Loading web-font TeX/Math/Italic
Andrew L. Kun - IEEE Xplore Author Profile

Showing 1-25 of 95 results

Filter Results

Show

Results

We consider the basic problem of querying an expert oracle for labeling a dataset in machine learning. This is typically an expensive and time consuming process and therefore, we seek ways to do so efficiently. The conventional approach involves comparing each sample with (the representative of) each class to find a match. In a setting with NN equally likely classes, this involves N/2N/2 pairw...Show More
We propose a two-layer coding architecture for communication of multiple users over a shared slotted medium enabling joint collision resolution and decoding. Each user first encodes its information bits with an outer code for reliability, and then transmits these coded bits with possible repetitions over transmission time slots of the access channel. The transmission patterns are dictated by the i...Show More
Solving a large-scale system of linear equations is a key step at the heart of many algorithms in scientific computing, machine learning, and beyond. When the problem dimension is large, computational and/or memory constraints make it desirable, or even necessary, to perform the task in a distributed fashion. In this paper, we consider a common scenario in which a taskmaster intends to solve a lar...Show More
Alternating direction method of multipliers (ADMM) is a popular convex optimization algorithm, which can be employed for solving distributed consensus optimization problems. In this setting, agents locally estimate the optimal solution of an optimization problem and exchange messages with their neighbors over a connected network. The distributed algorithms are typically exposed to different types ...Show More
The role of synchronous firing in sensory coding and cognition remains controversial. While studies, focusing on its mechanistic consequences in attentional tasks, suggest that synchronization dynamically boosts sensory processing, others failed to find significant synchronization levels in such tasks. We attempt to understand both lines of evidence within a coherent theoretical framework. We conc...Show More
Solving a large-scale system of linear equations is a key step at the heart of many algorithms in scientific computing, machine learning, and beyond. When the problem dimension is large, computational and/or memory constraints make it desirable, or even necessary, to perform the task in a distributed fashion. In this paper, we consider a common scenario in which a taskmaster intends to solve a lar...Show More
In order to increase the network capacity and fulfill the Quality of Service requirements in multi-user wireless networks, interference alignment (IA) has been proposed. Subsequently, ergodic IA was introduced as a promising scheme to achieve a degrees-of-freedom metric equal to (1/2), at the expense of additional delay. In this letter, we study the delay-rate trade-off in ergodic IA and exactly c...Show More
In the last years, the advancements in signal processing and integrated circuits technology allowed several research groups to develop working prototypes of in-band full-duplex wireless systems. The introduction of such a revolutionary concept is promising in terms of increasing network performance, but at the same time poses several new challenges, especially at the MAC layer. Consequently, innov...Show More
The emergence of networks of many devices in the context of cyber-physical systems motivates novel solutions for communication over random access channels. Currently deployed random access protocols attempt to avoid collisions, and target the performance of a scheduled multiple access system (a strategy known to be only suboptimal from the information-theoretic perspective). In contrast, in this p...Show More
A nano-abnormality detection scheme (NADS) in molecular nano-networks is studied. This is motivated by the fact that early detection of diseases such as cancer plays a crucial role in their successful treatment. The proposed NADS is in fact a two-tier network of sensor nano-machines (SNMs) in the first tier and a data-gathering node (DGN) at the sink. The SNMs detect the presence of competitor cel...Show More
A networked controlled system (NCS) in which the plant communicates to the controller over a channel with random delay loss is considered. The channel model is motivated by recent development of tree codes for NCS, which effectively translates an erasure channel to one with random delay. A causal transform coding scheme is presented which exploits the plant state memory for efficient communication...Show More
In this paper, statistical Quality of Service provisioning in next generation heterogeneous mobile cellular networks is investigated. To this aim, any active entity of the cellular network is regarded as a queuing system, whose statistical QoS requirements depend on the specific application. In this context, by quantifying the performance in terms of effective capacity, we introduce a lower bound ...Show More
