OUTLINE! SaTC - 15 June Basic Architecture of a Communication System. U s. coder c. coder 0. SaTC - 15 June 2016

Size: px
Start display at page:

Download "OUTLINE! SaTC - 15 June Basic Architecture of a Communication System. U s. coder c. coder 0. SaTC - 15 June 2016"

Transcription

1 Game heoretic Approach to Information Security AMER BAȘAR ECE, CAS, CSL, II, and MechSE, UIUC SaC Workshop University of Wisconsin, Madison June 5-7, 26 OULINE! Fundamental problem in information transmission / communication Intervention by adversary(ies) Role of ame theory Some classes of information security ames and their solutions Other settins of adversarial intervention Conclusions / References Classical Communication Settin he fundamental problem of communication is that of reproducin at one point (destination) either eactly or approimately a messae selected at another point (), iven the cost of transmission. Classical Communication Settin he fundamental problem of communication is that of reproducin at one point (destination) either eactly or approimately a messae selected at another point (), iven the cost of transmission. U Y s. coder c. coder channel c. decoder s. decoder U U s. coder c. coder Y channel c. decoder s. decoder What information to send U U s. coder c. coder Y channel c. decoder s. decoder How to send it U U s. coder c. coder Y channel c. decoder s. decoder Prob (Y=y U =u ) U Classical Communication Settin, w ~ independent random variables u, u are real valued variables J(, h) = E [ Q(, u, u ), h ] J * = min min J(, h)

2 Classical Communication Settin, w ~ independent random variables u, u are real valued actions J(, h) = E [ Q(, u, u ), h ] Standard distortion measure: J * = min min J(, γ ) Q(, u, u ) = k (u ) 2 (u - ) 2 A multi-channel etension or with k= & SaC E[(u - 5 June 26 ) 2 ] α v λ w y 2 h u u λn λ i s are nonzero constants (ains);, v, w i s are independent random variables y y n v A multi-channel etension u = (v) λ w y 2 h u u λn Distortion: Q(, u, u ) = k (u ) 2 (u - ) 2 y y n u = h(y,..,y n ) y i = λ I (v) w i v Multiple Serial Decision Units u w. h. w m- y m h m u m ~ N(, σ 2 ), w i ~ N(, σ w2 ), v ~ N(, σ v2 ) J(, h [,m] ) = E [ Q(, u, u [,m] ), h [,m] ] Q(, u, u [,m] ) = (u m ) 2 Σ m i= (u i- ) 2 Source (S) A multi-sensor transmission w 2 n n 2 z Receiver h y Desin {(,, n ), h} to minimize a distortion at receiver, with w i, z noises u Multi-aent networked systems as raphs Network is a connected raph Nodes are aents / dynamic systems /mobile Links are one of three types of connections SaC%&%5%June%26% Multi-aent networked systems as raphs Links are one of three types of connections: Communication Collaboration Physical! Layered raphs SaC%&%5%June%26% Intrusion/Intervention by an Adversary Passive attack Eavesdroppin (on transmission a passive attack) Active attacks Jammin (communication channels) Denial of service Messae distortion (by flippin bits active attack) Node capture and clonin (physically capturin sensor nodes, replicatins the nodes, and deployin into the network) Some nodes could be adversarial: jammin communication interruptin collaboration breakin physical links Leads to a ame situation! Conflic4n%interests% %between%mul4ple%% coopera4ve%as%well%as% non&coopera4ve%aents% SaC%&%5%June%26%

3 Aerial Jammin Attack on the CommNet of a team of UAVs he jammer wants to maimize the time for which communication can be jammed. he two UAVs want to minimize the time for which communication remains jammed. Back to Classical Settin but with v is the jammin sinal enerated by the adversary (J) Back to Classical Settin but with Q: What is known about the capabilities, information access, and objectives of J? Back to Classical Settin but with Back to Classical Settin but with Back to Classical Settin but with Q: What is known about the capabilities, information access, and objectives of J? For eample: E[v 2 ] α Q: What is known about the capabilities, information access, and objectives of J? J has access to some information, I J, on and u! v = μ(i J ) Lookin for policies ( (, h), μ ) Standard distortion measure Q IJ (, u, u, v) = k (u ) 2 (u - ) 2 with J s constraint E[v 2 ] α or Q IJ (, u, u, v) = k (u ) 2 (u - ) 2 k J v 2 possibly randomized Back to Classical Settin but with R(, h, μ) := E[Q IJ (, u, u, v) (, h), μ ] J has access to some information, I J, on and u! v = μ(i J ) Lookin for policies ( (, h), μ ) possibly randomized Back to Classical Settin but with R(, h, μ) := E[Q IJ (, u, u, v) (, h),,μ ] R is what the system cares about and hence a reasonable approach is inf (, h) sup μ R(, h, μ) =: R* (UV of ZSG) If J behaves differently, then system does no worse than R* usin the same policy pair. Upper and lower values, Saddle Point, and Nonzero-sum Games inf (, h) sup μ R(, h, v μ) w=: R* (UV of ZSG) Lower value (LV) is: sup μ inf (, h) R(, h, μ) R* If equal, then there is value, and possibility of SP: A triple (*, h*, μ*) such that R(*, h*, μ) R(*, h*, μ*) R(, h, μ*) for all, h, μ

