-
Sample Compression, Support Vectors, and Generalization in Deep Learning
Authors:
Christopher Snyder,
Sriram Vishwanath
Abstract:
Even though Deep Neural Networks (DNNs) are widely celebrated for their practical performance, they possess many intriguing properties related to depth that are difficult to explain both theoretically and intuitively. Understanding how weights in deep networks coordinate together across layers to form useful learners has proven challenging, in part because the repeated composition of nonlinearitie…
▽ More
Even though Deep Neural Networks (DNNs) are widely celebrated for their practical performance, they possess many intriguing properties related to depth that are difficult to explain both theoretically and intuitively. Understanding how weights in deep networks coordinate together across layers to form useful learners has proven challenging, in part because the repeated composition of nonlinearities has proved intractable. This paper presents a reparameterization of DNNs as a linear function of a feature map that is locally independent of the weights. This feature map transforms depth-dependencies into simple tensor products and maps each input to a discrete subset of the feature space. Then, using a max-margin assumption, the paper develops a sample compression representation of the neural network in terms of the discrete activation state of neurons induced by s ``support vectors". The paper shows that the number of support vectors s relates with learning guarantees for neural networks through sample compression bounds, yielding a sample complexity of O(ns/epsilon) for networks with n neurons. Finally, the number of support vectors s is found to monotonically increase with width and label noise but decrease with depth.
△ Less
Submitted 17 March, 2020; v1 submitted 5 November, 2018;
originally announced November 2018.
-
Experimental Design for Cost-Aware Learning of Causal Graphs
Authors:
Erik M. Lindgren,
Murat Kocaoglu,
Alexandros G. Dimakis,
Sriram Vishwanath
Abstract:
We consider the minimum cost intervention design problem: Given the essential graph of a causal graph and a cost to intervene on a variable, identify the set of interventions with minimum total cost that can learn any causal graph with the given essential graph. We first show that this problem is NP-hard. We then prove that we can achieve a constant factor approximation to this problem with a gree…
▽ More
We consider the minimum cost intervention design problem: Given the essential graph of a causal graph and a cost to intervene on a variable, identify the set of interventions with minimum total cost that can learn any causal graph with the given essential graph. We first show that this problem is NP-hard. We then prove that we can achieve a constant factor approximation to this problem with a greedy algorithm. We then constrain the sparsity of each intervention. We develop an algorithm that returns an intervention design that is nearly optimal in terms of size for sparse graphs with sparse interventions and we discuss how to use it when there are costs on the vertices.
△ Less
Submitted 28 October, 2018;
originally announced October 2018.
-
Same but not alike: Structure, flexibility and energetics of domains in multi-domain proteins are influenced by the presence of other domains
Authors:
Sneha Vishwanath,
Alexandre De Brevern,
Narayanaswamy Srinivasan
Abstract:
The majority of the proteins encoded in the genomes of eukaryotes contain more than one domain. Reasons for high prevalence of multi-domain proteins in various organisms have been attributed to higher stability and functional and folding advantages over single-domain proteins. Despite these advantages, many proteins are composed of only one domain while their homologous domains are part of multi-d…
▽ More
The majority of the proteins encoded in the genomes of eukaryotes contain more than one domain. Reasons for high prevalence of multi-domain proteins in various organisms have been attributed to higher stability and functional and folding advantages over single-domain proteins. Despite these advantages, many proteins are composed of only one domain while their homologous domains are part of multi-domain proteins. In the study presented here, differences in the properties of protein domains in single-domain and multi-domain systems and their influence on functions are discussed. We studied 20 pairs of identical protein domains, which were crystallized in two forms (a) tethered to other proteins domains and (b) tethered to fewer protein domains than (a) or not tethered to any protein domain. Results suggest that tethering of domains in multi-domain proteins influences the structural, dynamic and energetic properties of the constituent protein domains. 50% of the protein domain pairs show significant structural deviations while 90% of the protein domain pairs show differences in dynamics and 12% of the residues show differences in the energetics. To gain further insights on the influence of tethering on the function of the domains, 4 pairs of homologous protein domains, where one of them is a full-length single-domain protein and the other protein domain is a part of a multi-domain protein, were studied. Analyses showed that identical and structurally equivalent functional residues show differential dynamics in homologous protein domains, though comparable dynamics between in-silico generated chimera protein and multi-domain proteins were observed. From these observations, the differences observed in the functions of homologous proteins could be attributed to the presence of tethered domain. Overall, we conclude that tethered domains in multi-domain proteins not only provide stability or folding advantages but also influence pathways resulting in differences in function or regulatory properties.
△ Less
Submitted 10 August, 2018;
originally announced August 2018.
-
Applications of Common Entropy for Causal Inference
Authors:
Murat Kocaoglu,
Sanjay Shakkottai,
Alexandros G. Dimakis,
Constantine Caramanis,
Sriram Vishwanath
Abstract:
We study the problem of discovering the simplest latent variable that can make two observed discrete variables conditionally independent. The minimum entropy required for such a latent is known as common entropy in information theory. We extend this notion to Renyi common entropy by minimizing the Renyi entropy of the latent variable. To efficiently compute common entropy, we propose an iterative…
▽ More
We study the problem of discovering the simplest latent variable that can make two observed discrete variables conditionally independent. The minimum entropy required for such a latent is known as common entropy in information theory. We extend this notion to Renyi common entropy by minimizing the Renyi entropy of the latent variable. To efficiently compute common entropy, we propose an iterative algorithm that can be used to discover the trade-off between the entropy of the latent variable and the conditional mutual information of the observed variables. We show two applications of common entropy in causal inference: First, under the assumption that there are no low-entropy mediators, it can be used to distinguish causation from spurious correlation among almost all joint distributions on simple causal graphs with two observed variables. Second, common entropy can be used to improve constraint-based methods such as PC or FCI algorithms in the small-sample regime, where these methods are known to struggle. We propose a modification to these constraint-based methods to assess if a separating set found by these algorithms is valid using common entropy. We finally evaluate our algorithms on synthetic and real data to establish their performance.
△ Less
Submitted 5 December, 2020; v1 submitted 26 July, 2018;
originally announced July 2018.
-
Compressed Sensing with Deep Image Prior and Learned Regularization
Authors:
Dave Van Veen,
Ajil Jalal,
Mahdi Soltanolkotabi,
Eric Price,
Sriram Vishwanath,
Alexandros G. Dimakis
Abstract:
We propose a novel method for compressed sensing recovery using untrained deep generative models. Our method is based on the recently proposed Deep Image Prior (DIP), wherein the convolutional weights of the network are optimized to match the observed measurements. We show that this approach can be applied to solve any differentiable linear inverse problem, outperforming previous unlearned methods…
▽ More
We propose a novel method for compressed sensing recovery using untrained deep generative models. Our method is based on the recently proposed Deep Image Prior (DIP), wherein the convolutional weights of the network are optimized to match the observed measurements. We show that this approach can be applied to solve any differentiable linear inverse problem, outperforming previous unlearned methods. Unlike various learned approaches based on generative models, our method does not require pre-training over large datasets. We further introduce a novel learned regularization technique, which incorporates prior information on the network weights. This reduces reconstruction error, especially for noisy measurements. Finally, we prove that, using the DIP optimization approach, moderately overparameterized single-layer networks can perfectly fit any signal despite the non-convex nature of the fitting problem. This theoretical result provides justification for early stopping.
△ Less
Submitted 29 October, 2020; v1 submitted 17 June, 2018;
originally announced June 2018.
-
On the Key Generation Rate of Physically Unclonable Functions
Authors:
Yitao Chen,
Muryong Kim,
Sriram Vishwanath
Abstract:
In this paper, an algebraic binning based coding scheme and its associated achievable rate for key generation using physically unclonable functions (PUFs) is determined. This achievable rate is shown to be optimal under the generated-secret (GS) model for PUFs. Furthermore, a polar code based polynomial-time encoding and decoding scheme that achieves this rate is also presented.
In this paper, an algebraic binning based coding scheme and its associated achievable rate for key generation using physically unclonable functions (PUFs) is determined. This achievable rate is shown to be optimal under the generated-secret (GS) model for PUFs. Furthermore, a polar code based polynomial-time encoding and decoding scheme that achieves this rate is also presented.
△ Less
Submitted 6 February, 2018; v1 submitted 23 January, 2018;
originally announced January 2018.
-
On the Steady State of Continuous Time Stochastic Opinion Dynamics with Power Law Confidence
Authors:
Jae Oh Woo,
François Baccelli,
Sriram Vishwanath
Abstract:
This paper introduces a class of non-linear and continuous-time opinion dynamics model with additive noise and state dependent interaction rates between agents. The model features interaction rates which are proportional to a negative power of opinion distances. We establish a non-local partial differential equation for the distribution of opinion distances and use Mellin transforms to provide an…
▽ More
This paper introduces a class of non-linear and continuous-time opinion dynamics model with additive noise and state dependent interaction rates between agents. The model features interaction rates which are proportional to a negative power of opinion distances. We establish a non-local partial differential equation for the distribution of opinion distances and use Mellin transforms to provide an explicit formula for the stationary solution of the latter, when it exists. Our approach leads to new qualitative and quantitative results on this type of dynamics. To the best of our knowledge these Mellin transform results are the first quantitative results on the equilibria of opinion dynamics with distance-dependent interaction rates. The closed form expressions for this class of dynamics are obtained for the two agent case. However the results can be used in mean-field models featuring several agents whose interaction rates depend on the empirical average of their opinions. The technique also applies to linear dynamics, namely with a constant interaction rate, on an interaction graph.
