Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Showing 1–50 of 66 results for author: Sahai, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2407.19346  [pdf, other

    cs.LG cs.CL

    Polynomial Regression as a Task for Understanding In-context Learning Through Finetuning and Alignment

    Authors: Max Wilcoxson, Morten Svendgård, Ria Doshi, Dylan Davis, Reya Vir, Anant Sahai

    Abstract: Simple function classes have emerged as toy problems to better understand in-context-learning in transformer-based architectures used for large language models. But previously proposed simple function classes like linear regression or multi-layer-perceptrons lack the structure required to explore things like prompting and alignment within models capable of in-context-learning. We propose univariat… ▽ More

    Submitted 27 July, 2024; originally announced July 2024.

    Comments: ICML Workshop on In-Context Learning

  2. arXiv:2406.12680  [pdf, other

    cs.CL

    Measuring Psychological Depth in Language Models

    Authors: Fabrice Harel-Canada, Hanyu Zhou, Sreya Mupalla, Zeynep Yildiz, Amit Sahai, Nanyun Peng

    Abstract: Evaluations of creative stories generated by large language models (LLMs) often focus on objective properties of the text, such as its style, coherence, and toxicity. While these metrics are indispensable, they do not speak to a story's subjective, psychological impact from a reader's perspective. We introduce the Psychological Depth Scale (PDS), a novel framework rooted in literary theory that me… ▽ More

    Submitted 18 June, 2024; originally announced June 2024.

    Comments: Preprint. Under Review

  3. arXiv:2306.13255  [pdf, other

    cs.LG stat.ML

    Precise Asymptotic Generalization for Multiclass Classification with Overparameterized Linear Models

    Authors: David X. Wu, Anant Sahai

    Abstract: We study the asymptotic generalization of an overparameterized linear model for multiclass classification under the Gaussian covariates bi-level model introduced in Subramanian et al.~'22, where the number of data points, features, and classes all grow together. We fully resolve the conjecture posed in Subramanian et al.~'22, matching the predicted regimes for generalization. Furthermore, our new… ▽ More

    Submitted 5 December, 2023; v1 submitted 22 June, 2023; originally announced June 2023.

    Comments: NeurIPS 2023, 56 pages

  4. arXiv:2206.01399  [pdf, other

    cs.LG stat.ML

    Generalization for multiclass classification with overparameterized linear models

    Authors: Vignesh Subramanian, Rahul Arya, Anant Sahai

    Abstract: Via an overparameterized linear model with Gaussian features, we provide conditions for good generalization for multiclass classification of minimum-norm interpolating solutions in an asymptotic setting where both the number of underlying features and the number of classes scale with the number of training points. The survival/contamination analysis framework for understanding the behavior of over… ▽ More

    Submitted 3 June, 2022; originally announced June 2022.

    Comments: 44 pages, 4 figures

  5. arXiv:2109.13215  [pdf, other

    cs.LG cs.IT stat.ML

    Classification and Adversarial examples in an Overparameterized Linear Model: A Signal Processing Perspective

    Authors: Adhyyan Narang, Vidya Muthukumar, Anant Sahai

    Abstract: State-of-the-art deep learning classifiers are heavily overparameterized with respect to the amount of training examples and observed to generalize well on "clean" data, but be highly susceptible to infinitesmal adversarial perturbations. In this paper, we identify an overparameterized linear ensemble, that uses the "lifted" Fourier feature map, that demonstrates both of these behaviors. The input… ▽ More

    Submitted 27 September, 2021; originally announced September 2021.

    Comments: 32 pages, 10 figures

  6. arXiv:2012.02125  [pdf, other

    cs.GT stat.ML

    On the Impossibility of Convergence of Mixed Strategies with No Regret Learning

    Authors: Vidya Muthukumar, Soham Phade, Anant Sahai

    Abstract: We study the limiting behavior of the mixed strategies that result from optimal no-regret learning strategies in a repeated game setting where the stage game is any 2 by 2 competitive game. We consider optimal no-regret algorithms that are mean-based and monotonic in their argument. We show that for any such algorithm, the limiting mixed strategies of the players cannot converge almost surely to a… ▽ More

    Submitted 2 March, 2022; v1 submitted 3 December, 2020; originally announced December 2020.