4 Upper and lower values, Saddle Point, and Nonzero-sum Games SP: A triple (*, v h*, μ*) w such that R(*, h*, μ) R(*, h*, μ*) y h R(, h, u μ*) for all, h, μ If J is known to have a different objective, say maimizin R J, not fully alined with R, then a NZSG! Nash equilibrium: R(*, h*, μ*) R(, h, μ*) R J (*, h*, μ) R J (*, h*, μ*) Back to Classical Settin with Jammer ake as distortion measure Q IJ (, u, u, v) = k (u ) 2 (u - ) 2 k J v 2 and assume ~ N(, σ 2 ), w ~ N(, σ w2 ) hen, there eists a SP, with the worstcase v comprised of two additive terms: (i) rv linearly correlated with I J Back to Classical Settin with Jammer And ake the as minimizin distortion measure and h are linear in their Q IJ (, respective u, u, v) = information, k (u ) 2 (uand - ) could 2 k J v 2 also and involve assume a discrete ~ N(, σrv 2 ), dictatin w ~ N(, which σ w2 ) of hen, multiple there solutions eists a SP, & R with should the pick worstcase v comprised requires of two clean additive side channel terms: (coordination or (i) a rv sinalin linearly mechanism). correlated with I J Back to Classical Settin with Jammer In And ake some the as reions minimizin distortion of the measure and parameter h are linear space, in the SP their Qenables IJ (, respective u, the u, v) pair = information, k(, (uh), ) 2 with (uand proper - ) could 2 k J v 2 randomization also involve assume a discrete and ~ N(, coordination, σrv 2 ), dictatin w ~ to N(, neutralize which σ w2 ) J of hen, so multiple that there it discards/disreards solutions eists a SP, & R with should the its pick worstcase v comprised and requires injects of two clean additive independent side channel terms: information (coordination noise or (i) a rv sinalin into linearly the channel. mechanism. correlated with I J Back to Classical Settin with Jammer (J) Solutions And ake the as minimizin distortion and techniques measure and etend h are linear to vector in -valued their Q IJ (, respective s, u, u, v) multiple = information, k (u ) channels, 2 (uand - ) could multiple 2 k J v 2 jammers, also and involve assume and a some discrete ~ N(, classes σrv 2 ), dictatin of on-gaussian ~ N(, which σ w2 ) distributions. of hen, multiple there solutions eists a SP, & R with should the pick worstcase v comprised requires of two clean additive side channel terms: (coordination or (i) a rv sinalin linearly mechanism. correlated with I J Bansal & B (JOA 89); Akyol, Rose, B (I 5) Refs: B (I 83); B&Wu (I 85); B&Wu (JOA 86); adversary controlin some nodes Source (S) w n Nodes m,..,n controled by adversaries, injectin sinals m,, n to maimize distortion at receiver. 2 µ n 2 z Receiver h y u adversary controlin some nodes (2) Sensor policies: i = i (sw i ), i=,,m Adversary policies: j =µ j (sw i ), j=m,, n Receiver policy: u = h(y), y=σ i i Σ j j z Distortion measure: Q SJ (s, { i }, u, { j }) = = (u -s) 2 kσ i ( i ) 2 k J Σ j ( j ) 2 Zero-sum ame: R(, h, μ) := := E[Q SJ (s, { i }, u, { j }) ({ i }, h),,{{μ j } ] adversary controlin some nodes (3) Lookin for a SP solution for R(, h, μ) with (, h) as minimizers, and μ as maimizer, with each i possibly randomized, and likewise each μ j, with also coordination amon the m sensors and the receiver, and likewise amon the n-m adversaries. adversary controlin some nodes (4) Solution (Akyol, Rose, B (ISI 3)): With all statistics Gaussian, the best for sensors is to use randomized linear transformations for i s, and share the randomization information with the receiver. For the adversaries, SP solution dictates Gaussian j s, correlated across them With lack of coordination amon adversaries, the system benefits, i.e. R is lower.

5 SI with Privacy Constraints (also a ame but not ZS), θ u Common cost: J R (, h) = E{(u ) 2 } Privacy constraint: J (, h) = E{(θ E[θ y]) 2 } D P (*) Find S that minimizes J R (, h S ) st (*) holds, where h S = h() minimizes J R (, h) uniquely for all. Soft Watermarkin Game Watermark U Y U Encoder Attacker Decoder (,S) µ h(y) S Sinal Constraints: E{((,S) S) 2 } P E E{(Y U ) 2 } P A Distortion: E{h(Y) ) 2 }! R(,h; µ) UV is: inf inf h sup µ R(,h; µ) With, S, Gaussian, worst-case µ is affine- Soft Watermarkin Game Gaussian -- (Mıhçak, Akyol, B, Lanbort 26) Watermark U Y U Encoder Attacker Decoder (,S) µ h(y) S Sinal Constraints: E{((,S) S) 2 } P E E{(Y U ) 2 } P A Distortion: E{h(Y) ) 2 }! R(,h; µ) UV is: inf inf h sup µ R(,h; µ) Denial of Service Attack (Gupta, Nayyar, Lanbort, B; CDC 2) v J R γ u y γ u ransmitter () observes and decides whether to transmit or not Jammer (J) observes s action and decides whether to deny service or not Both actions incur cost (inactions do not) Receiver (R) incurs no cost if transmission is unblocked; otherwise cost is var( 2 ) Denial of Service Attack (Gupta, Nayyar, Lanbort, B; CDC 2) v J R γ u y γ u If ransmitter uses stratey () observes ϒ, ϒ() = and α, decides α= or, whether to transmit or not and J blocks w.p. p, then cost to -R: Jammer (J) observes s action and decides J(ϒ,p) = E[ c whether to deny {α=} d service {v=b} (- or not est ) 2 ] to Both be minimized actions incur by cost and maimized by J Receiver (R) incurs no cost if transmission Best unblocked; responses otherwise are of cost the is threshold var( 2 ) type Best responses min J(ϒ,)! α * = if 2 > c min J(ϒ,)! α * = if d > c for < p <, min J(ϒ,p)! α * = if 2 > Δ p := (c-pd) / (-p) p * = if E [ 2 α = ] > d = if E [ 2 α = ] < d (,) if E [ 2 α = ] = d An equivalent ame and its SP solution Multi-stae version with limits on frequency of blockin Multi-stae version with limits on frequency of blockin (2) Oriinal dynamic ame with asymmetric information is now a static ame (with symmetric information) in Δ (threshold) & p Admits a SP, where Δ and p could take inner values (finite non-zero Δ, and proper mied for J) Source { t } i.i.d. zero-mean Gaussian N-stae additive cost, but J can block M < N times J knows all past actions, and current action of knows all past actions, and past and present values of output State s t (common information): # blockins Oriinal dynamic ame with asymmetric information can be lifted to one with symmetric information, and results of static ame applied iteratively, but now also by keepin track of s t SP solution is aain of the threshold type, with Δ t and p t now dependin on s t. Etension to correlated outputs..

6 Intrusion Detection (IDS) Intrusion Detection (IDS) Intrusion Detection (IDS) Interaction between attacker(s) and the IDS is modeled as a non-cooperative ame Interaction between attacker(s) and the IDS is modeled as a non-cooperative ame A sensor network is introduced as a third, fictitious player, with a fied probability distribution for each attack type Interaction between attacker(s) and the IDS is modeled as a non-cooperative ame A sensor network is introduced as a third, fictitious player, with a fied probability distribution for each attack type Output of the sensor network is measurement to IDS, based on which it decides on the presence (or not) of an attack and its type Intrusion Detection (IDS) Interaction between attacker(s) and the IDS is modeled as a non-cooperative ame A sensor network is introduced as a third, fictitious player, with a fied probability distribution for each attack type Output of the sensor network is measurement to IDS, based on which it decides on the presence (or not) of an attack and its type Payoffs to attacker(s) and IDS for each triple of actions Finite or infinite (continuous-kernel) NZS ames dependin on whether # actions is finite or not. Finite or infinite (continuous-kernel) NZS ames dependin on whether # actions is finite or not. As a finite ame, there is a NE in mied strateies: worst probabilistic attacker behavior and correspondin best IDS stratey Finite or infinite (continuous-kernel) NZS ames dependin on whether # actions is finite or not. As a finite ame, there is a NE in mied strateies: worst probabilistic attacker behavior and correspondin best IDS stratey As a continuous-kernel ame, there eists a unique NE under some mild conditions Finite or infinite (continuous-kernel) NZS ames dependin on whether # actions is finite or not. As a finite ame, there is a NE in mied strateies: worst probabilistic attacker behavior and correspondin best IDS stratey As a continuous-kernel ame, there eists a unique NE under some mild conditions If payoffs are completely conflictin (zero-sum), there eist saddle-point solutions A Finite Security Game in Etensive Form (sinle subsystem, sinle detectable threat)

