Optimal Jamming Over Additive Noise: Vector Source-Channel Case
|
|
- Piers O’Neal’
- 6 years ago
- Views:
Transcription
1 Fifty-first Annual Allerton Conference Allerton House, UIUC, Illinois, USA October 2-3, 2013 Optial Jaing Over Additive Noise: Vector Source-Channel Case Erah Akyol and Kenneth Rose Abstract This paper extends the recent analysis of optial zero-delay jaing proble, specialized to scalar sources over scalar additive noise channels, to vector spaces. Particularly, we find the saddle point solution to the jaing proble in vector spaces, within its ost general, non-gaussian setting; the proble has been open even for the iportant special case of Gaussian source and channel. Siilar to the scalar setting, linearity conditions for encoding and decoding appings play a pivotal role in jaing, in the sense that the optial jaing strategy is to effectively force both transitter and receiver to default to linear appings, i.e., the jaer ensures, whenever possible, that the transitter and receiver cannot benefit fro non-linear strategies. The optial strategy is then randoized linear encoding for transitter and generating independent noise for the jaing. Moreover, the optial jaer allocates power according to the well-known waterfilling over the eigenvalues of the channel noise, and the density of the jaing noise that render the optial encoding and decoding appings linear, is deterined by the power constraints and the source density. I. INTRODUCTION We consider the proble of optial jaing, by a power constrained agent, over additive noise channel, in vector spaces. This proble was solved in [1], [2] for scalar Gaussian source and scalar channel. The saddle point solution to this zero-su gae, derived for Gaussian sourcechannel pair, involves randoized linear apping for the transitter and generating independent, Gaussian noise as the jaer output and a linear decoder. We recently extended this work to non-gaussian scalar sources and scalar channels [3], and showed that the linearity of encoding and decoding appings is essential while Gaussianity of the jaer is erely to satisfy the linearity conditions for the Gaussian source and channel. In this paper, by leveraging the recent results on conditions for linearity of optial estiation and counication appings, [4], [5], we extend the scalar analysis to vector sources and channels. The contributions of this paper are: We derive the necessary and sufficient condition (called the vector atching condition ) on the jaing noise density to ensure linearity of the optial transitter and the receiver, within the vector setting. The condition is uch ore involved than the scalar one, due to dependencies aong the source and channel coponents. The jaer ais to render both encoder and decoder linear appings, while allocates jaing power over This work is supported in part by the NSF under grants CCF and CCF Erah Akyol and Kenneth Rose are with Departent of Electrical and Coputer Engineering, University of California at Santa Barbara, CA 93106, USA {eakyol, rose}@ece.ucsb.edu Transitter Fig. 1. Y Jaer + N U The jaing proble. Receiver the channel eigenvalues by the well known waterfilling solution. We discover an analogy between zero-delay vector jaing and vector rate-distortion and vector channel capacity, in ters of power/rate/jaing power allocation as waterfilling. This paper is organized as follows. In Section II, we present the proble definition and preliinaries. In Section III, we review the prior results related to jaing, estiation and counication probles. In Section IV, we derive the linearity result and then the ain result on optial jaing. Finally, we discuss the future directions in Section V. II. PROBLEM DEFINITION Let R and R + denote the respective sets of real nubers and positive real nubers. Let E( ), P( ) and denote the expectation, probability and convolution operators, respectively. Let Bern(p) denote the Bernoulli rando variable, taking values in { 1, 1} with probability {p, 1 p}. The Gaussian density with ean µ and variance σ 2 is denoted as df (x) dx N (µ, σ 2 ). Let f (x) denote the first order derivative of the function f( ). All logariths in the paper are natural logariths and ay in general be coplex, and the integrals are, in general, Lebesgue integrals. Let us define the set S as the set of Borel easurable R R k appings. In general, lowercase letters (e.g., c) denote scalars, boldface lowercase (e.g., x) vectors, uppercase (e.g., C, ) atrices and rando variables. I denotes the identity atrix. R, and R denote the auto-covariance of and cross covariance of and respectively. A T denotes the transpose of atrix A. (x) + denotes the function ax(0,x). denotes the gradient and x denotes the partial gradient with respect to x. Throughout this paper, we assue that the source is an - diensional vector with zero ean and covariance R. The ˆ /13/$ IEEE 1329
2 channel noise is additive k-diensional Gaussian, of zero ean and covariance R N. Covariance atrices R and R N allow the diagonalization R Q Λ Q T, and R N Q N Λ N Q T N (1) where Q Q T Q N Q T N I and Λ and Λ N are diagonal atrices, having ordered eigenvalues as entries, i.e., Λ diag{λ } and Λ N diag{λ N } where λ and λ are ordered (descending) eigenvalues and Q T and QT N are the KLT atrices of the source and the channel, respectively. We will ake use of the following auxiliary lea, see eg. [6] for a proof. Lea 1. Let λ and λ N be two ordered vectors in R + with descending entries (λ (1) λ (2),...,λ ()) and Π denote any perutation of the indices {1, 2,...,}, then and in Π λ (Π(i))λ N (i) λ (i)λ N ( i) (2) ax Π λ ((i))λ N (Π(i)) λ (i)λ N (i) (3) We consider the general counication syste whose block diagra is shown in Figure 1. Source R is apped into Y R k by function g T ( ) Sand transitted over an additive noise channel. The adversary receives the sae signal and generates the jaing signal through function g A ( ) Swhich is added to the channel output, and ais to coproise the transission of the source. The received signal U Y + + N is apped by the decoder to an estiate ˆ via function h( ) S. The zero ean noise N is assued to be independent of the source. The source density is denoted f ( ) and the noise density is f N ( ) with characteristic functions F (ω) and F N (ω), respectively. The overall cost, easured as the ean squared error (MSE) between source and its estiate at the decoder ˆ, is a function of the transitter, jaer and the receiver appings: J(g T ( ), g A ( ), h( )) E{ ˆ 2 }. (4) Transitter g T ( ) :R R k and receiver h( ) :R R k seek to iniize this cost while the adversary (jaer) seeks to axiize it by appropriate choice of g A ( ) :R R k. Power constraints ust be satisfied by the transitter and jaer E{ g T () 2 } P T, (5) E{ g A () 2 } P A. (6) The conflict of interest underlying this proble iplies that the optial transitter-receiver-adversarial policy is the saddle point solution (g T ( ),g A ( ),h ( )) satisfying the set of inequalities J(g T, g A, h ) J(g T, g A, h ) J(g T, g A, h). (7) Fig. 2. U Estiator The estiation proble. III. PRIOR WORK The jaing proble, in the for defined here, was studied in [1], [2], for scalar Gaussian sources and channels. The proble of interest is intrinsically connected to the fundaental probles of estiation theory and the theory of zero-delay