Skip to main content

Showing 1–50 of 129 results for author: Jaafar, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2407.01498  [pdf, ps, other

    cs.IT

    The Inverted 3-Sum Box: General Formulation and Quantum Information Theoretic Optimality

    Authors: Yuhang Yao, Syed A. Jafar

    Abstract: The $N$-sum box protocol specifies a class of $\mathbb{F}_d$ linear functions $f(W_1,\cdots,W_K)=V_1W_1+V_2W_2+\cdots+V_KW_K\in\mathbb{F}_d^{m\times 1}$ that can be computed at information theoretically optimal communication cost (minimum number of qudits $Δ_1,\cdots,Δ_K$ sent by the transmitters Alice$_1$, Alice$_2$,$\cdots$, Alice$_K$, respectively, to the receiver, Bob, per computation instance… ▽ More

    Submitted 1 July, 2024; originally announced July 2024.

  2. arXiv:2404.09141  [pdf, ps, other

    cs.IT

    Blind Interference Alignment for MapReduce: Exploiting Side-information with Reconfigurable Antennas

    Authors: Yuxiang Lu, Syed A. Jafar

    Abstract: In order to explore how blind interference alignment (BIA) schemes may take advantage of side-information in computation tasks, we study the degrees of freedom (DoF) of a $K$ user wireless network setting that arises in full-duplex wireless MapReduce applications. In this setting the receivers are assumed to have reconfigurable antennas and channel knowledge, while the transmitters have neither, i… ▽ More

    Submitted 14 April, 2024; originally announced April 2024.

  3. MR.CAP: Multi-Robot Joint Control and Planning for Object Transport

    Authors: Hussein Ali Jaafar, Cheng-Hao Kao, Sajad Saeedi

    Abstract: With the recent influx in demand for multi-robot systems throughout industry and academia, there is an increasing need for faster, robust, and generalizable path planning algorithms. Similarly, given the inherent connection between control algorithms and multi-robot path planners, there is in turn an increased demand for fast, efficient, and robust controllers. We propose a scalable joint path pla… ▽ More

    Submitted 21 January, 2024; originally announced January 2024.

    Comments: H. A. Jaafar, C. -H. Kao and S. Saeedi, "MR.CAP: Multi-Robot Joint Control and Planning for Object Transport," in IEEE Control Systems Letters, doi: 10.1109/LCSYS.2024.3349989

  4. arXiv:2312.13655  [pdf, other

    cs.RO cs.AI cs.CL cs.CV

    Compositional Zero-Shot Learning for Attribute-Based Object Reference in Human-Robot Interaction

    Authors: Peng Gao, Ahmed Jaafar, Brian Reily, Christopher Reardon, Hao Zhang

    Abstract: Language-enabled robots have been widely studied over the past years to enable natural human-robot interaction and teaming in various real-world applications. Language-enabled robots must be able to comprehend referring expressions to identify a particular object from visual perception using a set of referring attributes extracted from natural language. However, visual observations of an object ma… ▽ More

    Submitted 21 December, 2023; originally announced December 2023.

    Comments: Equal contribution from the first two authors

  5. arXiv:2311.09684  [pdf, other

    cs.CL cs.AI

    Do Physicians Know How to Prompt? The Need for Automatic Prompt Optimization Help in Clinical Note Generation

    Authors: Zonghai Yao, Ahmed Jaafar, Beining Wang, Zhichao Yang, Hong Yu

    Abstract: This study examines the effect of prompt engineering on the performance of Large Language Models (LLMs) in clinical note generation. We introduce an Automatic Prompt Optimization (APO) framework to refine initial prompts and compare the outputs of medical experts, non-medical experts, and APO-enhanced GPT3.5 and GPT4. Results highlight GPT4 APO's superior performance in standardizing prompt qualit… ▽ More

    Submitted 5 July, 2024; v1 submitted 16 November, 2023; originally announced November 2023.

    Comments: To appear in BioNLP 2024

  6. arXiv:2311.08386  [pdf, ps, other

    cs.IT

    Capacity of Summation over a Symmetric Quantum Erasure MAC with Partially Replicated Inputs

    Authors: Yuhang Yao, Syed A. Jafar

    Abstract: The optimal quantum communication cost of computing a classical sum of distributed sources is studied over a quantum erasure multiple access channel (QEMAC). K classical messages comprised of finite-field symbols are distributed across $S$ servers, who also share quantum entanglement in advance. Each server $s\in[S]$ manipulates its quantum subsystem $\mathcal{Q}_s$ according to its own available… ▽ More

    Submitted 15 May, 2024; v1 submitted 14 November, 2023; originally announced November 2023.