△ Less
Submitted 12 December, 2020; v1 submitted 2 November, 2017;
originally announced November 2017.
-
CausalGAN: Learning Causal Implicit Generative Models with Adversarial Training
Authors:
Murat Kocaoglu,
Christopher Snyder,
Alexandros G. Dimakis,
Sriram Vishwanath
Abstract:
We propose an adversarial training procedure for learning a causal implicit generative model for a given causal graph. We show that adversarial training can be used to learn a generative model with true observational and interventional distributions if the generator architecture is consistent with the given causal graph. We consider the application of generating faces based on given binary labels…
▽ More
We propose an adversarial training procedure for learning a causal implicit generative model for a given causal graph. We show that adversarial training can be used to learn a generative model with true observational and interventional distributions if the generator architecture is consistent with the given causal graph. We consider the application of generating faces based on given binary labels where the dependency structure between the labels is preserved with a causal graph. This problem can be seen as learning a causal implicit generative model for the image and labels. We devise a two-stage procedure for this problem. First we train a causal implicit generative model over binary labels using a neural network consistent with a causal graph as the generator. We empirically show that WassersteinGAN can be used to output discrete labels. Later, we propose two new conditional GAN architectures, which we call CausalGAN and CausalBEGAN. We show that the optimal generator of the CausalGAN, given the labels, samples from the image distributions conditioned on these labels. The conditional GAN combined with a trained causal implicit generative model for the labels is then a causal implicit generative model over the labels and the generated image. We show that the proposed architectures can be used to sample from observational and interventional image distributions, even for interventions which do not naturally occur in the dataset.
△ Less
Submitted 14 September, 2017; v1 submitted 6 September, 2017;
originally announced September 2017.
-
MBE growth of 2H-MoTe2 and 1T'-MoTe2 on 3D substrates
Authors:
Suresh Vishwanath,
Aditya Sundar,
Xinyu Liu,
Angelica Azcatl,
Edward Lochocki,
Arthur R. Woll,
Sergei Rouvimov,
Wan Sik Hwang,
Ning Lu,
Xin Peng,
Huai-Hsun Lien,
John Weisenberger,
Stephen McDonnell,
Moon J. Kim,
Margaret Dobrowolska,
Jacek K Furdyna,
Kyle Shen,
Robert M. Wallace,
Debdeep Jena,
Huili Grace Xing
Abstract:
MoTe2 is the least explored material in the Molybdenum-chalcogen family, which crystallizes in thermodynamically stable semiconducting 2H phase at \textless 500 C and 1T' metallic phase at higher temperatures. Molecular beam epitaxy (MBE) provides an unique opportunity to tackle the small electronegativity difference between Mo and Te while growing layer by layer away from thermodynamic equilibriu…
▽ More
MoTe2 is the least explored material in the Molybdenum-chalcogen family, which crystallizes in thermodynamically stable semiconducting 2H phase at \textless 500 C and 1T' metallic phase at higher temperatures. Molecular beam epitaxy (MBE) provides an unique opportunity to tackle the small electronegativity difference between Mo and Te while growing layer by layer away from thermodynamic equilibrium. For a few-layer MoTe2 grown at a moderate rate of $\sim$6 mins per monolayer under varied Te:Mo flux ratio and substrate temperature, the boundary between the 2 phases in MBE grown MoTe2 on CaF2 is characterized using Reflection high-energy electron diffraction (RHEED), Raman spectroscopy and X-ray photoemission spectroscopy (XPS). Grazing incidence X-ray diffraction (GI-XRD) reveals a grain size of $\sim$90 Å and presence of twinned grains. XRD, transmission electron miscroscopy, RHEED, low energy electron diffraction along with lack of electrical conductivity modulation by field effect in MBE 2H-MoTe2 on GaAs (111) B show likelihood of excess Te incorporation in the films. Finally, thermal stability and air sensitivity of MBE 2H-MoTe2 is investigated by temperature dependent XRD and XPS, respectively.
△ Less
Submitted 1 May, 2017;
originally announced May 2017.
-
Observation of oscillatory relaxation in the Sn-terminated surface of epitaxial rock-salt SnSe $\{111\}$ topological crystalline insulator
Authors:
Wencan Jin,
Suresh Vishwanath,
Jianpeng Liu,
Lingyuan Kong,
Rui Lou,
Zhongwei Dai,
Jerzy T. Sadowski,
Xinyu Liu,
Huai-Hsun Lien,
Alexander Chaney,
Yimo Han,
Micheal Cao,
Junzhang Ma,
Tian Qian,
Jerry I. Dadap,
Shancai Wang,
Malgorzata Dobrowolska,
Jacek Furdyna,
David A. Muller,
Karsten Pohl,
Hong Ding,
Huili Grace Xing,
Richard M. Osgood, Jr
Abstract:
Topological crystalline insulators have been recently predicted and observed in rock-salt structure SnSe $\{111\}$ thin films. Previous studies have suggested that the Se-terminated surface of this thin film with hydrogen passivation, has a reduced surface energy and is thus a preferred configuration. In this paper, synchrotron-based angle-resolved photoemission spectroscopy, along with density fu…
▽ More
Topological crystalline insulators have been recently predicted and observed in rock-salt structure SnSe $\{111\}$ thin films. Previous studies have suggested that the Se-terminated surface of this thin film with hydrogen passivation, has a reduced surface energy and is thus a preferred configuration. In this paper, synchrotron-based angle-resolved photoemission spectroscopy, along with density functional theory calculations, are used to demonstrate conclusively that a rock-salt SnSe $\{111\}$ thin film epitaxially-grown on \ce{Bi2Se3} has a stable Sn-terminated surface. These observations are supported by low energy electron diffraction (LEED) intensity-voltage measurements and dynamical LEED calculations, which further show that the Sn-terminated SnSe $\{111\}$ thin film has undergone a surface structural relaxation of the interlayer spacing between the Sn and Se atomic planes. In sharp contrast to the Se-terminated counterpart, the observed Dirac surface state in the Sn-terminated SnSe $\{111\}$ thin film is shown to yield a high Fermi velocity, $0.50\times10^6$m/s, which suggests a potential mechanism of engineering the Dirac surface state of topological materials by tuning the surface configuration.
△ Less
Submitted 10 April, 2017;
originally announced April 2017.
-
Cost-Optimal Learning of Causal Graphs
Authors:
Murat Kocaoglu,
Alexandros G. Dimakis,
Sriram Vishwanath
Abstract:
We consider the problem of learning a causal graph over a set of variables with interventions. We study the cost-optimal causal graph learning problem: For a given skeleton (undirected version of the causal graph), design the set of interventions with minimum total cost, that can uniquely identify any causal graph with the given skeleton. We show that this problem is solvable in polynomial time. L…
▽ More
We consider the problem of learning a causal graph over a set of variables with interventions. We study the cost-optimal causal graph learning problem: For a given skeleton (undirected version of the causal graph), design the set of interventions with minimum total cost, that can uniquely identify any causal graph with the given skeleton. We show that this problem is solvable in polynomial time. Later, we consider the case when the number of interventions is limited. For this case, we provide polynomial time algorithms when the skeleton is a tree or a clique tree. For a general chordal skeleton, we develop an efficient greedy algorithm, which can be improved when the causal graph skeleton is an interval graph.
△ Less
Submitted 7 March, 2017;
originally announced March 2017.
-
Entropic Causality and Greedy Minimum Entropy Coupling
Authors:
Murat Kocaoglu,
Alexandros G. Dimakis,
Sriram Vishwanath,
Babak Hassibi
Abstract:
We study the problem of identifying the causal relationship between two discrete random variables from observational data. We recently proposed a novel framework called entropic causality that works in a very general functional model but makes the assumption that the unobserved exogenous variable has small entropy in the true causal direction.
This framework requires the solution of a minimum en…
▽ More
We study the problem of identifying the causal relationship between two discrete random variables from observational data. We recently proposed a novel framework called entropic causality that works in a very general functional model but makes the assumption that the unobserved exogenous variable has small entropy in the true causal direction.
This framework requires the solution of a minimum entropy coupling problem: Given marginal distributions of m discrete random variables, each on n states, find the joint distribution with minimum entropy, that respects the given marginals. This corresponds to minimizing a concave function of nm variables over a convex polytope defined by nm linear constraints, called a transportation polytope. Unfortunately, it was recently shown that this minimum entropy coupling problem is NP-hard, even for 2 variables with n states. Even representing points (joint distributions) over this space can require exponential complexity (in n, m) if done naively.
In our recent work we introduced an efficient greedy algorithm to find an approximate solution for this problem. In this paper we analyze this algorithm and establish two results: that our algorithm always finds a local minimum and also is within an additive approximation error from the unknown global optimum.
△ Less
Submitted 28 January, 2017;
originally announced January 2017.