source-channel coding. In particular, conditions for linearity of optial estiation [4] and optial appings in counications [5] are relevant to our proble here. We start with the estiation proble. A. Estiation Proble Consider the setting in Figure 2. The estiator receives U, the noisy version of the source and generates the estiate ˆ by the function h : R R such that MSE, E{( ˆ) 2 } is iniized. It is well known that, when a Gaussian source is containated with Gaussian noise, a linear estiator iniizes MSE. Recent work [4] analyzed, ore generally, the conditions for linearity of optial estiators. Here, we present the basic result pertaining to the jaing proble considered here. Specifically, we present the necessary and sufficient condition for source and channel distributions such that the linear estiator h(u) κ κ+1 ˆ U is optial where κ σ2 σ 2 is the SNR. Theore 1 ( [4]). Given SNR level κ, and noise with characteristic function F (ω), there exists a source for which the optial estiator is linear if and only if F (ω) F κ (ω). (8) Given a valid characteristic function F (ω), and for soe κ R +, the function F κ (ω) ay or ay not be a valid characteristic function, which deterines the existence of a atching source. For exaple, atching is guaranteed for integer κ and it is also guaranteed for infinitely divisible. More coprehensive discussion of the conditions on κ and F (ω) for F κ (ω) to be a valid characteristic function can be found in [4]. Extension of the conditions to the vector case is nontrivial due to the dependencies across coponents of the source and noise. Forally, we consider the proble of estiating the vector source R given the observation Y +, where and R are independent, as shown in Figure 2. Let Q be the eigenatrix of R R 1, and U Q 1 and let eigenvalues λ 1,...,λ be the eleents of the diagonal atrix Λ, i.e., the following holds: R R 1 U 1 ΛU (9)
3 Transitter Fig. 3. Y + U The counication setting. Receiver We are looking for the conditions on F (ω) and F (ω) such that h(y ) KY with K R (R + R ) 1 iniizes the estiation error E{ h(y ) 2 }. By following a siilar approach to the scalar case, the necessary and sufficient condition for linearity was derived in [4], reproduced below: Theore 2 ( [4]). Let the characteristic functions of the transfored source and noise (U and U) be F U (ω) and F U (ω). The necessary and sufficient condition for linearity of optial estiation is: log F U (ω) B. Counication Proble λ i log F U (ω), 1 i (10) In [5], a counication scenario whose block diagra is shown in Figure 3 was studied. In this setting, a scalar source R is apped into Y R by function g S, and transitted over an additive noise channel. The channel output U Y + is apped by the decoder to the estiate ˆ via function h S. The zero ean noise is assued to be independent of the source. The source density is denoted f ( ) and the noise density is f ( ) with characteristic functions F (ω) and F (ω), respectively. The objective is to iniize, over the choice of encoder g and decoder h, the distortion D E{( ˆ) 2 }, (11) subject to the average transission power constraint, E{g 2 ()} P T. (12) The necessary and sufficient condition for linearity for both appings is given by the following theore. Theore 3 ( [5]). For a given power constraint P T, noise with variance σ 2 and characteristic function F (ω), source with variance σ 2 and characteristic function F (ω), the optial encoder and decoder appings are linear if and only if F (αω) F κ (ω) (13) where κ P T σ 2 and α PT. σ 2 Here, we first extend this result to vector spaces, in Section III-b. Towards, deriving this extension, we need the optial encoding and decoding transfors for a general counication proble with source and channel noise covariances R and R N and total encoding power liit P T, here we ˆ reproduce the classical result due to [7] (see also [8], [9] for alternative derivations of this result.). Theore 4 ( [7] [9]). The encoding transfor that iniizes the MSE distortion subject to the power constraint P T is C Q N ΣQ T (14) where Σ is diagonal power allocation atrix. Moreover the total distortion is w ( 2 λ (i)λ N ( i) D P T + w + λ (i) (15) λ N ( i) w+1 where w is the nuber of active channels deterined by the power P T. Reark 1. Distortion expression (15) has an interesting interpretation of power allocation as reverse water-filling over the source eigenvalues. As we will show in the next section, the optial jaer also perfors power allocation as water-filling over the channel eigenvalues. Reark 2. Note that the ordering of the eigenvalues are so that the largest source eigenvalue is ultiplied with the sallest of the and so on, which physically eans that the encoder uses the best channel for the sallest variance source coponent, and so on. This is siply due to Lea 1. Assuption 1: In this paper, we assue the source and the channel have atched diensions, i.e., k (which eans bandwidth copression or expansion). This assuption is essential in the sense that when k the jaer cannot ensure linearity of g() and h(y ). A well known exaple is when 2and k 1, the optial appings are highly nonlinear, even in the case of Gaussian source and channel (see eg. [5], [10]and there references there in for details). Assuption 2: Throughout this paper, we assue that P T is high enough, so that all the channels are active, (each channel is allocated strictly positive power), i.e., w, hence (15) can be rewritten as J(λ, λ N ) ( λ (i)λ N ( i) P T + λ N (i) 2 (16) This assuption is not necessary but significantly siplifies the results. C. Gaussian Scalar Jaing Proble The proble of transitting independent and identically distributed Gaussian rando variables over a Gaussian channel in the presence of an additive jaer was considered in [1], [2]. In [2] a gae theoretic approach was developed and it was shown that the proble adits a ixed saddle point solution where the optial transitter and receiver eploy a randoized strategy. The randoization inforation can 1331
4 be sent over a side channel between transitter and receiver or it could be viewed as the inforation generated by the third party and observed by both transitter and receiver 1. Surprisingly, the optial jaing strategy ignores the input to the jaer and erely generates Gaussian noise, independent of the source. Theore 5 ( [1], [2]). The optial encoding function for the transitter is randoized linear apping: Y (i) γ(i)α T (i), (17) where γ(i) is i.i.d. Bernoulli ( 1 2 ) over the alphabet { 1, 1} and α T PT σ 2 Gaussian output (i) γ(i) Bern( 1 2 ) (18). The optial jaer generates i.i.d. (i) N(0,P A ) (19) where (i) is independent of the source (i). The proof of Theore 5 relies on the well known fact that for a Gaussian source over a Gaussian channel, zerodelay linear appings achieve the perforance of the asyptotically high delay optial source-channel counication syste [11]. This fact is unique to the Gaussian sourcechannel pair, hence it ight be tepting to conclude that the saddle point solution in Theore 5 can only be obtained in the all Gaussian setting. Perhaps surprisingly, in [3], we showed that there are infinitely any source-noise pairs that yield a saddle point solution siilar to Theore 5. We also proved that the linearity property of the optial transitter and receiver at the saddle point solution