7 Selected References o Network Security Concepts o Security Games (SGs) Network Security: A Decision and Game- heoretic Approach (Alpcan, B, CUP, 2) Game theory meets network security and privacy (Manshei, Zhu, Alpcan, B, Hubau; ACM Survey, 2) A hierarchical security architecture for the smart rid (Zhu, B; in Hossain, Han, Poor, edts, Smart Grid Communications and Networkin, CUP, 22) Hybrid learnin in stochastic ames and its applications in network security (Zhu, B; in Lewis, Liu, edts, Computational Intellience Series, IEEE 2) Game heory in Wireless and Comm Nets (Han, Niyato, Saad, B, Hjorunes; CUP, Oct 2) Deterministic SGs Stochastic SGs SGs w information limitations o Decision Makin for Network Security Security risk-manaement Re allocation for security Usability, trust, and privacy o Security Attack and Intrusion Detection hanks!! Machine learnin for intrusion and anomaly detection Hypothesis testin for attack detection

OUTLINE! Stochastic Dynamic Teams and Games with Asymmetric Information. General Framework. General Framework. General Framework.

OUTLINE! Stochastic Dynamic Teams and Games with Asymmetric Information. General Framework. General Framework. General Framework. Stochastic Dynamic Teams and Games ith Asymmetric Information TAMER BAȘAR ECE, CAS, CSL, ITI and MechSE University of Illinois at U-C basar@illinois.edu September 9, 5 IMA-Distributed Control and DM over

More information

arxiv: v1 [cs.sy] 30 Sep 2015

arxiv: v1 [cs.sy] 30 Sep 2015 Optimal Sensor Scheduling and Remote Estimation over an Additive Noise Channel Xiaobin Gao, Emrah Akyol, and Tamer Başar arxiv:1510.00064v1 cs.sy 30 Sep 015 Abstract We consider a sensor scheduling and

More information

Remote Estimation Games over Shared Networks

Remote Estimation Games over Shared Networks October st, 04 Remote Estimation Games over Shared Networks Marcos Vasconcelos & Nuno Martins marcos@umd.edu Dept. of Electrical and Computer Engineering Institute of Systems Research University of Maryland,

More information

ECE Optimization for wireless networks Final. minimize f o (x) s.t. Ax = b,

ECE Optimization for wireless networks Final. minimize f o (x) s.t. Ax = b, ECE 788 - Optimization for wireless networks Final Please provide clear and complete answers. PART I: Questions - Q.. Discuss an iterative algorithm that converges to the solution of the problem minimize

More information

Lecture 6 Lecturer: Shaddin Dughmi Scribes: Omkar Thakoor & Umang Gupta

Lecture 6 Lecturer: Shaddin Dughmi Scribes: Omkar Thakoor & Umang Gupta CSCI699: opics in Learning & Game heory Lecture 6 Lecturer: Shaddin Dughmi Scribes: Omkar hakoor & Umang Gupta No regret learning in zero-sum games Definition. A 2-player game of complete information is

More information

Risk-Sensitive and Robust Mean Field Games

Risk-Sensitive and Robust Mean Field Games Risk-Sensitive and Robust Mean Field Games Tamer Başar Coordinated Science Laboratory Department of Electrical and Computer Engineering University of Illinois at Urbana-Champaign Urbana, IL - 6181 IPAM

More information

Probabilistic image processing and Bayesian network

Probabilistic image processing and Bayesian network robabilistic imae processin and Bayesian network Kazuyuki Tanaka Graduate School o Inormation Sciences Tohoku University kazu@smapip.is.tohoku.ac.jp http://www.smapip.is.tohoku.ac.jp/~kazu/ Reerences K.

More information

Sufficient Statistics in Decentralized Decision-Making Problems

Sufficient Statistics in Decentralized Decision-Making Problems Sufficient Statistics in Decentralized Decision-Making Problems Ashutosh Nayyar University of Southern California Feb 8, 05 / 46 Decentralized Systems Transportation Networks Communication Networks Networked

More information

Strong Interference and Spectrum Warfare

Strong Interference and Spectrum Warfare Stron Interference and Spectrum Warfare Otilia opescu and Christopher Rose WILAB Ruters University 73 Brett Rd., iscataway, J 8854-86 Email: {otilia,crose}@winlab.ruters.edu Dimitrie C. opescu Department

More information

6196 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 57, NO. 9, SEPTEMBER 2011

6196 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 57, NO. 9, SEPTEMBER 2011 6196 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 57, NO. 9, SEPTEMBER 2011 On the Structure of Real-Time Encoding and Decoding Functions in a Multiterminal Communication System Ashutosh Nayyar, Student

More information

A Deterministic Annealing Approach to Witsenhausen s Counterexample

A Deterministic Annealing Approach to Witsenhausen s Counterexample A Deterministic Annealing Approach to Witsenhausen s Counterexample Mustafa Mehmetoglu Dep. of Electrical-Computer Eng. UC Santa Barbara, CA, US Email: mehmetoglu@ece.ucsb.edu Emrah Akyol Dep. of Electrical

More information

A (Brief) Introduction to Game Theory

A (Brief) Introduction to Game Theory A (Brief) Introduction to Game Theory Johanne Cohen PRiSM/CNRS, Versailles, France. Goal Goal is a Nash equilibrium. Today The game of Chicken Definitions Nash Equilibrium Rock-paper-scissors Game Mixed

More information

Asymptotic Distortion Performance of Source-Channel Diversity Schemes over Relay Channels

Asymptotic Distortion Performance of Source-Channel Diversity Schemes over Relay Channels Asymptotic istortion Performance of Source-Channel iversity Schemes over Relay Channels Karim G. Seddik 1, Andres Kwasinski 2, and K. J. Ray Liu 1 1 epartment of Electrical and Computer Engineering, 2