  7. arXiv:2311.07829  [pdf, ps, other

    cs.IT

    A Coding Scheme for Unresponsive and Byzantine Server Resilient Quantum $X$-Secure $T$-Private Information Retrieval

    Authors: Yuxiang Lu, Syed A. Jafar

    Abstract: Building on recent constructions of Quantum Cross Subspace Alignment (QCSA) codes, this work develops a coding scheme for QEBXSTPIR, i.e., classical private information retrieval with $X$-secure storage and $T$-private queries, over a quantum multiple access channel, that is resilient to any set of up to $E$ erased servers (equivalently known as unresponsive servers, or stragglers) together with a… ▽ More

    Submitted 25 February, 2024; v1 submitted 13 November, 2023; originally announced November 2023.

  8. Improving Deep Attractor Network by BGRU and GMM for Speech Separation

    Authors: Rawad Melhem, Assef Jafar, Riad Hamadeh

    Abstract: Deep Attractor Network (DANet) is the state-of-the-art technique in speech separation field, which uses Bidirectional Long Short-Term Memory (BLSTM), but the complexity of the DANet model is very high. In this paper, a simplified and powerful DANet model is proposed using Bidirectional Gated neural network (BGRU) instead of BLSTM. The Gaussian Mixture Model (GMM) other than the k-means was applied… ▽ More

    Submitted 7 August, 2023; originally announced August 2023.

    Journal ref: Journal of Harbin Institute of Technology (New Series), vol. 28, no. 3, pp. 90-96, 2021

  9. arXiv:2305.20073  [pdf, ps, other

    cs.IT

    On the Capacity of Secure $K$-user Product Computation over a Quantum MAC

    Authors: Yuxiang Lu, Yuhang Yao, Syed A. Jafar

    Abstract: Inspired by recent work by Christensen and Popovski on secure $2$-user product computation for finite-fields of prime-order over a quantum multiple access channel, the generalization to $K$ users and arbitrary finite fields is explored. Asymptotically optimal (capacity-achieving for large alphabet) schemes are proposed. Additionally, the capacity of modulo-$d$ ($d\geq 2$) secure $K$-sum computatio… ▽ More

    Submitted 28 August, 2023; v1 submitted 31 May, 2023; originally announced May 2023.

    Comments: Accepted for publication in IEEE Communications Letters

  10. arXiv:2305.15758  [pdf

    cs.SD eess.AS

    Towards Solving Cocktail-Party: The First Method to Build a Realistic Dataset with Ground Truths for Speech Separation

    Authors: Rawad Melhem, Assef Jafar, Oumayma Al Dakkak

    Abstract: Speech separation is very important in real-world applications such as human-machine interaction, hearing aids devices, and automatic meeting transcription. In recent years, a significant improvement occurred towards the solution based on deep learning. In fact, much attention has been drawn to supervised learning methods using synthetic mixtures datasets despite their being not representative of… ▽ More

    Submitted 25 May, 2023; originally announced May 2023.

  11. arXiv:2305.03122  [pdf, ps, other

    cs.IT

    The Capacity of Classical Summation over a Quantum MAC with Arbitrarily Distributed Inputs and Entanglements

    Authors: Yuhang Yao, Syed A. Jafar

    Abstract: The $Σ$-QMAC problem is introduced, involving $S$ servers, $K$ classical ($\mathbb{F}_d$) data streams, and $T$ independent quantum systems. Data stream ${\sf W}_k, k\in[K]$ is replicated at a subset of servers $\mathcal{W}(k)\subset[S]$, and quantum system $\mathcal{Q}_t, t\in[T]$ is distributed among a subset of servers $\mathcal{E}(t)\subset[S]$ such that Server $s\in\mathcal{E}(t)$ receives su… ▽ More

    Submitted 5 May, 2024; v1 submitted 4 May, 2023; originally announced May 2023.

  12. arXiv:2304.14676  [pdf, ps, other

    cs.IT

    Quantum Cross Subspace Alignment Codes via the $N$-sum Box Abstraction

    Authors: Yuxiang Lu, Syed Ali Jafar

    Abstract: Cross-subspace alignment (CSA) codes are used in various private information retrieval (PIR) schemes (e.g., with secure storage) and in secure distributed batch matrix multiplication (SDBMM). Using a recently developed $N$-sum box abstraction of a quantum multiple-access channel (QMAC), we translate CSA schemes over classical multiple-access channels into efficient quantum CSA schemes over a QMAC,… ▽ More

    Submitted 28 April, 2023; originally announced April 2023.