still holds, while the Gaussianity of the jaer output in the early special case was erely a eans to satisfy this linearity condition, and does not hold in general. Here, we reproduce the ain result in [3] for the scalar, non-gaussian jaing proble. Theore 6 ( [3]). For the jaing proble, the optial encoding function for the transitter is randoized linear apping: Y (i) γ(i)α T (i), (20) where γ(i) is i.i.d. Bernoulli ( 1 2 ) over the alphabet { 1, 1} and α T PT σ 2 γ(i) Bern( 1 2 ) (21). The optial jaing function is to generate i.i.d. output (i) with characteristic function F (ω) F β (α T ω) F N (ω) (22) where (i) is independent of the adversarial input (i) and β P A+σ 2 N P T. 1 In practice, randoization can be achieved by (pseudo)rando nuber generators at the transitter and receiver using the sae seed. IV. MAIN RESULTS A. An Upper Bound on Distortion Based on Linear Mappings In this section, we present a new lea that is used to upper bound the distortion of any zero-delay counication syste by that of the fixed, best linear encoder and decoder. A scalar version of this lea appeared in [3], here we extend this result to vector spaces. Lea 2. Consider the proble setting in Figure 1. For any given jaer, the distortion achievable by the transitterreceiver, D, is upper bounded by the distortion achieved by linear encoder and decoder 2 λ (i) ax(θ, λ N ( i)) J u P T + ax(θ, λ N (i)) (23) where θ satisfies the water-filling condition: (θ λ N (i)) + P A. (24) Note that this upper bound is deterined by only second order statistics, regardless of the noralized densities. Proof: The proof is based on the fact that the transitter and receiver can always use the linear appings that satisfy the power constraints. The jaer will try to ake all effective noise eigenvalues identical since in Π J(λ (Π), λ N ) (25) is axiized when λ N is unifor (see eg. [12] for a proof based on ajorization). The effective channel eigenvalues are upper bounded by the vector σ λ N +λ where λ is the ascending ordered eigenvalues of the jaer noise. To achieve this upper bound, the jaer sets R Q N Λ Q T N, i.e., the eigenvectors of the noise and the jaer ust be identical. If P A is not large enough, then the solution of is known to be the waterfilling solution ; intuitively the jaer ais to ake entries of σ as close to unifor as possible. Reark 3. Note that the optial jaer perfors waterfilling over the channel eigenvalues while the encoder allocates power according to reverse water-filling over the source eigenvalues. This observation parallels the inforation theoretical (asyptotically high delay) water-filling duality, where the rate distortion optial vector encoding schee allocates total rate by reverse water-filling over source eigenvalues and vector channel capacity achieving schee allocates power over channel eigenvalues by waterfilling. Reark 4. Lea 2 is the key result that connects the recent results on linearity of optial estiation and counication appings to the jaing proble. Lea 2 iplies that the optial strategy for a jaer which can 1332
5 only control the density of the additive noise channel, is to force the transitter and receiver to use linear appings. B. Conditions for Linearity of Counication Mappings in Vector Spaces For source R and channel R, we derive the necessary and sufficient condition for siultaneous linearity of optial encoder and decoder. In [5], it was shown that the counication proble is convex in the density of the channel input for the scalar setting. It is easy to extend this convexity result to atched diensions, see Assuption 1. Moreover, by siply extending the related scalar result in [3], it is straightforward to show that the optial decoder is linear if and only if the optial decoder is linear. Hence, we will investigate the conditions for linearity of optial decoder given that the encoder is linear. Towards deriving our results, we will ake use of the following auxiliary lea fro atrix analysis. Lea 3. Given a function f : R n R, atrix A R n and vector x R xf(ax) A T f(ax) (26) See Appendix II. Next, we present the necessary and sufficient condition for linearity of optial decoder for a given, optial linear decoder. Theore 7. Let the characteristic functions of the transfored source and noise (ΣQ T and QT ) be F ΣQ T (ω) and F Q T (ω). The necessary and sufficient condition for linearity of optial estiation is: log F ΣQ T (ω) where S ΣΛ ΣΛ 1. C. Main Result S i log F QT (ω), 1 i (27) Our ain result concerns the optial strategy for the transitter, the adversary and the receiver in Figure 1 for the transission index i. Theore 8. For the jaing proble, the optial encoding function for the transitter is: Y (i) γ(i)c(i), (28) where γ(i) is i.i.d. Bernoulli ( 1 2 ) over the alphabet { 1, 1} γ(i) Bern( 1 2 ) (29) and C Q N ΣQ T. The optial jaing function is to generate i.i.d. output (i), independent of (i), that satisfies: log F ΣQ T (ω) log F QT S i for S ΣΛ ΣΛ 1 and N (N+) (ω), 1 i (30) R Q N λ Q T N (31) where λ (i) (θ λ N (i)) + (32) and θ satisfies the water-filling condition: (θ λ N (i)) + P A (33) The optial receiver is h(u(i)) R C T (CR C T + R N + R ) 1 U(i), (34) and total cost is 2 λ (i) ax(θ, λ N ( i)) J P T + ax(θ, λ N (i)) (35) Moreover, this saddle point solution is (alost surely) unique. Proof: The proof follows fro verification of the saddle point inequalities given in (7), following the approach in [13], and is erely a siple extension of the scalar result in [3]. The essential idea of the proof is that the jaer renders the channel noise to atch the source in a way that the optial encoding and decoding appings are linear. The condition for such atching is given in Theore 7. Moreover, R shares the sae eigenvectors as R N as explained in the proof of Lea 2. V. DISCUSSION In this paper, we studied the vector jaing proble. Siilar to scalar setting, linearity conditions for encoding and decoding appings play the key role in jaing, in the sense that the optial jaing strategy is to effectively force both transitter and receiver to default to linear appings. Hence, the optial strategy is randoized linear encoding for transitter and generating independent noise for the jaing. The eigenvalues of the optial jaing noise are allocated according to water-filling over the eigenvalues of the channel noise, and the density of the jaing noise is atched to source and the channel to render the appings linear. We derived the atching condition to be satisfied by the jaer and also the second order statistics of the jaing noise. The power allocation solutions in the zero-delay probles ( water-filling for jaer and reverse water-filling for the transitter) nicely parallels the resource allocation strategies in asyptotically high delay (Shannon type) probles, such as rate allocation in rate-distortion (reverse water-filling) and power allocation in channel capacity (water-filling). Throughout this paper, we assued that a atching jaing noise, that forces the transitter and receiver to use linear appings, can always be generated by the jaer. The case for which this source-channel-jaer atching is not possible was analyzed for scalar sources and channels in our recent work [3]. Intuitively, the jaer approxiates the atching solution in soe polynoials which are orthogonal 1333
