Zum Hauptinhalt springen

Showing 1–50 of 54 results for author: Choong, P

Searching in archive cs. Search in all archives.
.
  1. arXiv:2404.06669  [pdf, other

    eess.SY cs.DS

    On Bounds for Greedy Schemes in String Optimization based on Greedy Curvatures

    Authors: Bowen Li, Brandon Van Over, Edwin K. P. Chong, Ali Pezeshki

    Abstract: We consider the celebrated bound introduced by Conforti and Cornuéjols (1984) for greedy schemes in submodular optimization. The bound assumes a submodular function defined on a collection of sets forming a matroid and is based on greedy curvature. We show that the bound holds for a very general class of string problems that includes maximizing submodular functions over set matroids as a special c… ▽ More

    Submitted 9 April, 2024; originally announced April 2024.

  2. arXiv:2404.01353  [pdf, other

    cs.LG cs.AI cs.CL

    Efficiently Distilling LLMs for Edge Applications

    Authors: Achintya Kundu, Fabian Lim, Aaron Chew, Laura Wynter, Penny Chong, Rhui Dih Lee

    Abstract: Supernet training of LLMs is of great interest in industrial applications as it confers the ability to produce a palette of smaller models at constant cost, regardless of the number of models (of different size / latency) produced. We propose a new method called Multistage Low-rank Fine-tuning of Super-transformers (MLFS) for parameter-efficient supernet training. We show that it is possible to ob… ▽ More

    Submitted 1 April, 2024; originally announced April 2024.

    Comments: This paper has been accepted for publication in NAACL 2024 (Industry Track)

  3. arXiv:2308.15758  [pdf, other

    cs.DS cs.DM eess.SY

    An Improved Greedy Curvature Bound in Finite-Horizon String Optimization with Application to a Sensor Coverage Problem

    Authors: Brandon Van Over, Bowen Li, Edwin K. P. Chong, Ali Pezeshki

    Abstract: We study the optimization problem of choosing strings of finite length to maximize string submodular functions on string matroids, which is a broader class of problems than maximizing set submodular functions on set matroids. We provide a lower bound for the performance of the greedy algorithm in our problem, and then prove that our bound is superior to the greedy curvature bound of Conforti and C… ▽ More

    Submitted 7 September, 2023; v1 submitted 30 August, 2023; originally announced August 2023.

  4. arXiv:2207.06746  [pdf

    eess.IV cs.CV

    Single-Pixel Image Reconstruction Based on Block Compressive Sensing and Deep Learning

    Authors: Stephen L. H. Lau, Edwin K. P. Chong

    Abstract: Single-pixel imaging (SPI) is a novel imaging technique whose working principle is based on the compressive sensing (CS) theory. In SPI, data is obtained through a series of compressive measurements and the corresponding image is reconstructed. Typically, the reconstruction algorithm such as basis pursuit relies on the sparsity assumption in images. However, recent advances in deep learning have f… ▽ More

    Submitted 14 July, 2022; originally announced July 2022.

  5. arXiv:2201.02275  [pdf, ps, other

    eess.SP cs.IT eess.SY stat.CO

    Well-Conditioned Linear Minimum Mean Square Error Estimation

    Authors: Edwin K. P. Chong

    Abstract: Linear minimum mean square error (LMMSE) estimation is often ill-conditioned, suggesting that unconstrained minimization of the mean square error is an inadequate approach to filter design. To address this, we first develop a unifying framework for studying constrained LMMSE estimation problems. Using this framework, we explore an important structural property of constrained LMMSE filters involvin… ▽ More

    Submitted 21 March, 2022; v1 submitted 6 January, 2022; originally announced January 2022.

  6. arXiv:2110.12357  [pdf, other

    cs.LG cs.CR

    Towards A Conceptually Simple Defensive Approach for Few-shot classifiers Against Adversarial Support Samples

    Authors: Yi Xiang Marcus Tan, Penny Chong, Jiamei Sun, Ngai-man Cheung, Yuval Elovici, Alexander Binder

    Abstract: Few-shot classifiers have been shown to exhibit promising results in use cases where user-provided labels are scarce. These models are able to learn to predict novel classes simply by training on a non-overlapping set of classes. This can be largely attributed to the differences in their mechanisms as compared to conventional deep networks. However, this also offers new opportunities for novel att… ▽ More

    Submitted 24 October, 2021; originally announced October 2021.

