Multi-version Coding with Side Information

  • Ali R.
  • Cadambe V.
  • Llorca J.
  • Tulino A.

THIS PAPER IS ELIGIBLE FOR THE STUDENT PAPER AWARD. In applications of storage systems to modern key-value stores, the stored data is highly dynamic due to frequent updates from the system write clients. The multi-version coding problem has been formulated to study the cost of storing dynamic data in asynchronous ...

Cost of Path Loss and Local Cooperation in Capacity Scaling of Extended Wireless Networks

  • Du J.
  • Muriel Medard
  • Shlomo Shamai (Shitz)

Given a large wireless network consisting of randomly deployed nodes, where each of the nodes wants to transmit to a random destination node within the network at some equal rate, how fast can the sum rate grow as the number of nodes scales up at fixed density? This question is ...

Sparse NOMA: A Closed-Form Characterization

  • Benjamin M. Zaidel
  • Shental O.
  • Shlomo Shamai (Shitz)

Understanding fundamental limits of the various technologies suggested for future 5G and beyond cellular systems is crucial for developing efficient state-of-the-art designs. A leading technology of major interest is non-orthogonal multiple-access (NOMA). In this paper, we derive an explicit rigorous closed-form analytical expression for the optimum spectral efficiency in the ...

Limited-Sharing Multi-Party Computation for Massive Matrix Operations

  • Maddah-Ali M.
  • Nodehi H.

In this paper, we introduce limited-sharing multiparty computation; in which there is a network of workers (processors) and a set of sources, each having access to a massive matrix as a private input. These sources aim to offload the task of computing a polynomial function of the matrices to the ...

A Compressed Sensing Approach for Distribution Matching

In this work, we formulate the fixed-length distribution matching as a Bayesian inference problem. Our proposed solution is inspired from the compressed sensing paradigm and the sparse superposition (SS) codes. First, we introduce sparsity in the binary source via position modulation (PM). We then present a simple and exact matcher ...

Compressive Phase Retrieval of Structured Signals

Compressive phase retrieval is the problem of recovering a structured vector $bf{x} in mathds{C}^n$ from its phaseless linear measurements. A compression algorithm aims to represent structured signals with as few bits as possible. As a result of extensive research devoted to compression algorithms, in many signal classes, compression algorithms are ...

Genome-Wide Association Studies: Information Theoretic Limits of Reliable Learning

In the problems of Genome-Wide Association Study (GWAS), the objective is to associate subsequences of individual's genomes to the observable characteristics called phenotypes. The genome containing the biological information of an individual can be represented by a sequence of length <strong>G</strong>. Many observable characteristics of the individuals can be related ...

Erasure Coding for Decentralized Coded Caching

  • Maddahali M.
  • Mohajer S.
  • Reisizadeh H.

THIS PAPER IS ELIGIBLE FOR THE STUDENT PAPER AWARD. Coded caching can significantly decrease the communication load in peak hours of the network. The gain of caching is maximized in a centralized setting, where the cache content of users are opportunistically designed. In the absence of a centralized placement, users' ...

Compressive imaging via one-shot measurements

  • Jalali S.
  • Yuan X.

: One-shot measurement systems combine multiple frames in a signal such as a video into a single frame of the same dimensions. Each element (pixel) in the measured frame is a linear combination of the corresponding elements (pixels) in the combined frames. Such systems are a crucial part of various ...

Straggler Mitigation in Distributed Matrix Multiplication: Fundamental Limits and Optimal Coding

  • Avestimehr A.
  • Maddah-Ali M.
  • Yu Q.

Consider massive matrix multiplication, a problem that underlies many data analytic applications, in a large-scale distributed system comprising a group of workers. We target the stragglers' delay performance bottleneck, which is due to the unpredictable latency in waiting for slowest nodes (or stragglers) to finish their tasks. We propose a ...

Reliability-Based-Layered Belief Propagation for Iterative Decoding of LDPC Codes

  • Guan H.
  • Hou X.
  • Sun J.
  • Sun R.
  • Zhao Z.

Reliability-Based-Layered Belief Propagation (RBL-BP) decoding algorithm for LDPC codes is proposed in this paper. Being an informed dynamic schedule (IDS), it measures convergence and selects iterations by the absolute value of logarithmic likelihood ratio information obtained from channel (ABS-LLR-CH). Each variable node can select its own iterations by estimating its ...