    Comments: arXiv admin note: substantial text overlap with arXiv:2304.07561

  13. arXiv:2209.07602  [pdf, ps, other

    cs.IT

    On the Generic Capacity of $K$-User Symmetric Linear Computation Broadcast

    Authors: Yuhang Yao, Syed A. Jafar

    Abstract: Linear computation broadcast (LCBC) refers to a setting with $d$ dimensional data stored at a central server, where $K$ users, each with some prior linear side-information, wish to retrieve various linear combinations of the data. The goal is to determine the minimum amount of information that must be broadcast to satisfy all the users. The reciprocal of the optimal broadcast cost is the capacity… ▽ More

    Submitted 14 December, 2022; v1 submitted 15 September, 2022; originally announced September 2022.

  14. arXiv:2206.10049  [pdf, ps, other

    cs.IT

    The Capacity of 3 User Linear Computation Broadcast

    Authors: Yuhang Yao, Syed A. Jafar

    Abstract: The $K$ User Linear Computation Broadcast (LCBC) problem is comprised of $d$ dimensional data (from $\mathbb{F}_q$), that is fully available to a central server, and $K$ users, who require various linear computations of the data, and have prior knowledge of various linear functions of the data as side-information. The optimal broadcast cost is the minimum number of $q$-ary symbols to be broadcast… ▽ More

    Submitted 5 May, 2024; v1 submitted 20 June, 2022; originally announced June 2022.

  15. arXiv:2205.02216  [pdf, other

    cs.IT

    The Extremal GDoF Gain of Optimal versus Binary Power Control in $K$ User Interference Networks Is $Θ(\sqrt{K})$

    Authors: Yao-Chia Chan, Pouya Pezeshkpour, Chunhua Geng, Syed A. Jafar

    Abstract: Using ideas from Generalized Degrees of Freedom (GDoF) analyses and extremal network theory, this work studies the extremal gain of optimal power control over binary (on/off) power control, especially in large interference networks, in search of new theoretical insights. Whereas numerical studies have already established that in most practical settings binary power control is close to optimal, the… ▽ More

    Submitted 5 May, 2022; v1 submitted 4 May, 2022; originally announced May 2022.

    Comments: 18 pages, 5 figures; Typo corrections

  16. arXiv:2203.03092  [pdf, other

    cs.RO cs.AI

    Systematic Comparison of Path Planning Algorithms using PathBench

    Authors: Hao-Ya Hsueh, Alexandru-Iosif Toma, Hussein Ali Jaafar, Edward Stow, Riku Murai, Paul H. J. Kelly, Sajad Saeedi

    Abstract: Path planning is an essential component of mobile robotics. Classical path planning algorithms, such as wavefront and rapidly-exploring random tree (RRT) are used heavily in autonomous robots. With the recent advances in machine learning, development of learning-based path planning algorithms has been experiencing rapid growth. An unified path planning interface that facilitates the development an… ▽ More

    Submitted 6 March, 2022; originally announced March 2022.

    Comments: Accepted to Advanced Robotics Journal; 23 pages, 9 figures, 4 tables. arXiv admin note: substantial text overlap with arXiv:2105.01777

  17. arXiv:2202.07693  [pdf, ps, other

    cs.IT

    On Single Server Private Information Retrieval with Private Coded Side Information

    Authors: Yuxiang Lu, Syed Ali Jafar

    Abstract: Motivated by an open problem and a conjecture, this work studies the problem of single server private information retrieval with private coded side information (PIR-PCSI) that was recently introduced by Heidarzadeh et al. The goal of PIR-PCSI is to allow a user to efficiently retrieve a desired message $\bm{W}_{\bmθ}$, which is one of $K$ independent messages that are stored at a server, while uti… ▽ More

    Submitted 15 February, 2022; originally announced February 2022.

  18. arXiv:2107.10448  [pdf, other

    cs.DC

    Flexible Distributed Matrix Multiplication

    Authors: Weiqi Li, Zhen Chen, Zhiying Wang, Syed A. Jafar, Hamid Jafarkhani

    Abstract: The distributed matrix multiplication problem with an unknown number of stragglers is considered, where the goal is to efficiently and flexibly obtain the product of two massive matrices by distributing the computation across N servers. There are up to N - R stragglers but the exact number is not known a priori. Motivated by reducing the computation load of each server, a flexible solution is prop… ▽ More

    Submitted 22 July, 2021; originally announced July 2021.

