Pizza Meeting Seminar

 

Subscription    Schedule     Abstracts

 

Upcoming Talk

bullet

When: Friday, May 26

bullet

Where: Moore 70

bullet

Speaker: Yuval Cassuto

Fall 2005

Fridays at 12:00 pm (Noon) in Moore 70

Date

Speaker

Title

Oct 14 Ali Vakili The effect of SNR estimation error on the sum-rate of broadcast channels
Oct 28 Sidharth Jaggi Network Coding: Mixin' it up
Nov 11 Edwin Soedarmadji The Gas Station Problem
Nov 18 Xiaojie Gao Real-Time Coding for Multiple Access Channels
Dec 2 Marco Andreetto Automatic scene classification using the Latent Dirichlet Allocation model

 

Winter 2006

Fridays at 12:00 pm (Noon) in Moore 70 

Date

Speaker

Title

Jan 20 Farzad Parvaresh On the algebraic list decoding of error-correcting codes
Feb 3 Chaitanya Kumar Rao The diversity order of wireless systems
Feb 10 Edwin Soedarmadji A Dynamic Graph Algorithm for the Highly Dynamic Network Problem
Feb 24 Mihailo Stojnic Speeding up the Sphere Decoder with $SDP$ and $H^{\infty}$ inspired lower bounds
Mar 10 Byung-Jun Yoon Profile context-sensitive HMMs for probabilistic modeling of sequences with complex correlations

 

Spring 2006

Fridays at 12:00 pm (Noon) in Moore 70 

Date

Speaker

Title

Apr 21 Chun-Yang Scott Chen A Novel Beamformer Robust to Steering Vector Mismatch
May 5 Borching Su A Generalized Algorithm for Blind Channel Identification with Linear Redundant Precoders
May 26 Yuval Cassuto Cyclic Array-Codes

 

 

Abstracts

bullet

Date: Oct 14, 2005

bullet

Speaker:  Ali Vakili

bullet

Title: "The effect of SNR estimation error on the sum-rate of broadcast channels," Ali Vakili, Masoud Sharif, Babak Hassibi.

bullet

Abstract:

In a broadcast channel in which one transmitter serves $n$ receivers, the capacity region highly depends on the amount of channel state information at the transmitter. Assuming that the transmitter knows the SNR of all the receivers, opportunistic strategy which transmits to the user with the best channel condition at each channel use, maximizes the throughput (sum-rate) of the system. Evaluating the SNR is basically an estimation problem which cannot be done without error. In this paper, we analyze the effect of this noisy estimation on the throughput. We consider a scheduling scheme similar to the opportunistic transmission with the only difference that the transmitter backs off on the transmit rate based on the variance of the estimation error. We obtain the optimum amount of back off and compute the throughput for our scheduling as a function of the estimation noise. Clearly, the estimation can be improved by using a longer training phase; however, longer training would deteriorate the throughput. In the final part of the paper, we obtain the optimum training that maximizes the throughput of the system. Simulation results compare the throughput of the system in the presence of different amounts of estimation error.

 

bullet

Date: Oct 28, 2005

bullet

Speaker:  Sidharth Jaggi

bullet

Title: "Network Coding: Mixin' it up," Sidharth Jaggi

bullet

Abstract:

The information theoretic aspects of large networks with many terminals presents several interesting and non-intuitive phenomena. One such phenomenon was first explored in a detailed manner in excellent work by Ahlswede et al., who proved that for a large class of network problems, allowing internal nodes to perform non-trivial arithmetic operations on information on incoming links to generate information on outgoing links could substantially improve throughput, compared to the more traditional scenario where such nodes were restricted to only copying and forwarding incoming messages on outgoing links. Further work by various authors showed how to design codes (called network codes) to transmit under this new paradigm, and also demonstrated exciting new phenomena for such coding techniques such as robustness against network failures, distributed design, and increased security.

We consider the low-complexity design and analysis of network codes, with a focus on codes for multicasting information. We examine both centralized and decentralized design of such codes, and also randomized versus deterministic design algorithms. We compare different notions of linearity and show the interplay between these notions in the design of linear network codes. We determine bounds on the complexity of network codes. We also consider the problem of error-correction and secrecy for network codes when a malicious adversary controls some subset of the network resources.

 

 

bullet

Date: Nov 11, 2005

bullet

Speaker:  Edwin Soedarmadji

bullet

Title: "The Gas Station Problem," Edwin Soedarmadji and Robert J. McEliece

bullet

Abstract:

We introduce the ``gas station problem'' (GSP), the problem of finding the shortest travel path for a vehicle with a limited fuel capacity operating in a transportation network with refueling nodes. The GSP is specified by the vehicle's maximum onboard fuel capacity and its starting fuel level, as well as the network's refueling nodes and its edge weights expressed in fuel consumption units. We develop an algorithm that provides an answer in $O(V^3)$ time complexity.