    Comments: 47 pages, 12 figures

  7. arXiv:2008.09317  [pdf, ps, other

    cs.CR cs.CC

    Indistinguishability Obfuscation from Well-Founded Assumptions

    Authors: Aayush Jain, Huijia Lin, Amit Sahai

    Abstract: In this work, we show how to construct indistinguishability obfuscation from subexponential hardness of four well-founded assumptions. We prove: Let $τ\in (0,\infty), δ\in (0,1), ε\in (0,1)$ be arbitrary constants. Assume sub-exponential security of the following assumptions, where $λ$ is a security parameter, and the parameters $\ell,k,n$ below are large enough polynomials in $λ$: - The SXDH… ▽ More

    Submitted 21 August, 2020; originally announced August 2020.

  8. arXiv:2005.08054  [pdf, other

    cs.LG cs.IT stat.ML

    Classification vs regression in overparameterized regimes: Does the loss function matter?

    Authors: Vidya Muthukumar, Adhyyan Narang, Vignesh Subramanian, Mikhail Belkin, Daniel Hsu, Anant Sahai

    Abstract: We compare classification and regression tasks in an overparameterized linear model with Gaussian features. On the one hand, we show that with sufficient overparameterization all training points are support vectors: solutions obtained by least-squares minimum-norm interpolation, typically used for regression, are identical to those produced by the hard-margin support vector machine (SVM) that mini… ▽ More

    Submitted 14 October, 2021; v1 submitted 16 May, 2020; originally announced May 2020.

    Journal ref: Journal of Machine Learning Research, 22(222):1-69, 2021

  9. Blind interactive learning of modulation schemes: Multi-agent cooperation without co-design

    Authors: Anant Sahai, Joshua Sanz, Vignesh Subramanian, Caryn Tran, Kailas Vodrahalli

    Abstract: We examine the problem of learning to cooperate in the context of wireless communication. In our setting, two agents must learn modulation schemes that enable them to communicate across a power-constrained additive white Gaussian noise channel. We investigate whether learning is possible under different levels of information sharing between distributed agents which are not necessarily co-designed.… ▽ More

    Submitted 1 April, 2020; v1 submitted 21 October, 2019; originally announced October 2019.

    Comments: 33 pages, 25 figures, code can be found at https://github.com/ml4wireless/echo, accepted for publication in IEEE Access

  10. arXiv:1905.11555  [pdf, other

    cs.GT

    Robust Commitments and Partial Reputation

    Authors: Vidya Muthukumar, Anant Sahai

    Abstract: Agents rarely act in isolation -- their behavioral history, in particular, is public to others. We seek a non-asymptotic understanding of how a leader agent should shape this history to its maximal advantage, knowing that follower agent(s) will be learning and responding to it. We study Stackelberg leader-follower games with finite observations of the leader commitment, which commonly models secur… ▽ More

    Submitted 27 May, 2019; originally announced May 2019.

    Comments: 29 pages, extended abstract at ACM Economics and Computation 2019

  11. arXiv:1904.09252  [pdf, ps, other

    eess.SP cs.IT

    Learning Physical-Layer Communication with Quantized Feedback

    Authors: Jinxiang Song, Bile Peng, Christian Häger, Henk Wymeersch, Anant Sahai

    Abstract: Data-driven optimization of transmitters and receivers can reveal new modulation and detection schemes and enable physical-layer communication over unknown channels. Previous work has shown that practical implementations of this approach require a feedback signal from the receiver to the transmitter. In this paper, we study the impact of quantized feedback in data-driven learning of physical-layer… ▽ More

    Submitted 4 November, 2019; v1 submitted 19 April, 2019; originally announced April 2019.

  12. arXiv:1903.09139  [pdf, other

    cs.LG stat.ML

    Harmless interpolation of noisy data in regression

    Authors: Vidya Muthukumar, Kailas Vodrahalli, Vignesh Subramanian, Anant Sahai

    Abstract: A continuing mystery in understanding the empirical success of deep neural networks is their ability to achieve zero training error and generalize well, even when the training data is noisy and there are more parameters than data points. We investigate this overparameterized regime in linear regression, where all solutions that minimize training error interpolate the data, including noise. We char… ▽ More

    Submitted 9 September, 2019; v1 submitted 21 March, 2019; originally announced March 2019.

