Edge computing applications typically require generated data to be
preprocessed at the source and then transmitted to an edge server. In such
cases, transmission time and preprocessing time are coupled, yielding a
tradeoff between them to achieve the targeted objective. This paper presents
analysis of such a system with the objective of optimizing freshness of
received data at the edge server. We model this system as two queues in tandem
whose service times are independent over time but the transmission service time
is monotonically dependent on the computation service time in mean value. This
dependence captures the natural decrease in transmission time due to lower
offloaded computation. We analyze various queue management schemes in this
tandem queue where the first queue has a single server, Poisson packet
arrivals, general independent service and no extra buffer to save incoming
status update packets. The second queue has a single server receiving packets
from the first queue and service is memoryless. We consider the second...

more |
pdf
| html
None.

mathITbot:
Peng Zou, Omur Ozel, Suresh Subramaniam : Optimizing Information Freshness Through Computation-Transmission Tradeoff and Queue Management in Edge Computing https://t.co/0jzwgvuc5J https://t.co/EQacqLW8no

None.

None.

Sample Sizes : None.

Authors: 3

Total Words: 0

Unqiue Words: 0

We characterize the rate achievable in a bidirectional quasi-static link
where several user equipments communicate with a massive multiple-input
multiple-output base station (BS). In the considered setup, the BS operates in
full-digital mode, the physical size of the antenna array is limited, and there
exists a rate constraint on the fronthaul interface connecting the (possibly
remote) radio head to the digital baseband processing unit. Our analysis
enables us to determine the optimal resolution of the analog-to-digital and
digital-to-analog converters as well as the optimal number of active antenna
elements to be used in order to maximize the transmission rate on the
bidirectional link, for a given constraint on the outage probability and on the
fronthaul rate. We investigate both the case in which perfect channel-state
information is available, and the case in which channel-state information is
acquired through pilot transmission, and is, hence, imperfect. For the second
case, we present a novel rate expression that relies on...

more |
pdf
| html
None.

mathITbot:
Y. Ettefagh, S. Jacobsson, A. Hu, G. Durisi, C. Studer : All-Digital Massive MIMO Uplink and Downlink Rates under a Fronthaul Constraint https://t.co/qkl0LudQbE https://t.co/1UHplkG0h1

None.

None.

Sample Sizes : None.

Authors: 5

Total Words: 0

Unqiue Words: 0

A channel with continuous phase modulation and 1-bit ADC with oversampling is
considered. Due to oversampling, higher-order modulations yield a higher
achievable rate and this work presents a method to approach this with
sophisticated coding. A tailored bit mapping is proposed where two bits can be
detected reliably at high SNR and only the third bit suffers from an error
floor. With this, a convolutional code is only applied to the third bit. Our
experiments with a turbo receiver show that the proposed method corresponds to
a lower BER in comparison to the case of conventional channel coding.

more |
pdf
| html
None.

mathITbot:
Rodrigo R. M. de Alencar, Lukas T. N. Landau, Rodrigo C. de Lamare : Continuous Phase Modulation With 1-Bit Quantization and Oversampling Using Iterative Detection and Decoding https://t.co/LetDg5zdu8 https://t.co/cwp7hpHXK8

None.

None.

Sample Sizes : None.

Authors: 3

Total Words: 0

Unqiue Words: 0

The connections between variable nodes and check nodes have a great influence
on the performance of low-density parity-check (LDPC) codes. Inspired by the
unique structure of polar code's generator matrix, we proposed a new method of
constructing LDPC codes that achieves a polarization effect. The new code,
named as polarized LDPC codes, is shown to achieve lower or no error floor in
the binary symmetric channel (BSC)

more |
pdf
| html
None.

mathITbot:
Binbin Gao, Huarui Yin, Zhengdao Wang : Polarized Low-Density Parity-Check Codes on the BSC https://t.co/YTK8eFktyc https://t.co/xEdw7X04Us

None.

None.

Sample Sizes : None.