    Comments: arXiv admin note: text overlap with arXiv:2012.06330

  7. arXiv:2109.02907  [pdf

    cs.NI

    A P2P Network Topology for Optimizing Partition Tolerance to Reach the CAP Guarantee Bound in Consortium Blockchains

    Authors: Han Wang, Hui Li, Zixian Wang, Baofu Han, Minglong Zhang, Peter Han Joo Chong, Xiaoli Chu, Yang Liu, Soung-Yue Liew, Lunchakorn Wuttisittikulkij

    Abstract: Decentralized cryptocurrency systems, known as blockchains, have shown promise as infrastructure for mutually distrustful parties to agree on transactions safely. However, Bitcoin-derived blockchains and their variants suffer from the limitations of the CAP Trilemma, which is difficult to be solved through optimizing consensus protocols. Moreover, the P2P network of blockchains have problems in ef… ▽ More

    Submitted 7 September, 2021; originally announced September 2021.

    Comments: 13 pages, 11 figures

  8. arXiv:2012.12123  [pdf

    cs.NI cs.LG

    Machine Learning Algorithm for NLOS Millimeter Wave in 5G V2X Communication

    Authors: Deepika Mohan, G. G. Md. Nawaz Ali, Peter Han Joo Chong

    Abstract: The 5G vehicle-to-everything (V2X) communication for autonomous and semi-autonomous driving utilizes the wireless technology for communication and the Millimeter Wave bands are widely implemented in this kind of vehicular network application. The main purpose of this paper is to broadcast the messages from the mmWave Base Station to vehicles at LOS (Line-of-sight) and NLOS (Non-LOS). Relay using M… ▽ More

    Submitted 16 December, 2020; originally announced December 2020.

    Comments: 14 pages, 9 figures, conference 7th International conference on Computer Networks and Communications (CCNET 2020), AIRCC Publishing Corporation

    Report number: Volume 10, number 17 MSC Class: 68M11 ACM Class: I.6; I.2.2; J.7

  9. arXiv:2012.06330  [pdf, other

    cs.CR cs.LG

    Detection of Adversarial Supports in Few-shot Classifiers Using Self-Similarity and Filtering

    Authors: Yi Xiang Marcus Tan, Penny Chong, Jiamei Sun, Ngai-Man Cheung, Yuval Elovici, Alexander Binder

    Abstract: Few-shot classifiers excel under limited training samples, making them useful in applications with sparsely user-provided labels. Their unique relative prediction setup offers opportunities for novel attacks, such as targeting support sets required to categorise unseen test samples, which are not available in other machine learning setups. In this work, we propose a detection strategy to identify… ▽ More

    Submitted 28 June, 2021; v1 submitted 9 December, 2020; originally announced December 2020.

    Comments: Accepted in the International Workshop on Safety and Security of Deep Learning 2021

  10. Toward Scalable and Unified Example-based Explanation and Outlier Detection

    Authors: Penny Chong, Ngai-Man Cheung, Yuval Elovici, Alexander Binder

    Abstract: When neural networks are employed for high-stakes decision-making, it is desirable that they provide explanations for their prediction in order for us to understand the features that have contributed to the decision. At the same time, it is important to flag potential outliers for in-depth verification by domain experts. In this work we propose to unify two differing aspects of explainability with… ▽ More

    Submitted 8 May, 2022; v1 submitted 11 November, 2020; originally announced November 2020.

    Comments: Accepted in IEEE Transactions on Image Processing

  11. arXiv:2007.00054  [pdf, other

    cs.IR cs.SI

    Twitter and Census Data Analytics to Explore Socioeconomic Factors for Post-COVID-19 Reopening Sentiment

    Authors: Md. Mokhlesur Rahman, G. G. Md. Nawaz Ali, Xue Jun Li, Kamal Chandra Paul, Peter H. J. Chong

    Abstract: Investigating and classifying sentiments of social media users towards an item, situation, and system are very popular among the researchers. However, they rarely discuss the underlying socioeconomic factor associations for such sentiments. This study attempts to explore the factors associated with positive and negative sentiments of the people about reopening the economy, in the United States (US… ▽ More

    Submitted 30 June, 2020; originally announced July 2020.

  12. arXiv:2003.01228  [pdf, other

    cs.RO

    The Use of Implicit Human Motor Behaviour in the Online Personalisation of Prosthetic Interfaces

    Authors: Ricardo Garcia-Rosas, Tianshi Yu, Denny Oetomo, Chris Manzie, Ying Tan, Peter Choong

    Abstract: In previous work, the authors proposed a data-driven optimisation algorithm for the personalisation of human-prosthetic interfaces, demonstrating the possibility of adapting prosthesis behaviour to its user while the user performs tasks with it. This method requires that the human and the prosthesis personalisation algorithm have same pre-defined objective function. This was previously ensured by… ▽ More

    Submitted 2 March, 2020; originally announced March 2020.

