首页 > 最新文献

2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton)最新文献

英文 中文
Recovering communities in weighted stochastic block models 加权随机块模型中的群落恢复
Pub Date : 2015-09-01 DOI: 10.1109/ALLERTON.2015.7447159
Varun Jog, Po-Ling Loh
We derive sharp thresholds for exact recovery of communities in a weighted stochastic block model, where observations are collected in the form of a weighted adjacency matrix, and the weight of each edge is generated independently from a distribution determined by the community membership of its endpoints. Our main result, characterizing the precise boundary between success and failure of maximum likelihood estimation when edge weights are drawn from discrete distributions, involves the Renyi divergence of order 1/2 between the distributions of within-community and between-community edges. When the Renyi divergence is above a certain threshold, meaning the edge distributions are sufficiently separated, maximum likelihood succeeds with probability tending to 1; when the Renyi divergence is below the threshold, maximum likelihood fails with probability bounded away from 0. In the language of graphical channels, the Renyi divergence pinpoints the information-theoretic capacity of discrete graphical channels with binary inputs. Our results generalize previously established thresholds derived specifically for unweighted block models, and support an important natural intuition relating the intrinsic hardness of community estimation to the problem of edge classification. Along the way, we establish a general relationship between the Renyi divergence and the probability of success of the maximum likelihood estimator for arbitrary edge weight distributions. Finally, we discuss consequences of our bounds for the related problems of censored block models and submatrix localization, which may be seen as special cases of the framework developed in our paper.
我们在加权随机块模型中获得精确恢复群落的尖锐阈值,其中以加权邻接矩阵的形式收集观测值,并且每个边的权重独立于由其端点的群落成员决定的分布生成。我们的主要结果,描述了当从离散分布中提取边权时,最大似然估计的成功与失败之间的精确边界,涉及到群落内和群落间边分布之间的1/2阶Renyi散度。当Renyi散度超过一定阈值时,即边缘分布充分分离,最大似然成功,概率趋于1;当Renyi散度低于阈值时,最大似然失效,概率有界远离0。在图形信道的语言中,Renyi散度指出了具有二进制输入的离散图形信道的信息论容量。我们的结果推广了先前建立的专门针对未加权块模型的阈值,并支持了一个重要的自然直觉,即社区估计的内在硬度与边缘分类问题有关。在此过程中,我们建立了Renyi散度与任意边权分布的最大似然估计器成功概率之间的一般关系。最后,我们讨论了我们的边界对截尾块模型和子矩阵定位相关问题的结果,这些问题可以被视为我们论文中开发的框架的特殊情况。
{"title":"Recovering communities in weighted stochastic block models","authors":"Varun Jog, Po-Ling Loh","doi":"10.1109/ALLERTON.2015.7447159","DOIUrl":"https://doi.org/10.1109/ALLERTON.2015.7447159","url":null,"abstract":"We derive sharp thresholds for exact recovery of communities in a weighted stochastic block model, where observations are collected in the form of a weighted adjacency matrix, and the weight of each edge is generated independently from a distribution determined by the community membership of its endpoints. Our main result, characterizing the precise boundary between success and failure of maximum likelihood estimation when edge weights are drawn from discrete distributions, involves the Renyi divergence of order 1/2 between the distributions of within-community and between-community edges. When the Renyi divergence is above a certain threshold, meaning the edge distributions are sufficiently separated, maximum likelihood succeeds with probability tending to 1; when the Renyi divergence is below the threshold, maximum likelihood fails with probability bounded away from 0. In the language of graphical channels, the Renyi divergence pinpoints the information-theoretic capacity of discrete graphical channels with binary inputs. Our results generalize previously established thresholds derived specifically for unweighted block models, and support an important natural intuition relating the intrinsic hardness of community estimation to the problem of edge classification. Along the way, we establish a general relationship between the Renyi divergence and the probability of success of the maximum likelihood estimator for arbitrary edge weight distributions. Finally, we discuss consequences of our bounds for the related problems of censored block models and submatrix localization, which may be seen as special cases of the framework developed in our paper.","PeriodicalId":112948,"journal":{"name":"2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116708269","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Privacy-preserving deep learning 保护隐私的深度学习
R. Shokri, Vitaly Shmatikov
