Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Showing 1–50 of 64 results for author: Linder, T

.
  1. arXiv:2311.12609  [pdf, other

    cs.IT math.OC

    Reinforcement Learning for Near-Optimal Design of Zero-Delay Codes for Markov Sources

    Authors: Liam Cregg, Tamas Linder, Serdar Yuksel

    Abstract: In the classical lossy source coding problem, one encodes long blocks of source symbols that enables the distortion to approach the ultimate Shannon limit. Such a block-coding approach introduces large delays, which is undesirable in many delay-sensitive applications. We consider the zero-delay case, where the goal is to encode and decode a finite-alphabet Markov source without any delay. It has b… ▽ More

    Submitted 17 June, 2024; v1 submitted 21 November, 2023; originally announced November 2023.

    Comments: 15 pages, 3 figures; accepted for publication in IEEE Transactions on Information Theory

  2. arXiv:2311.05033  [pdf, ps, other

    math.ST

    Distribution-free tests for lossless feature selection in classification and regression

    Authors: László Györfi, Tamás Linder, Harro Walk

    Abstract: We study the problem of lossless feature selection for a $d$-dimensional feature vector $X=(X^{(1)},\dots ,X^{(d)})$ and label $Y$ for binary classification as well as nonparametric regression. For an index set $S\subset \{1,\dots ,d\}$, consider the selected $|S|$-dimensional feature subvector $X_S=(X^{(i)}, i\in S)$. If $L^*$ and $L^*(S)$ stand for the minimum risk based on $X$ and $X_S$, respec… ▽ More

    Submitted 8 November, 2023; originally announced November 2023.

    Comments: 22 pages

  3. arXiv:2307.16735  [pdf, ps, other

    cs.IT cs.LG math.ST stat.ML

    Lossless Transformations and Excess Risk Bounds in Statistical Inference

    Authors: László Györfi, Tamás Linder, Harro Walk

    Abstract: We study the excess minimum risk in statistical inference, defined as the difference between the minimum expected loss in estimating a random variable from an observed feature vector and the minimum expected loss in estimating the same random variable from a transformation (statistic) of the feature vector. After characterizing lossless transformations, i.e., transformations for which the excess r… ▽ More

    Submitted 27 September, 2023; v1 submitted 31 July, 2023; originally announced July 2023.

    Comments: to appear in Entropy

    MSC Class: 62C05; 62G10; 68P30; 94A17 ACM Class: G.3; I.5; H.1.1

  4. arXiv:2210.16303  [pdf, ps, other

    math.OC

    Logarithmic Regret in Adaptive Control of Noisy Linear Quadratic Regulator Systems Using Hints

    Authors: Mohammad Akbari, Bahman Gharesifard, Tamas Linder

    Abstract: The problem of regret minimization for online adaptive control of linear-quadratic systems is studied. In this problem, the true system transition parameters (matrices $A$ and $B$) are unknown, and the objective is to design and analyze algorithms that generate control policies with sublinear regret. Recent studies show that when the system parameters are fully unknown, there exists a choice of th… ▽ More

    Submitted 28 October, 2022; originally announced October 2022.

  5. Optical Time-Series Photometry of the Symbiotic Nova V1835 Aquilae

    Authors: Robert V. Caddy, Andrew C. Layden, Daniel E. Reichart, Joshua B. Haislip, Vladimir V. Kouprianov, Kevin M. Ivarsen, Justin P. Moore, Aaron P. LaCluyze, Tyler R. Linder, Melissa C. Nysewander

    Abstract: We present time-series CCD photometry in the $BVRI$ passbands of the recently identified symbiotic nova V1835 Aquilae (NSV 11749) over an interval of 5.1 years with 7-14 day cadence, observed during its quiescence. We find slow light variations with a range of $\sim$0.9 mag in $V$ and $\sim$0.3 mag in $I$. Analysis of these data show strong periodicity at $419 \pm 10$ days, which we interpret to b… ▽ More

    Submitted 22 September, 2022; originally announced September 2022.

    Comments: Main Paper: 28 pages, 5 figures, 5 tables. Supplement: 15 pages, 4 figures, 1 table. To be published in Publications of the Astronomical Society of the Pacific

    Journal ref: PASP 134 094201 (2022)

  6. Rényi Cross-Entropy Measures for Common Distributions and Processes with Memory

    Authors: Ferenc Cole Thierrin, Fady Alajaji, Tamás Linder

    Abstract: Two Rényi-type generalizations of the Shannon cross-entropy, the Rényi cross-entropy and the Natural Rényi cross-entropy, were recently used as loss functions for the improved design of deep learning generative adversarial networks. In this work, we build upon our results in [1] by deriving the Rényi and Natural Rényi differential cross-entropy measures in closed form for a wide class of common co… ▽ More

    Submitted 19 August, 2022; v1 submitted 14 August, 2022; originally announced August 2022.