  13. Task-space Synergies for Reaching using Upper-limb Prostheses

    Authors: Ricardo Garcia-Rosas, Denny Oetomo, Chris Manzie, Ying Tan, Peter Choong

    Abstract: Synergistic prostheses enable the coordinated movement of the human-prosthetic arm, as required by activities of daily living. This is achieved by coupling the motion of the prosthesis to the human command, such as the residual limb movement in motion-based interfaces. Previous studies demonstrated that developing human-prosthetic synergies in joint-space must consider individual motor behaviour a… ▽ More

    Submitted 3 November, 2020; v1 submitted 19 February, 2020; originally announced February 2020.

    Journal ref: IEEE Transactions on Neural Systems and Rehabilitation Engineering (2020)

  14. Simple and Effective Prevention of Mode Collapse in Deep One-Class Classification

    Authors: Penny Chong, Lukas Ruff, Marius Kloft, Alexander Binder

    Abstract: Anomaly detection algorithms find extensive use in various fields. This area of research has recently made great advances thanks to deep learning. A recent method, the deep Support Vector Data Description (deep SVDD), which is inspired by the classic kernel-based Support Vector Data Description (SVDD), is capable of simultaneously learning a feature representation of the data and a data-enclosing… ▽ More

    Submitted 19 January, 2021; v1 submitted 23 January, 2020; originally announced January 2020.

    Comments: Accepted in 2020 International Joint Conference on Neural Networks (IJCNN)

  15. Automated Pavement Crack Segmentation Using U-Net-based Convolutional Neural Network

    Authors: Stephen L. H. Lau, Edwin K. P. Chong, Xu Yang, Xin Wang

    Abstract: Automated pavement crack image segmentation is challenging because of inherent irregular patterns, lighting conditions, and noise in images. Conventional approaches require a substantial amount of feature engineering to differentiate crack regions from non-affected regions. In this paper, we propose a deep learning technique based on a convolutional neural network to perform segmentation tasks on… ▽ More

    Submitted 30 June, 2020; v1 submitted 7 January, 2020; originally announced January 2020.

    Comments: Accepted for publication in IEEE Access

  16. arXiv:1910.00699  [pdf, other

    cs.AI eess.SY math.OC stat.AP stat.CO

    Decision Automation for Electric Power Network Recovery

    Authors: Yugandhar Sarkale, Saeed Nozhati, Edwin K. P. Chong, Bruce R. Ellingwood

    Abstract: Critical infrastructure systems such as electric power networks, water networks, and transportation systems play a major role in the welfare of any community. In the aftermath of disasters, their recovery is of paramount importance; orderly and efficient recovery involves the assignment of limited resources (a combination of human repair workers and machines) to repair damaged infrastructure compo… ▽ More

    Submitted 18 October, 2019; v1 submitted 1 October, 2019; originally announced October 2019.

    Comments: Submitted to IEEE Transactions on Automation Science and Engineering (13 pages and 6 figures)

  17. arXiv:1903.09816  [pdf, other

    cs.RO

    Control Barrier Functions for Mechanical Systems: Theory and Application to Robotic Grasping

    Authors: Wenceslao Shaw Cortez, Denny Oetomo, Chris Manzie, Peter Choong

    Abstract: Control barrier functions have been demonstrated to be a useful method of ensuring constraint satisfaction for a wide class of controllers, however existing results are mostly restricted to continuous time systems of relative degree one. Mechanical systems, including robots, are typically second-order systems in which the control occurs at the force/torque level. These systems have velocity and po… ▽ More

    Submitted 23 March, 2019; originally announced March 2019.

  18. Personalized On-line Adaptation of Kinematic Synergies for Human-Prosthesis Interfaces

    Authors: Ricardo Garcia-Rosas, Ying Tan, Denny Oetomo, Chris Manzie, Peter Choong

    Abstract: Synergies have been adopted in prosthetic limb applications to reduce complexity of design, but typically involve a single synergy setting for a population and ignore individual preference or adaptation capacity. However, personalization of the synergy setting is necessary for the effective operation of the prosthetic device. Two major challenges hinder the personalization of synergies in human-pr… ▽ More

    Submitted 19 February, 2020; v1 submitted 19 February, 2019; originally announced February 2019.

    Journal ref: IEEE Trans. Cybern. (2019) 1-15

  19. An approximate dynamic programming approach to food security of communities following hazards

    Authors: Saeed Nozhati, Yugandhar Sarkale, Bruce R. Ellingwood, Edwin K. P. Chong, Hussam Mahmoud

    Abstract: Food security can be threatened by extreme natural hazard events for households of all social classes within a community. To address food security issues following a natural disaster, the recovery of several elements of the built environment within a community, including its building portfolio, must be considered. Building portfolio restoration is one of the most challenging elements of recovery o… ▽ More

    Submitted 15 December, 2018; originally announced December 2018.