Deep learning based on artificial neural networks is a very popular approach to modeling, classifying, and recognizing complex data such as images, speech, and text. The unprecedented accuracy of deep learning methods has turned them into the foundation of new AI-based services on the Internet. Commercial companies that collect user data on a large scale have been the main beneficiaries of this trend since the success of deep learning techniques is directly proportional to the amount of data available for training. Massive data collection required for deep learning presents obvious privacy issues. Users' personal, highly sensitive data such as photos and voice recordings is kept indefinitely by the companies that collect it. Users can neither delete it, nor restrict the purposes for which it is used. Furthermore, centrally kept data is subject to legal subpoenas and extrajudicial surveillance. Many data owners-for example, medical institutions that may want to apply deep learning methods to clinical records-are prevented by privacy and confidentiality concerns from sharing the data and thus benefitting from large-scale deep learning. In this paper, we present a practical system that enables multiple parties to jointly learn an accurate neural-network model for a given objective without sharing their input datasets. We exploit the fact that the optimization algorithms used in modern deep learning, namely, those based on stochastic gradient descent, can be parallelized and executed asynchronously. Our system lets participants train independently on their own datasets and selectively share small subsets of their models' key parameters during training. This offers an attractive point in the utility/privacy tradeoff space: participants preserve the privacy of their respective data while still benefitting from other participants' models and thus boosting their learning accuracy beyond what is achievable solely on their own inputs. We demonstrate the accuracy of our privacy-preserving deep learning on benchmark datasets.
基于人工神经网络的深度学习是一种非常流行的建模、分类和识别复杂数据(如图像、语音和文本)的方法。深度学习方法前所未有的准确性使其成为互联网上基于人工智能的新服务的基础。大规模收集用户数据的商业公司是这一趋势的主要受益者,因为深度学习技术的成功与可用于培训的数据量成正比。深度学习所需的大量数据收集存在明显的隐私问题。用户的个人、高度敏感的数据,如照片和录音,由收集这些数据的公司无限期保存。用户既不能删除它,也不能限制它的使用目的。此外,集中保存的数据受到法律传票和法外监视的约束。许多数据所有者(例如,可能希望将深度学习方法应用于临床记录的医疗机构)由于隐私和机密性问题而无法共享数据,从而无法从大规模深度学习中受益。在本文中,我们提出了一个实用的系统,该系统使多方能够在不共享其输入数据集的情况下共同学习给定目标的精确神经网络模型。我们利用现代深度学习中使用的优化算法,即基于随机梯度下降的优化算法,可以并行化和异步执行。我们的系统允许参与者在他们自己的数据集上独立训练,并在训练期间有选择地共享他们模型关键参数的小子集。这在效用/隐私权衡领域提供了一个有吸引力的点:参与者在保护各自数据的隐私的同时,仍然受益于其他参与者的模型,从而提高他们的学习准确性,而不仅仅是他们自己的输入。我们在基准数据集上证明了我们的隐私保护深度学习的准确性。
{"title":"Privacy-preserving deep learning","authors":"R. Shokri, Vitaly Shmatikov","doi":"10.1145/2810103.2813687","DOIUrl":"https://doi.org/10.1145/2810103.2813687","url":null,"abstract":"Deep learning based on artificial neural networks is a very popular approach to modeling, classifying, and recognizing complex data such as images, speech, and text. The unprecedented accuracy of deep learning methods has turned them into the foundation of new AI-based services on the Internet. Commercial companies that collect user data on a large scale have been the main beneficiaries of this trend since the success of deep learning techniques is directly proportional to the amount of data available for training. Massive data collection required for deep learning presents obvious privacy issues. Users' personal, highly sensitive data such as photos and voice recordings is kept indefinitely by the companies that collect it. Users can neither delete it, nor restrict the purposes for which it is used. Furthermore, centrally kept data is subject to legal subpoenas and extrajudicial surveillance. Many data owners-for example, medical institutions that may want to apply deep learning methods to clinical records-are prevented by privacy and confidentiality concerns from sharing the data and thus benefitting from large-scale deep learning. In this paper, we present a practical system that enables multiple parties to jointly learn an accurate neural-network model for a given objective without sharing their input datasets. We exploit the fact that the optimization algorithms used in modern deep learning, namely, those based on stochastic gradient descent, can be parallelized and executed asynchronously. Our system lets participants train independently on their own datasets and selectively share small subsets of their models' key parameters during training. This offers an attractive point in the utility/privacy tradeoff space: participants preserve the privacy of their respective data while still benefitting from other participants' models and thus boosting their learning accuracy beyond what is achievable solely on their own inputs. We demonstrate the accuracy of our privacy-preserving deep learning on benchmark datasets.","PeriodicalId":112948,"journal":{"name":"2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton)","volume":"183 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115552707","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1861
