{"title":"The compound secrecy capacity of a class of non-degraded MIMO Gaussian channels","authors":"R. Schaefer, S. Loyka","doi":"10.1109/ALLERTON.2014.7028564","DOIUrl":"https://doi.org/10.1109/ALLERTON.2014.7028564","url":null,"abstract":"Secrecy capacity of a class of non-degraded compound MIMO Gaussian channels is obtained. Earlier results established for isotropic uncertainty sets are extended to broader class of (non-isotropic) sets, which bound not only the gain but also the eigendirections of the eavesdropper channel. When a maximum element exists in the uncertainty set, a saddle-point exists so that the compound and worst-case channel capacities coincide and signaling on the worst-case channel also works for the whole class of channels. The case of additive uncertainty in the legitimate channel, in addition to the unknown eavesdropper channel of a bounded spectral norm, is also studied. Its compound secrecy capacity and the optimal signaling are established in a closed-form, revealing the saddle-point property. The optimal signaling is Gaussian and on the eigenvectors of the legitimate channel and the worst-case eavesdropper is isotropic. The eigenmode power allocation somewhat resembles the standard water-filling but is not identical to it.","PeriodicalId":330880,"journal":{"name":"2014 52nd Annual Allerton Conference on Communication, Control, and Computing (Allerton)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129705231","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Low delay random linear coding over a stream","authors":"M. Karzand, D. Leith","doi":"10.1109/ALLERTON.2014.7028499","DOIUrl":"https://doi.org/10.1109/ALLERTON.2014.7028499","url":null,"abstract":"We introduce a random linear code construction for erasure packet channel. We then analyze its in-order delivery delay behavior. We show that for rates below the capacity, the mean in-order-delivery delay of our scheme is better than the mean delay introduced by the scheme which implements the random linear block coding. We also compute the decoding failure probability and encoding and decoding complexity of our scheme.","PeriodicalId":330880,"journal":{"name":"2014 52nd Annual Allerton Conference on Communication, Control, and Computing (Allerton)","volume":"519 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134213276","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
P. Vyavahare, Majid Mahzoon, P. Grover, N. Limaye, D. Manjunath
{"title":"Information friction limits on computation","authors":"P. Vyavahare, Majid Mahzoon, P. Grover, N. Limaye, D. Manjunath","doi":"10.1109/ALLERTON.2014.7028441","DOIUrl":"https://doi.org/10.1109/ALLERTON.2014.7028441","url":null,"abstract":"The recently proposed “Information friction” model accounts for energy losses incurred in moving bits on a computational substrate and was first studied in the context of encoding and decoding computations for communication. Information friction loss is modeled as being proportional to bit-meters, the sum of the lengths over which the bits are transported during the computation. Its analysis provides us with an understanding of the fundamental energy requirements for computation. In this paper, we obtain lower bounds on information friction for several canonical computations that have been analyzed to obtain “AT2” bounds in the context of what is called “VLSI complexity” and, more recently, in deriving computation throughput in the context of wireless sensor networks.","PeriodicalId":330880,"journal":{"name":"2014 52nd Annual Allerton Conference on Communication, Control, and Computing (Allerton)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134430771","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On the relationship between queues and multipliers","authors":"Víctor Valls, D. Leith","doi":"10.1109/ALLERTON.2014.7028463","DOIUrl":"https://doi.org/10.1109/ALLERTON.2014.7028463","url":null,"abstract":"We show that the occupancy of appropriate queues can be used as a surrogate for Lagrange multipliers in convex optimisation. Our analysis uses only elementary methods, and is not asymptotic in nature. One immediate consequence is that in network problems the scaled link queue occupancy can be used as multipliers when calculating the dual function. Conversely, the connection with multipliers casts light on the link queue behaviour under optimal decision-making (not just max-weight scheduling). Namely, on links corresponding to active constraints the queue occupancy necessarily grows as step size α is reduced. Importantly, our analysis encompasses nonlinear constraints, and so generalises analysis beyond conventional queueing networks.","PeriodicalId":330880,"journal":{"name":"2014 52nd Annual Allerton Conference on Communication, Control, and Computing (Allerton)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131570357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Study of the brain functional network using synthetic data","authors":"S. Sojoudi, J. Doyle","doi":"10.1109/ALLERTON.2014.7028476","DOIUrl":"https://doi.org/10.1109/ALLERTON.2014.7028476","url":null,"abstract":"The brain functional connectivity is usually assessed with the correlation coefficients of certain signals. The partial correlation matrix can reveal direct interactions between brain regions. However, computing this matrix is usually challenging due to the availability of only a limited number of samples. As an alternative, thresholding the sample correlation matrix is a common technique for the identification of the direct interactions. In this work, we investigate the performance of this method in addition to some other well-known techniques, namely graphical lasso and Chow-Liu algorithm. Our analysis is performed on some synthetic data produced by an electrical circuit model with certain structural properties. We show that the simple method of thresholding the correlation matrix and the graphical lasso algorithm would both create false positives and negatives that wrongly imply some network properties such as small-worldness. We also apply these techniques to some resting-state functional MRI (fMRI) data and show that similar observations can be made.","PeriodicalId":330880,"journal":{"name":"2014 52nd Annual Allerton Conference on Communication, Control, and Computing (Allerton)","volume":"161 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114652587","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Computing with 10,000-bit words","authors":"P. Kanerva","doi":"10.1109/ALLERTON.2014.7028470","DOIUrl":"https://doi.org/10.1109/ALLERTON.2014.7028470","url":null,"abstract":"Today's computers compute with numbers and memory pointers that hardly ever exceed 64 bits. With nan-otechnology we will soon be able to build computers with 10,000-bit words. How would such a computer work and what would it be good for? The paper describes a 10,000bit architecture that resembles von Neumann's. It has a random-access memory (RAM) for 10,000-bit words, and an arithmetic-logic unit (ALU) for “adding” and “multiplying” 10,000-bit words, in abstract algebra sense. Sets, sequences, lists, and other data structures are encoded “holographically” from their elements using addition and multiplication, and they end up as vectors of the same 10,000-dimensional space, which makes recursive composition possible. The theory of computing with high-dimensional vectors (e.g. with 10,000-bit words) has grown out of attempts to understand the brain's powers of perception and learning in computing terms and is based on the geometry and algebra of high-dimensional spaces, dynamical systems, and the statistical law of large numbers. The architecture is suited for statistical learning from data and is used in cognitive modeling and natural-language processing where it is referred to by names such as Holographic Reduce Representation, Vector Symbolic Architecture, Random Indexing, Semantic Indexing, Semantic Pointer Architecture, and Hyperdimensional Computing.","PeriodicalId":330880,"journal":{"name":"2014 52nd Annual Allerton Conference on Communication, Control, and Computing (Allerton)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130011708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Asymmetric Compute-and-Forward: Going beyond one hop","authors":"Yihua Tan, Xiaojun Yuan, S. Liew, A. Kavcic","doi":"10.1109/ALLERTON.2014.7028519","DOIUrl":"https://doi.org/10.1109/ALLERTON.2014.7028519","url":null,"abstract":"We consider a two-hop relay model in which multiple sources communicate with a single destination via multiple distributed relays. We propose an asymmetric Compute-and-Forward (CoF) scheme that allows lattice coding with different coarse and fine lattices at the sources. The proposed scheme is motivated by the observation that, in an asymmetric CoF system, a higher transmission power at a source does not necessarily translate to a higher achievable information rate. We show that significant performance enhancement can be achieved by optimizing the transmission powers of the sources below their respective budgets. Further, the asymmetric construction of lattice coding allows the relays to conduct different modulo operations to reduce their forwarding rates, thereby supporting higher rates at the sources. However, modulo operations in general incur information loss, and so need to be carefully designed to ensure that the destination can successfully recover the source messages. As such, we propose a novel successive recovering algorithm for decoding at the destination, and establish sufficient conditions to