6 under the easure of the channel output. The analysis for vector settings can be carried out siilarly, and is oitted since it is orthogonal to the focus of the current paper. APPENDI I DERIVATION OF THE MATCHING CONDITION Let us rewrite the MSE optial decoder, h(y) E{ y} using Bayes rule and independence of and : xf (x)f (y Cx) dx h(y) (36) f (x)f (y Cx) dx Plugging h(y) Ky in (36) we obtain, Ky f (x)f (y Cx) dx xf (x)f (y Cx) dx Taking the Fourier transfor of both sides (37) jk ω [F (Cω)F (ω)] jc 1 [ ω F (Cω)]F (ω) (38) and rearranging ters, we get C 1 K 1 F (Cω) F (Cω) K 1 F (ω) F (ω) Using log F (Cω) 1 F (Cω) F (Cω), (39) log F (Cω) (C 1 K) 1 K log F (ω) (40) Note that (see eg. [14]) K R C T (CR C T + R ) 1 (41) Let use define β (C 1 K) 1 K then, β (C 1 R C T (CR C T +R ) 1 ) 1 It is easy to see that and hence Plugging (14) in (45), we have and hence R C T (CR C T +R ) 1 (42) β 1 R (CR C T ) 1 (43) β (CR C T )R 1 (44) β Q (ΣΛ ΣΛ 1 )QT (45) log F (Cω) Q (ΣΛ ΣΛ 1 )QT log F (ω) (46) defining S (ΣΛ ΣΛ 1 ), we have Q T ω log F (Cω) SQ T log F (ω) (47) Let us define ω Q T ω, hence ω Q ω. Plugging this in (47), we have Q T Q ω log F (CQ ω) SQ T Q ω log F (Q ω) (48) Using Lea 3, we can rewrite (48) as ω log F (C T Q ω) S ω log F (Q ω) (49) noting that C T Q Q Σ and the characteristic functions of the source and noise after transforation can be written in ters of the known characteristic functions F (ω) and F (ω), specifically F ΣQ T (ω) F (ΣQ T ω) and F Q T (ω) F (Q ω), we have ω log F ΣQ T ( ω) S ω log F Q T ( ω) (50) Using the fact that S is diagonal, we convert (50) to the set of scalar differential equations of (30). Converse can be shown by retracing the steps in the derivation of the necessity. Note that none of these steps, (36)-(47), introduce any loss of generality, hence retracing back fro (47) to (36), we show that if (47) is satisfied, the optial decoder is linear given the encoder is linear. APPENDI II PROOF OF LEMMA 3 By the chain rule we have, f(ax) n f(ax) [Ax] k (51) x i [Ax] k [x] i k1 n f(ax) ([A] k x) [Ax] k [x] i (52) n f(ax) [A] ki [Ax] k (53) n k f(ax)[a] ki (54) k1 k1 k1 [A] i T f(ax) (55) It follows fro (55) that x f(ax) A T f(ax). REFERENCES [1] T. Başar, The Gaussian test channel with an intelligent jaer, IEEE Transactions on Inforation Theory, vol. 29, no. 1, pp , [2] T. Başar and Y.W. Wu, A coplete characterization of iniax and axiin encoder-decoder policies for counication channels with incoplete statistical description, IEEE Transactions on Inforation Theory,, vol. 31, no. 4, pp , [3] E. Akyol, K. Rose, and T. Başar, On optial jaing over an additive noise channel, draft, available online at: [4] E. Akyol, K. Viswanatha, and K. Rose, On conditions for linearity of optial estiation, IEEE Transactions on Inforation Theory, vol. 58, no. 6, pp , [5] E. Akyol, K. Viswanatha, K. Rose, and Rastad T., On zero-delay source-channel coding, IEEE Transactions on Inforation Theory, in review, available online at: [6] R.A. Horn and C.R. Johnson, Matrix Analysis, Cabridge University Press, [7] K.H. Lee and D. Petersen, Optial linear coding for vector channels, IEEE Transactions on Counications, vol. 24, no. 12, pp , [8] T. Başar, B. Sankur, and H. Abut, Perforance bounds and optial linear coding for discrete-tie ultichannel counication systes (corresp.), IEEE Transactions on Inforation Theory, vol. 26, no. 2, pp , [9] E. Akyol and K. Rose, On linear transfors in zero-delay gaussian source channel coding, in IEEE International Syposiu on Inforation Theory Proceedings (ISIT),. IEEE, 2012, pp [10] F. Hekland, P.A. Floor, and T.A. Rastad, Shannon-Kotelnikov appings in joint source-channel coding, IEEE Transactions on Counications, vol. 57, no. 1, pp ,
7 [11] T. M Cover and J. A. Thoas, Eleents of inforation theory, Wileyinterscience, [12] AW Marshall and I. Olkin, Inequalities: Theory of Majorization and Its Applications, Acadeic Press, New York, [13] T. Başar and Y.W. Wu, Solutions to a class of iniax decision probles arising in counication systes, Journal of optiization theory and applications, vol. 51, no. 3, pp , [14] T. Kailath, A. Sayed, and B. Hassibi, Linear Estiation, Prentice Hall Upper Saddle River, NJ,
On Conditions for Linearity of Optimal Estimation
On Conditions for Linearity of Optial Estiation Erah Akyol, Kuar Viswanatha and Kenneth Rose {eakyol, kuar, rose}@ece.ucsb.edu Departent of Electrical and Coputer Engineering University of California at
More informationOn Constant Power Water-filling
On Constant Power Water-filling Wei Yu and John M. Cioffi Electrical Engineering Departent Stanford University, Stanford, CA94305, U.S.A. eails: {weiyu,cioffi}@stanford.edu Abstract This paper derives
More information13.2 Fully Polynomial Randomized Approximation Scheme for Permanent of Random 0-1 Matrices
CS71 Randoness & Coputation Spring 018 Instructor: Alistair Sinclair Lecture 13: February 7 Disclaier: These notes have not been subjected to the usual scrutiny accorded to foral publications. They ay
More informationFeature Extraction Techniques
Feature Extraction Techniques Unsupervised Learning II Feature Extraction Unsupervised ethods can also be used to find features which can be useful for categorization. There are unsupervised ethods that
More informationBlock designs and statistics
Bloc designs and statistics Notes for Math 447 May 3, 2011 The ain paraeters of a bloc design are nuber of varieties v, bloc size, nuber of blocs b. A design is built on a set of v eleents. Each eleent
More informationOn Linear Transforms in Zero-delay Gaussian Source Channel Coding
2012 IEEE International Symposium on Information Theory Proceedings On Linear Transforms in ero-delay Gaussian Source hannel oding Emrah Akyol and enneth Rose eakyol, rose@eceucsbedu University of alifornia,
More informationFixed-to-Variable Length Distribution Matching
Fixed-to-Variable Length Distribution Matching Rana Ali Ajad and Georg Böcherer Institute for Counications Engineering Technische Universität München, Gerany Eail: raa2463@gail.co,georg.boecherer@tu.de
More informationCOS 424: Interacting with Data. Written Exercises
COS 424: Interacting with Data Hoework #4 Spring 2007 Regression Due: Wednesday, April 18 Written Exercises See the course website for iportant inforation about collaboration and late policies, as well
More informationCS Lecture 13. More Maximum Likelihood
CS 6347 Lecture 13 More Maxiu Likelihood Recap Last tie: Introduction to axiu likelihood estiation MLE for Bayesian networks Optial CPTs correspond to epirical counts Today: MLE for CRFs 2 Maxiu Likelihood
More informationIntroduction to Machine Learning. Recitation 11
Introduction to Machine Learning Lecturer: Regev Schweiger Recitation Fall Seester Scribe: Regev Schweiger. Kernel Ridge Regression We now take on the task of kernel-izing ridge regression. Let x,...,
More informationVulnerability of MRD-Code-Based Universal Secure Error-Correcting Network Codes under Time-Varying Jamming Links
Vulnerability of MRD-Code-Based Universal Secure Error-Correcting Network Codes under Tie-Varying Jaing Links Jun Kurihara KDDI R&D Laboratories, Inc 2 5 Ohara, Fujiino, Saitaa, 356 8502 Japan Eail: kurihara@kddilabsjp
More informationThis model assumes that the probability of a gap has size i is proportional to 1/i. i.e., i log m e. j=1. E[gap size] = i P r(i) = N f t.