    Comments: As opposed to the preemptive scheduling problem, which was addressed in multiple works by us, we deal with a non-preemptive stochastic scheduling problem in this work. Submitted to 13th International Conference on Applications of Statistics and Probability in Civil Engineering, ICASP13 Seoul, South Korea, May 26-30, 2019

    Journal ref: 13th Int. Conf. Appl. Statistics and Prob. Civ. Eng. (ICASP13), Seoul, South Korea, May 26-30, 2019

  20. arXiv:1811.10757  [pdf, other

    cs.RO

    Grasp Constraint Satisfaction for Object Manipulation using Robotic Hands

    Authors: Wenceslao Shaw Cortez, Denny Oetomo, Chris Manzie, Peter Choong

    Abstract: For successful object manipulation with robotic hands, it is important to ensure that the object remains in the grasp at all times. In addition to grasp constraints associated with slipping and singular hand configurations, excessive rolling is an important grasp concern where the contact points roll off of the fingertip surface. Related literature focus only on a subset of grasp constraints, or a… ▽ More

    Submitted 26 November, 2018; originally announced November 2018.

    Comments: To appear in CDC 2018

  21. arXiv:1806.08492  [pdf

    cs.CY

    An Approximate Dynamic Programming Approach to Community Recovery Management (Extended Abstract)

    Authors: Saeed Nozhati, Bruce R. Ellingwood, Hussam Mahmoud, Yugandhar Sarkale, Edwin K. P. Chong, Nathanael Rosenheim

    Abstract: The functioning of interdependent civil infrastructure systems in the aftermath of a disruptive event is critical to the performance and vitality of any modern urban community. Post-event stressors and chaotic circumstances, time limitations, and complexities in the community recovery process highlight the necessity for a comprehensive decision-making framework at the community-level for post-even… ▽ More

    Submitted 22 June, 2018; originally announced June 2018.

    Comments: The material in this work provides a gist of the material in the journal version of our work (arXiv:1803.01451) that has in-detailed description of the methods employed in this article in addition to a more comprehensive treatment. This work will serve as a suitable introduction to the interested reader

    Journal ref: Presented at Engineering Mechanics Institute Conference 2018 (EMI 2018 -- MS36 Robustness of Infrastructures), Cambridge -- Boston, MA, May 29--June 1, 2018

  22. arXiv:1804.00250  [pdf

    cs.CE eess.SY

    A Modified Approximate Dynamic Programming Algorithm for Community-level Food Security Following Disasters

    Authors: Saeed Nozhati, Yugandhar Sarkale, Bruce R. Ellingwood, Edwin K. P. Chong, Hussam Mahmoud

    Abstract: In the aftermath of an extreme natural hazard, community residents must have access to functioning food retailers to maintain food security. Food security is dependent on supporting critical infrastructure systems, including electricity, potable water, and transportation. An understanding of the response of such interdependent networks and the process of post-disaster recovery is the cornerstone o… ▽ More

    Submitted 15 May, 2018; v1 submitted 31 March, 2018; originally announced April 2018.

    Comments: The material presented here might have some overlap with arXiv:1803.04144 and arXiv:1803.01451. Nonetheless, this material contains substantial additions

    Journal ref: Proceedings of the 9th International Congress on Environmental Modelling and Software (iEMSs 2018), Fort Collins, CO, June 24--28, 2018

  23. arXiv:1803.04144  [pdf, other

    math.OC cs.CE eess.SY

    Solving Markov decision processes for network-level post-hazard recovery via simulation optimization and rollout

    Authors: Yugandhar Sarkale, Saeed Nozhati, Edwin K. P. Chong, Bruce Ellingwood, Hussam Mahmoud

    Abstract: Computation of optimal recovery decisions for community resilience assurance post-hazard is a combinatorial decision-making problem under uncertainty. It involves solving a large-scale optimization problem, which is significantly aggravated by the introduction of uncertainty. In this paper, we draw upon established tools from multiple research communities to provide an effective solution to this c… ▽ More

    Submitted 12 April, 2018; v1 submitted 12 March, 2018; originally announced March 2018.

    Comments: Submitted to Simulation Optimization for Cyber Physical Energy Systems (Special Session) in 14th IEEE International Conference on Automation Science and Engineering

    Journal ref: 2018 IEEE 14th Int. Conf. Autom. Sci. and Eng. (CASE) 906 - 912

  24. arXiv:1803.01451  [pdf, other

    math.OC cs.CE eess.SY

    Near-optimal planning using approximate dynamic programming to enhance post-hazard community resilience management

    Authors: Saeed Nozhati, Yugandhar Sarkale, Bruce Ellingwood, Edwin K. P. Chong, Hussam Mahmoud

    Abstract: The lack of a comprehensive decision-making approach at the community level is an important problem that warrants immediate attention. Network-level decision-making algorithms need to solve large-scale optimization problems that pose computational challenges. The complexity of the optimization problems increases when various sources of uncertainty are considered. This research introduces a sequent… ▽ More

    Submitted 19 April, 2018; v1 submitted 4 March, 2018; originally announced March 2018.