guarantee successful recovery. Numerical results are provided to verify the superiority of our proposed scheme over other schemes.","PeriodicalId":330880,"journal":{"name":"2014 52nd Annual Allerton Conference on Communication, Control, and Computing (Allerton)","volume":"38 7","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132444410","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Distributed testing against independence with multiple terminals","authors":"Wenwen Zhao, L. Lai","doi":"10.1109/ALLERTON.2014.7028598","DOIUrl":"https://doi.org/10.1109/ALLERTON.2014.7028598","url":null,"abstract":"Motivated by distributed learning with Big Data sets problems, we study a distributed testing against independence problem with multiple terminals. We connect the problem at hand to a source coding with multiple helpers problem, which is open in general. We fully characterize the rate region of the source coding with multiple helpers problem under a certain Markovian condition. Using this rate region characterization, we obtain a single-letter characterization of the optimal error exponent for the type 2 error probability under the type 1 error probability and communication rates constraints.","PeriodicalId":330880,"journal":{"name":"2014 52nd Annual Allerton Conference on Communication, Control, and Computing (Allerton)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128872638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Least favorable distributions to facilitate the design of detection systems with sensors at deterministic locations","authors":"Benedito J. B. Fonseca","doi":"10.1109/ALLERTON.2014.7028446","DOIUrl":"https://doi.org/10.1109/ALLERTON.2014.7028446","url":null,"abstract":"The design of a sensor detection system to detect an emitter at a random location is difficult because of two issues: the conditional dependence among sensors' measurements and the composite hypothesis caused by the lack of knowledge regarding the emitter location distribution. When sensor locations are also random, it was recently shown that it is possible to circumvent these issues by using a least favorable distribution for the emitter location; however, such results do not apply when sensors are at deterministic known locations. In this paper, it is shown that a least favorable distribution for the emitter location can also facilitate the design of sensor detection systems when sensors are at deterministic known locations. It is further shown that, in several cases of interest, the problem of finding a least favorable distribution for the emitter location is equivalent to the obnoxious facility location problem from the field of operations research; and it is shown how the techniques of this field can be used to find the least favorable distribution and facilitate the system design.","PeriodicalId":330880,"journal":{"name":"2014 52nd Annual Allerton Conference on Communication, Control, and Computing (Allerton)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125408684","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Direct load control for electricity market risk management via risk-limiting dynamic contracts","authors":"Insoon Yang, Duncan S. Callaway, C. Tomlin","doi":"10.1109/ALLERTON.2014.7028572","DOIUrl":"https://doi.org/10.1109/ALLERTON.2014.7028572","url":null,"abstract":"This paper proposes a new direct load control framework that provides financial risk management solutions for real-time electricity markets. In this program, a load-serving entity makes risk-limiting dynamic contracts with its customers to optimally manage its revenue and risk. This risk is generated by both price volatility and demand uncertainty regarding distributed renewable generation as negative load. The key feature of our contract method is its risk-limiting capability: the amount of risk transferred to each customer is less than or equal to a pre-specified threshold. This is achieved by formulating the contract design problem as mean-variance constrained risk-sensitive control. We develop a dynamic programming-based solution approach. We demonstrate the performance of the proposed contracts by using locational marginal price (LMP) data from the Electricity Reliability Council of Texas and data on the electric energy consumption of customers in Austin, Texas. The numerical experiments suggest that the proposed direct load control program efficiently manages the load-serving entity's and its customers' risks even when the load-serving entity passes the wholesale electricity price to the customers.","PeriodicalId":330880,"journal":{"name":"2014 52nd Annual Allerton Conference on Communication, Control, and Computing (Allerton)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125688395","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}