Zum Hauptinhalt springen

Showing 1–50 of 63 results for author: Ramamoorthy, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2408.05152  [pdf, other

    cs.DC

    Sparsity-Preserving Encodings for Straggler-Optimal Distributed Matrix Computations at the Edge

    Authors: Anindya Bijoy Das, Aditya Ramamoorthy, David J. Love, Christopher G. Brinton

    Abstract: Matrix computations are a fundamental building-block of edge computing systems, with a major recent uptick in demand due to their use in AI/ML training and inference procedures. Existing approaches for distributing matrix computations involve allocating coded combinations of submatrices to worker nodes, to build resilience to slower nodes, called stragglers. In the edge learning context, however,… ▽ More

    Submitted 9 August, 2024; originally announced August 2024.

    Comments: arXiv admin note: text overlap with arXiv:2308.04331

  2. arXiv:2405.19509  [pdf, other

    cs.IT

    Leveraging partial stragglers within gradient coding

    Authors: Aditya Ramamoorthy, Ruoyu Meng, Vrinda S. Girimaji

    Abstract: Within distributed learning, workers typically compute gradients on their assigned dataset chunks and send them to the parameter server (PS), which aggregates them to compute either an exact or approximate version of $\nabla L$ (gradient of the loss function $L$). However, in large-scale clusters, many workers are slower than their promised speed or even failure-prone. A gradient coding solution i… ▽ More

    Submitted 29 May, 2024; originally announced May 2024.

    Comments: 12 pages, 7 figures

  3. arXiv:2402.01549   

    cs.IT math.CO quant-ph

    Quantum advantage in zero-error function computation with side information

    Authors: Ruoyu Meng, Aditya Ramamoorthy

    Abstract: We consider the problem of zero-error function computation with side information. Alice has a source $X$ and Bob has correlated source $Y$ and they can communicate via either classical or a quantum channel. Bob wants to calculate $f(X,Y)$ with zero error. We aim to characterize the minimum amount of information that Alice needs to send to Bob for this to happen with zero-error. In the classical se… ▽ More

    Submitted 4 March, 2024; v1 submitted 2 February, 2024; originally announced February 2024.

    Comments: We have realized an error in Claim 3

    MSC Class: 05

  4. arXiv:2312.15488  [pdf, other

    cs.CC

    The Zeta ($ζ$) Notation for Complex Asymptotes

    Authors: Anurag Dutta, K. Lakshmanan, John Harshith, A. Ramamoorthy, C. Pradeep, Pijush Kanti Kumar

    Abstract: Time Complexity is an important metric to compare algorithms based on their cardinality. The commonly used, trivial notations to qualify the same are the Big-Oh, Big-Omega, Big-Theta, Small-Oh, and Small-Omega Notations. All of them, consider time a part of the real entity, i.e., Time coincides with the horizontal axis in the argand plane. But what if the Time rather than completely coinciding wit… ▽ More

    Submitted 1 February, 2024; v1 submitted 24 December, 2023; originally announced December 2023.

  5. arXiv:2308.04331  [pdf, ps, other

    cs.IT cs.CR

    Preserving Sparsity and Privacy in Straggler-Resilient Distributed Matrix Computations

    Authors: Anindya Bijoy Das, Aditya Ramamoorthy, David J. Love, Christopher G. Brinton

    Abstract: Existing approaches to distributed matrix computations involve allocating coded combinations of submatrices to worker nodes, to build resilience to stragglers and/or enhance privacy. In this study, we consider the challenge of preserving input sparsity in such approaches to retain the associated computational efficiency enhancements. First, we find a lower bound on the weight of coding, i.e., the… ▽ More

    Submitted 8 August, 2023; originally announced August 2023.

  6. arXiv:2306.16734  [pdf, other

    cs.CV

    Unified View of Damage leaves Planimetry & Analysis Using Digital Images Processing Techniques

    Authors: Pijush Kanti Kumar, DeepKiran Munjal, Sunita Rani, Anurag Dutta, Liton Chandra Voumik, A. Ramamoorthy

    Abstract: The detection of leaf diseases in plants generally involves visual observation of patterns appearing on the leaf surface. However, there are many diseases that are distinguished based on very subtle changes in these visually observable patterns. This paper attempts to identify plant leaf diseases using image processing techniques. The focus of this study is on the detection of citrus leaf canker d… ▽ More

    Submitted 29 June, 2023; originally announced June 2023.

