Zum Hauptinhalt springen

Showing 51–100 of 149 results for author: Vishwanath, S

.
  1. arXiv:1811.02067  [pdf, other

    cs.LG stat.ML

    Sample Compression, Support Vectors, and Generalization in Deep Learning

    Authors: Christopher Snyder, Sriram Vishwanath

    Abstract: Even though Deep Neural Networks (DNNs) are widely celebrated for their practical performance, they possess many intriguing properties related to depth that are difficult to explain both theoretically and intuitively. Understanding how weights in deep networks coordinate together across layers to form useful learners has proven challenging, in part because the repeated composition of nonlinearitie… ▽ More

    Submitted 17 March, 2020; v1 submitted 5 November, 2018; originally announced November 2018.

    Comments: 15 pages, 10 figures

  2. arXiv:1810.11867  [pdf, other

    cs.LG cs.DM stat.ML

    Experimental Design for Cost-Aware Learning of Causal Graphs

    Authors: Erik M. Lindgren, Murat Kocaoglu, Alexandros G. Dimakis, Sriram Vishwanath

    Abstract: We consider the minimum cost intervention design problem: Given the essential graph of a causal graph and a cost to intervene on a variable, identify the set of interventions with minimum total cost that can learn any causal graph with the given essential graph. We first show that this problem is NP-hard. We then prove that we can achieve a constant factor approximation to this problem with a gree… ▽ More

    Submitted 28 October, 2018; originally announced October 2018.

    Comments: In NIPS 2018

  3. Same but not alike: Structure, flexibility and energetics of domains in multi-domain proteins are influenced by the presence of other domains

    Authors: Sneha Vishwanath, Alexandre De Brevern, Narayanaswamy Srinivasan

    Abstract: The majority of the proteins encoded in the genomes of eukaryotes contain more than one domain. Reasons for high prevalence of multi-domain proteins in various organisms have been attributed to higher stability and functional and folding advantages over single-domain proteins. Despite these advantages, many proteins are composed of only one domain while their homologous domains are part of multi-d… ▽ More

    Submitted 10 August, 2018; originally announced August 2018.

    Journal ref: PLoS Computational Biology, Public Library of Science, 2018, 14 (2), pp.e1006008

  4. arXiv:1807.10399  [pdf, other

    stat.ML cs.AI cs.IT cs.LG

    Applications of Common Entropy for Causal Inference

    Authors: Murat Kocaoglu, Sanjay Shakkottai, Alexandros G. Dimakis, Constantine Caramanis, Sriram Vishwanath

    Abstract: We study the problem of discovering the simplest latent variable that can make two observed discrete variables conditionally independent. The minimum entropy required for such a latent is known as common entropy in information theory. We extend this notion to Renyi common entropy by minimizing the Renyi entropy of the latent variable. To efficiently compute common entropy, we propose an iterative… ▽ More

    Submitted 5 December, 2020; v1 submitted 26 July, 2018; originally announced July 2018.

    Comments: In Proceedings of NeurIPS 2020

  5. arXiv:1806.06438  [pdf, other

    stat.ML cs.IT cs.LG

    Compressed Sensing with Deep Image Prior and Learned Regularization

    Authors: Dave Van Veen, Ajil Jalal, Mahdi Soltanolkotabi, Eric Price, Sriram Vishwanath, Alexandros G. Dimakis

    Abstract: We propose a novel method for compressed sensing recovery using untrained deep generative models. Our method is based on the recently proposed Deep Image Prior (DIP), wherein the convolutional weights of the network are optimized to match the observed measurements. We show that this approach can be applied to solve any differentiable linear inverse problem, outperforming previous unlearned methods… ▽ More

    Submitted 29 October, 2020; v1 submitted 17 June, 2018; originally announced June 2018.

  6. arXiv:1801.07733  [pdf, other

    cs.IT

    On the Key Generation Rate of Physically Unclonable Functions

    Authors: Yitao Chen, Muryong Kim, Sriram Vishwanath

    Abstract: In this paper, an algebraic binning based coding scheme and its associated achievable rate for key generation using physically unclonable functions (PUFs) is determined. This achievable rate is shown to be optimal under the generated-secret (GS) model for PUFs. Furthermore, a polar code based polynomial-time encoding and decoding scheme that achieves this rate is also presented.

    Submitted 6 February, 2018; v1 submitted 23 January, 2018; originally announced January 2018.