    Journal ref: Entropy, Vol. 24, Issue, 10, October 2022

  7. arXiv:2206.14329  [pdf, ps, other

    cs.IT cs.LG

    On the Rényi Cross-Entropy

    Authors: Ferenc Cole Thierrin, Fady Alajaji, Tamás Linder

    Abstract: The Rényi cross-entropy measure between two distributions, a generalization of the Shannon cross-entropy, was recently used as a loss function for the improved design of deep learning generative adversarial networks. In this work, we examine the properties of this measure and derive closed-form expressions for it when one of the distributions is fixed and when both distributions belong to the expo… ▽ More

    Submitted 6 August, 2022; v1 submitted 28 June, 2022; originally announced June 2022.

    Comments: Appeared in the Proceedings of CWIT'22 (updated version)

  8. arXiv:2204.05412  [pdf, other

    astro-ph.EP

    NEOWISE Observations Of The Potentially Hazardous Asteroid (99942) Apophis

    Authors: Akash Satpathy, Amy Mainzer, Joseph R. Masiero, Tyler Linder, Roc M. Cutri, Edward L. Wright, Jana Pittichova, Tommy Grav, Emily Kramer

    Abstract: Large potentially hazardous asteroids (PHAs) are capable of causing a global catastrophe in the event of a planetary collision. Thus, rapid assessment of such an object's physical characteristics is crucial for determining its potential risk scale. We treated the near-Earth asteroid (99942) Apophis as a newly discovered object during its 2020-2021 close-approach as part of a mock planetary defense… ▽ More

    Submitted 11 April, 2022; originally announced April 2022.

    Comments: 19 Pages, 6 Figures, Accepted for publication in PSJ

  9. arXiv:2202.02841  [pdf, other

    math.OC cs.IT

    An Asymptotically Optimal Two-Part Fixed-Rate Coding Scheme for Networked Control with Unbounded Noise

    Authors: Jonathan Keeler, Tamás Linder, Serdar Yüksel

    Abstract: It is known that under fixed-rate information constraints, adaptive quantizers can be used to stabilize an open-loop-unstable linear system on $\mathbb{R}^n$ driven by unbounded noise. These adaptive schemes can be designed so that they have near-optimal rate, and the resulting system will be stable in the sense of having an invariant probability measure, or ergodicity, as well as boundedness of t… ▽ More

    Submitted 11 January, 2023; v1 submitted 6 February, 2022; originally announced February 2022.

    Comments: 37 pages, 4 figures. Replacement of prior work as this paper is a direct generalization (from the scalar Gaussian case to the multidimensional case with much more general noise)

  10. arXiv:2108.01495  [pdf, other

    cs.RO cs.CV

    Cross-Modal Analysis of Human Detection for Robotics: An Industrial Case Study

    Authors: Timm Linder, Narunas Vaskevicius, Robert Schirmer, Kai O. Arras

    Abstract: Advances in sensing and learning algorithms have led to increasingly mature solutions for human detection by robots, particularly in selected use-cases such as pedestrian detection for self-driving cars or close-range person detection in consumer settings. Despite this progress, the simple question "which sensor-algorithm combination is best suited for a person detection task at hand?" remains har… ▽ More

    Submitted 3 August, 2021; originally announced August 2021.

    Comments: Accepted for publication at 2021 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS)

  11. Refined physical parameters for Chariklo's body and rings from stellar occultations observed between 2013 and 2020

    Authors: B. E. Morgado, B. Sicardy, F. Braga-Ribas, J. Desmars, A. R. Gomes-Júnior, D. Bérard, R. Leiva, J. L. Ortiz, R. Vieira-Martins, G. Benedetti-Rossi, P. Santos-Sanz, J. I. B. Camargo, R. Duffard, F. L. Rommel, M. Assafin, R. C. Boufleur, F. Colas, M. Kretlow, W. Beisker, R. Sfair, C. Snodgrass, N. Morales, E. Fernández-Valenzuela, L. S. Amaral, A. Amarante , et al. (56 additional authors not shown)

    Abstract: The Centaur (10199) Chariklo has the first rings system discovered around a small object. It was first observed using stellar occultation in 2013. Stellar occultations allow the determination of sizes and shapes with kilometre accuracy and obtain characteristics of the occulting object and its vicinity. Using stellar occultations observed between 2017 and 2020, we aim at constraining Chariklo's an… ▽ More

    Submitted 16 July, 2021; originally announced July 2021.

