{"title":"Online Timely Status Updates with Erasures for Energy Harvesting Sensors","authors":"A. Arafa, Jing Yang, S. Ulukus, H. Poor","doi":"10.1109/ALLERTON.2018.8636088","DOIUrl":"https://doi.org/10.1109/ALLERTON.2018.8636088","url":null,"abstract":"An energy harvesting sensor that is sending status updates to a destination through an erasure channel is considered, in which transmissions are prone to being erased with some probability $q$, independently from other transmissions. The sensor, however, is unaware of erasure events due to lack of feedback from the destination. Energy expenditure is normalized in the sense that one transmission consumes one unit of energy. The sensor is equipped with a unit-sized battery to save its incoming energy, which arrives according to a Poisson process of unit rate. The setting is online, in which energy arrival times are only revealed causally after being harvested, and the goal is to design transmission times such that the long term average age of information $(AoI)$, defined as the time elapsed since the latest update has reached the destination successfully, is minimized. The optimal status update policy is first shown to have a renewal structure, in which the time instants at which the destination receives an update successfully constitute a renewal process. Then, for $ qleq frac {1}{2}$, the optimal renewal policy is shown to have a threshold structure, in which a new status update is transmitted only if the AoI grows above a certain threshold, that is shown to be a decreasing function of $q$. While for $q gt frac {1}{2}$, the optimal renewal policy is shown to be greedy, in which a new status update is transmitted whenever energy is available.","PeriodicalId":299280,"journal":{"name":"2018 56th Annual Allerton Conference on Communication, Control, and Computing (Allerton)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114556087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Allison Beemer, Ryan Coatney, V. Guruswami, Hiram H. López, Fernando L. Piñero
{"title":"Explicit optimal-length locally repairable codes of distance 5","authors":"Allison Beemer, Ryan Coatney, V. Guruswami, Hiram H. López, Fernando L. Piñero","doi":"10.1109/ALLERTON.2018.8636018","DOIUrl":"https://doi.org/10.1109/ALLERTON.2018.8636018","url":null,"abstract":"Locally repairable codes (LRCs) have received significant recent attention as a method of designing data storage systems robust to server failure. Optimal LRCs oer the ideal trade-o between minimum distance and locality, a measure of the cost of repairing a single codeword symbol. For optimal LRCs with minimum distance greater than or equal to 5, block length is bounded by a polynomial function of alphabet size. In this paper, we give explicit constructions of optimal-length (in terms of alphabet size), optimal LRCs with minimum distance equal to 5.","PeriodicalId":299280,"journal":{"name":"2018 56th Annual Allerton Conference on Communication, Control, and Computing (Allerton)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116047658","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Opportunistic Temporal Fair Scheduling for Non-Orthogonal Multiple Access","authors":"Shahram Shahsavari, Farhad Shirani, E. Erkip","doi":"10.1109/ALLERTON.2018.8636027","DOIUrl":"https://doi.org/10.1109/ALLERTON.2018.8636027","url":null,"abstract":"Non-orthogonal multiple access (NOMA) is one of the key enabling techniques for the next generation of mobile networks. Opportunistic scheduling is necessary to fully exploit the multiplexing gains in NOMA systems. In this paper, scheduling for NOMA systems under temporal fairness constraints is considered. The objective is to maximize the system utility (e.g. throughput) subject to constraints on the average active time for each user. It is shown that threshold based scheduling strategies (TBS) achieve optimal performance in terms of system utility. Furthermore, it is shown that any optimal strategy is equivalent to a TBS. An iterative algorithm based on the Robbins-Monro method is introduced which constructs the optimal TBS by finding optimal thresholds for a given system utility metric. Numerical simulations are provided to evaluate the proposed approach.","PeriodicalId":299280,"journal":{"name":"2018 56th Annual Allerton Conference on Communication, Control, and Computing (Allerton)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114802944","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Statistical Planning: Building Models of Entropy of Centralized Planning for Multi-Agent Systems","authors":"Éric Jacopin","doi":"10.1109/ALLERTON.2018.8635833","DOIUrl":"https://doi.org/10.1109/ALLERTON.2018.8635833","url":null,"abstract":"We present a statistical framework to build a family of models of the information entropy of the planning activity which is used to control the behaviors of agents in multi-agent systems such as commercial video-games. We discuss the (practical) hypotheses which are necessary to build this (theoretical) framework and present the probability distributions of the plans among the agents. We confront our entropy models with measures of the planning entropy in five commercial first-person shooters: our theoretical models either frame or else fit the experimental measures.","PeriodicalId":299280,"journal":{"name":"2018 56th Annual Allerton Conference on Communication, Control, and Computing (Allerton)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126614596","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Farzin Haddadpour, Yaoqing Yang, V. Cadambe, P. Grover