  19. arXiv:2105.07567  [pdf, ps, other

    cs.IT

    Price of Precision in Coded Distributed Matrix Multiplication: A Dimensional Analysis

    Authors: Junge Wang, Zhuqing Jia, Syed A. Jafar

    Abstract: Coded distributed matrix multiplication (CDMM) schemes, such as MatDot codes, seek efficient ways to distribute matrix multiplication task(s) to a set of $N$ distributed servers so that the answers returned from any $R$ servers are sufficient to recover the desired product(s). For example, to compute the product of matrices ${\bf U, V}$, MatDot codes partition each matrix into $p>1$ sub-matrices t… ▽ More

    Submitted 16 May, 2021; originally announced May 2021.

    Comments: 7 pages, 4 figures, submitted to ITW2021

  20. arXiv:2105.01777  [pdf, other

    cs.RO cs.LG

    PathBench: A Benchmarking Platform for Classical and Learned Path Planning Algorithms

    Authors: Alexandru-Iosif Toma, Hao-Ya Hsueh, Hussein Ali Jaafar, Riku Murai, Paul H. J. Kelly, Sajad Saeedi

    Abstract: Path planning is a key component in mobile robotics. A wide range of path planning algorithms exist, but few attempts have been made to benchmark the algorithms holistically or unify their interface. Moreover, with the recent advances in deep neural networks, there is an urgent need to facilitate the development and benchmarking of such learning-based planning algorithms. This paper presents PathB… ▽ More

    Submitted 4 May, 2021; originally announced May 2021.

    Comments: The Conference on Robots and Vision (CRV2021), Supplementary Website: https://sites.google.com/view/pathbench/

  21. arXiv:2105.00312  [pdf, other

    cs.RO cs.LG

    Waypoint Planning Networks

    Authors: Alexandru-Iosif Toma, Hussein Ali Jaafar, Hao-Ya Hsueh, Stephen James, Daniel Lenton, Ronald Clark, Sajad Saeedi

    Abstract: With the recent advances in machine learning, path planning algorithms are also evolving; however, the learned path planning algorithms often have difficulty competing with success rates of classic algorithms. We propose waypoint planning networks (WPN), a hybrid algorithm based on LSTMs with a local kernel - a classic algorithm such as A*, and a global kernel using a learned algorithm. WPN produc… ▽ More

    Submitted 1 May, 2021; originally announced May 2021.

    Comments: The Conference on Robots and Vision (CRV2021) Supplementary Website: https://sites.google.com/view/waypoint-planning-networks

  22. arXiv:2103.07830  [pdf, other

    cs.IT

    Sum-GDoF of Symmetric Multi-hop Interference Channel under Finite Precision CSIT using Aligned-Images Sumset Inequalities

    Authors: Junge Wang, Syed Ali Jafar

    Abstract: Aligned-Images Sumset Inequalities are used in this work to study the Generalized Degrees of Freedom (GDoF) of the symmetric layered multi-hop interference channel under the robust assumption that the channel state information at the transmitters (CSIT) is limited to finite precision. First, the sum-GDoF value is characterized for the $2\times 2\times 2$ setting that is comprised of $2$ sources,… ▽ More

    Submitted 13 March, 2021; originally announced March 2021.

    Comments: 35 pages, 11 figures

  23. arXiv:2102.04355  [pdf, other

    cs.IT

    Multilevel Topological Interference Management: A TIM-TIN Perspective

    Authors: Chunhua Geng, Hua Sun, Syed A. Jafar

    Abstract: The robust principles of treating interference as noise (TIN) when it is sufficiently weak, and avoiding it when it is not, form the background of this work. Combining TIN with the topological interference management (TIM) framework that identifies optimal interference avoidance schemes, we formulate a TIM-TIN problem for multilevel topological interference management, wherein only a coarse knowle… ▽ More

    Submitted 8 February, 2021; originally announced February 2021.

    Comments: This work will be submitted to the IEEE for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessible

  24. arXiv:2011.12947  [pdf, ps, other

    cs.IT

    Secure GDoF of the Z-channel with Finite Precision CSIT: How Robust are Structured Codes?

    Authors: Yao-Chia Chan, Syed A. Jafar

    Abstract: Under the assumption of perfect channel state information at the transmitters (CSIT), it is known that structured codes offer significant advantages for secure communication in an interference network, e.g., structured jamming signals based on lattice codes may allow a receiver to decode the sum of the jamming signal and the signal being jammed, even though they cannot be separately resolved due t… ▽ More

    Submitted 25 November, 2020; originally announced November 2020.