  7. arXiv:1711.00881  [pdf, other

    math.PR cs.SI

    On the Steady State of Continuous Time Stochastic Opinion Dynamics with Power Law Confidence

    Authors: Jae Oh Woo, François Baccelli, Sriram Vishwanath

    Abstract: This paper introduces a class of non-linear and continuous-time opinion dynamics model with additive noise and state dependent interaction rates between agents. The model features interaction rates which are proportional to a negative power of opinion distances. We establish a non-local partial differential equation for the distribution of opinion distances and use Mellin transforms to provide an… ▽ More

    Submitted 12 December, 2020; v1 submitted 2 November, 2017; originally announced November 2017.

  8. arXiv:1709.02023  [pdf, other

    cs.LG cs.AI cs.IT stat.ML

    CausalGAN: Learning Causal Implicit Generative Models with Adversarial Training

    Authors: Murat Kocaoglu, Christopher Snyder, Alexandros G. Dimakis, Sriram Vishwanath

    Abstract: We propose an adversarial training procedure for learning a causal implicit generative model for a given causal graph. We show that adversarial training can be used to learn a generative model with true observational and interventional distributions if the generator architecture is consistent with the given causal graph. We consider the application of generating faces based on given binary labels… ▽ More

    Submitted 14 September, 2017; v1 submitted 6 September, 2017; originally announced September 2017.

  9. MBE growth of 2H-MoTe2 and 1T'-MoTe2 on 3D substrates

    Authors: Suresh Vishwanath, Aditya Sundar, Xinyu Liu, Angelica Azcatl, Edward Lochocki, Arthur R. Woll, Sergei Rouvimov, Wan Sik Hwang, Ning Lu, Xin Peng, Huai-Hsun Lien, John Weisenberger, Stephen McDonnell, Moon J. Kim, Margaret Dobrowolska, Jacek K Furdyna, Kyle Shen, Robert M. Wallace, Debdeep Jena, Huili Grace Xing

    Abstract: MoTe2 is the least explored material in the Molybdenum-chalcogen family, which crystallizes in thermodynamically stable semiconducting 2H phase at \textless 500 C and 1T' metallic phase at higher temperatures. Molecular beam epitaxy (MBE) provides an unique opportunity to tackle the small electronegativity difference between Mo and Te while growing layer by layer away from thermodynamic equilibriu… ▽ More

    Submitted 1 May, 2017; originally announced May 2017.

    Comments: Six figure in main tex, 8 figures in SI and 4 tables in main text

  10. Observation of oscillatory relaxation in the Sn-terminated surface of epitaxial rock-salt SnSe $\{111\}$ topological crystalline insulator

    Authors: Wencan Jin, Suresh Vishwanath, Jianpeng Liu, Lingyuan Kong, Rui Lou, Zhongwei Dai, Jerzy T. Sadowski, Xinyu Liu, Huai-Hsun Lien, Alexander Chaney, Yimo Han, Micheal Cao, Junzhang Ma, Tian Qian, Jerry I. Dadap, Shancai Wang, Malgorzata Dobrowolska, Jacek Furdyna, David A. Muller, Karsten Pohl, Hong Ding, Huili Grace Xing, Richard M. Osgood, Jr

    Abstract: Topological crystalline insulators have been recently predicted and observed in rock-salt structure SnSe $\{111\}$ thin films. Previous studies have suggested that the Se-terminated surface of this thin film with hydrogen passivation, has a reduced surface energy and is thus a preferred configuration. In this paper, synchrotron-based angle-resolved photoemission spectroscopy, along with density fu… ▽ More

    Submitted 10 April, 2017; originally announced April 2017.

    Comments: 12 pages, 13 figures, supplementary materials included

    Journal ref: Phys. Rev. X 7, 041020 (2017)

  11. arXiv:1703.02645  [pdf, other

    cs.AI cs.IT stat.ML

    Cost-Optimal Learning of Causal Graphs

    Authors: Murat Kocaoglu, Alexandros G. Dimakis, Sriram Vishwanath

    Abstract: We consider the problem of learning a causal graph over a set of variables with interventions. We study the cost-optimal causal graph learning problem: For a given skeleton (undirected version of the causal graph), design the set of interventions with minimum total cost, that can uniquely identify any causal graph with the given skeleton. We show that this problem is solvable in polynomial time. L… ▽ More

    Submitted 7 March, 2017; originally announced March 2017.

  12. arXiv:1701.08254  [pdf, ps, other

    cs.IT cs.AI stat.ML

    Entropic Causality and Greedy Minimum Entropy Coupling

    Authors: Murat Kocaoglu, Alexandros G. Dimakis, Sriram Vishwanath, Babak Hassibi

    Abstract: We study the problem of identifying the causal relationship between two discrete random variables from observational data. We recently proposed a novel framework called entropic causality that works in a very general functional model but makes the assumption that the unobserved exogenous variable has small entropy in the true causal direction. This framework requires the solution of a minimum en… ▽ More

    Submitted 28 January, 2017; originally announced January 2017.