{"title":"Cross-Iteration Coded Computing","authors":"Farzin Haddadpour, Yaoqing Yang, V. Cadambe, P. Grover","doi":"10.1109/ALLERTON.2018.8635933","DOIUrl":"https://doi.org/10.1109/ALLERTON.2018.8635933","url":null,"abstract":"We introduce the idea of cross-iteration coded computing, an approach to reducing communication costs for a large class of distributed iterative algorithms involving linear operations, including gradient descent and accelerated gradient descent for quadratic loss functions. The state-of-the-art approach for these iterative algorithms involves performing one iteration of the algorithm per round of communication among the nodes. In contrast, our approach performs multiple iterations of the underlying algorithm in a single round of communication by incorporating some redundancy storage and computation. Our algorithm works in the master-worker setting with the workers storing carefully constructed linear transformations of input matrices and using these matrices in an iterative algorithm, with the master node inverting the effect of these linear transformations. In addition to reduced communication costs, a trivial generalization of our algorithm also includes resilience to stragglers and failures. The degree of redundancy of our algorithm can be tuned based on the amount of communication and straggler resilience required. Finally, we also describe a variant of our algorithm that can flexibly recover the results based on the degree of straggling in the worker nodes. The variant allows for the performance to degrade gracefully as the number of successful (non-straggling) workers is lowered.","PeriodicalId":299280,"journal":{"name":"2018 56th Annual Allerton Conference on Communication, Control, and Computing (Allerton)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121815057","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Geometric Block Model and Applications","authors":"Sainyam Galhotra, S. Pal, A. Mazumdar, B. Saha","doi":"10.1109/ALLERTON.2018.8635938","DOIUrl":"https://doi.org/10.1109/ALLERTON.2018.8635938","url":null,"abstract":"This is a note accompanying an invited talk at the Allerton conference where we summarize our results related to geometric block model (GBM), a random graph model for communities in networks that is based on geometric graphs. The GBM is distinguished from many other community models because of correlated edge formation, which makes GBM less random in nature, but more complicated to analyze. On the algorithmic side, we describe a simple triangle-counting process that performs sequential edge removal from the graph to reveal the communities. The algorithm critically uses the connectivity properties of annulus graphs or vertex-random graphs.","PeriodicalId":299280,"journal":{"name":"2018 56th Annual Allerton Conference on Communication, Control, and Computing (Allerton)","volume":"331 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126304490","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Distributed Hypothesis Testing with Collaborative Detection","authors":"Pierre Escamilla, A. Zaidi, M. Wigger","doi":"10.1109/ALLERTON.2018.8635828","DOIUrl":"https://doi.org/10.1109/ALLERTON.2018.8635828","url":null,"abstract":"A detection system with a single sensor and two detectors is considered, where each of the terminals observes a memoryless source sequence, the sensor sends a message to both detectors and the first detector sends a message to the second detector. Communication of these messages is assumed to be error-free but rate-limited. The joint probability mass function (pmf) of the source sequences observed at the three terminals depends on an M-ary hypothesis $( mathrm{M}ge 2)$, and the goal of the communication is that each detector can guess the underlying hypothesis. Detector $k, k = 1,2$, aims to maximize the error exponent under hypothesis ${i}_{k}, i_{k}, in{ 1,ldots ,mathrm{M}}$, while ensuring a small probability of error under all other hypotheses. We study this problem in the case in which the detectors aim to maximize their error exponents under the same hypothesis (i.e., $i_{1},= quad i_{2})$ and in the case in which they aim to maximize their error exponents under distinct hypotheses (i.e., $i_{1}, 6 = quad i_{2})$. For the setting in which $i_{1},= quad i_{2}$, we present an achievable exponents region for the case of positive communication rates, and show that it is optimal for a specific case of testing against independence. We also characterize the optimal exponents region in the case of zero communication rates. For the setting in which $i_{1}, 6 = quad i_{2}$, we characterize the optimal exponents region in the case of zero communication rates.","PeriodicalId":299280,"journal":{"name":"2018 56th Annual Allerton Conference on Communication, Control, and Computing (Allerton)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128271165","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Age