CS 493: Algoriths for Massive Data Sets Feb 2, 2002 Local Models, Bloo Filter Scribe: Qin Lv Local Models In global odels, every inverted file entry is copressed with the sae odel. This work wells when
More informationRandomized Recovery for Boolean Compressed Sensing
Randoized Recovery for Boolean Copressed Sensing Mitra Fatei and Martin Vetterli Laboratory of Audiovisual Counication École Polytechnique Fédéral de Lausanne (EPFL) Eail: {itra.fatei, artin.vetterli}@epfl.ch
More informationThe Transactional Nature of Quantum Information
The Transactional Nature of Quantu Inforation Subhash Kak Departent of Coputer Science Oklahoa State University Stillwater, OK 7478 ABSTRACT Inforation, in its counications sense, is a transactional property.
More informationSupport recovery in compressed sensing: An estimation theoretic approach
Support recovery in copressed sensing: An estiation theoretic approach Ain Karbasi, Ali Horati, Soheil Mohajer, Martin Vetterli School of Coputer and Counication Sciences École Polytechnique Fédérale de
More informationA Simple Regression Problem
A Siple Regression Proble R. M. Castro March 23, 2 In this brief note a siple regression proble will be introduced, illustrating clearly the bias-variance tradeoff. Let Y i f(x i ) + W i, i,..., n, where
More informationPhysics 215 Winter The Density Matrix
Physics 215 Winter 2018 The Density Matrix The quantu space of states is a Hilbert space H. Any state vector ψ H is a pure state. Since any linear cobination of eleents of H are also an eleent of H, it
More informationAsynchronous Gossip Algorithms for Stochastic Optimization
Asynchronous Gossip Algoriths for Stochastic Optiization S. Sundhar Ra ECE Dept. University of Illinois Urbana, IL 680 ssrini@illinois.edu A. Nedić IESE Dept. University of Illinois Urbana, IL 680 angelia@illinois.edu
More informationError Exponents in Asynchronous Communication
IEEE International Syposiu on Inforation Theory Proceedings Error Exponents in Asynchronous Counication Da Wang EECS Dept., MIT Cabridge, MA, USA Eail: dawang@it.edu Venkat Chandar Lincoln Laboratory,
More informationChapter 6 1-D Continuous Groups
Chapter 6 1-D Continuous Groups Continuous groups consist of group eleents labelled by one or ore continuous variables, say a 1, a 2,, a r, where each variable has a well- defined range. This chapter explores:
More informationNon-Parametric Non-Line-of-Sight Identification 1
Non-Paraetric Non-Line-of-Sight Identification Sinan Gezici, Hisashi Kobayashi and H. Vincent Poor Departent of Electrical Engineering School of Engineering and Applied Science Princeton University, Princeton,
More informationE0 370 Statistical Learning Theory Lecture 6 (Aug 30, 2011) Margin Analysis
E0 370 tatistical Learning Theory Lecture 6 (Aug 30, 20) Margin Analysis Lecturer: hivani Agarwal cribe: Narasihan R Introduction In the last few lectures we have seen how to obtain high confidence bounds
More informationADVANCES ON THE BESSIS- MOUSSA-VILLANI TRACE CONJECTURE
ADVANCES ON THE BESSIS- MOUSSA-VILLANI TRACE CONJECTURE CHRISTOPHER J. HILLAR Abstract. A long-standing conjecture asserts that the polynoial p(t = Tr(A + tb ] has nonnegative coefficients whenever is
More informationUsing EM To Estimate A Probablity Density With A Mixture Of Gaussians
Using EM To Estiate A Probablity Density With A Mixture Of Gaussians Aaron A. D Souza adsouza@usc.edu Introduction The proble we are trying to address in this note is siple. Given a set of data points
More informationCourse Notes for EE227C (Spring 2018): Convex Optimization and Approximation
Course Notes for EE227C (Spring 2018): Convex Optiization and Approxiation Instructor: Moritz Hardt Eail: hardt+ee227c@berkeley.edu Graduate Instructor: Max Sichowitz Eail: sichow+ee227c@berkeley.edu October
More information3.3 Variational Characterization of Singular Values
3.3. Variational Characterization of Singular Values 61 3.3 Variational Characterization of Singular Values Since the singular values are square roots of the eigenvalues of the Heritian atrices A A and
More informationDistributed Subgradient Methods for Multi-agent Optimization
1 Distributed Subgradient Methods for Multi-agent Optiization Angelia Nedić and Asuan Ozdaglar October 29, 2007 Abstract We study a distributed coputation odel for optiizing a su of convex objective functions
More informationThe Hilbert Schmidt version of the commutator theorem for zero trace matrices
The Hilbert Schidt version of the coutator theore for zero trace atrices Oer Angel Gideon Schechtan March 205 Abstract Let A be a coplex atrix with zero trace. Then there are atrices B and C such that
More informationESE 523 Information Theory
ESE 53 Inforation Theory Joseph A. O Sullivan Sauel C. Sachs Professor Electrical and Systes Engineering Washington University 11 Urbauer Hall 10E Green Hall 314-935-4173 (Lynda Marha Answers) jao@wustl.edu
More informationBootstrapping Dependent Data
Bootstrapping Dependent Data One of the key issues confronting bootstrap resapling approxiations is how to deal with dependent data. Consider a sequence fx t g n t= of dependent rando variables. Clearly
More informationCompressive Sensing Over Networks
Forty-Eighth Annual Allerton Conference Allerton House, UIUC, Illinois, USA Septeber 29 - October, 200 Copressive Sensing Over Networks Soheil Feizi MIT Eail: sfeizi@it.edu Muriel Médard MIT Eail: edard@it.edu
More informationA note on the realignment criterion
A note on the realignent criterion Chi-Kwong Li 1, Yiu-Tung Poon and Nung-Sing Sze 3 1 Departent of Matheatics, College of Willia & Mary, Williasburg, VA 3185, USA Departent of Matheatics, Iowa State University,
More informationList Scheduling and LPT Oliver Braun (09/05/2017)
List Scheduling and LPT Oliver Braun (09/05/207) We investigate the classical scheduling proble P ax where a set of n independent jobs has to be processed on 2 parallel and identical processors (achines)
More informationModel Fitting. CURM Background Material, Fall 2014 Dr. Doreen De Leon
Model Fitting CURM Background Material, Fall 014 Dr. Doreen De Leon 1 Introduction Given a set of data points, we often want to fit a selected odel or type to the data (e.g., we suspect an exponential
More informationExperimental Design For Model Discrimination And Precise Parameter Estimation In WDS Analysis
City University of New York (CUNY) CUNY Acadeic Works International Conference on Hydroinforatics 8-1-2014 Experiental Design For Model Discriination And Precise Paraeter Estiation In WDS Analysis Giovanna
More informationASSUME a source over an alphabet size m, from which a sequence of n independent samples are drawn. The classical
IEEE TRANSACTIONS ON INFORMATION THEORY Large Alphabet Source Coding using Independent Coponent Analysis Aichai Painsky, Meber, IEEE, Saharon Rosset and Meir Feder, Fellow, IEEE arxiv:67.7v [cs.it] Jul
More informationBipartite subgraphs and the smallest eigenvalue
Bipartite subgraphs and the sallest eigenvalue Noga Alon Benny Sudaov Abstract Two results dealing with the relation between the sallest eigenvalue of a graph and its bipartite subgraphs are obtained.