    Comments: 32 pages, 11 Figures in the main text, paper was accepted for publication in Section 10. Planets and planetary systems of Astronomy and Astrophysics on 12/07/2021

    Journal ref: A&A 652, A141 (2021)

  12. arXiv:2103.10810  [pdf, ps, other

    cs.IT

    Zero-Delay Lossy Coding of Linear Vector Markov Sources: Optimality of Stationary Codes and Near Optimality of Finite Memory Codes

    Authors: Meysam Ghomi, Tamas Linder, Serdar Yuksel

    Abstract: Optimal zero-delay coding (quantization) of $\mathbb{R}^d$-valued linearly generated Markov sources is studied under quadratic distortion. The structure and existence of deterministic and stationary coding policies that are optimal for the infinite horizon average cost (distortion) problem are established. Prior results studying the optimality of zero-delay codes for Markov sources for infinite ho… ▽ More

    Submitted 13 January, 2022; v1 submitted 19 March, 2021; originally announced March 2021.

    Comments: 15 pages

    ACM Class: E.4

  13. arXiv:2101.12564  [pdf, ps, other

    cs.IT

    An Information Bottleneck Problem with Rényi's Entropy

    Authors: Jian-Jia Weng, Fady Alajaji, Tamás Linder

    Abstract: This paper considers an information bottleneck problem with the objective of obtaining a most informative representation of a hidden feature subject to a Rényi entropy complexity constraint. The optimal bottleneck trade-off between relevance (measured via Shannon's mutual information) and Rényi entropy cost is defined and an iterative algorithm for finding approximate solutions is provided. We als… ▽ More

    Submitted 29 January, 2021; originally announced January 2021.

    Comments: 5 pages, 4 figures, submitted to ISIT 2021

  14. Space Weathering within C-Complex Main Belt Asteroid Families

    Authors: Cristina A. Thomas, David E. Trilling, Andrew S. Rivkin, Tyler Linder

    Abstract: Using data from the Sloan Digital Sky Survey Moving Object Catalog, we study color as a function of size for C-complex families in the Main Asteroid Belt to improve our understanding of space weathering of carbonaceous materials. We find two distinct spectral slope trends: Hygiea-type and Themis-type. The Hygiea-type families exhibit a reduction in spectral slope with increasing object size until… ▽ More

    Submitted 21 January, 2021; originally announced January 2021.

    Comments: 13 pages, 6 figures, 1 table, to be published in the Astronomical Journal

  15. arXiv:2012.08265  [pdf, other

    cs.IT

    Signaling Games for Log-Concave Distributions: Number of Bins and Properties of Equilibria

    Authors: Ertan Kazıklı, Serkan Sarıtaş, Sinan Gezici, Tamás Linder, Serdar Yüksel

    Abstract: We investigate the equilibrium behavior for the decentralized cheap talk problem for real random variables and quadratic cost criteria in which an encoder and a decoder have misaligned objective functions. In prior work, it has been shown that the number of bins in any equilibrium has to be countable, generalizing a classical result due to Crawford and Sobel who considered sources with density sup… ▽ More

    Submitted 14 November, 2021; v1 submitted 15 December, 2020; originally announced December 2020.

    Comments: 27 pages and 1 figure. arXiv admin note: text overlap with arXiv:1901.06738

  16. arXiv:2010.15983  [pdf, ps, other

    math.OC

    On the lack of monotonicity of Newton-Hewer updates for Riccati equations

    Authors: Mohammad Akbari, Bahman Gharesifard, Tamas Linder

    Abstract: We provide a set of counterexamples for the monotonicity of the Newton-Hewer method for solving the discrete-time algebraic Riccati equation in dynamic settings, drawing a contrast with the Riccati difference equation.

    Submitted 29 October, 2020; originally announced October 2020.

  17. MeTRAbs: Metric-Scale Truncation-Robust Heatmaps for Absolute 3D Human Pose Estimation

    Authors: István Sárándi, Timm Linder, Kai O. Arras, Bastian Leibe

    Abstract: Heatmap representations have formed the basis of human pose estimation systems for many years, and their extension to 3D has been a fruitful line of recent research. This includes 2.5D volumetric heatmaps, whose X and Y axes correspond to image space and Z to metric depth around the subject. To obtain metric-scale predictions, 2.5D methods need a separate post-processing step to resolve scale ambi… ▽ More

    Submitted 14 November, 2020; v1 submitted 12 July, 2020; originally announced July 2020.

    Comments: See project page at https://vision.rwth-aachen.de/metrabs . Accepted for publication in the IEEE Transactions on Biometrics, Behavior, and Identity Science (TBIOM), Special Issue "Selected Best Works From Automated Face and Gesture Recognition 2020". Extended version of FG paper arXiv:2003.02953

    ACM Class: I.2.10; I.4.8

    Journal ref: IEEE Transactions on Biometrics, Behavior, and Identity Science, vol. 3, no. 1, pp. 16-30, Jan. 2021

  18. arXiv:2006.14913  [pdf, ps, other

    cs.IT

    Two-Way Source-Channel Coding

    Authors: Jian-Jia Weng, Fady Alajaji, Tamás Linder

    Abstract: We propose an adaptive lossy joint source-channel coding (JSCC) scheme for sending correlated sources over two-terminal discrete-memoryless two-way channels (DM-TWCs). The main idea is to couple the independent operations of the terminals via an adaptive coding mechanism, which can mitigate cross-interference resulting from simultaneous channel transmissions and concurrently exploit the sources' c… ▽ More

    Submitted 26 June, 2020; originally announced June 2020.