    Comments: 34 pages, 10 figures

  25. arXiv:2010.01059  [pdf, ps, other

    cs.IT

    $X$-Secure $T$-Private Federated Submodel Learning with Elastic Dropout Resilience

    Authors: Zhuqing Jia, Syed A. Jafar

    Abstract: Motivated by recent interest in federated submodel learning, this work explores the fundamental problem of privately reading from and writing to a database comprised of $K$ files (submodels) that are stored across $N$ distributed servers according to an $X$-secure threshold secret sharing scheme. One after another, various users wish to retrieve their desired file, locally process the information… ▽ More

    Submitted 22 March, 2021; v1 submitted 2 October, 2020; originally announced October 2020.

  26. Double Blind $T$-Private Information Retrieval

    Authors: Yuxiang Lu, Zhuqing Jia, Syed A. Jafar

    Abstract: Double blind $T$-private information retrieval (DB-TPIR) enables two users, each of whom specifies an index ($θ_1, θ_2$, resp.), to efficiently retrieve a message $W(θ_1,θ_2)$ labeled by the two indices, from a set of $N$ servers that store all messages $W(k_1,k_2), k_1\in\{1,2,\cdots,K_1\}, k_2\in\{1,2,\cdots,K_2\}$, such that the two users' indices are kept private from any set of up to… ▽ More

    Submitted 8 March, 2021; v1 submitted 9 August, 2020; originally announced August 2020.

    Comments: Accepted for publication in IEEE Journal on Selected Areas in Information Theory (JSAIT)

  27. arXiv:2006.02310  [pdf, ps, other

    cs.IT

    Canonical Conditions for K/2 Degrees of Freedom

    Authors: Recep Gül, David Stotz, Syed Ali Jafar, Helmut Bölcskei, Shlomo Shamai

    Abstract: We present a necessary and sufficient condition for $1/2$ degree of freedom for each user in constant $K$-user single-antenna interference channels. This condition applies to all channel topologies, i.e., to fully-connected channels as well as channels that have individual links absent, reflected by corresponding zeros in the channel matrix. Moreover, it captures the essence of interference alignm… ▽ More

    Submitted 3 June, 2020; originally announced June 2020.

  28. arXiv:2002.07750  [pdf, other

    cs.IT cs.CR cs.DC

    GCSA Codes with Noise Alignment for Secure Coded Multi-Party Batch Matrix Multiplication

    Authors: Zhen Chen, Zhuqing Jia, Zhiying Wang, Syed A. Jafar

    Abstract: A secure multi-party batch matrix multiplication problem (SMBMM) is considered, where the goal is to allow a master to efficiently compute the pairwise products of two batches of massive matrices, by distributing the computation across S servers. Any X colluding servers gain no information about the input, and the master gains no additional information about the input beyond the product. A solutio… ▽ More

    Submitted 6 September, 2020; v1 submitted 18 February, 2020; originally announced February 2020.

  29. arXiv:1909.13873  [pdf, other

    cs.IT

    Cross Subspace Alignment Codes for Coded Distributed Batch Computation

    Authors: Zhuqing Jia, Syed A. Jafar

    Abstract: Coded distributed batch computation distributes a computation task, such as matrix multiplication, $N$-linear computation, or multivariate polynomial evaluation, across $S$ servers through a coding scheme, such that the response from any $R$ servers ($R$ is called the recovery threshold) is sufficient for the user to recover the desired computed value. Current approaches are based on either exclus… ▽ More

    Submitted 14 November, 2019; v1 submitted 30 September, 2019; originally announced September 2019.

    Comments: Improved recovery threshold for GCSA codes and added discussion of server latency constraints

  30. arXiv:1908.10854  [pdf, other

    cs.IT

    $X$-secure $T$-private Information Retrieval from MDS Coded Storage with Byzantine and Unresponsive Servers

    Authors: Zhuqing Jia, Syed A. Jafar

    Abstract: The problem of $X$-secure $T$-private information retrieval from MDS coded storage is studied in this paper, where the user wishes to privately retrieve one out of $K$ independent messages that are distributed over $N$ servers according to an MDS code. It is guaranteed that any group of up to $X$ colluding servers learn nothing about the messages and that any group of up to $T$ colluding servers l… ▽ More

    Submitted 28 August, 2019; originally announced August 2019.

  31. arXiv:1908.06957  [pdf, ps, other

    cs.IT

    On the Capacity of Secure Distributed Batch Matrix Multiplication

    Authors: Zhuqing Jia, Syed A. Jafar

    Abstract: The problem of secure distributed batch matrix multiplication (SDBMM) studies the communication efficiency of retrieving a sequence of desired matrix products ${\bf AB}$ $=$ $({\bf A}_1{\bf B}_1,$ ${\bf A}_2{\bf B}_2,$ $\cdots,$ ${\bf A}_S{\bf B}_S)$ from $N$ distributed servers where the constituent matrices ${\bf A}=({\bf A}_1, {\bf A}_2, \cdots, {\bf A}_S)$ and… ▽ More

    Submitted 22 June, 2021; v1 submitted 19 August, 2019; originally announced August 2019.