  7. arXiv:2306.16287  [pdf, other

    cs.CC math.OC

    A Review on Optimality Investigation Strategies for the Balanced Assignment Problem

    Authors: Anurag Dutta, K. Lakshmanan, A. Ramamoorthy, Liton Chandra Voumik, John Harshith, John Pravin Motha

    Abstract: Mathematical Selection is a method in which we select a particular choice from a set of such. It have always been an interesting field of study for mathematicians. Accordingly, Combinatorial Optimization is a sub field of this domain of Mathematical Selection, where we generally, deal with problems subjecting to Operation Research, Artificial Intelligence and many more promising domains. In a broa… ▽ More

    Submitted 28 June, 2023; originally announced June 2023.

  8. arXiv:2305.04435  [pdf, ps, other

    quant-ph cs.IT

    Communication complexity of entanglement assisted multi-party computation

    Authors: Ruoyu Meng, Aditya Ramamoorthy

    Abstract: We consider a quantum and classical version multi-party function computation problem with $n$ players, where players $2, \dots, n$ need to communicate appropriate information to player 1, so that a "generalized" inner product function with an appropriate promise can be calculated. The communication complexity of a protocol is the total number of bits that need to be communicated. When $n$ is prime… ▽ More

    Submitted 5 February, 2024; v1 submitted 7 May, 2023; originally announced May 2023.

    Comments: Modified layout so that the reference is shown correctly

  9. arXiv:2304.13685  [pdf, ps, other

    cs.IT

    Coded matrix computation with gradient coding

    Authors: Kyungrak Son, Aditya Ramamoorthy

    Abstract: Polynomial based approaches, such as the Mat-Dot and entangled polynomial codes (EPC) have been used extensively within coded matrix computations to obtain schemes with good recovery thresholds. However, these schemes are well-recognized to suffer from poor numerical stability in decoding. Moreover, the encoding process in these schemes involves linearly combining a large number of input submatric… ▽ More

    Submitted 10 May, 2023; v1 submitted 26 April, 2023; originally announced April 2023.

    Comments: 8 pages, 3 figures, 2 tables. Minor typos corrected

  10. arXiv:2302.12305  [pdf, ps, other

    cs.IT cs.LG

    Coded Matrix Computations for D2D-enabled Linearized Federated Learning

    Authors: Anindya Bijoy Das, Aditya Ramamoorthy, David J. Love, Christopher G. Brinton

    Abstract: Federated learning (FL) is a popular technique for training a global model on data distributed across client devices. Like other distributed training techniques, FL is susceptible to straggler (slower or failed) clients. Recent work has proposed to address this through device-to-device (D2D) offloading, which introduces privacy concerns. In this paper, we propose a novel straggler-optimal approach… ▽ More

    Submitted 23 February, 2023; originally announced February 2023.

    Comments: arXiv admin note: text overlap with arXiv:2301.12685

  11. arXiv:2301.12685  [pdf, ps, other

    cs.IT

    Distributed Matrix Computations with Low-weight Encodings

    Authors: Anindya Bijoy Das, Aditya Ramamoorthy, David J. Love, Christopher G. Brinton

    Abstract: Straggler nodes are well-known bottlenecks of distributed matrix computations which induce reductions in computation/communication speeds. A common strategy for mitigating such stragglers is to incorporate Reed-Solomon based MDS (maximum distance separable) codes into the framework; this can achieve resilience against an optimal number of stragglers. However, these codes assign dense linear combin… ▽ More

    Submitted 22 August, 2023; v1 submitted 30 January, 2023; originally announced January 2023.

  12. arXiv:2208.08085  [pdf, other

    cs.LG cs.CR cs.DC cs.IT

    Detection and Mitigation of Byzantine Attacks in Distributed Training

    Authors: Konstantinos Konstantinidis, Namrata Vaswani, Aditya Ramamoorthy

    Abstract: A plethora of modern machine learning tasks require the utilization of large-scale distributed clusters as a critical component of the training pipeline. However, abnormal Byzantine behavior of the worker nodes can derail the training and compromise the quality of the inference. Such behavior can be attributed to unintentional system malfunctions or orchestrated attacks; as a result, some nodes ma… ▽ More

    Submitted 13 May, 2023; v1 submitted 17 August, 2022; originally announced August 2022.