Statistical and information-theoretic optimization and performance bounds of video steganography 视频隐写的统计和信息论优化及性能界限
Pub Date : 2015-09-01 DOI: 10.1109/ALLERTON.2015.7447179
M. Sharifzadeh, D. Schonfeld
This paper presents a novel approach to the optimization and performance bounds of video steganography. Hypothesis testing is used to derive the probability of detection and false alarm for a cooperator with a priori knowledge of a carrier signal and an attacker for whom the carrier signal is unknown. The result is then used to optimize the statistical performance of a well-known video steganography method (i.e., secure spread spectrum watermarking) while ensuring limits on the statistical performance of video steganalysis. In addition, the channel capacity for video steganography and steganalsyis are ascertained under the proposed statistical model. It is then used to characterize an optimal information-theoretic criterion for video steganography subject to performance bounds on statistical steganalysis. Theoretical and numerical results demonstrate the consistency of both the statistical and information-theoretic approaches to the optimization of video steganography.
本文提出了一种新的视频隐写优化和性能边界的方法。假设检验用于推导已知载波信号的合作者和未知载波信号的攻击者的检测概率和虚警概率。然后将结果用于优化一种著名的视频隐写方法(即安全扩频水印)的统计性能,同时确保视频隐写分析的统计性能限制。此外,根据所提出的统计模型确定了视频隐写和隐写分析的信道容量。然后用它来描述一个最优的信息理论准则,视频隐写受制于统计隐写分析的性能界限。理论和数值结果证明了统计方法和信息论方法在视频隐写优化中的一致性。
{"title":"Statistical and information-theoretic optimization and performance bounds of video steganography","authors":"M. Sharifzadeh, D. Schonfeld","doi":"10.1109/ALLERTON.2015.7447179","DOIUrl":"https://doi.org/10.1109/ALLERTON.2015.7447179","url":null,"abstract":"This paper presents a novel approach to the optimization and performance bounds of video steganography. Hypothesis testing is used to derive the probability of detection and false alarm for a cooperator with a priori knowledge of a carrier signal and an attacker for whom the carrier signal is unknown. The result is then used to optimize the statistical performance of a well-known video steganography method (i.e., secure spread spectrum watermarking) while ensuring limits on the statistical performance of video steganalysis. In addition, the channel capacity for video steganography and steganalsyis are ascertained under the proposed statistical model. It is then used to characterize an optimal information-theoretic criterion for video steganography subject to performance bounds on statistical steganalysis. Theoretical and numerical results demonstrate the consistency of both the statistical and information-theoretic approaches to the optimization of video steganography.","PeriodicalId":112948,"journal":{"name":"2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115134001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Quickest detection of Gauss-Markov random fields 快速检测高斯-马尔可夫随机场
Pub Date : 2015-09-01 DOI: 10.1109/ALLERTON.2015.7447089
Javad Heydari, A. Tajer, H. Poor
The problem of quickest data-adaptive and sequential search for clusters in a Gauss-Markov random field is considered. In the existing literature, such search for clusters is often performed using fixed sample size and non-adaptive strategies. In order to accommodate large networks, in which data adaptivity leads to significant gains in detection quality and agility, in this paper sequential and data-adaptive detection strategies are proposed and are shown to enjoy asymptotic optimality. The quickest detection problem is abstracted by adopting an acyclic dependency graph to model the mutual effects of different random variables in the field and decision making rules are derived for general random fields and specialized for Gauss-Markov random fields. Performance evaluations demonstrate the gains of the data-adaptive schemes over existing techniques in terms of sampling complexity and error exponents.