More informationLower Bounds for Quantized Matrix Completion
Lower Bounds for Quantized Matrix Copletion Mary Wootters and Yaniv Plan Departent of Matheatics University of Michigan Ann Arbor, MI Eail: wootters, yplan}@uich.edu Mark A. Davenport School of Elec. &
More informationarxiv: v1 [cs.ds] 17 Mar 2016
Tight Bounds for Single-Pass Streaing Coplexity of the Set Cover Proble Sepehr Assadi Sanjeev Khanna Yang Li Abstract arxiv:1603.05715v1 [cs.ds] 17 Mar 2016 We resolve the space coplexity of single-pass
More informationQuantum algorithms (CO 781, Winter 2008) Prof. Andrew Childs, University of Waterloo LECTURE 15: Unstructured search and spatial search
Quantu algoriths (CO 781, Winter 2008) Prof Andrew Childs, University of Waterloo LECTURE 15: Unstructured search and spatial search ow we begin to discuss applications of quantu walks to search algoriths
More informationA1. Find all ordered pairs (a, b) of positive integers for which 1 a + 1 b = 3
A. Find all ordered pairs a, b) of positive integers for which a + b = 3 08. Answer. The six ordered pairs are 009, 08), 08, 009), 009 337, 674) = 35043, 674), 009 346, 673) = 3584, 673), 674, 009 337)
More informationFairness via priority scheduling
Fairness via priority scheduling Veeraruna Kavitha, N Heachandra and Debayan Das IEOR, IIT Bobay, Mubai, 400076, India vavitha,nh,debayan}@iitbacin Abstract In the context of ulti-agent resource allocation
More informationMulti-Scale/Multi-Resolution: Wavelet Transform
Multi-Scale/Multi-Resolution: Wavelet Transfor Proble with Fourier Fourier analysis -- breaks down a signal into constituent sinusoids of different frequencies. A serious drawback in transforing to the
More informationUpper and Lower Bounds on the Capacity of Wireless Optical Intensity Channels
ISIT7, Nice, France, June 4 June 9, 7 Upper and Lower Bounds on the Capacity of Wireless Optical Intensity Channels Ahed A. Farid and Steve Hranilovic Dept. Electrical and Coputer Engineering McMaster
More informationA Low-Complexity Congestion Control and Scheduling Algorithm for Multihop Wireless Networks with Order-Optimal Per-Flow Delay
A Low-Coplexity Congestion Control and Scheduling Algorith for Multihop Wireless Networks with Order-Optial Per-Flow Delay Po-Kai Huang, Xiaojun Lin, and Chih-Chun Wang School of Electrical and Coputer
More informationOn the Inapproximability of Vertex Cover on k-partite k-uniform Hypergraphs
On the Inapproxiability of Vertex Cover on k-partite k-unifor Hypergraphs Venkatesan Guruswai and Rishi Saket Coputer Science Departent Carnegie Mellon University Pittsburgh, PA 1513. Abstract. Coputing
More informationarxiv: v1 [cs.ds] 3 Feb 2014
arxiv:40.043v [cs.ds] 3 Feb 04 A Bound on the Expected Optiality of Rando Feasible Solutions to Cobinatorial Optiization Probles Evan A. Sultani The Johns Hopins University APL evan@sultani.co http://www.sultani.co/
More informationDetection and Estimation Theory
ESE 54 Detection and Estiation Theory Joseph A. O Sullivan Sauel C. Sachs Professor Electronic Systes and Signals Research Laboratory Electrical and Systes Engineering Washington University 11 Urbauer
More informationSharp Time Data Tradeoffs for Linear Inverse Problems
Sharp Tie Data Tradeoffs for Linear Inverse Probles Saet Oyak Benjain Recht Mahdi Soltanolkotabi January 016 Abstract In this paper we characterize sharp tie-data tradeoffs for optiization probles used
More informationA note on the multiplication of sparse matrices
Cent. Eur. J. Cop. Sci. 41) 2014 1-11 DOI: 10.2478/s13537-014-0201-x Central European Journal of Coputer Science A note on the ultiplication of sparse atrices Research Article Keivan Borna 12, Sohrab Aboozarkhani
More informationConstrained Consensus and Optimization in Multi-Agent Networks arxiv: v2 [math.oc] 17 Dec 2008
LIDS Report 2779 1 Constrained Consensus and Optiization in Multi-Agent Networks arxiv:0802.3922v2 [ath.oc] 17 Dec 2008 Angelia Nedić, Asuan Ozdaglar, and Pablo A. Parrilo February 15, 2013 Abstract We
More informationTEST OF HOMOGENEITY OF PARALLEL SAMPLES FROM LOGNORMAL POPULATIONS WITH UNEQUAL VARIANCES
TEST OF HOMOGENEITY OF PARALLEL SAMPLES FROM LOGNORMAL POPULATIONS WITH UNEQUAL VARIANCES S. E. Ahed, R. J. Tokins and A. I. Volodin Departent of Matheatics and Statistics University of Regina Regina,
More informationPhysics 139B Solutions to Homework Set 3 Fall 2009
Physics 139B Solutions to Hoework Set 3 Fall 009 1. Consider a particle of ass attached to a rigid assless rod of fixed length R whose other end is fixed at the origin. The rod is free to rotate about
More informationThis article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal non-commercial research and
This article appeared in a ournal published by Elsevier. The attached copy is furnished to the author for internal non-coercial research and education use, including for instruction at the authors institution
More informationContent-Type Coding. arxiv: v2 [cs.it] 3 Jun Linqi Song UCLA
Content-Type Coding Linqi Song UCLA Eail: songlinqi@ucla.edu Christina Fragouli UCLA and EPFL Eail: christina.fragouli@ucla.edu arxiv:1505.03561v [cs.it] 3 Jun 015 Abstract This paper is otivated by the
More informationPolygonal Designs: Existence and Construction
Polygonal Designs: Existence and Construction John Hegean Departent of Matheatics, Stanford University, Stanford, CA 9405 Jeff Langford Departent of Matheatics, Drake University, Des Moines, IA 5011 G
More informationMachine Learning Basics: Estimators, Bias and Variance
Machine Learning Basics: Estiators, Bias and Variance Sargur N. srihari@cedar.buffalo.edu This is part of lecture slides on Deep Learning: http://www.cedar.buffalo.edu/~srihari/cse676 1 Topics in Basics
More informationKeywords: Estimator, Bias, Mean-squared error, normality, generalized Pareto distribution
Testing approxiate norality of an estiator using the estiated MSE and bias with an application to the shape paraeter of the generalized Pareto distribution J. Martin van Zyl Abstract In this work the norality
More informationtime time δ jobs jobs
Approxiating Total Flow Tie on Parallel Machines Stefano Leonardi Danny Raz y Abstract We consider the proble of optiizing the total ow tie of a strea of jobs that are released over tie in a ultiprocessor
