Optimal Jamming Over Additive Noise: Vector Source-Channel Case

Size: px
Start display at page:

Download "Optimal Jamming Over Additive Noise: Vector Source-Channel Case"

Transcription

1 Fifty-first Annual Allerton Conference Allerton House, UIUC, Illinois, USA October 2-3, 2013 Optial Jaing Over Additive Noise: Vector Source-Channel Case Erah Akyol and Kenneth Rose Abstract This paper extends the recent analysis of optial zero-delay jaing proble, specialized to scalar sources over scalar additive noise channels, to vector spaces. Particularly, we find the saddle point solution to the jaing proble in vector spaces, within its ost general, non-gaussian setting; the proble has been open even for the iportant special case of Gaussian source and channel. Siilar to the scalar setting, linearity conditions for encoding and decoding appings play a pivotal role in jaing, in the sense that the optial jaing strategy is to effectively force both transitter and receiver to default to linear appings, i.e., the jaer ensures, whenever possible, that the transitter and receiver cannot benefit fro non-linear strategies. The optial strategy is then randoized linear encoding for transitter and generating independent noise for the jaing. Moreover, the optial jaer allocates power according to the well-known waterfilling over the eigenvalues of the channel noise, and the density of the jaing noise that render the optial encoding and decoding appings linear, is deterined by the power constraints and the source density. I. INTRODUCTION We consider the proble of optial jaing, by a power constrained agent, over additive noise channel, in vector spaces. This proble was solved in [1], [2] for scalar Gaussian source and scalar channel. The saddle point solution to this zero-su gae, derived for Gaussian sourcechannel pair, involves randoized linear apping for the transitter and generating independent, Gaussian noise as the jaer output and a linear decoder. We recently extended this work to non-gaussian scalar sources and scalar channels [3], and showed that the linearity of encoding and decoding appings is essential while Gaussianity of the jaer is erely to satisfy the linearity conditions for the Gaussian source and channel. In this paper, by leveraging the recent results on conditions for linearity of optial estiation and counication appings, [4], [5], we extend the scalar analysis to vector sources and channels. The contributions of this paper are: We derive the necessary and sufficient condition (called the vector atching condition ) on the jaing noise density to ensure linearity of the optial transitter and the receiver, within the vector setting. The condition is uch ore involved than the scalar one, due to dependencies aong the source and channel coponents. The jaer ais to render both encoder and decoder linear appings, while allocates jaing power over This work is supported in part by the NSF under grants CCF and CCF Erah Akyol and Kenneth Rose are with Departent of Electrical and Coputer Engineering, University of California at Santa Barbara, CA 93106, USA {eakyol, rose}@ece.ucsb.edu Transitter Fig. 1. Y Jaer + N U The jaing proble. Receiver the channel eigenvalues by the well known waterfilling solution. We discover an analogy between zero-delay vector jaing and vector rate-distortion and vector channel capacity, in ters of power/rate/jaing power allocation as waterfilling. This paper is organized as follows. In Section II, we present the proble definition and preliinaries. In Section III, we review the prior results related to jaing, estiation and counication probles. In Section IV, we derive the linearity result and then the ain result on optial jaing. Finally, we discuss the future directions in Section V. II. PROBLEM DEFINITION Let R and R + denote the respective sets of real nubers and positive real nubers. Let E( ), P( ) and denote the expectation, probability and convolution operators, respectively. Let Bern(p) denote the Bernoulli rando variable, taking values in { 1, 1} with probability {p, 1 p}. The Gaussian density with ean µ and variance σ 2 is denoted as df (x) dx N (µ, σ 2 ). Let f (x) denote the first order derivative of the function f( ). All logariths in the paper are natural logariths and ay in general be coplex, and the integrals are, in general, Lebesgue integrals. Let us define the set S as the set of Borel easurable R R k appings. In general, lowercase letters (e.g., c) denote scalars, boldface lowercase (e.g., x) vectors, uppercase (e.g., C, ) atrices and rando variables. I denotes the identity atrix. R, and R denote the auto-covariance of and cross covariance of and respectively. A T denotes the transpose of atrix A. (x) + denotes the function ax(0,x). denotes the gradient and x denotes the partial gradient with respect to x. Throughout this paper, we assue that the source is an - diensional vector with zero ean and covariance R. The ˆ /13/$ IEEE 1329

2 channel noise is additive k-diensional Gaussian, of zero ean and covariance R N. Covariance atrices R and R N allow the diagonalization R Q Λ Q T, and R N Q N Λ N Q T N (1) where Q Q T Q N Q T N I and Λ and Λ N are diagonal atrices, having ordered eigenvalues as entries, i.e., Λ diag{λ } and Λ N diag{λ N } where λ and λ are ordered (descending) eigenvalues and Q T and QT N are the KLT atrices of the source and the channel, respectively. We will ake use of the following auxiliary lea, see eg. [6] for a proof. Lea 1. Let λ and λ N be two ordered vectors in R + with descending entries (λ (1) λ (2),...,λ ()) and Π denote any perutation of the indices {1, 2,...,}, then and in Π λ (Π(i))λ N (i) λ (i)λ N ( i) (2) ax Π λ ((i))λ N (Π(i)) λ (i)λ N (i) (3) We consider the general counication syste whose block diagra is shown in Figure 1. Source R is apped into Y R k by function g T ( ) Sand transitted over an additive noise channel. The adversary receives the sae signal and generates the jaing signal through function g A ( ) Swhich is added to the channel output, and ais to coproise the transission of the source. The received signal U Y + + N is apped by the decoder to an estiate ˆ via function h( ) S. The zero ean noise N is assued to be independent of the source. The source density is denoted f ( ) and the noise density is f N ( ) with characteristic functions F (ω) and F N (ω), respectively. The overall cost, easured as the ean squared error (MSE) between source and its estiate at the decoder ˆ, is a function of the transitter, jaer and the receiver appings: J(g T ( ), g A ( ), h( )) E{ ˆ 2 }. (4) Transitter g T ( ) :R R k and receiver h( ) :R R k seek to iniize this cost while the adversary (jaer) seeks to axiize it by appropriate choice of g A ( ) :R R k. Power constraints ust be satisfied by the transitter and jaer E{ g T () 2 } P T, (5) E{ g A () 2 } P A. (6) The conflict of interest underlying this proble iplies that the optial transitter-receiver-adversarial policy is the saddle point solution (g T ( ),g A ( ),h ( )) satisfying the set of inequalities J(g T, g A, h ) J(g T, g A, h ) J(g T, g A, h). (7) Fig. 2. U Estiator The estiation proble. III. PRIOR WORK The jaing proble, in the for defined here, was studied in [1], [2], for scalar Gaussian sources and channels. The proble of interest is intrinsically connected to the fundaental probles of estiation theory and the theory of zero-delay source-channel coding. In particular, conditions for linearity of optial estiation [4] and optial appings in counications [5] are relevant to our proble here. We start with the estiation proble. A. Estiation Proble Consider the setting in Figure 2. The estiator receives U, the noisy version of the source and generates the estiate ˆ by the function h : R R such that MSE, E{( ˆ) 2 } is iniized. It is well known that, when a Gaussian source is containated with Gaussian noise, a linear estiator iniizes MSE. Recent work [4] analyzed, ore generally, the conditions for linearity of optial estiators. Here, we present the basic result pertaining to the jaing proble considered here. Specifically, we present the necessary and sufficient condition for source and channel distributions such that the linear estiator h(u) κ κ+1 ˆ U is optial where κ σ2 σ 2 is the SNR. Theore 1 ( [4]). Given SNR level κ, and noise with characteristic function F (ω), there exists a source for which the optial estiator is linear if and only if F (ω) F κ (ω). (8) Given a valid characteristic function F (ω), and for soe κ R +, the function F κ (ω) ay or ay not be a valid characteristic function, which deterines the existence of a atching source. For exaple, atching is guaranteed for integer κ and it is also guaranteed for infinitely divisible. More coprehensive discussion of the conditions on κ and F (ω) for F κ (ω) to be a valid characteristic function can be found in [4]. Extension of the conditions to the vector case is nontrivial due to the dependencies across coponents of the source and noise. Forally, we consider the proble of estiating the vector source R given the observation Y +, where and R are independent, as shown in Figure 2. Let Q be the eigenatrix of R R 1, and U Q 1 and let eigenvalues λ 1,...,λ be the eleents of the diagonal atrix Λ, i.e., the following holds: R R 1 U 1 ΛU (9)