研究高斯-马尔可夫随机场中簇的快速自适应和顺序搜索问题。在现有文献中,这种聚类搜索通常使用固定样本量和非自适应策略进行。为了适应大型网络,其中数据自适应导致检测质量和敏捷性的显著提高,本文提出了顺序和数据自适应检测策略,并证明了它们具有渐近最优性。采用无环依赖图来描述不同随机变量在场中的相互作用,从而抽象出最快的检测问题,并推导出一般随机场和高斯-马尔可夫随机场的决策规则。性能评估表明数据自适应方案在采样复杂性和误差指数方面优于现有技术。
{"title":"Quickest detection of Gauss-Markov random fields","authors":"Javad Heydari, A. Tajer, H. Poor","doi":"10.1109/ALLERTON.2015.7447089","DOIUrl":"https://doi.org/10.1109/ALLERTON.2015.7447089","url":null,"abstract":"The problem of quickest data-adaptive and sequential search for clusters in a Gauss-Markov random field is considered. In the existing literature, such search for clusters is often performed using fixed sample size and non-adaptive strategies. In order to accommodate large networks, in which data adaptivity leads to significant gains in detection quality and agility, in this paper sequential and data-adaptive detection strategies are proposed and are shown to enjoy asymptotic optimality. The quickest detection problem is abstracted by adopting an acyclic dependency graph to model the mutual effects of different random variables in the field and decision making rules are derived for general random fields and specialized for Gauss-Markov random fields. Performance evaluations demonstrate the gains of the data-adaptive schemes over existing techniques in terms of sampling complexity and error exponents.","PeriodicalId":112948,"journal":{"name":"2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126697341","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Partial compute-compress-and-forward for limited backhaul uplink multicell processing 有限回程上行链路多单元处理的部分计算压缩转发
Pub Date : 2015-09-01 DOI: 10.1109/ALLERTON.2015.7447153
Iñaki Estella Aguerri, A. Zaidi
We study the transmission over a cloud radio access network, in which multiple base stations (BS) are connected to a central processor (CP) via finite-capacity backhaul links. Focusing on maximizing the allowed sum-rate, we develop a lattice based coding scheme that generalizes both compute-and-forward and successive Wyner-Ziv coding for this model. The scheme builds on Cover and El Gamal partial-decode-compress-and-forward and is shown to strictly outperform the best of the aforementioned two popular schemes. The results are illustrated through some numerical examples.
我们研究了在云无线接入网络上的传输,其中多个基站(BS)通过有限容量回程链路连接到中央处理器(CP)。专注于最大化允许的和率,我们开发了一个基于点阵的编码方案,该方案推广了该模型的计算前向和连续Wyner-Ziv编码。该方案建立在Cover和El Gamal部分解码-压缩-转发的基础上,并被证明严格优于上述两种流行方案中的最佳方案。通过一些数值算例对结果进行了说明。
{"title":"Partial compute-compress-and-forward for limited backhaul uplink multicell processing","authors":"Iñaki Estella Aguerri, A. Zaidi","doi":"10.1109/ALLERTON.2015.7447153","DOIUrl":"https://doi.org/10.1109/ALLERTON.2015.7447153","url":null,"abstract":"We study the transmission over a cloud radio access network, in which multiple base stations (BS) are connected to a central processor (CP) via finite-capacity backhaul links. Focusing on maximizing the allowed sum-rate, we develop a lattice based coding scheme that generalizes both compute-and-forward and successive Wyner-Ziv coding for this model. The scheme builds on Cover and El Gamal partial-decode-compress-and-forward and is shown to strictly outperform the best of the aforementioned two popular schemes. The results are illustrated through some numerical examples.","PeriodicalId":112948,"journal":{"name":"2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124386567","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Absence of isolated nodes in inhomogeneous random key graphs 非齐次随机键图中孤立节点的缺失
Pub Date : 2015-09-01 DOI: 10.1109/ALLERTON.2015.7447143
Osman Yağan
We introduce a new random key predistribution scheme for securing heterogeneous wireless sensor networks. Each of the n sensors in the network is classified into r classes according to some probability distribution μ = {μ1, ..., μr}. Before deployment, a class i sensor is assigned Ki cryptographic keys that are selected uniformly at random from a common pool of P keys, for each i = 1, ..., r. Once deployed, a pair of sensors can establish a secure communication channel if and only if they have a key in common. We model the topology of this network by an inhomogeneous random key graph. We establish scaling conditions on the parameters P and {K1, ..., Kr} so that the this graph has no isolated nodes with high probability. The result is given in the form of a zero-one law with the number of sensors n growing unboundedly large. An analogous result is also conjectured for the property of graph connectivity.