of Information with Soft Updates","authors":"Melih Bastopcu, S. Ulukus","doi":"10.1109/ALLERTON.2018.8635855","DOIUrl":"https://doi.org/10.1109/ALLERTON.2018.8635855","url":null,"abstract":"We consider an information updating system where an information provider and an information receiver engage in an update process over time. Different from the existing literature where updates are countable (hard) and take effect either immediately or after a delay, but instantaneously in both cases, here updates start taking effect right away but gradually over time. We coin this setting soft updates. When the updating process starts, the age decreases until the soft update period ends. We constrain the number of times the information provider and the information receiver meet (number of update periods) and the total duration of the update periods. We consider two models for the decrease of age during an update period: In the first model, the rate of decrease of the age is proportional to the current age, and in the second model, the rate of decrease of the age is constant. The first model results in an exponentially decaying age, and the second model results in a linearly decaying age. In both cases, we determine the optimum updating schemes, by determining the optimum start times and the optimum durations of the updates, subject to the constraints on the number of update periods (number of meetings) and the total update duration.","PeriodicalId":299280,"journal":{"name":"2018 56th Annual Allerton Conference on Communication, Control, and Computing (Allerton)","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124631077","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Balanced Allocation on Graphs with Random Walk Based Sampling","authors":"Dengwang Tang, V. Subramanian","doi":"10.1109/ALLERTON.2018.8635943","DOIUrl":"https://doi.org/10.1109/ALLERTON.2018.8635943","url":null,"abstract":"A well-known randomized algorithm to allocate n balls into n bins is the power-of-d choices policy: For each ball, d bins are sampled uniformly at random, and the ball is allocated to the least loaded bin. A classical result is that the maximum load under this policy is log log $n/log d+O(1)$ with high probability. Many subsequent works have considered alternative ways to sample d bins.This paper considers two new policies to allocate n balls into n bins. Assuming that the bins are associated with vertices of a k-regular graph, the d sampled bins are given by d nonbacktracking random walk processes defined on the graph, where the positions of the random walkers can be reset to independent random positions when certain events happens. We show that, under certain assumptions of the graph, both schemes can achieve the same performance as power-of-d choices, i.e., the maximum load is bounded by log log $n/log d+O(1)$ with high probability. Both policies can be considered as derandomized versions of power-of-d choices.","PeriodicalId":299280,"journal":{"name":"2018 56th Annual Allerton Conference on Communication, Control, and Computing (Allerton)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129516259","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Streaming Codes For Variable-Size Arrivals","authors":"Michael Rudow, K. V. Rashmi","doi":"10.1109/ALLERTON.2018.8635971","DOIUrl":"https://doi.org/10.1109/ALLERTON.2018.8635971","url":null,"abstract":"Streaming codes are a class of convolutional codes that encode a stream of source packets, which arrive sequentially with a strict decoding-delay constraint, for transmission over a packet-erasure channel. A number of recent works have proposed capacity achieving streaming code constructions for adversarial packet-erasure channels that include bursts and arbitrary erasures. The existing models for streaming codes, to the best of our knowledge, consider a setting where all the source packets are of the same, fixed size. However, live video streaming applications have source packets with highly variable sizes. Motivated by this application, in this paper, we present a generalized model for streaming codes that incorporates variable-size arrivals. The variability in the size of the source packets induces a new trade-off between the rate of the code and the minimum decoding delay when the channel introduces no erasures. We also present a simple construction of streaming codes for variable-size arrivals, which builds upon existing streaming code constructions designed for fixed-size arrivals. We theoretically characterize the rate achieved by the proposed code when arrival sizes are drawn independently from any distribution with a finite support. Furthermore, using a live video trace and several representative parameter settings, we show that proposed code construction achieves a rate of approximately 89.5% of an upper bound and achieves a significantly higher rate (10%-50%) than naively using the existing streaming codes designed for fixed-size arrivals.","PeriodicalId":299280,"journal":{"name":"2018 56th Annual Allerton Conference on Communication, Control, and Computing (Allerton)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129670604","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}