Top 10 Arxiv Papers Today in Information Theory


2.004 Mikeys
#1. Artificial Intelligence-Enabled Cellular Networks: A Critical Path to Beyond-5G and 6G
Rubayet Shafin, Lingjia Liu, Vikram Chandrasekhar, Hao Chen, Jeffrey Reed, Jianzhong, Zhang
Mobile Network Operators (MNOs) are in process of overlaying their conventional macro cellular networks with shorter range cells such as outdoor pico cells. The resultant increase in network complexity creates substantial overhead in terms of operating expenses, time, and labor for their planning and management. Artificial intelligence (AI) offers the potential for MNOs to operate their networks in a more organic and cost-efficient manner. We argue that deploying AI in 5G and Beyond will require surmounting significant technical barriers in terms of robustness, performance, and complexity. We outline future research directions, identify top 5 challenges, and present a possible roadmap to realize the vision of AI-enabled cellular networks for Beyond-5G and 6G.
more | pdf | html
Figures
None.
Tweets
mathITbot: Rubayet Shafin, Lingjia Liu, Vikram Chandrasekhar, Hao Chen, Jeffrey Reed, Jianzhong (Charlie) Zhang : Artificial Intelligence-Enabled Cellular Networks: A Critical Path to Beyond-5G and 6G https://t.co/uVUa345afA https://t.co/FgRdvbsrEQ
Github
None.
Youtube
None.
Other stats
Sample Sizes : None.
Authors: 7
Total Words: 0
Unqiue Words: 0

2.004 Mikeys
#2. Towards $k$-connectivity in Heterogeneous Sensor Networks under Pairwise Key Predistribution
Mansi Sood, Osman Yağan
We study the secure and reliable connectivity of wireless sensor networks under the heterogeneous pairwise key predistribution scheme. This scheme was recently introduced as an extension of the random pairwise key predistribution scheme of Chan et al. to accommodate networks where the constituent sensors have different capabilities or requirements for security and connectivity. For simplicity, we consider a heterogeneous network where each of the $n$ sensors is classified as type-1 (respectively, type-2) with probability $\mu$ (respectively, $1-\mu)$ where $0<\mu<1$. Each type-1 (respectively, type-2) node selects 1 (respectively, $K_n$) other nodes uniformly at random to be paired with; according to the pairwise scheme each pair is then assigned a unique pairwise key so that they can securely communicate with each other. We establish critical conditions on $n, \mu$, and $K_n$ such that the resulting network has minimum node degree of at least $k$ with high probability in the limit of large network size. Our result constitutes a...
more | pdf | html
Figures
None.
Tweets
mathITbot: Mansi Sood, Osman Yağan : Towards $k$-connectivity in Heterogeneous Sensor Networks under Pairwise Key Predistribution https://t.co/2P3ZdWIDbA https://t.co/7b0WmzUsjY
Github
None.
Youtube
None.
Other stats
Sample Sizes : None.
Authors: 2
Total Words: 0
Unqiue Words: 0

2.004 Mikeys
#3. Preserving ON-OFF Privacy for Past and Future Requests
Fangwei Ye, Carolina Naim, Salim El Rouayheb
We study the ON-OFF privacy problem. At each time, the user is interested in the latest message of one of $N$ sources. Moreover, the user is assumed to be incentivized to turn privacy ON or OFF whether he/she needs it or not. When privacy is ON, the user wants to keep private which source he/she is interested in. The challenge here is that the user's behavior is correlated over time. Therefore, the user cannot simply ignore privacy when privacy is OFF, because this may leak information about his/her behavior when privacy was ON due to correlation. We model the user's requests by a Markov chain. The goal is to design ON-OFF privacy schemes with optimal download rate that ensure privacy for past and future requests. The user is assumed to know future requests within a window of positive size $\omega$ and uses it to construct privacy-preserving queries. In this paper, we construct ON-OFF privacy schemes for $N=2$ sources and prove their optimality.
more | pdf | html
Figures
None.
Tweets
mathITbot: Fangwei Ye, Carolina Naim, Salim El Rouayheb : Preserving ON-OFF Privacy for Past and Future Requests https://t.co/MoQYgPH891 https://t.co/EcxVltcZt8
Github
None.
Youtube
None.
Other stats
Sample Sizes : None.
Authors: 3
Total Words: 4692
Unqiue Words: 1168