    Comments: The first two authors contributed equally and are listed alphabetically

    Journal ref: Reliab. Eng. & Syst. Saf. 181 (2019) 116-126

  25. arXiv:1712.09864  [pdf

    cs.CR

    TEDS: A Trusted Entropy and Dempster Shafer Mechanism for Routing in Wireless Mesh Networks

    Authors: Hengchuan Tan, Maode Ma, Houda Labiod, Peter Han Joo Chong

    Abstract: Wireless Mesh Networks (WMNs) have emerged as a key technology for the next generation of wireless networking due to its self-forming, self-organizing and self-healing properties. However, due to the multi-hop nature of communications in WMN, we cannot assume that all nodes in the network are cooperative. Nodes may drop all of the data packets they received to mount a Denial of Service (DoS) attac… ▽ More

    Submitted 28 December, 2017; originally announced December 2017.

    Journal ref: MOBILITY 2014 The Fourth International Conference on Mobile Services, Resources, and Users, Jul 2014, Paris, France

  26. A non-biased trust model for wireless mesh networks

    Authors: Heng Chuan Tan, Maode Ma, Houda Labiod, Peter Han Joo Chong, Jun Zhang

    Abstract: Trust models that rely on recommendation trusts are vulnerable to badmouthing and ballot-stuffing attacks. To cope with these attacks, existing trust models use different trust aggregation techniques to process the recommendation trusts and combine them with the direct trust values to form a combined trust value. However, these trust models are biased as recommendation trusts that deviate too much… ▽ More

    Submitted 28 December, 2017; originally announced December 2017.

    Journal ref: International Journal of Communication Systems, Wiley, 2016, 30 (9)

  27. A Secure and Authenticated Key Management Protocol (SA-KMP) for Vehicular Networks

    Authors: Hengchuan Tan, Maode Ma, Houda Labiod, Aymen Boudguiga, Jun Zhang, Peter Han Joo Chong

    Abstract: Public key infrastructure (PKI) is the most widely used security mechanism for securing communications over the network. However, there are known performance issues, making it unsuitable for use in vehicular networks. In this paper, we propose a secure and authenticated key management protocol (SA-KMP) to overcome the shortcomings of the PKI. The SA-KMP scheme distributes repository containing the… ▽ More

    Submitted 28 December, 2017; originally announced December 2017.

    Journal ref: IEEE Transactions on Vehicular Technology, Institute of Electrical and Electronics Engineers, 2016, 65 (12), pp.9570 - 9584

  28. arXiv:1712.00946  [pdf, other

    cs.IT

    V2X Content Distribution Based on Batched Network Coding with Distributed Scheduling

    Authors: Yumeng Gao, Xiaoli Xu, Yong Liang Guan, Peter Han Joo Chong

    Abstract: Content distribution is an application in intelligent transportation system to assist vehicles in acquiring information such as digital maps and entertainment materials. In this paper, we consider content distribution from a single roadside infrastructure unit to a group of vehicles passing by it. To combat the short connection time and the lossy channel quality, the downloaded contents need to be… ▽ More

    Submitted 3 October, 2018; v1 submitted 4 December, 2017; originally announced December 2017.

    Comments: 12 pages and 9 figures

  29. arXiv:1710.02619  [pdf, ps, other

    cs.LG stat.ML

    Ranking and Selection as Stochastic Control

    Authors: Yijie Peng, Edwin K. P. Chong, Chun-Hung Chen, Michael C. Fu

    Abstract: Under a Bayesian framework, we formulate the fully sequential sampling and selection decision in statistical ranking and selection as a stochastic control problem, and derive the associated Bellman equation. Using value function approximation, we derive an approximately optimal allocation policy. We show that this policy is not only computationally efficient but also possesses both one-step-ahead… ▽ More

    Submitted 6 October, 2017; originally announced October 2017.