-
Approximate Capacity of a Class of Partially Connected Interference Channels
Authors:
Muryong Kim,
Yitao Chen,
Sriram Vishwanath
Abstract:
We derive inner and outer bounds on the capacity region for a class of three-user partially connected interference channels. We focus on the impact of topology, interference alignment, and interplay between interference and noise. The representative channels we consider are the ones that have clear interference alignment gain. For these channels, Z-channel type outer bounds are tight to within a c…
▽ More
We derive inner and outer bounds on the capacity region for a class of three-user partially connected interference channels. We focus on the impact of topology, interference alignment, and interplay between interference and noise. The representative channels we consider are the ones that have clear interference alignment gain. For these channels, Z-channel type outer bounds are tight to within a constant gap from capacity. We present near-optimal achievable schemes based on rate-splitting and lattice alignment.
△ Less
Submitted 13 February, 2017; v1 submitted 25 January, 2017;
originally announced January 2017.
-
Entropic Causal Inference
Authors:
Murat Kocaoglu,
Alexandros G. Dimakis,
Sriram Vishwanath,
Babak Hassibi
Abstract:
We consider the problem of identifying the causal direction between two discrete random variables using observational data. Unlike previous work, we keep the most general functional model but make an assumption on the unobserved exogenous variable: Inspired by Occam's razor, we assume that the exogenous variable is simple in the true causal direction. We quantify simplicity using Rényi entropy. Ou…
▽ More
We consider the problem of identifying the causal direction between two discrete random variables using observational data. Unlike previous work, we keep the most general functional model but make an assumption on the unobserved exogenous variable: Inspired by Occam's razor, we assume that the exogenous variable is simple in the true causal direction. We quantify simplicity using Rényi entropy. Our main result is that, under natural assumptions, if the exogenous variable has low $H_0$ entropy (cardinality) in the true direction, it must have high $H_0$ entropy in the wrong direction. We establish several algorithmic hardness results about estimating the minimum entropy exogenous variable. We show that the problem of finding the exogenous variable with minimum entropy is equivalent to the problem of finding minimum joint entropy given $n$ marginal distributions, also known as minimum entropy coupling problem. We propose an efficient greedy algorithm for the minimum entropy coupling problem, that for $n=2$ provably finds a local optimum. This gives a greedy algorithm for finding the exogenous variable with minimum $H_1$ (Shannon Entropy). Our greedy entropy-based causal inference algorithm has similar performance to the state of the art additive noise models in real datasets. One advantage of our approach is that we make no use of the values of random variables but only their distributions. Our method can therefore be used for causal inference for both ordinal and also categorical data, unlike additive noise models.
△ Less
Submitted 14 November, 2016; v1 submitted 12 November, 2016;
originally announced November 2016.
-
Centralized Repair of Multiple Node Failures with Applications to Communication Efficient Secret Sharing
Authors:
Ankit Singh Rawat,
O. Ozan Koyluoglu,
Sriram Vishwanath
Abstract:
This paper considers a distributed storage system, where multiple storage nodes can be reconstructed simultaneously at a centralized location. This centralized multi-node repair (CMR) model is a generalization of regenerating codes that allow for bandwidth-efficient repair of a single failed node. This work focuses on the trade-off between the amount of data stored and repair bandwidth in this CMR…
▽ More
This paper considers a distributed storage system, where multiple storage nodes can be reconstructed simultaneously at a centralized location. This centralized multi-node repair (CMR) model is a generalization of regenerating codes that allow for bandwidth-efficient repair of a single failed node. This work focuses on the trade-off between the amount of data stored and repair bandwidth in this CMR model. In particular, repair bandwidth bounds are derived for the minimum storage multi-node repair (MSMR) and the minimum bandwidth multi-node repair (MBMR) operating points. The tightness of these bounds are analyzed via code constructions. The MSMR point is characterized through codes achieving this point under functional repair for general set of CMR parameters, as well as with codes enabling exact repair for certain CMR parameters. The MBMR point, on the other hand, is characterized with exact repair codes for all CMR parameters for systems that satisfy a certain entropy accumulation property. Finally, the model proposed here is utilized for the secret sharing problem, where the codes for the multi-node repair problem is used to construct communication efficient secret sharing schemes with the property of bandwidth efficient share repair.
△ Less
Submitted 15 March, 2016;
originally announced March 2016.
-
Progress on High-rate MSR Codes: Enabling Arbitrary Number of Helper Nodes
Authors:
Ankit Singh Rawat,
O. Ozan Koyluoglu,
Sriram Vishwanath
Abstract:
This paper presents a construction for high-rate MDS codes that enable bandwidth-efficient repair of a single node. Such MDS codes are also referred to as the minimum storage regenerating (MSR) codes in the distributed storage literature. The construction presented in this paper generates MSR codes for all possible number of helper nodes $d$ as $d$ is a design parameter in the construction. Furthe…
▽ More
This paper presents a construction for high-rate MDS codes that enable bandwidth-efficient repair of a single node. Such MDS codes are also referred to as the minimum storage regenerating (MSR) codes in the distributed storage literature. The construction presented in this paper generates MSR codes for all possible number of helper nodes $d$ as $d$ is a design parameter in the construction. Furthermore, the obtained MSR codes have polynomial sub-packetization (a.k.a. node size) $α$. The construction is built on the recent code proposed by Sasidharan et al. [1], which works only for $d = n-1$, i.e., where all the remaining nodes serve as the helper nodes for the bandwidth-efficient repair of a single node. The results of this paper broaden the set of parameters where the constructions of MSR codes were known earlier.
△ Less
Submitted 24 January, 2016;
originally announced January 2016.
-
Efficient and Flexible Crowdsourcing of Specialized Tasks with Precedence Constraints
Authors:
Avhishek Chatterjee,
Michael Borokhovich,
Lav R. Varshney,
Sriram Vishwanath
Abstract:
Many companies now use crowdsourcing to leverage external (as well as internal) crowds to perform specialized work, and so methods of improving efficiency are critical. Tasks in crowdsourcing systems with specialized work have multiple steps and each step requires multiple skills. Steps may have different flexibilities in terms of obtaining service from one or multiple agents, due to varying level…
▽ More
Many companies now use crowdsourcing to leverage external (as well as internal) crowds to perform specialized work, and so methods of improving efficiency are critical. Tasks in crowdsourcing systems with specialized work have multiple steps and each step requires multiple skills. Steps may have different flexibilities in terms of obtaining service from one or multiple agents, due to varying levels of dependency among parts of steps. Steps of a task may have precedence constraints among them. Moreover, there are variations in loads of different types of tasks requiring different skill-sets and availabilities of different types of agents with different skill-sets. Considering these constraints together necessitates the design of novel schemes to allocate steps to agents. In addition, large crowdsourcing systems require allocation schemes that are simple, fast, decentralized and offer customers (task requesters) the freedom to choose agents. In this work we study the performance limits of such crowdsourcing systems and propose efficient allocation schemes that provably meet the performance limits under these additional requirements. We demonstrate our algorithms on data from a crowdsourcing platform run by a non-profit company and show significant improvements over current practice.
△ Less
Submitted 15 January, 2016;
originally announced January 2016.
-
Hierarchical Polar Coding for Achieving Secrecy over Fading Wiretap Channels without any Instantaneous CSI
Authors:
Hongbo Si,
O. Ozan Koyluoglu,
Sriram Vishwanath
Abstract:
This paper presents a polar coding scheme to achieve secrecy in block fading binary symmetric wiretap channels without the knowledge of instantaneous channel state information (CSI) at the transmitter. For this model, a coding scheme that hierarchically utilizes polar codes is presented. In particular, on polarization of different binary symmetric channels over different fading blocks, each channe…
▽ More
This paper presents a polar coding scheme to achieve secrecy in block fading binary symmetric wiretap channels without the knowledge of instantaneous channel state information (CSI) at the transmitter. For this model, a coding scheme that hierarchically utilizes polar codes is presented. In particular, on polarization of different binary symmetric channels over different fading blocks, each channel use is modeled as an appropriate binary erasure channel over fading blocks. Polar codes are constructed for both coding over channel uses for each fading block and coding over fading blocks for certain channel uses. In order to guarantee security, random bits are introduced at appropriate places to exhaust the observations of the eavesdropper. It is shown that this coding scheme, without instantaneous CSI at the transmitter, is secrecy capacity achieving for the simultaneous fading scenario. For the independent fading case, the capacity is achieved when the fading realizations for the eavesdropper channel is always degraded with respect to the receiver. For the remaining cases, the gap is analyzed by comparing lower and upper bounds. Remarkably, for the scenarios where the secrecy capacity is achieved, the results imply that instantaneous CSI does not increase the secrecy capacity.
△ Less
Submitted 4 November, 2015;
originally announced November 2015.