    Comments: Submitted to ISIT 2017

  13. arXiv:1701.07576  [pdf, other

    cs.IT

    Approximate Capacity of a Class of Partially Connected Interference Channels

    Authors: Muryong Kim, Yitao Chen, Sriram Vishwanath

    Abstract: We derive inner and outer bounds on the capacity region for a class of three-user partially connected interference channels. We focus on the impact of topology, interference alignment, and interplay between interference and noise. The representative channels we consider are the ones that have clear interference alignment gain. For these channels, Z-channel type outer bounds are tight to within a c… ▽ More

    Submitted 13 February, 2017; v1 submitted 25 January, 2017; originally announced January 2017.

    Comments: Submitted to IEEE Transactions on Information Theory

  14. arXiv:1611.04035  [pdf, ps, other

    cs.AI cs.IT stat.ML

    Entropic Causal Inference

    Authors: Murat Kocaoglu, Alexandros G. Dimakis, Sriram Vishwanath, Babak Hassibi

    Abstract: We consider the problem of identifying the causal direction between two discrete random variables using observational data. Unlike previous work, we keep the most general functional model but make an assumption on the unobserved exogenous variable: Inspired by Occam's razor, we assume that the exogenous variable is simple in the true causal direction. We quantify simplicity using Rényi entropy. Ou… ▽ More

    Submitted 14 November, 2016; v1 submitted 12 November, 2016; originally announced November 2016.

    Comments: To appear in AAAI 2017

  15. arXiv:1603.04822  [pdf, other

    cs.IT

    Centralized Repair of Multiple Node Failures with Applications to Communication Efficient Secret Sharing

    Authors: Ankit Singh Rawat, O. Ozan Koyluoglu, Sriram Vishwanath

    Abstract: This paper considers a distributed storage system, where multiple storage nodes can be reconstructed simultaneously at a centralized location. This centralized multi-node repair (CMR) model is a generalization of regenerating codes that allow for bandwidth-efficient repair of a single failed node. This work focuses on the trade-off between the amount of data stored and repair bandwidth in this CMR… ▽ More

    Submitted 15 March, 2016; originally announced March 2016.

  16. arXiv:1601.06362  [pdf, ps, other

    cs.IT

    Progress on High-rate MSR Codes: Enabling Arbitrary Number of Helper Nodes

    Authors: Ankit Singh Rawat, O. Ozan Koyluoglu, Sriram Vishwanath

    Abstract: This paper presents a construction for high-rate MDS codes that enable bandwidth-efficient repair of a single node. Such MDS codes are also referred to as the minimum storage regenerating (MSR) codes in the distributed storage literature. The construction presented in this paper generates MSR codes for all possible number of helper nodes $d$ as $d$ is a design parameter in the construction. Furthe… ▽ More

    Submitted 24 January, 2016; originally announced January 2016.

  17. arXiv:1601.04094  [pdf, other

    cs.MA

    Efficient and Flexible Crowdsourcing of Specialized Tasks with Precedence Constraints

    Authors: Avhishek Chatterjee, Michael Borokhovich, Lav R. Varshney, Sriram Vishwanath

    Abstract: Many companies now use crowdsourcing to leverage external (as well as internal) crowds to perform specialized work, and so methods of improving efficiency are critical. Tasks in crowdsourcing systems with specialized work have multiple steps and each step requires multiple skills. Steps may have different flexibilities in terms of obtaining service from one or multiple agents, due to varying level… ▽ More

    Submitted 15 January, 2016; originally announced January 2016.

  18. arXiv:1511.01212  [pdf, ps, other

    cs.IT

    Hierarchical Polar Coding for Achieving Secrecy over Fading Wiretap Channels without any Instantaneous CSI

    Authors: Hongbo Si, O. Ozan Koyluoglu, Sriram Vishwanath

    Abstract: This paper presents a polar coding scheme to achieve secrecy in block fading binary symmetric wiretap channels without the knowledge of instantaneous channel state information (CSI) at the transmitter. For this model, a coding scheme that hierarchically utilizes polar codes is presented. In particular, on polarization of different binary symmetric channels over different fading blocks, each channe… ▽ More

    Submitted 4 November, 2015; originally announced November 2015.