    Comments: 44 pages, 6 figures

  19. arXiv:2004.03954  [pdf, ps, other

    cs.IT

    A Simple Capacity Outer Bound for Two-Way Channels and Capacity Approximation Results

    Authors: Jian-Jia Weng, Fady Alajaji, Tamás Linder

    Abstract: Channel symmetry properties that imply the tightness of Shannon's random coding inner bound have recently been used to determine the capacity region of discrete-memoryless two-way channels (DM-TWCs). For channels without such symmetry properties, outer bounds are often needed to estimate the capacity region. However, validating symmetry conditions and/or evaluating non-trivial outer bounds are com… ▽ More

    Submitted 24 September, 2020; v1 submitted 8 April, 2020; originally announced April 2020.

    Comments: an error in Eq. (2) corrected

  20. Metric-Scale Truncation-Robust Heatmaps for 3D Human Pose Estimation

    Authors: István Sárándi, Timm Linder, Kai O. Arras, Bastian Leibe

    Abstract: Heatmap representations have formed the basis of 2D human pose estimation systems for many years, but their generalizations for 3D pose have only recently been considered. This includes 2.5D volumetric heatmaps, whose X and Y axes correspond to image space and the Z axis to metric depth around the subject. To obtain metric-scale predictions, these methods must include a separate, explicit post-pro… ▽ More

    Submitted 5 March, 2020; originally announced March 2020.

    Comments: Accepted for publication at the 2020 IEEE Conference on Automatic Face and Gesture Recognition (FG)

  21. arXiv:2001.02612  [pdf, ps, other

    cs.IT

    Adaptive Coding for Two-Way Lossy Source-Channel Communication

    Authors: Jian-Jia Weng, Fady Alajaji, Tamás Linder

    Abstract: An adaptive joint source-channel coding (JSCC) scheme is presented for transmitting correlated sources over discrete-memoryless two-way channels subject to distortion constraints. The proposed JSCC scheme makes use of the previously transmitted and received channel signals as well as the sources' correlation to facilitate coordination between terminals. It is shown that the adaptive scheme strictl… ▽ More

    Submitted 12 August, 2020; v1 submitted 8 January, 2020; originally announced January 2020.

    Comments: a spelling error corrected

  22. arXiv:1912.09451  [pdf, ps, other

    math.OC

    An Iterative Riccati Algorithm for Online Linear Quadratic Control

    Authors: Mohammad Akbari, Bahman Gharesifard, Tamas Linder

    Abstract: An online policy learning problem of linear control systems is studied. In this problem, the control system is known and linear, and a sequence of quadratic cost functions is revealed to the controller in hindsight, and the controller updates its policy to achieve a sublinear regret, similar to online optimization. A modified online Riccati algorithm is introduced that under some boundedness assum… ▽ More

    Submitted 25 January, 2021; v1 submitted 19 December, 2019; originally announced December 2019.

  23. Physical Characterization of Active Asteroid (6478) Gault

    Authors: Juan A. Sanchez, Vishnu Reddy, Audrey Thirouin, Edward L. Wright, Tyler R. Linder, Theodore Kareta, Benjamin Sharkey

    Abstract: Main belt asteroid (6478) Gault has been dynamically linked with two overlapping asteroid families: Phocaea, dominated by S-type asteroids, and Tamara, dominated by low-albedo C-types. This object has recently become an interesting case for study, after images obtained in late 2018 revealed that it was active and displaying a comet-like tail. Previous authors have proposed that the most likely sce… ▽ More

    Submitted 15 July, 2019; originally announced July 2019.

    Comments: 9 pages, 4 figures, accepted for publication in ApJL

  24. Capacity of Generalized Discrete-Memoryless Push-to-Talk Two-Way Channels

    Authors: Jian-Jia Weng, Fady Alajaji, Tamás Linder

    Abstract: In this report, we generalize Shannon's push-to-talk two-way channel (PTT-TWC) by allowing reliable full-duplex transmission as well as noisy reception in the half-duplex (PTT) mode. Viewing a PTT-TWC as two state-dependent one-way channels, we introduce a channel symmetry property pertaining to the one-way channels. Shannon's TWC capacity inner bound is shown to be tight for the generalized model… ▽ More

    Submitted 28 January, 2021; v1 submitted 2 April, 2019; originally announced April 2019.