    Comments: 15 pages, 8 figures, to appear in IEEE Transactions on Automatic Control

    MSC Class: IEEE

  30. arXiv:1709.02924  [pdf, other

    cs.RO

    Robust Object Manipulation for Tactile-based Blind Grasping

    Authors: Wenceslao Shaw-Cortez, Denny Oetomo, Chris Manzie, Peter Choong

    Abstract: Tactile-based blind grasping addresses realistic robotic grasping in which the hand only has access to proprioceptive and tactile sensors. The robotic hand has no prior knowledge of the object/grasp properties, such as object weight, inertia, and shape. There exists no manipulation controller that rigorously guarantees object manipulation in such a setting. Here, a robust control law is proposed f… ▽ More

    Submitted 7 February, 2019; v1 submitted 9 September, 2017; originally announced September 2017.

    Comments: Note the original title of this work was: Object Manipulation using Robotic Hands with Varying Degrees of Grasp Knowledge. It has now been updated thanks to suggestions by the reviewers

  31. arXiv:1706.09192  [pdf, other

    cs.SI

    Network Topology Inference Using Information Cascades with Limited Statistical Knowledge

    Authors: Feng Ji, Wenchang Tang, Wee Peng Tay, Edwin K. P. Chong

    Abstract: We study the problem of inferring network topology from information cascades, in which the amount of time taken for information to diffuse across an edge in the network follows an unknown distribution. Unlike previous studies, which assume knowledge of these distributions, we only require that diffusion along different edges in the network be independent together with limited moment information (e… ▽ More

    Submitted 4 March, 2019; v1 submitted 28 June, 2017; originally announced June 2017.

  32. arXiv:1704.02806  [pdf, other

    cs.IT

    Serving Distance and Coverage in a Closed Access PHP-Based Heterogeneous Cellular Network

    Authors: Zeinab Yazdanshenasan, Harpreet S. Dhillon, Peter Han Joo Chong

    Abstract: Heterogeneous cellular networks (HCNs) usually exhibit spatial separation amongst base stations (BSs) of different types (termed tiers in this paper). For instance, operators will usually not deploy a picocell in close proximity to a macrocell, thus inducing separation amongst the locations of pico and macrocells. This separation has recently been captured by modeling the small cell locations by a… ▽ More

    Submitted 10 April, 2017; originally announced April 2017.

    Comments: Proc., Biennial Symposium on Communications (BSC), 2016

  33. arXiv:1703.08589  [pdf, other

    math.OC cs.DS

    Polynomial-Time Methods to Solve Unimodular Quadratic Programs With Performance Guarantees

    Authors: Shankarachary Ragi, Edwin K. P. Chong, Hans D. Mittelmann

    Abstract: We develop polynomial-time heuristic methods to solve unimodular quadratic programs (UQPs) approximately, which are known to be NP-hard. In the UQP framework, we maximize a quadratic function of a vector of complex variables with unit modulus. Several problems in active sensing and wireless communication applications boil down to UQP. With this motivation, we present three new heuristic methods wi… ▽ More

    Submitted 24 March, 2017; originally announced March 2017.

  34. arXiv:1603.04893  [pdf, ps, other

    math.OC cs.GT

    Performance Bounds for Nash Equilibria in Submodular Utility Systems with User Groups

    Authors: Yajing Liu, Edwin K. P. Chong, Ali Pezeshki

    Abstract: In this paper, we consider variations of the utility system considered by Vetta, in which users are grouped together. Our aim is to establish how grouping and cooperation among users affect performance bounds. We consider two types of grouping. The first type is from \cite{Zhang2014}, where each user belongs to a group of users having social ties with it. For this type of utility system, each user… ▽ More

    Submitted 11 October, 2017; v1 submitted 15 March, 2016; originally announced March 2016.

    Comments: This paper was accepted by Journal of Control and Decision

  35. Poisson Hole Process: Theory and Applications to Wireless Networks

    Authors: Zeinab Yazdanshenasan, Harpreet S. Dhillon, Mehrnaz Afshang, Peter Han Joo Chong

    Abstract: Interference field in wireless networks is often modeled by a homogeneous Poisson Point Process (PPP). While it is realistic in modeling the inherent node irregularity and provides meaningful first-order results, it falls short in modeling the effect of interference management techniques, which typically introduce some form of spatial interaction among active transmitters. In some applications, su… ▽ More

    Submitted 7 January, 2016; v1 submitted 6 January, 2016; originally announced January 2016.

    Comments: 15 pages. Submitted to IEEE Transactions on Wireless Communications

  36. Fundamentals of Cluster-Centric Content Placement in Cache-Enabled Device-to-Device Networks

    Authors: Mehrnaz Afshang, Harpreet S. Dhillon, Peter Han Joo Chong

    Abstract: This paper develops a comprehensive analytical framework with foundations in stochastic geometry to characterize the performance of cluster-centric content placement in a cache-enabled device-to-device (D2D) network. Different from device-centric content placement, cluster-centric placement focuses on placing content in each cluster such that the collective performance of all the devices in each c… ▽ More

    Submitted 9 February, 2016; v1 submitted 15 September, 2015; originally announced September 2015.