More information3.8 Three Types of Convergence
3.8 Three Types of Convergence 3.8 Three Types of Convergence 93 Suppose that we are given a sequence functions {f k } k N on a set X and another function f on X. What does it ean for f k to converge to
More informationIntelligent Systems: Reasoning and Recognition. Perceptrons and Support Vector Machines
Intelligent Systes: Reasoning and Recognition Jaes L. Crowley osig 1 Winter Seester 2018 Lesson 6 27 February 2018 Outline Perceptrons and Support Vector achines Notation...2 Linear odels...3 Lines, Planes
More informationSolutions of some selected problems of Homework 4
Solutions of soe selected probles of Hoework 4 Sangchul Lee May 7, 2018 Proble 1 Let there be light A professor has two light bulbs in his garage. When both are burned out, they are replaced, and the next
More informationA Quantum Observable for the Graph Isomorphism Problem
A Quantu Observable for the Graph Isoorphis Proble Mark Ettinger Los Alaos National Laboratory Peter Høyer BRICS Abstract Suppose we are given two graphs on n vertices. We define an observable in the Hilbert
More informationLecture 9 November 23, 2015
CSC244: Discrepancy Theory in Coputer Science Fall 25 Aleksandar Nikolov Lecture 9 Noveber 23, 25 Scribe: Nick Spooner Properties of γ 2 Recall that γ 2 (A) is defined for A R n as follows: γ 2 (A) = in{r(u)
More informationSoft Computing Techniques Help Assign Weights to Different Factors in Vulnerability Analysis
Soft Coputing Techniques Help Assign Weights to Different Factors in Vulnerability Analysis Beverly Rivera 1,2, Irbis Gallegos 1, and Vladik Kreinovich 2 1 Regional Cyber and Energy Security Center RCES
More informationAntenna Saturation Effects on MIMO Capacity
Antenna Saturation Effects on MIMO Capacity T S Pollock, T D Abhayapala, and R A Kennedy National ICT Australia Research School of Inforation Sciences and Engineering The Australian National University,
More informationOn the Communication Complexity of Lipschitzian Optimization for the Coordinated Model of Computation
journal of coplexity 6, 459473 (2000) doi:0.006jco.2000.0544, available online at http:www.idealibrary.co on On the Counication Coplexity of Lipschitzian Optiization for the Coordinated Model of Coputation
More informationLean Walsh Transform
Lean Walsh Transfor Edo Liberty 5th March 007 inforal intro We show an orthogonal atrix A of size d log 4 3 d (α = log 4 3) which is applicable in tie O(d). By applying a rando sign change atrix S to the
More informationProc. of the IEEE/OES Seventh Working Conference on Current Measurement Technology UNCERTAINTIES IN SEASONDE CURRENT VELOCITIES
Proc. of the IEEE/OES Seventh Working Conference on Current Measureent Technology UNCERTAINTIES IN SEASONDE CURRENT VELOCITIES Belinda Lipa Codar Ocean Sensors 15 La Sandra Way, Portola Valley, CA 98 blipa@pogo.co
More informationThe Weierstrass Approximation Theorem
36 The Weierstrass Approxiation Theore Recall that the fundaental idea underlying the construction of the real nubers is approxiation by the sipler rational nubers. Firstly, nubers are often deterined
More informationDesign of Spatially Coupled LDPC Codes over GF(q) for Windowed Decoding
IEEE TRANSACTIONS ON INFORMATION THEORY (SUBMITTED PAPER) 1 Design of Spatially Coupled LDPC Codes over GF(q) for Windowed Decoding Lai Wei, Student Meber, IEEE, David G. M. Mitchell, Meber, IEEE, Thoas
More informationSTRONG LAW OF LARGE NUMBERS FOR SCALAR-NORMED SUMS OF ELEMENTS OF REGRESSIVE SEQUENCES OF RANDOM VARIABLES
Annales Univ Sci Budapest, Sect Cop 39 (2013) 365 379 STRONG LAW OF LARGE NUMBERS FOR SCALAR-NORMED SUMS OF ELEMENTS OF REGRESSIVE SEQUENCES OF RANDOM VARIABLES MK Runovska (Kiev, Ukraine) Dedicated to
More informationAlgorithms for parallel processor scheduling with distinct due windows and unit-time jobs
BULLETIN OF THE POLISH ACADEMY OF SCIENCES TECHNICAL SCIENCES Vol. 57, No. 3, 2009 Algoriths for parallel processor scheduling with distinct due windows and unit-tie obs A. JANIAK 1, W.A. JANIAK 2, and
More informationMinimum Rates Scheduling for MIMO OFDM Broadcast Channels
IEEE Ninth International Syposiu on Spread Spectru Techniques and Applications Miniu Rates Scheduling for MIMO OFDM Broadcast Channels Gerhard Wunder and Thoas Michel Fraunhofer Geran-Sino Mobile Counications
More informationPrediction by random-walk perturbation
Prediction by rando-walk perturbation Luc Devroye School of Coputer Science McGill University Gábor Lugosi ICREA and Departent of Econoics Universitat Popeu Fabra lucdevroye@gail.co gabor.lugosi@gail.co
More informationProbability Distributions
Probability Distributions In Chapter, we ephasized the central role played by probability theory in the solution of pattern recognition probles. We turn now to an exploration of soe particular exaples
More informationMulti-Dimensional Hegselmann-Krause Dynamics
Multi-Diensional Hegselann-Krause Dynaics A. Nedić Industrial and Enterprise Systes Engineering Dept. University of Illinois Urbana, IL 680 angelia@illinois.edu B. Touri Coordinated Science Laboratory
More informationA Probabilistic and RIPless Theory of Compressed Sensing
A Probabilistic and RIPless Theory of Copressed Sensing Eanuel J Candès and Yaniv Plan 2 Departents of Matheatics and of Statistics, Stanford University, Stanford, CA 94305 2 Applied and Coputational Matheatics,
More information1 Bounding the Margin
COS 511: Theoretical Machine Learning Lecturer: Rob Schapire Lecture #12 Scribe: Jian Min Si March 14, 2013 1 Bounding the Margin We are continuing the proof of a bound on the generalization error of AdaBoost
More informationResearch Article Data Reduction with Quantization Constraints for Decentralized Estimation in Wireless Sensor Networks
Matheatical Probles in Engineering Volue 014, Article ID 93358, 8 pages http://dxdoiorg/101155/014/93358 Research Article Data Reduction with Quantization Constraints for Decentralized Estiation in Wireless
More informationCONTROL SYSTEMS, ROBOTICS, AND AUTOMATION Vol. IX Uncertainty Models For Robustness Analysis - A. Garulli, A. Tesi and A. Vicino
UNCERTAINTY MODELS FOR ROBUSTNESS ANALYSIS A. Garulli Dipartiento di Ingegneria dell Inforazione, Università di Siena, Italy A. Tesi Dipartiento di Sistei e Inforatica, Università di Firenze, Italy A.
