Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Showing 1–42 of 42 results for author: Han, Y S

Searching in archive cs. Search in all archives.
.
  1. Variant Codes Based on A Special Polynomial Ring and Their Fast Computations

    Authors: Leilei Yu, Yunghsiang S. Han, Jiasheng Yuan, Zhongpei Zhang

    Abstract: Binary array codes are widely used in storage systems to prevent data loss, such as the Redundant Array of Independent Disks~(RAID). Most designs for such codes, such as Blaum-Roth~(BR) codes and Independent-Parity~(IP) codes, are carried out on the polynomial ring F_2[x]/<\sum_{i=0}^{p-1}x^i >, where F_2 is a binary field, and p is a prime number. In this paper, we consider the polynomial ring F_… ▽ More

    Submitted 29 March, 2024; v1 submitted 12 October, 2023; originally announced October 2023.

  2. arXiv:2309.06267  [pdf, ps, other

    cs.IT

    A Complete Proof of an Important Theorem for Variable-to-Variable Length Codes

    Authors: Wei Yan, Yunghsiang S. Han

    Abstract: Variable-to-variable length (VV) codes are a class of lossless source coding. As their name implies, VV codes encode a variable-length sequence of source symbols into a variable-length codeword. This paper will give a complete proof of an important theorem for variable-to-variable length codes.

    Submitted 12 September, 2023; originally announced September 2023.

    Comments: arXiv admin note: substantial text overlap with arXiv:2204.07398

  3. arXiv:2308.14527  [pdf, ps, other

    cs.IT

    MDS Array Codes With Small Sub-packetization Levels and Small Repair Degrees

    Authors: Jie Li, Yi Liu, Xiaohu Tang, Yunghsiang S. Han, Bo Bai, Gong Zhang

    Abstract: High-rate minimum storage regenerating (MSR) codes are known to require a large sub-packetization level, which can make meta-data management difficult and hinder implementation in practical systems. A few maximum distance separable (MDS) array code constructions have been proposed to attain a much smaller sub-packetization level by sacrificing a bit of repair bandwidth. However, to the best of our… ▽ More

    Submitted 28 August, 2023; originally announced August 2023.

    Comments: Submitted to the IEEE Transactions on Information Theory

  4. arXiv:2302.09325  [pdf, other

    cs.IT

    MDS Array Codes With (Near) Optimal Repair Bandwidth for All Admissible Repair Degrees

    Authors: Jie Li, Yi Liu, Xiaohu Tang, Yunghsiang S. Han, Bo Bai, Gong Zhang

    Abstract: Abundant high-rate (n, k) minimum storage regenerating (MSR) codes have been reported in the literature. However, most of them require contacting all the surviving nodes during a node repair process, resulting in a repair degree of d=n-1. In practical systems, it may not always be feasible to connect and download data from all surviving nodes, as some nodes may be unavailable. Therefore, there is… ▽ More

    Submitted 26 May, 2023; v1 submitted 18 February, 2023; originally announced February 2023.

    Comments: Submitted to the IEEE Transactions on Communications

  5. PMDS Array Codes With Small Sub-packetization, Small Repair Bandwidth/Rebuilding Access

    Authors: Jie Li, Xiaohu Tang, Hanxu Hou, Yunghsiang S. Han, Bo Bai, Gong Zhang

    Abstract: Partial maximum distance separable (PMDS) codes are a kind of erasure codes where the nodes are divided into multiple groups with each forming an MDS code with a smaller code length, thus they allow repairing a failed node with only a few helper nodes and can correct all erasure patterns that are information-theoretically correctable. However, the repair of a failed node of PMDS codes still requir… ▽ More

    Submitted 12 November, 2022; originally announced November 2022.

