Bounding the best achievable error probability for binary classification
problems is relevant to many applications including machine learning, signal
processing, and information theory. Many bounds on the Bayes binary
classification error rate depend on information divergences between the pair of
class distributions. Recently, the Henze-Penrose (HP) divergence has been
proposed for bounding classification error probability. We consider the problem
of empirically estimating the HP-divergence from random samples. We derive a
bound on the convergence rate for the Friedman-Rafsky (FR) estimator of the
HP-divergence, which is related to a multivariate runs statistic for testing
between two distributions. The FR estimator is derived from a multicolored
Euclidean minimal spanning tree (MST) that spans the merged samples. We obtain
a concentration inequality for the Friedman-Rafsky estimator of the
Henze-Penrose divergence. We validate our results experimentally and illustrate
their application to real datasets.

more |
pdf
| html
mathITbot:
Salimeh Yasaei Sekeh, Morteza Noshad, Kevin R. Moon, Alfred O. Hero : Convergence Rates for Empirical Estimation of Binary Classification Bounds https://t.co/4Tq6KYkXAY

Memoirs:
Convergence Rates for Empirical Estimation of Binary Classification Bounds. https://t.co/xIZLqhsOBH

None.

None.

Sample Sizes : None.

Authors: 4

Total Words: 18929

Unqiue Words: 3222

In this paper, the line spectral estimation (LSE) problem is studied from
one-bit quantized samples where variational line spectral estimation (VALSE)
combined expectation propagation (EP) VALSE-EP method is proposed. Since the
original measurements are heavily quantized, performing the off-grid frequency
estimation is very challenging. Referring to the expectation propagation (EP)
principle, this quantized model is decomposed as two modules, one is the
componentwise minimum mean square error (MMSE) module, the other is the
standard linear model where the variational line spectrum estimation (VALSE)
algorithm can be performed. The VALSE-EP algorithm iterates between the two
modules in a turbo manner. In addition, this algorithm can be easily extended
to solve the LSE with the multiple measurement vectors (MMVs). Finally,
numerical results demonstrate the effectiveness of the proposed VALSE-EP
method.

more |
pdf
| html
mathITbot:
Jiang Zhu, Qi Zhang, Xiangming Meng : Off-grid Variational Bayesian Inference of Line Spectral Estimation from One-bit Samples https://t.co/aFVSu45WWH https://t.co/SpwOYA8KTr

None.

None.

Sample Sizes : None.

Authors: 3

Total Words: 4284

Unqiue Words: 1450

Opportunistic spectrum access is one of the emerging techniques for
maximizing throughput in congested bands and is enabled by predicting idle
slots in spectrum. We propose a kernel-based reinforcement learning approach
coupled with a novel budget-constrained sparsification technique that
efficiently captures the environment to find the best channel access actions.
This approach allows learning and planning over the intrinsic state-action
space and extends well to large state spaces. We apply our methods to evaluate
coexistence of a reinforcement learning-based radio with a multi-channel
adversarial radio and a single-channel CSMA-CA radio. Numerical experiments
show the performance gains over carrier-sense systems.

more |
pdf
| html
None.

None.

None.

Sample Sizes : None.

Authors: 2

Total Words: 5398

Unqiue Words: 1943

Most of the well-known fading distributions, if not all of them, could be
encompassed by Fox's $H$-function fading. Consequently, we investigate the
exact and asymptotic behavior of physical layer security (PLS) over Fox's
$H$-function fading wiretap channels. In particular, closed-form expressions
are derived for secrecy outage probability (SOP), probability of non-zero
secrecy capacity (PNZ), and average secrecy capacity (ASC). These expressions
are given in terms of either univariate or bivariate Fox's $H$-function. In
order to show the comprehensive effectiveness of our derivations, three metrics
are respectively listed over the following frequently used fading channels,
including Rayleigh, Weibull, Nakagami-$m$, $\alpha-\mu$, Fisher-Snedecor (F-S)
$\mathcal{F}$, and extended generalized-$\mathcal{K}$ (EGK). Our tractable
results are more straightforward and general, besides that, they are feasible
and applicable, especially the SOP, which was mostly limited to the lower bound
in literature due to the difficulty of achieving...

more |
pdf
| html
None.

