Mobile Network Operators (MNOs) are in process of overlaying their
conventional macro cellular networks with shorter range cells such as outdoor
pico cells. The resultant increase in network complexity creates substantial
overhead in terms of operating expenses, time, and labor for their planning and
management. Artificial intelligence (AI) offers the potential for MNOs to
operate their networks in a more organic and cost-efficient manner. We argue
that deploying AI in 5G and Beyond will require surmounting significant
technical barriers in terms of robustness, performance, and complexity. We
outline future research directions, identify top 5 challenges, and present a
possible roadmap to realize the vision of AI-enabled cellular networks for
Beyond-5G and 6G.

more |
pdf
| html
None.

mathITbot:
Rubayet Shafin, Lingjia Liu, Vikram Chandrasekhar, Hao Chen, Jeffrey Reed, Jianzhong (Charlie) Zhang : Artificial Intelligence-Enabled Cellular Networks: A Critical Path to Beyond-5G and 6G https://t.co/uVUa345afA https://t.co/FgRdvbsrEQ

None.

None.

Sample Sizes : None.

Authors: 7

Total Words: 0

Unqiue Words: 0

We study the secure and reliable connectivity of wireless sensor networks
under the heterogeneous pairwise key predistribution scheme. This scheme was
recently introduced as an extension of the random pairwise key predistribution
scheme of Chan et al. to accommodate networks where the constituent sensors
have different capabilities or requirements for security and connectivity. For
simplicity, we consider a heterogeneous network where each of the $n$ sensors
is classified as type-1 (respectively, type-2) with probability $\mu$
(respectively, $1-\mu)$ where $0<\mu<1$. Each type-1 (respectively, type-2)
node selects 1 (respectively, $K_n$) other nodes uniformly at random to be
paired with; according to the pairwise scheme each pair is then assigned a
unique pairwise key so that they can securely communicate with each other. We
establish critical conditions on $n, \mu$, and $K_n$ such that the resulting
network has minimum node degree of at least $k$ with high probability in the
limit of large network size. Our result constitutes a...

more |
pdf
| html
None.

mathITbot:
Mansi Sood, Osman Yağan : Towards $k$-connectivity in Heterogeneous Sensor Networks under Pairwise Key Predistribution https://t.co/2P3ZdWIDbA https://t.co/7b0WmzUsjY

None.

None.

Sample Sizes : None.

Authors: 2

Total Words: 0

Unqiue Words: 0

We study the ON-OFF privacy problem. At each time, the user is interested in
the latest message of one of $N$ sources. Moreover, the user is assumed to be
incentivized to turn privacy ON or OFF whether he/she needs it or not. When
privacy is ON, the user wants to keep private which source he/she is interested
in. The challenge here is that the user's behavior is correlated over time.
Therefore, the user cannot simply ignore privacy when privacy is OFF, because
this may leak information about his/her behavior when privacy was ON due to
correlation.
We model the user's requests by a Markov chain. The goal is to design ON-OFF
privacy schemes with optimal download rate that ensure privacy for past and
future requests. The user is assumed to know future requests within a window of
positive size $\omega$ and uses it to construct privacy-preserving queries. In
this paper, we construct ON-OFF privacy schemes for $N=2$ sources and prove
their optimality.

more |
pdf
| html
None.

mathITbot:
Fangwei Ye, Carolina Naim, Salim El Rouayheb : Preserving ON-OFF Privacy for Past and Future Requests https://t.co/MoQYgPH891 https://t.co/EcxVltcZt8

None.

None.

Sample Sizes : None.

Authors: 3

Total Words: 4692

Unqiue Words: 1168

Distributed matrix computations (matrix-vector and matrix-matrix
multiplications) are at the heart of several tasks within the machine learning
pipeline. However, distributed clusters are well-recognized to suffer from the
problem of stragglers (slow or failed nodes). Prior work in this area has
presented straggler mitigation strategies based on polynomial
evaluation/interpolation. However, such approaches suffer from numerical
problems (blow up of round-off errors) owing to the high condition numbers of
the corresponding Vandermonde matrices. In this work, we introduce a novel
solution approach that relies on embedding distributed matrix computations into
the structure of a convolutional code. This simple innovation allows us to
develop a provably numerically robust and efficient (fast) solution for
distributed matrix-vector and matrix-matrix multiplication.

more |
pdf
| html
None.

mathITbot:
Anindya B. Das, Aditya Ramamoorthy, Namrata Vaswani : Random Convolutional Coding for Robust and Straggler Resilient Distributed Matrix Computation https://t.co/Hh4xU00y3k https://t.co/zODfHUPNQT

None.