    Comments: The updated version is the revision for IEEE IT Transactions

  32. arXiv:1908.00703  [pdf, other

    cs.IT

    GDoF of Interference Channel with Limited Cooperation under Finite Precision CSIT

    Authors: Junge Wang, Bofeng Yuan, Lexiang Huang, Syed A. Jafar

    Abstract: The Generalized Degrees of Freedom (GDoF) of the two user interference channel are characterized for all parameter regimes under the assumption of finite precision channel state information at the transmitters (CSIT), when a limited amount of (half-duplex or full-duplex) cooperation is allowed between the transmitters in the form of $π$ DoF of shared messages. In all cases, the number of over-the-… ▽ More

    Submitted 2 August, 2019; originally announced August 2019.

    Comments: 39 pages,10 figures,

  33. arXiv:1904.05906  [pdf, ps, other

    cs.IT

    On the Asymptotic Capacity of $X$-Secure $T$-Private Information Retrieval with Graph Based Replicated Storage

    Authors: Zhuqing Jia, Syed A. Jafar

    Abstract: The problem of private information retrieval with graph-based replicated storage was recently introduced by Raviv, Tamo and Yaakobi. Its capacity remains open in almost all cases. In this work the asymptotic (large number of messages) capacity of this problem is studied along with its generalizations to include arbitrary $T$-privacy and $X$-security constraints, where the privacy of the user must… ▽ More

    Submitted 11 April, 2019; originally announced April 2019.

  34. arXiv:1904.00690  [pdf

    cs.CY cs.DC cs.LG cs.SI stat.ML

    Customer churn prediction in telecom using machine learning and social network analysis in big data platform

    Authors: Abdelrahim Kasem Ahmad, Assef Jafar, Kadan Aljoumaa

    Abstract: Customer churn is a major problem and one of the most important concerns for large companies. Due to the direct effect on the revenues of the companies, especially in the telecom field, companies are seeking to develop means to predict potential customer to churn. Therefore, finding factors that increase customer churn is important to take necessary actions to reduce this churn. The main contribut… ▽ More

    Submitted 1 April, 2019; originally announced April 2019.

    Comments: 24 pages, 14 figures. PDF https://rdcu.be/budKg

    Journal ref: Journal of Big Data 2019 6:28

  35. arXiv:1903.07597  [pdf, ps, other

    cs.IT

    On the Capacity of Computation Broadcast

    Authors: Hua Sun, Syed A. Jafar

    Abstract: The two-user computation broadcast problem is introduced as the setting where User $1$ wants message $W_1$ and has side-information $W_1'$, User $2$ wants message $W_2$ and has side-information $W_2'$, and $(W_1, W_1', W_2, W_2')$ may have arbitrary dependencies. The rate of a computation broadcast scheme is defined as the ratio $H(W_1,W_2)/H(S)$, where $S$ is the information broadcast to both use… ▽ More

    Submitted 18 March, 2019; originally announced March 2019.

  36. arXiv:1903.06756  [pdf

    cs.LG cs.CY stat.ML

    Predicting customer's gender and age depending on mobile phone data

    Authors: Ibrahim Mousa AlZuabi, Assef Jafar, Kadan Aljoumaa

    Abstract: In the age of data driven solution, the customer demographic attributes, such as gender and age, play a core role that may enable companies to enhance the offers of their services and target the right customer in the right time and place. In the marketing campaign, the companies want to target the real user of the GSM (global system for mobile communications), not the line owner. Where sometimes t… ▽ More

    Submitted 20 February, 2019; originally announced March 2019.

  37. arXiv:1901.09885  [pdf, other

    cs.IT

    Towards an Extremal Network Theory -- Robust GDoF Gain of Transmitter Cooperation over TIN

    Authors: Yao-Chia Chan, Junge Wang, Syed A. Jafar

    Abstract: Significant progress has been made recently in Generalized Degrees of Freedom (GDoF) characterizations of wireless interference channels (IC) and broadcast channels (BC) under the assumption of finite precision channel state information at the transmitters (CSIT), especially for smaller or highly symmetric network settings. A critical barrier in extending these results to larger and asymmetric net… ▽ More

    Submitted 24 October, 2019; v1 submitted 28 January, 2019; originally announced January 2019.