    Comments: Accepted for publication in the IEEE Transactions on Information Theory

  6. New Decoding of Reed-Solomon Codes Based on FFT and Modular Approach

    Authors: Nianqi Tang, Yunghsiang S. Han

    Abstract: Decoding algorithms for Reed--Solomon (RS) codes are of great interest for both practical and theoretical reasons. In this paper, an efficient algorithm, called the modular approach (MA), is devised for solving the Welch--Berlekamp (WB) key equation. By taking the MA as the key equation solver, we propose a new decoding algorithm for systematic RS codes. For $(n,k)$ RS codes, where $n$ is the code… ▽ More

    Submitted 22 July, 2022; originally announced July 2022.

  7. arXiv:2206.09779  [pdf, other

    cs.IT cs.NI

    The Story of $1/e$: ALOHA-based and Reinforcement-Learning-based Random Access for Delay-Constrained Communications

    Authors: Lei Deng, Danzhou Wu, Jing Deng, Po-Ning Chen, Yunghsiang S. Han

    Abstract: Motivated by the proliferation of real-time applications in multimedia communication systems, tactile Internet, and cyber-physical systems, supporting delay-constrained traffic becomes critical for such systems. In delay-constrained traffic, each packet has a hard deadline; when it is not delivered before its deadline is up, it becomes useless and will be removed from the system. In this work, we… ▽ More

    Submitted 22 June, 2022; v1 submitted 20 June, 2022; originally announced June 2022.

  8. arXiv:2206.09759  [pdf, other

    cs.NI

    An Input-Queueing TSN Switching Architecture to Achieve Zero Packet Loss for Timely Traffic

    Authors: Ming Li, Lei Deng, Yunghsiang S. Han

    Abstract: Zero packet loss with bounded latency is necessary for many applications, such as industrial control networks, automotive Ethernet, and aircraft communication systems. Traditional networks cannot meet the such strict requirement, and thus Time-Sensitive Networking (TSN) emerges. TSN is a set of standards proposed by IEEE 802 for providing deterministic connectivity in terms of low packet loss, low… ▽ More

    Submitted 11 June, 2023; v1 submitted 20 June, 2022; originally announced June 2022.

  9. arXiv:2205.14555  [pdf, other

    cs.IT

    Two New Piggybacking Designs with Lower Repair Bandwidth

    Authors: Zhengyi Jiang, Hanxu Hou, Yunghsiang S. Han, Patrick P. C. Lee, Bo Bai, Zhongyi Huang

    Abstract: Piggybacking codes are a special class of MDS array codes that can achieve small repair bandwidth with small sub-packetization by first creating some instances of an $(n,k)$ MDS code, such as a Reed-Solomon (RS) code, and then designing the piggyback function. In this paper, we propose a new piggybacking coding design which designs the piggyback function over some instances of both $(n,k)$ MDS cod… ▽ More

    Submitted 28 May, 2022; originally announced May 2022.

  10. arXiv:2205.02057  [pdf, other

    cs.NI

    Reinforcement Learning for Improved Random Access in Delay-Constrained Heterogeneous Wireless Networks

    Authors: Lei Deng, Danzhou Wu, Zilong Liu, Yijin Zhang, Yunghsiang S. Han

    Abstract: In this paper, we for the first time investigate the random access problem for a delay-constrained heterogeneous wireless network. We begin with a simple two-device problem where two devices deliver delay-constrained traffic to an access point (AP) via a common unreliable collision channel. By assuming that one device (called Device 1) adopts ALOHA, we aim to optimize the random access scheme of t… ▽ More

    Submitted 4 May, 2022; originally announced May 2022.

    Comments: arXiv admin note: substantial text overlap with arXiv:2103.14917

  11. arXiv:2204.07398  [pdf, ps, other

    cs.IT

    Generalized Universal Coding of Integers

    Authors: Wei Yan, Sian-Jheng Lin, Yunghsiang S. Han

    Abstract: Universal coding of integers~(UCI) is a class of variable-length code, such that the ratio of the expected codeword length to $\max\{1,H(P)\}$ is within a constant factor, where $H(P)$ is the Shannon entropy of the decreasing probability distribution $P$. However, if we consider the ratio of the expected codeword length to $H(P)$, the ratio tends to infinity by using UCI, when $H(P)$ tends to zero… ▽ More

    Submitted 15 April, 2022; originally announced April 2022.