3 Transitter Fig. 3. Y + U The counication setting. Receiver We are looking for the conditions on F (ω) and F (ω) such that h(y ) KY with K R (R + R ) 1 iniizes the estiation error E{ h(y ) 2 }. By following a siilar approach to the scalar case, the necessary and sufficient condition for linearity was derived in [4], reproduced below: Theore 2 ( [4]). Let the characteristic functions of the transfored source and noise (U and U) be F U (ω) and F U (ω). The necessary and sufficient condition for linearity of optial estiation is: log F U (ω) B. Counication Proble λ i log F U (ω), 1 i (10) In [5], a counication scenario whose block diagra is shown in Figure 3 was studied. In this setting, a scalar source R is apped into Y R by function g S, and transitted over an additive noise channel. The channel output U Y + is apped by the decoder to the estiate ˆ via function h S. The zero ean noise is assued to be independent of the source. The source density is denoted f ( ) and the noise density is f ( ) with characteristic functions F (ω) and F (ω), respectively. The objective is to iniize, over the choice of encoder g and decoder h, the distortion D E{( ˆ) 2 }, (11) subject to the average transission power constraint, E{g 2 ()} P T. (12) The necessary and sufficient condition for linearity for both appings is given by the following theore. Theore 3 ( [5]). For a given power constraint P T, noise with variance σ 2 and characteristic function F (ω), source with variance σ 2 and characteristic function F (ω), the optial encoder and decoder appings are linear if and only if F (αω) F κ (ω) (13) where κ P T σ 2 and α PT. σ 2 Here, we first extend this result to vector spaces, in Section III-b. Towards, deriving this extension, we need the optial encoding and decoding transfors for a general counication proble with source and channel noise covariances R and R N and total encoding power liit P T, here we ˆ reproduce the classical result due to [7] (see also [8], [9] for alternative derivations of this result.). Theore 4 ( [7] [9]). The encoding transfor that iniizes the MSE distortion subject to the power constraint P T is C Q N ΣQ T (14) where Σ is diagonal power allocation atrix. Moreover the total distortion is w ( 2 λ (i)λ N ( i) D P T + w + λ (i) (15) λ N ( i) w+1 where w is the nuber of active channels deterined by the power P T. Reark 1. Distortion expression (15) has an interesting interpretation of power allocation as reverse water-filling over the source eigenvalues. As we will show in the next section, the optial jaer also perfors power allocation as water-filling over the channel eigenvalues. Reark 2. Note that the ordering of the eigenvalues are so that the largest source eigenvalue is ultiplied with the sallest of the and so on, which physically eans that the encoder uses the best channel for the sallest variance source coponent, and so on. This is siply due to Lea 1. Assuption 1: In this paper, we assue the source and the channel have atched diensions, i.e., k (which eans bandwidth copression or expansion). This assuption is essential in the sense that when k the jaer cannot ensure linearity of g() and h(y ). A well known exaple is when 2and k 1, the optial appings are highly nonlinear, even in the case of Gaussian source and channel (see eg. [5], [10]and there references there in for details). Assuption 2: Throughout this paper, we assue that P T is high enough, so that all the channels are active, (each channel is allocated strictly positive power), i.e., w, hence (15) can be rewritten as J(λ, λ N ) ( λ (i)λ N ( i) P T + λ N (i) 2 (16) This assuption is not necessary but significantly siplifies the results. C. Gaussian Scalar Jaing Proble The proble of transitting independent and identically distributed Gaussian rando variables over a Gaussian channel in the presence of an additive jaer was considered in [1], [2]. In [2] a gae theoretic approach was developed and it was shown that the proble adits a ixed saddle point solution where the optial transitter and receiver eploy a randoized strategy. The randoization inforation can 1331

4 be sent over a side channel between transitter and receiver or it could be viewed as the inforation generated by the third party and observed by both transitter and receiver 1. Surprisingly, the optial jaing strategy ignores the input to the jaer and erely generates Gaussian noise, independent of the source. Theore 5 ( [1], [2]). The optial encoding function for the transitter is randoized linear apping: Y (i) γ(i)α T (i), (17) where γ(i) is i.i.d. Bernoulli ( 1 2 ) over the alphabet { 1, 1} and α T PT σ 2 Gaussian output (i) γ(i) Bern( 1 2 ) (18). The optial jaer generates i.i.d. (i) N(0,P A ) (19) where (i) is independent of the source (i). The proof of Theore 5 relies on the well known fact that for a Gaussian source over a Gaussian channel, zerodelay linear appings achieve the perforance of the asyptotically high delay optial source-channel counication syste [11]. This fact is unique to the Gaussian sourcechannel pair, hence it ight be tepting to conclude that the saddle point solution in Theore 5 can only be obtained in the all Gaussian setting. Perhaps surprisingly, in [3], we showed that there are infinitely any source-noise pairs that yield a saddle point solution siilar to Theore 5. We also proved that the linearity property of the optial transitter and receiver at the saddle point solution still holds, while the Gaussianity of the jaer output in the early special case was erely a eans to satisfy this linearity condition, and does not hold in general. Here, we reproduce the ain result in [3] for the scalar, non-gaussian jaing proble. Theore 6 ( [3]). For the jaing proble, the optial encoding function for the transitter is randoized linear apping: Y (i) γ(i)α T (i), (20) where γ(i) is i.i.d. Bernoulli ( 1 2 ) over the alphabet { 1, 1} and α T PT σ 2 γ(i) Bern( 1 2 ) (21). The optial jaing function is to generate i.i.d. output (i) with characteristic function F (ω) F β (α T ω) F N (ω) (22) where (i) is independent of the adversarial input (i) and β P A+σ 2 N P T. 1 In practice, randoization can be achieved by (pseudo)rando nuber generators at the transitter and receiver using the sae seed. IV. MAIN RESULTS A. An Upper Bound on Distortion Based on Linear Mappings In this section, we present a new lea that is used to upper bound the distortion of any zero-delay counication syste by that of the fixed, best linear encoder and decoder. A scalar version of this lea appeared in [3], here we extend this result to vector spaces. Lea 2. Consider the proble setting in Figure 1. For any given jaer, the distortion achievable by the transitterreceiver, D, is upper bounded by the distortion achieved by linear encoder and decoder 2 λ (i) ax(θ, λ N ( i)) J u P T + ax(θ, λ N (i)) (23) where θ satisfies the water-filling condition: (θ λ N (i)) + P A. (24) Note that this upper bound is deterined by only second order statistics, regardless of the noralized densities. Proof: The proof is based on the fact that the transitter and receiver can always use the linear appings that satisfy the power constraints. The jaer will try to ake all effective noise eigenvalues identical since in Π J(λ (Π), λ N ) (25) is axiized when λ N is unifor (see eg. [12] for a proof based on ajorization). The effective channel eigenvalues are upper bounded by the vector σ λ N +λ where λ is the ascending ordered eigenvalues of the jaer noise. To achieve this upper bound, the jaer sets R Q N Λ Q T N, i.e., the eigenvectors of the noise and the jaer ust be identical. If P A is not large enough, then the solution of is known to be the waterfilling solution ; intuitively the jaer ais to ake entries of σ as close to unifor as possible. Reark 3. Note that the optial jaer perfors waterfilling over the channel eigenvalues while the encoder allocates power according to reverse water-filling over the source eigenvalues. This observation parallels the inforation theoretical (asyptotically high delay) water-filling duality, where the rate distortion optial vector encoding schee allocates total rate by reverse water-filling over source eigenvalues and vector channel capacity achieving schee allocates power over channel eigenvalues by waterfilling. Reark 4. Lea 2 is the key result that connects the recent results on linearity of optial estiation and counication appings to the jaing proble. Lea 2 iplies that the optial strategy for a jaer which can 1332