-
Learning Causal Graphs with Small Interventions
Authors:
Karthikeyan Shanmugam,
Murat Kocaoglu,
Alexandros G. Dimakis,
Sriram Vishwanath
Abstract:
We consider the problem of learning causal networks with interventions, when each intervention is limited in size under Pearl's Structural Equation Model with independent errors (SEM-IE). The objective is to minimize the number of experiments to discover the causal directions of all the edges in a causal graph. Previous work has focused on the use of separating systems for complete graphs for this…
▽ More
We consider the problem of learning causal networks with interventions, when each intervention is limited in size under Pearl's Structural Equation Model with independent errors (SEM-IE). The objective is to minimize the number of experiments to discover the causal directions of all the edges in a causal graph. Previous work has focused on the use of separating systems for complete graphs for this task. We prove that any deterministic adaptive algorithm needs to be a separating system in order to learn complete graphs in the worst case. In addition, we present a novel separating system construction, whose size is close to optimal and is arguably simpler than previous work in combinatorics. We also develop a novel information theoretic lower bound on the number of interventions that applies in full generality, including for randomized adaptive learning algorithms.
For general chordal graphs, we derive worst case lower bounds on the number of interventions. Building on observations about induced trees, we give a new deterministic adaptive algorithm to learn directions on any chordal skeleton completely. In the worst case, our achievable scheme is an $α$-approximation algorithm where $α$ is the independence number of the graph. We also show that there exist graph classes for which the sufficient number of experiments is close to the lower bound. In the other extreme, there are graph classes for which the required number of experiments is multiplicatively $α$ away from our lower bound.
In simulations, our algorithm almost always performs very close to the lower bound, while the approach based on separating systems for complete graphs is significantly worse for random chordal graphs.
△ Less
Submitted 30 October, 2015;
originally announced November 2015.
-
Layered transition metal dichalcogenides: promising near-lattice-matched substrates for GaN growth
Authors:
Priti Gupta,
A. A. Rahman,
Shruti Subramanian,
Shalini Gupta,
Arumugam Thamizhavel,
Tatyana Orlova,
Sergei Rouvimov,
Suresh Vishwanath,
Vladimir Protasenko,
Masihhur R. Laskar,
Huili Grace Xing,
Debdeep Jena,
Arnab Bhattacharya
Abstract:
Most III-nitride semiconductors are grown on non-lattice-matched substrates like sapphire or silicon due to the extreme difficulty of obtaining a native GaN substrate. We show that several layered transition-metal dichalcogenides are closely lattice matched to GaN and report the growth of GaN on a range of such layered materials. We report detailed studies of the growth of GaN on mechanically-exfo…
▽ More
Most III-nitride semiconductors are grown on non-lattice-matched substrates like sapphire or silicon due to the extreme difficulty of obtaining a native GaN substrate. We show that several layered transition-metal dichalcogenides are closely lattice matched to GaN and report the growth of GaN on a range of such layered materials. We report detailed studies of the growth of GaN on mechanically-exfoliated flakes WS$_2$ and MoS$_2$ by metalorganic vapour phase epitaxy. Structural and optical characterization show that strain-free, single-crystal islands of GaN are obtained on the underlying chalcogenide flakes. We obtain strong near-band-edge emission from these layers, and analyse their temperature-dependent photoluminescence properties. We also report a proof-of-concept demonstration of large-area epitaxial growth of GaN on CVD MoS$_2$. Our results show that the transition-metal dichalcogenides can serve as novel near-lattice-matched substrates for nitride growth.
△ Less
Submitted 28 September, 2015;
originally announced September 2015.
-
Structural Vulnerability of Power Grids to Disasters: Bounds, Adversarial Attacks and Reinforcement
Authors:
Deepjyoti Deka,
Sriram Vishwanath
Abstract:
Natural Disasters like hurricanes, floods or earthquakes can damage power grid devices and create cascading blackouts and islands. The nature of failure propagation and extent of damage is dependent on the structural features of the grid, which is different from that of random networks. This paper analyzes the structural vulnerability of real power grids to impending disasters and presents intuiti…
▽ More
Natural Disasters like hurricanes, floods or earthquakes can damage power grid devices and create cascading blackouts and islands. The nature of failure propagation and extent of damage is dependent on the structural features of the grid, which is different from that of random networks. This paper analyzes the structural vulnerability of real power grids to impending disasters and presents intuitive graphical metrics to quantify the extent of damage. Two improved graph eigen-value based bounds on the grid vulnerability are developed and demonstrated through simulations of failure propagation on IEEE test cases and real networks. Finally this paper studies adversarial attacks aimed at weakening the grid's structural resilience and presents two approximate schemes to determine the critical transmission lines that may be attacked to minimize grid resilience. The framework can be also be used to design protection schemes to secure the grid against such adversarial attacks. Simulations on power networks are used to compare the performance of the attack schemes in reducing grid resilience.
△ Less
Submitted 24 September, 2015;
originally announced September 2015.
-
Jamming aided Generalized Data Attacks: Exposing Vulnerabilities in Secure Estimation
Authors:
Deepjyoti Deka,
Ross Baldick,
Sriram Vishwanath
Abstract:
Jamming refers to the deletion, corruption or damage of meter measurements that prevents their further usage. This is distinct from adversarial data injection that changes meter readings while preserving their utility in state estimation. This paper presents a generalized attack regime that uses jamming of secure and insecure measurements to greatly expand the scope of common 'hidden' and 'detecta…
▽ More
Jamming refers to the deletion, corruption or damage of meter measurements that prevents their further usage. This is distinct from adversarial data injection that changes meter readings while preserving their utility in state estimation. This paper presents a generalized attack regime that uses jamming of secure and insecure measurements to greatly expand the scope of common 'hidden' and 'detectable' data injection attacks in literature. For 'hidden' attacks, it is shown that with jamming, the optimal attack is given by the minimum feasible cut in a specific weighted graph. More importantly, for 'detectable' data attacks, this paper shows that the entire range of relative costs for adversarial jamming and data injection can be divided into three separate regions, with distinct graph-cut based constructions for the optimal attack. Approximate algorithms for attack design are developed and their performances are demonstrated by simulations on IEEE test cases. Further, it is proved that prevention of such attacks require security of all grid measurements. This work comprehensively quantifies the dual adversarial benefits of jamming: (a) reduced attack cost and (b) increased resilience to secure measurements, that strengthen the potency of data attacks.
△ Less
Submitted 15 September, 2015;
originally announced September 2015.
-
Work Capacity of Freelance Markets: Fundamental Limits and Decentralized Schemes
Authors:
Avhishek Chatterjee,
Lav R. Varshney,
Sriram Vishwanath
Abstract:
Crowdsourcing of jobs to online freelance markets is rapidly gaining popularity. Most crowdsourcing platforms are uncontrolled and offer freedom to customers and freelancers to choose each other. This works well for unskilled jobs (e.g., image classification) with no specific quality requirement since freelancers are functionally identical. For skilled jobs (e.g., software development) with specif…
▽ More
Crowdsourcing of jobs to online freelance markets is rapidly gaining popularity. Most crowdsourcing platforms are uncontrolled and offer freedom to customers and freelancers to choose each other. This works well for unskilled jobs (e.g., image classification) with no specific quality requirement since freelancers are functionally identical. For skilled jobs (e.g., software development) with specific quality requirements, however, this does not ensure that the maximum number of job requests is satisfied. In this work we determine the capacity of freelance markets, in terms of maximum satisfied job requests, and propose centralized schemes that achieve capacity. To ensure decentralized operation and freedom of choice for customers and freelancers, we propose simple schemes compatible with the operation of current crowdsourcing platforms that approximately achieve capacity. Further, for settings where the number of job requests exceeds capacity, we propose a scheme that is agnostic of that information, but is optimal and fair in declining jobs without wait.
△ Less
Submitted 15 January, 2016; v1 submitted 31 July, 2015;
originally announced August 2015.
-
A Perspective on Future Research Directions in Information Theory
Authors:
Jeffrey G. Andrews,
Alexandros Dimakis,
Lara Dolecek,
Michelle Effros,
Muriel Medard,
Olgica Milenkovic,
Andrea Montanari,
Sriram Vishwanath,
Edmund Yeh,
Randall Berry,
Ken Duffy,
Soheil Feizi,
Saul Kato,
Manolis Kellis,
Stuart Licht,
Jon Sorenson,
Lav Varshney,
Haris Vikalo
Abstract:
Information theory is rapidly approaching its 70th birthday. What are promising future directions for research in information theory? Where will information theory be having the most impact in 10-20 years? What new and emerging areas are ripe for the most impact, of the sort that information theory has had on the telecommunications industry over the last 60 years? How should the IEEE Information T…
▽ More
Information theory is rapidly approaching its 70th birthday. What are promising future directions for research in information theory? Where will information theory be having the most impact in 10-20 years? What new and emerging areas are ripe for the most impact, of the sort that information theory has had on the telecommunications industry over the last 60 years? How should the IEEE Information Theory Society promote high-risk new research directions and broaden the reach of information theory, while continuing to be true to its ideals and insisting on the intellectual rigor that makes its breakthroughs so powerful? These are some of the questions that an ad hoc committee (composed of the present authors) explored over the past two years. We have discussed and debated these questions, and solicited detailed inputs from experts in fields including genomics, biology, economics, and neuroscience. This report is the result of these discussions.
△ Less
Submitted 21 July, 2015;
originally announced July 2015.