  12. arXiv:2204.07212  [pdf, other

    cs.CR eess.SP

    Reputation and Audit Bit Based Distributed Detection in the Presence of Byzantine

    Authors: Chen Quan, Yunghsiang S. Han, Baocheng Geng, Pramod K. Varshney

    Abstract: In this paper, two reputation based algorithms called Reputation and audit based clustering (RAC) algorithm and Reputation and audit based clustering with auxiliary anchor node (RACA) algorithm are proposed to defend against Byzantine attacks in distributed detection networks when the fusion center (FC) has no prior knowledge of the attacking strategy of Byzantine nodes. By updating the reputation… ▽ More

    Submitted 14 April, 2022; originally announced April 2022.

  13. arXiv:2110.04785  [pdf, ps, other

    cs.IT

    A Generalization of Array Codes with Local Properties and Efficient Encoding/Decoding

    Authors: Hanxu Hou, Yunghsiang S. Han, Patrick P. C. Lee, You Wu, Guojun Han, Mario Blaum

    Abstract: A maximum distance separable (MDS) array code is composed of $m\times (k+r)$ arrays such that any $k$ out of $k+r$ columns suffice to retrieve all the information symbols. Expanded-Blaum-Roth (EBR) codes and Expanded-Independent-Parity (EIP) codes are two classes of MDS array codes that can repair any one symbol in a column by locally accessing some other symbols within the column, where the numbe… ▽ More

    Submitted 12 September, 2022; v1 submitted 10 October, 2021; originally announced October 2021.

  14. arXiv:2109.13325  [pdf, other

    cs.CR eess.SP

    Enhanced Audit Bit Based Distributed Bayesian Detection in the Presence of Strategic Attacks

    Authors: Chen Quan, Baocheng Geng, Yunghsiang S. Han, Pramod K. Varshney

    Abstract: This paper employs an audit bit based mechanism to mitigate the effect of Byzantine attacks. In this framework, the optimal attacking strategy for intelligent attackers is investigated for the traditional audit bit based scheme (TAS) to evaluate the robustness of the system. We show that it is possible for an intelligent attacker to degrade the performance of TAS to the system without audit bits.… ▽ More

    Submitted 27 September, 2021; originally announced September 2021.

  15. arXiv:2103.14917  [pdf, other

    cs.NI

    Reinforcement Learning Random Access for Delay-Constrained Heterogeneous Wireless Networks: A Two-User Case

    Authors: Danzhou Wu, Lei Deng, Zilong Liu, Yijin Zhang, Yunghsiang S. Han

    Abstract: In this paper, we investigate the random access problem for a delay-constrained heterogeneous wireless network. As a first attempt to study this new problem, we consider a network with two users who deliver delay-constrained traffic to an access point (AP) via a common unreliable collision wireless channel. We assume that one user (called user 1) adopts ALOHA and we optimize the random access sche… ▽ More

    Submitted 15 July, 2021; v1 submitted 27 March, 2021; originally announced March 2021.

  16. arXiv:2102.02436  [pdf, ps, other

    cs.IT

    Lower Bound on the Optimal Access Bandwidth of ($K+2,K,2$)-MDS Array Code with Degraded Read Friendly

    Authors: Ting-Yi Wu, Yunghsiang S. Han, Zhengrui Li, Bo Bai, Gong Zhang, Liang Chen, Xiang Wu

    Abstract: Accessing the data in the failed disk (degraded read) with low latency is crucial for an erasure-coded storage system. In this work, the maximum distance separable (MDS) array code with the property of degraded-read friendly (DRF) is discussed. For the DRF MDS array code with 2 redundant nodes and the sub-packetization level of 2, the lower bound of its access bandwidth is derived.