针对异构无线传感器网络的安全问题,提出了一种新的随机密钥预分配方案。网络中的n个传感器按某种概率分布μ = {μ1,…μr}。在部署之前,i类传感器被分配Ki个加密密钥,这些密钥是从P个公共密钥池中随机均匀选择的,对于每个i = 1,…一对传感器一旦部署,当且仅当它们有一个共同的密钥时,它们才能建立一个安全的通信通道。我们用非齐次随机键图对该网络的拓扑结构进行了建模。建立了参数P和{K1,…, Kr},使得这个图没有高概率的孤立节点。当传感器数目n无限大时,其结果以0 - 1定律的形式给出。对图连通性的性质也提出了类似的结论。
{"title":"Absence of isolated nodes in inhomogeneous random key graphs","authors":"Osman Yağan","doi":"10.1109/ALLERTON.2015.7447143","DOIUrl":"https://doi.org/10.1109/ALLERTON.2015.7447143","url":null,"abstract":"We introduce a new random key predistribution scheme for securing heterogeneous wireless sensor networks. Each of the n sensors in the network is classified into r classes according to some probability distribution μ = {μ1, ..., μr}. Before deployment, a class i sensor is assigned Ki cryptographic keys that are selected uniformly at random from a common pool of P keys, for each i = 1, ..., r. Once deployed, a pair of sensors can establish a secure communication channel if and only if they have a key in common. We model the topology of this network by an inhomogeneous random key graph. We establish scaling conditions on the parameters P and {K1, ..., Kr} so that the this graph has no isolated nodes with high probability. The result is given in the form of a zero-one law with the number of sensors n growing unboundedly large. An analogous result is also conjectured for the property of graph connectivity.","PeriodicalId":112948,"journal":{"name":"2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121625175","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Robust estimation using context-aware filtering 使用上下文感知过滤的鲁棒估计
Pub Date : 2015-09-01 DOI: 10.1109/ALLERTON.2015.7447058
Radoslav Ivanov, Nikolay A. Atanasov, M. Pajic, George J. Pappas, Insup Lee
This paper presents the context-aware filter, an estimation technique that incorporates context measurements, in addition to the regular continuous measurements. Context measurements provide binary information about the system's context which is not directly encoded in the state; examples include a robot detecting a nearby building using image processing or a medical device alarming that a vital sign has exceeded a predefined threshold. These measurements can only be received from certain states and can therefore be modeled as a function of the system's current state. We focus on two classes of functions describing the probability of context detection given the current state; these functions capture a wide variety of detections that may occur in practice. We derive the corresponding context-aware filters, a Gaussian Mixture filter and another closed-form filter with a posterior distribution whose moments are derived in the paper. Finally, we evaluate the performance of both classes of functions through simulation of an unmanned ground vehicle.