    Comments: 16 pages, 10 figures. Submitted to IEEE Transactions on Communications

  37. Modeling and Performance Analysis of Clustered Device-to-Device Networks

    Authors: Mehrnaz Afshang, Harpreet S. Dhillon, Peter Han Joo Chong

    Abstract: Device-to-device (D2D) communication enables direct communication between proximate devices thereby improving the overall spectrum utilization and offloading traffic from cellular networks. This paper develops a new spatial model for D2D networks in which the device locations are modeled as a Poisson cluster process. Using this model, we study the performance of a typical D2D receiver in terms of… ▽ More

    Submitted 11 August, 2015; v1 submitted 11 August, 2015; originally announced August 2015.

    Comments: 34 double-spaced pages, 10 figures. Submitted to IEEE Transactions on Wireless Communications

  38. arXiv:1507.04822  [pdf, ps, other

    cs.IT

    Subspace selection for projection maximization with matroid constraints

    Authors: Zhenliang Zhang, Yuan Wang, Edwin K. P. Chong, Ali Pezeshki, Louis Scharf

    Abstract: Suppose that there is a ground set which consists of a large number of vectors in a Hilbert space. Consider the problem of selecting a subset of the ground set such that the projection of a vector of interest onto the subspace spanned by the vectors in the chosen subset reaches the maximum norm. This problem is generally NP-hard, and alternative approximation algorithms such as forward regression… ▽ More

    Submitted 16 July, 2015; originally announced July 2015.

  39. arXiv:1504.04464  [pdf, other

    cs.IT cs.NI

    Two-Phase Cooperative Broadcasting Based on Batched Network Code

    Authors: Xiaoli Xu, Praveen Kumar M. Gandhi, Yong Liang Guan, Peter Han Joo Chong

    Abstract: In this paper, we consider the wireless broadcasting scenario with a source node sending some common information to a group of closely located users, where each link is subject to certain packet erasures. To ensure reliable information reception by all users, the conventional approach generally requires repeated transmission by the source until all the users are able to decode the information, whi… ▽ More

    Submitted 17 April, 2015; originally announced April 2015.

  40. Robust Decentralized Detection and Social Learning in Tandem Networks

    Authors: Jack Ho, Wee Peng Tay, Tony Q. S. Quek, Edwin K. P. Chong

    Abstract: We study a tandem of agents who make decisions about an underlying binary hypothesis, where the distribution of the agent observations under each hypothesis comes from an uncertainty class. We investigate both decentralized detection rules, where agents collaborate to minimize the error probability of the final agent, and social learning rules, where each agent minimizes its own local minimax erro… ▽ More

    Submitted 23 January, 2015; originally announced January 2015.

  41. Intersection Information based on Common Randomness

    Authors: Virgil Griffith, Edwin K. P. Chong, Ryan G. James, Christopher J. Ellison, James P. Crutchfield

    Abstract: The introduction of the partial information decomposition generated a flurry of proposals for defining an intersection information that quantifies how much of "the same information" two or more random variables specify about a target random variable. As of yet, none is wholly satisfactory. A palatable measure of intersection information would provide a principled way to quantify slippery concepts,… ▽ More

    Submitted 10 June, 2015; v1 submitted 6 October, 2013; originally announced October 2013.

    Comments: 19 pages, 5 figures

    Journal ref: Entropy (2014) Volume 16, Issue 4

  42. String Submodular Functions with Curvature Constraints

    Authors: Zhenliang Zhang, Edwin K. P. Chong, Ali Pezeshki, William Moran

    Abstract: The problem of objectively choosing a string of actions to optimize an objective function that is string submodular has been considered in [1]. There it is shown that the greedy strategy, consisting of a string of actions that only locally maximizes the step-wise gain in the objective function achieves at least a (1-e^{-1})-approximation to the optimal strategy. This paper improves this approximat… ▽ More

    Submitted 25 May, 2015; v1 submitted 12 March, 2013; originally announced March 2013.

    Comments: to appear in IEEE Transaction on Automatic Control

  43. Hypothesis Testing in Feedforward Networks with Broadcast Failures

    Authors: Zhenliang Zhang, Edwin K. P. Chong, Ali Pezeshki, William Moran

    Abstract: Consider a countably infinite set of nodes, which sequentially make decisions between two given hypotheses. Each node takes a measurement of the underlying truth, observes the decisions from some immediate predecessors, and makes a decision between the given hypotheses. We consider two classes of broadcast failures: 1) each node broadcasts a decision to the other nodes, subject to random erasure i… ▽ More

    Submitted 25 March, 2013; v1 submitted 19 November, 2012; originally announced November 2012.