    Submitted 4 February, 2021; originally announced February 2021.

    Comments: 22 pages, 1 figure

  17. arXiv:2007.04080  [pdf, ps, other

    cs.IT

    Decoder Ties Do Not Affect the Error Exponent of the Memoryless Binary Symmetric Channel

    Authors: Ling-Hua Chang, Po-Ning Chen, Fady Alajaji, Yunghsiang S. Han

    Abstract: The generalized Poor-Verdu error lower bound established in [1] for multihypothesis testing is studied in the classical channel coding context. It is proved that for any sequence of block codes sent over the memoryless binary symmetric channel (BSC), the minimum probability of error (under maximum likelihood decoding) has a relative deviation from the generalized bound that grows at most linearly… ▽ More

    Submitted 3 November, 2021; v1 submitted 6 July, 2020; originally announced July 2020.

    Comments: arXiv admin note: text overlap with arXiv:2001.01159

  18. arXiv:2005.11894  [pdf, other

    cs.IT

    Update Bandwidth for Distributed Storage

    Authors: Zhengrui Li, Sian-Jheng Lin, Po-Ning Chen, Yunghsiang S. Han, Hanxu Hou

    Abstract: In this paper, we consider the update bandwidth in distributed storage systems~(DSSs). The update bandwidth, which measures the transmission efficiency of the update process in DSSs, is defined as the total amount of data symbols transferred in the network when the data symbols stored in a node are updated. This paper contains the following contributions. First, we establish the closed-form expres… ▽ More

    Submitted 24 May, 2020; originally announced May 2020.

  19. arXiv:2001.01159  [pdf, ps, other

    cs.IT

    The Asymptotic Generalized Poor-Verdu Bound Achieves the BSC Error Exponent at Zero Rate

    Authors: Ling-Hua Chang, Po-Ning Chen, Fady Alajaji, Yunghsiang S. Han

    Abstract: The generalized Poor-Verdu error lower bound for multihypothesis testing is revisited. Its asymptotic expression is established in closed-form as its tilting parameter grows to infinity. It is also shown that the asymptotic generalized bound achieves the error exponent (or reliability function) of the memoryless binary symmetric channel at zero coding rates.

    Submitted 4 January, 2020; originally announced January 2020.

  20. arXiv:1907.08938  [pdf, other

    cs.IT

    Multi-Layer Transformed MDS Codes with Optimal Repair Access and Low Sub-Packetization

    Authors: Hanxu Hou, Patrick P. C. Lee, Yunghsiang S. Han

    Abstract: An $(n,k)$ maximum distance separable (MDS) code has optimal repair access if the minimum number of symbols accessed from $d$ surviving nodes is achieved, where $k+1\le d\le n-1$. Existing results show that the sub-packetization $α$ of an $(n,k,d)$ high code rate (i.e., $k/n>0.5$) MDS code with optimal repair access is at least $(d-k+1)^{\lceil\frac{n}{d-k+1}\rceil}$. In this paper, we propose a c… ▽ More

    Submitted 22 July, 2019; v1 submitted 21 July, 2019; originally announced July 2019.

  21. arXiv:1809.02826  [pdf, other

    cs.NI

    Delay-Constrained Input-Queued Switch

    Authors: Lei Deng, Wing Shing Wong, Po-Ning Chen, Yunghsiang S. Han, Hanxu Hou

    Abstract: In this paper, we study the delay-constrained input-queued switch where each packet has a deadline and it will expire if it is not delivered before its deadline. Such new scenario is motivated by the proliferation of real-time applications in multimedia communication systems, tactile Internet, networked controlled systems, and cyber-physical systems. The delay-constrained input-queued switch is co… ▽ More

    Submitted 27 September, 2018; v1 submitted 8 September, 2018; originally announced September 2018.