    Comments: 21 pages, 17 figures, 6 tables. The material in this work appeared in part at arXiv:2108.02416 which has been published at the 2022 IEEE International Symposium on Information Theory

  13. arXiv:2109.12070  [pdf, ps, other

    cs.IT

    A Unified Treatment of Partial Stragglers and Sparse Matrices in Coded Matrix Computation

    Authors: Anindya Bijoy Das, Aditya Ramamoorthy

    Abstract: The overall execution time of distributed matrix computations is often dominated by slow worker nodes (stragglers) within the clusters. Recently, different coding techniques have been utilized to mitigate the effect of stragglers where worker nodes are assigned the job of processing encoded submatrices of the original matrices. In many machine learning or optimization problems the relevant matrice… ▽ More

    Submitted 27 June, 2022; v1 submitted 24 September, 2021; originally announced September 2021.

  14. arXiv:2108.02416  [pdf, other

    cs.LG cs.CR cs.DC cs.IT

    Aspis: Robust Detection for Distributed Learning

    Authors: Konstantinos Konstantinidis, Aditya Ramamoorthy

    Abstract: State-of-the-art machine learning models are routinely trained on large-scale distributed clusters. Crucially, such systems can be compromised when some of the computing devices exhibit abnormal (Byzantine) behavior and return arbitrary results to the parameter server (PS). This behavior may be attributed to a plethora of reasons, including system failures and orchestrated attacks. Existing work s… ▽ More

    Submitted 24 January, 2022; v1 submitted 5 August, 2021; originally announced August 2021.

    Comments: 17 pages, 23 figures

  15. arXiv:2012.06065  [pdf, ps, other

    cs.IT cs.DC

    Coded sparse matrix computation schemes that leverage partial stragglers

    Authors: Anindya Bijoy Das, Aditya Ramamoorthy

    Abstract: Distributed matrix computations over large clusters can suffer from the problem of slow or failed worker nodes (called stragglers) which can dominate the overall job execution time. Coded computation utilizes concepts from erasure coding to mitigate the effect of stragglers by running 'coded' copies of tasks comprising a job; stragglers are typically treated as erasures. While this is useful, ther… ▽ More

    Submitted 23 September, 2021; v1 submitted 10 December, 2020; originally announced December 2020.

  16. arXiv:2010.04902  [pdf, other

    cs.LG cs.CR cs.DC cs.IT

    ByzShield: An Efficient and Robust System for Distributed Training

    Authors: Konstantinos Konstantinidis, Aditya Ramamoorthy

    Abstract: Training of large scale models on distributed clusters is a critical component of the machine learning pipeline. However, this training can easily be made to fail if some workers behave in an adversarial (Byzantine) fashion whereby they return arbitrary results to the parameter server (PS). A plethora of existing papers consider a variety of attack models and propose robust aggregation and/or comp… ▽ More

    Submitted 4 March, 2021; v1 submitted 10 October, 2020; originally announced October 2020.

    Comments: 17 pages, 12 figures

  17. arXiv:2002.12873  [pdf, ps, other

    cs.LG cs.IT math.NA stat.ML

    Federated Over-Air Subspace Tracking from Incomplete and Corrupted Data

    Authors: Praneeth Narayanamurthy, Namrata Vaswani, Aditya Ramamoorthy

    Abstract: In this work we study the problem of Subspace Tracking with missing data (ST-miss) and outliers (Robust ST-miss). We propose a novel algorithm, and provide a guarantee for both these problems. Unlike past work on this topic, the current work does not impose the piecewise constant subspace change assumption. Additionally, the proposed algorithm is much simpler (uses fewer parameters) than our previ… ▽ More

    Submitted 29 June, 2022; v1 submitted 28 February, 2020; originally announced February 2020.

    Comments: To appear in IEEE Transactions on Signal Processing. changes to writing; more general result provided from which previous result follows as special case

  18. arXiv:2002.03515  [pdf, ps, other

    cs.IT

    Straggler-resistant distributed matrix computation via coding theory

    Authors: Aditya Ramamoorthy, Anindya Bijoy Das, Li Tang

    Abstract: The current BigData era routinely requires the processing of large scale data on massive distributed computing clusters. Such large scale clusters often suffer from the problem of "stragglers", which are defined as slow or failed nodes. The overall speed of a computational job on these clusters is typically dominated by stragglers in the absence of a sophisticated assignment of tasks to the worker… ▽ More

    Submitted 9 February, 2020; originally announced February 2020.