2.004 Mikeys
#4. Random Convolutional Coding for Robust and Straggler Resilient Distributed Matrix Computation
Anindya B. Das, Aditya Ramamoorthy, Namrata Vaswani
Distributed matrix computations (matrix-vector and matrix-matrix multiplications) are at the heart of several tasks within the machine learning pipeline. However, distributed clusters are well-recognized to suffer from the problem of stragglers (slow or failed nodes). Prior work in this area has presented straggler mitigation strategies based on polynomial evaluation/interpolation. However, such approaches suffer from numerical problems (blow up of round-off errors) owing to the high condition numbers of the corresponding Vandermonde matrices. In this work, we introduce a novel solution approach that relies on embedding distributed matrix computations into the structure of a convolutional code. This simple innovation allows us to develop a provably numerically robust and efficient (fast) solution for distributed matrix-vector and matrix-matrix multiplication.
more | pdf | html
Figures
None.
Tweets
mathITbot: Anindya B. Das, Aditya Ramamoorthy, Namrata Vaswani : Random Convolutional Coding for Robust and Straggler Resilient Distributed Matrix Computation https://t.co/Hh4xU00y3k https://t.co/zODfHUPNQT
Github
None.
Youtube
None.
Other stats
Sample Sizes : None.
Authors: 3
Total Words: 9427
Unqiue Words: 2191

2.004 Mikeys
#5. Communication and Consensus Co-Design for Low-Latency and Reliable Industrial IoT Systems
Hyowoon Seo, Jihong Park, Mehdi Bennis, Wan Choi
Designing fast and reliable distributed consensus protocols is a key to enabling mission-critical and real-time controls of industrial Internet of Things (IIoT) nodes communicating over wireless links. However, chasing both low-latency and reliability of a consensus protocol at once is a challenging task. The problem is even aggravated under wireless connectivity that is slower and less reliable, compared to wired connections presumed in traditional consensus protocols. To tackle this issue, we investigate fundamental relationships between consensus latency and reliability under wireless connectivity, and thereby co-design communication and consensus protocols for low-latency and reliable IIoT systems. Specifically, we propose a novel communication-efficient distributed consensus protocol, termed Random Representative Consensus (R2C), and show its effectiveness under gossip and broadcast communication protocols. To this end, we derive closed-form end-to-end (E2E) latency expression of R2C that guarantees a target reliability, and...
more | pdf | html
Figures
None.
Tweets
mathITbot: Hyowoon Seo, Jihong Park, Mehdi Bennis, Wan Choi : Communication and Consensus Co-Design for Low-Latency and Reliable Industrial IoT Systems https://t.co/HArGvhGLs7 https://t.co/asMf0gz4w0
Github
None.
Youtube
None.
Other stats
Sample Sizes : None.
Authors: 4
Total Words: 0
Unqiue Words: 0

2.004 Mikeys
#6. Distributed Hypothesis Testing: Cooperation and Concurrent Detection
Pierre Escamilla, Michèle Wigger, Abdellatif Zaidi
A single-sensor two-detectors system is considered where the sensor communicates with both detectors and Detector 1 communicates with Detector 2, all over noise-free rate-limited links. The sensor and both detectors observe discrete memoryless source sequences whose joint probability mass function depends on a binary hypothesis. The goal at each detector is to guess the binary hypothesis in a way that, for increasing observation lengths, the probability of error under one of the hypotheses decays to zero with largest possible exponential decay, whereas the probability of error under the other hypothesis can decay to zero arbitrarily slow. For the setting with zero-rate communication on both links, we exactly characterize the set of possible exponents and the gain brought up by cooperation, in function of the number of bits that are sent over the two links. Notice that, for this setting, tradeoffs between the exponents achieved at the two detectors arise only in few particular cases. In all other cases, each detector achieves the...
more | pdf | html
Figures
None.
Tweets
mathITbot: Pierre Escamilla, Michèle Wigger, Abdellatif Zaidi : Distributed Hypothesis Testing: Cooperation and Concurrent Detection https://t.co/ELE9FQdnfO https://t.co/QSsZssPdAB
Github
None.
Youtube
None.
Other stats
Sample Sizes : None.
Authors: 3
Total Words: 0
Unqiue Words: 0

2.004 Mikeys
#7. Optimal Downlink-Uplink Scheduling of Wireless Networked Control for Industrial IoT
Kang Huang, Wanchun Liu, Yonghui Li, Branka Vucetic
This paper considers a wireless networked control system (WNCS) consisting of a dynamic system to be controlled (i.e., a plant), a sensor, an actuator and a remote controller for mission-critical Industrial Internet of Things (IIoT) applications. A WNCS has two types of wireless transmissions, i.e., the sensor's measurement transmission to the controller and the controller's command transmission to the actuator. In the literature of WNCSs, the controllers are commonly assumed to work in a full-duplex mode, i.e., can simultaneously receive the sensor's information and transmit its own command to the actuator. In this work, we consider a practical half-duplex controller, which introduces a novel transmission-scheduling problem for WNCSs. A frequent schedule of the sensor's transmission results in a better estimation of the plant states at the controller and thus a higher quality of the control command, but it leads to a less frequent/timely control of the plant. Therefore, considering the overall control performance of the plant,...
more | pdf | html
Figures
None.
Tweets
mathITbot: Kang Huang, Wanchun Liu, Yonghui Li, Branka Vucetic : Optimal Downlink-Uplink Scheduling of Wireless Networked Control for Industrial IoT https://t.co/rUHfWuPk6o https://t.co/w6IId5ZN35
Github
None.
Youtube
None.
Other stats
Sample Sizes : None.
Authors: 4
Total Words: 0
Unqiue Words: 0