  22. arXiv:1804.09903  [pdf, other

    cs.IT

    On the Exact Lower Bounds of Encoding Circuit Sizes of Hamming Codes and Hadamard Codes

    Authors: Zhengrui Li, Sian-Jheng Lin, Yunghsiang S. Han

    Abstract: In this paper, we investigate the encoding circuit size of Hamming codes and Hadamard codes. To begin with, we prove the exact lower bound of circuit size required in the encoding of (punctured)~Hadamard codes and (extended)~Hamming codes. Then the encoding algorithms for (punctured)~Hadamard codes are presented to achieve the derived lower bounds. For (extended)~Hamming codes, we also propose enc… ▽ More

    Submitted 12 January, 2020; v1 submitted 26 April, 2018; originally announced April 2018.

  23. arXiv:1803.03508  [pdf, other

    cs.IT

    A Unified Form of EVENODD and RDP Codes and Their Efficient Decoding

    Authors: Hanxu Hou, Yunghsiang S. Han, Kenneth W. Shum, Hui Li

    Abstract: Array codes have been widely employed in storage systems, such as Redundant Arrays of Inexpensive Disks (RAID). The row-diagonal parity (RDP) codes and EVENODD codes are two popular double-parity array codes. As the capacity of hard disks increases, better fault tolerance by using array codes with three or more parity disks is needed. Although many extensions of RDP codes and EVENODD codes have be… ▽ More

    Submitted 9 March, 2018; originally announced March 2018.

  24. arXiv:1706.04709  [pdf, ps, other

    cs.IT math.CO

    On the Maximum Size of Block Codes Subject to a Distance Criterion

    Authors: Ling-Hua Chang, Po-Ning Chen, Vincent Y. F. Tan, Carol Wang, Yunghsiang S. Han

    Abstract: We establish a general formula for the maximum size of finite length block codes with minimum pairwise distance no less than $d$. The achievability argument involves an iterative construction of a set of radius-$d$ balls, each centered at a codeword. We demonstrate that the number of such balls that cover the entire code alphabet cannot exceed this maximum size. Our approach can be applied to code… ▽ More

    Submitted 2 May, 2018; v1 submitted 14 June, 2017; originally announced June 2017.

    Comments: 21 pages

  25. arXiv:1703.01135  [pdf, other

    cs.CV

    Deep Learning with Domain Adaptation for Accelerated Projection-Reconstruction MR

    Authors: Yo Seob Han, Jaejun Yoo, Jong Chul Ye

    Abstract: Purpose: The radial k-space trajectory is a well-established sampling trajectory used in conjunction with magnetic resonance imaging. However, the radial k-space trajectory requires a large number of radial lines for high-resolution reconstruction. Increasing the number of radial lines causes longer acquisition time, making it more difficult for routine clinical use. On the other hand, if we reduc… ▽ More

    Submitted 8 January, 2018; v1 submitted 3 March, 2017; originally announced March 2017.

    Comments: This paper has been accepted and will soon appear in Magnetic Resonance in Medicine

  26. arXiv:1611.09968  [pdf, other

    cs.IT

    Cauchy MDS Array Codes With Efficient Decoding Method

    Authors: Hanxu Hou, Yunghsiang S. Han

    Abstract: Array codes have been widely used in communication and storage systems. To reduce computational complexity, one important property of the array codes is that only XOR operation is used in the encoding and decoding process. In this work, we present a novel family of maximal-distance separable (MDS) array codes based on Cauchy matrix, which can correct up to any number of failures. We also propose a… ▽ More

    Submitted 29 November, 2016; originally announced November 2016.

  27. arXiv:1611.06391  [pdf, other

    cs.CV

    Deep Residual Learning for Compressed Sensing CT Reconstruction via Persistent Homology Analysis

    Authors: Yo Seob Han, Jaejun Yoo, Jong Chul Ye

    Abstract: Recently, compressed sensing (CS) computed tomography (CT) using sparse projection views has been extensively investigated to reduce the potential risk of radiation to patient. However, due to the insufficient number of projection views, an analytic reconstruction approach results in severe streaking artifacts and CS-based iterative approach is computationally very expensive. To address this issue… ▽ More

    Submitted 25 November, 2016; v1 submitted 19 November, 2016; originally announced November 2016.