    Comments: To appear in the Special Issue on Distributed, Streaming Machine Learning in the IEEE Signal Processing Magazine, 2020

  19. arXiv:1910.09505  [pdf, other

    stat.ML cs.CV cs.LG

    Multi-Resolution Weak Supervision for Sequential Data

    Authors: Frederic Sala, Paroma Varma, Jason Fries, Daniel Y. Fu, Shiori Sagawa, Saelig Khattar, Ashwini Ramamoorthy, Ke Xiao, Kayvon Fatahalian, James Priest, Christopher Ré

    Abstract: Since manually labeling training data is slow and expensive, recent industrial and scientific research efforts have turned to weaker or noisier forms of supervision sources. However, existing weak supervision approaches fail to model multi-resolution sources for sequential data, like video, that can assign labels to individual elements or collections of elements in a sequence. A key challenge in w… ▽ More

    Submitted 21 October, 2019; originally announced October 2019.

    Comments: NeurIPS 2019 (Conference on Neural Information Processing Systems)

  20. arXiv:1910.06515  [pdf, other

    cs.IT

    Numerically stable coded matrix computations via circulant and rotation matrix embeddings

    Authors: Aditya Ramamoorthy, Li Tang

    Abstract: Polynomial based methods have recently been used in several works for mitigating the effect of stragglers (slow or failed nodes) in distributed matrix computations. For a system with $n$ worker nodes where $s$ can be stragglers, these approaches allow for an optimal recovery threshold, whereby the intended result can be decoded as long as any $(n-s)$ worker nodes complete their tasks. However, the… ▽ More

    Submitted 9 June, 2021; v1 submitted 14 October, 2019; originally announced October 2019.

    Comments: 39 pages, 3 figures

  21. arXiv:1908.05666  [pdf, other

    cs.DC cs.DS cs.IT cs.LG

    Resolvable Designs for Speeding up Distributed Computing

    Authors: Konstantinos Konstantinidis, Aditya Ramamoorthy

    Abstract: Distributed computing frameworks such as MapReduce are often used to process large computational jobs. They operate by partitioning each job into smaller tasks executed on different servers. The servers also need to exchange intermediate values to complete the computation. Experimental evidence suggests that this so-called Shuffle phase can be a significant part of the overall execution time for s… ▽ More

    Submitted 16 April, 2020; v1 submitted 14 August, 2019; originally announced August 2019.

    Comments: 14 pages, 3 figures, full paper for IEEE TON submission. arXiv admin note: substantial text overlap with arXiv:1802.03049, arXiv:1901.07418

  22. arXiv:1907.08064  [pdf, ps, other

    cs.IT

    Efficient and Robust Distributed Matrix Computations via Convolutional Coding

    Authors: Anindya B. Das, Aditya Ramamoorthy, Namrata Vaswani

    Abstract: Distributed matrix computations -- matrix-matrix or matrix-vector multiplications -- are well-recognized to suffer from the problem of stragglers (slow or failed worker nodes). Much of prior work in this area is (i) either sub-optimal in terms of its straggler resilience, or (ii) suffers from numerical problems, i.e., there is a blow-up of round-off errors in the decoded result owing to the high c… ▽ More

    Submitted 1 June, 2020; v1 submitted 18 July, 2019; originally announced July 2019.

    Comments: 31 pages

  23. arXiv:1907.06801  [pdf, ps, other

    cs.IT cs.NI

    Asynchronous Coded Caching with Uncoded Prefetching

    Authors: Hooshang Ghasemi, Aditya Ramamoorthy

    Abstract: Coded caching is a technique that promises huge reductions in network traffic in content-delivery networks. However, the original formulation and several subsequent contributions in the area, assume that the file requests from the users are synchronized, i.e., they arrive at the server at the same time. In this work we formulate and study the coded caching problem when the file requests from the u… ▽ More

    Submitted 17 June, 2020; v1 submitted 15 July, 2019; originally announced July 2019.

    Comments: Accepted to the IEEE/ACM Transactions on Networking

  24. arXiv:1901.10674  [pdf, other

    cs.IT

    Universally Decodable Matrices for Distributed Matrix-Vector Multiplication

    Authors: Aditya Ramamoorthy, Li Tang, Pascal O. Vontobel

    Abstract: Coded computation is an emerging research area that leverages concepts from erasure coding to mitigate the effect of stragglers (slow nodes) in distributed computation clusters, especially for matrix computation problems. In this work, we present a class of distributed matrix-vector multiplication schemes that are based on codes in the Rosenbloom-Tsfasman metric and universally decodable matrices.… ▽ More

    Submitted 29 January, 2019; originally announced January 2019.