 

bullet

Date: Nov 18, 2005

bullet

Speaker:  Xiaojie Gao

bullet

Title: "Real-Time Coding for Multiple Access Channels,"  Xiaojie Gao

bullet

Abstract:

We consider a multiple access channel shared by two sources. The channel is noiseless but there is interference between the transmissions of the sources. Because of applications to distributed control we are interested in the real-time version of this problem, in which the receiver must act immediately upon received information.

Block coding is therefore not possible, and error probability cannot generally be made to tend to 0 in the interior of the multiple access capacity region.

We study code design for a simple class of XOR channels. We provide several computationally efficient design methods. Under an assumption on the form of the correlation among the sources, one of these algorithms provides codes whose success probability is within $2/3$ of optimal. In the absence of assumptions on the correlation, optimal code design is NP-hard.

 
bullet

Date: Dec 2, 2005

bullet

Speaker:  Marco Andreetto

bullet

Title: Automatic scene classification using the Latent Dirichlet Allocation model

bullet

Abstract:

In this talk I will introduce the Latent Dirichlet Allocation (LDA),a probabilistic model for the description of set of discrete observation. The LDA model is a hierarchical Bayesian model which describes each set of observations as a mixture of a "topics" or "aspects". After illustrating the model characteristics and possible techniques for inference and learning on this model, I will show the LDA can be used to solve a visual recognition problem: the automatic classification of scenes.

bullet

Date: Jan 20, 2006

bullet

Speaker:  Farzad Parvaresh

bullet

Title: On the algebraic list decoding of error-correcting codes

bullet

Abstract:

There has been a lot of progress in the area of algebraic list decoding. The first real breakthrough on the list-decoding problem was achieved by Sudan and Guruwami-Sudan in the late 1990s. The groundbreaking work of Guruwami-Sudan shows that using Reed-Solomon (and later algebraic) codes, it is possible to list-decode in polynomial time a fraction of $1-\epsilon$ errors with a code of rate $\epsilon2$. Recently, Parvaresh and Vardy come up with a new class of codes that can efficiently list decoded up to $1 - \epsilon$ fraction of errors with rate $\Omega(\epsilon / \log(1 / \epsilon))$. The new codes are based on two key ideas. The first is the transition form bivariate polynomial interpolation, pioneered by Sudan and Guruswami-Sudan, to multivariate interpolation decoding. The second idea is to part ways with Reed-Solomon codes. Later, Guruswami and Rudra show that a specific class of PV codes can be compressed in a very clever way into a "Folded" Reed-Solomon code. This compression increases the transmission rate and so improves the decoding radius. However, the decoder can decompress the received word and use the PV algorithm for recovery of the transmitted codeword. Using folded RS codes we can correct up to $1 - \epsilon$ fraction of errors with rate $\ep^{(M-1) / M}$. This bound can get close to capacity of adversarial channel when the alphabet size is large. I will briefly address these algorithms and I will talk about the open problems that still remains in this area.

 

bullet

Date: Feb 3, 2006

bullet

Speaker:  Chaitanya Kumar Rao

bullet

Title: The diversity order of wireless systems

bullet

Abstract:

Wireless systems are subject to multipath fading, a randomness in the channel that can severely limit the rates of reliable communication. One performance measure for such systems is the diversity order - if error probability decays as 1/(SNR^d) for high SNR, it is said to have diversity order d. This can be increased by exploiting fading, through the use of multiple antennas or relay nodes.

In this talk I will describe some setups whose diversity order can be found, as a function of rate. These include multiple antenna systems, simple relay networks, and recent work on the interference channel with cooperating nodes. In the latter case the diversity can be as high as three, but at the expense of a reduced data rate.

 

bullet

Date: Feb 10, 2006

bullet

Speaker: Edwin Soedarmadji

bullet

Title: "A Dynamic Graph Algorithm for the Highly Dynamic Network Problem," Edwin Soedarmadji and Robert J. McEliece

bullet

Abstract:

A recent flooding algorithm by O'Dell and Wattenhofer guaranteed correctness for networks with dynamic edges and fixed nodes. The algorithm provided a partial answer to the highly dynamic network (HDN) problem, defined as the problem of devising a reliable message-passing algorithm over a HDN, a network mobility model where edges and nodes can enter and leave the network almost arbitrarily. In this paper, we relax the flooding algorithms assumptions by removing the requirement that the network stays connected at all time, and extend the algorithm to solve the HDN problem where dynamic nodes are also involved.