  28. arXiv:1503.05761  [pdf, other

    cs.IT cs.DS

    FFT Algorithm for Binary Extension Finite Fields and its Application to Reed-Solomon Codes

    Authors: Sian-Jheng Lin, Tareq Y. Al-Naffouri, Yunghsiang S. Han

    Abstract: Recently, a new polynomial basis over binary extension fields was proposed such that the fast Fourier transform (FFT) over such fields can be computed in the complexity of order $\mathcal{O}(n\lg(n))$, where $n$ is the number of points evaluated in FFT. In this work, we reformulate this FFT algorithm such that it can be easier understood and be extended to develop frequency-domain decoding algorit… ▽ More

    Submitted 14 August, 2016; v1 submitted 19 March, 2015; originally announced March 2015.

  29. arXiv:1410.5904  [pdf, ps, other

    cs.CR cs.DC math.OC stat.AP

    Distributed Detection in Tree Networks: Byzantines and Mitigation Techniques

    Authors: Bhavya Kailkhura, Swastik Brahma, Berkan Dulek, Yunghsiang S Han, Pramod K. Varshney

    Abstract: In this paper, the problem of distributed detection in tree networks in the presence of Byzantines is considered. Closed form expressions for optimal attacking strategies that minimize the miss detection error exponent at the fusion center (FC) are obtained. We also look at the problem from the network designer's (FC's) perspective. We study the problem of designing optimal distributed detection p… ▽ More

    Submitted 21 October, 2014; originally announced October 2014.

  30. arXiv:1408.3434  [pdf, other

    stat.AP cs.CR cs.GT

    Asymptotic Analysis of Distributed Bayesian Detection with Byzantine Data

    Authors: Bhavya Kailkhura, Yunghsiang S. Han, Swastik Brahma, Pramod K. Varshney

    Abstract: In this letter, we consider the problem of distributed Bayesian detection in the presence of data falsifying Byzantines in the network. The problem of distributed detection is formulated as a binary hypothesis test at the fusion center (FC) based on 1-bit data sent by the sensors. Adopting Chernoff information as our performance metric, we study the detection performance of the system under Byzant… ▽ More

    Submitted 14 August, 2014; originally announced August 2014.

    Comments: arXiv admin note: substantial text overlap with arXiv:1307.3544

  31. arXiv:1408.1310  [pdf, ps, other

    cs.IT

    Maximum-likelihood Soft-decision Decoding for Binary Linear Block Codes Based on Their Supercodes

    Authors: Yunghsiang S. Han, Hung-Ta Pai, Po-Ning Chen, Ting-Yi Wu

    Abstract: Based on the notion of supercodes, we propose a two-phase maximum-likelihood soft-decision decoding (tpMLSD) algorithm for binary linear block codes in this work. The first phase applies the Viterbi algorithm backwardly to a trellis derived from the parity-check matrix of the supercode of the linear block code. Using the information retained from the first phase, the second phase employs the prior… ▽ More

    Submitted 6 August, 2014; originally announced August 2014.

    Comments: 5 pages, 1 table

  32. arXiv:1408.0259  [pdf, other

    cs.IT

    Permutation Trellis Coded Multi-level FSK Signaling to Mitigate Primary User Interference in Cognitive Radio Networks

    Authors: Raghed El-Bardan, Engin Masazade, Onur Ozdemir, Yunghsiang S. Han, Pramod K. Varshney

    Abstract: We employ Permutation Trellis Code (PTC) based multi-level Frequency Shift Keying signaling to mitigate the impact of Primary Users (PUs) on the performance of Secondary Users (SUs) in Cognitive Radio Networks (CRNs). The PUs are assumed to be dynamic in that they appear intermittently and stay active for an unknown duration. Our approach is based on the use of PTC combined with multi-level FSK mo… ▽ More

    Submitted 12 December, 2014; v1 submitted 11 July, 2014; originally announced August 2014.