    Comments: 35 pages, 7 figures. Submitted to IEEE Transactions on Information Theory

  38. arXiv:1901.06010  [pdf, other

    cs.IT

    Degrees of Freedom Region of the $(M,N_1,N_2)$ MIMO Broadcast Channel with Partial CSIT: An Application of Sum-set Inequalities Based on Aligned Image Sets

    Authors: Arash Gholami Davoodi, Syed A. Jafar

    Abstract: The degrees of freedom (DoF) region is characterized for the $2$-user multiple input multiple output (MIMO) broadcast channel (BC), where the transmitter is equipped with $M$ antennas, the two receivers are equipped with $N_1$ and $N_2$ antennas, and the levels of channel state information at the transmitter (CSIT) for the two users are parameterized by $β_1, β_2$, respectively. The achievability… ▽ More

    Submitted 17 January, 2019; originally announced January 2019.

    Comments: 43 pages,11 figures

  39. arXiv:1812.05566  [pdf, other

    cs.IT

    On the Capacity of Locally Decodable Codes

    Authors: Hua Sun, Syed A. Jafar

    Abstract: A locally decodable code (LDC) maps $K$ source symbols, each of size $L_w$ bits, to $M$ coded symbols, each of size $L_x$ bits, such that each source symbol can be decoded from $N \leq M$ coded symbols. A perfectly smooth LDC further requires that each coded symbol is uniformly accessed when we decode any one of the messages. The ratio $L_w/L_x$ is called the symbol rate of an LDC. The highest pos… ▽ More

    Submitted 13 December, 2018; originally announced December 2018.

  40. arXiv:1808.07457  [pdf, other

    cs.IT

    Cross Subspace Alignment and the Asymptotic Capacity of $X$-Secure $T$-Private Information Retrieval

    Authors: Zhuqing Jia, Hua Sun, Syed A. Jafar

    Abstract: $X$-secure and $T$-private information retrieval (XSTPIR) is a form of private information retrieval where data security is guaranteed against collusion among up to $X$ servers and the user's privacy is guaranteed against collusion among up to $T$ servers. The capacity of XSTPIR is characterized for arbitrary number of servers $N$, and arbitrary security and privacy thresholds $X$ and $T… ▽ More

    Submitted 3 March, 2019; v1 submitted 22 August, 2018; originally announced August 2018.

  41. arXiv:1801.07419  [pdf, other

    cs.IT

    Optimality of Simple Layered Superposition Coding in the 3 User MISO BC with Finite Precision CSIT

    Authors: Arash Gholami Davoodi, Syed Ali Jafar

    Abstract: We study the $K=3$ user multiple input single output (MISO) broadcast channel (BC) with $M=3$ antennas at the transmitter and $1$ antenna at each receiver, from the generalized degrees of freedom (GDoF) perspective, under the assumption that the channel state information at the transmitter (CSIT) is limited to finite precision. In particular, our goal is to identify a parameter regime where a simp… ▽ More

    Submitted 14 May, 2018; v1 submitted 23 January, 2018; originally announced January 2018.

    Comments: 51 pages, 6 figures, generalizations to K users have been added, submitted to the IT Transactions

  42. arXiv:1711.00044  [pdf, other

    cs.IT

    $K$-User Symmetric M$\times$N MIMO Interference Channel under Finite Precision CSIT: A GDoF perspective

    Authors: Arash Gholami Davoodi, Syed Ali Jafar

    Abstract: Generalized Degrees of Freedom (GDoF) are characterized for the symmetric $K$-user Multiple Input Multiple Output (MIMO) Interference Channel (IC) under the assumption that the channel state information at the transmitters (CSIT) is limited to finite precision. In this symmetric setting, each transmitter is equipped with $M$ antennas, each receiver is equipped with $N$ antennas, each desired chann… ▽ More

    Submitted 31 October, 2017; originally announced November 2017.

    Comments: 22 pages, 4 figures

  43. arXiv:1710.11098  [pdf, ps, other

    cs.IT

    The Capacity of Private Computation

    Authors: Hua Sun, Syed A. Jafar

    Abstract: We introduce the problem of private computation, comprised of $N$ distributed and non-colluding servers, $K$ independent datasets, and a user who wants to compute a function of the datasets privately, i.e., without revealing which function he wants to compute, to any individual server. This private computation problem is a strict generalization of the private information retrieval (PIR) problem, o… ▽ More

    Submitted 25 November, 2017; v1 submitted 30 October, 2017; originally announced October 2017.