The extended algorithm is reliable: it guarantees message- passing to all the destination nodes and terminates within a time bounded by a polynomial function of the maximum message transit time between adjacent nodes, and the maximum number of nodes in the network.

bullet

Date: Feb 24, 2006

bullet

Speaker: Mihailo Stojnic

bullet

Title: Speeding up the Sphere Decoder with $SDP$ and $H^{\infty}$ inspired lower bounds

bullet

Abstract:

It is well known that maximum-likelihood (ML) decoding in many digital communication schemes reduces to solving an integer least-squares problem, which is NP hard in the worst-case. On the other hand, it has recently been shown that, over a wide range of dimensions $N$ and signal-to-noise ratios (SNRs), the sphere decoding algorithm can be used to find the exact ML solution with an expected complexity that is often no more than $N^3$. However, the computational complexity of sphere decoding becomes prohibitive if the SNR is too low and/or if the dimension of the problem is too large. In this paper, we target these two regimes and attempt to find faster algorithms by pruning the search tree beyond what is done in the standard sphere decoding algorithm. The search tree is pruned by computing lower bounds on the optimal solution as the algorithm proceeds to descend down the search tree. We observe a trade-off between the computational complexity required to compute a lower bound and the size of the pruned tree: the more effort we spend in computing a tight lower bound, the more branches that can be eliminated in the tree. Using ideas from SDP-duality theory and $H^\infty$ estimation theory, we propose general frameworks for computing lower bounds on integer least-squares problems. We then show how in several special cases these bounds can be efficiently incorporated in the sphere decoding algorithm, resulting in significant improvement of the expected complexity of solving the ML decoding problem, while maintaining the exact ML-performance.

bullet

Date: March 10, 2006

bullet

Speaker: Byung-Jun Yoon

bullet

Title: Profile context-sensitive HMMs for probabilistic modeling of sequences with complex correlations

bullet

Abstract:

The profile hidden Markov model is a specific type of HMM that is well suited for describing the common features of a set of related sequences. It has been extensively used in computational biology, where it is still one of the most popular tools. In this talk, we introduce a new model called the profile context-sensitive HMM. Unlike traditional profile-HMMs, the proposed model is capable of describing complex long-range correlations between distant symbols in a consensus sequence. We also describe a general algorithm that can be used for finding the optimal state sequence of an observed symbol sequence based on the given profile-csHMM. The proposed algorithm can be viewed as a generalization of the Viterbi algorithm and the Cocke-Younger-Kasami (CYK) algorithm

bullet

Date: April 21, 2006

bullet

Speaker: Chun-Yang Scott Chen

bullet

Title: A Novel Beamformer Robust to Steering Vector Mismatch

bullet

Abstract:

One of the main problems in beamforming applications is the mismatch of the assumed and actual directions of the steering vector. For example the performance of the Capon beamformer is known to be very sensitive to steering vector mismatch. When the mismatch happens, the linear constraint fails to ensure a constant gain for the signal. The signal is therefore interpreted as an interference and is attenuated. Recently, some approaches based on an uncertainty set of steering vectors have been proposed. Instead of imposing a linear constraint, these approaches minimize the output variances subject to the constraint that the magnitude responses of a set of steering vectors exceed unity. However, these methods include too many unnecessary constraints to minimize the output variances properly. In this paper, a new robust beamformer is proposed. Instead of confining the magnitude responses of all possible steering vectors, our method constrains the magnitude responses of only two steering vectors. Then a diagonal loading method is used to force the magnitude responses at a range of the arrival angles to exceed unity. The diagonal loading factor can be computed systematically by a proposed algorithm. Numerical examples show that this method has a significantly better SINR performance compared to previously published methods and a complexity comparable to the standard Capon beamformer.

bullet

Date: May 5, 2006

bullet

Speaker: Borching Su

bullet

Title: A Generalized Algorithm for Blind Channel Identification with Linear Redundant Precoders

bullet

Abstract:

It is well-known that redundant filter bank precoders can be used for blind identification as well as equalization of FIR channels. Several algorithms have been proposed in the literature exploiting trailing zeros in the transmitter. In this talk we propose a generalized algorithm of which the previous algorithms are special cases. By carefully choosing system parameters, we can jointly optimize the system performance and computational complexity. Simulation results show that the proposed algorithm outperforms the previous ones when the parameters are optimally chosen, especially in time-varying channel environments.
 

bullet

Date: May 26, 2006

bullet

Speaker: Yuval Cassuto

bullet

Title: Cyclic Array-Codes

bullet

Abstract:

Array codes are error correcting codes that use simple operations over the binary field to obtain good error correction properties over large extension fields. As a result, they are very useful for dynamic data storage applications. In such applications, failures occur in the device level (thus the large field), but the need for fast encoding, decoding and updates allows only for simple binary operations.
Array codes are also interesting from a coding theoretic perspective as they can be regarded as a generalization of linear codes.  The talk will present new definitions and theorems that are degenerate or wrong for linear codes. In the main part of the talk we will construct array codes that are cyclic (closed under cyclic shifts of arrays). We provide cyclic MDS code constructions whose other properties match those of their best (and optimal) non-cyclic counterparts, thus simplifying code implementations with no compromise in optimality.
This is a joint work with Prof. Jehoshua Bruck

 

 

This page is maintained by Mostafa El-Khamy