    Comments: 6 pages, 1 figure

  25. arXiv:1901.08716  [pdf, ps, other

    cs.IT cs.DC math.NA

    Distributed Matrix-Vector Multiplication: A Convolutional Coding Approach

    Authors: Anindya Bijoy Das, Aditya Ramamoorthy

    Abstract: Distributed computing systems are well-known to suffer from the problem of slow or failed nodes; these are referred to as stragglers. Straggler mitigation (for distributed matrix computations) has recently been investigated from the standpoint of erasure coding in several works. In this work we present a strategy for distributed matrix-vector multiplication based on convolutional coding. Our schem… ▽ More

    Submitted 24 January, 2019; originally announced January 2019.

  26. CAMR: Coded Aggregated MapReduce

    Authors: Konstantinos Konstantinidis, Aditya Ramamoorthy

    Abstract: Many big data algorithms executed on MapReduce-like systems have a shuffle phase that often dominates the overall job execution time. Recent work has demonstrated schemes where the communication load in the shuffle phase can be traded off for the computation load in the map phase. In this work, we focus on a class of distributed algorithms, broadly used in deep learning, where intermediate computa… ▽ More

    Submitted 30 October, 2021; v1 submitted 22 January, 2019; originally announced January 2019.

    Comments: 6 pages, 2 figures, full paper for ISIT 2019 paper

    Journal ref: 2019 IEEE International Symposium on Information Theory (ISIT), 2019, pp. 1427-1431

  27. arXiv:1811.02144  [pdf, ps, other

    cs.DC cs.IT cs.LG

    Erasure coding for distributed matrix multiplication for matrices with bounded entries

    Authors: Li Tang, Konstantinos Konstantinidis, Aditya Ramamoorthy

    Abstract: Distributed matrix multiplication is widely used in several scientific domains. It is well recognized that computation times on distributed clusters are often dominated by the slowest workers (called stragglers). Recent work has demonstrated that straggler mitigation can be viewed as a problem of designing erasure codes. For matrices $\mathbf A$ and $\mathbf B$, the technique essentially maps the… ▽ More

    Submitted 7 November, 2018; v1 submitted 5 November, 2018; originally announced November 2018.

  28. arXiv:1809.06242  [pdf, other

    cs.IT

    $C^{3}LES$: Codes for Coded Computation that Leverage Stragglers

    Authors: Anindya B. Das, Li Tang, Aditya Ramamoorthy

    Abstract: In distributed computing systems, it is well recognized that worker nodes that are slow (called stragglers) tend to dominate the overall job execution time. Coded computation utilizes concepts from erasure coding to mitigate the effect of stragglers by running "coded" copies of tasks comprising a job. Stragglers are typically treated as erasures in this process. While this is useful, there are iss… ▽ More

    Submitted 17 September, 2018; originally announced September 2018.

    Comments: 5 pages, 3 figures, to appear at the 2018 IEEE Information Theory Workshop (ITW), in Guangzhou, China

  29. arXiv:1805.03730  [pdf, other

    cs.IT

    Zero-error Function Computation on a Directed Acyclic Network

    Authors: Ardhendu Tripathy, Aditya Ramamoorthy

    Abstract: We study the rate region of variable-length source-network codes that are used to compute a function of messages observed over a network. The particular network considered here is the simplest instance of a directed acyclic graph (DAG) that is not a tree. Existing work on zero-error function computation in DAG networks provides bounds on the \textit{computation capacity}, which is a measure of the… ▽ More

    Submitted 9 May, 2018; originally announced May 2018.

    Comments: 18 pages, 2 figures, submitted to IEEE Transactions on Information Theory

  30. arXiv:1802.03049  [pdf, other

    cs.IT

    Leveraging Coding Techniques for Speeding up Distributed Computing

    Authors: Konstantinos Konstantinidis, Aditya Ramamoorthy

    Abstract: Large scale clusters leveraging distributed computing frameworks such as MapReduce routinely process data that are on the orders of petabytes or more. The sheer size of the data precludes the processing of the data on a single computer. The philosophy in these methods is to partition the overall job into smaller tasks that are executed on different servers; this is called the map phase. This is fo… ▽ More

    Submitted 8 February, 2018; originally announced February 2018.

