, Istanbul, Turkey, pages 2817–2820, June 2000. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{ADj00,\n author = {N. Al-Dhahir and S N. Diggavi},\n booktitle = {IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP, Istanbul, Turkey},\n month = {June},\n note = {},\n pages = {2817--2820},\n tags = {conf,WorstNoise,RobComm,IT},\n title = {Worst-Case Narrow-Band Interference over Noisy Dispersive Channels},\n type = {4},\n year = {2000}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n S N. Diggavi; and M. Grossglauser.\n\n\n \n \n \n \n Information transmission over a finite buffer channel.\n \n \n \n\n\n \n\n\n\n In IEEE International Symposium on Information Theory (ISIT),Sorrento, Italy, pages 52, June 2000. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DGj00,\n author = {S N. Diggavi and M. Grossglauser,},\n booktitle = {IEEE International Symposium on Information Theory (ISIT),Sorrento, Italy},\n month = {June},\n note = {},\n pages = {52},\n tags = {conf,DelChan,IT},\n title = {Information transmission over a finite buffer channel},\n type = {4},\n year = {2000}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n S N. Diggavi; N J A. Sloane; and V. A. Vaishampayan.\n\n\n \n \n \n \n Design of Asymmetric Multiple Description Lattice Vector Quantizers.\n \n \n \n\n\n \n\n\n\n In IEEE Data Compression Conference (DCC),Snowbird, Utah, pages 490–499, March 2000. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DSVj00,\n author = {S N. Diggavi and N J A. Sloane and V. A. Vaishampayan},\n booktitle = {IEEE Data Compression Conference (DCC),Snowbird, Utah},\n month = {March},\n note = {},\n pages = {490--499},\n tags = {conf,NDC,IT,MDC,LatticeSrc},\n title = {Design of Asymmetric Multiple Description Lattice Vector Quantizers},\n type = {4},\n year = {2000}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 6\n \n \n (1)\n \n \n
\n
\n \n \n
\n \n\n \n \n Gregory G. Raleigh; Suhas N. Diggavi; V K. Jones; and A. Paulraj.\n\n\n \n \n \n \n US Patent Number US 6,101,399: Adaptive beamforming for transmitter operation in a wireless communication system.\n \n \n \n\n\n \n\n\n\n August 2000.\n US Patent Number US 6,101,399\n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@misc{RDJPp00,\n author = {Gregory G. Raleigh and Suhas N. Diggavi and  V K. Jones and A. Paulraj},\n month = {August},\n note = {US Patent Number US 6,101,399},\n tags = {patent},\n title = {US Patent Number US 6,101,399: Adaptive beamforming for transmitter operation in a wireless communication system},\n type = {6},\n year = {2000}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n\n\n\n
\n
\n\n
\n
\n  \n 1999\n \n \n (2)\n \n \n
\n
\n \n \n
\n
\n  \n 2\n \n \n (1)\n \n \n
\n
\n \n \n
\n \n\n \n \n S N. Diggavi; B C. Ng; and A. Paulraj.\n\n\n \n \n \n \n An Interference Suppression scheme with Joint Channel-Data Estimation.\n \n \n \n\n\n \n\n\n\n IEEE Journal of Selected Areas in Communications, 17(11): 1924–1939. November 1999.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DNPj99,\n author = {S N. Diggavi and B C. Ng and A. Paulraj,},\n file = {:papers:ps:intsup.pdf},\n journal = {IEEE Journal of Selected Areas in Communications},\n label = {dnp_j99},\n month = {November},\n note = {},\n number = {11},\n pages = {1924--1939},\n tags = {journal,MIMO,,STcodes,STWC},\n title = {An Interference Suppression scheme with Joint Channel-Data Estimation},\n type = {2},\n volume = {17},\n year = {1999}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 4\n \n \n (1)\n \n \n
\n
\n \n \n
\n \n\n \n \n S N. Diggavi.\n\n\n \n \n \n \n On multiple access communications using spatial diversity.\n \n \n \n\n\n \n\n\n\n In IEEE Wireless Communications and Networking Conference, New Orleans, pages 480–484, September 1999. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{Dj99,\n author = {S N. Diggavi},\n booktitle = {IEEE Wireless Communications and Networking Conference, New Orleans},\n month = {September},\n note = {},\n pages = {480--484},\n tags = {conf},\n title = {On multiple access communications using spatial diversity},\n type = {4},\n year = {1999}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n\n\n\n