-
Optimal Data Attacks on Power Grids: Leveraging Detection & Measurement Jamming
Authors:
Deepjyoti Deka,
Ross Baldick,
Sriram Vishwanath
Abstract:
Meter measurements in the power grid are susceptible to manipulation by adversaries, that can lead to errors in state estimation. This paper presents a general framework to study attacks on state estimation by adversaries capable of injecting bad-data into measurements and further, of jamming their reception. Through these two techniques, a novel `detectable jamming' attack is designed that change…
▽ More
Meter measurements in the power grid are susceptible to manipulation by adversaries, that can lead to errors in state estimation. This paper presents a general framework to study attacks on state estimation by adversaries capable of injecting bad-data into measurements and further, of jamming their reception. Through these two techniques, a novel `detectable jamming' attack is designed that changes the state estimation despite failing bad-data detection checks. Compared to commonly studied `hidden' data attacks, these attacks have lower costs and a wider feasible operating region. It is shown that the entire domain of jamming costs can be divided into two regions, with distinct graph-cut based formulations for the design of the optimal attack. The most significant insight arising from this result is that the adversarial capability to jam measurements changes the optimal 'detectable jamming' attack design only if the jamming cost is less than half the cost of bad-data injection. A polynomial time approximate algorithm for attack vector construction is developed and its efficacy in attack design is demonstrated through simulations on IEEE test systems.
△ Less
Submitted 15 June, 2015;
originally announced June 2015.
-
One Breaker is Enough: Hidden Topology Attacks on Power Grids
Authors:
Deepjyoti Deka,
Ross Baldick,
Sriram Vishwanath
Abstract:
A coordinated cyber-attack on grid meter readings and breaker statuses can lead to incorrect state estimation that can subsequently destabilize the grid. This paper studies cyber-attacks by an adversary that changes breaker statuses on transmission lines to affect the estimation of the grid topology. The adversary, however, is incapable of changing the value of any meter data and can only block re…
▽ More
A coordinated cyber-attack on grid meter readings and breaker statuses can lead to incorrect state estimation that can subsequently destabilize the grid. This paper studies cyber-attacks by an adversary that changes breaker statuses on transmission lines to affect the estimation of the grid topology. The adversary, however, is incapable of changing the value of any meter data and can only block recorded measurements on certain lines from being transmitted to the control center. The proposed framework, with limited resource requirements as compared to standard data attacks, thus extends the scope of cyber-attacks to grids secure from meter corruption. We discuss necessary and sufficient conditions for feasible attacks using a novel graph-coloring based analysis and show that an optimal attack requires breaker status change at only ONE transmission line. The potency of our attack regime is demonstrated through simulations on IEEE test cases.
△ Less
Submitted 13 June, 2015;
originally announced June 2015.
-
Expansion Coding for Channel and Source Coding
Authors:
Hongbo Si,
O. Ozan Koyluoglu,
Kumar Appaiah,
Sriram Vishwanath
Abstract:
A general method of coding over expansion is proposed,which allows one to reduce the highly non-trivial problems of coding over analog channels and compressing analog sources to a set of much simpler subproblems, coding over discrete channels and compressing discrete sources. More specifically, the focus of this paper is on the additive exponential noise (AEN) channel, and lossy compression of exp…
▽ More
A general method of coding over expansion is proposed,which allows one to reduce the highly non-trivial problems of coding over analog channels and compressing analog sources to a set of much simpler subproblems, coding over discrete channels and compressing discrete sources. More specifically, the focus of this paper is on the additive exponential noise (AEN) channel, and lossy compression of exponential sources. Taking advantage of the essential decomposable property of these channels (sources), the proposed expansion method allows for mapping of these problems to coding over parallel channels (respectively, sources), where each level is modeled as an independent coding problem over discrete alphabets. Any feasible solution to the resulting optimization problem after expansion corresponds to an achievable scheme of the original problem. Utilizing this mapping, even for the cases where the optimal solutions are difficult to characterize, it is shown that the expansion coding scheme still performs well with appropriate choices of parameters. More specifically, theoretical analysis and numerical results reveal that expansion coding achieves the capacity of AEN channel in the high SNR regime. It is also shown that for lossy compression, the achievable rate distortion pair by expansion coding approaches to the Shannon limit in the low distortion region. Remarkably, by using capacity-achieving codes with low encoding and decoding complexity that are originally designed for discrete alphabets, for instance polar codes, the proposed expansion coding scheme allows for designing low-complexity analog channel and source codes.
△ Less
Submitted 20 May, 2015;
originally announced May 2015.
-
Data Attacks on Power Grids: Leveraging Detection
Authors:
Deepjyoti Deka,
Ross Baldick,
Sriram Vishwanath
Abstract:
Data attacks on meter measurements in the power grid can lead to errors in state estimation. This paper presents a new data attack model where an adversary produces changes in state estimation despite failing bad-data detection checks. The adversary achieves its objective by making the estimator incorrectly identify correct measurements as bad data. The proposed attack regime's significance lies i…
▽ More
Data attacks on meter measurements in the power grid can lead to errors in state estimation. This paper presents a new data attack model where an adversary produces changes in state estimation despite failing bad-data detection checks. The adversary achieves its objective by making the estimator incorrectly identify correct measurements as bad data. The proposed attack regime's significance lies in reducing the minimum sizes of successful attacks to more than half of that of undetectable data attacks. Additionally, the attack model is able to construct attacks on systems that are resilient to undetectable attacks. The conditions governing a successful data attack of the proposed model are presented along with guarantees on its performance. The complexity of constructing an optimal attack is discussed and two polynomial time approximate algorithms for attack vector construction are developed. The performance of the proposed algorithms and efficacy of the hidden attack model are demonstrated through simulations on IEEE test systems.
△ Less
Submitted 7 May, 2015;
originally announced May 2015.
-
Molecular beam epitaxial growth of MoSe2 on graphite, CaF2 and graphene
Authors:
Suresh Vishwanath,
Xinyu Liu,
Sergei Rouvimov,
Patrick C. Mende,
Angelica Azcatl,
Stephen McDonnell,
Robert M. Wallace,
Randall M. Feenstra,
Jacek K. Furdyna,
Debdeep Jena,
Huili Grace Xing
Abstract:
We report the structural and optical properties of molecular beam epitaxy (MBE) grown 2-dimensional (2D) material molybdenum diselenide (MoSe2) on graphite, CaF2 and epitaxial graphene. Extensive characterizations reveal that 2H- MoSe2 grows by van-der-Waals epitaxy on all 3 substrates with a preferred crystallographic orientation and a Mo:Se ratio of 1:2. Photoluminescence at room temperature (~1…
▽ More
We report the structural and optical properties of molecular beam epitaxy (MBE) grown 2-dimensional (2D) material molybdenum diselenide (MoSe2) on graphite, CaF2 and epitaxial graphene. Extensive characterizations reveal that 2H- MoSe2 grows by van-der-Waals epitaxy on all 3 substrates with a preferred crystallographic orientation and a Mo:Se ratio of 1:2. Photoluminescence at room temperature (~1.56 eV) is observed in monolayer MoSe2 on both CaF2 and epitaxial graphene. The band edge absorption is very sharp, <60 meV over 3 decades. Overcoming the observed small grains by promoting mobility of Mo atoms would make MBE a powerful technique to achieve high quality 2D materials and heterostructures.
△ Less
Submitted 18 December, 2014;
originally announced December 2014.
-
Synthesized multiwall MoS2 nanotube and nanoribbon field-effect transistors
Authors:
Sara Fathipour,
Maja Remskar,
Ana Varlec,
Arvind Ajoy,
Rusen Yan,
Suresh Vishwanath,
Wan Sik Hwang,
Huili,
Xing,
Debdeep Jena,
Alan Seabaugh
Abstract:
We report on the fabrication and characterization of synthesized multiwall MoS2 nanotube (NT) and nanoribbon (NR) field-effect transistors (FETs). The MoS2 NTs and NRs were grown by chemical transport, using iodine as a transport agent. Raman spectroscopy confirms the material as unambiguously MoS2 in NT, NR, and flake forms. Transmission electron microscopy was used to observe cross sections of t…
▽ More
We report on the fabrication and characterization of synthesized multiwall MoS2 nanotube (NT) and nanoribbon (NR) field-effect transistors (FETs). The MoS2 NTs and NRs were grown by chemical transport, using iodine as a transport agent. Raman spectroscopy confirms the material as unambiguously MoS2 in NT, NR, and flake forms. Transmission electron microscopy was used to observe cross sections of the devices after electrical measurements and these were used in the interpretation of the electrical measurements allowing estimation of the current density. The NT and NR FETs demonstrate n-type behavior, with ON/OFF current ratios exceeding 10^3, and with current densities of 1.02 μA/μm, and 0.79 μA/μm at VDS = 0.3 V and VBG = 1 V, respectively. Photocurrent measurements conducted on a MoS2 NT FET, revealed short-circuit photocurrent of tens of nanoamps under an excitation optical power of 78 μW and 488 nm wavelength, which corresponds to a responsivity of 460 μA/W. A long channel transistor model was used to model the common-source characteristics of MoS2 NT and NR FETs and was shown to be consistent with the measured data.
△ Less
Submitted 21 November, 2014;
originally announced November 2014.