    Comments: 52 pages, expanded version of the paper presented at ITA in San Diego in Feb 2019, ISIT in Paris in July 2019, at Simons in July, and as a plenary at ITW in Visby in August 2019

  13. arXiv:1901.05061  [pdf, other

    cs.SD cs.LG eess.AS stat.ML

    Spectrogram Feature Losses for Music Source Separation

    Authors: Abhimanyu Sahai, Romann Weber, Brian McWilliams

    Abstract: In this paper we study deep learning-based music source separation, and explore using an alternative loss to the standard spectrogram pixel-level L2 loss for model training. Our main contribution is in demonstrating that adding a high-level feature loss term, extracted from the spectrograms using a VGG net, can improve separation quality vis-a-vis a pure pixel-level loss. We show this improvement… ▽ More

    Submitted 26 June, 2019; v1 submitted 15 January, 2019; originally announced January 2019.

    Comments: Accepted for presentation at the 27th European Signal Processing Conference (EUSIPCO 2019)

    MSC Class: 62; 68 ACM Class: I.2.6; H.5.5

  14. arXiv:1810.00106  [pdf, ps, other

    cs.CR cs.DM

    Expander Graphs are Non-Malleable Codes

    Authors: Peter M. R. Rasmussen, Amit Sahai

    Abstract: Any $d$-regular graph on $n$ vertices with spectral expansion $λ$ satisfying $n = Ω(d^3\log(d)/λ)$ yields a $O\left(\frac{λ^{3/2}}{d}\right)$-non-malleable code for single-bit messages in the split-state model.

    Submitted 20 March, 2019; v1 submitted 28 September, 2018; originally announced October 2018.

    Comments: 10 pages Resubmitted with revised introduction and acknowledgement

  15. arXiv:1806.08777  [pdf, other

    cs.IT

    Wireless Channel Dynamics and Robustness for Ultra-Reliable Low-Latency Communications

    Authors: Vasuki Narasimha Swamy, Paul Rigge, Gireeja Ranade, Borivoje Nikolic, Anant Sahai

    Abstract: Interactive, immersive and critical applications demand ultra-reliable low-latency communication (URLLC). To build wireless communication systems that can support these applications, understanding the characteristics of the wireless medium is paramount. Although wireless channel characteristics and dynamics have been extensively studied, it is important to revisit these concepts in the context of… ▽ More

    Submitted 22 June, 2018; originally announced June 2018.

    Comments: Submitted to IEEE JSAC Special Issue on Ultra-Reliable Low-Latency Communications in Wireless Networks

  16. arXiv:1805.08562  [pdf, other

    cs.LG stat.ML

    Best of many worlds: Robust model selection for online supervised learning

    Authors: Vidya Muthukumar, Mitas Ray, Anant Sahai, Peter L. Bartlett

    Abstract: We introduce algorithms for online, full-information prediction that are competitive with contextual tree experts of unknown complexity, in both probabilistic and adversarial settings. We show that by incorporating a probabilistic framework of structural risk minimization into existing adaptive algorithms, we can robustly learn not only the presence of stochastic structure when it exists (leading… ▽ More

    Submitted 22 May, 2018; originally announced May 2018.

    Comments: 33 pages, 5 figures

  17. arXiv:1803.05143  [pdf, other

    cs.IT

    Network Coding for Real-time Wireless Communication for Automation

    Authors: Vasuki Narasimha Swamy, Paul Rigge, Gireeja Ranade, Anant Sahai, Borivoje Nikolic

    Abstract: Real-time applications require latencies on the order of a millisecond with very high reliabilities, paralleling the requirements for high-performance industrial control. Current wireless technologies like WiFi, Bluetooth, LTE, etc. are unable to meet these stringent latency and reliability requirements, forcing the use of wired systems. This paper introduces a wireless communication protocol base… ▽ More

    Submitted 14 March, 2018; originally announced March 2018.

    Comments: A preliminary version of this work appeared at IEEE WCNC 2016

  18. arXiv:1801.04541  [pdf, other

    eess.SP cs.AI

    Cooperative Multi-Agent Reinforcement Learning for Low-Level Wireless Communication

    Authors: Colin de Vrieze, Shane Barratt, Daniel Tsai, Anant Sahai

    Abstract: Traditional radio systems are strictly co-designed on the lower levels of the OSI stack for compatibility and efficiency. Although this has enabled the success of radio communications, it has also introduced lengthy standardization processes and imposed static allocation of the radio spectrum. Various initiatives have been undertaken by the research community to tackle the problem of artificial sp… ▽ More

    Submitted 14 January, 2018; originally announced January 2018.