5 only control the density of the additive noise channel, is to force the transitter and receiver to use linear appings. B. Conditions for Linearity of Counication Mappings in Vector Spaces For source R and channel R, we derive the necessary and sufficient condition for siultaneous linearity of optial encoder and decoder. In [5], it was shown that the counication proble is convex in the density of the channel input for the scalar setting. It is easy to extend this convexity result to atched diensions, see Assuption 1. Moreover, by siply extending the related scalar result in [3], it is straightforward to show that the optial decoder is linear if and only if the optial decoder is linear. Hence, we will investigate the conditions for linearity of optial decoder given that the encoder is linear. Towards deriving our results, we will ake use of the following auxiliary lea fro atrix analysis. Lea 3. Given a function f : R n R, atrix A R n and vector x R xf(ax) A T f(ax) (26) See Appendix II. Next, we present the necessary and sufficient condition for linearity of optial decoder for a given, optial linear decoder. Theore 7. Let the characteristic functions of the transfored source and noise (ΣQ T and QT ) be F ΣQ T (ω) and F Q T (ω). The necessary and sufficient condition for linearity of optial estiation is: log F ΣQ T (ω) where S ΣΛ ΣΛ 1. C. Main Result S i log F QT (ω), 1 i (27) Our ain result concerns the optial strategy for the transitter, the adversary and the receiver in Figure 1 for the transission index i. Theore 8. For the jaing proble, the optial encoding function for the transitter is: Y (i) γ(i)c(i), (28) where γ(i) is i.i.d. Bernoulli ( 1 2 ) over the alphabet { 1, 1} γ(i) Bern( 1 2 ) (29) and C Q N ΣQ T. The optial jaing function is to generate i.i.d. output (i), independent of (i), that satisfies: log F ΣQ T (ω) log F QT S i for S ΣΛ ΣΛ 1 and N (N+) (ω), 1 i (30) R Q N λ Q T N (31) where λ (i) (θ λ N (i)) + (32) and θ satisfies the water-filling condition: (θ λ N (i)) + P A (33) The optial receiver is h(u(i)) R C T (CR C T + R N + R ) 1 U(i), (34) and total cost is 2 λ (i) ax(θ, λ N ( i)) J P T + ax(θ, λ N (i)) (35) Moreover, this saddle point solution is (alost surely) unique. Proof: The proof follows fro verification of the saddle point inequalities given in (7), following the approach in [13], and is erely a siple extension of the scalar result in [3]. The essential idea of the proof is that the jaer renders the channel noise to atch the source in a way that the optial encoding and decoding appings are linear. The condition for such atching is given in Theore 7. Moreover, R shares the sae eigenvectors as R N as explained in the proof of Lea 2. V. DISCUSSION In this paper, we studied the vector jaing proble. Siilar to scalar setting, linearity conditions for encoding and decoding appings play the key role in jaing, in the sense that the optial jaing strategy is to effectively force both transitter and receiver to default to linear appings. Hence, the optial strategy is randoized linear encoding for transitter and generating independent noise for the jaing. The eigenvalues of the optial jaing noise are allocated according to water-filling over the eigenvalues of the channel noise, and the density of the jaing noise is atched to source and the channel to render the appings linear. We derived the atching condition to be satisfied by the jaer and also the second order statistics of the jaing noise. The power allocation solutions in the zero-delay probles ( water-filling for jaer and reverse water-filling for the transitter) nicely parallels the resource allocation strategies in asyptotically high delay (Shannon type) probles, such as rate allocation in rate-distortion (reverse water-filling) and power allocation in channel capacity (water-filling). Throughout this paper, we assued that a atching jaing noise, that forces the transitter and receiver to use linear appings, can always be generated by the jaer. The case for which this source-channel-jaer atching is not possible was analyzed for scalar sources and channels in our recent work [3]. Intuitively, the jaer approxiates the atching solution in soe polynoials which are orthogonal 1333

6 under the easure of the channel output. The analysis for vector settings can be carried out siilarly, and is oitted since it is orthogonal to the focus of the current paper. APPENDI I DERIVATION OF THE MATCHING CONDITION Let us rewrite the MSE optial decoder, h(y) E{ y} using Bayes rule and independence of and : xf (x)f (y Cx) dx h(y) (36) f (x)f (y Cx) dx Plugging h(y) Ky in (36) we obtain, Ky f (x)f (y Cx) dx xf (x)f (y Cx) dx Taking the Fourier transfor of both sides (37) jk ω [F (Cω)F (ω)] jc 1 [ ω F (Cω)]F (ω) (38) and rearranging ters, we get C 1 K 1 F (Cω) F (Cω) K 1 F (ω) F (ω) Using log F (Cω) 1 F (Cω) F (Cω), (39) log F (Cω) (C 1 K) 1 K log F (ω) (40) Note that (see eg. [14]) K R C T (CR C T + R ) 1 (41) Let use define β (C 1 K) 1 K then, β (C 1 R C T (CR C T +R ) 1 ) 1 It is easy to see that and hence Plugging (14) in (45), we have and hence R C T (CR C T +R ) 1 (42) β 1 R (CR C T ) 1 (43) β (CR C T )R 1 (44) β Q (ΣΛ ΣΛ 1 )QT (45) log F (Cω) Q (ΣΛ ΣΛ 1 )QT log F (ω) (46) defining S (ΣΛ ΣΛ 1 ), we have Q T ω log F (Cω) SQ T log F (ω) (47) Let us define ω Q T ω, hence ω Q ω. Plugging this in (47), we have Q T Q ω log F (CQ ω) SQ T Q ω log F (Q ω) (48) Using Lea 3, we can rewrite (48) as ω log F (C T Q ω) S ω log F (Q ω) (49) noting that C T Q Q Σ and the characteristic functions of the source and noise after transforation can be written in ters of the known characteristic functions F (ω) and F (ω), specifically F ΣQ T (ω) F (ΣQ T ω) and F Q T (ω) F (Q ω), we have ω log F ΣQ T ( ω) S ω log F Q T ( ω) (50) Using the fact that S is diagonal, we convert (50) to the set of scalar differential equations of (30). Converse can be shown by retracing the steps in the derivation of the necessity. Note that none of these steps, (36)-(47), introduce any loss of generality, hence retracing back fro (47) to (36), we show that if (47) is satisfied, the optial decoder is linear given the encoder is linear. APPENDI II PROOF OF LEMMA 3 By the chain rule we have, f(ax) n f(ax) [Ax] k (51) x i [Ax] k [x] i k1 n f(ax) ([A] k x) [Ax] k [x] i (52) n f(ax) [A] ki [Ax] k (53) n k f(ax)[a] ki (54) k1 k1 k1 [A] i T f(ax) (55) It follows fro (55) that x f(ax) A T f(ax). REFERENCES [1] T. Başar, The Gaussian test channel with an intelligent jaer, IEEE Transactions on Inforation Theory, vol. 29, no. 1, pp , [2] T. Başar and Y.W. Wu, A coplete characterization of iniax and axiin encoder-decoder policies for counication channels with incoplete statistical description, IEEE Transactions on Inforation Theory,, vol. 31, no. 4, pp , [3] E. Akyol, K. Rose, and T. Başar, On optial jaing over an additive noise channel, draft, available online at: [4] E. Akyol, K. Viswanatha, and K. Rose, On conditions for linearity of optial estiation, IEEE Transactions on Inforation Theory, vol. 58, no. 6, pp , [5] E. Akyol, K. Viswanatha, K. Rose, and Rastad T., On zero-delay source-channel coding, IEEE Transactions on Inforation Theory, in review, available online at: [6] R.A. Horn and C.R. Johnson, Matrix Analysis, Cabridge University Press, [7] K.H. Lee and D. Petersen, Optial linear coding for vector channels, IEEE Transactions on Counications, vol. 24, no. 12, pp , [8] T. Başar, B. Sankur, and H. Abut, Perforance bounds and optial linear coding for discrete-tie ultichannel counication systes (corresp.), IEEE Transactions on Inforation Theory, vol. 26, no. 2, pp , [9] E. Akyol and K. Rose, On linear transfors in zero-delay gaussian source channel coding, in IEEE International Syposiu on Inforation Theory Proceedings (ISIT),. IEEE, 2012, pp [10] F. Hekland, P.A. Floor, and T.A. Rastad, Shannon-Kotelnikov appings in joint source-channel coding, IEEE Transactions on Counications, vol. 57, no. 1, pp ,