2.004 Mikeys
#8. Prioritized Multi-stream Traffic in Uplink IoT Networks: Spatially Interacting Vacation Queues
Mustafa Emara, Hesham ElSawy, Gerhard Bauch
Massive Internet of Things (IoT) is foreseen to introduce plethora of applications for a fully connected world. Heterogeneous traffic is envisaged, where packets generated at each IoT device should be differentiated and served according to their priority. This paper develops a novel priority-aware spatiotemporal mathematical model to characterize massive IoT networks with uplink prioritized multistream traffic (PMT). Particularly, stochastic geometry is utilized to account for the macroscopic network wide mutual interference between the coexisting IoT devices. Discrete time Markov chains (DTMCs) are employed to track the microscopic evolution of packets within each priority stream at each device. To alleviate the curse of dimensionality, we decompose the prioritized queueing model at each device to a single-queue system with server vacation. To this end, the IoT network with PMT is modeled as spatially interacting vacation queues. Interactions between queues, in terms of the packet departure probabilities, occur due to mutual...
more | pdf | html
Figures
None.
Tweets
mathITbot: Mustafa Emara, Hesham ElSawy, Gerhard Bauch : Prioritized Multi-stream Traffic in Uplink IoT Networks: Spatially Interacting Vacation Queues https://t.co/p7aAqUXcer https://t.co/C8JOoX8N4g
Github
None.
Youtube
None.
Other stats
Sample Sizes : None.
Authors: 3
Total Words: 0
Unqiue Words: 0

2.004 Mikeys
#9. Graph-Based Encoders and their Performance for Finite-State Channels with Feedback
Oron Sabag, Bashar Huleihel, Haim Permuter
The capacity of unifilar finite-state channels in the presence of feedback is investigated. We derive a new evaluation method to extract graph-based encoders with their achievable rates, and to compute upper bounds to examine their performance. The evaluation method is built upon a recent methodology to derive simple bounds on the capacity using auxiliary directed graphs. While it is not clear whether the upper bound is convex, we manage to formulate it as a convex optimization problem using transformation of the argument with proper constraints. The lower bound is formulated as a non-convex optimization problem, yet, any feasible point to the optimization problem induces a graph-based encoders. In all examples, the numerical results show near-tight upper and lower bounds that can be easily converted to analytic results. For the non-symmetric Trapdoor channel and binary fading channels (BFCs), new capacity results are eastablished by computing the corresponding bounds. For all other instances, including the Ising channel, the...
more | pdf | html
Figures
None.
Tweets
mathITbot: Oron Sabag, Bashar Huleihel, Haim Permuter : Graph-Based Encoders and their Performance for Finite-State Channels with Feedback https://t.co/fQW33EsYHU https://t.co/MEY8EVfFN6
Github
None.
Youtube
None.
Other stats
Sample Sizes : None.
Authors: 3
Total Words: 0
Unqiue Words: 0

2.001 Mikeys
#10. Optimal Energy Allocation and Task Offloading Policy for Wireless Powered Mobile Edge Computing Systems
Feng Wang, Jie Xu, Shuguang Cui
This paper studies a wireless powered mobile edge computing (MEC) system with fluctuating channels and dynamic task arrivals over time. We jointly optimize the transmission energy allocation at the energy transmitter (ET) for WPT and the task allocation at the user for local computing and offloading over a particular finite horizon, with the objective of minimizing the total transmission energy consumption at the ET while ensuring the user's successful task execution. First, in order to characterize the fundamental performance limit, we consider the offline optimization by assuming that the perfect knowledge of channel state information and task state information (i.e., task arrival timing and amounts) is known a-priori. In this case, we obtain the well-structured optimal solution in a closed form to the energy minimization problem via convex optimization techniques. Next, inspired by the structured offline solutions obtained above, we develop heuristic online designs for the joint energy and task allocation when the knowledge of...
more | pdf | html
Figures
Tweets
mathITbot: Feng Wang, Jie Xu, Shuguang Cui : Optimal Energy Allocation and Task Offloading Policy for Wireless Powered Mobile Edge Computing Systems https://t.co/WTjDaXmUbQ https://t.co/uWFNcqUz8i
Github
None.
Youtube
None.
Other stats
Sample Sizes : None.
Authors: 3
Total Words: 13080
Unqiue Words: 2139

About

Assert is a website where the best academic papers on arXiv (computer science, math, physics), bioRxiv (biology), BITSS (reproducibility), EarthArXiv (earth science), engrXiv (engineering), LawArXiv (law), PsyArXiv (psychology), SocArXiv (social science), and SportRxiv (sport research) bubble to the top each day.