-
Generalized Opinion Dynamics from Local Optimization Rules
Authors:
Avhishek Chatterjee,
Anand D. Sarwate,
Sriram Vishwanath
Abstract:
We study generalizations of the Hegselmann-Krause (HK) model for opinion dynamics, incorporating features and parameters that are natural components of observed social systems. The first generalization is one where the strength of influence depends on the distance of the agents' opinions. Under this setup, we identify conditions under which the opinions converge in finite time, and provide a quali…
▽ More
We study generalizations of the Hegselmann-Krause (HK) model for opinion dynamics, incorporating features and parameters that are natural components of observed social systems. The first generalization is one where the strength of influence depends on the distance of the agents' opinions. Under this setup, we identify conditions under which the opinions converge in finite time, and provide a qualitative characterization of the equilibrium. We interpret the HK model opinion update rule as a quadratic cost-minimization rule. This enables a second generalization: a family of update rules which possess different equilibrium properties. Subsequently, we investigate models in which a external force can behave strategically to modulate/influence user updates. We consider cases where this external force can introduce additional agents and cases where they can modify the cost structures for other agents. We describe and analyze some strategies through which such modulation may be possible in an order-optimal manner. Our simulations demonstrate that generalized dynamics differ qualitatively and quantitatively from traditional HK dynamics.
△ Less
Submitted 25 September, 2014;
originally announced September 2014.
-
Cooperative Local Repair in Distributed Storage
Authors:
Ankit Singh Rawat,
Arya Mazumdar,
Sriram Vishwanath
Abstract:
Erasure-correcting codes, that support local repair of codeword symbols, have attracted substantial attention recently for their application in distributed storage systems. This paper investigates a generalization of the usual locally repairable codes. In particular, this paper studies a class of codes with the following property: any small set of codeword symbols can be reconstructed (repaired) f…
▽ More
Erasure-correcting codes, that support local repair of codeword symbols, have attracted substantial attention recently for their application in distributed storage systems. This paper investigates a generalization of the usual locally repairable codes. In particular, this paper studies a class of codes with the following property: any small set of codeword symbols can be reconstructed (repaired) from a small number of other symbols. This is referred to as cooperative local repair. The main contribution of this paper is bounds on the trade-off of the minimum distance and the dimension of such codes, as well as explicit constructions of families of codes that enable cooperative local repair. Some other results regarding cooperative local repair are also presented, including an analysis for the well-known Hadamard/Simplex codes.
△ Less
Submitted 26 January, 2016; v1 submitted 12 September, 2014;
originally announced September 2014.
-
Real-Time Rate-Distortion Optimized Streaming of Wireless Video
Authors:
Ahmed Abdelhadi,
Andreas Gerstlauer,
Sriram Vishwanath
Abstract:
Mobile cyberphysical systems have received considerable attention over the last decade, as communication, computing and control come together on a common platform. Understanding the complex interactions that govern the behavior of large complex cyberphysical systems is not an easy task. The goal of this paper is to address this challenge in the particular context of multimedia delivery over an aut…
▽ More
Mobile cyberphysical systems have received considerable attention over the last decade, as communication, computing and control come together on a common platform. Understanding the complex interactions that govern the behavior of large complex cyberphysical systems is not an easy task. The goal of this paper is to address this challenge in the particular context of multimedia delivery over an autonomous aerial vehicle (AAV) network. Bandwidth requirements and stringent delay constraints of real-time video streaming, paired with limitations on computational complexity and power consumptions imposed by the underlying implementation platform, make cross-layer and cross-domain co-design approaches a necessity. In this paper, we propose a novel, low-complexity rate-distortion optimized (RDO) algorithms specifically targeted at video streaming over mobile embedded networks. We test the performance of our RDO algorithms using a network of AAVs both in simulation and implementation.
△ Less
Submitted 7 June, 2014;
originally announced June 2014.
-
Haplotype Assembly: An Information Theoretic View
Authors:
Hongbo Si,
Haris Vikalo,
Sriram Vishwanath
Abstract:
This paper studies the haplotype assembly problem from an information theoretic perspective. A haplotype is a sequence of nucleotide bases on a chromosome, often conveniently represented by a binary string, that differ from the bases in the corresponding positions on the other chromosome in a homologous pair. Information about the order of bases in a genome is readily inferred using short reads pr…
▽ More
This paper studies the haplotype assembly problem from an information theoretic perspective. A haplotype is a sequence of nucleotide bases on a chromosome, often conveniently represented by a binary string, that differ from the bases in the corresponding positions on the other chromosome in a homologous pair. Information about the order of bases in a genome is readily inferred using short reads provided by high-throughput DNA sequencing technologies. In this paper, the recovery of the target pair of haplotype sequences using short reads is rephrased as a joint source-channel coding problem. Two messages, representing haplotypes and chromosome memberships of reads, are encoded and transmitted over a channel with erasures and errors, where the channel model reflects salient features of high-throughput sequencing. The focus of this paper is on the required number of reads for reliable haplotype reconstruction, and both the necessary and sufficient conditions are presented with order-wise optimal bounds.
△ Less
Submitted 11 May, 2014; v1 submitted 31 March, 2014;
originally announced April 2014.
-
Locality and Availability in Distributed Storage
Authors:
Ankit Singh Rawat,
Dimitris S. Papailiopoulos,
Alexandros G. Dimakis,
Sriram Vishwanath
Abstract:
This paper studies the problem of code symbol availability: a code symbol is said to have $(r, t)$-availability if it can be reconstructed from $t$ disjoint groups of other symbols, each of size at most $r$. For example, $3$-replication supports $(1, 2)$-availability as each symbol can be read from its $t= 2$ other (disjoint) replicas, i.e., $r=1$. However, the rate of replication must vanish like…
▽ More
This paper studies the problem of code symbol availability: a code symbol is said to have $(r, t)$-availability if it can be reconstructed from $t$ disjoint groups of other symbols, each of size at most $r$. For example, $3$-replication supports $(1, 2)$-availability as each symbol can be read from its $t= 2$ other (disjoint) replicas, i.e., $r=1$. However, the rate of replication must vanish like $\frac{1}{t+1}$ as the availability increases.
This paper shows that it is possible to construct codes that can support a scaling number of parallel reads while keeping the rate to be an arbitrarily high constant. It further shows that this is possible with the minimum distance arbitrarily close to the Singleton bound. This paper also presents a bound demonstrating a trade-off between minimum distance, availability and locality. Our codes match the aforementioned bound and their construction relies on combinatorial objects called resolvable designs.
From a practical standpoint, our codes seem useful for distributed storage applications involving hot data, i.e., the information which is frequently accessed by multiple processes in parallel.
△ Less
Submitted 9 February, 2014;
originally announced February 2014.
-
Linear Network Coding for Multiple Groupcast Sessions: An Interference Alignment Approach
Authors:
Abhik Kumar Das,
Siddhartha Banerjee,
Sriram Vishwanath
Abstract:
We consider the problem of linear network coding over communication networks, representable by directed acyclic graphs, with multiple groupcast sessions: the network comprises of multiple destination nodes, each desiring messages from multiple sources. We adopt an interference alignment perspective, providing new insights into designing practical network coding schemes as well as the impact of net…
▽ More
We consider the problem of linear network coding over communication networks, representable by directed acyclic graphs, with multiple groupcast sessions: the network comprises of multiple destination nodes, each desiring messages from multiple sources. We adopt an interference alignment perspective, providing new insights into designing practical network coding schemes as well as the impact of network topology on the complexity of the alignment scheme. In particular, we show that under certain (polynomial-time checkable) constraints on networks with $K$ sources, it is possible to achieve a rate of $1/(L+d+1)$ per source using linear network coding coupled with interference alignment, where each destination receives messages from $L$ sources ($L < K$), and $d$ is a parameter, solely dependent on the network topology, that satisfies $0 \leq d < K-L$.
△ Less
Submitted 4 February, 2014;
originally announced February 2014.
-
Hidden Attacks on Power Grid: Optimal Attack Strategies and Mitigation
Authors:
Deepjyoti Deka,
Ross Baldick,
Sriram Vishwanath
Abstract:
Real time operation of the power grid and synchronism of its different elements require accurate estimation of its state variables. Errors in state estimation will lead to sub-optimal Optimal Power Flow (OPF) solutions and subsequent increase in the price of electricity in the market or, potentially overload and create line outages. This paper studies hidden data attacks on power systems by an adv…
▽ More
Real time operation of the power grid and synchronism of its different elements require accurate estimation of its state variables. Errors in state estimation will lead to sub-optimal Optimal Power Flow (OPF) solutions and subsequent increase in the price of electricity in the market or, potentially overload and create line outages. This paper studies hidden data attacks on power systems by an adversary trying to manipulate state estimators. The adversary gains control of a few meters, and is able to introduce spurious measurements in them. The paper presents a polynomial time algorithm using min-cut calculations to determine the minimum number of measurements an adversary needs to manipulate in order to perform a hidden attack. Greedy techniques are presented to aid the system operator in identifying critical measurements for protection to prevent such hidden data attacks. Secure PMU placement against data attacks is also discussed and an algorithm for placing PMUs for this purpose is developed. The performances of the proposed algorithms are shown through simulations on IEEE test cases.
△ Less
Submitted 14 January, 2014;
originally announced January 2014.