More informationON THE TWO-LEVEL PRECONDITIONING IN LEAST SQUARES METHOD
PROCEEDINGS OF THE YEREVAN STATE UNIVERSITY Physical and Matheatical Sciences 04,, p. 7 5 ON THE TWO-LEVEL PRECONDITIONING IN LEAST SQUARES METHOD M a t h e a t i c s Yu. A. HAKOPIAN, R. Z. HOVHANNISYAN
More informationImpact of Imperfect Channel State Information on ARQ Schemes over Rayleigh Fading Channels
This full text paper was peer reviewed at the direction of IEEE Counications Society subject atter experts for publication in the IEEE ICC 9 proceedings Ipact of Iperfect Channel State Inforation on ARQ
More informationPrinciples of Optimal Control Spring 2008
MIT OpenCourseWare http://ocw.it.edu 16.323 Principles of Optial Control Spring 2008 For inforation about citing these aterials or our Ters of Use, visit: http://ocw.it.edu/ters. 16.323 Lecture 10 Singular
More informationHybrid System Identification: An SDP Approach
49th IEEE Conference on Decision and Control Deceber 15-17, 2010 Hilton Atlanta Hotel, Atlanta, GA, USA Hybrid Syste Identification: An SDP Approach C Feng, C M Lagoa, N Ozay and M Sznaier Abstract The
More informationA remark on a success rate model for DPA and CPA
A reark on a success rate odel for DPA and CPA A. Wieers, BSI Version 0.5 andreas.wieers@bsi.bund.de Septeber 5, 2018 Abstract The success rate is the ost coon evaluation etric for easuring the perforance
More informationA PROBABILISTIC AND RIPLESS THEORY OF COMPRESSED SENSING. Emmanuel J. Candès Yaniv Plan. Technical Report No November 2010
A PROBABILISTIC AND RIPLESS THEORY OF COMPRESSED SENSING By Eanuel J Candès Yaniv Plan Technical Report No 200-0 Noveber 200 Departent of Statistics STANFORD UNIVERSITY Stanford, California 94305-4065
More informationFundamental Limits of Database Alignment
Fundaental Liits of Database Alignent Daniel Cullina Dept of Electrical Engineering Princeton University dcullina@princetonedu Prateek Mittal Dept of Electrical Engineering Princeton University pittal@princetonedu
More informationNORMAL MATRIX POLYNOMIALS WITH NONSINGULAR LEADING COEFFICIENTS
NORMAL MATRIX POLYNOMIALS WITH NONSINGULAR LEADING COEFFICIENTS NIKOLAOS PAPATHANASIOU AND PANAYIOTIS PSARRAKOS Abstract. In this paper, we introduce the notions of weakly noral and noral atrix polynoials,
More informationSTOPPING SIMULATED PATHS EARLY
Proceedings of the 2 Winter Siulation Conference B.A.Peters,J.S.Sith,D.J.Medeiros,andM.W.Rohrer,eds. STOPPING SIMULATED PATHS EARLY Paul Glasseran Graduate School of Business Colubia University New Yor,
More informationApproximation in Stochastic Scheduling: The Power of LP-Based Priority Policies
Approxiation in Stochastic Scheduling: The Power of -Based Priority Policies Rolf Möhring, Andreas Schulz, Marc Uetz Setting (A P p stoch, r E( w and (B P p stoch E( w We will assue that the processing
More informationTopic 5a Introduction to Curve Fitting & Linear Regression
/7/08 Course Instructor Dr. Rayond C. Rup Oice: A 337 Phone: (95) 747 6958 E ail: rcrup@utep.edu opic 5a Introduction to Curve Fitting & Linear Regression EE 4386/530 Coputational ethods in EE Outline
More informationFundamentals of Image Compression
Fundaentals of Iage Copression Iage Copression reduce the size of iage data file while retaining necessary inforation Original uncopressed Iage Copression (encoding) 01101 Decopression (decoding) Copressed
More informationThe proofs of Theorem 1-3 are along the lines of Wied and Galeano (2013).
A Appendix: Proofs The proofs of Theore 1-3 are along the lines of Wied and Galeano (2013) Proof of Theore 1 Let D[d 1, d 2 ] be the space of càdlàg functions on the interval [d 1, d 2 ] equipped with
More informationFast Montgomery-like Square Root Computation over GF(2 m ) for All Trinomials
Fast Montgoery-like Square Root Coputation over GF( ) for All Trinoials Yin Li a, Yu Zhang a, a Departent of Coputer Science and Technology, Xinyang Noral University, Henan, P.R.China Abstract This letter
More informationMASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.436J/15.085J Fall 2008 Lecture 11 10/15/2008 ABSTRACT INTEGRATION I
MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.436J/15.085J Fall 2008 Lecture 11 10/15/2008 ABSTRACT INTEGRATION I Contents 1. Preliinaries 2. The ain result 3. The Rieann integral 4. The integral of a nonnegative
More informationEnergy-Efficient Threshold Circuits Computing Mod Functions
Energy-Efficient Threshold Circuits Coputing Mod Functions Akira Suzuki Kei Uchizawa Xiao Zhou Graduate School of Inforation Sciences, Tohoku University Araaki-aza Aoba 6-6-05, Aoba-ku, Sendai, 980-8579,
More informationOPTIMIZATION in multi-agent networks has attracted
Distributed constrained optiization and consensus in uncertain networks via proxial iniization Kostas Margellos, Alessandro Falsone, Sione Garatti and Maria Prandini arxiv:603.039v3 [ath.oc] 3 May 07 Abstract
More informationSupport Vector Machine Classification of Uncertain and Imbalanced data using Robust Optimization
Recent Researches in Coputer Science Support Vector Machine Classification of Uncertain and Ibalanced data using Robust Optiization RAGHAV PAT, THEODORE B. TRAFALIS, KASH BARKER School of Industrial Engineering
More informationHamming Compressed Sensing
Haing Copressed Sensing Tianyi Zhou, and Dacheng Tao, Meber, IEEE Abstract arxiv:.73v2 [cs.it] Oct 2 Copressed sensing CS and -bit CS cannot directly recover quantized signals and require tie consuing
More information