  19. arXiv:1703.05348  [pdf, ps, other

    cs.IT

    Layered black-box, behavioral interconnection perspective and applications to the problem of communication with fidelity criteria, Part II: stationary sources satisfying ψ-mixing criterion

    Authors: Mukul Agarwal, Sanjoy Mitter, Anant Sahai

    Abstract: Theorems from Part 1 of this paper are generalized to ψ-mixing sources in this paper. Application to Markoff chains and order m Markoff chains is presented. The main result is the generalization of Theorem 1 in Part 1.

    Submitted 23 March, 2018; v1 submitted 15 March, 2017; originally announced March 2017.

  20. arXiv:1703.05346  [pdf, ps, other

    cs.IT

    Layered black-box, behavioral interconnection perspective and applications to the problem of communication with fidelity criteria, Part I: i.i.d. sources

    Authors: Mukul Agarwal, Sanjoy Mitter, Anant Sahai

    Abstract: In this paper, the problem of communication over an essentially unknown channel, which is known to be able to communicate a source to a destination to within a certain distortion level, is considered from a behavioral, interconnection view-point. Rates of reliable communication are derived and source-channel separation for communication with fidelity criteria is proved. The results are then genera… ▽ More

    Submitted 26 March, 2018; v1 submitted 15 March, 2017; originally announced March 2017.

  21. arXiv:1701.04187  [pdf, other

    cs.IT eess.SY

    Control Capacity

    Authors: Gireeja Ranade, Anant Sahai

    Abstract: Feedback control actively dissipates uncertainty from a dynamical system by means of actuation. We develop a notion of "control capacity" that gives a fundamental limit (in bits) on the rate at which a controller can dissipate the uncertainty from a system, i.e. stabilize to a known fixed point. We give a computable single-letter characterization of control capacity for memoryless stationary scala… ▽ More

    Submitted 16 January, 2017; originally announced January 2017.

    Comments: 52 pages

  22. arXiv:1609.02968  [pdf, other

    cs.IT eess.SY

    Real-time Cooperative Communication for Automation over Wireless

    Authors: Vasuki Narasimha Swamy, Sahaana Suri, Paul Rigge, Matthew Weiner, Gireeja Ranade, Anant Sahai, Borivoje Nikolic

    Abstract: High-performance industrial automation systems rely on tens of simultaneously active sensors and actuators and have stringent communication latency and reliability requirements. Current wireless technologies like WiFi, Bluetooth, and LTE are unable to meet these requirements, forcing the use of wired communication in industrial control systems. This paper introduces a wireless communication protoc… ▽ More

    Submitted 23 January, 2017; v1 submitted 9 September, 2016; originally announced September 2016.

    Comments: A preliminary version of this work appeared at IEEE International Conference on Communications 2015

  23. arXiv:1406.3726  [pdf, ps, other

    cs.LG

    Evaluation of Machine Learning Techniques for Green Energy Prediction

    Authors: Ankur Sahai

    Abstract: We evaluate the following Machine Learning techniques for Green Energy (Wind, Solar) Prediction: Bayesian Inference, Neural Networks, Support Vector Machines, Clustering techniques (PCA). Our objective is to predict green energy using weather forecasts, predict deviations from forecast green energy, find correlation amongst different weather parameters and green energy availability, recover lost o… ▽ More

    Submitted 14 June, 2014; originally announced June 2014.

  24. arXiv:1402.6552  [pdf, other

    cs.LG

    Renewable Energy Prediction using Weather Forecasts for Optimal Scheduling in HPC Systems

    Authors: Ankur Sahai

    Abstract: The objective of the GreenPAD project is to use green energy (wind, solar and biomass) for powering data-centers that are used to run HPC jobs. As a part of this it is important to predict the Renewable (Wind) energy for efficient scheduling (executing jobs that require higher energy when there is more green energy available and vice-versa). For predicting the wind energy we first analyze the hist… ▽ More

    Submitted 26 February, 2014; originally announced February 2014.