Authors: 3

Total Words: 4374

Unqiue Words: 1341

Invoking large transmit antenna arrays, massive MIMO wiretap settings are
capable of suppressing passive eavesdroppers via narrow beamforming towards
legitimate terminals. This implies that secrecy is obtained almost for free in
these settings. We show that this property holds not only for fully digital
MIMO architectures, but also in massive MIMO settings whose transmitters employ
architectures with reduced complexity. The investigations consider two dominant
approaches for complexity reduction, namely antenna selection and hybrid
analog-digital precoding. We show that using either approach, the information
leakage normalized by the achievable sum-rate vanishes as the transmit array
size grows large. For both approaches, the decaying speed is determined. The
results demonstrate that, as the transmit array size grows large, the
normalized leakages obtained by antenna selection and hybrid analog-digital
precoding converge to zero double-logarithmically and logarithmically,
respectively. These analytic derivations are confirmed for...

more |
pdf
| html
None.

mathITbot:
Ali Bereyhi, Saba Asaad, Ralf R. Müller, Rafael F. Schaefer, Georg Fischer, H. Vincent Poor : Robustness of Low-Complexity Massive MIMO Architectures Against Passive Eavesdropping https://t.co/4bAu6ol9lD https://t.co/vDYIe0yqhY

None.

None.

Sample Sizes : None.

Authors: 6

Total Words: 0

Unqiue Words: 0

The prevalence of mobile devices and Location-Based Services (LBS)
necessitate the study of Location Privacy-Preserving Mechanisms (LPPM).
However, LPPMs reduce the utility of LBS due to the noise they add to users'
locations. Here, we consider the remapping technique, which presumes the
adversary has a perfect statistical model for the user location. We consider
this assumption and show that under practical assumptions on the adversary's
knowledge, the remapping technique leaks privacy not only about the true
location data, but also about the statistical model. Finally, we introduce a
novel solution called "Randomized Remapping" as a countermeasure.

more |
pdf
| html
None.

mathITbot:
Nazanin Takbiri, Virat Shejwalker, Amir Houmansadr, Dennis L. Goeckel, Hossein Pishro-Nik : Leveraging Prior Knowledge Asymmetries in the Design of Location Privacy-Preserving Mechanisms https://t.co/omk2P3YLgb https://t.co/gVYsdzVqNj

None.

None.

Sample Sizes : None.

Authors: 5

Total Words: 0

Unqiue Words: 0

In this paper, we consider a system where multiple low-power sensors
communicate timely information about a random process to a sink. The sensors
share orthogonal subchannels to transmit such information in the form of status
update packets. Freshness of the sensors' information at the sink is
characterized by the Age of Information (AoI), and the sensors can control the
sampling policy by deciding whether to take a sample or not. We formulate an
optimization problem to minimize the time average total transmit power of
sensors by jointly optimizing the sampling action of each sensor, the transmit
power allocation, and the subchannel assignment under the constraints on the
maximum time average AoI and maximum power of each sensor. To solve the
optimization problem, we use the Lyapunov drift-plus-penalty method. Numerical
results show the performance of the proposed algorithm versus the different
parameters of the system.

more |
pdf
| html
None.

mathITbot:
Mohammad Moltafet, Markus Leinonen, Marian Codreanu, Nikolaos Pappas : Power Minimization in Wireless Sensor Networks With Constrained AoI Using Stochastic Optimization https://t.co/eO9QVHDKMW https://t.co/cl0EgrzrrW

None.

None.

Sample Sizes : None.

Authors: 4

Total Words: 0

Unqiue Words: 0

In this paper, we study data-aided sensing (DAS) for a system consisting of a
base station (BS) and a number of nodes, where the BS becomes a receiver that
collects measurements or data sets from the nodes that are distributed over a
cell. DAS is an iterative data collection scheme that allows the BS to
efficiently estimate a target signal (i.e., all nodes' measurements) with a
small number of measurements (compared to random polling). In DAS, a set of
nodes are selected in each round based on the data sets that are already
available at the BS from previous rounds for efficient data collection. We
consider DAS for measurements that are correlated Gaussian in this paper. The
resulting DAS is referred to as Gaussian DAS. Using the mean squared error
(MSE) criterion, in each round, the BS is able to choose a node that has a data
set to minimize the MSE of the next round. Furthermore, we generalize Gaussian
DAS in two different ways: i) with multiple parallel channels to upload
measurements from nodes using random access; ii) with a...

more |
pdf
| html
None.

mathITbot:
Jinho Choi : Gaussian Data-aided Sensing with Multichannel Random Access and Model Selection https://t.co/P5zuLqf4eS https://t.co/6TC4cv3dbw

None.