    Comments: 10 pages, 5 figures, 5 tables, a typo corrected, presented at CWIT'19

  25. On the Number of Bins in Equilibria for Signaling Games

    Authors: Serkan Sarıtaş, Philippe Furrer, Sinan Gezici, Tamás Linder, Serdar Yüksel

    Abstract: We investigate the equilibrium behavior for the decentralized quadratic cheap talk problem in which an encoder and a decoder, viewed as two decision makers, have misaligned objective functions. In prior work, we have shown that the number of bins under any equilibrium has to be at most countable, generalizing a classical result due to Crawford and Sobel who considered sources with density supporte… ▽ More

    Submitted 23 January, 2019; v1 submitted 20 January, 2019; originally announced January 2019.

    Comments: 25 pages, single column

  26. arXiv:1901.01626  [pdf, ps, other

    cs.IT

    Joint Source-Channel Coding for the Transmission of Correlated Sources over Two-Way Channels

    Authors: Jian-Jia Weng, Fady Alajaji, Tamás Linder

    Abstract: A joint source-channel coding (JSCC) scheme based on hybrid digital/analog coding is proposed for the transmission of correlated sources over discrete-memoryless two-way channels (DM-TWCs). The scheme utilizes the correlation between the sources in generating channel inputs, thus enabling the users to coordinate their transmission to combat channel noise. The hybrid scheme also subsumes prior codi… ▽ More

    Submitted 12 August, 2020; v1 submitted 6 January, 2019; originally announced January 2019.

    Comments: a spelling error corrected

  27. arXiv:1809.04987  [pdf, other

    cs.CV cs.RO

    Synthetic Occlusion Augmentation with Volumetric Heatmaps for the 2018 ECCV PoseTrack Challenge on 3D Human Pose Estimation

    Authors: István Sárándi, Timm Linder, Kai O. Arras, Bastian Leibe

    Abstract: In this paper we present our winning entry at the 2018 ECCV PoseTrack Challenge on 3D human pose estimation. Using a fully-convolutional backbone architecture, we obtain volumetric heatmaps per body joint, which we convert to coordinates using soft-argmax. Absolute person center depth is estimated by a 1D heatmap prediction head. The coordinates are back-projected to 3D camera space, where we mini… ▽ More

    Submitted 6 November, 2018; v1 submitted 13 September, 2018; originally announced September 2018.

    Comments: Extended abstract for the 2018 ECCV PoseTrack Workshop, updated with full result tables

  28. arXiv:1808.09316  [pdf, other

    cs.CV cs.RO

    How Robust is 3D Human Pose Estimation to Occlusion?

    Authors: István Sárándi, Timm Linder, Kai O. Arras, Bastian Leibe

    Abstract: Occlusion is commonplace in realistic human-robot shared environments, yet its effects are not considered in standard 3D human pose estimation benchmarks. This leaves the question open: how robust are state-of-the-art 3D pose estimation methods against partial occlusions? We study several types of synthetic occlusions over the Human3.6M dataset and find a method with state-of-the-art benchmark per… ▽ More

    Submitted 29 August, 2018; v1 submitted 28 August, 2018; originally announced August 2018.

    Comments: Accepted for IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS'18) - Workshop on Robotic Co-workers 4.0: Human Safety and Comfort in Human-Robot Interactive Social Environments

  29. arXiv:1807.03422  [pdf, ps, other

    cs.IT

    Capacity of Two-Way Channels with Symmetry Properties

    Authors: Jian-Jia Weng, Lin Song, Fady Alajaji, Tamás Linder

    Abstract: In this paper, we make use of channel symmetry properties to determine the capacity region of three types of two-way networks: (a) two-user memoryless two-way channels (TWCs), (b) two-user TWCs with memory, and (c) three-user multiaccess/degraded broadcast (MA/DB) TWCs. For each network, symmetry conditions under which a Shannon-type random coding inner bound (under independent non-adaptive inputs… ▽ More

    Submitted 30 September, 2019; v1 submitted 9 July, 2018; originally announced July 2018.

    Comments: 56 pages, 8 figures, a missing condition in Corollary 4 and Theorem 9 added

  30. arXiv:1805.01974  [pdf, ps, other

    cs.IT

    Lossy Transmission of Correlated Sources over Two-Way Channels

    Authors: Jian-Jia Weng, Fady Alajaji, Tamás Linder

    Abstract: Achievability and converse results for the lossy transmission of correlated sources over Shannon's two-way channels (TWCs) are presented. A joint source-channel coding theorem for independent sources and TWCs for which adaptation cannot enlarge the capacity region is also established. We further investigate the optimality of scalar coding for TWCs with discrete modulo additive noise as well as add… ▽ More

    Submitted 4 May, 2018; originally announced May 2018.