-
Error-Correcting Regenerating and Locally Repairable Codes via Rank-Metric Codes
Authors:
Natalia Silberstein,
Ankit Singh Rawat,
Sriram Vishwanath
Abstract:
This paper presents and analyzes a novel concatenated coding scheme for enabling error resilience in two distributed storage settings: one being storage using existing regenerating codes and the second being storage using locally repairable codes. The concatenated coding scheme brings together a maximum rank distance (MRD) code as an outer code and either a globally regenerating or a locally repai…
▽ More
This paper presents and analyzes a novel concatenated coding scheme for enabling error resilience in two distributed storage settings: one being storage using existing regenerating codes and the second being storage using locally repairable codes. The concatenated coding scheme brings together a maximum rank distance (MRD) code as an outer code and either a globally regenerating or a locally repairable code as an inner code. Also, error resilience for combination of locally repairable codes with regenerating codes is considered. This concatenated coding system is designed to handle two different types of adversarial errors: the first type includes an adversary that can replace the content of an affected node only once; while the second type studies an adversary that is capable of polluting data an unbounded number of times. The paper establishes an upper bound on the resilience capacity for a locally repairable code and proves that this concatenated coding coding scheme attains the upper bound on resilience capacity for the first type of adversary. Further, the paper presents mechanisms that combine the presented concatenated coding scheme with subspace signatures to achieve error resilience for the second type of errors.
△ Less
Submitted 11 December, 2013;
originally announced December 2013.
-
Polar Coding for Fading Channels: Binary and Exponential Channel Cases
Authors:
Hongbo Si,
O. Ozan Koyluoglu,
Sriram Vishwanath
Abstract:
This work presents a polar coding scheme for fading channels, focusing primarily on fading binary symmetric and additive exponential noise channels. For fading binary symmetric channels, a hierarchical coding scheme is presented, utilizing polar coding both over channel uses and over fading blocks. The receiver uses its channel state information (CSI) to distinguish states, thus constructing an ov…
▽ More
This work presents a polar coding scheme for fading channels, focusing primarily on fading binary symmetric and additive exponential noise channels. For fading binary symmetric channels, a hierarchical coding scheme is presented, utilizing polar coding both over channel uses and over fading blocks. The receiver uses its channel state information (CSI) to distinguish states, thus constructing an overlay erasure channel over the underlying fading channels. By using this scheme, the capacity of a fading binary symmetric channel is achieved without CSI at the transmitter. Noting that a fading AWGN channel with BPSK modulation and demodulation corresponds to a fading binary symmetric channel, this result covers a fairly large set of practically relevant channel settings.
For fading additive exponential noise channels, expansion coding is used in conjunction to polar codes. Expansion coding transforms the continuous-valued channel to multiple (independent) discrete-valued ones. For each level after expansion, the approach described previously for fading binary symmetric channels is used. Both theoretical analysis and numerical results are presented, showing that the proposed coding scheme approaches the capacity in the high SNR regime. Overall, utilizing polar codes in this (hierarchical) fashion enables coding without CSI at the transmitter, while approaching the capacity with low complexity.
△ Less
Submitted 15 August, 2014; v1 submitted 19 November, 2013;
originally announced November 2013.
-
Downlink Multi-Antenna Heterogeneous Cellular Network with Load Balancing
Authors:
Abhishek K. Gupta,
Harpreet S. Dhillon,
Sriram Vishwanath,
Jeffrey G. Andrews
Abstract:
We model and analyze heterogeneous cellular networks with multiple antenna BSs (multi-antenna HetNets) with K classes or tiers of base stations (BSs), which may differ in terms of transmit power, deployment density, number of transmit antennas, number of users served, transmission scheme, and path loss exponent. We show that the cell selection rules in multi-antenna HetNets may differ significantl…
▽ More
We model and analyze heterogeneous cellular networks with multiple antenna BSs (multi-antenna HetNets) with K classes or tiers of base stations (BSs), which may differ in terms of transmit power, deployment density, number of transmit antennas, number of users served, transmission scheme, and path loss exponent. We show that the cell selection rules in multi-antenna HetNets may differ significantly from the single-antenna HetNets due to the possible differences in multi-antenna transmission schemes across tiers. While it is challenging to derive exact cell selection rules even for maximizing signal-to-interferenceplus-noise-ratio (SINR) at the receiver, we show that adding an appropriately chosen tier-dependent cell selection bias in the received power yields a close approximation. Assuming arbitrary selection bias for each tier, simple expressions for downlink coverage and rate are derived. For coverage maximization, the required selection bias for each tier is given in closed form. Due to this connection with biasing, multi-antenna HetNets may balance load more naturally across tiers in certain regimes compared to single-antenna HetNets, where a large cell selection bias is often needed to offload traffic to small cells.
△ Less
Submitted 2 November, 2014; v1 submitted 24 October, 2013;
originally announced October 2013.
-
Lossy Compression of Exponential and Laplacian Sources using Expansion Coding
Authors:
Hongbo Si,
O. Ozan Koyluoglu,
Sriram Vishwanath
Abstract:
A general method of source coding over expansion is proposed in this paper, which enables one to reduce the problem of compressing an analog (continuous-valued source) to a set of much simpler problems, compressing discrete sources. Specifically, the focus is on lossy compression of exponential and Laplacian sources, which is subsequently expanded using a finite alphabet prior to being quantized.…
▽ More
A general method of source coding over expansion is proposed in this paper, which enables one to reduce the problem of compressing an analog (continuous-valued source) to a set of much simpler problems, compressing discrete sources. Specifically, the focus is on lossy compression of exponential and Laplacian sources, which is subsequently expanded using a finite alphabet prior to being quantized. Due to decomposability property of such sources, the resulting random variables post expansion are independent and discrete. Thus, each of the expanded levels corresponds to an independent discrete source coding problem, and the original problem is reduced to coding over these parallel sources with a total distortion constraint. Any feasible solution to the optimization problem is an achievable rate distortion pair of the original continuous-valued source compression problem. Although finding the solution to this optimization problem at every distortion is hard, we show that our expansion coding scheme presents a good solution in the low distrotion regime. Further, by adopting low-complexity codes designed for discrete source coding, the total coding complexity can be tractable in practice.
△ Less
Submitted 10 August, 2013;
originally announced August 2013.
-
Precoding-Based Network Alignment For Three Unicast Sessions
Authors:
Chun Meng,
Abhik Kumar Das,
Abinesh Ramakrishnan,
Syed Ali Jafar,
Athina Markopoulou,
Sriram Vishwanath
Abstract:
We consider the problem of network coding across three unicast sessions over a directed acyclic graph, where each sender and the receiver is connected to the network via a single edge of unit capacity. We consider a network model in which the middle of the network only performs random linear network coding, and restrict our approaches to precoding-based linear schemes, where the senders use precod…
▽ More
We consider the problem of network coding across three unicast sessions over a directed acyclic graph, where each sender and the receiver is connected to the network via a single edge of unit capacity. We consider a network model in which the middle of the network only performs random linear network coding, and restrict our approaches to precoding-based linear schemes, where the senders use precoding matrices to encode source symbols. We adapt a precoding-based interference alignment technique, originally developed for the wireless interference channel, to construct a precoding-based linear scheme, which we refer to as as a {\em precoding-based network alignment scheme (PBNA)}. A primary difference between this setting and the wireless interference channel is that the network topology can introduce dependencies between elements of the transfer matrix, which we refer to as coupling relations, and can potentially affect the achievable rate of PBNA. We identify all possible such coupling relations, and interpret these coupling relations in terms of network topology and present polynomial-time algorithms to check the presence of these coupling relations. Finally, we show that, depending on the coupling relations present in the network, the optimal symmetric rate achieved by precoding-based linear scheme can take only three possible values, all of which can be achieved by PBNA.
△ Less
Submitted 21 May, 2014; v1 submitted 3 May, 2013;
originally announced May 2013.
-
Polar Coding for Fading Channels
Authors:
Hongbo Si,
O. Ozan Koyluoglu,
Sriram Vishwanath
Abstract:
A polar coding scheme for fading channels is proposed in this paper. More specifically, the focus is Gaussian fading channel with a BPSK modulation technique, where the equivalent channel could be modeled as a binary symmetric channel with varying cross-over probabilities. To deal with variable channel states, a coding scheme of hierarchically utilizing polar codes is proposed. In particular, by o…
▽ More
A polar coding scheme for fading channels is proposed in this paper. More specifically, the focus is Gaussian fading channel with a BPSK modulation technique, where the equivalent channel could be modeled as a binary symmetric channel with varying cross-over probabilities. To deal with variable channel states, a coding scheme of hierarchically utilizing polar codes is proposed. In particular, by observing the polarization of different binary symmetric channels over different fading blocks, each channel use corresponding to a different polarization is modeled as a binary erasure channel such that polar codes could be adopted to encode over blocks. It is shown that the proposed coding scheme, without instantaneous channel state information at the transmitter, achieves the capacity of the corresponding fading binary symmetric channel, which is constructed from the underlying fading AWGN channel through the modulation scheme.
△ Less
Submitted 13 April, 2013;
originally announced April 2013.