  44. Handling state space explosion in verification of component-based systems: A review

    Authors: Faranak Nejati, Abdul Azim Abd. Ghani, Ng Keng Yap, Azmi Jaafar

    Abstract: Component-based software development (CBSD) is an alternative approach to constructing software systems that offers numerous benefits, particularly in decreasing the complexity of system design. However, deploying components into a system is a challenging and error-prone task. Model-checking is one of the reliable methods to systematically analyze the correctness of a system. It is a bruce-force c… ▽ More

    Submitted 26 May, 2021; v1 submitted 28 July, 2017; originally announced September 2017.

    Journal ref: IEEEAccess, 2021

  45. arXiv:1705.02775  [pdf, other

    cs.IT

    Network Coherence Time Matters - Aligned Image Sets and the Degrees of Freedom of Interference Networks with Finite Precision CSIT and Perfect CSIR

    Authors: Arash Gholami Davoodi, Syed Ali Jafar

    Abstract: This work obtains the first bound that is provably sensitive to network coherence time, i.e., coherence time in an interference network where all channels experience the same coherence patterns. This is accomplished by a novel adaptation of the aligned image sets bound, and settles various open problems noted previously by Naderi and Avestimehr and by Gou et al. For example, a necessary and suffic… ▽ More

    Submitted 8 May, 2017; originally announced May 2017.

    Comments: 19 pages, 4 figures

  46. arXiv:1705.00769  [pdf, other

    cs.IT

    Aligned Image Sets and the Generalized Degrees of Freedom of Symmetric MIMO Interference Channel with Partial CSIT

    Authors: Arash Gholami Davoodi, Syed A. Jafar

    Abstract: The generalized degrees of freedom (GDoF) of the two user symmetric multiple input multiple output (MIMO) interference channel (IC) are characterized as a function of the channel strength levels and the level of channel state information at the transmitters (CSIT). In this symmetric setting, each transmitter is equipped with M antennas, each receiver is equipped with N antennas, and both cross lin… ▽ More

    Submitted 1 May, 2017; originally announced May 2017.

    Comments: 21 pages, 3 figures

  47. arXiv:1703.01168  [pdf, other

    cs.IT

    Sum-set Inequalities from Aligned Image Sets: Instruments for Robust GDoF Bounds

    Authors: Arash Gholami Davoodi, Syed A. Jafar

    Abstract: We present sum-set inequalities specialized to the generalized degrees of freedom (GDoF) framework. These are information theoretic lower bounds on the entropy of bounded density linear combinations of discrete, power-limited dependent random variables in terms of the joint entropies of arbitrary linear combinations of new random variables that are obtained by power level partitioning of the origi… ▽ More

    Submitted 24 August, 2017; v1 submitted 3 March, 2017; originally announced March 2017.

    Comments: 35 pages, 7 figures

  48. arXiv:1701.07807  [pdf, ps, other

    cs.IT cs.CR cs.IR

    Private Information Retrieval from MDS Coded Data with Colluding Servers: Settling a Conjecture by Freij-Hollanti et al.

    Authors: Hua Sun, Syed A. Jafar

    Abstract: A $(K, N, T, K_c)$ instance of the MDS-TPIR problem is comprised of $K$ messages and $N$ distributed servers. Each message is separately encoded through a $(K_c, N)$ MDS storage code. A user wishes to retrieve one message, as efficiently as possible, while revealing no information about the desired message index to any colluding set of up to $T$ servers. The fundamental limit on the efficiency of… ▽ More

    Submitted 30 January, 2017; v1 submitted 26 January, 2017; originally announced January 2017.

  49. arXiv:1611.02257  [pdf, ps, other

    cs.IT cs.CR cs.IR

    Multiround Private Information Retrieval: Capacity and Storage Overhead

    Authors: Hua Sun, Syed A. Jafar

    Abstract: The capacity has recently been characterized for the private information retrieval (PIR) problem as well as several of its variants. In every case it is assumed that all the queries are generated by the user simultaneously. Here we consider multiround PIR, where the queries in each round are allowed to depend on the answers received in previous rounds. We show that the capacity of multiround PIR i… ▽ More

    Submitted 7 November, 2016; originally announced November 2016.

  50. arXiv:1610.03048  [pdf, ps, other

    cs.IT cs.CR cs.IR

    Optimal Download Cost of Private Information Retrieval for Arbitrary Message Length

    Authors: Hua Sun, Syed A. Jafar

    Abstract: A private information retrieval scheme is a mechanism that allows a user to retrieve any one out of $K$ messages from $N$ non-communicating replicated databases, each of which stores all $K$ messages, without revealing anything about the identity of the desired message index to any individual database. If the size of each message is $L$ bits and the total download required by a PIR scheme from all… ▽ More

    Submitted 10 October, 2016; originally announced October 2016.