  31. arXiv:1706.00101  [pdf, other

    cs.IT

    Coded Caching Schemes with Reduced Subpacketization from Linear Block Codes

    Authors: Li Tang, Aditya Ramamoorthy

    Abstract: Coded caching is a technique that generalizes conventional caching and promises significant reductions in traffic over caching networks. However, the basic coded caching scheme requires that each file hosted in the server be partitioned into a large number (i.e., the subpacketization level) of non-overlapping subfiles. From a practical perspective, this is problematic as it means that prior scheme… ▽ More

    Submitted 19 February, 2018; v1 submitted 31 May, 2017; originally announced June 2017.

    Comments: This paper was presented in part at the 2016 IEEE Workshop on Network Coding and Applications (NetCod) and will be presented in part at the 2017 IEEE International Symposium on Information Theory (ISIT)

  32. arXiv:1612.07773  [pdf, other

    cs.IT

    Sum-networks from undirected graphs: construction and capacity analysis

    Authors: Ardhendu Tripathy, Aditya Ramamoorthy

    Abstract: We consider a directed acyclic network with multiple sources and multiple terminals where each terminal is interested in decoding the sum of independent sources generated at the source nodes. We describe a procedure whereby a simple undirected graph can be used to construct such a sum-network and demonstrate an upper bound on its computation rate. Furthermore, we show sufficient conditions for the… ▽ More

    Submitted 22 December, 2016; originally announced December 2016.

    Comments: This has an extra Appendix section giving more information about Remark 2 of the original paper published in the 52nd Annual Allerton Conference on Communication, Control and Computing, 2014

  33. arXiv:1611.01887  [pdf, other

    cs.IT

    Sum-networks from incidence structures: construction and capacity analysis

    Authors: Ardhendu Tripathy, Aditya Ramamoorthy

    Abstract: A sum-network is an instance of a network coding problem over a directed acyclic network in which each terminal node wants to compute the sum over a finite field of the information observed at all the source nodes. Many characteristics of the well-studied multiple unicast network communication problem also hold for sum-networks due to a known reduction between instances of these two problems. In t… ▽ More

    Submitted 28 January, 2018; v1 submitted 6 November, 2016; originally announced November 2016.

    Comments: Version accepted for publication in IEEE Transactions on Information Theory

  34. arXiv:1607.07920  [pdf, other

    cs.IT

    Coded Caching with Low Subpacketization Levels

    Authors: Li Tang, Aditya Ramamoorthy

    Abstract: Caching is popular technique in content delivery networks that allows for reductions in transmission rates from the content-hosting server to the end users. Coded caching is a generalization of conventional caching that considers the possibility of coding in the caches and transmitting coded signals from the server. Prior results in this area demonstrate that huge reductions in transmission rates… ▽ More

    Submitted 26 July, 2016; originally announced July 2016.

  35. arXiv:1605.01424  [pdf, other

    cs.IT

    Coded Caching for Networks with the Resolvability Property

    Authors: Li Tang, Aditya Ramamoorthy

    Abstract: Coded caching is a recently proposed technique for dealing with large scale content distribution over the Internet. As in conventional caching, it leverages the presence of local caches at the end users. However, it considers coding in the caches and/or coded transmission from the central server and demonstrates that huge savings in transmission rate are possible when the server and the end users… ▽ More

    Submitted 4 May, 2016; originally announced May 2016.

  36. arXiv:1601.07228  [pdf, ps, other

    cs.IT

    On Computation Rates for Arithmetic Sum

    Authors: Ardhendu Tripathy, Aditya Ramamoorthy

    Abstract: For zero-error function computation over directed acyclic networks, existing upper and lower bounds on the computation capacity are known to be loose. In this work we consider the problem of computing the arithmetic sum over a specific directed acyclic network that is not a tree. We assume the sources to be i.i.d. Bernoulli with parameter $1/2$. Even in this simple setting, we demonstrate that upp… ▽ More

    Submitted 26 January, 2016; originally announced January 2016.

    Comments: Full paper for ISIT 2016 submission

  37. arXiv:1504.05618  [pdf, other

    cs.IT

    Capacity of Sum-networks for Different Message Alphabets

    Authors: Ardhendu Tripathy, Aditya Ramamoorthy

    Abstract: A sum-network is a directed acyclic network in which all terminal nodes demand the `sum' of the independent information observed at the source nodes. Many characteristics of the well-studied multiple-unicast network communication problem also hold for sum-networks due to a known reduction between instances of these two problems. Our main result is that unlike a multiple unicast network, the coding… ▽ More

    Submitted 21 April, 2015; originally announced April 2015.