More information

A Polynomial-time Nash Equilibrium Algorithm for Repeated Games

A Polynomial-time Nash Equilibrium Algorithm for Repeated Games A Polynomial-time Nash Equilibrium Algorithm for Repeated Games Michael L. Littman mlittman@cs.rutgers.edu Rutgers University Peter Stone pstone@cs.utexas.edu The University of Texas at Austin Main Result

More information

Communication constraints and latency in Networked Control Systems

Communication constraints and latency in Networked Control Systems Communication constraints and latency in Networked Control Systems João P. Hespanha Center for Control Engineering and Computation University of California Santa Barbara In collaboration with Antonio Ortega

More information

Distributed Detection and Estimation in Wireless Sensor Networks: Resource Allocation, Fusion Rules, and Network Security

Distributed Detection and Estimation in Wireless Sensor Networks: Resource Allocation, Fusion Rules, and Network Security Distributed Detection and Estimation in Wireless Sensor Networks: Resource Allocation, Fusion Rules, and Network Security Edmond Nurellari The University of Leeds, UK School of Electronic and Electrical

More information

Communication Games on the Generalized Gaussian Relay Channel

Communication Games on the Generalized Gaussian Relay Channel Communication Games on the Generalized Gaussian Relay Channel Dileep M. alathil Department of Electrical Engineering University of Southern California manisser@usc.edu Rahul Jain EE & ISE Departments University

More information

Dynamic Games with Asymmetric Information: Common Information Based Perfect Bayesian Equilibria and Sequential Decomposition

Dynamic Games with Asymmetric Information: Common Information Based Perfect Bayesian Equilibria and Sequential Decomposition Dynamic Games with Asymmetric Information: Common Information Based Perfect Bayesian Equilibria and Sequential Decomposition 1 arxiv:1510.07001v1 [cs.gt] 23 Oct 2015 Yi Ouyang, Hamidreza Tavafoghi and

More information

On Equilibria of Distributed Message-Passing Games

On Equilibria of Distributed Message-Passing Games On Equilibria of Distributed Message-Passing Games Concetta Pilotto and K. Mani Chandy California Institute of Technology, Computer Science Department 1200 E. California Blvd. MC 256-80 Pasadena, US {pilotto,mani}@cs.caltech.edu

More information

Analysis of Outage and Throughput for Opportunistic Cooperative HARQ Systems over Time Correlated Fading Channels

Analysis of Outage and Throughput for Opportunistic Cooperative HARQ Systems over Time Correlated Fading Channels Analysis of Outae and Throuhput for Opportunistic Cooperative HARQ Systems over Time Correlated Fadin Channels Xuanxuan Yan, Haichuan Din,3, Zhen Shi, Shaodan Ma, and Su Pan Department of Electrical and

More information

Performance-based Security for Encoding of Information Signals. FA ( ) Paul Cuff (Princeton University)

Performance-based Security for Encoding of Information Signals. FA ( ) Paul Cuff (Princeton University) Performance-based Security for Encoding of Information Signals FA9550-15-1-0180 (2015-2018) Paul Cuff (Princeton University) Contributors Two students finished PhD Tiance Wang (Goldman Sachs) Eva Song

More information

Wireless Network Security Spring 2016

Wireless Network Security Spring 2016 Wireless Network Security Spring 2016 Patrick Tague Class #19 Vehicular Network Security & Privacy 2016 Patrick Tague 1 Class #19 Review of some vehicular network stuff How wireless attacks affect vehicle

More information

ECE Information theory Final (Fall 2008)

ECE Information theory Final (Fall 2008) ECE 776 - Information theory Final (Fall 2008) Q.1. (1 point) Consider the following bursty transmission scheme for a Gaussian channel with noise power N and average power constraint P (i.e., 1/n X n i=1

More information

Quantifying Cyber Security for Networked Control Systems

Quantifying Cyber Security for Networked Control Systems Quantifying Cyber Security for Networked Control Systems Henrik Sandberg ACCESS Linnaeus Centre, KTH Royal Institute of Technology Joint work with: André Teixeira, György Dán, Karl H. Johansson (KTH) Kin

More information

Quantization for Distributed Estimation

Quantization for Distributed Estimation 0 IEEE International Conference on Internet of Things ithings 0), Green Computing and Communications GreenCom 0), and Cyber-Physical-Social Computing CPSCom 0) Quantization for Distributed Estimation uan-yu

More information

Minimax Problems. Daniel P. Palomar. Hong Kong University of Science and Technolgy (HKUST)

Minimax Problems. Daniel P. Palomar. Hong Kong University of Science and Technolgy (HKUST) Mini Problems Daniel P. Palomar Hong Kong University of Science and Technolgy (HKUST) ELEC547 - Convex Optimization Fall 2009-10, HKUST, Hong Kong Outline of Lecture Introduction Matrix games Bilinear

More information

Cheap talk theoretic tools for distributed sensing in the presence of strategic sensors

Cheap talk theoretic tools for distributed sensing in the presence of strategic sensors 1 / 37 Cheap talk theoretic tools for distributed sensing in the presence of strategic sensors Cédric Langbort Department of Aerospace Engineering & Coordinated Science Laboratory UNIVERSITY OF ILLINOIS

More information

NUMERICAL COMPUTATION OF THE CAPACITY OF CONTINUOUS MEMORYLESS CHANNELS

NUMERICAL COMPUTATION OF THE CAPACITY OF CONTINUOUS MEMORYLESS CHANNELS NUMERICAL COMPUTATION OF THE CAPACITY OF CONTINUOUS MEMORYLESS CHANNELS Justin Dauwels Dept. of Information Technology and Electrical Engineering ETH, CH-8092 Zürich, Switzerland dauwels@isi.ee.ethz.ch

More information

Information Theory Meets Game Theory on The Interference Channel

Information Theory Meets Game Theory on The Interference Channel Information Theory Meets Game Theory on The Interference Channel Randall A. Berry Dept. of EECS Northwestern University e-mail: rberry@eecs.northwestern.edu David N. C. Tse Wireless Foundations University

More information

For general queries, contact

For general queries, contact PART I INTRODUCTION LECTURE Noncooperative Games This lecture uses several examples to introduce the key principles of noncooperative game theory Elements of a Game Cooperative vs Noncooperative Games:

More information

OSNR Optimization in Optical Networks: Extension for Capacity Constraints

OSNR Optimization in Optical Networks: Extension for Capacity Constraints 5 American Control Conference June 8-5. Portland OR USA ThB3.6 OSNR Optimization in Optical Networks: Extension for Capacity Constraints Yan Pan and Lacra Pavel Abstract This paper builds on the OSNR model