    Comments: 5 pages, 3 figures, a minor typo fixed, presented at IEEE ITW 2017

  31. arXiv:1804.02463  [pdf, other

    cs.RO cs.CV

    Deep Person Detection in 2D Range Data

    Authors: Lucas Beyer, Alexander Hermans, Timm Linder, Kai O. Arras, Bastian Leibe

    Abstract: Detecting humans is a key skill for mobile robots and intelligent vehicles in a large variety of applications. While the problem is well studied for certain sensory modalities such as image data, few works exist that address this detection task using 2D range data. However, a widespread sensory setup for many mobile robots in service and domestic applications contains a horizontally mounted 2D las… ▽ More

    Submitted 6 April, 2018; originally announced April 2018.

  32. arXiv:1801.03553  [pdf, other

    cs.IT

    On the Noise-Information Separation of a Private Principal Component Analysis Scheme

    Authors: Mario Diaz, Shahab Asoodeh, Fady Alajaji, Tamás Linder, Serban Belinschi, James Mingo

    Abstract: In a survey disclosure model, we consider an additive noise privacy mechanism and study the trade-off between privacy guarantees and statistical utility. Privacy is approached from two different but complementary viewpoints: information and estimation theoretic. Motivated by the performance of principal component analysis, statistical utility is measured via the spectral gap of a certain covarianc… ▽ More

    Submitted 10 January, 2018; originally announced January 2018.

    Comments: Submitted to the International Symposium on Information Theory (ISIT) 2018

  33. arXiv:1801.03163  [pdf, ps, other

    cs.IT

    Sufficient Conditions for the Tightness of Shannon's Capacity Bounds for Two-Way Channels

    Authors: Jian-Jia Weng, Lin Song, Fady Alajaji, Tamás Linder

    Abstract: New sufficient conditions for determining in closed form the capacity region of point-to-point memoryless two-way channels (TWCs) are derived. The proposed conditions not only relax Shannon's condition which can identify only TWCs with a certain symmetry property but also generalize other existing results. Examples are given to demonstrate the advantages of the proposed conditions.

    Submitted 4 May, 2018; v1 submitted 9 January, 2018; originally announced January 2018.

    Comments: 5 pages, 2 figures, a mis-inserted figure corrected, to be presented at IEEE ISIT 2018

  34. arXiv:1712.02392  [pdf, ps, other

    astro-ph.SR

    New Pulse Timing Measurements of the sdBV Star CS 1246

    Authors: Zackary L. Hutchens, Brad N. Barlow, Alan Vasquez Soto, Dan E. Reichart, Josh B. Haislip, Vladimir V. Kouprianov, Tyler R. Linder, Justin P. Moore

    Abstract: CS 1246 is a hot subdwarf B star discovered in 2009 to exhibit a single, large-amplitude radial pulsation. An O-C diagram constructed from this mode revealed reflex motion due to the presence of a low-mass M dwarf, as well as a long-term trend consistent with a decrease in the pulsational period. The orbital reflex motion was later confirmed with radial velocity measurements. Using eight years of… ▽ More

    Submitted 6 December, 2017; originally announced December 2017.

    Comments: 6 pages, 4 figures, 2 tables; to appear in the Proceedings of the Eighth Meeting on Hot Subdwarfs and Related Objects, 9 to 15 July 2017, Cracow, Poland. Eds. A. Baran, A. E. Lynas-Gray, Open Astronomy, in press

  35. arXiv:1710.07009  [pdf, ps, other

    eess.SY math.OC math.PR

    Finite Model Approximations for Partially Observed Markov Decision Processes with Discounted Cost

    Authors: Naci Saldi, Serdar Yüksel, Tamás Linder

    Abstract: We consider finite model approximations of discrete-time partially observed Markov decision processes (POMDPs) under the discounted cost criterion. After converting the original partially observed stochastic control problem to a fully observed one on the belief space, the finite models are obtained through the uniform quantization of the state and action spaces of the belief space Markov decision… ▽ More

    Submitted 19 October, 2017; originally announced October 2017.

    Comments: 14 pages, double column

  36. Push-sum on random graphs

    Authors: Pouya Rezaeinia, Bahman Gharesifard, Tamas Linder, Behrouz Touri

    Abstract: In this paper, we study the problem of achieving average consensus over a random time-varying sequence of directed graphs by extending the class of so-called push-sum algorithms to such random scenarios. Provided that an ergodicity notion, which we term the directed infinite flow property, holds and the auxiliary states of agents are uniformly bounded away from zero infinitely often, we prove the… ▽ More

    Submitted 3 August, 2017; v1 submitted 2 August, 2017; originally announced August 2017.

    Comments: IEEE Transactions on Automatic Control. 2019 Jul 17

  37. A search for rapidly pulsating hot subdwarf stars in the GALEX survey

    Authors: Emily M. Boudreaux, Brad N. Barlow, Scott W. Fleming, Alan Vasquez Soto, Chase Million, Dan E. Reichart, Josh B. Haislip, Tyler R. Linder, Justin P. Moore

    Abstract: NASA's Galaxy Evolution Explorer (GALEX) provided near- and far-UV observations for approximately 77 percent of the sky over a ten-year period; however, the data reduction pipeline initially only released single NUV and FUV images to the community. The recently released Python module gPhoton changes this, allowing calibrated time-series aperture photometry to be extracted easily from the raw GAL… ▽ More

    Submitted 2 August, 2017; originally announced August 2017.