None.

Sample Sizes : None.

Authors: 1

Total Words: 0

Unqiue Words: 0

A large majority of cellular networks deployed today make use of Frequency
Division Duplexing (FDD) where, in contrast with Time Division Duplexing (TDD),
the channel reciprocity does not hold and explicit downlink (DL) probing and
uplink (UL) feedback are needed in order to achieve spatial multiplexing gain.
To support massive MIMO, the overhead incurred by conventional DL probing and
UL feedback schemes scales linearly with the number of BS antennas and,
therefore, may be very large. In this paper, we present a new approach to
achieve a very competitive trade-off between spatial multiplexing gain and
probing-feedback overhead in such systems. Our approach is based on two novel
methods: (i) an efficient regularization technique based on Deep Neural
Networks (DNN) that learns the Angular Spread Function (ASF) of users channels
and permits to estimate the DL covariance matrix from the noisy i.i.d. channel
observations obtained freely via UL pilots (UL-DL covariance transformation),
(ii) a novel "sparsifying precoding" technique...

more |
pdf
| html
None.

mathITbot:
Mahdi Barzegar Khalilsarai, Yi Song, Tianyu Yang, Saeid Haghighatshoar, Giuseppe Caire : Uplink-Downlink Channel Covariance Transformations and Precoding Design for FDD Massive MIMO https://t.co/pDzCgTBLKE https://t.co/nOewMSy0Hd

None.

None.

Sample Sizes : None.

Authors: 5

Total Words: 0

Unqiue Words: 0

In this paper, we present infinite families of permutations of
$\mathbb{F}_{2^{2n}}$ with high nonlinearity and boomerang uniformity $4$ from
generalized butterfly structures.
Both open and closed butterfly structures are considered. It appears,
according to experiment results, that open butterflies do not produce
permutation with boomerang uniformity $4$.
For the closed butterflies, we propose the condition on coefficients $\alpha,
\beta \in \mathbb{F}_{2^n}$ such that the functions
$$V_i := (R_i(x,y), R_i(y,x))$$ with $R_i(x,y)=(x+\alpha y)^{2^i+1}+\beta
y^{2^i+1}$ are permutations of $\mathbb{F}_{2^n}^2$ with boomerang uniformity
$4$, where $n\geq 1$ is an odd integer and $\gcd(i, n)=1$.
The main result in this paper consists of two major parts: the permutation
property of $V_i$ is investigated in terms of the univariate form, and the
boomerang uniformity is examined in terms of the original bivariate form. In
addition, experiment results for $n=3, 5$ indicates that the proposed condition
seems to cover all coefficients...

more |
pdf
| html
None.

mathITbot:
Kangquan Li, Chunlei Li, Tor Helleseth, Longjiang Qu : Cryptographically Strong Permutations from the Butterfly Structure https://t.co/Fe4kRSC0vJ https://t.co/Wk8LR9zIX9

None.

None.

Sample Sizes : None.

Authors: 4

Total Words: 0

Unqiue Words: 0

Assert is a website where the best academic papers on arXiv (computer science, math, physics), bioRxiv (biology), BITSS (reproducibility), EarthArXiv (earth science), engrXiv (engineering), LawArXiv (law), PsyArXiv (psychology), SocArXiv (social science), and SportRxiv (sport research) bubble to the top each day.

Papers are scored (in real-time) based on how verifiable they are (as determined by their Github repos) and how interesting they are (based on Twitter).

To see top papers, follow us on twitter @assertpub_ (arXiv), @assert_pub (bioRxiv), and @assertpub_dev (everything else).

To see beautiful figures extracted from papers, follow us on Instagram.

*Tracking 234,442 papers.*

Sort results based on if they are interesting or reproducible.

Interesting

Reproducible