Compressed Coded Distributed Computing

  • Avestimehr A.
  • Li S.
  • Maddah-Ali M.

Communication overhead is one of the major performance bottlenecks in large-scale distributed computing systems, especially for machine learning applications. Conventionally, compression techniques are used to reduce the load of communication by combining intermediate results of the same computation task as much as possible. Recently, via the development of coded distributed ...

Towards integration of Industrial Ethernet with 5G mobile networks

  • Jasperneite J.
  • Neumann A.
  • Rost P.
  • Sivasivaganesan R.
  • Wisniewski L.

In contrast to the predecessors, the fifth generation of mobile networks (5G) will particularly address communication in production systems by providing machine-type communication and matching requirements regarding reliability and latency. However, 3GPP 5G will not be the one and only network technology that can be used to fulfill all the ...

World Wide Streams - a new World Wide Web for in-the-moment information

  • Trappeniers L.

We are evolving to a world where multi-sensory experiences and new interaction modalities become increasingly important. A world where human augmented intelligence - based on massive amounts of available data - is expected to change our lives in drastic ways. We are moving to an IoT world where information sources ...

A High Efficiency 3.6-4.0 GHz Envelope-Tracking Power Amplifier Using GaN Soft-Switching Buck-Converter

  • Asbeck P.
  • Kolmonen T.
  • Komatsuzaki Y.
  • Lanfranco S.
  • Ma R.
  • Piirainen O.
  • Sakata S.
  • Shinjo S.
  • Tanskanen J.
  • Yamanaka K.

We report a high efficiency sub-6GHz wideband Envelope-Tracking Power Amplifier (ET-PA) including a soft-switching buck-converter and a wideband RF-PA, used in conjunction with a digital front end (DFE) environment for signal generation and predistortion. Both buck-converter and RF-P A were fabricated using an 0.15um GaN HEMT process. The DFE can ...

An Analog Wide-Bandwidth Baseband Chain for 12Gbps 256QAM Direct-Conversion Receiver

  • Baeyens Y.
  • Jalali-Farahani B.
  • Moretto M.
  • Shahramian S.
  • Singh A.

This paper presents a broadband low-power baseband designed for zero-IF phased-array receiver. It can support 12 Gbps 256QAM and 17Gbps 32QAM. Baseband circuit provides filtering for RF channel bandwidths of 1.4Ghz to 6Ghz in 16 different steps. It incorporates variable-gain-amplifiers with total tuning range of 40 dB. DC offsets up ...

Compact 28-GHz phased array antenna for 5G access

  • Valkonen R.

Requirements of upcoming 5G millimeter-wave communications, such as high antenna gain and beamforming agility, are addressed by designing, manufacturing and measuring a compact and scalable phased array antenna for 28-GHz access network. The antenna is based on a multi-layer printed circuit board (PCB) with 64 radiating elements and 16 commercial ...

Pushing Inkjet Printing to W-band: An all-printed 90-GHz beamforming array

  • Baeyens Y.
  • Kimionis I.
  • Shahramian S.
  • Singh A.
  • Tentzeris M.

In this work, the inkjet printing process is refined to push the capabilities of additive manufacturing up to the W-band (75-110 GHz). The idiosyncrasies of inkjet printing on polymer dielectric materials are fully taken into account, to mitigate the effect of excessive ink spreading which results in RF circuit detuning ...

Network Intrusion Detection Using Flow Statistics

  • Atli B.
  • Jung A.
  • Miche Y.

The increasing use of network data within every aspect of human life, ranging from genetic databases to credit card payments, urges for efficient methods for detecting any attempts (intrusions) to compromise sensitive information. The problem of detecting such network intrusions is challenging, since the regular or normal network patterns are ...

On Selected V2X Technology Components and Enablers from the 5GCAR Project

  • Abbas T.
  • Alli S.
  • Alonso-Zarate J.
  • Dillinger M.
  • Fallgran M.
  • Fodor G.
  • Li Z.
  • Mahmoodi T.
  • Svensson T.
  • Vivier G

Cooperative intelligent transport systems (ITS) and connected vehicles are foreseen to change the way mobility is conceived today. Cooperative and connected vehicles will lead to improved road traffic safety and efficiency and will also trigger innovation in the infotainment area. These will foster the design of disruptive new business models ...