  25. arXiv:1402.5642  [pdf, other

    cs.DC

    VM Power Prediction in Distributed Systems for Maximizing Renewable Energy Usage

    Authors: Ankur Sahai

    Abstract: In the context of GreenPAD project it is important to predict the energy consumption of individual (and mixture of) VMs / workload for optimal scheduling (running those VMs which require higher energy when there is more green energy available and vice-versa) in order to maximize green energy utilization. For this we execute the following experiments on an Openstack cloud testbed consisting of Fu… ▽ More

    Submitted 23 February, 2014; originally announced February 2014.

  26. arXiv:1312.4182  [pdf, ps, other

    cs.DS cs.IT

    Adaptive Protocols for Interactive Communication

    Authors: Shweta Agrawal, Ran Gelles, Amit Sahai

    Abstract: How much adversarial noise can protocols for interactive communication tolerate? This question was examined by Braverman and Rao (IEEE Trans. Inf. Theory, 2014) for the case of "robust" protocols, where each party sends messages only in fixed and predetermined rounds. We consider a new class of non-robust protocols for Interactive Communication, which we call adaptive protocols. Such protocols ada… ▽ More

    Submitted 7 August, 2015; v1 submitted 15 December, 2013; originally announced December 2013.

    Comments: Content is similar to previous version yet with an improved presentation

  27. arXiv:1308.5045  [pdf, other

    math.OC cs.IT

    Network Coding meets Decentralized Control: Network Linearization and Capacity-Stabilizablilty Equivalence

    Authors: Se Yong Park, Anant Sahai

    Abstract: We take a unified view of network coding and decentralized control. Precisely speaking, we consider both as linear time-invariant systems by appropriately restricting channels and coding schemes of network coding to be linear time-invariant, and the plant and controllers of decentralized control to be linear time-invariant as well. First, we apply linear system theory to network coding. This gives… ▽ More

    Submitted 23 August, 2013; originally announced August 2013.

  28. Information embedding and the triple role of control

    Authors: Pulkit Grover, Aaron B. Wagner, Anant Sahai

    Abstract: We consider the problem of information embedding where the encoder modifies a white Gaussian host signal in a power-constrained manner to encode a message, and the decoder recovers both the embedded message and the modified host signal. This partially extends the recent work of Sumszyk and Steinberg to the continuous-alphabet Gaussian setting. Through a control-theoretic lens, we observe that the… ▽ More

    Submitted 20 June, 2013; originally announced June 2013.

    Comments: Revised version submitted to IEEE Trans. Info Theory

  29. arXiv:1306.0369  [pdf, other

    cs.ET

    DNA Pen: A Tool for Drawing on a Molecular Canvas

    Authors: Arnav Goyal, Dixita Limbachiya, Shikhar Kumar Gupta, Foram Joshi, Sushant Pritmani, Akshita Sahai, Manish K Gupta

    Abstract: DNA origami is an interdisciplinary area where DNA can be used as a building block for making useful stuff at nanoscale. This work presents an open source software DNA pen (based on the recent work of Peng Yin and his group) which can be used (using free hand and digital molecular canvas) to draw an object at nanoscale. Software generates error free DNA sequences which can be used in the wet lab t… ▽ More

    Submitted 3 June, 2013; originally announced June 2013.

    Comments: Submitted to DNA19. The software is available at http://www.guptalab.org/dnapen

  30. arXiv:1302.5860  [pdf, other

    cs.IT

    A universal, operational theory of unicast multi-user communication with fidelity criteria

    Authors: Mukul Agarwal, Sanjoy Mitter, Anant Sahai

    Abstract: This is a three part paper. Optimality of source-channel separation for communication with a fidelity criterion when the channel is compound as defined by Csiszar and Korner in their book and general as defined by Verdu and Han, is proved in Part I. It is assumed that random codes are permitted. The word "universal" in the title of this paper refers to the fact that the channel model is compound… ▽ More

    Submitted 23 February, 2013; originally announced February 2013.

  31. Passive Self-Interference Suppression for Full-Duplex Infrastructure Nodes

    Authors: Evan Everett, Achaleshwar Sahai, Ashutosh Sabharwal

    Abstract: Recent research results have demonstrated the feasibility of full-duplex wireless communication for short-range links. Although the focus of the previous works has been active cancellation of the self-interference signal, a majority of the overall self-interference suppression is often due to passive suppression, i.e., isolation of the transmit and receive antennas. We present a measurement-based… ▽ More

    Submitted 16 December, 2013; v1 submitted 8 February, 2013; originally announced February 2013.