  19. arXiv:1511.00041  [pdf, ps, other

    cs.AI cs.IT cs.LG stat.ML

    Learning Causal Graphs with Small Interventions

    Authors: Karthikeyan Shanmugam, Murat Kocaoglu, Alexandros G. Dimakis, Sriram Vishwanath

    Abstract: We consider the problem of learning causal networks with interventions, when each intervention is limited in size under Pearl's Structural Equation Model with independent errors (SEM-IE). The objective is to minimize the number of experiments to discover the causal directions of all the edges in a causal graph. Previous work has focused on the use of separating systems for complete graphs for this… ▽ More

    Submitted 30 October, 2015; originally announced November 2015.

    Comments: Accepted to NIPS 2015

  20. arXiv:1509.08256  [pdf, other

    cond-mat.mtrl-sci

    Layered transition metal dichalcogenides: promising near-lattice-matched substrates for GaN growth

    Authors: Priti Gupta, A. A. Rahman, Shruti Subramanian, Shalini Gupta, Arumugam Thamizhavel, Tatyana Orlova, Sergei Rouvimov, Suresh Vishwanath, Vladimir Protasenko, Masihhur R. Laskar, Huili Grace Xing, Debdeep Jena, Arnab Bhattacharya

    Abstract: Most III-nitride semiconductors are grown on non-lattice-matched substrates like sapphire or silicon due to the extreme difficulty of obtaining a native GaN substrate. We show that several layered transition-metal dichalcogenides are closely lattice matched to GaN and report the growth of GaN on a range of such layered materials. We report detailed studies of the growth of GaN on mechanically-exfo… ▽ More

    Submitted 28 September, 2015; originally announced September 2015.

    Comments: main manuscript: page 1-15, 5 figures; supplementary: page 16-23

    Report number: Scientific Reports 6, Article number: 23708 (2016)

  21. arXiv:1509.07449  [pdf, ps, other

    eess.SY math.OC

    Structural Vulnerability of Power Grids to Disasters: Bounds, Adversarial Attacks and Reinforcement

    Authors: Deepjyoti Deka, Sriram Vishwanath

    Abstract: Natural Disasters like hurricanes, floods or earthquakes can damage power grid devices and create cascading blackouts and islands. The nature of failure propagation and extent of damage is dependent on the structural features of the grid, which is different from that of random networks. This paper analyzes the structural vulnerability of real power grids to impending disasters and presents intuiti… ▽ More

    Submitted 24 September, 2015; originally announced September 2015.

    Comments: 9 pages, 11 figures

  22. arXiv:1509.04639  [pdf, other

    cs.CR math.OC

    Jamming aided Generalized Data Attacks: Exposing Vulnerabilities in Secure Estimation

    Authors: Deepjyoti Deka, Ross Baldick, Sriram Vishwanath

    Abstract: Jamming refers to the deletion, corruption or damage of meter measurements that prevents their further usage. This is distinct from adversarial data injection that changes meter readings while preserving their utility in state estimation. This paper presents a generalized attack regime that uses jamming of secure and insecure measurements to greatly expand the scope of common 'hidden' and 'detecta… ▽ More

    Submitted 15 September, 2015; originally announced September 2015.

    Comments: 11 pages, 8 figures, A version of this will appear in HICSS 2016

  23. arXiv:1508.00023  [pdf, other

    cs.MA cs.CY

    Work Capacity of Freelance Markets: Fundamental Limits and Decentralized Schemes

    Authors: Avhishek Chatterjee, Lav R. Varshney, Sriram Vishwanath

    Abstract: Crowdsourcing of jobs to online freelance markets is rapidly gaining popularity. Most crowdsourcing platforms are uncontrolled and offer freedom to customers and freelancers to choose each other. This works well for unskilled jobs (e.g., image classification) with no specific quality requirement since freelancers are functionally identical. For skilled jobs (e.g., software development) with specif… ▽ More

    Submitted 15 January, 2016; v1 submitted 31 July, 2015; originally announced August 2015.

  24. arXiv:1507.05941  [pdf

    cs.IT

    A Perspective on Future Research Directions in Information Theory

    Authors: Jeffrey G. Andrews, Alexandros Dimakis, Lara Dolecek, Michelle Effros, Muriel Medard, Olgica Milenkovic, Andrea Montanari, Sriram Vishwanath, Edmund Yeh, Randall Berry, Ken Duffy, Soheil Feizi, Saul Kato, Manolis Kellis, Stuart Licht, Jon Sorenson, Lav Varshney, Haris Vikalo

    Abstract: Information theory is rapidly approaching its 70th birthday. What are promising future directions for research in information theory? Where will information theory be having the most impact in 10-20 years? What new and emerging areas are ripe for the most impact, of the sort that information theory has had on the telecommunications industry over the last 60 years? How should the IEEE Information T… ▽ More

    Submitted 21 July, 2015; originally announced July 2015.