7 [11] T. M Cover and J. A. Thoas, Eleents of inforation theory, Wileyinterscience, [12] AW Marshall and I. Olkin, Inequalities: Theory of Majorization and Its Applications, Acadeic Press, New York, [13] T. Başar and Y.W. Wu, Solutions to a class of iniax decision probles arising in counication systes, Journal of optiization theory and applications, vol. 51, no. 3, pp , [14] T. Kailath, A. Sayed, and B. Hassibi, Linear Estiation, Prentice Hall Upper Saddle River, NJ,

On Conditions for Linearity of Optimal Estimation

On Conditions for Linearity of Optimal Estimation On Conditions for Linearity of Optial Estiation Erah Akyol, Kuar Viswanatha and Kenneth Rose {eakyol, kuar, rose}@ece.ucsb.edu Departent of Electrical and Coputer Engineering University of California at

More information

On Constant Power Water-filling

On Constant Power Water-filling On Constant Power Water-filling Wei Yu and John M. Cioffi Electrical Engineering Departent Stanford University, Stanford, CA94305, U.S.A. eails: {weiyu,cioffi}@stanford.edu Abstract This paper derives

More information

13.2 Fully Polynomial Randomized Approximation Scheme for Permanent of Random 0-1 Matrices

13.2 Fully Polynomial Randomized Approximation Scheme for Permanent of Random 0-1 Matrices CS71 Randoness & Coputation Spring 018 Instructor: Alistair Sinclair Lecture 13: February 7 Disclaier: These notes have not been subjected to the usual scrutiny accorded to foral publications. They ay

More information

Feature Extraction Techniques

Feature Extraction Techniques Feature Extraction Techniques Unsupervised Learning II Feature Extraction Unsupervised ethods can also be used to find features which can be useful for categorization. There are unsupervised ethods that

More information

Block designs and statistics

Block designs and statistics Bloc designs and statistics Notes for Math 447 May 3, 2011 The ain paraeters of a bloc design are nuber of varieties v, bloc size, nuber of blocs b. A design is built on a set of v eleents. Each eleent

More information

On Linear Transforms in Zero-delay Gaussian Source Channel Coding

On Linear Transforms in Zero-delay Gaussian Source Channel Coding 2012 IEEE International Symposium on Information Theory Proceedings On Linear Transforms in ero-delay Gaussian Source hannel oding Emrah Akyol and enneth Rose eakyol, rose@eceucsbedu University of alifornia,

More information

Fixed-to-Variable Length Distribution Matching

Fixed-to-Variable Length Distribution Matching Fixed-to-Variable Length Distribution Matching Rana Ali Ajad and Georg Böcherer Institute for Counications Engineering Technische Universität München, Gerany Eail: raa2463@gail.co,georg.boecherer@tu.de

More information

COS 424: Interacting with Data. Written Exercises

COS 424: Interacting with Data. Written Exercises COS 424: Interacting with Data Hoework #4 Spring 2007 Regression Due: Wednesday, April 18 Written Exercises See the course website for iportant inforation about collaboration and late policies, as well

More information

CS Lecture 13. More Maximum Likelihood

CS Lecture 13. More Maximum Likelihood CS 6347 Lecture 13 More Maxiu Likelihood Recap Last tie: Introduction to axiu likelihood estiation MLE for Bayesian networks Optial CPTs correspond to epirical counts Today: MLE for CRFs 2 Maxiu Likelihood

More information

Introduction to Machine Learning. Recitation 11

Introduction to Machine Learning. Recitation 11 Introduction to Machine Learning Lecturer: Regev Schweiger Recitation Fall Seester Scribe: Regev Schweiger. Kernel Ridge Regression We now take on the task of kernel-izing ridge regression. Let x,...,

More information

Vulnerability of MRD-Code-Based Universal Secure Error-Correcting Network Codes under Time-Varying Jamming Links

Vulnerability of MRD-Code-Based Universal Secure Error-Correcting Network Codes under Time-Varying Jamming Links Vulnerability of MRD-Code-Based Universal Secure Error-Correcting Network Codes under Tie-Varying Jaing Links Jun Kurihara KDDI R&D Laboratories, Inc 2 5 Ohara, Fujiino, Saitaa, 356 8502 Japan Eail: kurihara@kddilabsjp

More information

This model assumes that the probability of a gap has size i is proportional to 1/i. i.e., i log m e. j=1. E[gap size] = i P r(i) = N f t.

This model assumes that the probability of a gap has size i is proportional to 1/i. i.e., i log m e. j=1. E[gap size] = i P r(i) = N f t. CS 493: Algoriths for Massive Data Sets Feb 2, 2002 Local Models, Bloo Filter Scribe: Qin Lv Local Models In global odels, every inverted file entry is copressed with the sae odel. This work wells when

More information

Randomized Recovery for Boolean Compressed Sensing

Randomized Recovery for Boolean Compressed Sensing Randoized Recovery for Boolean Copressed Sensing Mitra Fatei and Martin Vetterli Laboratory of Audiovisual Counication École Polytechnique Fédéral de Lausanne (EPFL) Eail: {itra.fatei, artin.vetterli}@epfl.ch

More information

The Transactional Nature of Quantum Information

The Transactional Nature of Quantum Information The Transactional Nature of Quantu Inforation Subhash Kak Departent of Coputer Science Oklahoa State University Stillwater, OK 7478 ABSTRACT Inforation, in its counications sense, is a transactional property.