    Comments: 30 pages, 12 figures

  33. arXiv:1404.3458  [pdf, other

    cs.IT

    Novel Polynomial Basis and Its Application to Reed-Solomon Erasure Codes

    Authors: Sian-Jheng Lin, Wei-Ho Chung, Yunghsiang S. Han

    Abstract: In this paper, we present a new basis of polynomial over finite fields of characteristic two and then apply it to the encoding/decoding of Reed-Solomon erasure codes. The proposed polynomial basis allows that $h$-point polynomial evaluation can be computed in $O(h\log_2(h))$ finite field operations with small leading constant. As compared with the canonical polynomial basis, the proposed basis imp… ▽ More

    Submitted 24 July, 2014; v1 submitted 14 April, 2014; originally announced April 2014.

  34. arXiv:1309.4513  [pdf, ps, other

    stat.AP cs.CR math.CO

    Distributed Detection in Tree Topologies with Byzantines

    Authors: Bhavya Kailkhura, Swastik Brahma, Yunghsiang S. Han, Pramod K. Varshney

    Abstract: In this paper, we consider the problem of distributed detection in tree topologies in the presence of Byzantines. The expression for minimum attacking power required by the Byzantines to blind the fusion center (FC) is obtained. More specifically, we show that when more than a certain fraction of individual node decisions are falsified, the decision fusion scheme becomes completely incapable. We o… ▽ More

    Submitted 17 September, 2013; originally announced September 2013.

  35. arXiv:1307.3544  [pdf, other

    cs.IT cs.CR cs.DC cs.GT stat.AP

    Distributed Bayesian Detection with Byzantine Data

    Authors: Bhavya Kailkhura, Yunghsiang S. Han, Swastik Brahma, Pramod K. Varshney

    Abstract: In this paper, we consider the problem of distributed Bayesian detection in the presence of Byzantines in the network. It is assumed that a fraction of the nodes in the network are compromised and reprogrammed by an adversary to transmit false information to the fusion center (FC) to degrade detection performance. The problem of distributed detection is formulated as a binary hypothesis test at th… ▽ More

    Submitted 3 September, 2014; v1 submitted 12 July, 2013; originally announced July 2013.

    Comments: 32 pages, 4 figures, Submitted to IEEE Transactions on Signal Processing

  36. arXiv:1306.4036  [pdf, ps, other

    cs.IT cs.CR stat.AP

    Distributed Inference with M-ary Quantized Data in the Presence of Byzantine Attacks

    Authors: V. Sriram Siddhardh, Nadendla, Yunghsiang S. Han, Pramod K. Varshney

    Abstract: The problem of distributed inference with M-ary quantized data at the sensors is investigated in the presence of Byzantine attacks. We assume that the attacker does not have knowledge about either the true state of the phenomenon of interest, or the quantization thresholds used at the sensors. Therefore, the Byzantine nodes attack the inference network by modifying modifying the symbol correspondi… ▽ More

    Submitted 14 January, 2014; v1 submitted 17 June, 2013; originally announced June 2013.

    Comments: 15 pages, 8 figures, 1 table, Revision submitted to IEEE Transactions on Signal Processing

  37. arXiv:1301.2497  [pdf, ps, other

    cs.IT cs.DM

    Update-Efficient Regenerating Codes with Minimum Per-Node Storage

    Authors: Yunghsiang S. Han, Hong-Ta Pai, Rong Zheng, Pramod K. Varshney

    Abstract: Regenerating codes provide an efficient way to recover data at failed nodes in distributed storage systems. It has been shown that regenerating codes can be designed to minimize the per-node storage (called MSR) or minimize the communication overhead for regeneration (called MBR). In this work, we propose a new encoding scheme for [n,d] error- correcting MSR codes that generalizes our earlier work… ▽ More

    Submitted 11 January, 2013; originally announced January 2013.