    Comments: 11 Pages, 8 Figures, Accepted for publication in the Astrophysical Journal

  38. arXiv:1707.06157  [pdf, other

    cs.IT

    Optimized Signaling of Binary Correlated Sources over GMACs

    Authors: Jian-Jia Weng, Fady Alajaji, Tamás Linder

    Abstract: This work focuses on the construction of optimized binary signaling schemes for two-sender uncoded transmission of correlated sources over non-orthogonal Gaussian multiple access channels. Specifically, signal constellations with binary pulse-amplitude-modulation are designed for two senders to optimize the overall system performance. Although the two senders transmit their own messages independen… ▽ More

    Submitted 19 July, 2017; originally announced July 2017.

    Comments: Technical Report; 22 pages, 9 figures, and 3 tables

  39. arXiv:1707.02409  [pdf, ps, other

    cs.IT cs.CR math.ST

    Estimation Efficiency Under Privacy Constraints

    Authors: Shahab Asoodeh, Mario Diaz, Fady Alajaji, Tamas Linder

    Abstract: We investigate the problem of estimating a random variable $Y\in \mathcal{Y}$ under a privacy constraint dictated by another random variable $X\in \mathcal{X}$, where estimation efficiency and privacy are assessed in terms of two different loss functions. In the discrete case, we use the Hamming loss function and express the corresponding utility-privacy tradeoff in terms of the privacy-constraine… ▽ More

    Submitted 13 August, 2018; v1 submitted 8 July, 2017; originally announced July 2017.

    Comments: To appear in IEEE Transaction on Information Theory

  40. arXiv:1705.01596  [pdf, other

    cs.IT

    Capacity of Burst Noise-Erasure Channels With and Without Feedback and Input Cost

    Authors: Lin Song, Fady Alajaji, Tamás Linder

    Abstract: A class of burst noise-erasure channels which incorporate both errors and erasures during transmission is studied. The channel, whose output is explicitly expressed in terms of its input and a stationary ergodic noise-erasure process, is shown to have a so-called "quasi-symmetry" property under certain invertibility conditions. As a result, it is proved that a uniformly distributed input process m… ▽ More

    Submitted 3 May, 2017; originally announced May 2017.

    Comments: Parts of this work will be presented at the 2017 IEEE International Symposium on Information Theory

  41. arXiv:1704.03606  [pdf, ps, other

    cs.IT cs.CR math.ST

    Privacy-Aware Guessing Efficiency

    Authors: Shahab Asoodeh, Mario Diaz, Fady Alajaji, Tamás Linder

    Abstract: We investigate the problem of guessing a discrete random variable $Y$ under a privacy constraint dictated by another correlated discrete random variable $X$, where both guessing efficiency and privacy are assessed in terms of the probability of correct guessing. We define $h(P_{XY}, ε)$ as the maximum probability of correctly guessing $Y$ given an auxiliary random variable $Z$, where the maximizat… ▽ More

    Submitted 11 April, 2017; originally announced April 2017.

    Comments: ISIT 2017

  42. arXiv:1608.04001  [pdf, other

    cs.IT cs.CR math.ST

    Almost Perfect Privacy for Additive Gaussian Privacy Filters

    Authors: Shahab Asoodeh, Fady Alajaji, Tamas Linder

    Abstract: We study the maximal mutual information about a random variable $Y$ (representing non-private information) displayed through an additive Gaussian channel when guaranteeing that only $ε$ bits of information is leaked about a random variable $X$ (representing private information) that is correlated with $Y$. Denoting this quantity by $g_ε(X,Y)$, we show that for perfect privacy, i.e., $ε=0$, one has… ▽ More

    Submitted 13 August, 2016; originally announced August 2016.

    Comments: 20 pages. To appear in Springer-Verlag

  43. arXiv:1606.09135  [pdf, ps, other

    cs.IT

    Optimal Zero Delay Coding of Markov Sources: Stationary and Finite Memory Codes

    Authors: Richard G. Wood, Tamás Linder, Serdar Yüksel

    Abstract: The optimal zero delay coding of a finite state Markov source is considered. The existence and structure of optimal codes are studied using a stochastic control formulation. Prior results in the literature established the optimality of deterministic Markov (Walrand-Varaiya type) coding policies for finite time horizon problem, and the optimality of both deterministic nonstationary and randomized s… ▽ More

    Submitted 5 April, 2017; v1 submitted 29 June, 2016; originally announced June 2016.