    Comments: 16 pages, Accepted by IEEE Transactions on Wireless Communication, October 2013

  32. On the Impact of Phase Noise on Active Cancellation in Wireless Full-Duplex

    Authors: Achaleshwar Sahai, Gaurav Patel, Chris Dick, Ashutosh Sabharwal

    Abstract: Recent experimental results have shown that full-duplex communication is possible for short-range communications. However, extending full-duplex to long-range communication remains a challenge, primarily due to residual self-interference even with a combination of passive suppression and active cancellation methods. In this paper, we investigate the root cause of performance bottlenecks in current… ▽ More

    Submitted 21 December, 2012; originally announced December 2012.

    Comments: 35 pages, Submitted to IEEE Transactions on Vehicular Technology, Dec 2012

  33. arXiv:1210.5287  [pdf, ps, other

    cs.CR

    Attribute-Based Encryption for Circuits from Multilinear Maps

    Authors: Amit Sahai, Brent Waters

    Abstract: In this work, we provide the first construction of Attribute-Based Encryption (ABE) for general circuits. Our construction is based on the existence of multilinear maps. We prove selective security of our scheme in the standard model under the natural multilinear generalization of the BDDH assumption. Our scheme achieves both Key-Policy and Ciphertext-Policy variants of ABE.

    Submitted 18 October, 2012; originally announced October 2012.

  34. arXiv:1210.3719  [pdf, ps, other

    cs.CR

    On Constant-Round Concurrent Zero-Knowledge from a Knowledge Assumption

    Authors: Divya Gupta, Amit Sahai

    Abstract: In this work, we consider the long-standing open question of constructing constant-round concurrent zero-knowledge protocols in the plain model. Resolving this question is known to require non-black-box techniques. We consider non-black-box techniques for zero-knowledge based on knowledge assumptions, a line of thinking initiated by the work of Hada and Tanaka (CRYPTO 1998). Prior to our work, i… ▽ More

    Submitted 13 October, 2012; originally announced October 2012.

    Comments: 30 pages, 3 figures

  35. arXiv:1206.3634  [pdf, other

    cs.DS cs.DC

    Balls into Bins: strict Capacities and Edge Weights

    Authors: Ankur Sahai

    Abstract: We explore a novel theoretical model for studying the performance of distributed storage management systems where the data-centers have limited capacities (as compared to storage space requested by the users). Prior schemes such as Balls-into-bins (used for load balancing) neither consider bin (consumer) capacities (multiple balls into a bin) nor the future performance of the system after, balls (… ▽ More

    Submitted 16 June, 2012; originally announced June 2012.

  36. arXiv:1107.0607  [pdf, other

    cs.NI

    Pushing the limits of Full-duplex: Design and Real-time Implementation

    Authors: Achaleshwar Sahai, Gaurav Patel, Ashutosh Sabharwal

    Abstract: Recent work has shown the feasibility of single-channel full-duplex wireless physical layer, allowing nodes to send and receive in the same frequency band at the same time. In this report, we first design and implement a real-time 64-subcarrier 10 MHz full-duplex OFDM physical layer, FD-PHY. The proposed FD-PHY not only allows synchronous full-duplex transmissions but also selective asynchronous f… ▽ More

    Submitted 4 July, 2011; originally announced July 2011.

    Comments: 12 page Rice University technical report

    Report number: TREE1104

  37. arXiv:1105.0233  [pdf, other

    cs.CC cs.DC cs.DS

    Derandomization of Online Assignment Algorithms for Dynamic Graphs

    Authors: Ankur Sahai

    Abstract: This paper analyzes different online algorithms for the problem of assigning weights to edges in a fully-connected bipartite graph that minimizes the overall cost while satisfying constraints. Edges in this graph may disappear and reappear over time. Performance of these algorithms is measured using simulations. This paper also attempts to derandomize the randomized online algorithm for this probl… ▽ More

    Submitted 1 May, 2011; originally announced May 2011.

  38. arXiv:1105.0232  [pdf, ps, other

    cs.DC cs.DS

    Online Assignment Algorithms for Dynamic Bipartite Graphs

    Authors: Ankur Sahai

    Abstract: This paper analyzes the problem of assigning weights to edges incrementally in a dynamic complete bipartite graph consisting of producer and consumer nodes. The objective is to minimize the overall cost while satisfying certain constraints. The cost and constraints are functions of attributes of the edges, nodes and online service requests. Novelty of this work is that it models real-time distribu… ▽ More

    Submitted 1 May, 2011; originally announced May 2011.