本文提出了上下文感知滤波器,这是一种除常规连续测量外,还结合上下文测量的估计技术。上下文测量提供了关于系统上下文的二进制信息,这些信息不直接编码在状态中;例如,机器人通过图像处理检测附近的建筑物,或者医疗设备在生命体征超过预定义阈值时发出警报。这些测量只能从某些状态接收,因此可以将其建模为系统当前状态的函数。我们专注于描述给定当前状态下上下文检测概率的两类函数;这些功能捕获了在实践中可能发生的各种各样的检测。我们推导了相应的上下文感知滤波器、高斯混合滤波器和另一种具有后验分布的闭型滤波器,并推导了它们的矩。最后,我们通过无人驾驶地面车辆的仿真来评估这两类功能的性能。
{"title":"Robust estimation using context-aware filtering","authors":"Radoslav Ivanov, Nikolay A. Atanasov, M. Pajic, George J. Pappas, Insup Lee","doi":"10.1109/ALLERTON.2015.7447058","DOIUrl":"https://doi.org/10.1109/ALLERTON.2015.7447058","url":null,"abstract":"This paper presents the context-aware filter, an estimation technique that incorporates context measurements, in addition to the regular continuous measurements. Context measurements provide binary information about the system's context which is not directly encoded in the state; examples include a robot detecting a nearby building using image processing or a medical device alarming that a vital sign has exceeded a predefined threshold. These measurements can only be received from certain states and can therefore be modeled as a function of the system's current state. We focus on two classes of functions describing the probability of context detection given the current state; these functions capture a wide variety of detections that may occur in practice. We derive the corresponding context-aware filters, a Gaussian Mixture filter and another closed-form filter with a posterior distribution whose moments are derived in the paper. Finally, we evaluate the performance of both classes of functions through simulation of an unmanned ground vehicle.","PeriodicalId":112948,"journal":{"name":"2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121887880","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Degrees of freedom of bursty multiple access channels with a relay 带中继的突发多址信道的自由度
Pub Date : 2015-09-01 DOI: 10.1109/ALLERTON.2015.7447022
Sunghyun Kim, Changho Suh
We investigate the role of relays in multiple access channels (MACs) with bursty user traffic, where intermittent data traffic restricts the users to bursty transmissions. Specifically, we examine a K-user bursty MIMO Gaussian MAC with a relay, where bursty traffic of each user is governed by a Bernoulli random process. As our main result, we characterize the degrees of freedom (DoF) region. To this end, we extend noisy network coding, in which relays compress-and-forward, to achieve the DoF cut-set bound. From this result, we establish the necessary and sufficient condition for attaining collision-free DoF performances. Also, we show that relays can provide a DoF gain which scales to some extent with additional relay antennas. Our results have practical implications in various scenarios of wireless systems, such as the Internet of Things (IoT) and media access control protocols.
我们研究了中继在突发用户流量的多址通道(mac)中的作用,其中间歇性数据流量限制了用户的突发传输。具体来说,我们研究了一个带有中继的k用户突发MIMO高斯MAC,其中每个用户的突发流量由伯努利随机过程控制。作为我们的主要结果,我们描述了自由度(DoF)区域。为此,我们扩展了噪声网络编码,其中中继压缩转发,以实现DoF切割集边界。从这一结果出发,建立了实现无碰撞自由度的充分必要条件。此外,我们表明继电器可以提供一个自由度增益,在一定程度上缩放额外的中继天线。我们的研究结果在无线系统的各种场景中具有实际意义,例如物联网(IoT)和媒体访问控制协议。
{"title":"Degrees of freedom of bursty multiple access channels with a relay","authors":"Sunghyun Kim, Changho Suh","doi":"10.1109/ALLERTON.2015.7447022","DOIUrl":"https://doi.org/10.1109/ALLERTON.2015.7447022","url":null,"abstract":"We investigate the role of relays in multiple access channels (MACs) with bursty user traffic, where intermittent data traffic restricts the users to bursty transmissions. Specifically, we examine a K-user bursty MIMO Gaussian MAC with a relay, where bursty traffic of each user is governed by a Bernoulli random process. As our main result, we characterize the degrees of freedom (DoF) region. To this end, we extend noisy network coding, in which relays compress-and-forward, to achieve the DoF cut-set bound. From this result, we establish the necessary and sufficient condition for attaining collision-free DoF performances. Also, we show that relays can provide a DoF gain which scales to some extent with additional relay antennas. Our results have practical implications in various scenarios of wireless systems, such as the Internet of Things (IoT) and media access control protocols.","PeriodicalId":112948,"journal":{"name":"2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121776101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Non-isomorphic distribution supports for calculating entropic vectors 非同构分布支持计算熵向量
Pub Date : 2015-09-01 DOI: 10.1109/ALLERTON.2015.7447064
Yunshu Liu, J. Walsh
A 2N - 1 dimensional vector is said to be entropic if each of its entries can be regarded as the joint entropy of a particular subset of N discrete random variables. The explicit characterization of the closure of the region of entropic vectors Γ̅*N is unknown for N ≥ 4. A systematic approach is proposed to generate the list of non-isomorphic distribution supports for the purpose of calculating and optimizing entropic vectors. It is shown that a better understanding of the structure of the entropy region can be obtained by constructing inner bounds based on these supports. The constructed inner bounds based on different supports are compared both in full dimension and in a transformed three dimensional space of Csirmaz and Matúš.