More information

Support recovery in compressed sensing: An estimation theoretic approach

Support recovery in compressed sensing: An estimation theoretic approach Support recovery in copressed sensing: An estiation theoretic approach Ain Karbasi, Ali Horati, Soheil Mohajer, Martin Vetterli School of Coputer and Counication Sciences École Polytechnique Fédérale de

More information

A Simple Regression Problem

A Simple Regression Problem A Siple Regression Proble R. M. Castro March 23, 2 In this brief note a siple regression proble will be introduced, illustrating clearly the bias-variance tradeoff. Let Y i f(x i ) + W i, i,..., n, where

More information

Physics 215 Winter The Density Matrix

Physics 215 Winter The Density Matrix Physics 215 Winter 2018 The Density Matrix The quantu space of states is a Hilbert space H. Any state vector ψ H is a pure state. Since any linear cobination of eleents of H are also an eleent of H, it

More information

Asynchronous Gossip Algorithms for Stochastic Optimization

Asynchronous Gossip Algorithms for Stochastic Optimization Asynchronous Gossip Algoriths for Stochastic Optiization S. Sundhar Ra ECE Dept. University of Illinois Urbana, IL 680 ssrini@illinois.edu A. Nedić IESE Dept. University of Illinois Urbana, IL 680 angelia@illinois.edu

More information

Error Exponents in Asynchronous Communication

Error Exponents in Asynchronous Communication IEEE International Syposiu on Inforation Theory Proceedings Error Exponents in Asynchronous Counication Da Wang EECS Dept., MIT Cabridge, MA, USA Eail: dawang@it.edu Venkat Chandar Lincoln Laboratory,

More information

Chapter 6 1-D Continuous Groups

Chapter 6 1-D Continuous Groups Chapter 6 1-D Continuous Groups Continuous groups consist of group eleents labelled by one or ore continuous variables, say a 1, a 2,, a r, where each variable has a well- defined range. This chapter explores:

More information

Non-Parametric Non-Line-of-Sight Identification 1

Non-Parametric Non-Line-of-Sight Identification 1 Non-Paraetric Non-Line-of-Sight Identification Sinan Gezici, Hisashi Kobayashi and H. Vincent Poor Departent of Electrical Engineering School of Engineering and Applied Science Princeton University, Princeton,

More information

E0 370 Statistical Learning Theory Lecture 6 (Aug 30, 2011) Margin Analysis

E0 370 Statistical Learning Theory Lecture 6 (Aug 30, 2011) Margin Analysis E0 370 tatistical Learning Theory Lecture 6 (Aug 30, 20) Margin Analysis Lecturer: hivani Agarwal cribe: Narasihan R Introduction In the last few lectures we have seen how to obtain high confidence bounds

More information

ADVANCES ON THE BESSIS- MOUSSA-VILLANI TRACE CONJECTURE

ADVANCES ON THE BESSIS- MOUSSA-VILLANI TRACE CONJECTURE ADVANCES ON THE BESSIS- MOUSSA-VILLANI TRACE CONJECTURE CHRISTOPHER J. HILLAR Abstract. A long-standing conjecture asserts that the polynoial p(t = Tr(A + tb ] has nonnegative coefficients whenever is

More information

Using EM To Estimate A Probablity Density With A Mixture Of Gaussians

Using EM To Estimate A Probablity Density With A Mixture Of Gaussians Using EM To Estiate A Probablity Density With A Mixture Of Gaussians Aaron A. D Souza adsouza@usc.edu Introduction The proble we are trying to address in this note is siple. Given a set of data points

More information

Course Notes for EE227C (Spring 2018): Convex Optimization and Approximation

Course Notes for EE227C (Spring 2018): Convex Optimization and Approximation Course Notes for EE227C (Spring 2018): Convex Optiization and Approxiation Instructor: Moritz Hardt Eail: hardt+ee227c@berkeley.edu Graduate Instructor: Max Sichowitz Eail: sichow+ee227c@berkeley.edu October

More information

3.3 Variational Characterization of Singular Values

3.3 Variational Characterization of Singular Values 3.3. Variational Characterization of Singular Values 61 3.3 Variational Characterization of Singular Values Since the singular values are square roots of the eigenvalues of the Heritian atrices A A and

More information

Distributed Subgradient Methods for Multi-agent Optimization

Distributed Subgradient Methods for Multi-agent Optimization 1 Distributed Subgradient Methods for Multi-agent Optiization Angelia Nedić and Asuan Ozdaglar October 29, 2007 Abstract We study a distributed coputation odel for optiizing a su of convex objective functions

More information

The Hilbert Schmidt version of the commutator theorem for zero trace matrices

The Hilbert Schmidt version of the commutator theorem for zero trace matrices The Hilbert Schidt version of the coutator theore for zero trace atrices Oer Angel Gideon Schechtan March 205 Abstract Let A be a coplex atrix with zero trace. Then there are atrices B and C such that

More information

ESE 523 Information Theory

ESE 523 Information Theory ESE 53 Inforation Theory Joseph A. O Sullivan Sauel C. Sachs Professor Electrical and Systes Engineering Washington University 11 Urbauer Hall 10E Green Hall 314-935-4173 (Lynda Marha Answers) jao@wustl.edu

More information

Bootstrapping Dependent Data

Bootstrapping Dependent Data Bootstrapping Dependent Data One of the key issues confronting bootstrap resapling approxiations is how to deal with dependent data. Consider a sequence fx t g n t= of dependent rando variables. Clearly

More information

Compressive Sensing Over Networks

Compressive Sensing Over Networks Forty-Eighth Annual Allerton Conference Allerton House, UIUC, Illinois, USA Septeber 29 - October, 200 Copressive Sensing Over Networks Soheil Feizi MIT Eail: sfeizi@it.edu Muriel Médard MIT Eail: edard@it.edu

More information

A note on the realignment criterion

A note on the realignment criterion A note on the realignent criterion Chi-Kwong Li 1, Yiu-Tung Poon and Nung-Sing Sze 3 1 Departent of Matheatics, College of Willia & Mary, Williasburg, VA 3185, USA Departent of Matheatics, Iowa State University,

More information

List Scheduling and LPT Oliver Braun (09/05/2017)

List Scheduling and LPT Oliver Braun (09/05/2017) List Scheduling and LPT Oliver Braun (09/05/207) We investigate the classical scheduling proble P ax where a set of n independent jobs has to be processed on 2 parallel and identical processors (achines)

More information

Model Fitting. CURM Background Material, Fall 2014 Dr. Doreen De Leon

Model Fitting. CURM Background Material, Fall 2014 Dr. Doreen De Leon Model Fitting CURM Background Material, Fall 014 Dr. Doreen De Leon 1 Introduction Given a set of data points, we often want to fit a selected odel or type to the data (e.g., we suspect an exponential

More information

Experimental Design For Model Discrimination And Precise Parameter Estimation In WDS Analysis

Experimental Design For Model Discrimination And Precise Parameter Estimation In WDS Analysis City University of New York (CUNY) CUNY Acadeic Works International Conference on Hydroinforatics 8-1-2014 Experiental Design For Model Discriination And Precise Paraeter Estiation In WDS Analysis Giovanna

More information

ASSUME a source over an alphabet size m, from which a sequence of n independent samples are drawn. The classical

ASSUME a source over an alphabet size m, from which a sequence of n independent samples are drawn. The classical IEEE TRANSACTIONS ON INFORMATION THEORY Large Alphabet Source Coding using Independent Coponent Analysis Aichai Painsky, Meber, IEEE, Saharon Rosset and Meir Feder, Fellow, IEEE arxiv:67.7v [cs.it] Jul

More information

Bipartite subgraphs and the smallest eigenvalue

Bipartite subgraphs and the smallest eigenvalue Bipartite subgraphs and the sallest eigenvalue Noga Alon Benny Sudaov Abstract Two results dealing with the relation between the sallest eigenvalue of a graph and its bipartite subgraphs are obtained.