None.

Sample Sizes : None.

Authors: 3

Total Words: 9427

Unqiue Words: 2191

Designing fast and reliable distributed consensus protocols is a key to
enabling mission-critical and real-time controls of industrial Internet of
Things (IIoT) nodes communicating over wireless links. However, chasing both
low-latency and reliability of a consensus protocol at once is a challenging
task. The problem is even aggravated under wireless connectivity that is slower
and less reliable, compared to wired connections presumed in traditional
consensus protocols. To tackle this issue, we investigate fundamental
relationships between consensus latency and reliability under wireless
connectivity, and thereby co-design communication and consensus protocols for
low-latency and reliable IIoT systems. Specifically, we propose a novel
communication-efficient distributed consensus protocol, termed Random
Representative Consensus (R2C), and show its effectiveness under gossip and
broadcast communication protocols. To this end, we derive closed-form
end-to-end (E2E) latency expression of R2C that guarantees a target
reliability, and...

more |
pdf
| html
None.

mathITbot:
Hyowoon Seo, Jihong Park, Mehdi Bennis, Wan Choi : Communication and Consensus Co-Design for Low-Latency and Reliable Industrial IoT Systems https://t.co/HArGvhGLs7 https://t.co/asMf0gz4w0

None.

None.

Sample Sizes : None.

Authors: 4

Total Words: 0

Unqiue Words: 0

A single-sensor two-detectors system is considered where the sensor
communicates with both detectors and Detector 1 communicates with Detector 2,
all over noise-free rate-limited links. The sensor and both detectors observe
discrete memoryless source sequences whose joint probability mass function
depends on a binary hypothesis. The goal at each detector is to guess the
binary hypothesis in a way that, for increasing observation lengths, the
probability of error under one of the hypotheses decays to zero with largest
possible exponential decay, whereas the probability of error under the other
hypothesis can decay to zero arbitrarily slow. For the setting with zero-rate
communication on both links, we exactly characterize the set of possible
exponents and the gain brought up by cooperation, in function of the number of
bits that are sent over the two links. Notice that, for this setting, tradeoffs
between the exponents achieved at the two detectors arise only in few
particular cases. In all other cases, each detector achieves the...

more |
pdf
| html
None.

mathITbot:
Pierre Escamilla, Michèle Wigger, Abdellatif Zaidi : Distributed Hypothesis Testing: Cooperation and Concurrent Detection https://t.co/ELE9FQdnfO https://t.co/QSsZssPdAB

None.

None.

Sample Sizes : None.

Authors: 3

Total Words: 0

Unqiue Words: 0

This paper considers a wireless networked control system (WNCS) consisting of
a dynamic system to be controlled (i.e., a plant), a sensor, an actuator and a
remote controller for mission-critical Industrial Internet of Things (IIoT)
applications. A WNCS has two types of wireless transmissions, i.e., the
sensor's measurement transmission to the controller and the controller's
command transmission to the actuator. In the literature of WNCSs, the
controllers are commonly assumed to work in a full-duplex mode, i.e., can
simultaneously receive the sensor's information and transmit its own command to
the actuator. In this work, we consider a practical half-duplex controller,
which introduces a novel transmission-scheduling problem for WNCSs. A frequent
schedule of the sensor's transmission results in a better estimation of the
plant states at the controller and thus a higher quality of the control
command, but it leads to a less frequent/timely control of the plant.
Therefore, considering the overall control performance of the plant,...

more |
pdf
| html
None.

mathITbot:
Kang Huang, Wanchun Liu, Yonghui Li, Branka Vucetic : Optimal Downlink-Uplink Scheduling of Wireless Networked Control for Industrial IoT https://t.co/rUHfWuPk6o https://t.co/w6IId5ZN35

None.

None.

Sample Sizes : None.