-
On Finite Alphabet Compressive Sensing
Authors:
Abhik Kumar Das,
Sriram Vishwanath
Abstract:
This paper considers the problem of compressive sensing over a finite alphabet, where the finite alphabet may be inherent to the nature of the data or a result of quantization. There are multiple examples of finite alphabet based static as well as time-series data with inherent sparse structure; and quantizing real values is an essential step while handling real data in practice. We show that ther…
▽ More
This paper considers the problem of compressive sensing over a finite alphabet, where the finite alphabet may be inherent to the nature of the data or a result of quantization. There are multiple examples of finite alphabet based static as well as time-series data with inherent sparse structure; and quantizing real values is an essential step while handling real data in practice. We show that there are significant benefits to analyzing the problem while incorporating its finite alphabet nature, versus ignoring it and employing a conventional real alphabet based toolbox. Specifically, when the alphabet is finite, our techniques (a) have a lower sample complexity compared to real-valued compressive sensing for sparsity levels below a threshold; (b) facilitate constructive designs of sensing matrices based on coding-theoretic techniques; (c) enable one to solve the exact $\ell_0$-minimization problem in polynomial time rather than a approach of convex relaxation followed by sufficient conditions for when the relaxation matches the original problem; and finally, (d) allow for smaller amount of data storage (in bits).
△ Less
Submitted 16 March, 2013;
originally announced March 2013.
-
Explicit MBR All-Symbol Locality Codes
Authors:
Govinda M. Kamath,
Natalia Silberstein,
N. Prakash,
Ankit S. Rawat,
V. Lalitha,
O. Ozan Koyluoglu,
P. Vijay Kumar,
Sriram Vishwanath
Abstract:
Node failures are inevitable in distributed storage systems (DSS). To enable efficient repair when faced with such failures, two main techniques are known: Regenerating codes, i.e., codes that minimize the total repair bandwidth; and codes with locality, which minimize the number of nodes participating in the repair process. This paper focuses on regenerating codes with locality, using pre-coding…
▽ More
Node failures are inevitable in distributed storage systems (DSS). To enable efficient repair when faced with such failures, two main techniques are known: Regenerating codes, i.e., codes that minimize the total repair bandwidth; and codes with locality, which minimize the number of nodes participating in the repair process. This paper focuses on regenerating codes with locality, using pre-coding based on Gabidulin codes, and presents constructions that utilize minimum bandwidth regenerating (MBR) local codes. The constructions achieve maximum resilience (i.e., optimal minimum distance) and have maximum capacity (i.e., maximum rate). Finally, the same pre-coding mechanism can be combined with a subclass of fractional-repetition codes to enable maximum resilience and repair-by-transfer simultaneously.
△ Less
Submitted 27 May, 2013; v1 submitted 4 February, 2013;
originally announced February 2013.
-
Optimal Locally Repairable Codes via Rank-Metric Codes
Authors:
Natalia Silberstein,
Ankit Singh Rawat,
O. Ozan Koyluoglu,
Sriram Vishwanath
Abstract:
This paper presents a new explicit construction for locally repairable codes (LRCs) for distributed storage systems which possess all-symbols locality and maximal possible minimum distance, or equivalently, can tolerate the maximal number of node failures. This construction, based on maximum rank distance (MRD) Gabidulin codes, provides new optimal vector and scalar LRCs. In addition, the paper al…
▽ More
This paper presents a new explicit construction for locally repairable codes (LRCs) for distributed storage systems which possess all-symbols locality and maximal possible minimum distance, or equivalently, can tolerate the maximal number of node failures. This construction, based on maximum rank distance (MRD) Gabidulin codes, provides new optimal vector and scalar LRCs. In addition, the paper also discusses mechanisms by which codes obtained using this construction can be used to construct LRCs with efficient repair of failed nodes by combination of LRC with regenerating codes.
△ Less
Submitted 27 January, 2013;
originally announced January 2013.
-
Optimal Locally Repairable and Secure Codes for Distributed Storage Systems
Authors:
Ankit Singh Rawat,
O. Ozan Koyluoglu,
Natalia Silberstein,
Sriram Vishwanath
Abstract:
This paper aims to go beyond resilience into the study of security and local-repairability for distributed storage systems (DSS). Security and local-repairability are both important as features of an efficient storage system, and this paper aims to understand the trade-offs between resilience, security, and local-repairability in these systems. In particular, this paper first investigates security…
▽ More
This paper aims to go beyond resilience into the study of security and local-repairability for distributed storage systems (DSS). Security and local-repairability are both important as features of an efficient storage system, and this paper aims to understand the trade-offs between resilience, security, and local-repairability in these systems. In particular, this paper first investigates security in the presence of colluding eavesdroppers, where eavesdroppers are assumed to work together in decoding stored information. Second, the paper focuses on coding schemes that enable optimal local repairs. It further brings these two concepts together, to develop locally repairable coding schemes for DSS that are secure against eavesdroppers.
The main results of this paper include: a. An improved bound on the secrecy capacity for minimum storage regenerating codes, b. secure coding schemes that achieve the bound for some special cases, c. a new bound on minimum distance for locally repairable codes, d. code construction for locally repairable codes that attain the minimum distance bound, and e. repair-bandwidth-efficient locally repairable codes with and without security constraints.
△ Less
Submitted 6 August, 2013; v1 submitted 25 October, 2012;
originally announced October 2012.
-
Secure Cooperative Regenerating Codes for Distributed Storage Systems
Authors:
O. Ozan Koyluoglu,
Ankit Singh Rawat,
Sriram Vishwanath
Abstract:
Regenerating codes enable trading off repair bandwidth for storage in distributed storage systems (DSS). Due to their distributed nature, these systems are intrinsically susceptible to attacks, and they may also be subject to multiple simultaneous node failures. Cooperative regenerating codes allow bandwidth efficient repair of multiple simultaneous node failures. This paper analyzes storage syste…
▽ More
Regenerating codes enable trading off repair bandwidth for storage in distributed storage systems (DSS). Due to their distributed nature, these systems are intrinsically susceptible to attacks, and they may also be subject to multiple simultaneous node failures. Cooperative regenerating codes allow bandwidth efficient repair of multiple simultaneous node failures. This paper analyzes storage systems that employ cooperative regenerating codes that are robust to (passive) eavesdroppers. The analysis is divided into two parts, studying both minimum bandwidth and minimum storage cooperative regenerating scenarios. First, the secrecy capacity for minimum bandwidth cooperative regenerating codes is characterized. Second, for minimum storage cooperative regenerating codes, a secure file size upper bound and achievability results are provided. These results establish the secrecy capacity for the minimum storage scenario for certain special cases. In all scenarios, the achievability results correspond to exact repair, and secure file size upper bounds are obtained using min-cut analyses over a suitable secrecy graph representation of DSS. The main achievability argument is based on an appropriate pre-coding of the data to eliminate the information leakage to the eavesdropper.
△ Less
Submitted 8 July, 2014; v1 submitted 12 October, 2012;
originally announced October 2012.
-
On Locality in Distributed Storage Systems
Authors:
Ankit Singh Rawat,
Sriram Vishwanath
Abstract:
This paper studies the design of codes for distributed storage systems (DSS) that enable local repair in the event of node failure. This paper presents locally repairable codes based on low degree multivariate polynomials. Its code construction mechanism extends work on Noisy Interpolating Set by Dvir et al. \cite{dvir2011}. The paper presents two classes of codes that allow node repair to be perf…
▽ More
This paper studies the design of codes for distributed storage systems (DSS) that enable local repair in the event of node failure. This paper presents locally repairable codes based on low degree multivariate polynomials. Its code construction mechanism extends work on Noisy Interpolating Set by Dvir et al. \cite{dvir2011}. The paper presents two classes of codes that allow node repair to be performed by contacting 2 and 3 surviving nodes respectively. It further shows that both classes are good in terms of their rate and minimum distance, and allow their rate to be bartered for greater flexibility in the repair process.
△ Less
Submitted 26 April, 2012;
originally announced April 2012.
-
Analytical Models for Power Networks: The case of the Western US and ERCOT grids
Authors:
Deepjyoti Deka,
Sriram Vishwanath
Abstract:
The topological structure of the power grid plays a key role in the reliable delivery of electricity and price settlement in the electricity market. Incorporation of new energy sources and loads into the grid over time has led to its structural and geographical expansion and can affect its stable operation. This paper presents an intuitive analytical model for the temporal evolution of large grids…
▽ More
The topological structure of the power grid plays a key role in the reliable delivery of electricity and price settlement in the electricity market. Incorporation of new energy sources and loads into the grid over time has led to its structural and geographical expansion and can affect its stable operation. This paper presents an intuitive analytical model for the temporal evolution of large grids and uses it to understand common structural features observed in grids across America. In particular, key graph parameters like degree distribution, graph diameter, betweenness centralities, eigen-spread and clustering coefficients, as well as graph processes like infection propagation are used to quantify the model's benefits through comparison with the Western US and ERCOT power grids. The most significant contribution of the developed model is its analytical tractability, that provides a closed form expression for the nodal degree distribution observed in large grids. The discussed model can be used to generate realistic test cases to analyze topological effects on grid functioning and new grid technologies.
△ Less
Submitted 26 February, 2015; v1 submitted 1 April, 2012;
originally announced April 2012.