  39. Capacity of All Nine Models of Channel Output Feedback for the Two-user Interference Channel

    Authors: Achaleshwar Sahai, Vaneet Aggarwal, Melda Yuksel, Ashutosh Sabharwal

    Abstract: In this paper, we study the impact of different channel output feedback architectures on the capacity of the two-user interference channel. For a two-user interference channel, a feedback link can exist between receivers and transmitters in 9 canonical architectures (see Fig. 2), ranging from only one feedback link to four feedback links. We derive the exact capacity region for the symmetric deter… ▽ More

    Submitted 25 January, 2013; v1 submitted 25 April, 2011; originally announced April 2011.

    Comments: submitted to IEEE Transactions on Information Theory, results improved by deriving capacity region of all 9 canonical feedback models in two-user interference channel

    Journal ref: IEEE Transactions on Information Theory, vol.59, no.11, pp.6957,6979, Nov. 2013

  40. arXiv:1104.0739  [pdf, ps, other

    cs.DS

    Potent Tree Codes and their applications: Coding for Interactive Communication, revisited

    Authors: Ran Gelles, Amit Sahai

    Abstract: We study the fundamental problem of reliable interactive communication over a noisy channel. In a breakthrough sequence of papers published in 1992 and 1993, Schulman gave non-constructive proofs of the existence of general methods to emulate any two-party interactive protocol such that: (1) the emulation protocol takes a constant-factor longer than the original protocol, and (2) if the emulation… ▽ More

    Submitted 5 April, 2011; originally announced April 2011.

    Comments: 26 pages, 6 figures

  41. arXiv:1010.4855  [pdf, other

    cs.IT cs.CC

    Towards a communication-theoretic understanding of system-level power consumption

    Authors: Pulkit Grover, Kristen Ann Woyach, Anant Sahai

    Abstract: Traditional communication theory focuses on minimizing transmit power. However, communication links are increasingly operating at shorter ranges where transmit power can be significantly smaller than the power consumed in decoding. This paper models the required decoding power and investigates the minimization of total system power from two complementary perspectives. First, an isolated point-to… ▽ More

    Submitted 16 February, 2011; v1 submitted 23 October, 2010; originally announced October 2010.

    Comments: 24 pages, 13 figures, revision of our submission to JSAC Special issue on energy-efficient wireless communications

  42. arXiv:1010.4854  [pdf, other

    cs.IT eess.SY math.OC

    Implicit and explicit communication in decentralized control

    Authors: Pulkit Grover, Anant Sahai

    Abstract: There has been substantial progress recently in understanding toy problems of purely implicit signaling. These are problems where the source and the channel are implicit -- the message is generated endogenously by the system, and the plant itself is used as a channel. In this paper, we explore how implicit and explicit communication can be used synergistically to reduce control costs. The setting… ▽ More

    Submitted 23 October, 2010; originally announced October 2010.

    Comments: Presented at Allerton'10

  43. arXiv:1009.2528  [pdf, other

    cs.IT eess.SY

    Is Witsenhausen's counterexample a relevant toy?

    Authors: Pulkit Grover, Anant Sahai

    Abstract: This paper answers a question raised by Doyle on the relevance of the Witsenhausen counterexample as a toy decentralized control problem. The question has two sides, the first of which focuses on the lack of an external channel in the counterexample. Using existing results, we argue that the core difficulty in the counterexample is retained even in the presence of such a channel. The second side q… ▽ More

    Submitted 13 September, 2010; originally announced September 2010.

    Comments: preprint for paper that will appear in proceedings of 49th IEEE Conference on Decision and Control (CDC) 2010, Atlanta, Georgia

  44. Information embedding meets distributed control

    Authors: Pulkit Grover, Aaron B. Wagner, Anant Sahai

    Abstract: We consider the problem of information embedding where the encoder modifies a white Gaussian host signal in a power-constrained manner to encode the message, and the decoder recovers both the embedded message and the modified host signal. This extends the recent work of Sumszyk and Steinberg to the continuous-alphabet Gaussian setting. We show that a dirty-paper-coding based strategy achieves th… ▽ More

    Submitted 2 March, 2010; originally announced March 2010.