  38. arXiv:1501.06003  [pdf, other

    cs.IT

    Improved Lower Bounds for Coded Caching

    Authors: Hooshang Ghasemi, Aditya Ramamoorthy

    Abstract: Content delivery networks often employ caching to reduce transmission rates from the central server to the end users. Recently, the technique of coded caching was introduced whereby coding in the caches and coded transmission signals from the central server are considered. Prior results in this area demonstrate that carefully designing the placement of content in the caches and designing appropria… ▽ More

    Submitted 14 February, 2016; v1 submitted 23 January, 2015; originally announced January 2015.

    Comments: 31 pages, 12 figures

  39. arXiv:1408.5780  [pdf, other

    cs.IT

    Fractional repetition codes with flexible repair from combinatorial designs

    Authors: Oktay Olmez, Aditya Ramamoorthy

    Abstract: Fractional repetition (FR) codes are a class of regenerating codes for distributed storage systems with an exact (table-based) repair process that is also uncoded, i.e., upon failure, a node is regenerated by simply downloading packets from the surviving nodes. In our work, we present constructions of FR codes based on Steiner systems and resolvable combinatorial designs such as affine geometries,… ▽ More

    Submitted 8 February, 2016; v1 submitted 25 August, 2014; originally announced August 2014.

    Comments: 27 pages in IEEE two-column format. IEEE Transactions on Information Theory (to appear)

  40. arXiv:1305.5764  [pdf, other

    cs.IT

    Replication based storage systems with local repair

    Authors: Oktay Olmez, Aditya Ramamoorthy

    Abstract: We consider the design of regenerating codes for distributed storage systems that enjoy the property of local, exact and uncoded repair, i.e., (a) upon failure, a node can be regenerated by simply downloading packets from the surviving nodes and (b) the number of surviving nodes contacted is strictly smaller than the number of nodes that need to be contacted for reconstructing the stored file. O… ▽ More

    Submitted 24 May, 2013; originally announced May 2013.

  41. arXiv:1302.4474  [pdf, ps, other

    cs.IT cs.NI

    On the multiple unicast capacity of 3-source, 3-terminal directed acyclic networks

    Authors: Shurui Huang, Aditya Ramamoorthy

    Abstract: We consider the multiple unicast problem with three source-terminal pairs over directed acyclic networks with unit-capacity edges. The three $s_i-t_i$ pairs wish to communicate at unit-rate via network coding. The connectivity between the $s_i - t_i$ pairs is quantified by means of a connectivity level vector, $[k_1 k_2 k_3]$ such that there exist $k_i$ edge-disjoint paths between $s_i$ and $t_i$.… ▽ More

    Submitted 18 February, 2013; originally announced February 2013.

    Comments: To appear in the IEEE/ACM Transactions on Networking

  42. arXiv:1302.0212  [pdf, ps, other

    cs.IT

    PREMIER - PRobabilistic Error-correction using Markov Inference in Errored Reads

    Authors: Xin Yin, Zhao Song, Karin Dorman, Aditya Ramamoorthy

    Abstract: In this work we present a flexible, probabilistic and reference-free method of error correction for high throughput DNA sequencing data. The key is to exploit the high coverage of sequencing data and model short sequence outputs as independent realizations of a Hidden Markov Model (HMM). We pose the problem of error correction of reads as one of maximum likelihood sequence detection over this HMM.… ▽ More

    Submitted 1 February, 2013; originally announced February 2013.

    Comments: Submitted to ISIT 2013

  43. arXiv:1210.2110  [pdf, other

    cs.IT

    Repairable Replication-based Storage Systems Using Resolvable Designs

    Authors: Oktay Olmez, Aditya Ramamoorthy

    Abstract: We consider the design of regenerating codes for distributed storage systems at the minimum bandwidth regeneration (MBR) point. The codes allow for a repair process that is exact and uncoded, but table-based. These codes were introduced in prior work and consist of an outer MDS code followed by an inner fractional repetition (FR) code where copies of the coded symbols are placed on the storage nod… ▽ More

    Submitted 7 October, 2012; originally announced October 2012.

  44. arXiv:1111.0595  [pdf, ps, other

    cs.IT

    An achievable region for the double unicast problem based on a minimum cut analysis

    Authors: Shurui Huang, Aditya Ramamoorthy

    Abstract: We consider the multiple unicast problem under network coding over directed acyclic networks when there are two source-terminal pairs, $s_1-t_1$ and $s_2-t_2$. Current characterizations of the multiple unicast capacity region in this setting have a large number of inequalities, which makes them hard to explicitly evaluate. In this work we consider a slightly different problem. We assume that we on… ▽ More

    Submitted 2 November, 2011; originally announced November 2011.