如果一个2N - 1维的向量的每一项都可以看作是N个离散随机变量的特定子集的联合熵,那么这个向量就是熵的。对于N≥4,熵向量Γ *N区域闭包的显式表征是未知的。为了计算和优化熵向量,提出了一种系统的方法来生成非同构分布支持列表。结果表明,基于这些支撑构造内界可以更好地理解熵域的结构。在全维和变换后的Csirmaz和Matúš三维空间中,比较了基于不同支撑构造的内边界。
{"title":"Non-isomorphic distribution supports for calculating entropic vectors","authors":"Yunshu Liu, J. Walsh","doi":"10.1109/ALLERTON.2015.7447064","DOIUrl":"https://doi.org/10.1109/ALLERTON.2015.7447064","url":null,"abstract":"A 2N - 1 dimensional vector is said to be entropic if each of its entries can be regarded as the joint entropy of a particular subset of N discrete random variables. The explicit characterization of the closure of the region of entropic vectors Γ̅*N is unknown for N ≥ 4. A systematic approach is proposed to generate the list of non-isomorphic distribution supports for the purpose of calculating and optimizing entropic vectors. It is shown that a better understanding of the structure of the entropy region can be obtained by constructing inner bounds based on these supports. The constructed inner bounds based on different supports are compared both in full dimension and in a transformed three dimensional space of Csirmaz and Matúš.","PeriodicalId":112948,"journal":{"name":"2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122181311","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Online learning for demand response 需求响应的在线学习
Pub Date : 2015-09-01 DOI: 10.1109/ALLERTON.2015.7447007
D. Kalathil, R. Rajagopal
Demand response is a key component of existing and future grid systems facing increased variability and peak demands. Scaling demand response requires efficiently predicting individual responses for large numbers of consumers while selecting the right ones to signal. This paper proposes a new online learning problem that captures consumer diversity, messaging fatigue and response prediction. We use the framework of multi-armed bandits model to address this problem. This yields simple and easy to implement index based learning algorithms with provable performance guarantees.
需求响应是当前和未来电网系统面临日益增加的可变性和峰值需求的关键组成部分。扩展需求响应需要有效地预测大量消费者的个人响应,同时选择正确的信号。本文提出了一个新的在线学习问题,该问题捕获了消费者多样性、消息传递疲劳和响应预测。我们使用多武装强盗模型的框架来解决这个问题。这产生了简单且易于实现的基于索引的学习算法,具有可证明的性能保证。
{"title":"Online learning for demand response","authors":"D. Kalathil, R. Rajagopal","doi":"10.1109/ALLERTON.2015.7447007","DOIUrl":"https://doi.org/10.1109/ALLERTON.2015.7447007","url":null,"abstract":"Demand response is a key component of existing and future grid systems facing increased variability and peak demands. Scaling demand response requires efficiently predicting individual responses for large numbers of consumers while selecting the right ones to signal. This paper proposes a new online learning problem that captures consumer diversity, messaging fatigue and response prediction. We use the framework of multi-armed bandits model to address this problem. This yields simple and easy to implement index based learning algorithms with provable performance guarantees.","PeriodicalId":112948,"journal":{"name":"2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton)","volume":"210 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131511386","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
期刊
2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1