  44. arXiv:1210.4507  [pdf, other

    cs.IT cs.MA

    Submodularity and Optimality of Fusion Rules in Balanced Binary Relay Trees

    Authors: Zhenliang Zhang, Edwin K. P. Chong, Ali Pezeshki, William Moran, Stephen D. Howard

    Abstract: We study the distributed detection problem in a balanced binary relay tree, where the leaves of the tree are sensors generating binary messages. The root of the tree is a fusion center that makes the overall decision. Every other node in the tree is a fusion node that fuses two binary messages from its child nodes into a new binary message and sends it to the parent node at the next level. We assu… ▽ More

    Submitted 16 October, 2012; originally announced October 2012.

  45. Learning in Hierarchical Social Networks

    Authors: Zhenliang Zhang, Edwin K. P. Chong, Ali Pezeshki, William Moran, Stephen D. Howard

    Abstract: We study a social network consisting of agents organized as a hierarchical M-ary rooted tree, common in enterprise and military organizational structures. The goal is to aggregate information to solve a binary hypothesis testing problem. Each agent at a leaf of the tree, and only such an agent, makes a direct measurement of the underlying true hypothesis. The leaf agent then makes a decision and s… ▽ More

    Submitted 21 November, 2012; v1 submitted 30 May, 2012; originally announced June 2012.

  46. Detection Performance in Balanced Binary Relay Trees with Node and Link Failures

    Authors: Zhenliang Zhang, Edwin K. P. Chong, Ali Pezeshki, William Moran, Stephen D. Howard

    Abstract: We study the distributed detection problem in the context of a balanced binary relay tree, where the leaves of the tree correspond to $N$ identical and independent sensors generating binary messages. The root of the tree is a fusion center making an overall decision. Every other node is a relay node that aggregates the messages received from its child nodes into a new message and sends it up towar… ▽ More

    Submitted 19 November, 2012; v1 submitted 1 June, 2012; originally announced June 2012.

  47. arXiv:1202.3913  [pdf, other

    cs.IT

    Greedy Adaptive Compression in Signal-Plus-Noise Models

    Authors: Entao Liu, Edwin K. P. Chong, Louis L. Scharf

    Abstract: The purpose of this article is to examine the greedy adaptive measurement policy in the context of a linear Guassian measurement model with an optimization criterion based on information gain. In the special case of sequential scalar measurements, we provide sufficient conditions under which the greedy policy actually is optimal in the sense of maximizing the net information gain. In the general s… ▽ More

    Submitted 17 August, 2012; v1 submitted 17 February, 2012; originally announced February 2012.

  48. arXiv:1202.2319   

    cs.IT

    Detection Performance of M-ary Relay Trees with Non-binary Message Alphabets

    Authors: Zhenliang Zhang, Edwin K. P. Chong, Ali Pezeshki, William Moran, Stephen D. Howard

    Abstract: We study the detection performance of $M$-ary relay trees, where only the leaves of the tree represent sensors making measurements. The root of the tree represents the fusion center which makes an overall detection decision. Each of the other nodes is a relay node which aggregates $M$ messages sent by its child nodes into a new compressed message and sends the message to its parent node. Building… ▽ More

    Submitted 1 November, 2012; v1 submitted 10 February, 2012; originally announced February 2012.

    Comments: Submitted to SSP workshop 2012

  49. arXiv:1202.1354   

    cs.IT

    Error Probability Bounds for M-ary Relay Trees

    Authors: Zhenliang Zhang, Edwin K. P. Chong, Ali Pezeshki, William Moran, Stephen D. Howard

    Abstract: We study the detection error probabilities associated with an M-ary relay tree, where the leaves of the tree correspond to identical and independent sensors. Only these leaves are sensors. The root of the tree represents a fusion center that makes the overall detection decision. Each of the other nodes in the tree is a relay node that combines M summarized messages from its immediate child nodes t… ▽ More

    Submitted 1 November, 2012; v1 submitted 7 February, 2012; originally announced February 2012.

    Comments: Submitted to ISIT 2012

  50. arXiv:1107.1824  [pdf, other

    cs.IT

    Measurement Design for Detecting Sparse Signals

    Authors: Ramin Zahedi, Ali Pezeshki, Edwin K. P. Chong

    Abstract: We consider the problem of testing for the presence (or detection) of an unknown sparse signal in additive white noise. Given a fixed measurement budget, much smaller than the dimension of the signal, we consider the general problem of designing compressive measurements to maximize the measurement signal-to-noise ratio (SNR), as increasing SNR improves the detection performance in a large class of… ▽ More

    Submitted 9 July, 2011; originally announced July 2011.