M157q_News_RSS:
On Physical Layer Security over Fox's $H$-Function Wiretap Fading Channels. (arXiv:1808.03343v1 [https://t.co/TTBPbOTUOx])
https://t.co/MDDvhEh6RF
Most of the

None.

None.

Sample Sizes : None.

Authors: 3

Total Words: 8177

Unqiue Words: 2008

This paper focuses on the problem of finding a distribution for an associated
entropic vector in the entropy space nearest to a given, possibly non-entropic,
target vector for random variables with a constraint on alphabet size. We show
the feasibility to find distribution for associated vector via a sequence of
perturbations in the probability mass function. Then we present an algorithm
for numerically solving the problem together with extensions, applications, and
comparison with the known results.

more |
pdf
| html
None.

None.

Sample Sizes : None.

Authors: 3

Total Words: 11916

Unqiue Words: 3330

It was shown in \cite{GXY18} that the length $n$ of a $q$-ary linear locally
recoverable code with distance $d\ge 5$ is upper bounded by $O(dq^3)$. Thus, it
is a challenging problem to construct $q$-ary locally recoverable codes with
distance $d\ge 5$ and length approaching the upper bound. The paper
\cite{GXY18} also gave an algorithmic construction of $q$-ary locally
recoverable codes with locality $r$ and length $n=\Omega_r(q^2)$ for $d=5$ and
$6$, where $\Omega_r$ means that the implicit constant depends on locality $r$.
In the present paper, we present an explicit construction of $q$-ary locally
recoverable codes of distance $d= 5$ and $6$ via binary constant weight codes.
It turns out that (i) our construction is simpler and more explicit; and (ii)
lengths of our codes are larger than those given in \cite{GXY18}.

more |
pdf
| html
None.

None.

None.

Sample Sizes : None.

Authors: 1

Total Words: 6134

Unqiue Words: 1271

In order to mitigate the long processing delay and high energy consumption of
mobile augmented reality (AR) applications, mobile edge computing (MEC) has
been recently proposed and is envisioned as a promising means to deliver better
quality of experience (QoE) for AR consumers. In this article, we first present
a comprehensive AR overview, including the indispensable components of general
AR applications, fashionable AR devices, and several existing techniques for
overcoming the thorny latency and energy consumption problems. Then, we propose
a novel hierarchical computation architecture by inserting an edge layer
between the conventional user layer and cloud layer. Based on the proposed
architecture, we further develop an innovated operation mechanism to improve
the performance of mobile AR applications. Three key technologies are also
discussed to further assist the proposed AR architecture. Simulation results
are finally provided to verify that our proposals can significantly improve the
latency and energy performance as...

more |
pdf
| html
mathITbot:
Jinke Ren, Yinghui He, Guan Huang, Guanding Yu, Yunlong Cai, Zhaoyang Zhang : An Edge-Computing Based Architecture for Mobile Augmented Reality https://t.co/DFMus6SlpS

MathPaper:
An Edge-Computing Based Architecture for Mobile Augmented Reality. https://t.co/iyxZwXOPVW

None.

None.

Sample Sizes : None.