    Comments: 19 pages, 7 figures. Presented at ITW'10. Submitted to IEEE Transactions on Information Theory

  45. arXiv:1003.0514  [pdf, other

    cs.IT cs.CC math.OC

    The finite-dimensional Witsenhausen counterexample

    Authors: Pulkit Grover, Se Yong Park, Anant Sahai

    Abstract: Recently, a vector version of Witsenhausen's counterexample was considered and it was shown that in that limit of infinite vector length, certain quantization-based control strategies are provably within a constant factor of the optimal cost for all possible problem parameters. In this paper, finite vector lengths are considered with the dimension being viewed as an additional problem parameter.… ▽ More

    Submitted 2 March, 2010; originally announced March 2010.

    Comments: 32 pages, 7 figures, 1 table. Presented at ConCom 2009, Seoul, Korea. Submitted to IEEE Transactions on Automatic Control

  46. arXiv:0911.3872  [pdf, ps, other

    cs.IT

    Equivalence perspectives in communication, source-channel connections and universal source-channel separation

    Authors: Mukul Agarwal, Anant Sahai, Sanjoy Mitter

    Abstract: An operational perspective is used to understand the relationship between source and channel coding. This is based on a direct reduction of one problem to another that uses random coding (and hence common randomness) but unlike all prior work, does not involve any functional computations, in particular, no mutual-information computations. This result is then used to prove a universal source-chan… ▽ More

    Submitted 19 November, 2009; originally announced November 2009.

  47. arXiv:0905.2392  [pdf, other

    cs.IT

    On Channel Output Feedback in Deterministic Interference Channels

    Authors: Achaleshwar Sahai, Vaneet Aggarwal, Melda Yuksel, Ashutosh Sabharwal

    Abstract: In this paper, we study the effect of channel output feedback on the sum capacity in a two-user symmetric deterministic interference channel. We find that having a single feedback link from one of the receivers to its own transmitter results in the same sum capacity as having a total of 4 feedback links from both the receivers to both the transmitters. Hence, from the sum capacity point of view,… ▽ More

    Submitted 31 August, 2009; v1 submitted 14 May, 2009; originally announced May 2009.

    Comments: To appear in IEEE ITW, Oct. 2009

  48. arXiv:0811.0475  [pdf, ps, other

    cs.CR cs.CC

    Secure Arithmetic Computation with No Honest Majority

    Authors: Yuval Ishai, Manoj Prabhakaran, Amit Sahai

    Abstract: We study the complexity of securely evaluating arithmetic circuits over finite rings. This question is motivated by natural secure computation tasks. Focusing mainly on the case of two-party protocols with security against malicious parties, our main goals are to: (1) only make black-box calls to the ring operations and standard cryptographic primitives, and (2) minimize the number of such black… ▽ More

    Submitted 8 November, 2008; v1 submitted 4 November, 2008; originally announced November 2008.

    Comments: minor editorial changes

  49. arXiv:0805.2423  [pdf, ps, other

    cs.IT

    Green Codes: Energy-Efficient Short-Range Communication

    Authors: Pulkit Grover, Anant Sahai

    Abstract: A green code attempts to minimize the total energy per-bit required to communicate across a noisy channel. The classical information-theoretic approach neglects the energy expended in processing the data at the encoder and the decoder and only minimizes the energy required for transmissions. Since there is no cost associated with using more degrees of freedom, the traditionally optimal strategy… ▽ More

    Submitted 15 May, 2008; originally announced May 2008.

    Comments: Accepted at International Symposium on Information Theory (ISIT) 2008

  50. arXiv:0801.0352  [pdf, ps, other

    cs.IT

    The price of certainty: "waterslide curves" and the gap to capacity

    Authors: Anant Sahai, Pulkit Grover

    Abstract: The classical problem of reliable point-to-point digital communication is to achieve a low probability of error while keeping the rate high and the total power consumption small. Traditional information-theoretic analysis uses `waterfall' curves to convey the revolutionary idea that unboundedly low probabilities of bit-error are attainable using only finite transmit power. However, practitioners… ▽ More

    Submitted 2 January, 2008; originally announced January 2008.

    Comments: 37 pages, 13 figures. Submitted to IEEE Transactions on Information Theory. This version corrects a subtle bug in the proofs of the original submission and improves the bounds significantly

    Report number: UCB/EECS-2008-1