    Comments: Submitted to IEEE ISIT 2013

  38. arXiv:1108.3883  [pdf, ps, other

    cs.IT

    Exact Regenerating Codes for Byzantine Fault Tolerance in Distributed Storage

    Authors: Yunghsiang S. Han, Rong Zheng, Wai Ho Mow

    Abstract: Due to the use of commodity software and hardware, crash-stop and Byzantine failures are likely to be more prevalent in today's large-scale distributed storage systems. Regenerating codes have been shown to be a more efficient way to disperse information across multiple nodes and recover crash-stop failures in the literature. In this paper, we present the design of regeneration codes in conjunctio… ▽ More

    Submitted 18 August, 2011; originally announced August 2011.

    Comments: Submitted to INFOCOM 2012 on 28 July 2011

  39. arXiv:0712.2587  [pdf, ps, other

    cs.IT

    Maximum-Likelihood Priority-First Search Decodable Codes for Combined Channel Estimation and Error Protection

    Authors: Chia-Lung Wu, Po-Ning Chen, Yunghsiang S. Han, Ming-Hsin Kuo

    Abstract: The code that combines channel estimation and error protection has received general attention recently, and has been considered a promising methodology to compensate multi-path fading effect. It has been shown by simulations that such code design can considerably improve the system performance over the conventional design with separate channel estimation and error protection modules under the sa… ▽ More

    Submitted 17 December, 2007; originally announced December 2007.

    Comments: 13 figures, 2 tables

  40. arXiv:0705.3683  [pdf, ps, other

    cs.CR cs.DC cs.NI

    Power-Efficient Direct-Voting Assurance for Data Fusion in Wireless Sensor Networks

    Authors: H. -T. Pai, Y. S. Han

    Abstract: Wireless sensor networks place sensors into an area to collect data and send them back to a base station. Data fusion, which fuses the collected data before they are sent to the base station, is usually implemented over the network. Since the sensor is typically placed in locations accessible to malicious attackers, information assurance of the data fusion process is very important. A witness-ba… ▽ More

    Submitted 24 May, 2007; originally announced May 2007.

    Comments: 33 pages, 7 figures, 2 tables

  41. arXiv:cs/0701080  [pdf, ps, other

    cs.IT

    Analysis of the Sufficient Path Elimination Window for the Maximum-Likelihood Sequential-Search Decoding Algorithm for Binary Convolutional Codes

    Authors: Shin-Lin Shieh, Po-Ning Chen, Yunghsiang S. Han

    Abstract: A common problem on sequential-type decoding is that at the signal-to-noise ratio (SNR) below the one corresponding to the cutoff rate, the average decoding complexity per information bit and the required stack size grow rapidly with the information length. In order to alleviate the problem in the maximum-likelihood sequential decoding algorithm (MLSDA), we propose to directly eliminate the top… ▽ More

    Submitted 12 January, 2007; originally announced January 2007.

    Comments: Submitted to the IEEE Trans. on Information Theory, 26 pages, 11 figures

  42. arXiv:cs/0701026  [pdf, ps, other

    cs.IT

    Analysis of Sequential Decoding Complexity Using the Berry-Esseen Inequality

    Authors: Po-Ning Chen, Yunghsiang S. Han, Carlos R. P. Hartmann, Hong-Bin Wu

    Abstract: his study presents a novel technique to estimate the computational complexity of sequential decoding using the Berry-Esseen theorem. Unlike the theoretical bounds determined by the conventional central limit theorem argument, which often holds only for sufficiently large codeword length, the new bound obtained from the Berry-Esseen theorem is valid for any blocklength. The accuracy of the new bo… ▽ More

    Submitted 18 August, 2007; v1 submitted 4 January, 2007; originally announced January 2007.

    Comments: Submitted to the IEEE Trans. on Information Theory, 30 pages, 9 figures