Recent studies indicate the feasibility of in-band full-duplex (FD) wireless communications, where a wireless radio transmits and receives simultaneously in the same band. Due to its potential to increase the capacity, analyzing the performance of a cellular network that contains full-duplex devices is crucial. In this paper, we consider maximizing the weighted sum-rate of downlink and uplink of a...Show More
Recently, several working implementations of inband full-duplex wireless systems have been presented, where the same node can transmit and receive simultaneously in the same frequency band. The introduction of such a possibility at the physical layer could lead to improved performance but also poses several challenges at the MAC layer. In this paper, an innovative mechanism of channel contention i...Show More
In this paper, the impact of in-band full-duplex (IBFD) wireless communications on secret key generation via physical layer channel state information is investigated. A key generation strategy for IBFD wireless devices to increase the rate of generated secret keys over multipath fading channels is proposed. Conventionally, due to the half-duplex (HD) constraint on wireless transmissions, sensing s...Show More
Self-Healing is one of the key important functionalities in self-organizing mobile communication networks. Despite its importance, self-healing has yet to receive a deserving research attention in the literature. This paper considers important quality indicators in a live mobile communications network and presents an automatic unified detection and diagnosis framework to identify root causes of fa...Show More
ADMM is a popular algorithm for solving convex optimization problems. Applying this algorithm to distributed consensus optimization problem results in a fully distributed iterative solution which relies on processing at the nodes and communication between neighbors. Local computations usually suffer from different types of errors, due to e.g., observation or quantization noise, which can degrade t...Show More
State estimation is an essential part of energy management system in smart grid as it is a basis for many of the associated management and control processes. In this paper, we present a decentralized state estimation approach, based on consensus optimization and the alternating direction method of multipliers, that is robust against certain harsh class of false data injection schemes. The proposed...Show More
This paper investigates distortion-power tradeoffs in transmission of quasi-stationary sources over delay and buffer limited block fading channels by studying encoder and decoder buffering techniques to smooth out the source and channel variations. Four source and channel coding schemes that consider buffer and power constraints are presented to minimize the reconstructed source distortion. The fi...Show More
This paper studies the capacity of molecular communications in fluid media, where the information is encoded in the number of transmitted molecules in a time-slot (amplitude shift keying). The propagation of molecules is governed by random Brownian motion and the communication is in general subject to intersymbol interference (ISI). We first consider the case where ISI is negligible and analyze th...Show More
There are now several works on the use of the additive inverse Gaussian noise (AIGN) model for the random transit time in molecular communication (MC) channels. The randomness invariably causes inter- symbol interference (ISI) in MC, an issue largely ignored or simplified. In this paper we derive an upper bound and two lower bounds for MC based on amplitude shift keying (ASK) in presence of ISI. T...Show More
We investigate the ability of the physical layer approaches of constellation shaping and forward error correction to enhance the performance of full duplex (FD) wireless radio systems. We use low density parity check and optimized shaping codes to transmit non-equiprobable constellation points from an amplitude phase shift keying modulation with imperfect power amplifier and in the presence of FD ...Show More
In this paper, the problem of lossy source coding with side information at the decoder is considered when the dependency between the source and the side information (SI) is quasi-stationary and unknown to the encoder. This dependency is modeled using a (virtual) block fading channel. In order to help the decoder estimate the dependency, a part of the transmitted source in each block is coded at hi...Show More
We are interested in understanding the neural correlates of attentional processes using first principles. Here we apply a recently developed first principles approach that uses transmitted information in bits per joule to quantify the energy efficiency of information transmission for an inter-spike-interval (ISI) code that can be modulated by means of the synchrony in the presynaptic population. W...Show More
In this paper, we consider one of the main disadvantages of Ergodic Interference Alignment, i.e., delay. We propose two methods to solve the open problem of finding the best choice of user sets in order to minimize the delay. With these methods we are able to find the best JAP-B scheme which aims to trade off rate for delay in Ergodic Interference Alignment. First, we provide the solution based on...Show More