Authors: 6

Total Words: 5784

Unqiue Words: 1743

The paper provides the first constructions of strongly regular graphs and
association schemes from weakly regular plateaued functions over finite fields
of odd characteristic. We generalize the construction method of strongly
regular graphs from weakly regular bent functions given by Chee et al. in
[Journal of Algebraic Combinatorics, 34(2), 251-266, 2011] to weakly regular
plateaued functions. In this framework, we construct strongly regular graphs
with three types of parameters from weakly regular plateaued functions with
some homogeneous conditions. We also construct a family of association schemes
of class p from weakly regular p-ary plateaued functions.

more |
pdf
| html
None.

mathITbot:
Sihem Mesnager, Ahmet Sınak : Strongly regular graphs from weakly regular plateaued functions https://t.co/UjYqjIA110

MathPaper:
Strongly regular graphs from weakly regular plateaued functions. https://t.co/7DDuynFhVO

None.

None.

Sample Sizes : None.

Authors: 2

Total Words: 4199

Unqiue Words: 947

Millimeter-wave (mmWave) communication is considered as an indispensable
technique for the next-generation backhaul/fronthaul network thanks to its
large transmission bandwidth. Especially for heterogeneous network (HetNet),
the mmWave full-dimension (FD)-MIMO is exploited to establish the
backhaul/fronthaul link between phantom-cell base stations (BSs) and macro-cell
BSs, where an efficient precoding is prerequisite. Against this background,
this paper proposes a principle component analysis (PCA)-based hybrid precoding
for wideband mmWave MIMO backhaul/fronthaul channels. We first propose an
optimal hybrid precoder by exploiting principal component analysis (PCA),
whereby the optimal high dimensional frequency-selective precoder are projected
to the low-dimensional frequency-flat precoder. Moreover, the combiner is
designed by leveraging the weighted PCA, where the covariance of received
signal is taken into account as weight to the optimal minimum mean square error
(MMSE) fully-digital combiner for further improved performance....

more |
pdf
| html
mathITbot:
Yiwei Sun, Zhen Gao, Hua Wang, Di Wu : Wideband Hybrid Precoding for Next-Generation Backhaul/Fronthaul Based on mmWave FD-MIMO https://t.co/7EIzzsLYlh

MathPaper:
Wideband Hybrid Precoding for Next-Generation Backhaul/Fronthaul Based on mmWave FD-MIMO. https://t.co/9jAzIPVRyf

None.

None.

Sample Sizes : None.

Authors: 4

Total Words: 5328

Unqiue Words: 1553

We study age of information in a multiple source-multiple destination setting
with a focus on its scaling in large wireless networks. There are $n$ nodes
that are randomly paired with each other on a fixed area to form $n$
source-destination (S-D) pairs. We propose a three-phase transmission scheme
which utilizes local cooperation between the nodes by forming what we call mega
update packets to serve multiple S-D pairs at once. We show that under the
proposed scheme average age of an S-D pair scales as $O(n^{\frac{1}{4}})$ as
the number of users, $n$, in the network grows. To the best of our knowledge,
this is the best age scaling result for a multiple source-multiple destination
setting.

more |
pdf
| html
None.

mathITbot:
Baturalp Buyukates, Alkan Soysal, Sennur Ulukus : Age of Information Scaling in Large Networks https://t.co/sGRpbjQnJ3 https://t.co/UbK5YunX6u

ComputerPapers:
Age of Information Scaling in Large Networks. https://t.co/MALaZdMeLn

None.

None.

Sample Sizes : None.

Authors: 3

Total Words: 5912

Unqiue Words: 1442

Assert is a website where the best academic papers on arXiv (computer science, math, physics), bioRxiv (biology), BITSS (reproducibility), EarthArXiv (earth science), engrXiv (engineering), LawArXiv (law), PsyArXiv (psychology), SocArXiv (social science), and SportRxiv (sport research) bubble to the top each day.

Papers are scored (in real-time) based on how verifiable they are (as determined by their Github repos) and how interesting they are (based on Twitter).

To see top papers, follow us on twitter @assertpub_ (arXiv), @assert_pub (bioRxiv), and @assertpub_dev (everything else).

To see beautiful figures extracted from papers, follow us on Instagram.

*Tracking 72,995 papers.*

Sort results based on if they are interesting or reproducible.

Interesting

Reproducible