{"title":"Random channel coding and blind deconvolution","authors":"M. Salman Asif, W. Mantzel, J. Romberg","doi":"10.1109/ALLERTON.2009.5394881","DOIUrl":"https://doi.org/10.1109/ALLERTON.2009.5394881","url":null,"abstract":"Blind deconvolution arises naturally when dealing with finite multipath interference on a signal. In this paper we present a new method to protect the signals from the effects of sparse multipath channels — we modulate/encode the signal using random waveforms before transmission and estimate the channel and signal from the observations, without any prior knowledge of the channel other than that it is sparse. The problem can be articulated as follows. The original message x is encoded with an overdetermined m × n (m > n) matrix A whose entries are randomly chosen; the encoded message is given by Ax. The received signal is the convolution of the encoded message with h, the S-sparse impulse response of the channel. We explore three different schemes to recover the message x and the channel h simultaneously. The first scheme recasts the problem as a block l1 optimization program. The second scheme imposes a rank-1 structure on the estimated signal. The third scheme uses nuclear norm as a proxy for rank, to recover the x and h. The simulation results are presented to demonstrate the efficiency of the random coding and proposed recovery schemes.","PeriodicalId":440015,"journal":{"name":"2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130136341","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multiclass support vector machines for adaptation in MIMO-OFDM wireless systems","authors":"Sungho Yun, C. Caramanis","doi":"10.1109/ALLERTON.2009.5394863","DOIUrl":"https://doi.org/10.1109/ALLERTON.2009.5394863","url":null,"abstract":"In MIMO-OFDM systems, by matching transmitter parameters such as modulation order and coding rate, link adaptation can increase the throughput significantly. However, creating a tractable mathematical mapping model from environmental variables to transmitter parameters that allows the latter to be optimized in any sense, presents serious challenginges due to the large number of variables involved, as well as the complexity required in any model with the ability to accurately capture and explain all factors that affect performance. Machine learning algorithms, which make no mathematical assumptions and use only past observations to model the input-output relationship, have recently been explored for adaptation in MIMO-OFDM systems. In this paper we propose a novel machine learning algorithm based on multi-class support vector machines (SVMs). Our algorithm has considerably smaller operational overhead (including storage requirements) and better performance for link adaptation. With IEEE 802.11n simulations we show that our new algorithm outperforms existing machine-learning based algorithms. Moreover, we show that our algorithm is (asymptotically) consistent, in the sense that as the number of training data used increases, our algorithm obtains the performance-optimal classifier.","PeriodicalId":440015,"journal":{"name":"2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124467975","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance analysis of MAC protocols in wireless line networks using statistical mechanics","authors":"Ka-Hung Hui, Dongning Guo, R. Berry, M. Haenggi","doi":"10.1109/ALLERTON.2009.5394523","DOIUrl":"https://doi.org/10.1109/ALLERTON.2009.5394523","url":null,"abstract":"In this paper we consider the application of the Ising model from statistical mechanics to model interactions among interfering stations in a wireless network with a line topology. Each station employs a medium access control (MAC) protocol such that it decides to transmit or not depending on the states of its nearest neighbors and itself in the previous time slot. We use the Ising model to demonstrate how the interactions between neighboring stations affect the one-hop throughput of the network and to optimize the underlying MAC protocol. Both the cases of single-packet and multipacket reception are considered. For single-packet reception, the throughput achieved by an optimized protocol is shown to be 15.8% better than that achieved by slotted ALOHA. In the multipacket reception case, the MAC protocol achieves the same throughput as TDMA, which doubles the throughput of slotted ALOHA.","PeriodicalId":440015,"journal":{"name":"2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116105267","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Scheduling policies for single-hop networks with heavy-tailed traffic","authors":"Mihalis G. Markakis, E. Modiano, J. Tsitsiklis","doi":"10.1109/ALLERTON.2009.5394854","DOIUrl":"https://doi.org/10.1109/ALLERTON.2009.5394854","url":null,"abstract":"In the first part of the paper, we study the impact of scheduling, in a setting of parallel queues with a mix of heavy-tailed and light-tailed traffic. We analyze queue-length unaware scheduling policies, such as round-robin, randomized, and priority, and characterize their performance. We prove the queue-length instability of Max-Weight scheduling, in the presence of heavy-tailed traffic. Motivated by this, we analyze the performance of Max-Weight-α scheduling, and establish conditions on the α-parameters, under which the system is queue-length stable. We also introduce the Max-Weight-log policy, which provides performance guarantees, without any knowledge of the arriving traffic. In the second part of the paper, we extend the results on Max-Weight and Max-Weight-α scheduling to a single-hop network, with arbitrary topology and scheduling constraints.","PeriodicalId":440015,"journal":{"name":"2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton)","volume":"565 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127081253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Data aggregation in sensor networks: No more a slave to routing","authors":"R. Prakash, Ehsan Nourbakhsh, Kunal Sahu","doi":"10.1109/ALLERTON.2009.5394505","DOIUrl":"https://doi.org/10.1109/ALLERTON.2009.5394505","url":null,"abstract":"Application-specific data aggregation can play a significant role in energy-efficient operation of wireless sensor networks. Existing aggregation techniques rely heavily on the routing protocol to build shortest paths to route node measurements to the base station and are limited in the types of supported queries. We propose an aggregation scheme that utilizes the inherent information gradients present in the network. The query is directed to the source of information, resulting in better load sharing in the network. We support a variety of queries ranging from simple maximum, minimum or average of the readings of