More information

Resilient Control of Cyber-Physical Systems against Denial-of-Service Attacks

Resilient Control of Cyber-Physical Systems against Denial-of-Service Attacks Resilient Control of Cyber-Physical Systems against Denial-of-Service Attacks Yuan Yuan, Quanyan Zhu, Fuchun Sun, Qinyi Wang and Tamer Başar Abstract The integration of control systems with modern information

More information

Group Secret Key Agreement over State-Dependent Wireless Broadcast Channels

Group Secret Key Agreement over State-Dependent Wireless Broadcast Channels Group Secret Key Agreement over State-Dependent Wireless Broadcast Channels Mahdi Jafari Siavoshani Sharif University of Technology, Iran Shaunak Mishra, Suhas Diggavi, Christina Fragouli Institute of

More information

A Coalition Formation Game in Partition Form for Peer-to-Peer File Sharing Networks

A Coalition Formation Game in Partition Form for Peer-to-Peer File Sharing Networks Author manuscript, published in "IEEE GLOBAL COMMUNICATIONS CONFERENCE (IEEE GLOBECOM 2010), United States (2010)" A Coalition Formation Game in Partition Form for Peer-to-Peer File Sharing Networks Walid

More information

Cyber Security Games with Asymmetric Information

Cyber Security Games with Asymmetric Information Cyber Security Games with Asymmetric Information Jeff S. Shamma Georgia Institute of Technology Joint work with Georgios Kotsalis & Malachi Jones ARO MURI Annual Review November 15, 2012 Research Thrust:

More information

On Selfish Behavior in CSMA/CA Networks

On Selfish Behavior in CSMA/CA Networks On Selfish Behavior in CSMA/CA Networks Mario Čagalj1 Saurabh Ganeriwal 2 Imad Aad 1 Jean-Pierre Hubaux 1 1 LCA-IC-EPFL 2 NESL-EE-UCLA March 17, 2005 - IEEE Infocom 2005 - Introduction CSMA/CA is the most

More information

Artificial Neural Networks 2

Artificial Neural Networks 2 CSC2515 Machine Learning Sam Roweis Artificial Neural s 2 We saw neural nets for classification. Same idea for regression. ANNs are just adaptive basis regression machines of the form: y k = j w kj σ(b

More information

Optimal Power Allocation for Distributed BLUE Estimation with Linear Spatial Collaboration

Optimal Power Allocation for Distributed BLUE Estimation with Linear Spatial Collaboration Optimal Power Allocation for Distributed BLUE Estimation with Linear Spatial Collaboration Mohammad Fanaei, Matthew C. Valenti Abbas Jamalipour, and Natalia A. Schmid Dept. of Computer Science and Electrical

More information

ECE Information theory Final

ECE Information theory Final ECE 776 - Information theory Final Q1 (1 point) We would like to compress a Gaussian source with zero mean and variance 1 We consider two strategies In the first, we quantize with a step size so that the

More information

Keyless authentication in the presence of a simultaneously transmitting adversary

Keyless authentication in the presence of a simultaneously transmitting adversary Keyless authentication in the presence of a simultaneously transmitting adversary Eric Graves Army Research Lab Adelphi MD 20783 U.S.A. ericsgra@ufl.edu Paul Yu Army Research Lab Adelphi MD 20783 U.S.A.

More information

: Cryptography and Game Theory Ran Canetti and Alon Rosen. Lecture 8

: Cryptography and Game Theory Ran Canetti and Alon Rosen. Lecture 8 0368.4170: Cryptography and Game Theory Ran Canetti and Alon Rosen Lecture 8 December 9, 2009 Scribe: Naama Ben-Aroya Last Week 2 player zero-sum games (min-max) Mixed NE (existence, complexity) ɛ-ne Correlated

More information

Decentralized Control of Stochastic Systems

Decentralized Control of Stochastic Systems Decentralized Control of Stochastic Systems Sanjay Lall Stanford University CDC-ECC Workshop, December 11, 2005 2 S. Lall, Stanford 2005.12.11.02 Decentralized Control G 1 G 2 G 3 G 4 G 5 y 1 u 1 y 2 u

More information

Nash Bargaining in Beamforming Games with Quantized CSI in Two-user Interference Channels

Nash Bargaining in Beamforming Games with Quantized CSI in Two-user Interference Channels Nash Bargaining in Beamforming Games with Quantized CSI in Two-user Interference Channels Jung Hoon Lee and Huaiyu Dai Department of Electrical and Computer Engineering, North Carolina State University,

More information

Lecture 7. Union bound for reducing M-ary to binary hypothesis testing

Lecture 7. Union bound for reducing M-ary to binary hypothesis testing Lecture 7 Agenda for the lecture M-ary hypothesis testing and the MAP rule Union bound for reducing M-ary to binary hypothesis testing Introduction of the channel coding problem 7.1 M-ary hypothesis testing

More information

Players as Serial or Parallel Random Access Machines. Timothy Van Zandt. INSEAD (France)

Players as Serial or Parallel Random Access Machines. Timothy Van Zandt. INSEAD (France) Timothy Van Zandt Players as Serial or Parallel Random Access Machines DIMACS 31 January 2005 1 Players as Serial or Parallel Random Access Machines (EXPLORATORY REMARKS) Timothy Van Zandt tvz@insead.edu

More information

Threshold Policy for Global Games with Noisy Information Sharing

Threshold Policy for Global Games with Noisy Information Sharing 05 IEEE 54th Annual Conference on Decision and Control CDC December 5-8, 05 Osaka, Japan Threshold olicy for Global Games with Noisy Information Sharing Hessam Mahdavifar, Ahmad Beirami, Behrouz Touri,

More information

Data Rate Theorem for Stabilization over Time-Varying Feedback Channels

Data Rate Theorem for Stabilization over Time-Varying Feedback Channels Data Rate Theorem for Stabilization over Time-Varying Feedback Channels Workshop on Frontiers in Distributed Communication, Sensing and Control Massimo Franceschetti, UCSD (joint work with P. Minero, S.