Authors: 4

Total Words: 0

Unqiue Words: 0

Massive Internet of Things (IoT) is foreseen to introduce plethora of
applications for a fully connected world. Heterogeneous traffic is envisaged,
where packets generated at each IoT device should be differentiated and served
according to their priority. This paper develops a novel priority-aware
spatiotemporal mathematical model to characterize massive IoT networks with
uplink prioritized multistream traffic (PMT). Particularly, stochastic geometry
is utilized to account for the macroscopic network wide mutual interference
between the coexisting IoT devices. Discrete time Markov chains (DTMCs) are
employed to track the microscopic evolution of packets within each priority
stream at each device. To alleviate the curse of dimensionality, we decompose
the prioritized queueing model at each device to a single-queue system with
server vacation. To this end, the IoT network with PMT is modeled as spatially
interacting vacation queues. Interactions between queues, in terms of the
packet departure probabilities, occur due to mutual...

more |
pdf
| html
None.

mathITbot:
Mustafa Emara, Hesham ElSawy, Gerhard Bauch : Prioritized Multi-stream Traffic in Uplink IoT Networks: Spatially Interacting Vacation Queues https://t.co/p7aAqUXcer https://t.co/C8JOoX8N4g

None.

None.

Sample Sizes : None.

Authors: 3

Total Words: 0

Unqiue Words: 0

The capacity of unifilar finite-state channels in the presence of feedback is
investigated. We derive a new evaluation method to extract graph-based encoders
with their achievable rates, and to compute upper bounds to examine their
performance. The evaluation method is built upon a recent methodology to derive
simple bounds on the capacity using auxiliary directed graphs. While it is not
clear whether the upper bound is convex, we manage to formulate it as a convex
optimization problem using transformation of the argument with proper
constraints. The lower bound is formulated as a non-convex optimization
problem, yet, any feasible point to the optimization problem induces a
graph-based encoders. In all examples, the numerical results show near-tight
upper and lower bounds that can be easily converted to analytic results. For
the non-symmetric Trapdoor channel and binary fading channels (BFCs), new
capacity results are eastablished by computing the corresponding bounds. For
all other instances, including the Ising channel, the...

more |
pdf
| html
None.

mathITbot:
Oron Sabag, Bashar Huleihel, Haim Permuter : Graph-Based Encoders and their Performance for Finite-State Channels with Feedback https://t.co/fQW33EsYHU https://t.co/MEY8EVfFN6

None.

None.

Sample Sizes : None.

Authors: 3

Total Words: 0

Unqiue Words: 0

This paper studies a wireless powered mobile edge computing (MEC) system with
fluctuating channels and dynamic task arrivals over time. We jointly optimize
the transmission energy allocation at the energy transmitter (ET) for WPT and
the task allocation at the user for local computing and offloading over a
particular finite horizon, with the objective of minimizing the total
transmission energy consumption at the ET while ensuring the user's successful
task execution. First, in order to characterize the fundamental performance
limit, we consider the offline optimization by assuming that the perfect
knowledge of channel state information and task state information (i.e., task
arrival timing and amounts) is known a-priori. In this case, we obtain the
well-structured optimal solution in a closed form to the energy minimization
problem via convex optimization techniques. Next, inspired by the structured
offline solutions obtained above, we develop heuristic online designs for the
joint energy and task allocation when the knowledge of...

more |
pdf
| html
mathITbot:
Feng Wang, Jie Xu, Shuguang Cui : Optimal Energy Allocation and Task Offloading Policy for Wireless Powered Mobile Edge Computing Systems https://t.co/WTjDaXmUbQ https://t.co/uWFNcqUz8i

None.

None.

Sample Sizes : None.

Authors: 3

Total Words: 13080

Unqiue Words: 2139

Assert is a website where the best academic papers on arXiv (computer science, math, physics), bioRxiv (biology), BITSS (reproducibility), EarthArXiv (earth science), engrXiv (engineering), LawArXiv (law), PsyArXiv (psychology), SocArXiv (social science), and SportRxiv (sport research) bubble to the top each day.

Papers are scored (in real-time) based on how verifiable they are (as determined by their Github repos) and how interesting they are (based on Twitter).

To see top papers, follow us on twitter @assertpub_ (arXiv), @assert_pub (bioRxiv), and @assertpub_dev (everything else).

To see beautiful figures extracted from papers, follow us on Instagram.

*Tracking 160,428 papers.*

Sort results based on if they are interesting or reproducible.

Interesting

Reproducible