  25. arXiv:1506.04541  [pdf, other

    cs.CR math.OC

    Optimal Data Attacks on Power Grids: Leveraging Detection & Measurement Jamming

    Authors: Deepjyoti Deka, Ross Baldick, Sriram Vishwanath

    Abstract: Meter measurements in the power grid are susceptible to manipulation by adversaries, that can lead to errors in state estimation. This paper presents a general framework to study attacks on state estimation by adversaries capable of injecting bad-data into measurements and further, of jamming their reception. Through these two techniques, a novel `detectable jamming' attack is designed that change… ▽ More

    Submitted 15 June, 2015; originally announced June 2015.

    Comments: 8 pages, 7 figures

  26. One Breaker is Enough: Hidden Topology Attacks on Power Grids

    Authors: Deepjyoti Deka, Ross Baldick, Sriram Vishwanath

    Abstract: A coordinated cyber-attack on grid meter readings and breaker statuses can lead to incorrect state estimation that can subsequently destabilize the grid. This paper studies cyber-attacks by an adversary that changes breaker statuses on transmission lines to affect the estimation of the grid topology. The adversary, however, is incapable of changing the value of any meter data and can only block re… ▽ More

    Submitted 13 June, 2015; originally announced June 2015.

    Comments: 5 pages, 5 figures, Accepted to the IEEE PES General Meeting 2015

  27. arXiv:1505.05481  [pdf, other

    cs.IT

    Expansion Coding for Channel and Source Coding

    Authors: Hongbo Si, O. Ozan Koyluoglu, Kumar Appaiah, Sriram Vishwanath

    Abstract: A general method of coding over expansion is proposed,which allows one to reduce the highly non-trivial problems of coding over analog channels and compressing analog sources to a set of much simpler subproblems, coding over discrete channels and compressing discrete sources. More specifically, the focus of this paper is on the additive exponential noise (AEN) channel, and lossy compression of exp… ▽ More

    Submitted 20 May, 2015; originally announced May 2015.

    Comments: 42 pages, 10 figures

  28. arXiv:1505.01881  [pdf, other

    cs.CR eess.SY

    Data Attacks on Power Grids: Leveraging Detection

    Authors: Deepjyoti Deka, Ross Baldick, Sriram Vishwanath

    Abstract: Data attacks on meter measurements in the power grid can lead to errors in state estimation. This paper presents a new data attack model where an adversary produces changes in state estimation despite failing bad-data detection checks. The adversary achieves its objective by making the estimator incorrectly identify correct measurements as bad data. The proposed attack regime's significance lies i… ▽ More

    Submitted 7 May, 2015; originally announced May 2015.

  29. arXiv:1412.5728  [pdf

    cond-mat.mtrl-sci

    Molecular beam epitaxial growth of MoSe2 on graphite, CaF2 and graphene

    Authors: Suresh Vishwanath, Xinyu Liu, Sergei Rouvimov, Patrick C. Mende, Angelica Azcatl, Stephen McDonnell, Robert M. Wallace, Randall M. Feenstra, Jacek K. Furdyna, Debdeep Jena, Huili Grace Xing

    Abstract: We report the structural and optical properties of molecular beam epitaxy (MBE) grown 2-dimensional (2D) material molybdenum diselenide (MoSe2) on graphite, CaF2 and epitaxial graphene. Extensive characterizations reveal that 2H- MoSe2 grows by van-der-Waals epitaxy on all 3 substrates with a preferred crystallographic orientation and a Mo:Se ratio of 1:2. Photoluminescence at room temperature (~1… ▽ More

    Submitted 18 December, 2014; originally announced December 2014.

    Comments: 5 Figures in main paper and 6 figures in supplementary information

  30. arXiv:1411.6000  [pdf, other

    cond-mat.mes-hall

    Synthesized multiwall MoS2 nanotube and nanoribbon field-effect transistors

    Authors: Sara Fathipour, Maja Remskar, Ana Varlec, Arvind Ajoy, Rusen Yan, Suresh Vishwanath, Wan Sik Hwang, Huili, Xing, Debdeep Jena, Alan Seabaugh

    Abstract: We report on the fabrication and characterization of synthesized multiwall MoS2 nanotube (NT) and nanoribbon (NR) field-effect transistors (FETs). The MoS2 NTs and NRs were grown by chemical transport, using iodine as a transport agent. Raman spectroscopy confirms the material as unambiguously MoS2 in NT, NR, and flake forms. Transmission electron microscopy was used to observe cross sections of t… ▽ More

    Submitted 21 November, 2014; originally announced November 2014.