More information

Lecture 10: Broadcast Channel and Superposition Coding

Lecture 10: Broadcast Channel and Superposition Coding Lecture 10: Broadcast Channel and Superposition Coding Scribed by: Zhe Yao 1 Broadcast channel M 0M 1M P{y 1 y x} M M 01 1 M M 0 The capacity of the broadcast channel depends only on the marginal conditional

More information

On the Price of Anarchy in Unbounded Delay Networks

On the Price of Anarchy in Unbounded Delay Networks On the Price of Anarchy in Unbounded Delay Networks Tao Wu Nokia Research Center Cambridge, Massachusetts, USA tao.a.wu@nokia.com David Starobinski Boston University Boston, Massachusetts, USA staro@bu.edu

More information

Decentralized Stochastic Control with Partial Sharing Information Structures: A Common Information Approach

Decentralized Stochastic Control with Partial Sharing Information Structures: A Common Information Approach Decentralized Stochastic Control with Partial Sharing Information Structures: A Common Information Approach 1 Ashutosh Nayyar, Aditya Mahajan and Demosthenis Teneketzis Abstract A general model of decentralized

More information

Interference Channels with Source Cooperation

Interference Channels with Source Cooperation Interference Channels with Source Cooperation arxiv:95.319v1 [cs.it] 19 May 29 Vinod Prabhakaran and Pramod Viswanath Coordinated Science Laboratory University of Illinois, Urbana-Champaign Urbana, IL

More information

A Decentralized Bayesian Attack Detection Algorithm for Network Security

A Decentralized Bayesian Attack Detection Algorithm for Network Security A Decentralized Bayesian Attack Detection Algorithm for Network Security Kien C. Nguyen, Tansu Alpcan, and Tamer Başar Abstract Decentralized detection has been an active area of research since the late

More information

Introduction to Sequential Teams

Introduction to Sequential Teams Introduction to Sequential Teams Aditya Mahajan McGill University Joint work with: Ashutosh Nayyar and Demos Teneketzis, UMichigan MITACS Workshop on Fusion and Inference in Networks, 2011 Decentralized

More information

On the Optimality of Likelihood Ratio Test for Prospect Theory Based Binary Hypothesis Testing

On the Optimality of Likelihood Ratio Test for Prospect Theory Based Binary Hypothesis Testing 1 On the Optimality of Likelihood Ratio Test for Prospect Theory Based Binary Hypothesis Testing Sinan Gezici, Senior Member, IEEE, and Pramod K. Varshney, Life Fellow, IEEE Abstract In this letter, the

More information

Locating the Source of Diffusion in Large-Scale Networks

Locating the Source of Diffusion in Large-Scale Networks Locating the Source of Diffusion in Large-Scale Networks Supplemental Material Pedro C. Pinto, Patrick Thiran, Martin Vetterli Contents S1. Detailed Proof of Proposition 1..................................

More information

ECE533 Digital Image Processing. Embedded Zerotree Wavelet Image Codec

ECE533 Digital Image Processing. Embedded Zerotree Wavelet Image Codec University of Wisconsin Madison Electrical Computer Engineering ECE533 Digital Image Processing Embedded Zerotree Wavelet Image Codec Team members Hongyu Sun Yi Zhang December 12, 2003 Table of Contents

More information

Uncertainty. Jayakrishnan Unnikrishnan. CSL June PhD Defense ECE Department

Uncertainty. Jayakrishnan Unnikrishnan. CSL June PhD Defense ECE Department Decision-Making under Statistical Uncertainty Jayakrishnan Unnikrishnan PhD Defense ECE Department University of Illinois at Urbana-Champaign CSL 141 12 June 2010 Statistical Decision-Making Relevant in

More information

Dynamic and Adversarial Reachavoid Symbolic Planning

Dynamic and Adversarial Reachavoid Symbolic Planning Dynamic and Adversarial Reachavoid Symbolic Planning Laya Shamgah Advisor: Dr. Karimoddini July 21 st 2017 Thrust 1: Modeling, Analysis and Control of Large-scale Autonomous Vehicles (MACLAV) Sub-trust

More information

On Common Information and the Encoding of Sources that are Not Successively Refinable

On Common Information and the Encoding of Sources that are Not Successively Refinable On Common Information and the Encoding of Sources that are Not Successively Refinable Kumar Viswanatha, Emrah Akyol, Tejaswi Nanjundaswamy and Kenneth Rose ECE Department, University of California - Santa

More information

6.867 Machine learning

6.867 Machine learning 6.867 Machine learning Mid-term eam October 8, 6 ( points) Your name and MIT ID: .5.5 y.5 y.5 a).5.5 b).5.5.5.5 y.5 y.5 c).5.5 d).5.5 Figure : Plots of linear regression results with different types of

More information

Cooperation Stimulation in Cooperative Communications: An Indirect Reciprocity Game

Cooperation Stimulation in Cooperative Communications: An Indirect Reciprocity Game IEEE ICC 202 - Wireless Networks Symposium Cooperation Stimulation in Cooperative Communications: An Indirect Reciprocity Game Yang Gao, Yan Chen and K. J. Ray Liu Department of Electrical and Computer

More information

AN INFORMATION THEORY APPROACH TO WIRELESS SENSOR NETWORK DESIGN

AN INFORMATION THEORY APPROACH TO WIRELESS SENSOR NETWORK DESIGN AN INFORMATION THEORY APPROACH TO WIRELESS SENSOR NETWORK DESIGN A Thesis Presented to The Academic Faculty by Bryan Larish In Partial Fulfillment of the Requirements for the Degree Doctor of Philosophy

More information

Cyber Attacks, Detection and Protection in Smart Grid State Estimation

Cyber Attacks, Detection and Protection in Smart Grid State Estimation 1 Cyber Attacks, Detection and Protection in Smart Grid State Estimation Yi Zhou, Student Member, IEEE Zhixin Miao, Senior Member, IEEE Abstract This paper reviews the types of cyber attacks in state estimation

More information

Optimal Decentralized Control of Coupled Subsystems With Control Sharing

Optimal Decentralized Control of Coupled Subsystems With Control Sharing IEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL. 58, NO. 9, SEPTEMBER 2013 2377 Optimal Decentralized Control of Coupled Subsystems With Control Sharing Aditya Mahajan, Member, IEEE Abstract Subsystems that

More information

THE SIGNAL ESTIMATOR LIMIT SETTING METHOD

THE SIGNAL ESTIMATOR LIMIT SETTING METHOD ' THE SIGNAL ESTIMATOR LIMIT SETTING METHOD Shan Jin, Peter McNamara Department of Physics, University of Wisconsin Madison, Madison, WI 53706 Abstract A new method of backround subtraction is presented

More information

Asymptotically Optimal and Bandwith-efficient Decentralized Detection

Asymptotically Optimal and Bandwith-efficient Decentralized Detection Asymptotically Optimal and Bandwith-efficient Decentralized Detection Yasin Yılmaz and Xiaodong Wang Electrical Engineering Department, Columbia University New Yor, NY 10027 Email: yasin,wangx@ee.columbia.edu

More information

Secure Degrees of Freedom of the MIMO Multiple Access Wiretap Channel

Secure Degrees of Freedom of the MIMO Multiple Access Wiretap Channel Secure Degrees of Freedom of the MIMO Multiple Access Wiretap Channel Pritam Mukherjee Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland, College Park, MD 074 pritamm@umd.edu