sensor nodes to more complex quantile queries such as k highest values or kth highest value through a generic query algorithm. The query algorithm shifts the computation to the querying agent, thus eliminating any in-network aggregation.","PeriodicalId":440015,"journal":{"name":"2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton)","volume":"2013 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127428105","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Controlling errors in the process of molecular self-assembly","authors":"Ya Meng, N. Kashyap","doi":"10.1109/ALLERTON.2009.5394927","DOIUrl":"https://doi.org/10.1109/ALLERTON.2009.5394927","url":null,"abstract":"The problem of controlling errors in the process of molecular self-assembly is of central importance in biomolecular computation. The stochastic nature of the self-assembly process leads to assembly errors, i.e., deviations from ideal growth of the assembly. Many different constructions of proofreading tile sets have been proposed in the literature to reduce the effect of such assembly errors. Another major error mechanism affecting the self-assembly process in practice is that of imperfections within the tiles themselves. This source of error has, surprisingly, received little prior attention. In this work, we consider a scenario in which some small proportion of the tiles in a tile set are “malformed”. We study, through simulations, the effect of such malformed tiles on the self-assembly process within the kinetic Tile Assembly Model (kTAM). The simulation results show that some tile set constructions show greater error-resilience in the presence of malformed tiles than others. But, most notably, the snaked proodreading tile set of Chen and Goel fails to form even moderately-sized tile assemblies when malformed tiles are present. We present modifications of the snaked proofreading construction that indicate that it is possible to design tile sets that are not just robust with respect to errors intrinsic to the self-assembly process, but also with respect to malformed tiles.","PeriodicalId":440015,"journal":{"name":"2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130841332","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Supermodular network games","authors":"V. Manshadi, Ramesh Johari","doi":"10.1109/ALLERTON.2009.5394514","DOIUrl":"https://doi.org/10.1109/ALLERTON.2009.5394514","url":null,"abstract":"We study supermodular games on graphs as a benchmark model of cooperation in networked systems. In our model, each agent's payoff is a function of the aggregate action of its neighbors and it exhibits strategic complementarity. We study the largest Nash equilibrium which, in turn, is the Pareto optimal equilibrium in the presence of positive externalities. We show that the action of a node in the largest NE depends on its centrality in the network. In particular, the action of nodes that are in the k-core of the graph is lower bounded by a threshold that is nondecreasing in k. The main insight of the result is that the degree of a node may not be the right indicator of the strength and influence of a node in the equilibrium. We also consider Bayesian supermodular games on networks, in which each node knows only its own degree. In this setting, we show that the largest symmetric Bayesian equilibrium is monotone in the edge perspective degree distribution.","PeriodicalId":440015,"journal":{"name":"2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton)","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134281856","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Compressed sensing approach for high throughput carrier screen","authors":"Yaniv Erlich, N. Shental, Amnon Amir, O. Zuk","doi":"10.1109/ALLERTON.2009.5394904","DOIUrl":"https://doi.org/10.1109/ALLERTON.2009.5394904","url":null,"abstract":"Carrier screens are widely used in medical genetics to prevent rare genetic disorders. Current detection methods are based on serial processing which is slow and expensive. Here, we discuss a highly efficient compressed sensing approach for ultra-high throughput carrier screens, and highlight both similarities and unique features of our setting compared to the standard compressed sensing framework. Using simulations, we demonstrate the power of compressed carrier screens in a real scenario — finding carriers for rare genetic diseases in Ashkenazi Jews, a population that has well established wide-scale carrier screen programs. We also compare the decoding performance of two typical reconstruction approaches in compressed sensing — GPSR and Belief Propagation. Our results show that Belief Propagation confers better decoding performance in the current application.","PeriodicalId":440015,"journal":{"name":"2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134405124","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On the large-deviations optimality of scheduling policies minimizing the drift of a Lyapunov function","authors":"Xiaojun Lin, V. Venkataramanan","doi":"10.1109/ALLERTON.2009.5394895","DOIUrl":"https://doi.org/10.1109/ALLERTON.2009.5394895","url":null,"abstract":"We show that for a large class of scheduling algorithms, when the algorithm minimizes the drift of a Lyapunov function, the algorithm is optimal in maximizing the asymptotic decay-rate of the probability that the Lyapunov function value exceeds a large threshold. The result in this paper extends our prior results to the important and practically-useful case when the Lyapunov function is not linear in scale, in which case the evolution of the fluid-sample-paths becomes more difficult to track. We use the notion of generalized fluid-sample-paths to address this difficulty, and provide easy-to-verify conditions for checking the large-deviations optimality of scheduling algorithms. As an immediate application of the result, we show that the log-rule is optimal in maximizing the asymptotic decay-rate of the probability that the sum queue exceeds a threshold B.","PeriodicalId":440015,"journal":{"name":"2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132845094","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"LDGM-based codes for successive refinement","authors":"Ying Zhang, S. Dumitrescu, Jun Chen, Zhibin Sun","doi":"10.1109/ALLERTON.2009.5394494","DOIUrl":"https://doi.org/10.1109/ALLERTON.2009.5394494","url":null,"abstract":"This work presents an LDGM-based coding scheme for successive refinement in the case of finite sources with Hamming distortion. Our simulations exhibit results very close to the rate-distortion bounds.","PeriodicalId":440015,"journal":{"name":"2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129283984","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}