  31. arXiv:1409.7614  [pdf, other

    math.DS cs.MA eess.SY physics.soc-ph

    Generalized Opinion Dynamics from Local Optimization Rules

    Authors: Avhishek Chatterjee, Anand D. Sarwate, Sriram Vishwanath

    Abstract: We study generalizations of the Hegselmann-Krause (HK) model for opinion dynamics, incorporating features and parameters that are natural components of observed social systems. The first generalization is one where the strength of influence depends on the distance of the agents' opinions. Under this setup, we identify conditions under which the opinions converge in finite time, and provide a quali… ▽ More

    Submitted 25 September, 2014; originally announced September 2014.

    Comments: 20 pages, under review

  32. Cooperative Local Repair in Distributed Storage

    Authors: Ankit Singh Rawat, Arya Mazumdar, Sriram Vishwanath

    Abstract: Erasure-correcting codes, that support local repair of codeword symbols, have attracted substantial attention recently for their application in distributed storage systems. This paper investigates a generalization of the usual locally repairable codes. In particular, this paper studies a class of codes with the following property: any small set of codeword symbols can be reconstructed (repaired) f… ▽ More

    Submitted 26 January, 2016; v1 submitted 12 September, 2014; originally announced September 2014.

    Comments: Fixed some minor issues in Theorem 1, EURASIP Journal on Advances in Signal Processing, December 2015

  33. arXiv:1406.1915  [pdf, ps, other

    cs.NI

    Real-Time Rate-Distortion Optimized Streaming of Wireless Video

    Authors: Ahmed Abdelhadi, Andreas Gerstlauer, Sriram Vishwanath

    Abstract: Mobile cyberphysical systems have received considerable attention over the last decade, as communication, computing and control come together on a common platform. Understanding the complex interactions that govern the behavior of large complex cyberphysical systems is not an easy task. The goal of this paper is to address this challenge in the particular context of multimedia delivery over an aut… ▽ More

    Submitted 7 June, 2014; originally announced June 2014.

  34. arXiv:1404.0097  [pdf, ps, other

    cs.IT

    Haplotype Assembly: An Information Theoretic View

    Authors: Hongbo Si, Haris Vikalo, Sriram Vishwanath

    Abstract: This paper studies the haplotype assembly problem from an information theoretic perspective. A haplotype is a sequence of nucleotide bases on a chromosome, often conveniently represented by a binary string, that differ from the bases in the corresponding positions on the other chromosome in a homologous pair. Information about the order of bases in a genome is readily inferred using short reads pr… ▽ More

    Submitted 11 May, 2014; v1 submitted 31 March, 2014; originally announced April 2014.

    Comments: 30 pages, 5 figures, 1 tabel, journal

  35. arXiv:1402.2011  [pdf, other

    cs.IT

    Locality and Availability in Distributed Storage

    Authors: Ankit Singh Rawat, Dimitris S. Papailiopoulos, Alexandros G. Dimakis, Sriram Vishwanath

    Abstract: This paper studies the problem of code symbol availability: a code symbol is said to have $(r, t)$-availability if it can be reconstructed from $t$ disjoint groups of other symbols, each of size at most $r$. For example, $3$-replication supports $(1, 2)$-availability as each symbol can be read from its $t= 2$ other (disjoint) replicas, i.e., $r=1$. However, the rate of replication must vanish like… ▽ More

    Submitted 9 February, 2014; originally announced February 2014.

    Comments: Submitted to ISIT 2014

  36. arXiv:1402.0648  [pdf, ps, other

    cs.IT

    Linear Network Coding for Multiple Groupcast Sessions: An Interference Alignment Approach

    Authors: Abhik Kumar Das, Siddhartha Banerjee, Sriram Vishwanath

    Abstract: We consider the problem of linear network coding over communication networks, representable by directed acyclic graphs, with multiple groupcast sessions: the network comprises of multiple destination nodes, each desiring messages from multiple sources. We adopt an interference alignment perspective, providing new insights into designing practical network coding schemes as well as the impact of net… ▽ More

    Submitted 4 February, 2014; originally announced February 2014.

    Comments: 5 pages, appeared in ITW 2013

  37. arXiv:1401.3274  [pdf, other

    cs.CR

    Hidden Attacks on Power Grid: Optimal Attack Strategies and Mitigation

    Authors: Deepjyoti Deka, Ross Baldick, Sriram Vishwanath

    Abstract: Real time operation of the power grid and synchronism of its different elements require accurate estimation of its state variables. Errors in state estimation will lead to sub-optimal Optimal Power Flow (OPF) solutions and subsequent increase in the price of electricity in the market or, potentially overload and create line outages. This paper studies hidden data attacks on power systems by an adv… ▽ More

    Submitted 14 January, 2014; originally announced January 2014.