    Comments: ITW, 2011

  45. arXiv:1106.2792  [pdf, ps, other

    cs.IT

    Algebraic codes for Slepian-Wolf code design

    Authors: Shizheng Li, Aditya Ramamoorthy

    Abstract: Practical constructions of lossless distributed source codes (for the Slepian-Wolf problem) have been the subject of much investigation in the past decade. In particular, near-capacity achieving code designs based on LDPC codes have been presented for the case of two binary sources, with a binary-symmetric correlation. However, constructing practical codes for the case of non-binary sources with a… ▽ More

    Submitted 14 June, 2011; originally announced June 2011.

    Comments: 5 pages, accepted by ISIT 2011

  46. arXiv:1101.3285  [pdf, ps, other

    cs.IT

    A note on the multiple unicast capacity of directed acyclic networks

    Authors: Shurui Huang, Aditya Ramamoorthy

    Abstract: We consider the multiple unicast problem under network coding over directed acyclic networks with unit capacity edges. There is a set of n source-terminal (s_i - t_i) pairs that wish to communicate at unit rate over this network. The connectivity between the s_i - t_i pairs is quantified by means of a connectivity level vector, [k_1 k_2 ... k_n] such that there exist k_i edge-disjoint paths betwee… ▽ More

    Submitted 24 January, 2011; v1 submitted 17 January, 2011; originally announced January 2011.

    Comments: ICC, 2011

  47. arXiv:1101.3068  [pdf, ps, other

    cs.IT

    Degrees of Freedom Region for an Interference Network with General Message Demands

    Authors: Lei Ke, Aditya Ramamoorthy, Zhengdao Wang, Huarui Yin

    Abstract: We consider a single hop interference network with $K$ transmitters and $J$ receivers, all having $M$ antennas. Each transmitter emits an independent message and each receiver requests an arbitrary subset of the messages. This generalizes the well-known $K$-user $M$-antenna interference channel, where each message is requested by a unique receiver. For our setup, we derive the degrees of freedom (… ▽ More

    Submitted 30 October, 2011; v1 submitted 16 January, 2011; originally announced January 2011.

    Comments: 26 pages, 5 figures, revised version, submitted to IEEE Transactions on Information Theory

  48. arXiv:1011.3550  [pdf, ps, other

    cs.IT

    Overlay Protection Against Link Failures Using Network Coding

    Authors: Ahmed E. Kamal, Aditya Ramamoorthy, Long Long, Shizheng Li

    Abstract: This paper introduces a network coding-based protection scheme against single and multiple link failures. The proposed strategy ensures that in a connection, each node receives two copies of the same data unit: one copy on the working circuit, and a second copy that can be extracted from linear combinations of data units transmitted on a shared protection path. This guarantees instantaneous recove… ▽ More

    Submitted 15 November, 2010; originally announced November 2010.

    Comments: 14 pages, 10 figures, accepted by IEEE/ACM Transactions on Networking

  49. arXiv:1010.1331  [pdf, ps, other

    cs.IT

    Improved Combinatorial Algorithms for Wireless Information Flow

    Authors: Cuizhu Shi, Aditya Ramamoorthy

    Abstract: The work of Avestimehr et al. '07 has recently proposed a deterministic model for wireless networks and characterized the unicast capacity C of such networks as the minimum rank of the adjacency matrices describing all possible source-destination cuts. Amaudruz & Fragouli first proposed a polynomial-time algorithm for finding the unicast capacity of a linear deterministic wireless network in their… ▽ More

    Submitted 7 October, 2010; originally announced October 2010.

    Comments: 6 pages, 2 figures, presented at Allerton 2010

  50. arXiv:1006.5036  [pdf, ps, other

    cs.IT

    Performance evaluation for ML sequence detection in ISI channels with Gauss Markov Noise

    Authors: Naveen Kumar, Aditya Ramamoorthy, Murti Salapaka

    Abstract: Inter-symbol interference (ISI) channels with data dependent Gauss Markov noise have been used to model read channels in magnetic recording and other data storage systems. The Viterbi algorithm can be adapted for performing maximum likelihood sequence detection in such channels. However, the problem of finding an analytical upper bound on the bit error rate of the Viterbi detector in this case has… ▽ More

    Submitted 25 June, 2010; originally announced June 2010.

    Comments: This paper will appear in GlobeCom 2010