\n
\n\n
\n
\n  \n 1998\n \n \n (2)\n \n \n
\n
\n \n \n
\n
\n  \n 4\n \n \n (2)\n \n \n
\n
\n \n \n
\n \n\n \n \n S N. Diggavi.\n\n\n \n \n \n \n On achievable performance of spatial diversity fading channels.\n \n \n \n\n\n \n\n\n\n In International Symposium on Information Theory, Boston, ISIT'98, pages 396, 1998. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{Dj98,\n author = {S N. Diggavi},\n booktitle = {International Symposium on Information Theory, Boston, ISIT'98},\n month = {},\n note = {},\n pages = {396},\n tags = {conf,MIMO,,STcodes,IT,STWC},\n title = {On achievable performance of spatial diversity fading channels},\n type = {4},\n year = {1998}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n S N. Diggavi; B C. Ng; and A. Paulraj.\n\n\n \n \n \n \n Joint channel and data estimation with interference suppression.\n \n \n \n\n\n \n\n\n\n In International Conference on Communications, Atlanta, 1998, pages 465–469, 1998. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DNPj98,\n author = {S N. Diggavi and B C. Ng and A. Paulraj},\n booktitle = {International Conference on Communications, Atlanta, 1998},\n month = {},\n note = {},\n pages = {465--469},\n tags = {conf},\n title = {Joint channel and data estimation with interference suppression},\n type = {4},\n year = {1998}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 6\n \n \n (1)\n \n \n
\n
\n \n \n
\n \n\n \n \n Gregory G. Raleigh; Suhas N. Diggavi; V K. Jones; and A. Paulraj.\n\n\n \n \n \n \n European Patent Number EP832509A1: Method and Apparatus for adaptive transmission beamforming in a wireless communication system.\n \n \n \n\n\n \n\n\n\n April 1998.\n European Patent Number EP832509A1\n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@misc{RDJPp98,\n author = {Gregory G. Raleigh and Suhas N. Diggavi and  V K. Jones and A. Paulraj},\n month = {April},\n note = {European Patent Number EP832509A1},\n tags = {patent},\n title = {European Patent Number EP832509A1: Method and Apparatus for adaptive transmission beamforming in a wireless communication system},\n type = {6},\n year = {1998}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n\n\n\n
\n
\n\n
\n
\n  \n 1997\n \n \n (1)\n \n \n
\n
\n \n \n
\n
\n  \n 4\n \n \n (4)\n \n \n
\n
\n \n \n
\n \n\n \n \n S N. Diggavi; and T M. Cover.\n\n\n \n \n \n \n Is Maximum Entropy Noise the Worst?.\n \n \n \n\n\n \n\n\n\n In International Symposium on Information Theory, Ulm, pages 278, 1997. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DCj97,\n author = {S N. Diggavi and T M. Cover},\n booktitle = {International Symposium on Information Theory, Ulm},\n label = {dc_c97},\n month = {},\n note = {},\n pages = {278},\n tags = {conf,WorstNoise,RobComm,IT},\n title = {Is Maximum Entropy Noise the Worst?},\n type = {4},\n year = {1997}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n S N. Diggavi.\n\n\n \n \n \n \n Analysis of multicarrier transmission in time-varying channels.\n \n \n \n\n\n \n\n\n\n In International Conference on Communications, Montreal, pages 1191–1195, 1997. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{Dj97,\n author = {S N. Diggavi},\n booktitle = { International Conference on Communications, Montreal},\n label = {d_c97},\n month = {},\n note = {},\n pages = {1191--1195},\n tags = {conf,MIMOofdm,ICIofdm,SP,STWC},\n title = {Analysis of multicarrier transmission in time-varying channels},\n type = {4},\n year = {1997}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n S N. Diggavi; and A. Paulraj.\n\n\n \n \n \n \n Performance of Multisensor Adaptive MLSE in fading channels.\n \n \n \n\n\n \n\n\n\n In IEEE Vehicular Technology Conference, Phoenix, pages 2148–2152, 1997. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DPj97,\n author = {S N. Diggavi and A. Paulraj},\n booktitle = {IEEE Vehicular Technology Conference, Phoenix},\n month = {},\n note = {},\n pages = {2148--2152},\n tags = {conf},\n title = {Performance of Multisensor Adaptive MLSE in fading channels},\n type = {4},\n year = {1997}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n B C. Ng; S N. Diggavi; and A. Paulraj.