  38. arXiv:1312.3194  [pdf, other

    cs.IT

    Error-Correcting Regenerating and Locally Repairable Codes via Rank-Metric Codes

    Authors: Natalia Silberstein, Ankit Singh Rawat, Sriram Vishwanath

    Abstract: This paper presents and analyzes a novel concatenated coding scheme for enabling error resilience in two distributed storage settings: one being storage using existing regenerating codes and the second being storage using locally repairable codes. The concatenated coding scheme brings together a maximum rank distance (MRD) code as an outer code and either a globally regenerating or a locally repai… ▽ More

    Submitted 11 December, 2013; originally announced December 2013.

    Comments: This paper was presented in part at the 2012 50th Annual Allerton Conference on Communication, Control, and Computing

  39. arXiv:1311.4941  [pdf, ps, other

    cs.IT

    Polar Coding for Fading Channels: Binary and Exponential Channel Cases

    Authors: Hongbo Si, O. Ozan Koyluoglu, Sriram Vishwanath

    Abstract: This work presents a polar coding scheme for fading channels, focusing primarily on fading binary symmetric and additive exponential noise channels. For fading binary symmetric channels, a hierarchical coding scheme is presented, utilizing polar coding both over channel uses and over fading blocks. The receiver uses its channel state information (CSI) to distinguish states, thus constructing an ov… ▽ More

    Submitted 15 August, 2014; v1 submitted 19 November, 2013; originally announced November 2013.

    Comments: 31 pages, 8 figures, journal

  40. arXiv:1310.6795  [pdf, other

    cs.IT cs.NI

    Downlink Multi-Antenna Heterogeneous Cellular Network with Load Balancing

    Authors: Abhishek K. Gupta, Harpreet S. Dhillon, Sriram Vishwanath, Jeffrey G. Andrews

    Abstract: We model and analyze heterogeneous cellular networks with multiple antenna BSs (multi-antenna HetNets) with K classes or tiers of base stations (BSs), which may differ in terms of transmit power, deployment density, number of transmit antennas, number of users served, transmission scheme, and path loss exponent. We show that the cell selection rules in multi-antenna HetNets may differ significantl… ▽ More

    Submitted 2 November, 2014; v1 submitted 24 October, 2013; originally announced October 2013.

  41. arXiv:1308.2338  [pdf, other

    cs.IT

    Lossy Compression of Exponential and Laplacian Sources using Expansion Coding

    Authors: Hongbo Si, O. Ozan Koyluoglu, Sriram Vishwanath

    Abstract: A general method of source coding over expansion is proposed in this paper, which enables one to reduce the problem of compressing an analog (continuous-valued source) to a set of much simpler problems, compressing discrete sources. Specifically, the focus is on lossy compression of exponential and Laplacian sources, which is subsequently expanded using a finite alphabet prior to being quantized.… ▽ More

    Submitted 10 August, 2013; originally announced August 2013.

    Comments: 8 pages, 3 figures

  42. arXiv:1305.0868  [pdf, other

    cs.IT

    Precoding-Based Network Alignment For Three Unicast Sessions

    Authors: Chun Meng, Abhik Kumar Das, Abinesh Ramakrishnan, Syed Ali Jafar, Athina Markopoulou, Sriram Vishwanath

    Abstract: We consider the problem of network coding across three unicast sessions over a directed acyclic graph, where each sender and the receiver is connected to the network via a single edge of unit capacity. We consider a network model in which the middle of the network only performs random linear network coding, and restrict our approaches to precoding-based linear schemes, where the senders use precod… ▽ More

    Submitted 21 May, 2014; v1 submitted 3 May, 2013; originally announced May 2013.

    Comments: arXiv admin note: text overlap with arXiv:1202.3405

  43. arXiv:1304.3850  [pdf, other

    cs.IT

    Polar Coding for Fading Channels

    Authors: Hongbo Si, O. Ozan Koyluoglu, Sriram Vishwanath

    Abstract: A polar coding scheme for fading channels is proposed in this paper. More specifically, the focus is Gaussian fading channel with a BPSK modulation technique, where the equivalent channel could be modeled as a binary symmetric channel with varying cross-over probabilities. To deal with variable channel states, a coding scheme of hierarchically utilizing polar codes is proposed. In particular, by o… ▽ More

    Submitted 13 April, 2013; originally announced April 2013.