More information

Lower Bounds for Quantized Matrix Completion

Lower Bounds for Quantized Matrix Completion Lower Bounds for Quantized Matrix Copletion Mary Wootters and Yaniv Plan Departent of Matheatics University of Michigan Ann Arbor, MI Eail: wootters, yplan}@uich.edu Mark A. Davenport School of Elec. &

More information

arxiv: v1 [cs.ds] 17 Mar 2016

arxiv: v1 [cs.ds] 17 Mar 2016 Tight Bounds for Single-Pass Streaing Coplexity of the Set Cover Proble Sepehr Assadi Sanjeev Khanna Yang Li Abstract arxiv:1603.05715v1 [cs.ds] 17 Mar 2016 We resolve the space coplexity of single-pass

More information

Quantum algorithms (CO 781, Winter 2008) Prof. Andrew Childs, University of Waterloo LECTURE 15: Unstructured search and spatial search

Quantum algorithms (CO 781, Winter 2008) Prof. Andrew Childs, University of Waterloo LECTURE 15: Unstructured search and spatial search Quantu algoriths (CO 781, Winter 2008) Prof Andrew Childs, University of Waterloo LECTURE 15: Unstructured search and spatial search ow we begin to discuss applications of quantu walks to search algoriths

More information

A1. Find all ordered pairs (a, b) of positive integers for which 1 a + 1 b = 3

A1. Find all ordered pairs (a, b) of positive integers for which 1 a + 1 b = 3 A. Find all ordered pairs a, b) of positive integers for which a + b = 3 08. Answer. The six ordered pairs are 009, 08), 08, 009), 009 337, 674) = 35043, 674), 009 346, 673) = 3584, 673), 674, 009 337)

More information

Fairness via priority scheduling

Fairness via priority scheduling Fairness via priority scheduling Veeraruna Kavitha, N Heachandra and Debayan Das IEOR, IIT Bobay, Mubai, 400076, India vavitha,nh,debayan}@iitbacin Abstract In the context of ulti-agent resource allocation

More information

Multi-Scale/Multi-Resolution: Wavelet Transform

Multi-Scale/Multi-Resolution: Wavelet Transform Multi-Scale/Multi-Resolution: Wavelet Transfor Proble with Fourier Fourier analysis -- breaks down a signal into constituent sinusoids of different frequencies. A serious drawback in transforing to the

More information

Upper and Lower Bounds on the Capacity of Wireless Optical Intensity Channels

Upper and Lower Bounds on the Capacity of Wireless Optical Intensity Channels ISIT7, Nice, France, June 4 June 9, 7 Upper and Lower Bounds on the Capacity of Wireless Optical Intensity Channels Ahed A. Farid and Steve Hranilovic Dept. Electrical and Coputer Engineering McMaster

More information

A Low-Complexity Congestion Control and Scheduling Algorithm for Multihop Wireless Networks with Order-Optimal Per-Flow Delay

A Low-Complexity Congestion Control and Scheduling Algorithm for Multihop Wireless Networks with Order-Optimal Per-Flow Delay A Low-Coplexity Congestion Control and Scheduling Algorith for Multihop Wireless Networks with Order-Optial Per-Flow Delay Po-Kai Huang, Xiaojun Lin, and Chih-Chun Wang School of Electrical and Coputer

More information

On the Inapproximability of Vertex Cover on k-partite k-uniform Hypergraphs

On the Inapproximability of Vertex Cover on k-partite k-uniform Hypergraphs On the Inapproxiability of Vertex Cover on k-partite k-unifor Hypergraphs Venkatesan Guruswai and Rishi Saket Coputer Science Departent Carnegie Mellon University Pittsburgh, PA 1513. Abstract. Coputing

More information

arxiv: v1 [cs.ds] 3 Feb 2014

arxiv: v1 [cs.ds] 3 Feb 2014 arxiv:40.043v [cs.ds] 3 Feb 04 A Bound on the Expected Optiality of Rando Feasible Solutions to Cobinatorial Optiization Probles Evan A. Sultani The Johns Hopins University APL evan@sultani.co http://www.sultani.co/

More information

Detection and Estimation Theory

Detection and Estimation Theory ESE 54 Detection and Estiation Theory Joseph A. O Sullivan Sauel C. Sachs Professor Electronic Systes and Signals Research Laboratory Electrical and Systes Engineering Washington University 11 Urbauer

More information

Sharp Time Data Tradeoffs for Linear Inverse Problems

Sharp Time Data Tradeoffs for Linear Inverse Problems Sharp Tie Data Tradeoffs for Linear Inverse Probles Saet Oyak Benjain Recht Mahdi Soltanolkotabi January 016 Abstract In this paper we characterize sharp tie-data tradeoffs for optiization probles used

More information

A note on the multiplication of sparse matrices

A note on the multiplication of sparse matrices Cent. Eur. J. Cop. Sci. 41) 2014 1-11 DOI: 10.2478/s13537-014-0201-x Central European Journal of Coputer Science A note on the ultiplication of sparse atrices Research Article Keivan Borna 12, Sohrab Aboozarkhani

More information

Constrained Consensus and Optimization in Multi-Agent Networks arxiv: v2 [math.oc] 17 Dec 2008

Constrained Consensus and Optimization in Multi-Agent Networks arxiv: v2 [math.oc] 17 Dec 2008 LIDS Report 2779 1 Constrained Consensus and Optiization in Multi-Agent Networks arxiv:0802.3922v2 [ath.oc] 17 Dec 2008 Angelia Nedić, Asuan Ozdaglar, and Pablo A. Parrilo February 15, 2013 Abstract We

More information

TEST OF HOMOGENEITY OF PARALLEL SAMPLES FROM LOGNORMAL POPULATIONS WITH UNEQUAL VARIANCES

TEST OF HOMOGENEITY OF PARALLEL SAMPLES FROM LOGNORMAL POPULATIONS WITH UNEQUAL VARIANCES TEST OF HOMOGENEITY OF PARALLEL SAMPLES FROM LOGNORMAL POPULATIONS WITH UNEQUAL VARIANCES S. E. Ahed, R. J. Tokins and A. I. Volodin Departent of Matheatics and Statistics University of Regina Regina,

More information

Physics 139B Solutions to Homework Set 3 Fall 2009

Physics 139B Solutions to Homework Set 3 Fall 2009 Physics 139B Solutions to Hoework Set 3 Fall 009 1. Consider a particle of ass attached to a rigid assless rod of fixed length R whose other end is fixed at the origin. The rod is free to rotate about

More information

This article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal non-commercial research and

This article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal non-commercial research and This article appeared in a ournal published by Elsevier. The attached copy is furnished to the author for internal non-coercial research and education use, including for instruction at the authors institution

More information

Content-Type Coding. arxiv: v2 [cs.it] 3 Jun Linqi Song UCLA

Content-Type Coding. arxiv: v2 [cs.it] 3 Jun Linqi Song UCLA Content-Type Coding Linqi Song UCLA Eail: songlinqi@ucla.edu Christina Fragouli UCLA and EPFL Eail: christina.fragouli@ucla.edu arxiv:1505.03561v [cs.it] 3 Jun 015 Abstract This paper is otivated by the

More information

Polygonal Designs: Existence and Construction

Polygonal Designs: Existence and Construction Polygonal Designs: Existence and Construction John Hegean Departent of Matheatics, Stanford University, Stanford, CA 9405 Jeff Langford Departent of Matheatics, Drake University, Des Moines, IA 5011 G

More information

Machine Learning Basics: Estimators, Bias and Variance

Machine Learning Basics: Estimators, Bias and Variance Machine Learning Basics: Estiators, Bias and Variance Sargur N. srihari@cedar.buffalo.edu This is part of lecture slides on Deep Learning: http://www.cedar.buffalo.edu/~srihari/cse676 1 Topics in Basics

More information

Keywords: Estimator, Bias, Mean-squared error, normality, generalized Pareto distribution

Keywords: Estimator, Bias, Mean-squared error, normality, generalized Pareto distribution Testing approxiate norality of an estiator using the estiated MSE and bias with an application to the shape paraeter of the generalized Pareto distribution J. Martin van Zyl Abstract In this work the norality

More information

time time δ jobs jobs

time time δ jobs jobs Approxiating Total Flow Tie on Parallel Machines Stefano Leonardi Danny Raz y Abstract We consider the proble of optiizing the total ow tie of a strea of jobs that are released over tie in a ultiprocessor

More information

3.8 Three Types of Convergence

3.8 Three Types of Convergence 3.8 Three Types of Convergence 3.8 Three Types of Convergence 93 Suppose that we are given a sequence functions {f k } k N on a set X and another function f on X. What does it ean for f k to converge to

More information

Intelligent Systems: Reasoning and Recognition. Perceptrons and Support Vector Machines