More information

Machine Teaching. for Personalized Education, Security, Interactive Machine Learning. Jerry Zhu

Machine Teaching. for Personalized Education, Security, Interactive Machine Learning. Jerry Zhu Machine Teaching for Personalized Education, Security, Interactive Machine Learning Jerry Zhu NIPS 2015 Workshop on Machine Learning from and for Adaptive User Technologies Supervised Learning Review D:

More information

SHARED INFORMATION. Prakash Narayan with. Imre Csiszár, Sirin Nitinawarat, Himanshu Tyagi, Shun Watanabe

SHARED INFORMATION. Prakash Narayan with. Imre Csiszár, Sirin Nitinawarat, Himanshu Tyagi, Shun Watanabe SHARED INFORMATION Prakash Narayan with Imre Csiszár, Sirin Nitinawarat, Himanshu Tyagi, Shun Watanabe 2/40 Acknowledgement Praneeth Boda Himanshu Tyagi Shun Watanabe 3/40 Outline Two-terminal model: Mutual

More information

Decision-making, inference, and learning theory. ECE 830 & CS 761, Spring 2016

Decision-making, inference, and learning theory. ECE 830 & CS 761, Spring 2016 Decision-making, inference, and learning theory ECE 830 & CS 761, Spring 2016 1 / 22 What do we have here? Given measurements or observations of some physical process, we ask the simple question what do

More information

Mean Field Competitive Binary MDPs and Structured Solutions

Mean Field Competitive Binary MDPs and Structured Solutions Mean Field Competitive Binary MDPs and Structured Solutions Minyi Huang School of Mathematics and Statistics Carleton University Ottawa, Canada MFG217, UCLA, Aug 28 Sept 1, 217 1 / 32 Outline of talk The

More information

Bregman Divergence and Mirror Descent

Bregman Divergence and Mirror Descent Bregman Divergence and Mirror Descent Bregman Divergence Motivation Generalize squared Euclidean distance to a class of distances that all share similar properties Lots of applications in machine learning,

More information

The Method of Types and Its Application to Information Hiding

The Method of Types and Its Application to Information Hiding The Method of Types and Its Application to Information Hiding Pierre Moulin University of Illinois at Urbana-Champaign www.ifp.uiuc.edu/ moulin/talks/eusipco05-slides.pdf EUSIPCO Antalya, September 7,

More information

SIGNAL COMPRESSION. 8. Lossy image compression: Principle of embedding

SIGNAL COMPRESSION. 8. Lossy image compression: Principle of embedding SIGNAL COMPRESSION 8. Lossy image compression: Principle of embedding 8.1 Lossy compression 8.2 Embedded Zerotree Coder 161 8.1 Lossy compression - many degrees of freedom and many viewpoints The fundamental

More information

SHARED INFORMATION. Prakash Narayan with. Imre Csiszár, Sirin Nitinawarat, Himanshu Tyagi, Shun Watanabe

SHARED INFORMATION. Prakash Narayan with. Imre Csiszár, Sirin Nitinawarat, Himanshu Tyagi, Shun Watanabe SHARED INFORMATION Prakash Narayan with Imre Csiszár, Sirin Nitinawarat, Himanshu Tyagi, Shun Watanabe 2/41 Outline Two-terminal model: Mutual information Operational meaning in: Channel coding: channel

More information

Information, Utility & Bounded Rationality

Information, Utility & Bounded Rationality Information, Utility & Bounded Rationality Pedro A. Ortega and Daniel A. Braun Department of Engineering, University of Cambridge Trumpington Street, Cambridge, CB2 PZ, UK {dab54,pao32}@cam.ac.uk Abstract.

More information

Finding Optimal Strategies for Influencing Social Networks in Two Player Games. MAJ Nick Howard, USMA Dr. Steve Kolitz, Draper Labs Itai Ashlagi, MIT

Finding Optimal Strategies for Influencing Social Networks in Two Player Games. MAJ Nick Howard, USMA Dr. Steve Kolitz, Draper Labs Itai Ashlagi, MIT Finding Optimal Strategies for Influencing Social Networks in Two Player Games MAJ Nick Howard, USMA Dr. Steve Kolitz, Draper Labs Itai Ashlagi, MIT Problem Statement Given constrained resources for influencing

More information

On State Estimation with Bad Data Detection

On State Estimation with Bad Data Detection On State Estimation with Bad Data Detection Weiyu Xu, Meng Wang, and Ao Tang School of ECE, Cornell University, Ithaca, NY 4853 Abstract We consider the problem of state estimation through observations

More information

Joint FEC Encoder and Linear Precoder Design for MIMO Systems with Antenna Correlation

Joint FEC Encoder and Linear Precoder Design for MIMO Systems with Antenna Correlation Joint FEC Encoder and Linear Precoder Design for MIMO Systems with Antenna Correlation Chongbin Xu, Peng Wang, Zhonghao Zhang, and Li Ping City University of Hong Kong 1 Outline Background Mutual Information

More information

Probabilistic Model Checking and Strategy Synthesis for Robot Navigation

Probabilistic Model Checking and Strategy Synthesis for Robot Navigation Probabilistic Model Checking and Strategy Synthesis for Robot Navigation Dave Parker University of Birmingham (joint work with Bruno Lacerda, Nick Hawes) AIMS CDT, Oxford, May 2015 Overview Probabilistic

More information

Improved Spectrum Utilization in Cognitive Radio Systems

Improved Spectrum Utilization in Cognitive Radio Systems Improved Spectrum Utilization in Cognitive Radio Systems Lei Cao and Ramanarayanan Viswanathan Department of Electrical Engineering The University of Mississippi Jan. 15, 2014 Lei Cao and Ramanarayanan

More information

Trust Degree Based Beamforming for Multi-Antenna Cooperative Communication Systems

Trust Degree Based Beamforming for Multi-Antenna Cooperative Communication Systems Introduction Main Results Simulation Conclusions Trust Degree Based Beamforming for Multi-Antenna Cooperative Communication Systems Mojtaba Vaezi joint work with H. Inaltekin, W. Shin, H. V. Poor, and

More information

1.1 Basis of Statistical Decision Theory

1.1 Basis of Statistical Decision Theory ECE598: Information-theoretic methods in high-dimensional statistics Spring 2016 Lecture 1: Introduction Lecturer: Yihong Wu Scribe: AmirEmad Ghassami, Jan 21, 2016 [Ed. Jan 31] Outline: Introduction of

More information

Chapter 7: Channel coding:convolutional codes

Chapter 7: Channel coding:convolutional codes Chapter 7: : Convolutional codes University of Limoges meghdadi@ensil.unilim.fr Reference : Digital communications by John Proakis; Wireless communication by Andreas Goldsmith Encoder representation Communication