\n\n\n \n \n \n \n Joint Structured Channel and Data Estimation over time-varying channels.\n \n \n \n\n\n \n\n\n\n In Globecom 1997, Phoenix, pages 409–413, 1997. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{NDPj97,\n author = {B C. Ng and S N. Diggavi and A. Paulraj},\n booktitle = {Globecom 1997, Phoenix},\n month = {},\n note = {},\n pages = {409--413},\n tags = {conf,MIMO,,STcodes,STWC},\n title = {Joint Structured Channel and Data Estimation over time-varying channels},\n type = {4},\n year = {1997}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n\n\n\n
\n
\n\n
\n
\n  \n 1996\n \n \n (1)\n \n \n
\n
\n \n \n
\n
\n  \n 4\n \n \n (2)\n \n \n
\n
\n \n \n
\n \n\n \n \n N. Chaddha; and S N. Diggavi.\n\n\n \n \n \n \n A frame-work for joint source-channel coding of over time-varying wireless channels.\n \n \n \n\n\n \n\n\n\n In International Conference on Image Processing, pages 89–92, September 1996. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{CDj96,\n author = {N. Chaddha and S N. Diggavi},\n booktitle = { International Conference on Image Processing},\n label = {cd_c96},\n month = {September},\n note = {},\n pages = {89--92},\n tags = {conf,SP},\n title = {A frame-work for joint source-channel coding of over time-varying wireless channels},\n type = {4},\n year = {1996}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n S N. Diggavi.\n\n\n \n \n \n \n Multiuser DMT: A Multiple Access Modulation Scheme.\n \n \n \n\n\n \n\n\n\n In Globecom 1996, London, pages 1566–1570, 1996. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{Dj96,\n abstract = {In this paper we propose a multiuser DMT scheme for use in a frequency\ndispersive multiple access channel.\nWe formulate the problem as an optimization problem for maximizing the\nrate-sum or a weighted sum of the rates.\nWe establish the rate-sum maximizing solution \nwhich is a multiuser waterfilling scheme over\nthe DMT tones.\nWe propose a multiuser bit-loading algorithm which finds the rate-maximizing\nsolution in a finite number of steps.},\n author = {S N. Diggavi},\n booktitle = { Globecom 1996, London},\n file = {:papers:ps:multiuserdmt.pdf},\n label = {d_c96},\n month = {},\n note = {},\n pages = {1566--1570},\n tags = {conf,MIMOofdm,SP,STWC,SelConf},\n title = {Multiuser DMT: A Multiple Access Modulation Scheme},\n type = {4},\n year = {1996}\n}\n\n
\n
\n\n\n
\n In this paper we propose a multiuser DMT scheme for use in a frequency dispersive multiple access channel. We formulate the problem as an optimization problem for maximizing the rate-sum or a weighted sum of the rates. We establish the rate-sum maximizing solution which is a multiuser waterfilling scheme over the DMT tones. We propose a multiuser bit-loading algorithm which finds the rate-maximizing solution in a finite number of steps.\n
\n\n\n
\n\n\n\n\n\n
\n
\n\n\n\n\n
\n
\n\n
\n
\n  \n 1995\n \n \n (2)\n \n \n
\n
\n \n \n
\n
\n  \n 2\n \n \n (1)\n \n \n
\n
\n \n \n
\n \n\n \n \n S N. Diggavi; J J. Shynk; and N J. Bershad.\n\n\n \n \n \n \n Convergence Models for Rosenblatt's Perceptron Learning Algorithm.\n \n \n \n\n\n \n\n\n\n IEEE Transactions on Signal Processing, 43(7): 1696–1702. July 1995.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DSBj95,\n author = {S N. Diggavi and J J. Shynk and N J. Bershad},\n journal = {IEEE Transactions on Signal Processing},\n label = {dsb_j95},\n month = {July},\n note = {},\n number = {7},\n pages = {1696--1702},\n tags = {journal,Learning,Adaptive,SP},\n title = {Convergence Models for Rosenblatt's Perceptron Learning Algorithm},\n type = {2},\n volume = {43},\n year = {1995}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 4\n \n \n (3)\n \n \n
\n
\n \n \n