Papers are scored (in real-time) based on how verifiable they are (as determined by their Github repos) and how interesting they are (based on Twitter).

To see top papers, follow us on twitter @assertpub_ (arXiv), @assert_pub (bioRxiv), and @assertpub_dev (everything else).

To see beautiful figures extracted from papers, follow us on Instagram.

Tracking 160,428 papers.

Search
Sort results based on if they are interesting or reproducible.
Interesting
Reproducible
Categories
All
Astrophysics
Cosmology and Nongalactic Astrophysics
Earth and Planetary Astrophysics
Astrophysics of Galaxies
High Energy Astrophysical Phenomena
Instrumentation and Methods for Astrophysics
Solar and Stellar Astrophysics
Condensed Matter
Disordered Systems and Neural Networks
Mesoscale and Nanoscale Physics
Materials Science
Other Condensed Matter
Quantum Gases
Soft Condensed Matter
Statistical Mechanics
Strongly Correlated Electrons
Superconductivity
Computer Science
Artificial Intelligence
Hardware Architecture
Computational Complexity
Computational Engineering, Finance, and Science
Computational Geometry
Computation and Language
Cryptography and Security
Computer Vision and Pattern Recognition
Computers and Society
Databases
Distributed, Parallel, and Cluster Computing
Digital Libraries
Discrete Mathematics
Data Structures and Algorithms
Emerging Technologies
Formal Languages and Automata Theory
General Literature
Graphics
Computer Science and Game Theory
Human-Computer Interaction
Information Retrieval
Information Theory
Machine Learning
Logic in Computer Science
Multiagent Systems
Multimedia
Mathematical Software
Numerical Analysis
Neural and Evolutionary Computing
Networking and Internet Architecture
Other Computer Science
Operating Systems
Performance
Programming Languages
Robotics
Symbolic Computation
Sound
Software Engineering
Social and Information Networks
Systems and Control
Economics
Econometrics
General Economics
Theoretical Economics
Electrical Engineering and Systems Science
Audio and Speech Processing
Image and Video Processing
Signal Processing
General Relativity and Quantum Cosmology
General Relativity and Quantum Cosmology
High Energy Physics - Experiment
High Energy Physics - Experiment
High Energy Physics - Lattice
High Energy Physics - Lattice
High Energy Physics - Phenomenology
High Energy Physics - Phenomenology
High Energy Physics - Theory
High Energy Physics - Theory
Mathematics
Commutative Algebra
Algebraic Geometry
Analysis of PDEs
Algebraic Topology
Classical Analysis and ODEs
Combinatorics
Category Theory
Complex Variables
Differential Geometry
Dynamical Systems
Functional Analysis
General Mathematics
General Topology
Group Theory
Geometric Topology
History and Overview
Information Theory
K-Theory and Homology
Logic
Metric Geometry
Mathematical Physics
Numerical Analysis
Number Theory
Operator Algebras
Optimization and Control
Probability
Quantum Algebra
Rings and Algebras
Representation Theory
Symplectic Geometry
Spectral Theory
Statistics Theory
Mathematical Physics
Mathematical Physics
Nonlinear Sciences
Adaptation and Self-Organizing Systems
Chaotic Dynamics
Cellular Automata and Lattice Gases
Pattern Formation and Solitons
Exactly Solvable and Integrable Systems
Nuclear Experiment
Nuclear Experiment
Nuclear Theory
Nuclear Theory
Physics
Accelerator Physics
Atmospheric and Oceanic Physics
Applied Physics
Atomic and Molecular Clusters
Atomic Physics
Biological Physics
Chemical Physics
Classical Physics
Computational Physics
Data Analysis, Statistics and Probability
Physics Education
Fluid Dynamics
General Physics
Geophysics
History and Philosophy of Physics
Instrumentation and Detectors
Medical Physics
Optics
Plasma Physics
Popular Physics
Physics and Society
Space Physics
Quantitative Biology
Biomolecules
Cell Behavior
Genomics
Molecular Networks
Neurons and Cognition
Other Quantitative Biology
Populations and Evolution
Quantitative Methods
Subcellular Processes
Tissues and Organs
Quantitative Finance
Computational Finance
Economics
General Finance
Mathematical Finance
Portfolio Management
Pricing of Securities
Risk Management
Statistical Finance
Trading and Market Microstructure
Quantum Physics
Quantum Physics
Statistics
Applications
Computation
Methodology
Machine Learning
Other Statistics
Statistics Theory
Feedback
Online
Stats
Tracking 160,428 papers.