Intelligent Systems: Reasoning and Recognition. Perceptrons and Support Vector Machines Intelligent Systes: Reasoning and Recognition Jaes L. Crowley osig 1 Winter Seester 2018 Lesson 6 27 February 2018 Outline Perceptrons and Support Vector achines Notation...2 Linear odels...3 Lines, Planes

More information

Solutions of some selected problems of Homework 4

Solutions of some selected problems of Homework 4 Solutions of soe selected probles of Hoework 4 Sangchul Lee May 7, 2018 Proble 1 Let there be light A professor has two light bulbs in his garage. When both are burned out, they are replaced, and the next

More information

A Quantum Observable for the Graph Isomorphism Problem

A Quantum Observable for the Graph Isomorphism Problem A Quantu Observable for the Graph Isoorphis Proble Mark Ettinger Los Alaos National Laboratory Peter Høyer BRICS Abstract Suppose we are given two graphs on n vertices. We define an observable in the Hilbert

More information

Lecture 9 November 23, 2015

Lecture 9 November 23, 2015 CSC244: Discrepancy Theory in Coputer Science Fall 25 Aleksandar Nikolov Lecture 9 Noveber 23, 25 Scribe: Nick Spooner Properties of γ 2 Recall that γ 2 (A) is defined for A R n as follows: γ 2 (A) = in{r(u)

More information

Soft Computing Techniques Help Assign Weights to Different Factors in Vulnerability Analysis

Soft Computing Techniques Help Assign Weights to Different Factors in Vulnerability Analysis Soft Coputing Techniques Help Assign Weights to Different Factors in Vulnerability Analysis Beverly Rivera 1,2, Irbis Gallegos 1, and Vladik Kreinovich 2 1 Regional Cyber and Energy Security Center RCES

More information

Antenna Saturation Effects on MIMO Capacity

Antenna Saturation Effects on MIMO Capacity Antenna Saturation Effects on MIMO Capacity T S Pollock, T D Abhayapala, and R A Kennedy National ICT Australia Research School of Inforation Sciences and Engineering The Australian National University,

More information

On the Communication Complexity of Lipschitzian Optimization for the Coordinated Model of Computation

On the Communication Complexity of Lipschitzian Optimization for the Coordinated Model of Computation journal of coplexity 6, 459473 (2000) doi:0.006jco.2000.0544, available online at http:www.idealibrary.co on On the Counication Coplexity of Lipschitzian Optiization for the Coordinated Model of Coputation

More information

Lean Walsh Transform

Lean Walsh Transform Lean Walsh Transfor Edo Liberty 5th March 007 inforal intro We show an orthogonal atrix A of size d log 4 3 d (α = log 4 3) which is applicable in tie O(d). By applying a rando sign change atrix S to the

More information

Proc. of the IEEE/OES Seventh Working Conference on Current Measurement Technology UNCERTAINTIES IN SEASONDE CURRENT VELOCITIES

Proc. of the IEEE/OES Seventh Working Conference on Current Measurement Technology UNCERTAINTIES IN SEASONDE CURRENT VELOCITIES Proc. of the IEEE/OES Seventh Working Conference on Current Measureent Technology UNCERTAINTIES IN SEASONDE CURRENT VELOCITIES Belinda Lipa Codar Ocean Sensors 15 La Sandra Way, Portola Valley, CA 98 blipa@pogo.co

More information

The Weierstrass Approximation Theorem

The Weierstrass Approximation Theorem 36 The Weierstrass Approxiation Theore Recall that the fundaental idea underlying the construction of the real nubers is approxiation by the sipler rational nubers. Firstly, nubers are often deterined

More information

Design of Spatially Coupled LDPC Codes over GF(q) for Windowed Decoding

Design of Spatially Coupled LDPC Codes over GF(q) for Windowed Decoding IEEE TRANSACTIONS ON INFORMATION THEORY (SUBMITTED PAPER) 1 Design of Spatially Coupled LDPC Codes over GF(q) for Windowed Decoding Lai Wei, Student Meber, IEEE, David G. M. Mitchell, Meber, IEEE, Thoas

More information

STRONG LAW OF LARGE NUMBERS FOR SCALAR-NORMED SUMS OF ELEMENTS OF REGRESSIVE SEQUENCES OF RANDOM VARIABLES

STRONG LAW OF LARGE NUMBERS FOR SCALAR-NORMED SUMS OF ELEMENTS OF REGRESSIVE SEQUENCES OF RANDOM VARIABLES Annales Univ Sci Budapest, Sect Cop 39 (2013) 365 379 STRONG LAW OF LARGE NUMBERS FOR SCALAR-NORMED SUMS OF ELEMENTS OF REGRESSIVE SEQUENCES OF RANDOM VARIABLES MK Runovska (Kiev, Ukraine) Dedicated to

More information

Algorithms for parallel processor scheduling with distinct due windows and unit-time jobs

Algorithms for parallel processor scheduling with distinct due windows and unit-time jobs BULLETIN OF THE POLISH ACADEMY OF SCIENCES TECHNICAL SCIENCES Vol. 57, No. 3, 2009 Algoriths for parallel processor scheduling with distinct due windows and unit-tie obs A. JANIAK 1, W.A. JANIAK 2, and

More information

Minimum Rates Scheduling for MIMO OFDM Broadcast Channels

Minimum Rates Scheduling for MIMO OFDM Broadcast Channels IEEE Ninth International Syposiu on Spread Spectru Techniques and Applications Miniu Rates Scheduling for MIMO OFDM Broadcast Channels Gerhard Wunder and Thoas Michel Fraunhofer Geran-Sino Mobile Counications

More information

Prediction by random-walk perturbation

Prediction by random-walk perturbation Prediction by rando-walk perturbation Luc Devroye School of Coputer Science McGill University Gábor Lugosi ICREA and Departent of Econoics Universitat Popeu Fabra lucdevroye@gail.co gabor.lugosi@gail.co

More information

Probability Distributions

Probability Distributions Probability Distributions In Chapter, we ephasized the central role played by probability theory in the solution of pattern recognition probles. We turn now to an exploration of soe particular exaples

More information

Multi-Dimensional Hegselmann-Krause Dynamics

Multi-Dimensional Hegselmann-Krause Dynamics Multi-Diensional Hegselann-Krause Dynaics A. Nedić Industrial and Enterprise Systes Engineering Dept. University of Illinois Urbana, IL 680 angelia@illinois.edu B. Touri Coordinated Science Laboratory

More information

A Probabilistic and RIPless Theory of Compressed Sensing

A Probabilistic and RIPless Theory of Compressed Sensing A Probabilistic and RIPless Theory of Copressed Sensing Eanuel J Candès and Yaniv Plan 2 Departents of Matheatics and of Statistics, Stanford University, Stanford, CA 94305 2 Applied and Coputational Matheatics,

More information

1 Bounding the Margin

1 Bounding the Margin COS 511: Theoretical Machine Learning Lecturer: Rob Schapire Lecture #12 Scribe: Jian Min Si March 14, 2013 1 Bounding the Margin We are continuing the proof of a bound on the generalization error of AdaBoost

More information

Research Article Data Reduction with Quantization Constraints for Decentralized Estimation in Wireless Sensor Networks

Research Article Data Reduction with Quantization Constraints for Decentralized Estimation in Wireless Sensor Networks Matheatical Probles in Engineering Volue 014, Article ID 93358, 8 pages http://dxdoiorg/101155/014/93358 Research Article Data Reduction with Quantization Constraints for Decentralized Estiation in Wireless

More information

CONTROL SYSTEMS, ROBOTICS, AND AUTOMATION Vol. IX Uncertainty Models For Robustness Analysis - A. Garulli, A. Tesi and A. Vicino

CONTROL SYSTEMS, ROBOTICS, AND AUTOMATION Vol. IX Uncertainty Models For Robustness Analysis - A. Garulli, A. Tesi and A. Vicino UNCERTAINTY MODELS FOR ROBUSTNESS ANALYSIS A. Garulli Dipartiento di Ingegneria dell Inforazione, Università di Siena, Italy A. Tesi Dipartiento di Sistei e Inforatica, Università di Firenze, Italy A.