    Comments: 27 pages

    MSC Class: 68P30

  44. arXiv:1606.01985  [pdf, other

    cs.IT

    Adaptation is Useless for Two Discrete Additive-Noise Two-Way Channels

    Authors: Lin Song, Fady Alajaji, Tamas Linder

    Abstract: In two-way channels, each user transmits and receives at the same time. This allows each encoder to interactively adapt the current input to its own message and all previously received signals. Such coding approach can introduce correlation between inputs of different users, since all the users' outputs are correlated by the nature of the channel. However, for some channels, such adaptation in the… ▽ More

    Submitted 6 June, 2016; originally announced June 2016.

    Comments: 6 pages, 2 figures

  45. arXiv:1601.07417  [pdf, ps, other

    cs.IT math.ST

    Privacy-Aware MMSE Estimation

    Authors: Shahab Asoodeh, Fady Alajaji, Tamás Linder

    Abstract: We investigate the problem of the predictability of random variable $Y$ under a privacy constraint dictated by random variable $X$, correlated with $Y$, where both predictability and privacy are assessed in terms of the minimum mean-squared error (MMSE). Given that $X$ and $Y$ are connected via a binary-input symmetric-output (BISO) channel, we derive the \emph{optimal} random mapping $P_{Z|Y}$ su… ▽ More

    Submitted 27 January, 2016; originally announced January 2016.

    Comments: 9 pages, 3 figures

  46. arXiv:1511.04657  [pdf, ps, other

    math.OC eess.SY

    Finite Model Approximations and Asymptotic Optimality of Quantized Policies in Decentralized Stochastic Control

    Authors: Naci Saldi, Serdar Yüksel, Tamás Linder

    Abstract: In this paper, we consider finite model approximations of a large class of static and dynamic team problems where these models are constructed through uniform quantization of the observation and action spaces of the agents. The strategies obtained from these finite models are shown to approximate the optimal cost with arbitrary precision under mild technical assumptions. In particular, quantized t… ▽ More

    Submitted 1 January, 2016; v1 submitted 14 November, 2015; originally announced November 2015.

    Comments: 13 pages, double column

  47. arXiv:1511.02381  [pdf, other

    cs.IT math.ST stat.ML

    Information Extraction Under Privacy Constraints

    Authors: Shahab Asoodeh, Mario Diaz, Fady Alajaji, Tamás Linder

    Abstract: A privacy-constrained information extraction problem is considered where for a pair of correlated discrete random variables $(X,Y)$ governed by a given joint distribution, an agent observes $Y$ and wants to convey to a potentially public user as much information about $Y$ as possible without compromising the amount of information revealed about $X$. To this end, the so-called {\em rate-privacy fun… ▽ More

    Submitted 17 January, 2016; v1 submitted 7 November, 2015; originally announced November 2015.

    Comments: 55 pages, 6 figures. Improved the organization and added detailed literature review

  48. arXiv:1510.02330  [pdf, ps, other

    cs.IT math.ST

    On Maximal Correlation, Mutual Information and Data Privacy

    Authors: Shahab Asoodeh, Fady Alajaji, Tamás Linder

    Abstract: The rate-privacy function is defined in \cite{Asoodeh} as a tradeoff between privacy and utility in a distributed private data system in which both privacy and utility are measured using mutual information. Here, we use maximal correlation in lieu of mutual information in the privacy constraint. We first obtain some general properties and bounds for maximal correlation and then modify the rate-pri… ▽ More

    Submitted 8 October, 2015; originally announced October 2015.

    Comments: Appeared in Canadian Workshop on Information Theory 2015

  49. arXiv:1510.02318  [pdf, ps, other

    cs.IT

    Notes on Information-Theoretic Privacy

    Authors: Shahab Asoodeh, Fady Alajaji, Tamás Linder

    Abstract: We investigate the tradeoff between privacy and utility in a situation where both privacy and utility are measured in terms of mutual information. For the binary case, we fully characterize this tradeoff in case of perfect privacy and also give an upper-bound for the case where some privacy leakage is allowed. We then introduce a new quantity which quantifies the amount of private information cont… ▽ More

    Submitted 8 October, 2015; originally announced October 2015.

    Comments: The corrected version of a paper appeared in Allerton 2014

  50. arXiv:1510.01783  [pdf, ps, other

    cs.IT

    Lossless Secure Source Coding: Yamamoto's Setting

    Authors: Shahab Asoodeh, Fady Alajaji, Tamás Linder

    Abstract: Given a private source of information, $X^n$ and a public correlated source, $Y^n$, we study the problem of encoding the two-dimensional source $(X^n, Y^n)$ into an index $J$ such that a remote party, knowing $J$ and some external side information $Z^n$, can losslessly recover $Y^n$ while any eavesdropper knowing $J$ and possibly a correlated side information $E^n$ can retrieve very little informa… ▽ More

    Submitted 6 October, 2015; originally announced October 2015.

    Comments: Presented at Allerton 2015