More information

Witsenhausen s counterexample and its links with multimedia security problems

Witsenhausen s counterexample and its links with multimedia security problems Witsenhausen s counterexample and its links with multimedia security problems Pedro Comesaña-Alfaro Fernando Pérez-González Chaouki T. Abdallah IWDW 2011 Atlantic City, New Jersey Outline Introduction

More information

Efficient Sensor Network Planning Method. Using Approximate Potential Game

Efficient Sensor Network Planning Method. Using Approximate Potential Game Efficient Sensor Network Planning Method 1 Using Approximate Potential Game Su-Jin Lee, Young-Jin Park, and Han-Lim Choi, Member, IEEE arxiv:1707.00796v1 [cs.gt] 4 Jul 2017 Abstract This paper addresses

More information

Distributed Optimization over Networks Gossip-Based Algorithms

Distributed Optimization over Networks Gossip-Based Algorithms Distributed Optimization over Networks Gossip-Based Algorithms Angelia Nedić angelia@illinois.edu ISE Department and Coordinated Science Laboratory University of Illinois at Urbana-Champaign Outline Random

More information

Scalar and Vector Quantization. National Chiao Tung University Chun-Jen Tsai 11/06/2014

Scalar and Vector Quantization. National Chiao Tung University Chun-Jen Tsai 11/06/2014 Scalar and Vector Quantization National Chiao Tung University Chun-Jen Tsai 11/06/014 Basic Concept of Quantization Quantization is the process of representing a large, possibly infinite, set of values

More information

An Indirect Reciprocity Game Theoretic Framework for Dynamic Spectrum Access

An Indirect Reciprocity Game Theoretic Framework for Dynamic Spectrum Access IEEE ICC 2012 - Cognitive Radio and Networks Symposium An Indirect Reciprocity Game Theoretic Framework for Dynamic Spectrum Access Biling Zhang 1, 2, Yan Chen 1, and K. J. Ray Liu 1 1 Department of Electrical

More information

REAL-TIME TIME-FREQUENCY BASED BLIND SOURCE SEPARATION. Scott Rickard, Radu Balan, Justinian Rosca

REAL-TIME TIME-FREQUENCY BASED BLIND SOURCE SEPARATION. Scott Rickard, Radu Balan, Justinian Rosca REAL-TIME TIME-FREQUENCY BASED BLIND SOURCE SEARATION Scott Rickard, Radu Balan, Justinian Rosca Siemens Corporate Research rinceton, NJ scott.rickard,radu.balan,justinian.rosca @scr.siemens.com ABSTRACT

More information

Optimal Distributed Detection Strategies for Wireless Sensor Networks

Optimal Distributed Detection Strategies for Wireless Sensor Networks Optimal Distributed Detection Strategies for Wireless Sensor Networks Ke Liu and Akbar M. Sayeed University of Wisconsin-Madison kliu@cae.wisc.edu, akbar@engr.wisc.edu Abstract We study optimal distributed

More information

A Game Theoretic Investigation of Deception in Network Security

A Game Theoretic Investigation of Deception in Network Security A Game Theoretic Investigation of Deception in Network Security Thomas E. Carroll Pacific Northwest National Laboratory 902 Battelle Boulevard P.O. Box 999, MSIN J4-45 Richland, WA 99352 USA Email: Thomas.Carroll@pnl.gov

More information

Attaining maximal reliability with minimal feedback via joint channel-code and hash-function design

Attaining maximal reliability with minimal feedback via joint channel-code and hash-function design Attaining maimal reliability with minimal feedback via joint channel-code and hash-function design Stark C. Draper, Kannan Ramchandran, Biio Rimoldi, Anant Sahai, and David N. C. Tse Department of EECS,

More information

A Cooperative Bayesian Nonparametric Framework for Primary User Activity Monitoring in Cognitive Radio Networks

A Cooperative Bayesian Nonparametric Framework for Primary User Activity Monitoring in Cognitive Radio Networks A Cooperative Bayesian Nonparametric Framework for Primary User Activity Monitoring in Cognitive Radio Networks Walid Saad 1, Zhu Han 2, H. Vincent Poor 1, Tamer Başar 3, and Ju Bin Song 4 1 Electrical

More information

Graph-based codes for flash memory

Graph-based codes for flash memory 1/28 Graph-based codes for flash memory Discrete Mathematics Seminar September 3, 2013 Katie Haymaker Joint work with Professor Christine Kelley University of Nebraska-Lincoln 2/28 Outline 1 Background

More information

Decentralized Interference Channels with Noisy Feedback Possess Pareto Optimal Nash Equilibria

Decentralized Interference Channels with Noisy Feedback Possess Pareto Optimal Nash Equilibria Decentralized Interference Channels with Noisy Feedback Possess Pareto Optimal Nash Equilibria Samir M. Perlaza Ravi Tandon H. Vincent Poor To cite this version: Samir M. Perlaza Ravi Tandon H. Vincent

More information

Game Theory and its Applications to Networks - Part I: Strict Competition

Game Theory and its Applications to Networks - Part I: Strict Competition Game Theory and its Applications to Networks - Part I: Strict Competition Corinne Touati Master ENS Lyon, Fall 200 What is Game Theory and what is it for? Definition (Roger Myerson, Game Theory, Analysis

More information

The Game of Twenty Questions with noisy answers. Applications to Fast face detection, micro-surgical tool tracking and electron microscopy

The Game of Twenty Questions with noisy answers. Applications to Fast face detection, micro-surgical tool tracking and electron microscopy The Game of Twenty Questions with noisy answers. Applications to Fast face detection, micro-surgical tool tracking and electron microscopy Graduate Summer School: Computer Vision July 22 - August 9, 2013

More information

Distributed Joint Offloading Decision and Resource Allocation for Multi-User Mobile Edge Computing: A Game Theory Approach

Distributed Joint Offloading Decision and Resource Allocation for Multi-User Mobile Edge Computing: A Game Theory Approach Distributed Joint Offloading Decision and Resource Allocation for Multi-User Mobile Edge Computing: A Game Theory Approach Ning Li, Student Member, IEEE, Jose-Fernan Martinez-Ortega, Gregorio Rubio Abstract-

More information

بسم الله الرحمن الرحيم

بسم الله الرحمن الرحيم بسم الله الرحمن الرحيم Reliability Improvement of Distributed Detection in Clustered Wireless Sensor Networks 1 RELIABILITY IMPROVEMENT OF DISTRIBUTED DETECTION IN CLUSTERED WIRELESS SENSOR NETWORKS PH.D.

More information