    Comments: 6 pages, 4 figures, conference

  44. arXiv:1303.3943  [pdf, other

    cs.IT

    On Finite Alphabet Compressive Sensing

    Authors: Abhik Kumar Das, Sriram Vishwanath

    Abstract: This paper considers the problem of compressive sensing over a finite alphabet, where the finite alphabet may be inherent to the nature of the data or a result of quantization. There are multiple examples of finite alphabet based static as well as time-series data with inherent sparse structure; and quantizing real values is an essential step while handling real data in practice. We show that ther… ▽ More

    Submitted 16 March, 2013; originally announced March 2013.

  45. arXiv:1302.0744  [pdf, other

    cs.IT

    Explicit MBR All-Symbol Locality Codes

    Authors: Govinda M. Kamath, Natalia Silberstein, N. Prakash, Ankit S. Rawat, V. Lalitha, O. Ozan Koyluoglu, P. Vijay Kumar, Sriram Vishwanath

    Abstract: Node failures are inevitable in distributed storage systems (DSS). To enable efficient repair when faced with such failures, two main techniques are known: Regenerating codes, i.e., codes that minimize the total repair bandwidth; and codes with locality, which minimize the number of nodes participating in the repair process. This paper focuses on regenerating codes with locality, using pre-coding… ▽ More

    Submitted 27 May, 2013; v1 submitted 4 February, 2013; originally announced February 2013.

  46. arXiv:1301.6331  [pdf, other

    cs.IT

    Optimal Locally Repairable Codes via Rank-Metric Codes

    Authors: Natalia Silberstein, Ankit Singh Rawat, O. Ozan Koyluoglu, Sriram Vishwanath

    Abstract: This paper presents a new explicit construction for locally repairable codes (LRCs) for distributed storage systems which possess all-symbols locality and maximal possible minimum distance, or equivalently, can tolerate the maximal number of node failures. This construction, based on maximum rank distance (MRD) Gabidulin codes, provides new optimal vector and scalar LRCs. In addition, the paper al… ▽ More

    Submitted 27 January, 2013; originally announced January 2013.

  47. Optimal Locally Repairable and Secure Codes for Distributed Storage Systems

    Authors: Ankit Singh Rawat, O. Ozan Koyluoglu, Natalia Silberstein, Sriram Vishwanath

    Abstract: This paper aims to go beyond resilience into the study of security and local-repairability for distributed storage systems (DSS). Security and local-repairability are both important as features of an efficient storage system, and this paper aims to understand the trade-offs between resilience, security, and local-repairability in these systems. In particular, this paper first investigates security… ▽ More

    Submitted 6 August, 2013; v1 submitted 25 October, 2012; originally announced October 2012.

    Comments: Submitted to IEEE Transactions on Information Theory

  48. arXiv:1210.3664  [pdf, other

    cs.IT

    Secure Cooperative Regenerating Codes for Distributed Storage Systems

    Authors: O. Ozan Koyluoglu, Ankit Singh Rawat, Sriram Vishwanath

    Abstract: Regenerating codes enable trading off repair bandwidth for storage in distributed storage systems (DSS). Due to their distributed nature, these systems are intrinsically susceptible to attacks, and they may also be subject to multiple simultaneous node failures. Cooperative regenerating codes allow bandwidth efficient repair of multiple simultaneous node failures. This paper analyzes storage syste… ▽ More

    Submitted 8 July, 2014; v1 submitted 12 October, 2012; originally announced October 2012.

  49. arXiv:1204.6098  [pdf, ps, other

    cs.IT

    On Locality in Distributed Storage Systems

    Authors: Ankit Singh Rawat, Sriram Vishwanath

    Abstract: This paper studies the design of codes for distributed storage systems (DSS) that enable local repair in the event of node failure. This paper presents locally repairable codes based on low degree multivariate polynomials. Its code construction mechanism extends work on Noisy Interpolating Set by Dvir et al. \cite{dvir2011}. The paper presents two classes of codes that allow node repair to be perf… ▽ More

    Submitted 26 April, 2012; originally announced April 2012.

    Comments: Submitted to the IEEE Information Theory Workshop (ITW) 2012

  50. arXiv:1204.0165  [pdf, other

    cs.SI physics.soc-ph stat.OT

    Analytical Models for Power Networks: The case of the Western US and ERCOT grids

    Authors: Deepjyoti Deka, Sriram Vishwanath

    Abstract: The topological structure of the power grid plays a key role in the reliable delivery of electricity and price settlement in the electricity market. Incorporation of new energy sources and loads into the grid over time has led to its structural and geographical expansion and can affect its stable operation. This paper presents an intuitive analytical model for the temporal evolution of large grids… ▽ More

    Submitted 26 February, 2015; v1 submitted 1 April, 2012; originally announced April 2012.