More information

ON THE TWO-LEVEL PRECONDITIONING IN LEAST SQUARES METHOD

ON THE TWO-LEVEL PRECONDITIONING IN LEAST SQUARES METHOD PROCEEDINGS OF THE YEREVAN STATE UNIVERSITY Physical and Matheatical Sciences 04,, p. 7 5 ON THE TWO-LEVEL PRECONDITIONING IN LEAST SQUARES METHOD M a t h e a t i c s Yu. A. HAKOPIAN, R. Z. HOVHANNISYAN

More information

Impact of Imperfect Channel State Information on ARQ Schemes over Rayleigh Fading Channels

Impact of Imperfect Channel State Information on ARQ Schemes over Rayleigh Fading Channels This full text paper was peer reviewed at the direction of IEEE Counications Society subject atter experts for publication in the IEEE ICC 9 proceedings Ipact of Iperfect Channel State Inforation on ARQ

More information

Principles of Optimal Control Spring 2008

Principles of Optimal Control Spring 2008 MIT OpenCourseWare http://ocw.it.edu 16.323 Principles of Optial Control Spring 2008 For inforation about citing these aterials or our Ters of Use, visit: http://ocw.it.edu/ters. 16.323 Lecture 10 Singular

More information

Hybrid System Identification: An SDP Approach

Hybrid System Identification: An SDP Approach 49th IEEE Conference on Decision and Control Deceber 15-17, 2010 Hilton Atlanta Hotel, Atlanta, GA, USA Hybrid Syste Identification: An SDP Approach C Feng, C M Lagoa, N Ozay and M Sznaier Abstract The

More information

A remark on a success rate model for DPA and CPA

A remark on a success rate model for DPA and CPA A reark on a success rate odel for DPA and CPA A. Wieers, BSI Version 0.5 andreas.wieers@bsi.bund.de Septeber 5, 2018 Abstract The success rate is the ost coon evaluation etric for easuring the perforance

More information

A PROBABILISTIC AND RIPLESS THEORY OF COMPRESSED SENSING. Emmanuel J. Candès Yaniv Plan. Technical Report No November 2010

A PROBABILISTIC AND RIPLESS THEORY OF COMPRESSED SENSING. Emmanuel J. Candès Yaniv Plan. Technical Report No November 2010 A PROBABILISTIC AND RIPLESS THEORY OF COMPRESSED SENSING By Eanuel J Candès Yaniv Plan Technical Report No 200-0 Noveber 200 Departent of Statistics STANFORD UNIVERSITY Stanford, California 94305-4065

More information

Fundamental Limits of Database Alignment

Fundamental Limits of Database Alignment Fundaental Liits of Database Alignent Daniel Cullina Dept of Electrical Engineering Princeton University dcullina@princetonedu Prateek Mittal Dept of Electrical Engineering Princeton University pittal@princetonedu

More information

NORMAL MATRIX POLYNOMIALS WITH NONSINGULAR LEADING COEFFICIENTS

NORMAL MATRIX POLYNOMIALS WITH NONSINGULAR LEADING COEFFICIENTS NORMAL MATRIX POLYNOMIALS WITH NONSINGULAR LEADING COEFFICIENTS NIKOLAOS PAPATHANASIOU AND PANAYIOTIS PSARRAKOS Abstract. In this paper, we introduce the notions of weakly noral and noral atrix polynoials,

More information

STOPPING SIMULATED PATHS EARLY

STOPPING SIMULATED PATHS EARLY Proceedings of the 2 Winter Siulation Conference B.A.Peters,J.S.Sith,D.J.Medeiros,andM.W.Rohrer,eds. STOPPING SIMULATED PATHS EARLY Paul Glasseran Graduate School of Business Colubia University New Yor,

More information

Approximation in Stochastic Scheduling: The Power of LP-Based Priority Policies

Approximation in Stochastic Scheduling: The Power of LP-Based Priority Policies Approxiation in Stochastic Scheduling: The Power of -Based Priority Policies Rolf Möhring, Andreas Schulz, Marc Uetz Setting (A P p stoch, r E( w and (B P p stoch E( w We will assue that the processing

More information

Topic 5a Introduction to Curve Fitting & Linear Regression

Topic 5a Introduction to Curve Fitting & Linear Regression /7/08 Course Instructor Dr. Rayond C. Rup Oice: A 337 Phone: (95) 747 6958 E ail: rcrup@utep.edu opic 5a Introduction to Curve Fitting & Linear Regression EE 4386/530 Coputational ethods in EE Outline

More information

Fundamentals of Image Compression

Fundamentals of Image Compression Fundaentals of Iage Copression Iage Copression reduce the size of iage data file while retaining necessary inforation Original uncopressed Iage Copression (encoding) 01101 Decopression (decoding) Copressed

More information

The proofs of Theorem 1-3 are along the lines of Wied and Galeano (2013).

The proofs of Theorem 1-3 are along the lines of Wied and Galeano (2013). A Appendix: Proofs The proofs of Theore 1-3 are along the lines of Wied and Galeano (2013) Proof of Theore 1 Let D[d 1, d 2 ] be the space of càdlàg functions on the interval [d 1, d 2 ] equipped with

More information

Fast Montgomery-like Square Root Computation over GF(2 m ) for All Trinomials

Fast Montgomery-like Square Root Computation over GF(2 m ) for All Trinomials Fast Montgoery-like Square Root Coputation over GF( ) for All Trinoials Yin Li a, Yu Zhang a, a Departent of Coputer Science and Technology, Xinyang Noral University, Henan, P.R.China Abstract This letter

More information

MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.436J/15.085J Fall 2008 Lecture 11 10/15/2008 ABSTRACT INTEGRATION I

MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.436J/15.085J Fall 2008 Lecture 11 10/15/2008 ABSTRACT INTEGRATION I MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.436J/15.085J Fall 2008 Lecture 11 10/15/2008 ABSTRACT INTEGRATION I Contents 1. Preliinaries 2. The ain result 3. The Rieann integral 4. The integral of a nonnegative

More information

Energy-Efficient Threshold Circuits Computing Mod Functions

Energy-Efficient Threshold Circuits Computing Mod Functions Energy-Efficient Threshold Circuits Coputing Mod Functions Akira Suzuki Kei Uchizawa Xiao Zhou Graduate School of Inforation Sciences, Tohoku University Araaki-aza Aoba 6-6-05, Aoba-ku, Sendai, 980-8579,

More information

OPTIMIZATION in multi-agent networks has attracted

OPTIMIZATION in multi-agent networks has attracted Distributed constrained optiization and consensus in uncertain networks via proxial iniization Kostas Margellos, Alessandro Falsone, Sione Garatti and Maria Prandini arxiv:603.039v3 [ath.oc] 3 May 07 Abstract

More information

Support Vector Machine Classification of Uncertain and Imbalanced data using Robust Optimization

Support Vector Machine Classification of Uncertain and Imbalanced data using Robust Optimization Recent Researches in Coputer Science Support Vector Machine Classification of Uncertain and Ibalanced data using Robust Optiization RAGHAV PAT, THEODORE B. TRAFALIS, KASH BARKER School of Industrial Engineering

More information

Hamming Compressed Sensing

Hamming Compressed Sensing Haing Copressed Sensing Tianyi Zhou, and Dacheng Tao, Meber, IEEE Abstract arxiv:.73v2 [cs.it] Oct 2 Copressed sensing CS and -bit CS cannot directly recover quantized signals and require tie consuing

More information