\n \n\n \n \n S N. Diggavi; Y-M. Cho; and A. Paulraj.\n\n\n \n \n \n \n Blind Estimation of Multiple Co-channel Digital Signals in Vector FIR Channels.\n \n \n \n\n\n \n\n\n\n In Proc. GLOBECOM, Singapore, pages 72–76, November 1995. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DCPj95,\n author = {S N. Diggavi and Y-M. Cho, and A. Paulraj},\n booktitle = { Proc. GLOBECOM, Singapore},\n month = {November},\n note = {},\n pages = {72--76},\n tags = {conf},\n title = {Blind Estimation of Multiple Co-channel Digital Signals in Vector FIR Channels},\n type = {4},\n year = {1995}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n S N. Diggavi; and A. Paulraj.\n\n\n \n \n \n \n Signal Detection for Time-Varying Vector Channels.\n \n \n \n\n\n \n\n\n\n In Proc. 29th Asilomar Conference on Signals, Systems and Computers, Pacific Grove, CA, pages 152–156, November 1995. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DPj95,\n author = {S N. Diggavi and A. Paulraj},\n booktitle = {Proc.~29th Asilomar Conference on Signals, Systems and  Computers, Pacific Grove, CA},\n month = {November},\n note = {},\n pages = {152--156},\n tags = {conf},\n title = {Signal Detection for Time-Varying Vector Channels},\n type = {4},\n year = {1995}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n G G. Raleigh; S N. Diggavi; V K. Jones; and A. Paulraj.\n\n\n \n \n \n \n Blind Adaptive Transmit Beamforming For Mobile Radio With Arbitrary and Unknown Antenna Array Geometries.\n \n \n \n\n\n \n\n\n\n In ICC, pages 1494–1499, 1995. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{RDJPJ1995,\n author = {G G. Raleigh and S N. Diggavi and V K. Jones and A. Paulraj},\n booktitle = {ICC},\n file = {:papers:ps:icc95.pdf},\n label = {rdjp_c05},\n month = {},\n note = {},\n pages = {1494--1499},\n tags = {conf,WiNet,SP,STWC,SelConf},\n title = {Blind Adaptive Transmit Beamforming For Mobile Radio With Arbitrary and Unknown Antenna Array Geometries},\n type = {4},\n year = {1995}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n\n\n\n
\n
\n\n
\n
\n  \n 1994\n \n \n (2)\n \n \n
\n
\n \n \n
\n
\n  \n 2\n \n \n (1)\n \n \n
\n
\n \n \n
\n \n\n \n \n S N. Diggavi; J J. Shynk; and A J. Laub.\n\n\n \n \n \n \n Direction-of-arrival estimation for a lens-based array.\n \n \n \n\n\n \n\n\n\n IEEE Transactions on Antennas and Propagation, 42(5): 666-675. May 1994.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DSLj94,\n author = {S N. Diggavi and J J. Shynk and A J. Laub,},\n journal = {IEEE Transactions on Antennas and Propagation},\n label = {dsl_j94},\n month = {May},\n note = {},\n number = {5},\n pages = {666-675},\n tags = {journal,DoA,SP},\n title = {Direction-of-arrival estimation for a lens-based array},\n type = {2},\n volume = {42},\n year = {1994}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 4\n \n \n (1)\n \n \n
\n
\n \n \n
\n \n\n \n \n G G. Raleigh; S N. Diggavi; A F. Naguib; and A Paulraj.\n\n\n \n \n \n \n Characterization of fast fading vector channels for multi-antenna communication systems.\n \n \n \n\n\n \n\n\n\n In Proc. 28th Asilomar Conference on Signals, Systems and Computers, Pacific Grove, CA, pages 853–857, November 1994. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{RDNPJ94,\n abstract = {This was among the first papers to develop statistical models for multiple antenna\nwireless channels. It extends the well accepted fading models for single-antenna channels\nto multiple antennas by incorporating antenna response and geometry.},\n author = {G G. Raleigh and S N. Diggavi and A F. Naguib and A Paulraj},\n booktitle = {Proc.~28th Asilomar Conference on Signals, Systems and  Computers, Pacific Grove, CA},\n file = {:papers:ps:asil94.pdf},\n label = {rdnp_c04},\n month = {November},\n note = {},\n pages = {853--857},\n tags = {conf,WiNet,SP,STWC,SelConf},\n title = {Characterization of fast fading vector channels for multi-antenna communication systems},\n type = {4},\n year = {1994}\n}\n\n
\n
\n\n\n
\n This was among the first papers to develop statistical models for multiple antenna wireless channels. It extends the well accepted fading models for single-antenna channels to multiple antennas by incorporating antenna response and geometry.\n
\n\n\n
\n\n\n\n\n\n
\n
\n\n\n\n\n
\n
\n\n\n\n\n
\n\n\n \n\n \n \n \n \n\n
\n"}; document.write(bibbase_data.data);